Displaying 6 results from an estimated 6 matches for "algortihm".
Did you mean:
algorithm
2006 Feb 16
1
Speex VAD&denoise algorithms on TMS320C6713
Hello,
I'm almost beginner in DSPs and need advise. I did some simple applications on TMS, but now it's time for something bigger:).
I'd like to implement VAD & denoise algortihms on TMS320C6713 in real-time, one channel.
Can I use part of Speex for it? Is Speex sufficiently efficient? I try Speex on PC and it works very good.
Any advise will be helpful.
chojny
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.xiph.org/pipermail/s...
2005 Jan 06
1
nls - convergence problem
...maximum of 13
I do not understand this error message for two reasons:
1. Apparently the algorithm has converged, at the end of the output the
change of parameter estimates seems to be less than 0.001
2. If the maximum number of iterations is reached I would expect a
warning in the case that the algortihm did not converge. However, here
the algorithm apparently has converged. Thus I do not understand what
happened.
What can I do to deal with this problem?
Any help is appreciated!
Many thanks
peter
2004 Aug 06
4
load balancing
...changes on client side.
This is what I thought of:
client requirements:
- handling HTTP 302 response status together with HTTP-Location attribute
properly
erver requirements:
- Slave - telling the Master how many clients are connected
- Master - using Slave information to fulfill load balancing algortihm
And this is how it works:
Every Slave sends its load data (how many clients connected and the defined
maximum of clients) to the Master (propably included in the
master-update-interval procedure). Therefore, the Master knows which Slaves
are connected and working, and which has the lowest load. Th...
2003 Dec 17
2
TODO hardlink performance optimizations
...riting modifications to it need only to be done for the first name.
> For all later names, we just create the link and then leave it
> alone.
An earlier thread started 11/25/2003 points out that in certain cases,
a hardlinked file is unnecessarily transferred in full. This is due
to the algortihm described above. If the first file in the sorted list
is missing, but a later one exists, then that file should be used as
the master. I've been thinking of solutions to this as well. But
not until after 2.6.0 is released.
> If hard links are to be preserved:
>
> Before the...
2004 Aug 06
3
protocol documentation + load balancing
> > I am looking for a documentation of the communication protocolls icecast
is
> > capable of: ICY, XAUDIOCAST and a modified HTTP...
> You should use libshout2. It's a handy dandy library...
Yeah, I am familiar with this library, but as I know this is just for
sources. I am more interested in requirements clients have to meet, what
header response options are available, and
2017 Oct 27
3
Password encription
Aki Tuomi wrote:
> The use of salt, today, is to prevent the attacker from directly seeing
> who has same passwords. Of course it also will make a rainbow table
> attack less useful,
Not just less useful, but almost infeasible. Given the use of random
salts, you would have to generate (number of possible salts) rainbow
tables. This drastically changes the CPU/storage tradeoffs.
>