Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 8253 dokumen yang sesuai dengan query
cover
"Buku yang berjudul "Audio & hi-fi handbook" ini merupakan sebuah buku panduan mengenai audio, frekuensi suara, distorsi, efek suara, dan karakteristik mikrofon."
Oxford: Newnes, 1993
R 621.3893 AUD
Buku Referensi  Universitas Indonesia Library
cover
Capel, Vivian
Oxford: Newnes, 1994
621.3897 CAP n
Buku Teks  Universitas Indonesia Library
cover
Beer, Nick
Oxford : Butterworth-Heinemann , 1994
621.389 3 BEE s
Buku Teks  Universitas Indonesia Library
cover
Lenk, John D.
New york: McGraw-Hill, 1991
621.384 3 LEN l
Buku Teks  Universitas Indonesia Library
cover
Hood, John Linsley
Boston : BH Newnes, 1995
621.389 HOO a
Buku Teks  Universitas Indonesia Library
cover
Cameron, Derek
Virginia: Reston, 1978
621.389 CAM a
Buku Teks  Universitas Indonesia Library
cover
Zotter, Franz
"This open access book provides a concise explanation of the fundamentals and background of the surround sound recording and playback technology Ambisonics. It equips readers with the psychoacoustical, signal processing, acoustical, and mathematical knowledge needed to understand the inner workings of modern processing utilities, special equipment for recording, manipulation, and reproduction in the higher-order Ambisonic format. The book comes with various practical examples based on free software tools and open scientific data for reproducible research.
The books introductory section offers a perspective on Ambisonics spanning from the origins of coincident recordings in the 1930s to the Ambisonic concepts of the 1970s, as well as classical ways of applying Ambisonics in first-order coincident sound scene recording and reproduction that have been practiced since the 1980s. As, from time to time, the underlying mathematics become quite involved, but should be comprehensive without sacrificing readability, the book includes an extensive mathematical appendix. The book offers readers a deeper understanding of Ambisonic technologies, and will especially benefit scientists, audio-system and audio-recording engineers.
In the advanced sections of the book, fundamentals and modern techniques as higher-order Ambisonic decoding, 3D audio effects, and higher-order recording are explained. Those techniques are shown to be suitable to supply audience areas ranging from studio-sized to hundreds of listeners, or headphone-based playback, regardless whether it is live, interactive, or studio-produced 3D audio material."
Switzerland: Springer Nature, 2019
e20506247
eBooks  Universitas Indonesia Library
cover
Pohlmann, Ken C.
Indiana: Sams, 1989
621.389 3 POH p
Buku Teks  Universitas Indonesia Library
cover
Roberts, R.S.
Jakarta: Elex Media Komputindo, 1994
R 621.3803 ROB kt
Buku Referensi  Universitas Indonesia Library
cover
Tjandra Satria Gunawan
"ABSTRAK
Pada era digital saat ini, penggunaan teknologi sudah menglobal, bertukar data merupakan hal yang biasa dan mudah dilakukan sehingga data rentan terhadap penyerangan atau manipulasi dari pihak yang tidak bertanggung jawab. Salah satu jenis data yang rentan terhadap penyerangan ini adalah suara digital. Sehingga, diperlukan suatu metode pengamanan data yang kuat dan cepat. Salah satu metode pengamanan yang memenuhi semua kriteria tersebut adalah pengamanan data menggunakan fungsi chaos. Fungsi chaos yang digunakan pada penelitian ini adalah fungsi Normalized Complex Quadratic Map NCQM . Fungsi NCQM memiliki kelebihan yaitu dijamin bersifat chaos ketika parameter fungsinya memiliki nilai absolut yang lebih kecil dari satu. Barisan kunci yang dibangkitkan dengan fungsi NCQM lolos semua 15 uji NIST, hal ini berarti pembangkitan barisan kunci key stream dari fungsi NCQM ini terbukti bersifat acak random . Selain itu, hasil sampel-sampel dari suara digital yang telah terenkripsi ketika diuji dengan histogram dan uji Goodness of Fit terbukti uniform sehingga pengamanan suara digital dengan metode ini kebal terhadap frequency analysis attack. Ruang kunci yang dihasilkan dari metode ini sangat besar yaitu 9,1 1046 untuk kemungkinan kunci pada fungsi NCQM tunggal, dan 3,8 10109 untuk NCQM ganda , sehingga metode ini juga kebal terhadap brute force attack.

ABSTRAK
In this digital era, technology usage has been globalized in which data exchange is common and easy to do, it is vulnerable to be attacked and manipulated from unauthorized parties. One data type that is vulnerable to attack is digital audio. So, we need data security method that secure and fast. One of the methods that match all of those criteria is data security using ldquo chaos rdquo function. ldquo Chaos rdquo function that is used in this research is Normalized Complex Quadratic Map NCQM . NCQM function has advantages that are guaranteed to be ldquo chaos rdquo when the function parameter has absolute value less than one. The key stream that is generated using this NCQM functions passed all 15 NIST tests, this means that the key stream generated by NCQM proved to be random. In addition, samples of encrypted digital sound when tested using histogram and Goodness of Fit test are proved to be uniform so this digital audio security using this method is immune to frequency analysis attack. The key space that is generated from this method is very huge approximately 9,1 1046 possible keys for single NCQM function, and approximately 3,8 10109 for multiple NCQM function , therefore this method is also immune against brute force attack."
2017
S68674
UI - Skripsi Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>