Correlation between speaker gender and perceptual quality of mobile speech signal
Perceptual evaluation of speech signals is a very crucial measure for quality of service in mobile speech communication. Several subjective and objective quality measures are being utilized to evaluate the perceptual quality of speech signals. Perceptual Evaluation of Speech Quality (PESQ)has bee...
| Main Authors: | Al-Othmani, Abdulaleem Z., Abdul Manaf, Azizah, Zeki, Akram M., Almaatouk, Qusay, Aborujilah, Abdulaziz, Al-Rashdan, Maen T. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
IEEE Xplore
2020
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/80132/ http://irep.iium.edu.my/80132/7/80132%20Correlation%20Between%20Speaker%20Gender%20and%20Perceptual%20Quality.pdf http://irep.iium.edu.my/80132/8/80132%20Correlation%20Between%20Speaker%20Gender%20and%20Perceptual%20Quality%20SCOPUS.pdf |
Similar Items
Speaker identification based on curvlet transform technique
by: Abualadas, Feras E., et al.
Published: (2018)
by: Abualadas, Feras E., et al.
Published: (2018)
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Arabic Speaker-Independent Continuous
Automatic Speech Recognition Based on a
Phonetically Rich and Balanced Speech Corpus
by: Abushariah, Mohammad Abd-Alrahman Mahmoud, et al.
Published: (2012)
by: Abushariah, Mohammad Abd-Alrahman Mahmoud, et al.
Published: (2012)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Statistical modeling for speech recognition
by: Khalifa, Othman Omran, et al.
Published: (2013)
by: Khalifa, Othman Omran, et al.
Published: (2013)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
Universality and diversity of cultural-influenced speech emotion recognition system
by: Kamaruddin, Norhaslinda, et al.
Published: (2016)
by: Kamaruddin, Norhaslinda, et al.
Published: (2016)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system
by: Abdulghafor, Rawad, et al.
Published: (2017)
by: Abdulghafor, Rawad, et al.
Published: (2017)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
The design of a speech delay screening mobile application for Malaysian parents
by: Mohammed, Siti Asma, et al.
Published: (2019)
by: Mohammed, Siti Asma, et al.
Published: (2019)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
Relation mining using cross correlation of multi domain social networks
by: Noor, Fozia, et al.
Published: (2015)
by: Noor, Fozia, et al.
Published: (2015)
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
by: Abdulghafor, Rawad, et al.
Published: (2020)
by: Abdulghafor, Rawad, et al.
Published: (2020)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
CMAC for speech emotion profiling
by: Kamaruddin, Norhaslinda, et al.
Published: (2009)
by: Kamaruddin, Norhaslinda, et al.
Published: (2009)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
High watermarking capacity based on spatial domain technique
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Deep learning for emotional speech recognition
by: Alhamada, M. I., et al.
Published: (2020)
by: Alhamada, M. I., et al.
Published: (2020)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)
by: Khan, Nusratullah, et al.
Published: (2018)
Detecting change from social networks using temporal analysis of email data
by: Nusratullah, Kajal, et al.
Published: (2018)
by: Nusratullah, Kajal, et al.
Published: (2018)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
Key individual identification using dimensional relevance in the stratum of networks
by: Shah, Asadullah, et al.
Published: (2019)
by: Shah, Asadullah, et al.
Published: (2019)
Log your car: The non-invasive vehicle forensics
by: Mansor, Hafizah, et al.
Published: (2016)
by: Mansor, Hafizah, et al.
Published: (2016)
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014)
by: Hamza, Aminu, et al.
Published: (2014)
Increasing the runs in compressed data using a dedicated move to front algorithm
by: Al-Khayyat, Kamal A., et al.
Published: (2019)
by: Al-Khayyat, Kamal A., et al.
Published: (2019)
Nonlinear stochastic operators to control the consensus problem in multi-agent systems
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2017)
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2017)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
Statistical techniques to serve quality of software
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Medical emergency and healthcare model: enhancemet with SMS and MMS facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Similar Items
-
Speaker identification based on curvlet transform technique
by: Abualadas, Feras E., et al.
Published: (2018) -
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011) -
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011) -
Arabic Speaker-Independent Continuous
Automatic Speech Recognition Based on a
Phonetically Rich and Balanced Speech Corpus
by: Abushariah, Mohammad Abd-Alrahman Mahmoud, et al.
Published: (2012) -
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)