Abstract

In electrolaryngeal speech, an excitation signal is provided by means of a buzzer held against the neck. The buzzer is usually operated at a constant frequency. While such Transcutaneous Artificial Larynges (TALs) provide a means for verbal communication for people who are unable to use their own, the monotone F0 pattern results in poor speech quality. In the present invention, cepstral analysis is used to replace the original F0 contour of the TAL speech with a normal F0 pattern.


Top

Abstract

A technique for separating an acoustic signal into a voiced (V) component corresponding to an electrolaryngeal source and an unvoiced (U) component corresponding to a turbulence source. The technique can be used to improve the quality of electrolaryngeal speech, and may be adapted for use in a special purpose telephone. A method according to the invention extracts a segment of consecutive values from the original stream of numerical values, and performs a discrete Fourier transform on the this first group of values.


Top

Abstract

The present invention provides software for electronically annotating electronic images, such as drawings, photographs, video, etc., through the drag-and-drop of annotations from a pre-defined, but extendable, list. The annotations are placed at a user-selected X, Y location on the image, and stored in a searchable database. Thus, they can be searched in order to retrieve, organize, group, or display desired electronic images or collections of such images. The annotations may be text, images, sounds, etc.


Top

Abstract

A probabilistic framework for acoustic-phonetic automatic speech recognition organizes a set of phonetic features into a hierarchy consisting of a broad manner feature sub-hierarchy and a fine phonetic feature sub-hierarchy. Each phonetic feature of said hierarchy corresponds to a set of acoustic correlates and each broad manner feature of said broad manner feature sub-hierarchy is further associated with a corresponding set of acoustic landmarks. A pattern recognizer is trained from a knowledge base of phonetic features and corresponding acoustic correlates.


Top

Abstract

The invention relates to data warehouses and the ability to create and maintain data cubes of multi-dimensional data. More specifically, the invention pertains to data cube architectures that permit significant reduction of storage, exhibit very efficient retrieval and provide a very efficient incremental update of the data cubes.


Top

Abstract

A highly predictable, low overhead and yet dynamic, memory allocation methodology for embedded systems with scratch-pad memory is presented. The dynamic memory allocation methodology for global and stack data (i) accounts for changing program requirements at runtime; (ii) has no software-caching tags; (iii) requires no run-time checks; (iv) has extremely low overheads; and (v) yields 100% predictable memory access times.


Top

Abstract

A binary rewriter that can provide complete code coverage without relocation information is provided, together with a method of performing such rewriting. The method can include processing a binary file as an original binary file. The method can also include disassembling the binary file to provide a disassembled binary file. The method can further include rewriting the disassembled binary file without relocation information to provide a rewritten binary file.


Top

Abstract

A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.


Top

Abstract

Systems, methods, devices, and computer program products are directed to mobility control and performance prediction in directional wireless networks. Network coverage and connectivity are optimized. Convex and non-convex network modeling is implemented to provide adaptive topology con­trol and mobility control within the network, whereby communication links are retained, released, or reconfigured based on their communication role within the network architecture.


Top

Abstract

The replacement of secret keys is a central problem in key management. Typical solutions exchange handshaking messages, involve complex computations, or require the cooperation of trusted third parties. Disclosed herein is a key replacement method that exploits the randomness of Markov models to efficiently provide fresh keys to users. Unlike other methods, the proposed method removes the need for extra communications, intensive computation, or third parties. It is demonstrated that the proposed method has perfect forward secrecy as well as resistance to known-key attacks.


Top

Pages