scholarly journals A novel analogue keyboard for embedded applications, based on integer division truncation

HardwareX ◽  
2019 ◽  
Vol 5 ◽  
pp. e00055
Author(s):  
M. Mariola ◽  
C. Bemont ◽  
F. Petruccione
Author(s):  
Alexandru-Lucian Georgescu ◽  
Alessandro Pappalardo ◽  
Horia Cucu ◽  
Michaela Blott

AbstractThe last decade brought significant advances in automatic speech recognition (ASR) thanks to the evolution of deep learning methods. ASR systems evolved from pipeline-based systems, that modeled hand-crafted speech features with probabilistic frameworks and generated phone posteriors, to end-to-end (E2E) systems, that translate the raw waveform directly into words using one deep neural network (DNN). The transcription accuracy greatly increased, leading to ASR technology being integrated into many commercial applications. However, few of the existing ASR technologies are suitable for integration in embedded applications, due to their hard constrains related to computing power and memory usage. This overview paper serves as a guided tour through the recent literature on speech recognition and compares the most popular ASR implementations. The comparison emphasizes the trade-off between ASR performance and hardware requirements, to further serve decision makers in choosing the system which fits best their embedded application. To the best of our knowledge, this is the first study to provide this kind of trade-off analysis for state-of-the-art ASR systems.


2012 ◽  
Vol 433-440 ◽  
pp. 7024-7028
Author(s):  
Hui Fu ◽  
Bin Jin ◽  
Lin Han ◽  
Zuo Tang Tao

With computer technology, communication technology and the rapid development of electronic technology, remote monitoring technology will be more widely used for data transmission requirements and more stringent. GPRS-based remote monitoring system, which is based in communications equipment, through the server to PC, as the remote control platform, embedded applications, network programming and other technology, the remote information display and control. Throughout the system, users can allow each terminal in the case of permission to accept the data on the changes and settings. Wireless network communication is important that the network transmission of data security and consistency, to solve this problem this thesis, performance of network communications software technology to achieve self-monitoring and self-recovery, while use of end to end encryption to encrypt data on the transmission , which can guarantee data reliability, completeness, real time and security.


Sign in / Sign up

Export Citation Format

Share Document