摘要:
Methods, system and/or computer program products for detection of a note include receiving an audio signal and generating a plurality of frequency domain representations of the audio signal over time. A time domain representation is generated from the plurality of frequency domain representations. A plurality of edges are detected in the time domain representation and the note is detected by selecting one of the plurality of edges as corresponding to the note based on characteristics of the time domain representation.
摘要:
Methods, system and/or computer program products for detection of a note include receiving an audio signal and generating a plurality of frequency domain representations of the audio signal over time. A time domain representation is generated from the plurality of frequency domain representations. A plurality of edges are detected in the time domain representation and the note is detected by selecting one of the plurality of edges as corresponding to the note based on characteristics of the time domain representation.
摘要:
Methods, system and/or computer program products for detection of a note include receiving an audio signal and generating a plurality of frequency domain representations of the audio signal over time. A time domain representation is generated from the plurality of frequency domain representations. A plurality of edges are detected in the time domain representation and the note is detected by selecting one of the plurality of edges as corresponding to the note based on characteristics of the time domain representation.
摘要:
A probe attached to a customer's network collects status data and other audit information from monitored components of the network, looking for footprints or evidence of unauthorized intrusions or attacks. The probe filters and analyzes the collected data to identify potentially security-related events happening on the network. Identified events are transmitted to a human analyst for problem resolution. The analyst has access to a variety of databases (including security intelligence databases containing information about known vulnerabilities of particular network products and characteristics of various hacker tools, and problem resolution databases containing information relevant to possible approaches or solutions) to aid in problem resolution. The analyst may follow a predetermined escalation procedure in the event he or she is unable to resolve the problem without assistance from others. Various customer personnel can be alerted in a variety of ways depending on the nature of the problem and the status of its resolution. Feedback from problem resolution efforts can be used to update the knowledge base available to analysts for future attacks and to update the filtering and analysis capabilities of the probe and other systems.
摘要:
Methods for generating a new recording of a past musical performance of a musician from a recording of the past musical performance include obtaining a high-resolution data record representing actions of the musician while playing the past musical performance that is generated based on the recording of the past musical performance and positioning an automated musical instrument in a selected acoustic context and a sound detection device at a selected sound detection location in the selected acoustic context. The high-resolution data record is provided to the musical instrument to cause the musical instrument to re-produce the actions of the musician while playing the past performance. Sound waves generated by the musical instrument are recorded while the actions of the musician are being re-produced to generate the new recording of the past musical performance.
摘要:
A probe attached to a customer's network collects status data and other audit information from monitored components of the network, looking for footprints or evidence of unauthorized intrusions or attacks. The probe filters and analyzes the collected data to identify potentially security-related events happening on the network. Identified events are transmitted to a human analyst for problem resolution. The analyst has access to a variety of databases (including security intelligence databases containing information about known vulnerabilities of particular network products and characteristics of various hacker tools, and problem resolution databases containing information relevant to possible approaches or solutions) to aid in problem resolution. The analyst may follow a predetermined escalation procedure in the event he or she is unable to resolve the problem without assistance from others. Various customer personnel can be alerted in a variety of ways depending on the nature of the problem and the status of its resolution. Feedback from problem resolution efforts can be used to update the knowledge base available to analysts for future attacks and to update the filtering and analysis capabilities of the probe and other systems.