User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
  Citation Number 1
 Views 12
 Downloands 1
METHODS OF FACTORIAL CODING OF SPEECH SIGNALS
2019
Journal:  
Radio Electronics, Computer Science, Control
Author:  
Abstract:

Abstract Context. The paper outlines the methods of factorial coding of speech signals using a factorial code to provide integrated information security and to maintain a receiver and transmitter clock phase. By integrated information security, for the methods proposed in this article, we mean data protection from effects of noise in communication channel and attempts of data unauthorized access in open multiple access telecommunication networks. Objective. The goal of the research is to provide integrated protection of real-time speech signals based on factorial coding. For this, the methods for factorial coding of speech signals and building speech codecs have been developed. These methods are based on the properties of factorial codes to keep synchronism with the working signal, to detect a significant part of errors caused by the action of noise, natural or created intentionally, to provide the ability to correct all detected errors with a finite accuracy, as well as to provide cryptographic protection against voice message unauthorized listening by hiding the law of converting speech signal samples into a permutation. Method. The main idea of the proposed methods is to choose permutations for information transferring with a specific set of properties and features that provide the ability to correct errors detected by code and to recover speech signal samples with a finite degree of accuracy (with a nonzero aperture). Results. The procedures for information coding/decoding have been determined. The results of the experimental evaluation of the model of such systems when working on a communication channel with both independent and multiple bit errors are presented. The magnitude of decoding noise due to the finite accuracy of speech signal samples recovery is determined as a function of bit error probability in a communication channel. Conclusions. The proposed methods of factorial coding of a speech signal provide integrated information security and recovery with finite accuracy of speech signal samples deformed by noise in communication channel. The requirements to the quality of communication channel (to the value of bit error probability) for comfortable speech perception are determined. Author Biographies E. V. Faure, Cherkasy State Technological University, Cherkasy Dr. Sc., Associate Professor, Vice-Rector for Research and International Relations V. V. Shvydkyi, Cherkasy State Technological University, Cherkasy PhD, Associate Professor, Associate Professor of Department of Information Security and Computer Engineering A. O. Lavdanskyi, Cherkasy State Technological University, Cherkasy PhD, Associate Professor of Department of Information Security and Computer Engineering O. O. Kharin, Cherkasy State Technological University, Cherkasy Post-graduate student of Department of Information Security and Computer Engineering References Gnatyuk S. Critical Aviation Information Systems Cybersecurity, Meeting Security Challenges Through Data Analytics

Keywords:

Citation Owners
Attention!
To view citations of publications, you must access Sobiad from a Member University Network. You can contact the Library and Documentation Department for our institution to become a member of Sobiad.
Off-Campus Access
If you are affiliated with a Sobiad Subscriber organization, you can use Login Panel for external access. You can easily sign up and log in with your corporate e-mail address.
Similar Articles










Radio Electronics, Computer Science, Control

Journal Type :   Uluslararası

Metrics
Article : 805
Cite : 251
2023 Impact : 0.025
Radio Electronics, Computer Science, Control