1F3-2 Chaotic Voice Analysis Method on Smartphone

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Voice and Video Telephony Services in Smartphone

Multimedia telephony is a delay-sensitive application. Packet losses, relatively less critical than delay, are allowed up to a certain threshold. They represent the QoS constraints that have to be respected to guarantee the operation of the telephony service and user satisfaction. In this work we introduce a new smartphone architecture characterized by two process levels called application proc...

متن کامل

Digital Chaotic Scrambling of Voice Based on Duffing Map

With the significant development in communication systems especially in the public channels through which our information travels, there are more increasing in the channels problems. The information security is the important one that should be enhanced. This paper presents a chaos-based speech scrambling system. Chaotic maps have been successfully used for large-scale data encryption such as im...

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

A Smartphone Indoor Positioning Method

Location based services are very useful to human beings. The vehicle navigation service that is used by almost all drivers in the world is an example location based service. As the man made constructions are getting bigger and bigger, indoor location based services are demanded. Matter of fact, researches for indoor location based service started in the early 1990s and developing techniques wit...

متن کامل

Deployment of Keystroke Analysis on a Smartphone

The current security on mobile devices is often limited to the Personal Identification Number (PIN), a secretknowledge based technique that has historically demonstrated to provide ineffective protection from misuse. Unfortunately, with the increasing capabilities of mobile devices, such as online banking and shopping, the need for more effective protection is imperative. This study proposes th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Japanese Journal of Ergonomics

سال: 2016

ISSN: 0549-4974,1884-2844

DOI: 10.5100/jje.52.s230