Displaying 6 results from an estimated 6 matches for "algortihms".
Did you mean:
algorithms
2006 Feb 16
1
Speex VAD&denoise algorithms on TMS320C6713
Hello,
I'm almost beginner in DSPs and need advise. I did some simple applications on TMS, but now it's time for something bigger:).
I'd like to implement VAD & denoise algortihms on TMS320C6713 in real-time, one channel.
Can I use part of Speex for it? Is Speex sufficiently efficient? I try Speex on PC and it works very good.
Any advise will be helpful.
chojny
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.xiph.org/pipermail/sp...
2005 Jan 06
1
nls - convergence problem
Dear list,
I do have a problem with nls. I use the following data:
>test
time conc dose
0.50 5.40 1
0.75 11.10 1
1.00 8.40 1
1.25 13.80 1
1.50 15.50 1
1.75 18.00 1
2.00 17.00 1
2.50 13.90 1
3.00 11.20 1
3.50 9.90 1
4.00 4.70 1
5.00 5.00 1
6.00 1.90 1
7.00 1.90 1
9.00 1.10 1
12.00 0.95 1
14.00
2004 Aug 06
4
load balancing
> > One more detail about Icecast2 that I'd like to know is whether there is
any
> > load-balancing feature implemented or about to be implement? ...
> I haven't heard or seen of this, nor do I think load balencing as you
> describe it could be done seamlessly without modifying the media player.
I made some tests and it turned out that Winamp, mpg123 and even MS Media
2003 Dec 17
2
TODO hardlink performance optimizations
On Mon, 15 Dec 2003, jw schultz <jw@pegasys.ws> wrote:
> OK, first pass on TODO complete.
....
> PERFORMANCE ----------------------------------------------------------
....
> Traverse just one directory at a time
>
> Traverse just one directory at a time. Tridge says it's possible.
>
> At the moment rsync reads the whole file list into memory at the
>
2004 Aug 06
3
protocol documentation + load balancing
> > I am looking for a documentation of the communication protocolls icecast
is
> > capable of: ICY, XAUDIOCAST and a modified HTTP...
> You should use libshout2. It's a handy dandy library...
Yeah, I am familiar with this library, but as I know this is just for
sources. I am more interested in requirements clients have to meet, what
header response options are available, and
2017 Oct 27
3
Password encription
Aki Tuomi wrote:
> The use of salt, today, is to prevent the attacker from directly seeing
> who has same passwords. Of course it also will make a rainbow table
> attack less useful,
Not just less useful, but almost infeasible. Given the use of random
salts, you would have to generate (number of possible salts) rainbow
tables. This drastically changes the CPU/storage tradeoffs.
>