Results 31 to 40 of about 3,658,595 (247)

Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment

open access: yesInternational Journal of Digital Crime and Forensics, 2019
Detecting digital audio forgeries is a significant research focus in the field of audio forensics. In this article, the authors focus on a special form of digital audio forgery—copy-move—and propose a fast and effective method to detect doctored audios ...
Xinchao Huang   +4 more
semanticscholar   +1 more source

Mind the road: attention related neuromarkers during automated and manual simulated driving captured with a new mobile EEG sensor system

open access: yesFrontiers in Neuroergonomics
BackgroundDecline in vigilance due to fatigue is a common concern in traffic safety. Partially automated driving (PAD) systems can aid driving but decrease the driver's vigilance over time, due to reduced task engagement.
Joanna Elizabeth Mary Scanlon   +4 more
doaj   +1 more source

A Framework for Exploring Churches/Monuments/Museums of Byzantine Cultural Influence Exploiting Immersive Technologies in Real-Time Networked Environments

open access: yesTechnologies, 2021
The unique art that was developed in Byzantine times is widely accepted as a precursor to the Renaissance and is still evident in monuments either from or influenced by the Byzantium.
Katerina Kontopanagou   +2 more
doaj   +1 more source

Adaptive List Flip Decoder for Polar Codes with High-Order Error Correction Capability and a Simplified Flip Metric

open access: yesEntropy, 2022
Designing an efficient decoder is an effective way to improve the performance of polar codes with limited code length. List flip decoders have received attention due to their good performance trade-off between list decoders and flip decoders.
Yansong Lv   +4 more
doaj   +1 more source

Fractionally-addressed delay lines

open access: yes, 2000
While traditional implementations of variable-length digital delay lines are based on a circular buffer accessed by two pointers, we propose an implementation where a single fractional pointer is used both for read and write operations. On modern general-
Rocchesso, Davide
core   +1 more source

Modeling of speech-dependent own voice transfer characteristics for hearables with an in-ear microphone

open access: yesActa Acustica
Many hearables contain an in-ear microphone, which may be used to capture the own voice of its user. However, due to the hearable occluding the ear canal, the in-ear microphone mostly records body-conducted speech, typically suffering from band ...
Ohlenbusch Mattes   +2 more
doaj   +1 more source

Teenagers, smartphones and digital audio consumption in the age of Spotify

open access: yesComunicar, 2019
The consolidation of smartphones as dominant devices for access to digital information and entertainment has redefined the processes of production and commercialization of cultural communication industries.
L. Pedrero-Esteban   +2 more
semanticscholar   +1 more source

Detecting Lombard Speech Using Deep Learning Approach

open access: yesSensors, 2022
Robust Lombard speech-in-noise detecting is challenging. This study proposes a strategy to detect Lombard speech using a machine learning approach for applications such as public address systems that work in near real time.
Krzysztof Kąkol   +3 more
doaj   +1 more source

Audio Cards for High-Resolution and Economical Electronic Transport Studies

open access: yes, 2012
We report on a technique for determining electronic transport properties using commercially available audio cards. Using a typical 24-bit audio card simultaneously as a sine wave generator and a narrow bandwidth ac voltmeter, we show the spectral purity ...
Bedau, Daniel   +2 more
core   +1 more source

Blind Detection of Copy-Move Forgery in Digital Audio Forensics

open access: yesIEEE Access, 2017
Although copy-move forgery is one of the most common fabrication techniques, blind detection of such tampering in digital audio is mostly unexplored. Unlike active techniques, blind forgery detection is challenging, because it does not embed a watermark ...
M. Imran   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy