SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 2250-3021, ISSN (p): 2278-8719
Vol. 05, Issue 02 (February. 2015), ||V4|| PP 28-32
International organization of Scientific Research 28 | P a g e
Redundancy Remove Technique for Real Time Voice
Compression
Hazar Abdelgadir Mohammed Hussain1
, Abdelrasoul Jabar Alzubaidi2
Sudan University of science and Technology- Engineering College- Electronics Department
Abstract: The aim of this paper is to develop a code for encoding and compressing speech in real time . A
powerful speech analysis technique called “redundancy remove technique” is implemented. The paper justifies
the implementation of the redundancy remove technique. This technique is used because it provides extremely
accurate estimation of speech parameters, and is relatively efficient for computation. The speech quality and
complexity were analyzed.
Keywords: Matlab , voice compression , redundancy , speech parameters.
I. INTRODUCTION
Voice compression is the conversion of analog voice signals to digital signals using minimum band
width. It is a pretty old technology and dates back to early 90's, which witnessed the coming of voice
compression technology being used by satellite and International long distance operators. Voice compression is
becoming increasingly popular and with good reason, it saves enormous amounts of money and in some cases
allows for communications that would not otherwise be possible. It can be also used in situations where the
amount of bandwidth available is limited..
Due to the increasing demand for speech communication, speech coding technology has received
augmenting levels of interest from the research, standardization, and business communities. Advances in
microelectronics and the vast availability of low-cost programmable processors and dedicated chips have
enabled rapid technology transfer from research to product development . This encourages the research
community to investigate alternative schemes for speech coding, with the objectives of overcoming deficiencies
and limitations.
The standardization community pursues the establishment of standard speech coding methods for
various applications that will be widely accepted and implemented by the industry.
II. METHODOLOGY
There are a variety of compression techniques commonly used in the Internet and other systems. The
components of a system are capturing , transforming , coding and transmitting as shown in Figure (1).
Figure (1) components of simple compression system
An input signal is converted from some continuously varying physical value (e.g. voice wave) into a
continuously electrical signal by some electro-mechanical device. This continuously varying electrical signal
can then be converted to a sequence of digital values, called samples, by some analog to digital conversion
circuit.
Two factors determine the accuracy of the sample with the original continuous signal:
1. The sampling rate is based on Nyquist theorem, the digital sampling rate must be twice of the highest
frequency in the continuous signal.
2 The number of bits used in each sample. (Known as the quantization level.).
The original data can be transformed in a number of ways to make it easier to apply certain compression
techniques. Generally the coding system components are illustrated in details on the following diagram (Figure
(2)):
Sample Transform Coding
Redundancy remove technique for real time voice compression
International organization of Scientific Research 29 | P a g e
Figure (2) Block diagram of a speech coding system
III. REDUNDANCY REDUCTION TECHNIQUE
Redundancy reduction is a technique for the reduction of data from audio sources. These techniques are
applied to reduce the quantity of information to be stored or transmitted, but are independent of the end-
application, medium or transmission channel, i.e. do only exploit the properties of the source signal itself or the
final receiver exposed to this signal (the listener).Redundancy reduction processes have proven highly effective
in compressing the bandwidth of voice signal.
Audio compression algorithms are often referred to as “audio encoders”. Applications reduces required
storage space as well as reduces required transmission bandwidth. Lossy and lossless algorithms are the audio
compression algorithms that are implemented as audio codec.
Lossless Audio Compression removes redundant data, resulting signal is same as original – perfect
reconstruction. Lossy Audio Encoding removes irrelevant data, resulting signal is similar to original.
Information redundancy is reduced in both forms of compression with the use of methods like coding, pattern
recognition and linear prediction. However, lossy algorithms provide greater compression rates and are therefore
used in mainstream consumer audio devices. Lossy audio compression algorithms can be defined as the ones
that do not retain every bit of data and only reproduce a signal that sounds more or less like the original.
IV. PROGRAMMING
The algorithm (flow Chart) is shown in figure (3) below. The processing starts with recording audio
signal ( . WAVE format file). A sampling processing based on the principles of the Nyquist theorem is
conducted on the recorded file .The redundant samples are then eliminated in order to reduce the size of the file.
Therefore the data in the file get compressed and send over the LPT port.
Matrix Laboratory (MATLAB) is used for coding the compression procedure. Matlab is a numerical
computing environment and fourth-generation programming language. Developed by Math Works, MATLAB
allows matrix manipulations, plotting of functions and data, implementation of algorithms and creation of user
interfaces.
Redundancy remove technique for real time voice compression
International organization of Scientific Research 30 | P a g e
Figure (3) flow Chart for data compression and sending
A reverse procedure can be conducted for capturing and decompressing the file in order to return it to its
original form.
End
Redundancy remove technique for real time voice compression
International organization of Scientific Research 31 | P a g e
V. RESULTS
It is seen that:
The data rates associated with uncompressed digital audio are substantial.
Digital audio compression enables more efficient storage and transmission of audio data..
The redundancy remove technique is simple, Powerful, high-compression and high audio quality algorithm.
Figure (4) . a shows the original voice signal before compression and figure (4).b shows the original
voice signal after compression.
Figure (4).a the original voice signal
Figure (4).b The compressed voice signal
VI. CONCLUSION
The design of a particular coding algorithm is often dictated by the target application. Therefore, during
the design of an algorithm the relative weighting of the influencing factors requires careful consideration in
order to obtain a balanced compromise between the often conflicting objectives .The redundancy remove
method reduces the band width needed for voice traffic and thus provides high voice quality , better processing
time and excellent performance. Therefore ,it is favored to be implemented for real-time applications.
REFERENCES
Books:
[1]. Karthikeyan N. Ramamurthy and Andreas S. Spanias , MATLAB® Software for the Code
Excited Linear Prediction Algorithm , Arizona State University - Published by Morgan &
Claypool , Copyright © 2009.
a. M. Kondoz University of Surrey, UK Digital Speech (Coding for Low Bit Rate
Communication Systems) , John Wiley & Sons Ltd , Second Edition - Copyright ©2004.
[2]. WAI C. CHU ,Speech Coding Algorithms (Foundation and Evolution of Standardized
Coders) , John Wiley & Sons San , Copyright © 2003.
[3]. Papers:
[4]. Speech compression using CELP speech coding technique in GSM AMR
Redundancy remove technique for real time voice compression
International organization of Scientific Research 32 | P a g e
[5]. (Wireless and Optical Communications Networks IFIP International Conference, 2008. 08.
5th on) Issue Date: 5-7 May 2008 Location: Surabaya Date of Current Version: 13 June 2008
[6]. Advances in speech and audio compression:
[7]. This paper appears in: Proceedings of the IEEE Issue Date: Jun 1994Volume: 82 Issue: 6 on
page(s): 900- 918 Date of Current Version: 06 August 2002 sponsored by: IEEE
[8]. Proceedings of the IEEE. Vol. 82. No. 10. October 1994

More Related Content

What's hot

Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...IJERA Editor
 
Implementation of Wide Band Frequency Synthesizer Base on DFS (Digital Frequ...
Implementation of Wide Band Frequency Synthesizer Base on  DFS (Digital Frequ...Implementation of Wide Band Frequency Synthesizer Base on  DFS (Digital Frequ...
Implementation of Wide Band Frequency Synthesizer Base on DFS (Digital Frequ...IJMER
 
Design of Area Efficient Digital FIR Filter using MAC
Design of Area Efficient Digital FIR Filter using MACDesign of Area Efficient Digital FIR Filter using MAC
Design of Area Efficient Digital FIR Filter using MACIRJET Journal
 
Real time DSP algorithms for Mobile communication
Real time DSP algorithms for Mobile communicationReal time DSP algorithms for Mobile communication
Real time DSP algorithms for Mobile communicationEmbedded Plus Trichy
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Grant free IoT, Ericsson Research Presentation
Grant free IoT, Ericsson Research PresentationGrant free IoT, Ericsson Research Presentation
Grant free IoT, Ericsson Research Presentationamin azari
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesEditor IJMTER
 
Steganography analysis techniques applied to audio and image files
Steganography analysis techniques applied to audio and image filesSteganography analysis techniques applied to audio and image files
Steganography analysis techniques applied to audio and image filesjournalBEEI
 
05 comparative study of voice print based acoustic features mfcc and lpcc
05 comparative study of voice print based acoustic features mfcc and lpcc05 comparative study of voice print based acoustic features mfcc and lpcc
05 comparative study of voice print based acoustic features mfcc and lpccIJAEMSJORNAL
 
Higher Order Low Pass FIR Filter Design using IPSO Algorithm
Higher Order Low Pass FIR Filter Design using IPSO AlgorithmHigher Order Low Pass FIR Filter Design using IPSO Algorithm
Higher Order Low Pass FIR Filter Design using IPSO Algorithmijtsrd
 
A REVIEW OF LPC METHODS FOR ENHANCEMENT OF SPEECH SIGNALS
A REVIEW OF LPC METHODS FOR ENHANCEMENT OF SPEECH SIGNALSA REVIEW OF LPC METHODS FOR ENHANCEMENT OF SPEECH SIGNALS
A REVIEW OF LPC METHODS FOR ENHANCEMENT OF SPEECH SIGNALSijiert bestjournal
 
Performance Analysis of FIR Filter using FDATool
Performance Analysis of FIR Filter using FDAToolPerformance Analysis of FIR Filter using FDATool
Performance Analysis of FIR Filter using FDAToolijtsrd
 
IRJET- Low Complexity and Critical Path Based VLSI Architecture for LMS A...
IRJET-  	  Low Complexity and Critical Path Based VLSI Architecture for LMS A...IRJET-  	  Low Complexity and Critical Path Based VLSI Architecture for LMS A...
IRJET- Low Complexity and Critical Path Based VLSI Architecture for LMS A...IRJET Journal
 

What's hot (20)

Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...
 
Implementation of Wide Band Frequency Synthesizer Base on DFS (Digital Frequ...
Implementation of Wide Band Frequency Synthesizer Base on  DFS (Digital Frequ...Implementation of Wide Band Frequency Synthesizer Base on  DFS (Digital Frequ...
Implementation of Wide Band Frequency Synthesizer Base on DFS (Digital Frequ...
 
Design of Area Efficient Digital FIR Filter using MAC
Design of Area Efficient Digital FIR Filter using MACDesign of Area Efficient Digital FIR Filter using MAC
Design of Area Efficient Digital FIR Filter using MAC
 
Real time DSP algorithms for Mobile communication
Real time DSP algorithms for Mobile communicationReal time DSP algorithms for Mobile communication
Real time DSP algorithms for Mobile communication
 
Z4301132136
Z4301132136Z4301132136
Z4301132136
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Dsp ppt
Dsp pptDsp ppt
Dsp ppt
 
Grant free IoT, Ericsson Research Presentation
Grant free IoT, Ericsson Research PresentationGrant free IoT, Ericsson Research Presentation
Grant free IoT, Ericsson Research Presentation
 
40120140504002
4012014050400240120140504002
40120140504002
 
Ad04507176183
Ad04507176183Ad04507176183
Ad04507176183
 
I43014752
I43014752I43014752
I43014752
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
 
Steganography analysis techniques applied to audio and image files
Steganography analysis techniques applied to audio and image filesSteganography analysis techniques applied to audio and image files
Steganography analysis techniques applied to audio and image files
 
Sub band project
Sub band projectSub band project
Sub band project
 
05 comparative study of voice print based acoustic features mfcc and lpcc
05 comparative study of voice print based acoustic features mfcc and lpcc05 comparative study of voice print based acoustic features mfcc and lpcc
05 comparative study of voice print based acoustic features mfcc and lpcc
 
Higher Order Low Pass FIR Filter Design using IPSO Algorithm
Higher Order Low Pass FIR Filter Design using IPSO AlgorithmHigher Order Low Pass FIR Filter Design using IPSO Algorithm
Higher Order Low Pass FIR Filter Design using IPSO Algorithm
 
A REVIEW OF LPC METHODS FOR ENHANCEMENT OF SPEECH SIGNALS
A REVIEW OF LPC METHODS FOR ENHANCEMENT OF SPEECH SIGNALSA REVIEW OF LPC METHODS FOR ENHANCEMENT OF SPEECH SIGNALS
A REVIEW OF LPC METHODS FOR ENHANCEMENT OF SPEECH SIGNALS
 
speech enhancement
speech enhancementspeech enhancement
speech enhancement
 
Performance Analysis of FIR Filter using FDATool
Performance Analysis of FIR Filter using FDAToolPerformance Analysis of FIR Filter using FDATool
Performance Analysis of FIR Filter using FDATool
 
IRJET- Low Complexity and Critical Path Based VLSI Architecture for LMS A...
IRJET-  	  Low Complexity and Critical Path Based VLSI Architecture for LMS A...IRJET-  	  Low Complexity and Critical Path Based VLSI Architecture for LMS A...
IRJET- Low Complexity and Critical Path Based VLSI Architecture for LMS A...
 

Viewers also liked

Steve Jobs in real live
Steve Jobs in real liveSteve Jobs in real live
Steve Jobs in real livemaxfell
 
Diego rojas et_com
Diego rojas et_comDiego rojas et_com
Diego rojas et_compilarca
 
Trending developments vol 3, issue 5
Trending developments vol 3, issue 5Trending developments vol 3, issue 5
Trending developments vol 3, issue 5froed
 
Los origenes - Introduccion - Leccion de Escuela Sabatica
Los origenes - Introduccion - Leccion de Escuela SabaticaLos origenes - Introduccion - Leccion de Escuela Sabatica
Los origenes - Introduccion - Leccion de Escuela Sabaticaadarmejear
 
Foculty of business and technology
Foculty of business and technologyFoculty of business and technology
Foculty of business and technologyAbaan Paul
 
Elevator-National-Educational-Needs-Analysis-Report-Print-Version
Elevator-National-Educational-Needs-Analysis-Report-Print-VersionElevator-National-Educational-Needs-Analysis-Report-Print-Version
Elevator-National-Educational-Needs-Analysis-Report-Print-VersionSophia Kilcullen
 
Luto, mal-estar e resignação na mídia jornalística
Luto, mal-estar e resignação na mídia jornalísticaLuto, mal-estar e resignação na mídia jornalística
Luto, mal-estar e resignação na mídia jornalísticaCláudia
 
FAO - Infografia: Agricultura de conservación
FAO - Infografia: Agricultura de conservaciónFAO - Infografia: Agricultura de conservación
FAO - Infografia: Agricultura de conservaciónHernani Larrea
 
Bahar’ın Taze Havası Zamane Kahvesi’nde
Bahar’ın Taze Havası Zamane Kahvesi’ndeBahar’ın Taze Havası Zamane Kahvesi’nde
Bahar’ın Taze Havası Zamane Kahvesi’ndeZamane Kahvesi
 
Defensa fiscal derechos humanos
Defensa fiscal derechos humanosDefensa fiscal derechos humanos
Defensa fiscal derechos humanospelonchini123
 
Lonja revista Junio
Lonja revista Junio Lonja revista Junio
Lonja revista Junio BEA OCHERA
 
Desolation Wilderness/ Mount Tallac Field Assignment
Desolation Wilderness/ Mount Tallac Field AssignmentDesolation Wilderness/ Mount Tallac Field Assignment
Desolation Wilderness/ Mount Tallac Field AssignmentRane Pakiz
 

Viewers also liked (17)

Provincia de leon
Provincia de leonProvincia de leon
Provincia de leon
 
Steve Jobs in real live
Steve Jobs in real liveSteve Jobs in real live
Steve Jobs in real live
 
Diego rojas et_com
Diego rojas et_comDiego rojas et_com
Diego rojas et_com
 
Trending developments vol 3, issue 5
Trending developments vol 3, issue 5Trending developments vol 3, issue 5
Trending developments vol 3, issue 5
 
tesis
 tesis tesis
tesis
 
Los origenes - Introduccion - Leccion de Escuela Sabatica
Los origenes - Introduccion - Leccion de Escuela SabaticaLos origenes - Introduccion - Leccion de Escuela Sabatica
Los origenes - Introduccion - Leccion de Escuela Sabatica
 
Foculty of business and technology
Foculty of business and technologyFoculty of business and technology
Foculty of business and technology
 
Elevator-National-Educational-Needs-Analysis-Report-Print-Version
Elevator-National-Educational-Needs-Analysis-Report-Print-VersionElevator-National-Educational-Needs-Analysis-Report-Print-Version
Elevator-National-Educational-Needs-Analysis-Report-Print-Version
 
Luto, mal-estar e resignação na mídia jornalística
Luto, mal-estar e resignação na mídia jornalísticaLuto, mal-estar e resignação na mídia jornalística
Luto, mal-estar e resignação na mídia jornalística
 
FAO - Infografia: Agricultura de conservación
FAO - Infografia: Agricultura de conservaciónFAO - Infografia: Agricultura de conservación
FAO - Infografia: Agricultura de conservación
 
Bahar’ın Taze Havası Zamane Kahvesi’nde
Bahar’ın Taze Havası Zamane Kahvesi’ndeBahar’ın Taze Havası Zamane Kahvesi’nde
Bahar’ın Taze Havası Zamane Kahvesi’nde
 
Rodríguez garcía jackson curriculo
Rodríguez garcía jackson curriculoRodríguez garcía jackson curriculo
Rodríguez garcía jackson curriculo
 
Como nasceu o dinheiro
Como nasceu o dinheiroComo nasceu o dinheiro
Como nasceu o dinheiro
 
Defensa fiscal derechos humanos
Defensa fiscal derechos humanosDefensa fiscal derechos humanos
Defensa fiscal derechos humanos
 
Theme customization
Theme customizationTheme customization
Theme customization
 
Lonja revista Junio
Lonja revista Junio Lonja revista Junio
Lonja revista Junio
 
Desolation Wilderness/ Mount Tallac Field Assignment
Desolation Wilderness/ Mount Tallac Field AssignmentDesolation Wilderness/ Mount Tallac Field Assignment
Desolation Wilderness/ Mount Tallac Field Assignment
 

Similar to F5242832

Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlabeSAT Journals
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlabeSAT Publishing House
 
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...IRJET Journal
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking MethodsIRJET Journal
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET Journal
 
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
 
The Big Data Is A Significant Subject Of Modern Times With...
The Big Data Is A Significant Subject Of Modern Times With...The Big Data Is A Significant Subject Of Modern Times With...
The Big Data Is A Significant Subject Of Modern Times With...Sarah Gordon
 
Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Stefanie Yang
 
A Survey on Ultrasound Beamforming Strategies
A Survey on Ultrasound Beamforming StrategiesA Survey on Ultrasound Beamforming Strategies
A Survey on Ultrasound Beamforming StrategiesIRJET Journal
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmIAEME Publication
 
Design and implementation of different audio restoration techniques for audio...
Design and implementation of different audio restoration techniques for audio...Design and implementation of different audio restoration techniques for audio...
Design and implementation of different audio restoration techniques for audio...eSAT Journals
 
Data Compression using Multiple Transformation Techniques for Audio Applicati...
Data Compression using Multiple Transformation Techniques for Audio Applicati...Data Compression using Multiple Transformation Techniques for Audio Applicati...
Data Compression using Multiple Transformation Techniques for Audio Applicati...iosrjce
 
Speech Enhancement Using Compressive Sensing
Speech Enhancement Using Compressive SensingSpeech Enhancement Using Compressive Sensing
Speech Enhancement Using Compressive SensingIRJET Journal
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...INFOGAIN PUBLICATION
 
J03502050055
J03502050055J03502050055
J03502050055theijes
 
Enhanced modulation spectral subtraction for IOVT speech recognition application
Enhanced modulation spectral subtraction for IOVT speech recognition applicationEnhanced modulation spectral subtraction for IOVT speech recognition application
Enhanced modulation spectral subtraction for IOVT speech recognition applicationIRJET Journal
 
IRJET- A Review on Audible Sound Analysis based on State Clustering throu...
IRJET-  	  A Review on Audible Sound Analysis based on State Clustering throu...IRJET-  	  A Review on Audible Sound Analysis based on State Clustering throu...
IRJET- A Review on Audible Sound Analysis based on State Clustering throu...IRJET Journal
 

Similar to F5242832 (20)

Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
 
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking Methods
 
40120140504006
4012014050400640120140504006
40120140504006
 
Mk3422222228
Mk3422222228Mk3422222228
Mk3422222228
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
 
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
 
The Big Data Is A Significant Subject Of Modern Times With...
The Big Data Is A Significant Subject Of Modern Times With...The Big Data Is A Significant Subject Of Modern Times With...
The Big Data Is A Significant Subject Of Modern Times With...
 
Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...
 
A Survey on Ultrasound Beamforming Strategies
A Survey on Ultrasound Beamforming StrategiesA Survey on Ultrasound Beamforming Strategies
A Survey on Ultrasound Beamforming Strategies
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
 
Design and implementation of different audio restoration techniques for audio...
Design and implementation of different audio restoration techniques for audio...Design and implementation of different audio restoration techniques for audio...
Design and implementation of different audio restoration techniques for audio...
 
N017657985
N017657985N017657985
N017657985
 
Data Compression using Multiple Transformation Techniques for Audio Applicati...
Data Compression using Multiple Transformation Techniques for Audio Applicati...Data Compression using Multiple Transformation Techniques for Audio Applicati...
Data Compression using Multiple Transformation Techniques for Audio Applicati...
 
Speech Enhancement Using Compressive Sensing
Speech Enhancement Using Compressive SensingSpeech Enhancement Using Compressive Sensing
Speech Enhancement Using Compressive Sensing
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
J03502050055
J03502050055J03502050055
J03502050055
 
Enhanced modulation spectral subtraction for IOVT speech recognition application
Enhanced modulation spectral subtraction for IOVT speech recognition applicationEnhanced modulation spectral subtraction for IOVT speech recognition application
Enhanced modulation spectral subtraction for IOVT speech recognition application
 
IRJET- A Review on Audible Sound Analysis based on State Clustering throu...
IRJET-  	  A Review on Audible Sound Analysis based on State Clustering throu...IRJET-  	  A Review on Audible Sound Analysis based on State Clustering throu...
IRJET- A Review on Audible Sound Analysis based on State Clustering throu...
 

More from IOSR-JEN

More from IOSR-JEN (20)

C05921721
C05921721C05921721
C05921721
 
B05921016
B05921016B05921016
B05921016
 
A05920109
A05920109A05920109
A05920109
 
J05915457
J05915457J05915457
J05915457
 
I05914153
I05914153I05914153
I05914153
 
H05913540
H05913540H05913540
H05913540
 
G05913234
G05913234G05913234
G05913234
 
F05912731
F05912731F05912731
F05912731
 
E05912226
E05912226E05912226
E05912226
 
D05911621
D05911621D05911621
D05911621
 
C05911315
C05911315C05911315
C05911315
 
B05910712
B05910712B05910712
B05910712
 
A05910106
A05910106A05910106
A05910106
 
B05840510
B05840510B05840510
B05840510
 
I05844759
I05844759I05844759
I05844759
 
H05844346
H05844346H05844346
H05844346
 
G05843942
G05843942G05843942
G05843942
 
F05843238
F05843238F05843238
F05843238
 
E05842831
E05842831E05842831
E05842831
 
D05842227
D05842227D05842227
D05842227
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

F5242832

  • 1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 02 (February. 2015), ||V4|| PP 28-32 International organization of Scientific Research 28 | P a g e Redundancy Remove Technique for Real Time Voice Compression Hazar Abdelgadir Mohammed Hussain1 , Abdelrasoul Jabar Alzubaidi2 Sudan University of science and Technology- Engineering College- Electronics Department Abstract: The aim of this paper is to develop a code for encoding and compressing speech in real time . A powerful speech analysis technique called “redundancy remove technique” is implemented. The paper justifies the implementation of the redundancy remove technique. This technique is used because it provides extremely accurate estimation of speech parameters, and is relatively efficient for computation. The speech quality and complexity were analyzed. Keywords: Matlab , voice compression , redundancy , speech parameters. I. INTRODUCTION Voice compression is the conversion of analog voice signals to digital signals using minimum band width. It is a pretty old technology and dates back to early 90's, which witnessed the coming of voice compression technology being used by satellite and International long distance operators. Voice compression is becoming increasingly popular and with good reason, it saves enormous amounts of money and in some cases allows for communications that would not otherwise be possible. It can be also used in situations where the amount of bandwidth available is limited.. Due to the increasing demand for speech communication, speech coding technology has received augmenting levels of interest from the research, standardization, and business communities. Advances in microelectronics and the vast availability of low-cost programmable processors and dedicated chips have enabled rapid technology transfer from research to product development . This encourages the research community to investigate alternative schemes for speech coding, with the objectives of overcoming deficiencies and limitations. The standardization community pursues the establishment of standard speech coding methods for various applications that will be widely accepted and implemented by the industry. II. METHODOLOGY There are a variety of compression techniques commonly used in the Internet and other systems. The components of a system are capturing , transforming , coding and transmitting as shown in Figure (1). Figure (1) components of simple compression system An input signal is converted from some continuously varying physical value (e.g. voice wave) into a continuously electrical signal by some electro-mechanical device. This continuously varying electrical signal can then be converted to a sequence of digital values, called samples, by some analog to digital conversion circuit. Two factors determine the accuracy of the sample with the original continuous signal: 1. The sampling rate is based on Nyquist theorem, the digital sampling rate must be twice of the highest frequency in the continuous signal. 2 The number of bits used in each sample. (Known as the quantization level.). The original data can be transformed in a number of ways to make it easier to apply certain compression techniques. Generally the coding system components are illustrated in details on the following diagram (Figure (2)): Sample Transform Coding
  • 2. Redundancy remove technique for real time voice compression International organization of Scientific Research 29 | P a g e Figure (2) Block diagram of a speech coding system III. REDUNDANCY REDUCTION TECHNIQUE Redundancy reduction is a technique for the reduction of data from audio sources. These techniques are applied to reduce the quantity of information to be stored or transmitted, but are independent of the end- application, medium or transmission channel, i.e. do only exploit the properties of the source signal itself or the final receiver exposed to this signal (the listener).Redundancy reduction processes have proven highly effective in compressing the bandwidth of voice signal. Audio compression algorithms are often referred to as “audio encoders”. Applications reduces required storage space as well as reduces required transmission bandwidth. Lossy and lossless algorithms are the audio compression algorithms that are implemented as audio codec. Lossless Audio Compression removes redundant data, resulting signal is same as original – perfect reconstruction. Lossy Audio Encoding removes irrelevant data, resulting signal is similar to original. Information redundancy is reduced in both forms of compression with the use of methods like coding, pattern recognition and linear prediction. However, lossy algorithms provide greater compression rates and are therefore used in mainstream consumer audio devices. Lossy audio compression algorithms can be defined as the ones that do not retain every bit of data and only reproduce a signal that sounds more or less like the original. IV. PROGRAMMING The algorithm (flow Chart) is shown in figure (3) below. The processing starts with recording audio signal ( . WAVE format file). A sampling processing based on the principles of the Nyquist theorem is conducted on the recorded file .The redundant samples are then eliminated in order to reduce the size of the file. Therefore the data in the file get compressed and send over the LPT port. Matrix Laboratory (MATLAB) is used for coding the compression procedure. Matlab is a numerical computing environment and fourth-generation programming language. Developed by Math Works, MATLAB allows matrix manipulations, plotting of functions and data, implementation of algorithms and creation of user interfaces.
  • 3. Redundancy remove technique for real time voice compression International organization of Scientific Research 30 | P a g e Figure (3) flow Chart for data compression and sending A reverse procedure can be conducted for capturing and decompressing the file in order to return it to its original form. End
  • 4. Redundancy remove technique for real time voice compression International organization of Scientific Research 31 | P a g e V. RESULTS It is seen that: The data rates associated with uncompressed digital audio are substantial. Digital audio compression enables more efficient storage and transmission of audio data.. The redundancy remove technique is simple, Powerful, high-compression and high audio quality algorithm. Figure (4) . a shows the original voice signal before compression and figure (4).b shows the original voice signal after compression. Figure (4).a the original voice signal Figure (4).b The compressed voice signal VI. CONCLUSION The design of a particular coding algorithm is often dictated by the target application. Therefore, during the design of an algorithm the relative weighting of the influencing factors requires careful consideration in order to obtain a balanced compromise between the often conflicting objectives .The redundancy remove method reduces the band width needed for voice traffic and thus provides high voice quality , better processing time and excellent performance. Therefore ,it is favored to be implemented for real-time applications. REFERENCES Books: [1]. Karthikeyan N. Ramamurthy and Andreas S. Spanias , MATLAB® Software for the Code Excited Linear Prediction Algorithm , Arizona State University - Published by Morgan & Claypool , Copyright © 2009. a. M. Kondoz University of Surrey, UK Digital Speech (Coding for Low Bit Rate Communication Systems) , John Wiley & Sons Ltd , Second Edition - Copyright ©2004. [2]. WAI C. CHU ,Speech Coding Algorithms (Foundation and Evolution of Standardized Coders) , John Wiley & Sons San , Copyright © 2003. [3]. Papers: [4]. Speech compression using CELP speech coding technique in GSM AMR
  • 5. Redundancy remove technique for real time voice compression International organization of Scientific Research 32 | P a g e [5]. (Wireless and Optical Communications Networks IFIP International Conference, 2008. 08. 5th on) Issue Date: 5-7 May 2008 Location: Surabaya Date of Current Version: 13 June 2008 [6]. Advances in speech and audio compression: [7]. This paper appears in: Proceedings of the IEEE Issue Date: Jun 1994Volume: 82 Issue: 6 on page(s): 900- 918 Date of Current Version: 06 August 2002 sponsored by: IEEE [8]. Proceedings of the IEEE. Vol. 82. No. 10. October 1994