Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques
Secure end-to-end voice communication is crucial, but it has several issues. Researchers in
this field can benefit from a review paper with broader evaluation parameters than existing …
this field can benefit from a review paper with broader evaluation parameters than existing …
[PDF][PDF] Modeling of electrocardiogram signals using predefined signature and envelope vector sets
A novel method is proposed to model ECG signals by means of" predefined signature and
envelope vector sets (PSEVS)." On a frame basis, an ECG signal is reconstructed by …
envelope vector sets (PSEVS)." On a frame basis, an ECG signal is reconstructed by …
Three-parametric cubic interpolation for estimating the fundamental frequency of the speech signal
In this paper, we propose a three-parametric convolution kernel which is based on the one-
parameter Keys kernel. The first part of the paper describes the structure of the three …
parameter Keys kernel. The first part of the paper describes the structure of the three …
[PDF][PDF] Estimation of the fundamental frequency of the speech signal compressed by mp3 algorithm
The paper analyzes the estimation of the fundamental frequency from the real speech signal
which is obtained by recording the speaker in the real acoustic environment modeled by the …
which is obtained by recording the speaker in the real acoustic environment modeled by the …
Estimation of the fundamental frequency of the speech signal modeled by the SYMPES method
ZN Milivojević, MD Mirković - AEU-International Journal of Electronics and …, 2009 - Elsevier
In this paper the results of the estimation of the fundamental frequency of the speech signal
modeled by the A Novel Systematic Procedure to Model Speech Signals via Predefined …
modeled by the A Novel Systematic Procedure to Model Speech Signals via Predefined …
A new method of Haar and Db10 based secured compressed data transmission over GSM voice channel
In this chapter, a successful attempt for transmission of secured compressed data over GSM
voice channel has been made. In this work, given text of any length is converted to real-time …
voice channel has been made. In this work, given text of any length is converted to real-time …
[PDF][PDF] A novel image compression method based on classified energy and pattern building blocks
In this paper, a novel image compression method based on generation of the so-called
classified energy and pattern blocks (CEPB) is introduced and evaluation results are …
classified energy and pattern blocks (CEPB) is introduced and evaluation results are …
Konuşma İşaretlerinin Derin Evrişimsel Oto Kodlayıcı ve Artık Vektör Nicemleme Tabanlı Sıkıştırılması
Bu çalışmada, konuşma işaretlerini sıkıştırmak için derin öğrenme tabanlı oto kodlayıcı ve
artık vektör nicemlemesini temel alan sıkıştırma yöntemi önerilmiştir. Önerilen sıkıştırma …
artık vektör nicemlemesini temel alan sıkıştırma yöntemi önerilmiştir. Önerilen sıkıştırma …
Stacked causal convolutional autoencoder based speech compression method
This study proposes a speech compression method based on one-dimensional
convolutional autoencoder and residual vector quantization. The proposed method offers …
convolutional autoencoder and residual vector quantization. The proposed method offers …
A Reconfigurable Codec for Secure Voice Communication
O Korkmaz, F Ince, BS Yarman - 2023 IEEE-APS Topical …, 2023 - ieeexplore.ieee.org
A novel voice communication scheme is presented which assures security in voice
communication well beyond any encryption-based method in use today. The scheme is …
communication well beyond any encryption-based method in use today. The scheme is …