Tools for digital sound, Computer Networking

Assignment Help:

Tools for Digital Sound

Sound is the oscillation of pressure that propagates in the form of a wave. Sound waves are transmitted through some medium (solid, liquid, or gas); they cannot travel through a vacuum. The human ear detects the pressure changes and decodes this into what we hear. Sound can be converted into an electrical signal using microphones or other transducer, by which pressure changes become voltage changes. The reverse, converting voltage changes into pressure changes, can be done via speakers. An analog audio signal may be visualized by plotting the voltage as a function of time (e.g., using an oscilloscope). Note that the voltage level and time are continuous quantities. Pulse code modulation (PCM) is one method for digitally representing an audio signal, and is the standard used for compact discs (music CDs) and computer sound. A PCM stream is obtained from an audio signal by discretizing both the voltage level and time. Time is discretized by choosing a uniform sampling rate, measured as the number of samples taken per second. Each sample is a discretized measure of the voltage level. The resolution of the samples is governed by the bit depth; namely, the number of bits allowed for each sample. For example, Figure 2 shows a digitized signal using a sample rate of 10 samples per second, and a resolution of 3 bits using the 8 possible values: -3, -2, -1, 0, 1, 2, 3, 4 (this would be horribly poor quality for an audio signal). The difference between the sample and the actual signal level is known as the quantization error; using a higher bit depth reduces this. The sampling rate determines the highest frequency that can be correctly recovered from the sampled data. This is known as the Nyquist frequency and is half of the sampling rate. Compact discs use 16 bits of resolution (per channel) and 44,100 samples per second | enough to recover the entire range of human hearing (20 Hz to 20,000 Hz). For this project, you will write some programs to manipulate and generate PCM streams. You will work entirely with uncompressed streams (e.g., .wav files); popular formats like .aac, .m4a and .mp3 instead use lossy compression on the stream to reduce the storage requirements.


Related Discussions:- Tools for digital sound

What are the control frames for lost tokens, Control Frames for Lost Tokens...

Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll

5 igrp supports a feature , 5 IGRP supports a feature that permits traffic ...

5 IGRP supports a feature that permits traffic to be distributed among up to 6 (4 default) paths to give greater allover throughput and reliability. What is this called? Ans) An

Program for two library methods with thread , #include void subdomain(...

#include void subdomain(float x[ ], int istart, int ipoints) { int i; for (i = 0; i x[istart+i] = 123.456; } void sub(float x[ 10000], int npoints) {

Explain the meaning and use of the z-index property in dhtml, QUESTION ...

QUESTION (a) In CSS, each element in a document is considered to be in an invisible box. Give three ways how to make the box visible (b) (i) Explain the meaning and use of t

Advantages of firewall, Firewall The NAT router allows receiving of num...

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex

Importance of clientsin intranet server, Importace of Clientsin intranet se...

Importace of Clientsin intranet server The most interesting thing is that almost every computer can be connected as a client to the Intranet server. The client could be based

Connection-oriented service, Sender requests connection from network. Other...

Sender requests connection from network. Other receiver agrees to connection. Computers interchange data through connection. One-endpoint requests network to split connection when

What are different ways of securing a computer network, What are different ...

What are different ways of securing a computer network? There are lots of ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls

Define the term pipelined processor, Pipelined Processor A pipeline pro...

Pipelined Processor A pipeline processor can be described as a processor which comprises of a series of processing circuits known as segments and a stream of operands (data) is

Ccna, Can you do my ccna assignment

Can you do my ccna assignment

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd