voice message
Recently Published Documents


TOTAL DOCUMENTS

99
(FIVE YEARS 50)

H-INDEX

4
(FIVE YEARS 2)

Author(s):  
Hussein Abdulameer Abdulkadhim ◽  
Jinan Nsaif Shehab

Although variety in hiding methods used to protect data and information transmitted via channels but still need more robustness and difficulty to improve protection level of the secret messages from hacking or attacking. Moreover, hiding several medias in one media to reduce the transmission time and band of channel is the important task and define as a gain channel. This calls to find other ways to be more complexity in detecting the secret message. Therefore, this paper proposes cryptography/steganography method to hide an audio/voice message (secret message) in two different cover medias: audio and video. This method is use least significant bits (LSB) algorithm combined with 4D grid multi-wing hyper-chaotic (GMWH) system. Shuffling of an audio using key generated by GMWH system and then hiding message using LSB algorithm will provide more difficulty of extracting the original audio by hackers or attackers. According to analyses of obtained results in the receiver using peak signal-to-noise ratio (PSNR)/mean square error (MSE) and sensitivity of encryption key, the proposed method has more security level and robustness. Finally, this work will provide extra security to the mixture base of crypto-steganographic methods.


2021 ◽  
Vol 6 (1) ◽  
pp. 3
Author(s):  
Tamara von Sawitzky ◽  
Thomas Grauschopf ◽  
Andreas Riener

Numerous statistics show that cyclists are often involved in road traffic accidents, often with serious outcomes. One potential hazard of cycling, especially in cities, is “dooring”—passing parked vehicles that still have occupants inside. These occupants could open the vehicle door unexpectedly in the cyclist’s path—requiring a quick evasive response by the cyclist to avoid a collision. Dooring can be very poorly anticipated; as a possible solution, we propose in this work a system that notifies the cyclist of opening doors based on a networked intelligent transportation infrastructure. In a user study with a bicycle simulator (N = 24), we examined the effects of three user interface designs compared to a baseline (no notifications) on cycling behavior (speed and lateral position), perceived safety, and ease of use. Awareness messages (either visual message, visual message + auditory icon, or visual + voice message) were displayed on a smart bicycle helmet at different times before passing a parked, still-occupied vehicle. Our participants found the notifications of potential hazards very easy to understand and appealing and felt that the alerts could help them navigate traffic more safely. Those concepts that (additionally) used auditory icons or voice messages were preferred. In addition, the lateral distance increased significantly when a potentially opening door was indicated. In these situations, cyclists were able to safely pass the parked vehicle without braking. In summary, we are convinced that notification systems, such as the one presented here, are an important component for increasing road safety, especially for vulnerable road users.


Author(s):  
Stefan Tretter ◽  
Sarah Diefenbach

Abstract. The mediating nature of communication technologies (e.g., telephone, voice message, or chat) can buffer the experience of conversations by establishing a figurative shield between sender and receiver. From a psychological perspective, this buffer effect may affect senders’ communication channel choices depending on their respective communication goals. Building on the impression management model of strategic channel use ( O’Sullivan, 2000 ), we examine how valence and locus of a message and the interlocutors’ relationship lead to differences in the buffer effect people establish through their channel choices. In two vignette-based, mixed-design studies, participants indicated which channel they would choose to communicate with a receiver in different situations, depending on the valence of the episode (positive vs. negative; Studies 1 and 2), who is at the center of the issue (self vs. other; Studies 1 and 2), and their interpersonal closeness (friend vs. acquaintance; Study 2). In Study 1, people chose channels with a higher buffer effect for negative (vs. positive) issues and episodes that focused on themselves (vs. the receiver). Study 2 supported a moderating effect of relationship. While people still chose channels with higher buffer effects for negative (vs. positive) issues in the acquaintance condition, the opposite was true when people were to communicate with friends. We attribute this to the higher salience of relational compared to self-presentational communication goals under increasing interpersonal closeness. The present studies expand the impression management model by focusing on the subjective buffer effect of communication channels and introducing the decisive role of relationship in its application.


2021 ◽  
Author(s):  
Kazuya Ogawa ◽  
Yoshito Kawakatsu ◽  
Nobuhiro Kadoi ◽  
Olukunmi Omobolanle Balogun ◽  
Adefunke Oyeniyi Adesina ◽  
...  

BACKGROUND Voice messages have been employed as the effective and efficient means for increasing health service utilizations and health promotion in low- and middle-income countries. Yet, unlike SMS, voice message services require their users to pick up a phone call at the time of its delivery. Furthermore, voice messages are difficult for the users to review their contents afterwards. While recognizing that voice messages are more friendly to specific groups (eg, illiterate or less literate populations), there should be several challenges in successfully operationalizing its intervention program. OBJECTIVE This study is aimed at estimating the extent to which voice message service users pick up the phone calls of voice messages and complete listening up to or beyond the core part of voice messages. METHODS A voice message service program composed of 14 episodes on maternal, newborn and child health was piloted in Lagos, Nigeria, during the period from 2017 to 2019. A voice message call of each of 14 episodes was delivered to the mobile phones of the program participants, per day for 14 consecutive days. A total of 513 participants in the voice message service chose one of five locally spoken languages as the language to be used for voice messages. Two multilevel logistic regression models were created: (1) Model 1 for testing whether a voice message call is picked up; and (2) Model 2 for testing whether a voice message call having been picked up is listened to up to the core messaging part. RESULTS The greater the voice message episode number became, the smaller proportion of the participants picked up the phone calls of voice message (aOR: 0.98; 95% CI: 0.97-0.99; P=.01). Only 854 of 3765voice message calls having been picked up by the participants (22.7%) were listened to up to their core message parts. It was found that the level of sequentiality between picking up a phone call of a voice message and listening up to the core message part was low. This indicates discontinuity between these two actions. CONCLUSIONS The participants were likely to stop picking up the phone as the episode number of voice messages progressed. In view of discontinuity and independence between picking up a phone call and listening up to the core message part, we should not assume that those picking up the phone would automatically complete listening to the entire or core voice message.


2021 ◽  
Author(s):  
Lavanya Dhanesh ◽  
Monica S ◽  
Revathi R ◽  
Suganya S ◽  
Swetha Lakshmi K N

This paper tries to overcome the shortcomings of the recent technology that fails to enhance the communication between physically disabled people by designing an assistive device. This device uses a GSM modem with a SIM card and no smartphones are needed which makes the device affordable. Here, the sender sends the message to the phone number of the disabled person and he/she receives the SMS that gets converted to text and voice message and vibrations to Braille pad using a microcontroller which is easily readable by the disabled person.


2021 ◽  
Author(s):  
Steffen Kühn

One of the basic assumptions of physics is that information cannot be transferred more rapidly than light. If one equates information with data, then information transfer is a process in which data are transmitted between two remote locations. According to this basic principle, the transmission process should require an appropriate amount of time so that the distance between these locations divided by the needed time does not exceed the speed of light in a vacuum. However, it is technologically feasible to transmit a voice message, music, or any bit sequence at a low bit rate between locations separated by hundreds of meters, with almost no loss of time. Herein, we demonstrate that this behavior most likely does not contradict special relativity, and we explain this phenomenon based on a model of a superconducting cable.


2021 ◽  
Author(s):  
Steffen Kühn

One of the basic assumptions of physics is that information cannot be transferred more rapidly than light. If one equates information with data, then information transfer is a process in which data are transmitted between two remote locations. According to this basic principle, the transmission process should require an appropriate amount of time so that the distance between these locations divided by the needed time does not exceed the speed of light in a vacuum. However, it is technologically feasible to transmit a voice message, music, or any bit sequence at a low bit rate between locations separated by hundreds of meters, with almost no loss of time. Herein, we demonstrate that this behavior most likely does not contradict special relativity, and we explain this phenomenon based on a model of a superconducting cable.


Author(s):  
Falohun Adeleye Samuel ◽  
Adegbola Oluwole Abiodun ◽  
Adedeji Oluyinka Titilayo ◽  
Makinde Bukola Oyeladun ◽  
Taiwo Olayinka David ◽  
...  

Home security is extremely important, and several methods of security have been improved, such as the usage of alarms, monitoring systems, and the interplay of electronic hardware, software, and other factors. Keys can be misplaced and found by others, putting the guarded structure at risk; keys can also be fabricated or stolen. This project entails creating a voice message-based door access system that can both open the door and identify intruders, trespassers, criminals, or any other type of illegal behaviour. The speech-controlled door was meant to generate a voice message based on the input data and was developed around a microcontroller (ATmega328p). A speech recognition module is used to allow the owner or user entry to the door. To gain access to the door, the owner must first utter the specific speech or key word required to open it. A voice notification is then outputted through the associated speaker if the pronounced word does not match the speech recognized by the microcontroller. To signify that access is refused, a red-light emitting diode will flash. The microprocessor would activate a relay and current will flow through the latch, allowing the door to be unlocked, if the uttered speech matches. A speech recognition module is used to allow the owner or user entry to the door. To gain access to the door, the owner must first utter the specific speech or key word required to open it. A voice notification is then outputted through the associated speaker if the pronounced word does not match the speech recognized by the microcontroller. To signify that access is refused, a red light emitting diode will flash. The microprocessor will activate a relay and current will flow through the latch, allowing the door to be unlocked, if the uttered speech matches.


Author(s):  
Н.В. Матвеева

Данная статья посвящена описанию проведенного исследования, целью которого является изучение замысла или предмета речевой деятельности путем последовательного анализа каждого этапа порождения речевого высказывания от внешней формы текста до замысла автора по модели А.А. Леонтьева. Для проведения данного исследования были поставлены и решены задачи визуализации операции определения основных смысловых единиц предметного содержания речевого высказывания, визуализации операции определения «иерархии» смысловых единиц в «контексте» речевого сообщения и визуализации операции определения последовательности отображения смысловых элементов в речевом высказывании. Для анализа результатов, полученных на каждом этапе исследования, используются различные средства, такие как существующие программы семантического анализа текста и методика построения денотатного графа А.И. Новикова. Данная работа проведена для определения замысла автора на материале текстов англоязычных блогов, так как данные тексты могут быть рассмотрены как речевое высказывание, представленное в письменной форме, имеющее свою интенцию и направленное на адресата. The present paper is devoted to the investigation of the intention of a speaker or decoding the author's idea of a speech utterance. The purpose of this research is to study the idea or subject of speech activity by analyzing each stage of speech utterance generation from the external form of the text to the author's idea according to the model of A.A. Leontiev. To conduct this study some tasks were set and solved such as the task of visualizing of the operation of determining the basic semantic units of the subject content of speech, rendering of the operation of the definition of "hierarchy" semantic units in the "context" of a voice message, and visualizing of the operation of determining the display order of semantic elements in speech utterance. To analyze the results obtained at each stage of the study, various tools are used, such as existing programs for semantic text analysis and the method of constructing a denotative graph by A.I. Novikov. This work is carried out to determine the author's intention based on the material of texts of English-language blogs, since these texts can be considered as speech utterances presented in writing, having its own intention and directed at the addressee.


Sign in / Sign up

Export Citation Format

Share Document