首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 281 毫秒
1.
本文介绍了一种新的电话语音监控系统,该系统利用电话语音卡将通话双方的通话信号采集进计算机,再利用自动语音识别技术对双方的通话内容进行识别,以实现对通话的监控。本文首先分析了该系统的工作流程,并介绍了各主要功能模块的工作原理及其具体实现,最后对系统中各个工作线程之间同步的实现进行了分析。  相似文献   

2.
1.引言语音信号在进入语音识别系统之前,通常受到一些诸如语音产生过程、记录过程以及传输过程中产生的通道畸变的影响。例如:麦克风依赖于其类型和位置的不同能明显地影响语音信号的频谱,电话线网络的频率特性也对语音信号产生了频谱畸变的影响。这些由于传输通道而引入的频谱畸变将直接影响到语音信号的短时频谱分析结果,目前所有的语音识别系统中的参数计算,以及相似度测度都直接或间接地依赖于语音信号的短时频谱分析结果,  相似文献   

3.
主要介绍一种以89C51单片微机为核心 ,由话路控制,自动拨号,电子语音录放等功能,模式所组成的电话语音报警系统,它可通过电话网络自动民向有关部门的号码拨通及语音报警。  相似文献   

4.
中文普通话电话语音数据库的研制   总被引:1,自引:0,他引:1  
肖毅  李治柱 《计算机工程》2002,28(8):204-205,231
叙述了“中文普通话电话语音数据库”的开发背景和设计,着重介绍了语音数据库的内容、结构和特点。  相似文献   

5.
庞敏 《微型电脑应用》1999,15(10):56-57
本文介绍了计算机电话语音系统的原理和构成,并根据在实际开发过程中的一些认识,介绍了开发中在开发环境、系统架构和程序编制中要注意的问题  相似文献   

6.
谈谈电话语音系统   总被引:2,自引:0,他引:2  
又称电脑电话系统,是指用人们最熟悉的媒介——声音,通过电话机来自动储存和传递信息的应用系统。它是计算机与电话装置相结合的产物,由计算机、电话语音卡、电缆、软件等组成,如图1所示。 语音卡直接插在计算机里的8位或16位扩展槽内,并通过标准的RJ-11连接器联入电话网,再装上相应的软件,就组成了电脑语音系统。这时的计算机就是一部无人值守的电话。用户拨通这部电话的号码时,电脑语音系统就自动地向用户提供声讯服务。用户可以根据语音提示,通过电话按键来选择所需的服务。计算机则根据用户的选择,相应处理并  相似文献   

7.
刘洋  贺前华  黄海 《计算机工程》2002,28(10):67-68
为了提高电话语音识别系统在环境和信道等噪声下的鲁棒性,文章针对电话语音MFCC特征的低阶系数最易受到污染的特点,通过舍充最易受污染的低阶MFCC系数,并结合RASTA滤波来去除卷积信道噪声,使系统的识别性能和抗噪性能有了明显的改善。  相似文献   

8.
温立新  李坚等 《电脑》1995,(1):18-20
随着电话的普及,以及微电脑技术的广泛应用,利用公共电话网络进行服务的行业也得到很大发展.电话语音,这两三年间迅速进入了各行各业,甚至家庭的领域中.例如,现在热门的投资行业——电话秘书传呼系统;为单位转接四面八方来电的自动总机系统;还有,股票交易、行情查询或查帐服务可以通过任意一部市内电话甚至长途电话进行,不需专门设备和知识,大大方便了金融服务的运作,也节省了客户的宝贵时间.凡此种种,都归功于电脑电话语音处理系统.电话网、电脑(网)、电话语音卡及应用软件就组成了电脑电话语音处理系统.  相似文献   

9.
支持PC终端的数字化语音交换系统的设计   总被引:2,自引:0,他引:2  
VoIP技术是指通过TCP/IP网络传输分组语音和传真,本文设计一个基于VoIP的实时语音交换系统.该系统在企业内部网络中利用现有计算机和网络等硬件条件,实现了一套电话分机系统的功能,基于本系统能够方便地实现电话会议、呼叫转移和录音电话等功能.  相似文献   

10.
本文阐述了MIS中电话语音系统的工作原理、功能构成,语音合成的主要方法以及有关程序设计的要点。  相似文献   

11.
An image analysis method and its validation are presented for tracking the displacements of parallel mechanical force sensors. Force is measured using a combination of beam theory, optical microscopy, and image analysis. The primary instrument is a calibrated polymeric microbeam array mounted on a micromanipulator with the intended purpose of measuring traction forces on cell cultures or cell arrays. One application is the testing of hypotheses involving cellular mechanotransduction mechanisms. An Otsu-based image analysis code calculates displacement and force on cellular or other soft structures by using edge detection and image subtraction on digitally captured optical microscopy images. Forces as small as 250+/-50 nN and as great as 25+/-2.5 microN may be applied and measured upon as few as one or as many as hundreds of structures in parallel. A validation of the method is provided by comparing results from a rigid glass surface and a compliant polymeric surface.  相似文献   

12.
Finding shortest paths on surfaces using level sets propagation   总被引:6,自引:0,他引:6  
We present a new algorithm for determining minimal length paths between two regions on a three dimensional surface. The numerical implementation is based on finding equal geodesic distance contours from a given area. These contours are calculated as zero sets of a bivariate function designed to evolve so as to track the equal distance curves on the given surface. The algorithm produces all paths of minimal length between the source and destination areas on the surface given as height values on a rectangular grid  相似文献   

13.
《Real》1995,1(5):339-353
This paper discusses an innovative real-time oriented image compression system, based on a simple algorithm designed explicitly to be implemented on a low-cost SIMD computer architecture featuring a much lower power consumption than traditional DSPs or dedicated hardware. For this reason the considered approach is suitable to be integrated on portable systems, where power consumption is a critical design issue.The algorithm, based on a hierarchical decomposition of the input image, has been tested on a special purpose SIMD system, PAPRICA, exploiting its features such as its massive parallelism and its capability to operate on local data as well as to handle hierarchical data structures.According to the proposed approach, the quality of the decompressed image can be traded for a lower power consumption as well as a higher processing speed. A comparison between the discussed algorithm and the standard JPEG compression technique is also presented.  相似文献   

14.
This article uses recent work on the computer-aided analysis of texts by the French writer Céline as a framework to discuss Olsen's paper on the current state of computer-aided literary analysis. Drawing on analysis of syntactic structures, lexical creativity and use of proper names, it makes two points: (1) given a rich theoretical framework and sufficiently precise models, even simple computer tools such as text editors and concordances can make a valuable contribution to literary scholarship; (2) it is important to view the computer not as a device for finding what we as readers have failed to notice, but rather as a means of focussing more closely on what we have already felt as readers, and of verifying hypotheses we have produced as researchers.  相似文献   

15.
The field of child–computer interaction has received growing attention as a result of the penetration of IT into children’s everyday lives. Consequently, the involvement of children in the design of children’s technology has been widely discussed. So far, literature on children’s involvement in design has mainly treated design with children as a distinct design discipline regarding children as “cognitive incomplete” in comparison with adult users. With a point of departure in the framework of socio-cultural activity theory, this paper provides a new perspective on design with children, based on understanding children as participants in meaningful communities of practices. Thus, we argue that children could and should be involved in design on the same terms as adult users; children are treated as experts in their everyday lives and we cannot design future IT for children without involving these experts. The paper introduces the BRIDGE method including a palette of design techniques as a practice-based method for designing with children based on this perspective.  相似文献   

16.
为尽可能减少由于自然灾害导致铁路运输受阻甚至中断情况下受影响的列车数,提出了对现有列车运行方案以抗毁性优化为目标的量化分析方法.首先基于当前列车运行方案建立列车运行网络模型,该模型以实际铁路站点为节点,以实际铁路线为边,以每条边开行的列车数量为边权重;随后提出了一个称之为度权效应的抗毁性评价指标,并以该评价指标为目标函数,使用改进粒子群算法对网络权重进行优化.仿真结果得出了优化前后列车运行网络的抗毁性评价值分别为0.8881和0.9063,表明可通过量化分析方法来刻画列车运行网络的抗毁性能.  相似文献   

17.
Three aspects of the application of the jackknife technique to ridge regression are considered, viz. as a bias estimator, as a variance estimator, and as an indicator of observations influence on parameter estimates. The ridge parameter is considered non-stochastic. The jackknifed ridge estimator is found to be a ridge estimator with a smaller value on the ridge parameter. Hence it has a smaller bias but a larger variance than the ridge estimator. The variance estimator is expected to be robust against heteroscedastic error variance as well as against outliers. A measure of observations influence on the estimates of regression parameters is proposed.  相似文献   

18.
In the present-day graphics field, a proper methodology for designing input constructs of a general purpose graphics system is needed. In this direction, this paper proposes a framework where the graphics interaction programming is formulated as event-driven procedures. The end-user actions on the input tools are represented as events and the programreactions to these events as action-processes. The constructs for programming in this framework are implemented as a part of a graphics package SODDI. The resultant programming facilities are compared with the other existing proposals, based on the conceptual differences of the respective frameworks as well as on the experiences in using the constructs. The data-structures used for implementing these constructs are also presented.  相似文献   

19.

In this paper, we analyze the single image dehazing problem and propose a new variational method to solve it based on the dark channel prior. In the analysis section, we determine the influence that error in estimation of parameters of the haze degradation model has on the reconstructed image and give conclusions that can be used in designing a dehazing method. After that, we use those conclusions to bias our variational method as well as create a smooth variant of the dark channel prior, so it can be directly used in variational methods as well as potentially deep learning methods. We compare the proposed method quantitatively on a synthetic hazy image dataset as well as qualitatively on real-life hazy images.

  相似文献   

20.
Ram  P. Rand  D.K. 《Computer》1995,28(6):82-83
Who can resist the allure of free software tools-especially software tools designed to do something as important as detect network vulnerabilities? As you might suspect, anything free generally carries a hidden price tag. Security Administrator Tools for Analyzing Networks (Satan) was released as freeware on April 5, 1995 (April 4 on many popular anonymous ftp sites). Developed by Dan Farmer (formerly employed by Silicon Graphics Inc. and now at Sun Microsystems) and Wietse Venema (Eindhoven University of Technology in the Netherlands), it was designed to detect security vulnerabilities in any computer on the Internet. Satan can help discover the relative security issues inherent in your own network as well as security faults on networks outside your administrative domain. To be able to detect vulnerabilities, Satan would have to be run as super user on a Unix system, but with the wide availability of Unix lookalikes on PCs (such as Linux and freeBSD), root execution is not a limiting factor  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号