946 resultados para Voice synthesization


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Acoustically, car cabins are extremely noisy and as a consequence audio-only, in-car voice recognition systems perform poorly. As the visual modality is immune to acoustic noise, using the visual lip information from the driver is seen as a viable strategy in circumventing this problem by using audio visual automatic speech recognition (AVASR). However, implementing AVASR requires a system being able to accurately locate and track the drivers face and lip area in real-time. In this paper we present such an approach using the Viola-Jones algorithm. Using the AVICAR [1] in-car database, we show that the Viola- Jones approach is a suitable method of locating and tracking the driver’s lips despite the visual variability of illumination and head pose for audio-visual speech recognition system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This collaborative event was organised to coincide with International celebrations by the International Council of Societies of Industrial Design (ICSID). The panel discussion involved industrial designers from a variety of backgrounds including academics, theorists and practitioners. Each panel member was given time to voice their opinion surrounding the theme of WIDD2010 "Industrial Design: Humane Solutions for a Resilient World". The discussion was then extended to the audience through active question and answer time. The panel included: * Professor Vesna Popovic FDIA - Queensland University of Technology * Adam Doyle, Studio Manager - Infinity Design Development * Scott Cox MDIA, Creative Director - Formwerx * Alexander Lotersztain, Director - Derlot * Philip Whiting FDIA, Design Convenor - QCA * Professor Tony Fry, Director Team D/E/S & QCA After this, the documentary by Gary Hewtsit "Objectified" was then screened (75 min).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Acoustically, car cabins are extremely noisy and as a consequence, existing audio-only speech recognition systems, for voice-based control of vehicle functions such as the GPS based navigator, perform poorly. Audio-only speech recognition systems fail to make use of the visual modality of speech (eg: lip movements). As the visual modality is immune to acoustic noise, utilising this visual information in conjunction with an audio only speech recognition system has the potential to improve the accuracy of the system. The field of recognising speech using both auditory and visual inputs is known as Audio Visual Speech Recognition (AVSR). Continuous research in AVASR field has been ongoing for the past twenty-five years with notable progress being made. However, the practical deployment of AVASR systems for use in a variety of real-world applications has not yet emerged. The main reason is due to most research to date neglecting to address variabilities in the visual domain such as illumination and viewpoint in the design of the visual front-end of the AVSR system. In this paper we present an AVASR system in a real-world car environment using the AVICAR database [1], which is publicly available in-car database and we show that the use of visual speech conjunction with the audio modality is a better approach to improve the robustness and effectiveness of voice-only recognition systems in car cabin environments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper attempts to address some fundamental issues faced by new and emerging researchers in the discipline of Fashion design. A culture of patchwork research methodology appears to have become the norm in an attempt to ‘fit’ fashion design research into an academic paradigm for the examination of readers from more traditional research fields such as Arts, Humanities, Science and Philosophy. Two key questions are discussed here; is it appropriate for fashion researchers to adopt and adapt existing research methodologies to find a scholarly, academic voice? Secondly; do these methodologies enable fashion design research to be effectively disseminated to professionals and fellow researchers within the discipline of fashion design?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Through an exploration of representations of metamorphosis and the creation of a body of written work, this thesis uses a critical examination of theoretical approaches to metamorphosis in combination with textual analysis of representations of metamorphosis and creative practice as research to arrive at the beginnings of an ethic of writing. The creative work, The Coming, consists of a collection of short fiction, The Coming, and two collections of poetry, Orison and Milagros. The exegesis, Transhuman Change: towards an ethic of writing, explores theories about metamorphosis as a figure for writing, as a trope, and as a motif for exploring identity to contextualise the analysis of representations of metamorphosis from which the ethic is developed. With reference to the psychosexual development theory of Jacques Lacan and Elaine Scarry’s philosophy of the body, pain, language and creativity, the exegesis examines existing approaches to metamorphosis and uses supplementary textual analysis of influential representations of metamorphosis from Ovid to Pygmalion, X-Men and Extreme Makeover to explore assumptions about the body, language, the self, gender in western culture. The limitations of the performance of representations of metamorphosis as a figure for the self’s survival of death are considered in the light of voice as metonym for self to propose an ethic which valorises life. The experience of sex and the construction of gender in representations of metamorphosis are considered in the light of Lacan’s theory of desire and Scarry’s theory of the body and language to propose an ethic of representing gender ironically. The motif of the faithless lover and the Pygmalion myth are considered in the light of the (m)other’s role in language to propose an ethic in which indeterminacy constitutes the condition for being aware of oneself among selves. Each of the three proposals is discussed in relation to the short fiction, memoir and poems produced in the course of this research to test their limits and possibilities as the foundation of an emerging ethic of writing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research project examines the application of the Suzuki Actor Training Method (the Suzuki Method) within the work ofTadashi Suzuki's company in Japan, the Shizuoka Performing Arts Complex (SPAC), within the work of Brisbane theatre company Frank:Austral Asian Performance Ensemble (Frank:AAPE), and as related to the development of the theatre performance Surfacing. These three theatrical contexts have been studied from the viewpoint of a "participant- observer". The researcher has trained in the Suzuki Method with Frank:AAPE and SP AC, performed with Frank:AAPE, and was the solo performer and collaborative developer in the performance Surfacing (directed by Leah Mercer). Observations of these three groups are based on a phenomenological definition of the "integrated actor", an actor who is able to achieve a totality or unity between the body and the mind, and between the body and the voice, through a powerful sense of intention. The term "integrated actor" has been informed by the philosophy of Merleau-Ponty and his concept of the "lived body". Three main hypotheses are presented in this study: that the Suzuki Method focuses on actors learning through their body; that the Suzuki Method presents an holistic approach to the body and the voice; and that the Suzuki Method develops actors with a strong sense of intention. These three aspects of the Suzuki Method are explored in relation to the stylistic features of the work of SPAC, Frank:AAPE and the performance Surfacing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is a work of creative practice-led research comprising two components. The first component is a speculative thriller novel, entitled Diamond Eyes. (Contracted for publication in 2009 by Harper Collins: Voyager as the first in a trilogy, under the name AA Bell.) The second component is an exegesis exploring the notion of re-visioning a novel. Re-visioning, not to be confused with revision, refers to advance editing strategies required when the original vision of a novel changes during development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Theatre Audience Contribution introduces a new approach to theatre audience research: audience contribution through the post-performance discussion. This volume considers the physical and vocal behaviour of audience members as an integral part of the theatrical event that changes, adds to and informs the theatrical experience. Post-performance discussions, although rising in popularity, are yet an under-explored and under-utilised avenue for audience contribution. Beginning with an overview of reception theory and the historical role of theatre audiences, the author introduces a new method for the facilitation of post-performance discussions that encourages audience contribution and privileges the audience voice. Two case studies explore post-performance discussions that inform the theatrical event and discover a new role for the contemporary audience: audience critic. This accessible volume has significant implications for theatre theorists, practitioners and audiences alike.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores models of teaching and learning music composition in higher education. It analyses the pedagogical approaches apparent in the literature on teaching and learning composition in schools and universities, and introduces a teaching model as: learning from the masters; mastery of techniques; exploring ideas; and developing voice. It then presents a learning model developed from a qualitative study into students’ experiences of learning composition at university as: craft, process and art. The relationship between the students’ experiences and the pedagogical model is examined. Finally, the implications for composition curricula in higher education are presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Voice recognition is one of the key enablers to reduce driver distraction as in-vehicle systems become more and more complex. With the integration of voice recognition in vehicles, safety and usability are improved as the driver’s eyes and hands are not required to operate system controls. Whilst speaker independent voice recognition is well developed, performance in high noise environments (e.g. vehicles) is still limited. La Trobe University and Queensland University of Technology have developed a low-cost hardware-based speech enhancement system for automotive environments based on spectral subtraction and delay–sum beamforming techniques. The enhancement algorithms have been optimised using authentic Australian English collected under typical driving conditions. Performance tests conducted using speech data collected under variety of vehicle noise conditions demonstrate a word recognition rate improvement in the order of 10% or more under the noisiest conditions. Currently developed to a proof of concept stage there is potential for even greater performance improvement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper outlines some of the experiences of Indigenous women academics in higher education. The author offers these experiences, not to position Indigenous women academics as victims, but to expose the problematic nature of racism, systemic marginalisation, white race privilege and radicalised subjectivity played out within Australian higher education institutions. By utilising the experiences and examples she seeks to bring the theoretical into the everyday world of being Indigenous within academe. In analysing these examples, the author reveals the relationships between oppression, white race privilege, institutional privilege and the epistemology that maintains them. She argues that, in moving from a position of being silent to speaking about what she has witnessed and experienced, she is able to move from the position of object to subject and gain a form of liberated voice (hooks 1989: 9) for herself and other Indigenous women. She seeks to challenge the practices within universities that continue to subjugate Indigenous women academics.