MFCC-based perceptual hashing for compressed domain of speech content identification
|
|
- Emil Turner
- 6 years ago
- Views:
Transcription
1 Available online Journal o Chemical and Pharmaceutical Research, 014, 6(7): Research Article ISSN : CODEN(USA) : JCPRC5 MFCC-based perceptual hashing or compressed domain o speech content identiication Qiu-yu Zhang 1 *, Yang-wei iu 1, Yan-jun Di 1, Qian-yunZhang and Peng-ei Xing 1 1 School o Computer and Communication, anzhou University o Technology, anzhou, China School o Communication & Inormation Engineering, Shanghai University, Shanghai, China ABSTRACT Current research on speech content identiication aim primarily at raw wideband speech signals, which are generally transmitted in a compressed ormat. This makes it unable to meet the demand o speech content identiication in compressed domain. This paper proposes a new speech perceptual hashing algorithm or speech content identiication with compressed domain based on MFCC (Mel Frequency Cepstral Coeicient), to solve problems o real-time speech content identiication and large quantity o voice message inormation over the mobile Internet. This algorithm extracts MFCC eature based on the raw wideband method. The process begins by extracting the MDCT coeicients, which are the intermediately decoded results o compressed speeches in MP3 ormat. These coeicients are translated to MFCC parameters and the binary hashing values are then generated rom these parameters, combined with human auditory eatures. This algorithm uses highly compressed data to realize ast identiication or speech content. Experimental results show that the proposed algorithm can realize tampering localization and increase 5% in eiciency when compared with raw wideband algorithms, with the precondition o robustness and discrimination. Key words: Speech content identiication; perceptual hashing; compressed domain; MFCC eatures; robustness INTRODUCTION With the development o inormation technology, the authenticity and integrity o voice products have been questioned when tools or digital media editing are processed [1]. Numbers o speech content identiication algorithms in the compressed domain are much less than traditional ones based on non-compressed ormat. A perceptual hashing is an easily computable unction that maps digital multimedia data into a compact digital digest. These unctions are widely applied in inormation security, where they are used as new algorithms or identiication, retrieval and identiication over an opening and unreliable network [, 3]. Since the parametric speech coding is completely dierent rom the way o audio compression, the audio hashing algorithm is unsuitable or speech algorithm [4]. Current researches on speech perceptual hashing usually take the original speech data as input. This large computational complexity can t meet the demand o real time application in speech communication terminals with limited resources [5]. In Re. [6] the author proposed a method with MEP (mixed excitation linear prediction) coding, using some parts o speech bit streams to generate hashing values. With malicious content-tampering discriminating abilities and less computational complexity, this algorithm is suitable or real-time system o speech content identiication. In Re. [7] proposed a perceptual hash algorithm designed or AAC (Advanced Audio Coding) audio to keep MDCT-based algorithms highly robust to compressed audio and provided a solution or speech content identiication in a compressed domain. Major process o traditional algorithm or the compressed speech data is as ollows [8]. The process begins by decoding the compressed speech into raw wideband data (PCM). Features rom decoded rames are then extracted 379
2 and urther analysis to achieve content identiication is inally made. Yet it continues to have a law o computational eiciency and complexity, thereore it can t aord real-time processing. Digital audio in practical applications is usually encoded in compressed ormats such as MP3, with the purpose o less data size, higher quality and easier transmission. Thereore research on compressed domain has positive signiicance [9]. For this reason we propose the ollowing algorithm to extract the MFCC eatures using human auditory system and MPEG audio coding. The process begins by decoding the MP3 stream and translating MDCT coeicients rom intermediate parameters. The MDCT coeicients o each rame are then translated to a 15-dimension MFCC coeicient vector ater Mel iltering. Content integrity certiication is inally veriied by matching the extracted hashing values. MDCT COEFFICIENTS IN COMPRESSED DOMAIN As a major vector eature o speech in the requency domain [10], MFCC is robust because o its ull consideration to the human auditory. In this paper we translate MFCC eature in compressed domain and select it as characteristic parameters. Physiological studies have shown that the human ear is very sensitive to the requency o audio, especially in the range o 00~5000 Hz [9]. A eature vector can be calculated by the original content o audio, but not MP3 compressed version o that content because o its process such as iltering and MDCT transormation. We extract the eatures rom MDCT coeicients which are intermediate parameters when decoding an MP3 ile. As a way o time-requency transormation, the MDCT-based method has been widely used in encoding audios, such as MP3, AAC, etc. [11]. In accordance to MPEG standards, audio stream is encoded rame-by-rame. A MP3 rame consists o granules and each granule contains 576 samples per granules [10]. We can get MDCT coeicients either by decoding each rame, or by perorming a modiied Discrete Fourier transorms on the 3 sub-band PCM (Pulse Code Modulation) signals. Each o the sub-bands corresponds to 18 MDCT coeicients. It has been proved that MDCT coeicients can be acquired through linear superposition o original signal (with weighting windows) and the aliasing signal perormed with SDFT (Shited Discrete Fourier Transorms) [1]. Moreover, with the assumption that there is no time shiting and the requency shiting is 50%, we can consider the original DFT as the nature o MDCT coeicients through linear transormation. Thus make it possible or us to extract perceptual eatures rom MDCT coeicient, or the reason that it is an approximate version o requency domain eature when we process audio stream using a sub-band ilter [13]. CONTENT IDENTIFICATION FOR COMPRESSED DOMAIN SPEECH A. Process o algorithm The MFCC-based perceptual hashing or speech content identiication is shown in Fig. 1.In this igure we get MDCT coeicients by processing the compressed speech with Human encoding. Fig. 1: Process o algorithm B. MFCC eature extraction MDCT coeicients can be regarded as an approximate version o linear spectrum o DFT [1]. Only considering the energy o these coeicients, we can extract eatures in the compressed domain according to MFCC algorithm in the non-compressed domain [14]. DFT coeicients with equal intervals are calculated ater MP3 hybrid iltering. The dierence is that none o these parameters divides the requency spectrum into orm o n. 380
3 We propose this eature extraction method on the basic that MDCT coeicient contains enough inormation to describe requency spectrum.firstly, we redeine the MDCT coeicient o each rame to six critical bands, which are similar with the critical brand according to its bandwidth. Then an n-dimension MFCC eature parameters is calculated via triangle iltering the MDCT coeicients. In this paper, the redeine o critical band is not taken into account o when extracting eatures. A ilter is perormed beore processing. Center requency o Mel iltering and ilter banks are determined based on the bits o calculated eature vectors. MDCT coeicient o each rame will inally be converted to a 15-dimension eature vector ater Mel triangle ilter banks ollowed by the cosine transormation. It has lower resolution when compared to 576 parameters DFT in original audio without compression, but can aord identiication or actual speech signals. The details o the proposed method are expressed as ollows. Step1:Intra-rame energy. Because o the noise and estimation error o spectrum, the logarithmic energy o MDCT spectrum is calculated ater a Mel ilter to improve robustness. Considering time-varying in actual speech signals, the calculation process as ollows is based on each rame. The square o MDCT coeicients in each two granules o one rame is now calculated. The corresponding energy is denoted by MDCT 1 and MDCT as shown in (1). MDCT = MDCT 1 + MDCT (1) The mean value is calculated and the energy vector with 576 elements is given, which is accord with equal interval distribution in requency domain. Step:Mel triangle iltering. Human perceptual auditory increases linearly with requency in the range rom 0Hz to 1000Hz, but they show a logarithmic relationship when requency is above 1000Hz. We deine 16 ilters corresponding to the centre o Mel requency to reduce computational complexity. The upper - lower limit o iltering requency (denoted by and H ) is mapped to the Mel requency and the range is determined in (). B( B( ) = 115 ln(1 + H ) = ln1 + H 700) 700) () In this ormula we deine a method to map the actual requency to the Mel requency, where B H represents the upper bound o Mel domain and B represents the lower. B Mel = B H B (3) Using (3) we arrive at a Mel central requency by dividing Mel bandwidth (B Mel ) into the number o ilters equally and mapping central requency o ilters to corresponding requency linear sequences. FC( m) = N F B 1 ( B( B( ) + m ) B( m + 1 H ) ),1 m 16 s (4) In (4) we deine B -1 (b) = 700(e b/115-1) as an inverse unction o B and modiied by inclusion o a actor o N/F s in order to map center requency to requency linear sequence. Here F s is sampling rate and N =576 equal the number o MDCT coeicients in each granule. The triangle ilter is a unction that calculates the component o requency domain in range o Mel requency and multiplies the MDCT energy amplitude by corresponding actors. Transer unction o Mel ilter is shown in (5). 381
4 H m k FC ( m 1), FC ( m 1) k FC ( m) k < FC ( m 1) or k > FC ( m) FC ( m) FC ( m 1) ( k ) = FC ( m + 1) k, FC ( m) k FC ( m + 1) FC ( m + 1) FC ( m) (5) The actors 1 (FC(m) - FC(m - 1)) and 1 (FC(m + 1) - FC(m)) can be seen as the iltering actors around center triangle iltering. These corresponding actors are dierent due to nonlinear bandwidth. Sequence number o ilters is denoted by m. See also the MDCT coeicient in Fig. 1, where k is corresponding to the coeicient ranging rom 0 to 575. Step 3:Energy ater iltering. The triangle ilter in the last step has a unction o requency division; thereore it can be used to process the energy coeicient in Step1. Given Noise Reduction, dynamic boundary o requency spectrum and distribution o logarithmic energy spectrum, the output o the ilter banks is calculated as (6). 575 X ( m) = ln( MDCT k = 0 H m ( k)),0 m 15 (6) Where m and k represent sequence number o ilters and MDCT (possibly are 0 over high requency). Step 4:Translation to cepstrum by DCT. In order to assure the ollowing decorrelation to dierent channels o MDCT spectrum, we perorm a DCT transorm on the output X(m) o ilters. Mel( n) 15 = m= 0 X ( m) cos [ πn( m + 0.5) 16] ),0 n 15 (7) A 15-dimension MDCT vector is acquired using (7). However it makes distinguishing dierence o these dimensions in content identiication. In this paper we select the whole vector except or the irst dimension considering its much less inormation. C. Hashing values extraction The 15-dimension coeicient vector is extracted rom single rame o the speech signal as described in section B. Because o the real-time demand o speech signal and computation complexity o extracting hashing values rame-by-rame, the 10-dimension vector o every 10 rames is divided into a sub-band. Only binary sequences translated rom eigenvector o these sun-bands are retained. This method in (8) keeps robustness and unidirectivity as well as reduces the data quantity. Formula (8) ormally deines the bits o the hashing string. The MDCT coeicient is denoted by Mel c (t, m), the m-th bit o the hash H in t sub-bands is denoted by H(t, m) and the threshold T is equal to zero. 1, Melc ( t, m) T H ( t, m) = 0, Melc ( t, m) < T (8) Finally we get a hashing block consisting o the m bit hashing string extracted rom 10 subsequent rames (6ms per rame) with the above algorithm. The minimum precision o identiication is 0.6s in speech content and tampering localization is achieved. D. Hashing matching Two derived threshold values denoted by τ 1 and τ (τ 1 <τ ) will determine whether two 3 second speech clips are similar or tampered, by compared to bit error rates (BER) o hashing values which are extracted rom the above clips. It will be declared either similar when BER is below a certain threshold τ 1, or tampered when BER is above τ. BER between τ 1 and τ calls or a tampering localization detection. 38
5 Qiu-yu Zhang et al J. Chem. Pharm. Res., 014, 6(7): In this paper, we present a ull procedure o perormance tests and their results. The database o speech clips in our experiment is shown in Table I. The experiments environment platorm is Windows7 operating system o Dell notebook, CPU is Inter Core i3-450m,.4ghz and G memories, MATAB R010b. A. Robustness analysing All o the 1000 MP3 speech clips speech signals. Resample consisting o subsequent down and up sampling to.05 khz and khz. Echo addition with attenuation o 60%. Increase the volume by 50%. Reduce the volume by 50%. ow-pass iltering using a ith order Butterworth ilter with cut-o requencies o khz. Thereater the hash values are extracted rom the speech clips which are processed with the irst ive content-preserving operations. The BER between the hash values perceptual content). RESUTS Table I: Speech Clips Sampling Rate Bit Depth Channel Bit Rate 44100Hz 16 bits mono 18kbps are processed as ollows. Each o them can preservee the perceptual content o is then determined. The resulting bit error rates are shown in Fig. (with same Fig.: BER in 500 clips with same perceptual content Here we arrive at a BER mostly below 0.3 rom clips with same content, which ensure the robustness o the proposed method. Robustness is related to the extracted perceptual eatures as well as the threshold value. Table II lists the ratio o clips declared equal using dierent threshold values. (These clips are subjected to dierent content-preserving operations). Table II: Passing Rate Threshold Volume down Volume up Echo Resample ow-pass Filter % 77.6% 75.3% 1.4% % 98.7% 99.8% 93.4% 97.9% 30.% 58.4% 85.4% 90.8% 383
6 Experimental results lead to the conclusion that we arrive at an extremely high identiication precision. It also keeps high robustness to operations o resample and volume reducing with a threshold τ o 0.3. B. Discrimination analysing In this paper we measure the discrimination ability or dierent speech contents with probability distribution because o the randomly variable BER. Fig. 3 illustrates the comparison o the distribution o BERs and the normal distribution. It shows that BERs has a normal distribution approximately. Fig. 3: Normal probabilityplot o BER among dierent speech content The two contradictory parameters FRR and FAR can be used to measure the robustness and o ability discrimination respectively in proposed algorithm. In dierent applications it poses dierent emphases and FAR has slightly higher priority in our scheme to discriminate dierent and tampered clips. Fig. 4 and Fig. 5 show the FRR-FAR curve o 500 speech clips which are randomly selected rom speech database. The cross point in Fig. 4 is cause by the weak robustness to low-pass iltering in the proposed method. The experimental results o other content-preserve processing are shown in Fig. 5. Fig. 4: FRR-FAR Curve with ow-pass iltering 384
7 Fig. 5: FRR-FAR Curve without ow-pass iltering It suggests that the proposed method is highly robust and able to discriminate between malicious content replacements and content-preserving operations, with the identiication threshold value τ o C. Perormance analysing The proposed method aims primarily at applications in communication terminals with limited resources. The eiciency o the algorithm can be measured with bit rate as (9) bps (9) In this paper 15-dimension hash string is extracted rom 10 rames (lasts 60ms) and leads to a low bit rate 115bps. This experiment process works on the platorm o MATAB 010b, using 100 speech clips. Each clip is encoded at a 18kbps bit rate and lasts 4s. Experimental results show that the eiciency is increased by 5% compared with other raw wideband algorithm, which aords real-time applications. D. Tamper location A 7s clip randomly selected and cropped with two clips larger than 10 rames. Experimental results o malicious tampering are shown in Fig. 6. Fig.6: Tampering Detection and ocation Human speech rate is about 15 words o one minute and 480ms each word. The hash string in the proposed algorithm is extracted rom 10 rames with time intervals o 60ms, which could be used to content tampering detecting and locating or one or more partial clips in speech signals. 385
8 CONCUSION In this paper we propose an identiication algorithm or integrity identiication o speech content in compressed-domain. This method is based on perceptual hashing algorithm and integrated with MFCC eatures, which are translated rom intermediate parameters when decoding, named MDCT coeicient. Hash values are extracted rom MFCC eatures based on raw wideband methods. The experimental results show that the eiciency is increased by 5% compared with other raw wideband algorithms. The robustness and ability o discrimination is also maintained. As the precision o 60ms, the proposed method could be used in real-time identiication as well as tampering detection and location. Based on the low cost o storage and computation we believe that this method has great value in certain applications. Acknowledgments This work is supported by the National Natural Science Foundation o China (No ), the Natural Science Foundation o Gansu Province o China (No. 11RJZA006, No. 1310RJYA004). The authors would like to thank the anonymous reviewers or their helpul comments and suggestions. REFERENCES [1] Y. H. Jiao andx. M. Niu. IEEE Signal Processing etters, 009, 16(9), [] X. M. Niu and Y. H. Jiao. Acta Electronica Sinica, 008, 36(7), (in Chinese). [3] GUPTA S, CHO S, KUO C-C J. IEEE Multimedia, 01, 19(1), [4] Y. H. Jiao. Research on Perceptual Audio Hashing[Ph.D. dissertation]. Harbin:Harbin institute o technology,010(in Chinese). [5] J. Gu. Research on Key Technologies o Speech Perceptual Identiication [Ph.D. dissertation]. Heei: University o Science and Technology o China, 009(in Chinese). [6] A. Shahbazi, A. H. Rezaie and R. Shahaazi. MEPe Coded Speech Hiding on Enhanced Full Rate Compressed Domain. In: 010 Fourth Asia International Conerence on Mathematical/Analytical Modelling and Computer Simulation, Kota Kinabalu, Malaysia, 010, [7] Y. H. Jiao, M. Y. i, B. Yang, et al. Compressed Domain Rubost Hashing or AAC Audio.In: IEEE International Conerence on Multimedia and Expo, Hannover, 008, [8] Gary Grutzek, Julian Strobl, Bernhard Mainka, et al. Perceptual Hashing or the Identiication o Telephone speech. In: Proceedings o Speech Communication, 10. ITG Symposium, Germany, 01, 1-4. [9] Y. H. Jiao, Q. i and X. M. Niu. Compressed Domain Perceptual Hashing or MEP Coded Speech. In: Intelligent Inormation Hiding and Multimedia Signal Processing, Harbin, China, 008, [10]. Y. Chang and X. Q. Yu. Journal o Computer Applications, 009, 9(4), (in Chinese). [11] Y. J. Wang,. Guo and C. P. Wang. Journal o Chinese Computer Systems, 011, 3(7), (in Chinese). [1] Y. Wang, eonid P. Yaroslavsky, M. Vilermo. On the Relationship Between MDCT, SDFT and DFT. In: Proceedings o the 5th International Conerence on Signal Processing, Beijing, China, 000, [13] Y. iang, C. C. Bao. Acta Electronica Sinica, 01, 40(6), (in Chinese). 386
An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet
Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG
More informationECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation
ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall 2007 Mohamed Essam Khedr Channel Estimation Matlab Assignment # Thursday 4 October 2007 Develop an OFDM system with the
More informationSinusoidal signal. Arbitrary signal. Periodic rectangular pulse. Sampling function. Sampled sinusoidal signal. Sampled arbitrary signal
Techniques o Physics Worksheet 4 Digital Signal Processing 1 Introduction to Digital Signal Processing The ield o digital signal processing (DSP) is concerned with the processing o signals that have been
More informationSPEECH PARAMETERIZATION FOR AUTOMATIC SPEECH RECOGNITION IN NOISY CONDITIONS
SPEECH PARAMETERIZATION FOR AUTOMATIC SPEECH RECOGNITION IN NOISY CONDITIONS Bojana Gajić Department o Telecommunications, Norwegian University o Science and Technology 7491 Trondheim, Norway gajic@tele.ntnu.no
More informationSpeech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio
International Journal of Network Security, Vol.19, No.5, PP.752-760, Sept. 2017 (DOI: 10.6633/IJNS.201709.19(5).13) 752 Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction
More informationArtefact Characterisation for JPEG and JPEG 2000 Image Codecs: Edge Blur and Ringing
I'.NCINEER- Vol. XXXX, No. 3, pp. 25-3, 27
More informationNonlinear FM Waveform Design to Reduction of sidelobe level in Autocorrelation Function
017 5 th Iranian Conerence on Electrical (ICEE) Nonlinear FM Waveorm Design to Reduction o sidelobe level in Autocorrelation Function Roohollah Ghavamirad Department o Electrical K. N. Toosi University
More informationIntroduction to OFDM. Characteristics of OFDM (Orthogonal Frequency Division Multiplexing)
Introduction to OFDM Characteristics o OFDM (Orthogonal Frequency Division Multiplexing Parallel data transmission with very long symbol duration - Robust under multi-path channels Transormation o a requency-selective
More informationADAPTIVE LINE DIFFERENTIAL PROTECTION ENHANCED BY PHASE ANGLE INFORMATION
ADAPTIVE INE DIEENTIA POTECTION ENHANCED BY PHASE ANGE INOMATION Youyi I Jianping WANG Kai IU Ivo BNCIC hanpeng SHI ABB Sweden ABB Sweden ABB China ABB Sweden ABB - Sweden youyi.li@se.abb.com jianping.wang@se.abb.com
More information3.6 Intersymbol interference. 1 Your site here
3.6 Intersymbol intererence 1 3.6 Intersymbol intererence what is intersymbol intererence and what cause ISI 1. The absolute bandwidth o rectangular multilevel pulses is ininite. The channels bandwidth
More informationA new zoom algorithm and its use in frequency estimation
Waves Wavelets Fractals Adv. Anal. 5; :7 Research Article Open Access Manuel D. Ortigueira, António S. Serralheiro, and J. A. Tenreiro Machado A new zoom algorithm and its use in requency estimation DOI.55/wwaa-5-
More informationMel Spectrum Analysis of Speech Recognition using Single Microphone
International Journal of Engineering Research in Electronics and Communication Mel Spectrum Analysis of Speech Recognition using Single Microphone [1] Lakshmi S.A, [2] Cholavendan M [1] PG Scholar, Sree
More informationParametric Design Model of Disc-scoop-type Metering Device Based on Knowledge Engineering. Yu Yang 1, a
Advanced Materials Research Online: 2013-10-31 ISSN: 1662-8985, Vols. 834-836, pp 1432-1435 doi:10.4028/www.scientiic.net/amr.834-836.1432 2014 Trans Tech Publications, Switzerland Parametric Design Model
More informationAN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION
AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION J-P. Kauppi, K.S. Martikainen Patria Aviation Oy, Naulakatu 3, 33100 Tampere, Finland, ax +358204692696 jukka-pekka.kauppi@patria.i,
More informationEEE 311: Digital Signal Processing I
EEE 311: Digital Signal Processing I Course Teacher: Dr Newaz Md Syur Rahim Associated Proessor, Dept o EEE, BUET, Dhaka 1000 Syllabus: As mentioned in your course calendar Reerence Books: 1 Digital Signal
More informationA Novel Off-chip Capacitor-less CMOS LDO with Fast Transient Response
IOSR Journal o Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 11 (November. 2013), V3 PP 01-05 A Novel O-chip Capacitor-less CMOS LDO with Fast Transient Response Bo Yang 1, Shulin
More informationPLL AND NUMBER OF SAMPLE SYNCHRONISATION TECHNIQUES FOR ELECTRICAL POWER QUALITY MEASURMENTS
XX IMEKO World Congress Metrology or Green Growth September 9 14, 2012, Busan, Republic o Korea PLL AND NUMBER OF SAMPLE SYNCHRONISATION TECHNIQUES FOR ELECTRICAL POWER QUALITY MEASURMENTS Richárd Bátori
More informationDetermination of Pitch Range Based on Onset and Offset Analysis in Modulation Frequency Domain
Determination o Pitch Range Based on Onset and Oset Analysis in Modulation Frequency Domain A. Mahmoodzadeh Speech Proc. Research Lab ECE Dept. Yazd University Yazd, Iran H. R. Abutalebi Speech Proc. Research
More informationCyclostationarity-Based Spectrum Sensing for Wideband Cognitive Radio
9 International Conerence on Communications and Mobile Computing Cyclostationarity-Based Spectrum Sensing or Wideband Cognitive Radio Qi Yuan, Peng Tao, Wang Wenbo, Qian Rongrong Wireless Signal Processing
More informationECE 5655/4655 Laboratory Problems
Assignment #4 ECE 5655/4655 Laboratory Problems Make Note o the Following: Due Monday April 15, 2019 I possible write your lab report in Jupyter notebook I you choose to use the spectrum/network analyzer
More informationComplex Spectrum. Box Spectrum. Im f. Im f. Sine Spectrum. Cosine Spectrum 1/2 1/2 1/2. f C -f C 1/2
ECPE 364: view o Small-Carrier Amplitude Modulation his handout is a graphical review o small-carrier amplitude modulation techniques that we studied in class. A Note on Complex Signal Spectra All o the
More informationA MATLAB Model of Hybrid Active Filter Based on SVPWM Technique
International Journal o Electrical Engineering. ISSN 0974-2158 olume 5, Number 5 (2012), pp. 557-569 International Research Publication House http://www.irphouse.com A MATLAB Model o Hybrid Active Filter
More informationSEG/San Antonio 2007 Annual Meeting. Summary. Morlet wavelet transform
Xiaogui Miao*, CGGVeritas, Calgary, Canada, Xiao-gui_miao@cggveritas.com Dragana Todorovic-Marinic and Tyler Klatt, Encana, Calgary Canada Summary Most geologic changes have a seismic response but sometimes
More informationThe Research of Electric Energy Measurement Algorithm Based on S-Transform
International Conerence on Energy, Power and Electrical Engineering (EPEE 16 The Research o Electric Energy Measurement Algorithm Based on S-Transorm Xiyang Ou1,*, Bei He, Xiang Du1, Jin Zhang1, Ling Feng1,
More informationFatigue Life Assessment Using Signal Processing Techniques
Fatigue Lie Assessment Using Signal Processing Techniques S. ABDULLAH 1, M. Z. NUAWI, C. K. E. NIZWAN, A. ZAHARIM, Z. M. NOPIAH Engineering Faculty, Universiti Kebangsaan Malaysia 43600 UKM Bangi, Selangor,
More informationIntroduction of Audio and Music
1 Introduction of Audio and Music Wei-Ta Chu 2009/12/3 Outline 2 Introduction of Audio Signals Introduction of Music 3 Introduction of Audio Signals Wei-Ta Chu 2009/12/3 Li and Drew, Fundamentals of Multimedia,
More informationDetection and direction-finding of spread spectrum signals using correlation and narrowband interference rejection
Detection and direction-inding o spread spectrum signals using correlation and narrowband intererence rejection Ulrika Ahnström,2,JohanFalk,3, Peter Händel,3, Maria Wikström Department o Electronic Warare
More informationOptimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm
IOSR Journal o Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 01 (January. 2015), V1 PP 44-57 www.iosrjen.org Optimizing Reception Perormance o new UWB Pulse shape over Multipath
More informationNew metallic mesh designing with high electromagnetic shielding
MATEC Web o Conerences 189, 01003 (018) MEAMT 018 https://doi.org/10.1051/mateccon/01818901003 New metallic mesh designing with high electromagnetic shielding Longjia Qiu 1,,*, Li Li 1,, Zhieng Pan 1,,
More informationAmplifiers. Department of Computer Science and Engineering
Department o Computer Science and Engineering 2--8 Power ampliiers and the use o pulse modulation Switching ampliiers, somewhat incorrectly named digital ampliiers, have been growing in popularity when
More informationClassification of ships using autocorrelation technique for feature extraction of the underwater acoustic noise
Classification of ships using autocorrelation technique for feature extraction of the underwater acoustic noise Noha KORANY 1 Alexandria University, Egypt ABSTRACT The paper applies spectral analysis to
More informationEXPLOITING RMS TIME-FREQUENCY STRUCTURE FOR DATA COMPRESSION IN EMITTER LOCATION SYSTEMS
NAECON : National Aerospace & Electronics Conerence, October -,, Dayton, Ohio 7 EXPLOITING RMS TIME-FREQUENCY STRUCTURE FOR DATA COMPRESSION IN EMITTER LOCATION SYSTEMS MARK L. FOWLER Department o Electrical
More informationPoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2
Based on Cepstral Mixed Features 12 School of Information and Communication Engineering,Dalian University of Technology,Dalian, 116024, Liaoning, P.R. China E-mail:zww110221@163.com Xiangwei Kong, Xingang
More informationAPPLICATIONS OF DSP OBJECTIVES
APPLICATIONS OF DSP OBJECTIVES This lecture will discuss the following: Introduce analog and digital waveform coding Introduce Pulse Coded Modulation Consider speech-coding principles Introduce the channel
More informationCOMPENSATION OF CURRENT TRANSFORMERS BY MEANS OF FIELD PROGRAMMABLE GATE ARRAY
METROLOGY AD MEASUREMET SYSTEMS Index 330930, ISS 0860-89 www.metrology.pg.gda.pl COMPESATIO OF CURRET TRASFORMERS BY MEAS OF FIELD PROGRAMMABLE GATE ARRAY Daniele Gallo, Carmine Landi, Mario Luiso Seconda
More informationRhythmic Similarity -- a quick paper review. Presented by: Shi Yong March 15, 2007 Music Technology, McGill University
Rhythmic Similarity -- a quick paper review Presented by: Shi Yong March 15, 2007 Music Technology, McGill University Contents Introduction Three examples J. Foote 2001, 2002 J. Paulus 2002 S. Dixon 2004
More informationAudio Fingerprinting using Fractional Fourier Transform
Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,
More informationA Universal Motor Performance Test System Based on Virtual Instrument
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Universal Motor Perormance Test System Based on Virtual Instrument Wei Li, Mengzhu Li, Qiang Xiao School o Instrument
More informationEffect of Layer Spacing and Line Width of PCB Coil on Resonant Frequency Shen WANG, Zhi-qiang WEI, Yan-ping CONG * and Hao-kun CHI
2016 International Conerence on Sustainable Energy, Environment and Inormation Engineering (SEEIE 2016) ISBN: 978-1-60595-337-3 Eect o Layer Spacing and Line Width o PCB Coil on Resonant Frequency Shen
More informationECEN 5014, Spring 2013 Special Topics: Active Microwave Circuits and MMICs Zoya Popovic, University of Colorado, Boulder
ECEN 5014, Spring 2013 Special Topics: Active Microwave Circuits and MMICs Zoya Popovic, University o Colorado, Boulder LECTURE 13 PHASE NOISE L13.1. INTRODUCTION The requency stability o an oscillator
More information1. Motivation. 2. Periodic non-gaussian noise
. Motivation One o the many challenges that we ace in wireline telemetry is how to operate highspeed data transmissions over non-ideal, poorly controlled media. The key to any telemetry system design depends
More informationHigh capacity robust audio watermarking scheme based on DWT transform
High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com
More informationMax Covering Phasor Measurement Units Placement for Partial Power System Observability
Engineering Management Research; Vol. 2, No. 1; 2013 ISSN 1927-7318 E-ISSN 1927-7326 Published by Canadian Center o Science and Education Max Covering Phasor Measurement Units Placement or Partial Power
More informationTraditional Analog Modulation Techniques
Chapter 5 Traditional Analog Modulation Techniques Mikael Olosson 2002 2007 Modulation techniques are mainly used to transmit inormation in a given requency band. The reason or that may be that the channel
More informationDWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationGammatone Cepstral Coefficient for Speaker Identification
Gammatone Cepstral Coefficient for Speaker Identification Rahana Fathima 1, Raseena P E 2 M. Tech Student, Ilahia college of Engineering and Technology, Muvattupuzha, Kerala, India 1 Asst. Professor, Ilahia
More informationMusic Technology Group, Universitat Pompeu Fabra, Barcelona, Spain {jordi.bonada,
GENERATION OF GROWL-TYPE VOICE QUALITIES BY SPECTRAL MORPHING Jordi Bonada Merlijn Blaauw Music Technology Group, Universitat Pompeu Fabra, Barcelona, Spain Email: {jordi.bonada, merlijn.blaauw}@up.edu
More informationTime distributed update of the NLMS algorithm coefficients for Acoustic Echo Cancellers
Time distributed update o the NLMS algorithm coeicients or Acoustic Echo Cancellers Fotis E. Andritsopoulos, Yannis M. Mitsos, Christos N. Charopoulos, Gregory A. Doumenis, Constantin N. Papaodysseus Abstract
More informationSoftware Defined Radio Forum Contribution
Committee: Technical Sotware Deined Radio Forum Contribution Title: VITA-49 Drat Speciication Appendices Source Lee Pucker SDR Forum 604-828-9846 Lee.Pucker@sdrorum.org Date: 7 March 2007 Distribution:
More informationOutline. Wireless PHY: Modulation and Demodulation. Admin. Page 1. g(t)e j2πk t dt. G[k] = 1 T. G[k] = = k L. ) = g L (t)e j2π f k t dt.
Outline Wireless PHY: Modulation and Demodulation Y. Richard Yang Admin and recap Basic concepts o modulation Amplitude demodulation requency shiting 09/6/202 2 Admin First assignment to be posted by this
More informationPerformance study of Text-independent Speaker identification system using MFCC & IMFCC for Telephone and Microphone Speeches
Performance study of Text-independent Speaker identification system using & I for Telephone and Microphone Speeches Ruchi Chaudhary, National Technical Research Organization Abstract: A state-of-the-art
More informationOutline. Wireless PHY: Modulation and Demodulation. Admin. Page 1. G[k] = 1 T. g(t)e j2πk t dt. G[k] = = k L. ) = g L (t)e j2π f k t dt.
Outline Wireless PHY: Modulation and Demodulation Y. Richard Yang Admin and recap Basic concepts o modulation Amplitude modulation Amplitude demodulation requency shiting 9/6/22 2 Admin First assignment
More informationA Physical Sine-to-Square Converter Noise Model
A Physical Sine-to-Square Converter Noise Model Attila Kinali Max Planck Institute or Inormatics, Saarland Inormatics Campus, Germany adogan@mpi-in.mpg.de Abstract While sinusoid signal sources are used
More informationChapter 6: Introduction to Digital Communication
93 Chapter 6: Introduction to Digital Communication 6.1 Introduction In the context o this course, digital communications include systems where relatively high-requency analog carriers are modulated y
More informationECE 556 BASICS OF DIGITAL SPEECH PROCESSING. Assıst.Prof.Dr. Selma ÖZAYDIN Spring Term-2017 Lecture 2
ECE 556 BASICS OF DIGITAL SPEECH PROCESSING Assıst.Prof.Dr. Selma ÖZAYDIN Spring Term-2017 Lecture 2 Analog Sound to Digital Sound Characteristics of Sound Amplitude Wavelength (w) Frequency ( ) Timbre
More informationNoise Removal from ECG Signal and Performance Analysis Using Different Filter
International Journal o Innovative Research in Electronics and Communication (IJIREC) Volume. 1, Issue 2, May 214, PP.32-39 ISSN 2349-442 (Print) & ISSN 2349-45 (Online) www.arcjournal.org Noise Removal
More informationSPEECH ENHANCEMENT BASED ON ITERATIVE WIENER FILTER USING COMPLEX SPEECH ANALYSIS
SPEECH ENHANCEMENT BASED ON TERATVE WENER FLTER USNG COMPLEX SPEECH ANALYSS Keiichi Funaki Computing & Networking Center, Univ. o the Ryukyus Senbaru, Nishihara, Okinawa, 93-3, Japan phone: +(8)98-895-8946,
More informationFurther developments on gear transmission monitoring
Further developments on gear transmission monitoring Niola V., Quaremba G., Avagliano V. Department o Mechanical Engineering or Energetics University o Naples Federico II Via Claudio 21, 80125, Napoli,
More informationHigh Resolution Optical Spectrum Testing System Based on LabVIEW
High Resolution Optical Spectrum Testing System Based on LabVIEW Yichi Zhang 1,2, Changjian Ke 1,2,*, Deng an 1,2, Deming Liu 1,2 1,2 National Engineering Laboratory or Next Generation Internet Access
More informationDesign of Multidimensional Space Motion Simulation System For Spacecraft Attitude and Orbit Guidance and Control Based on Radar RF Environment
2016 Sixth International Conerence on Instrumentation & Measurement, Computer, Communication and Control Design o Multidimensional Space Motion Simulation System For Spacecrat Attitude and Orbit Guidance
More informationAnalysis of Power Consumption of H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate
Analysis o Power Consumption o H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate Bambang A.B. Sari, Panos Nasiopoulos and Victor C.M. eung Department o Electrical
More informationSimulation Results for Permutation Trellis Codes using M-ary FSK
Simulation Results or Permutation Trellis Codes using M-ary FSK T.G. Swart, I. de Beer, H.C. Ferreira Department o Electrical and Electronic Engineering University o Johannesburg Auckland Park, South Arica
More informationSpeech Signal Analysis
Speech Signal Analysis Hiroshi Shimodaira and Steve Renals Automatic Speech Recognition ASR Lectures 2&3 14,18 January 216 ASR Lectures 2&3 Speech Signal Analysis 1 Overview Speech Signal Analysis for
More informationAudio Signal Compression using DCT and LPC Techniques
Audio Signal Compression using DCT and LPC Techniques P. Sandhya Rani#1, D.Nanaji#2, V.Ramesh#3,K.V.S. Kiran#4 #Student, Department of ECE, Lendi Institute Of Engineering And Technology, Vizianagaram,
More informationImage Characteristic Based Rate Control Algorithm for HEVC
Image Characteristic Based Rate Control Algorithm or HEVC Mayan Fei, Zongju Peng*, Weiguo Chen, Fen Chen Faculty o Inormation Science and Engineering, Ningbo University, Ningbo 352 China *pengzongju@26.com;
More informationIsolated Digit Recognition Using MFCC AND DTW
MarutiLimkar a, RamaRao b & VidyaSagvekar c a Terna collegeof Engineering, Department of Electronics Engineering, Mumbai University, India b Vidyalankar Institute of Technology, Department ofelectronics
More informationSolid State Relays & Its
Solid State Relays & Its Applications Presented By Dr. Mostaa Abdel-Geliel Course Objectives Know new techniques in relay industries. Understand the types o static relays and its components. Understand
More informationPiecewise Mapping in HEVC Lossless Intraprediction
Piecewise Mapping in HEVC Lossless Intraprediction Coding Victor Sanchez Member IEEE Francesc Aulí-Llinàs Senior Member IEEE and Joan Serra-Sagristà Senior Member IEEE Abstract The lossless intra-prediction
More informationThe fourier spectrum analysis of optical feedback self-mixing signal under weak and moderate feedback
University o Wollongong Research Online Faculty o Inormatics - Papers (Archive) Faculty o Engineering and Inormation Sciences 8 The ourier spectrum analysis o optical eedback sel-mixing signal under weak
More informationLousy Processing Increases Energy Efficiency in Massive MIMO Systems
1 Lousy Processing Increases Energy Eiciency in Massive MIMO Systems Sara Gunnarsson, Micaela Bortas, Yanxiang Huang, Cheng-Ming Chen, Liesbet Van der Perre and Ove Edors Department o EIT, Lund University,
More informationPerformance Analysis of MFCC and LPCC Techniques in Automatic Speech Recognition
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7727-7732 Performance Analysis of MFCC and LPCC Techniques in Automatic
More informationDKAN0008A PIC18 Software UART Timing Requirements
DKAN0008A PIC18 Sotware UART Timing Requirements 11 June 2009 Introduction Design conditions oten limit the hardware peripherals available or an embedded system. Perhaps the available hardware UARTs are
More informationTIME-FREQUENCY ANALYSIS OF NON-STATIONARY THREE PHASE SIGNALS. Z. Leonowicz T. Lobos
Copyright IFAC 15th Triennial World Congress, Barcelona, Spain TIME-FREQUENCY ANALYSIS OF NON-STATIONARY THREE PHASE SIGNALS Z. Leonowicz T. Lobos Wroclaw University o Technology Pl. Grunwaldzki 13, 537
More informationMultiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios
Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios Khalid Hossain, Ayman Assra, and Benoît Champagne, Senior Member, IEEE Department o Electrical and Computer Engineering,
More informationPublic Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process
Public Watermarking urviving General caling and ropping: An Application or Print-and-can Process hing-yung Lin Department o Electrical Engineering olumbia University 500 W0th t. #3 New York, NY 007, UA
More informationConsumers are looking to wireless
Phase Noise Eects on OFDM Wireless LAN Perormance This article quantiies the eects o phase noise on bit-error rate and oers guidelines or noise reduction By John R. Pelliccio, Heinz Bachmann and Bruce
More informationProceedings of Meetings on Acoustics
Proceedings of Meetings on Acoustics Volume 19, 213 http://acousticalsociety.org/ ICA 213 Montreal Montreal, Canada 2-7 June 213 Signal Processing in Acoustics Session 2pSP: Acoustic Signal Processing
More informationLock-In Amplifiers SR510 and SR530 Analog lock-in amplifiers
Lock-In Ampliiers SR510 and SR530 Analog lock-in ampliiers SR510/SR530 Lock-In Ampliiers 0.5 Hz to 100 khz requency range Current and voltage inputs Up to 80 db dynamic reserve Tracking band-pass and line
More informationValidation of a crystal detector model for the calibration of the Large Signal Network Analyzer.
Instrumentation and Measurement Technology Conerence IMTC 2007 Warsaw, Poland, May 1-3, 2007 Validation o a crystal detector model or the calibration o the Large Signal Network Analyzer. Liesbeth Gommé,
More informationCommunications Theory and Engineering
Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 Speech and telephone speech Based on a voice production model Parametric representation
More informationSAW STABILIZED MICROWAVE GENERATOR ELABORATION
SAW STABILIZED MICROWAVE GENERATOR ELABORATION Dobromir Arabadzhiev, Ivan Avramov*, Anna Andonova, Philip Philipov * Institute o Solid State Physics - BAS, 672, Tzarigradsko Choussee, blvd, 1784,Soia,
More informationSampling and Multirate Techniques for Complex and Bandpass Signals
Sampling and Multirate Techniques or Complex and Bandpass Signals TLT-586/IQ/1 M. Renors, TUT/DCE 21.9.21 Sampling and Multirate Techniques or Complex and Bandpass Signals Markku Renors Department o Communications
More informationDesign Project: Audio tone control
Design Project: Audio tone control This worksheet and all related iles are licensed under the Creative Commons Attribution License, version 1.0. To view a copy o this license, visit http://creativecommons.org/licenses/by/1.0/,
More informationWith the proposed technique, those two problems will be overcome. reduction is to eliminate the specific harmonics, which are the lowest orders.
CHAPTER 3 OPTIMIZED HARMONIC TEPPED-WAVEFORM TECHNIQUE (OHW The obective o the proposed optimized harmonic stepped-waveorm technique is to reduce, as much as possible, the harmonic distortion in the load
More informationAN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND TRANSFER FUNCTIONS
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND TRANSFER FUNCTIONS Kuldeep Kumar 1, R. K. Aggarwal 1 and Ankita Jain 2 1 Department of Computer Engineering, National Institute
More informationA technique for noise measurement optimization with spectrum analyzers
Preprint typeset in JINST style - HYPER VERSION A technique or noise measurement optimization with spectrum analyzers P. Carniti a,b, L. Cassina a,b, C. Gotti a,b, M. Maino a,b and G. Pessina a,b a INFN
More informationEC 6501 DIGITAL COMMUNICATION UNIT - II PART A
EC 6501 DIGITAL COMMUNICATION 1.What is the need of prediction filtering? UNIT - II PART A [N/D-16] Prediction filtering is used mostly in audio signal processing and speech processing for representing
More informationA Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor
A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering
More informationDARK CURRENT ELIMINATION IN CHARGED COUPLE DEVICES
DARK CURRENT ELIMINATION IN CHARGED COUPLE DEVICES L. Kňazovická, J. Švihlík Department o Computing and Control Engineering, ICT Prague Abstract Charged Couple Devices can be ound all around us. They are
More informationEE482: Digital Signal Processing Applications
Professor Brendan Morris, SEB 3216, brendan.morris@unlv.edu EE482: Digital Signal Processing Applications Spring 2014 TTh 14:30-15:45 CBC C222 Lecture 12 Speech Signal Processing 14/03/25 http://www.ee.unlv.edu/~b1morris/ee482/
More informationResearch Article A Robust Zero-Watermarking Algorithm for Audio
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 453580, 7 pages doi:10.1155/2008/453580 Research Article A Robust Zero-Watermarking Algorithm for
More informationEnhanced Waveform Interpolative Coding at 4 kbps
Enhanced Waveform Interpolative Coding at 4 kbps Oded Gottesman, and Allen Gersho Signal Compression Lab. University of California, Santa Barbara E-mail: [oded, gersho]@scl.ece.ucsb.edu Signal Compression
More information( ) D. An information signal x( t) = 5cos( 1000πt) LSSB modulates a carrier with amplitude A c
An inormation signal x( t) 5cos( 1000πt) LSSB modulates a carrier with amplitude A c 1. This signal is transmitted through a channel with 30 db loss. It is demodulated using a synchronous demodulator.
More informationDSP APPLICATION TO THE PORTABLE VIBRATION EXCITER
DSP PPLICTION TO THE PORTBLE VIBRTION EXCITER W. Barwicz 1, P. Panas 1 and. Podgórski 2 1 Svantek Ltd., 01-410 Warsaw, Poland Institute o Radioelectronics, Faculty o Electronics and Inormation Technology
More informationF 0 ESTIMATION BASED ON ROBUST ELS COMPLEX SPEECH ANALYSIS
F ESTMATON BASED ON ROBUST ELS COMPLEX EECH ALYSS Keiichi Funaki Computing & Networking Center, Univ o the Ryukyus Senbaru, Nishihara, Okinawa, 93-23, Japan phone: +(8)98-895-8946, ax: +(8)98-895-8963,
More informationAn Improvement for Hiding Data in Audio Using Echo Modulation
An Improvement for Hiding Data in Audio Using Echo Modulation Huynh Ba Dieu International School, Duy Tan University 182 Nguyen Van Linh, Da Nang, VietNam huynhbadieu@dtu.edu.vn ABSTRACT This paper presents
More informationSpeech Compression Using Voice Excited Linear Predictive Coding
Speech Compression Using Voice Excited Linear Predictive Coding Ms.Tosha Sen, Ms.Kruti Jay Pancholi PG Student, Asst. Professor, L J I E T, Ahmedabad Abstract : The aim of the thesis is design good quality
More informationSpatial Audio Transmission Technology for Multi-point Mobile Voice Chat
Audio Transmission Technology for Multi-point Mobile Voice Chat Voice Chat Multi-channel Coding Binaural Signal Processing Audio Transmission Technology for Multi-point Mobile Voice Chat We have developed
More informationDynamic Channel Bonding in Multicarrier Wireless Networks
Dynamic Channel Bonding in Multicarrier Wireless Networks Pei Huang, Xi Yang, and Li Xiao Department o Computer Science and Engineering Michigan State University Email: {huangpe3, yangxi, lxiao}@cse.msu.edu
More informationNonuniform multi level crossing for signal reconstruction
6 Nonuniform multi level crossing for signal reconstruction 6.1 Introduction In recent years, there has been considerable interest in level crossing algorithms for sampling continuous time signals. Driven
More information