Scalable Hybrid Speech Codec for Voice over Internet Protocol Applications
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 4
Abstract
With the advent of various web-based applications and the fourth generation (4G) access technology, there has been an exponential growth in the demand of multimedia service delivery along with speech signals in a voice over internet protocol (VoIP) setup. Need is felt to fine-tune the conventional speech codecs deployed to cater to the modern environment. This fine-tuning can be achieved by further compressing the speech signal and to utilize the available bandwidth to deliver other services. This paper presents a scalable -hybrid model of speech codec using ITU-T G.729 and db10 wavelet. The codec addresses the problem of compression of speech signal in VoIP setup. The performance comparison of the codec with the standard codec has been performed by statistical analysis of subjective, objective and quantifiable parameters of quality desirable from the codec deployed in VoIP platforms.
Authors and Affiliations
Manas Ray, Mahesh Chandra, B. P. Patil
Validation of the IS Impact Model for Measuringthe Impact of e-Learning Systems in KSA Universities StudentPerspective
The IS-Impact Measurement Model, developed by Gable, Sedera and Chan in 2008, represents the to-date and expected stream of net profits from a given information system (IS), as perceived by all major user classes....
The Use of Programming Languages on the Final Project Report by Using Analytical Hierarchy Process (AHP)
The development in information technology provides a lot of convenience for everyone. Academy of Information Management and Computer (AIMC) students of the fourth semester, implementing the Job Training must specify the...
Deep Learning Algorithm for Cyberbullying Detection
Cyberbullying is a crime where one person becomes the target of harassment and hate. Many cyberbullying detection approaches have been introduced, however, they were largely based on textual and user features. Most of th...
Risk Assessment Method for Insider Threats in Cyber Security: A Review
Today’s in manufacturing major challenge is to manage large scale of cybersecurity system, which is potentially exposed to a multitude of threats. The utmost risky threats are insider threats. An insider threat arises wh...
Internet of Things (IOT): Research Challenges and Future Applications
With the Internet of Things (IoT) gradually evolving as the subsequent phase of the evolution of the Internet, it becomes crucial to recognize the various potential domains for application of IoT, and the research challe...