نتایج جستجو برای: binary masking

تعداد نتایج: 129564  

1999
YE WANG

In order to improve audio coding performance, excess masking has been employed for the compression of complex audio signals. A new algorithm is developed to classify and pre-process maskers. A psychoacoustic model is used to estimate simultaneous masking threshold. This masking threshold is used for quantizing audio signal coefficients in the frequency domain. Preliminary test results show impr...

Journal: :The Journal of the Acoustical Society of America 2006
Douglas S Brungart Peter S Chang Brian D Simpson DeLiang Wang

When a target speech signal is obscured by an interfering speech wave form, comprehension of the target message depends both on the successful detection of the energy from the target speech wave form and on the successful extraction and recognition of the spectro-temporal energy pattern of the target out of a background of acoustically similar masker sounds. This study attempted to isolate the ...

Journal: :acta medica iranica 0
m. khajavi a. a. peyvi m. e. mahdavi

at the highest signal levels, the masking function for the off-frequency condition seems to become more linear. while some basilar membrane data show more linear growth at high levels, others do not. aim of the present study is to assess function of masking at high levels regarding its clinical appearance. in this experiment we evaluated the hearing thresholds of three different signals (wide-b...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

2000
Chengfa Wang Qiusheng Wang

This paper presents a novel watermarking technique for digital audio signals. A visually recognizable binary image served as a watermark is embedded into an audio signal in discrete cosine transform domain. In order to enhance robustness and make good use of masking characteristics of the audio signal, the techniques of pseudo-random permutation and energy-based permutation are used during wate...

2013
DeLiang Wang

Additive noise has long been an issue for robust automatic speech recognition (ASR) systems. One approach to noise robustness is the removal of noise information through segregation by binary time-frequency masks; each time-frequency unit in a spectro-temporal representation of the speech signal is labeled either noise-dominant or signal-dominant. The noise-dominant units are masked and their e...

Journal: :IEEE Trans. Information Theory 1988
Nirmal R. Saxena John P. Robinson

Abstruct-In the testing of logic circuits, two of the proposed data compression methods are the number of ones (syndrome) and the number of sequence changes (transition count). An enumeration N ( m , k , t ) of the number of length-m binary sequences having syndrome value k and transition count t is developed. Examination of this result reveals that the parallel compression of these two methods...

2008
M. J. Ireland A. L. Kraus

CoKu Tau/4 has been labeled as one of the very few known transition disk objects—disks around young stars that have their inner disks cleared of dust, arguably as a result of planetary formation. We report aperture-masking interferometry and adaptive optics imaging observations showing that CoKu Tau/4 is in fact a near-equal binary star of projected separation ∼53 mas (∼8 AU). The spectral ener...

Journal: :CoRR 2014
Yongjune Kim B. V. K. Vijaya Kumar

In this paper, the duality of erasures and defects will be investigated by comparing the binary erasure channel (BEC) and the binary defect channel (BDC). The duality holds for channel capacities, capacity achieving schemes, minimum distances, and upper bounds on the probability of failure to retrieve the original message. Also, the binary defect and erasure channel (BDEC) will be introduced by...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید