Premium Essay

Nt1310 Unit 1 Research Paper

Submitted By
Words 851
Pages 4
Task 1:
Speech is the ability humans have developed to communicate between themselves with the sound produced by their mouth and nose.
There are two types of speech sounds: The voiced and unvoiced one. A voiced sound is created when air pass through our vocal cord in direction of the mouth. This air vibrates in a certain frequency, normally between 50 and 400 Hz that produces the sound heard and desirably understood by the receiver ears. This frequency is controlled by varying the shape of the air channel, as changing the mouth position or the tongue, working as a filter, allowing the desired frequencies for the expected sound to pass; and by the speaker age and sex.
The unvoiced speech are created by making air go through an opening, not vibrating the vocal cords, and, consequently, not been as …show more content…
This process is done by sampling, quantization and encoding. These waveform coders do not have any previous knowledge about the signal being converted, meaning that, theoretically, they should be signal independent.
Generally, these coders work at sample rates above 16 kb/s, degrading the recovered speech quality drastically if it works below this rate.
They usually are Time Domain or Frequency Domain coders. The simplest coder is Pulse Code Modulation (PCM), which is a Time Domain coder. Its task simply involves sampling and quantizing the input signal. Its main problems are the requirement of a high bit rate around 96 kb/s and the high susceptibility to channel errors. Other types of Time Domain coders are the Differential Pulse Code Modulation (DPCM) and the Adaptive Differential Pulse Code Modulation (ADPCM), which uses the predictability of the signal to predict it, and quantize the difference between the predicted and the original signal making the bit rate to be transmitted smaller for the same

Similar Documents

Premium Essay

Nt1310 Unit 1 Research Paper

...NAME : CHOW MENG HONG STUDENT ID : GEC 0000 OD1 UNIT CODE : VU21323 TASK 1 1. I’LL COMPLETE THE EAL CERTIFICATE III AND IV HERE IN MELBOURNE AND AFTER THAT I’LL GO BACK TO MALAYSIA TO WORK AT A HIGHER POSITION IN MY WORK. 2. I WANT TO IMPROVE MY SPEAKING AND LISTENING SKILLS IN THIS CAREER 3. I CAN MOSTLY COMPLETE READING AND WRITING, BUT MY SPEAKING AND LISTENING SKILLS STILL NEED TO BE IMPROVED. 4. I HAVE COMPLETED A SECONDARY SCHOOL LEVEL AND LCCI LEVEL IN MY COUNTRY, MALAYSIA. 5. I NEED TO TAKE CERTIFICATE III AND IV IN EAL COURSE FOR MY CAREER. 6. GOOGLE.COM 7. TWO YEARS. 8. MELBOURNE 9. - IMPROVE MY LISTENING SKILL - IMPORVE MY SPEAKING SKILL - COMPLETE CERTIFICATE III IN EAL - COMPLETE CERTIFICATE IV IN EAL - BACK TO MALAYSIA - WORK...

Words: 1034 - Pages: 5

Premium Essay

Nt1310 Unit 1 Research Paper

...Q1. (i) I have depicted the 3 naturally accruing isotopes of hydrogen. Hydrogen-1, sometimes known as Protium or just hydrogen, hydrogen-2, also known as Deuterium and finally Hydrogen-3, which is also known as Tritium. Although each isotope has a different number of neutrons; 0, 1 and 2, respectively. This has no impact on their chemical properties. But, it does however affect the physical properties. Namely their mass. Whereas Hydrogen-1 has an atomic mass of 1amu, Hydrogen-2 has an atomic mass of 2, due to the presence of a neutron in addition to the proton within the nucleus. And Hydrogen-3 has an atomic mass of 3amu as a result of another additional neutron. Each isotope also differs in its’ nuclear binding energy, this is a result...

Words: 1878 - Pages: 8

Premium Essay

Nt1310 Unit 1 Research Paper

...MWR ASSIGNMENT 1 1. List the important microwave connectors Microwave connectors is a huge industry and there are many new types of being designed each year. Each connectors have their own frequency limit. Here are some of the connectors [1] • BNC Connector- It is used to quickly connect and disconnect the ends of a coaxial cable to any port, these are mostly found on the ends of the probes of an oscilloscope. They support up to a maximum of 4 GHz. • OSMT Connector- This is a surface mounted connector and is generally used on a PCB as they consume lesser space as compared against the usual Coaxial cable connectors. They support up to a maximum of 6 GHz. • N Connector- One of the first connectors capable of handling microwave waves invented by Neill, this was initially designed to carry...

Words: 656 - Pages: 3

Premium Essay

Nt1310 Unit 1 Research Paper

... SUBJECT: OPERATING SYSTEMS ASSIGNMENT: HOME WORK ASSIGNMENT-2 Submitted by: MOHAN KUMAR RAJU BORUKATI mborukati@rivier.edu Q(1): Let S and Q be two semaphores initialized to 1. Can the code for processes P0 and P1 shown below cause a deadlock? Explain your answer. (Compare the code below to the example on page 217 of the textbook.) P0 P1...

Words: 1060 - Pages: 5

Premium Essay

Nt1310 Unit 1 Research Paper

...__________________________________ is the chance or likelihood of some event occurring. The _________________________ of rolling 1 on a 12 sided dice is 1/12. __________________________ is the result of a trial of a probability experiment. I pulled a red marble out of a bag that had 5 red marbles and 5 blue marbles the _____________________ is that I pulled a red marble out. Find the probability of selecting a letter at random from the word MISSISSIPPI. Write the probability as a fraction. P(M) P(I)...

Words: 1694 - Pages: 7

Premium Essay

Nt1310 Unit 1 Network Research Papers

...receive signal. Transport layer 4, which is the segment . Protocol working from this layer are TCP and UDP, TCP is for reliable connection, to make sure the datagrams arrives at the destination and UDP is for unreliable , unlike TCP using UDP there will not be any confirmation source like TCP, when the latency (signal) is bad you would use UDP. The network layer which is layer 3, it provides connection between host on different network, the datagrams on layer 3 are called packets where IPv6 and IPv4 begins process. Next, is layer 2 which is data connection which is known as data link, this is where ethernet will be operating. Also Mac addresses also know as hardware addresses, the layers on layer 2 are called frames. Lastly, Layer 1 they are for devices such hubs,connectors and cables. The physical layer describes all electricals and physical specifications for devices. The data are called bits. When troubleshooting it will always start at the physical layer. TCP TCP which stand for Transmission Control Protocol, it is a protocol of which works with reliability, it guarantees delivery of data from sender to receiver. TCP works at the transport layer which is layer 4. TCP three-way handshake, these are the steps on how it works it establishes the route of device is present on the network, 2. It verifies the information of which is being sent has an active service which will be accepting request on numbers of ports which clients are wanting to use for these sessions...

Words: 974 - Pages: 4

Premium Essay

Nt1310 Unit 1 Networking Research Paper

...Task 1.1 and 1.2, Significant features of Local Area Networks. A Describe in detail peer to peer. Peers are computer networks that are connected to each other through the internet. Files can be shared directly between systems without the need of a central server, which makes each computer on a p2p system its own client as well as a file server. A P2P (peer to peer) network requires only that you have an internet connection and P2P software such as, Kazaa , LimeWire, or bearshare. When a P2P is connected it allows you to search for files on other peoples computers, while at the same time allows other users on the network to access yours that are typically assigned onto a single folder that you have designated to share. One of the main upsides to a p2p network is that it does not need an expensive server as each individual computer acts as one. The user sets their own privacy settings as to which files are accessible to others. When a computer fails it does not affect the other parts of the network, though the files from the non-functioning computer are inaccessible. The p2p as with all networks has its downsides. There is no central backup for files, and files are difficult to locate if the computers owner has no logical filing system. The network requires a joint effort from each individual user to ensure that viruses are not introduced into the entire network. There is essentially no security other than user permission settings. Describe client server: Client/server, is...

Words: 1570 - Pages: 7

Premium Essay

Nt1310 Unit 1 Bridge Research Paper

... Bridge A software/hardware that have job as a media to connect separate networks together so they can communicate each other called as a bridge. For example, there a two networks. The first one the device are connected by wireless technology and other by cables. The device which using wireless only can communicate with other wireless and the wired device only can communicate with wired also. So, all device can communicate with each other using a network bridge. It also determines a data packet are allowed or not to the other part of the Ethernet segments. Router Router is a device that allows the similar network to interchanges data packets between them. Similar network like same servers, workstations and protocols. Routers forward data based on information at layer 3. Nowadays, every home share a broadband internet connection by using a wireless routers. Also, people can give password to their routers to manage the traffic and forward to the correct computer only. Router also have other advantages like can connect to different WAN (Wide Area Network). So, we can find the usage of router to WAN of a network or larger networks. DSL Modem Internet is a computer network which have part to connect one device to another device base on TCP/IP (Internet Protocol). Have many ways to connect a device to the internet, one of them is by using DSL Modem. DSL stands for Digital Subscriber Line, which is a device which can send a signal by using a copper wire or telephone cable. Some part...

Words: 777 - Pages: 4

Premium Essay

Nt1310 Unit 1 Test Research Paper

...Controlled Assessment Task 1 Test What to test How to carry out the test Expected Outcome Actual Outcome Action Needed 1a Green button that works. You tap the green button. Expect to see green dot or line when you draw with your finger. Green line drawn on the screen. No action needed. Works successfully. 1b Blue button that works. You tap the blue button. Expect to see blue dot or line when you draw with your finger. Blue line drawn on the screen. No action needed. Works successfully. 1c Red button that works. You tap the red button. Expect to see red dot or line when you draw with your finger. Red line drawn on the screen. No action needed. Works successfully. 1d Wipe button that works. You tap...

Words: 856 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment 1 Research Paper

...ASSIGNMENT 3 1. Using only the following protocols (ARP, DNS, HTTP, ICMP, IP, NTP, RTP, UDP, TCP), describe the steps involved when the Internet host red.color.net pings another host green.paint.net. Describe this step by step, in detail- what happens in each host. Assume all caches are empty (i.e. No name or address resolution has been done, yet) You have to think through the whole chain of how address discovery works and what protocols are used at every step. Let red.color.net be Host A with IP Address 192.168.1.100 and green.paint.net be Host B with IP Address 192.168.1.200. Let’s assume that Host B have a web server running on it, and its port 80 is ready to accept http connections. Now, we open a web browser in Host A and type the URL...

Words: 977 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment 1 Research Paper

... Locate the USB ports on the Surface Dock and connect your computer peripherals. 4. Locate a Mini Display Port on the Surface Dock and connect a cable from the monitor to it. You may need to purchase another cable or an adapter if you discover that the monitor cable does not have a Mini DisplayPort connector 5. Connect any accessories for audio purposes, such as speakers or headphones. Without outer speakers, it may be impossible to hear audio when you are using your Surface Pro 4. If this so, go to Troubleshoot Surface Dock on Surface.com to find out how to switch to the built-in speakers on your Surface. With this done you can now connect to your monitors and peripherals with a sole connection to the power port on your Surface Pro: 1. Plug out the Surface power supply and remove any accessories that are attached to the device. A microSD card can be left in themicroSD card slot. 2. Using the cable provided, connect Surface Dock to the charging port of your Surface. Connect or project to a monitor, screen, or other...

Words: 1020 - Pages: 5

Premium Essay

Nt1310 Unit 1 Data Communication Research Paper

...Semantics communicates with each section of bits such as how it will specify the pattern to be interpreted and what action is to be taken based on that interpretation. Finally it will identify the route to send the message to the final destination. Timing: It discussed about two characteristics, one when the data should be sent and second how fast the data can be sent. Sometimes when data is transmission there will be chances for overload due to that a huge data will be lost. Protocol Architecture: There is several protocol architecture which will be defines the objects and procedures how the data will exchange between the devices. For example TCP/IP protocol architecture, it has a five layers and the model is known as DARPA (Defense Advanced Research Project Agency). The five layers of DARPA model are • Application • Transport •...

Words: 541 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1 Research Paper

...Save Incase you are unable to find the router IP address, it can be found using command prompt. For the same, follow below steps 1. Click Windows + X 2. Power User Menu opens up. 3. Then Click Command Prompt. 4. Type- “ipconfig”. This will display all the connections established on your computer 5. Look out for “ Default Gateway” 6. This gateway is under LAN tab 7. The default gateway is basically the IP address of your route Why is critical to change username and password of your router? The routers shipped from manufacturers come with default password and username. The Manufacturers use a standard combination of username and password. Easy way of identification is seeing the sticker on the router hardware device. Example- Motorola uses Username as admin and password as admin or password. Similarly other players have basic passwords which mandatorily should be changed as soon as purchase is done to avoid any hacks/leaks from your system Incase your IP 192.168.1.254 is not working, then what to do? Try following below options before contacting the service centre of the manufacturer 1. Ensure you have entered the correct address using HTTP:// 2. Some people mistake // with \\, so ensure correct...

Words: 494 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 1 Research Paper

...Name: MUTAIB HAIL ALSAHLI ID: 120004631 Answer, Question number 1, Before we talk about the differences there are Some people who may easily forget the fact that the USB Type-C and USB 3.1 are different from each other, considering the fact that both cross platforms were developed by the USB Forum (USB-IF) simultaneously, USB Type-C is a physical connector and USB 3.1 is a technology standard. Compatible devices can transfer data at a very high speed of up to 10GB per second.USB 3.1 standard allows for high-speed data transfer, but other devices such as tablets and smartphones might not transfer data that fast's Type-C and USB 3.1 are often confused with each other. The main difference between the two is that USB Type-C is developed to support USB 3.1 signals. Some devices might have Type-C connectors which only support the older USB standards such as USB 2.0 and USB 3.0. With more and more devices such as the new Lumia, Nexus are getting equipped with USB Type-C connectors combined with USB...

Words: 445 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 1 Research Paper

...Those of you with an iPhone, iPad and iPod touch capable or running the original iOS 9 software release can now update to the latest iOS 9.0.2 software update manually using the IPSW files. The official release of iOS 9.0.2 arrived a few weeks ago now, but with the latest Pangu 9 jailbreak for iOS 9.0.2 just released, you might want the official iOS 9.0.2 IPSW files to download and install on your computer. The reason is that you should not install the Pangu 9 jailbreak on your device if you updated to iOS any iOS 9 firmware over the air. That includes all of the people who are running iOS 9.0.2 but accepted the over the air notification. Of course, the links aren't just available for those wanting to jailbreak. Any of you can install these files if you are just wanting to restore your device or update the device manually. The iOS 9.0.2 changelog: This update contains bug fixes and improvements, including Fixes an issue with the setting to turn on or off app mobile data usage. Resolves an issue that prevented iMessage activation for some users. Resolves an issue where an iCloud Backup could be interrupted after starting a manual backup. Fixes an issue where the screen could incorrectly rotate when receiving notifications. Improves the stability of Podcasts. There's also a large security fix for the photos app and contacts from the lock screen you can read about here: iOS 9.0.2 Lock Screen Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad...

Words: 545 - Pages: 3