Skip to main content

Home/ Globaltech/ Group items tagged voice

Rss Feed Group items tagged

anonymous

Google beefs up voice search with personal recognition - 5 views

  •  
    Describe the IT terms. march 29 jenny
  •  
    1.11_people_machines 3.2 _software
  •  
    1. Describe the IT terms. Patented - Granted and protected by rights. A patent is a set of exclusive rights granted by a state, national government, to the inventor for a limited period of time in exchange for a public disclosure of the invention. http://www.whatspatented.com/ http://arstechnica.com/gadgets/ Cloud-based - software systems that based on the cloud (internet) Voice recognition system- computer technology that uses audio input to enter data instead of a keyboard input. Audio input is carried through a connected microphone. The Software is designed to recognize words or phrases with an internal database. The program would then match the audio signature of speech with corresponding data in the database. http://www.wisegeek.com/what-is-voice-recognition.htm Cloud-based voice recognition - The voice recognition software the is important to virtual reality since it provides a fairly natural and intuitive way of controlling the simulation while allowing the user's hands to remain free. The audio signals are converted to electrical signals, and then transformed into coding patterns to which meanings have been assigned. Automated voicemail - Automatic voicemail system that stores voice messages. Goog-411 - an automated information service that uses voice recognition to find information for what the caller is asking for on local businesses. This also has a feature to send the information to the caller's phone via text messaging. Goog-411 has provided a foundation for Voice Search (search Google by speaking instead of typing, Voice Input (filling in any text field on Andriod by speaking), and Voice Actions (Controlling Android phones with voice commands). http://arstechnica.com/business/news/2007/04/google-rolls-out-free-411-service.ars Android - Google's mobile operating system (a modified Linux Kernal system). This is the software stack for mobile devices that include the operating system as well as the middleware along with key apps. http://code.goo
Jab Itthipalkul

APP- CESSIBLE - 3 views

  •  
    The universe of apps has made life more convenient, more fun and more distracting. For example, you can find your lover. But in truth, most apps are designed for those whose life is already convenient. According survey there are total of 1.4 million people with disabilities in thailand. Worldwide, there are many apps which help facilitate the lives of physically impaired. 1. TTRS MESSAGE. This service allows people with hearing or speech impairment to place calls to standard telephone users via a keyboard or assistive device. TTRS operators interpret the calls, which can be initiated by either party. Callers use a text input device to contact the TTRS relay centre, then give the operator the number of the party he or she wants to call. The operator, in turn, will place an outbound traditional voice call to that particular party. The operator serves as a link between the two callers, relaying the text of the initial caller in voice to the other party, as well as converting spoken words to text. The service was first offered only via desktop and kiosk platforms, but it is now available to mobile users via an app. 2.Read for the blind. Wichai Pornpratang, vice president of telecommunications business at Thai Samsung Electronics, said the main technology used to develop this app is a voice recorder which records users reading. Those audio files are uploaded to the Thai Blind People Foundation's server. Then converted to DAISY3 books to achieve an acceptable level of audio quality. With this format, users can serach for and regulate reading voices, make duplicates and place bookmarks. 3.Wheel Go Round It is windows phone application for wheelchair users that locates and rates the nearest wheelchair accessible facilities such as parking areas, elevators, ramps and toilets. The app also allows users to take photos and add places where facilities for those in wheelchairs are available. It is great benefit, but the app could be improved if it allowed users to scan for t
  •  
    Questions: How does TTRS work? What is benefit of RFB? how can you improve wheel go round? What special techonolgy does Traffic voice information service have?
anonymous

Samsung smart TV can hear, transmit owners' conversations - SiliconValley.com - 3 views

  •  
    How does voice recognition and voice command work? Explain the issue. What's the solution? dj, mj,
Yonghyeon Shin

Samsung unveils Galaxy S III smartphone with face, voice recognition - CNN.com - 5 views

  •  
    1. what are the benefits from face and voice recognition in Gallaxy3
  •  
    Education Communications May 17
anonymous

The voice behind Siri breaks his silence - Telegraph - 2 views

  •  
    for fun
anonymous

Egypt's net ruled by phone, not kill switch > DDoS > Vulnerabilities & Exploits > News ... - 4 views

  • Google operated a crisis response page and a "Speak to Tweet" service that allowed Egyptians to communicate online via voice telephone in the face of the internet blackout. Others, like net activist group Telecomix, were monitoring amateur radio channels and provided virtual private networks and proxies to Egyptian activists who required online anonymity.
  •  
    Feb 8 Ginnie What did people use when the net was down?
  •  
    1.7_surveillance 2.6_gov_control_use_info 3.4_internet
  •  
    The people used voice telephone to communicate with each other while the net was down. Amateur radio channels and virtual private networks and proxies were provided and used by Egyptian activists in order to communicate with each other.
Chut Sanghiran

iPad gives voice to kids with autism - 5 views

  •  
    Explain how can Ipads help Handicapped kids?
  •  
    Health and Education Hardware, Software, Personal and Public Communications,
  •  
    May 21
Alex Lenk

The science and technology of air traffic control | Ars Technica - 6 views

  •  
    Da Woon November 1st  Describe the IT system
  •  
    This article tells us the air traffic controller (ATC) which helps us to have safe fly. ATC has access to sophisticated radar systems that provide an overview of the airspace they control, and they have communication tools to coordinate flight paths with the air crew. When the aircraft travel at higher speed than common modes of transport, the time available for pilots to react to a dangerous situation can be quite short. And ATC helps to aircraft approaching an airfield carefully and it checks the weather conditions for prevent pilots can't see other aircraft. ATC uses radar systems positioned at ATC facility to get a real time overview of the aircraft flying in the airspace they control. Many types of radar equipment are served for traffic on the ground. Primary Surveillance Radars (PSR) - The radar sends a directed pulse into the atmosphere, and when that pulse encounters an object it gets reflected back to the radar station. The bearing of the object with respect to the radar station and its approximate distance can be calculated by this. The radar is typically enclosed in a dome to protect it from adverse weather. Secondary Surveillance Radars (SSR) - the Secondary Surveillance Radar listens for messages from the aircraft's transponder. The radar rotates about the vertical axis, but transmits a specific signal on 1030 MHz. This signal is subsequently received by the aircraft's onboard transponder, which responds with a reply on 1090 MHz. SSR Modes - There are different modes of interrogation that compliant transponders respond to. A - The transponder responds with its squawk code, a unique identifier for the aircraft assigned by ATC comprising of four octal numbers. This code enables ATC to differentiate between the various aircraft being monitored, though it can also be used to discretely communicate the existence of an emergency situation onboard the aircraft. C - the transponder responds with the aircraft's pressure altitude, which is the altitude ab
jasonkerr

Robot teachers invade South Korean classrooms - 0 views

  •  
    AI Rot describe the IT system Answer here :)
  •  
    * Telepresence: technologies which allow a person to feel as if they were present, to give the appearance of being present, or to have an effect, via telerobotics, at a place other than their true location. * voice recognition: Conversion of spoken words into text. * Robots: a machine capable of carrying out a complex series of actions automatically,
jasonkerr

Kibot the robot entertains kids, spies on them - 0 views

  •  
    AI Rock Summary Answer here :)
  •  
    Korean children, already fast becoming a robot-friendly lot, have a new companion in Kibot, a monkey-faced bot that can read fairy tales, sing songs, take pictures, and make video calls via a display embedded in its tummy. It is like a robot that will keep children accompany, Kibot, which runs on a rechargeable battery and is manufactured by iRiver, has plenty of other tricks up its sensor-enabled sleeves, too. It responds to gestures, like pats, by turning and pleasantly saying, "It feels good." When it encounters an obstacle, it can change direction to avoid it. It can take pictures and record and play back customized voices. It even serves as a language tutor for Korean and English. About the only things it doesn't do, seemingly, are scratch its head and swing from branch to branch.
anonymous

When Passwords Aren't Enough: The Need for Strong Online Authentication That is Easy to... - 2 views

  •  
    Describe the IT terms. april 28 kuni
  •  
    Authentication- Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. Tokens- A Hardware Token is an Authenticator in the form of a physical object, where the user's interaction with a login system proves that the user physically possesses the object. Hardware Tokens authenticate users on the basis that only the Token assigned to the user could have generated the pseudo-random number or code response keyed in by the user. Successful entry of this code implies that the user is in physical possession of the Token. This implies that the user does not allow users to use his Token, and has not lost it. It is use to prove one's identity electronically, and it is small enough to put it in the pocket or attach to keychain. Smart Card-A card with an embedded computer chip on which information can be stored and processed. It is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Biometric- Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
1 - 11 of 11
Showing 20 items per page