Transferred from: http://blog.csdn.net/wangwenwen/article/details/82649251. DTMF principleDTMF (double Tone mulitifrequency, dual tone multi-frequency) as a technology to achieve fast and reliable transmission of telephone numbers, it has strong anti-jamming ability and high transmission speed, so it can be widely used in telephone communication system. But most of the audio dialing is used as a telephone. In addition, it can be widely used in data co
Background
System Structure
Extension 1026 and extension 1027 are used in the existing telephone system, and an asterisk is implemented under extension 1026 and extension 1027. A: In the 1027 system, ext. B: 1011 in the 1026 system, ext. 1012 is now called B through a. Because the language menu is implemented in the 1026 system, first, you can use the 91026 incoming call 1026 system (with an external dialing 9), and then enter 1012 according to the prompt. The existing vswitch does not sup
1, DTMF (dual-tone multi-frequency) Definition: By the high-frequency and low-frequency sound two sine wave synthesis represents the digital keys (0~9 * # A B C D).2. Methods for detecting DTMF data in sip: Sipinfo, RFC2833, Inband1) SipinfoFor out-of-band detection, DTMF data is transmitted through the SIP signaling channel. There is no uniform implementation st
value range between 32768 to 32767, if you get an already encoded media stream, such as g.711 encoding, then need to decode first), do the following calculation:When the above calculation is complete, we can get the energy value p of the frequency F reflected in these n samples:DTMF RecognitionThe above is the whole idea of Goertzel algorithm. If we want to use it for DTMF recognition, we still need to do some work.
DTMF definition: Digital keys (0 ~ 9 * # a B C D ).
There are usually three methods for detecting DTMF in VoIP: SIP info, inband, and out band (rfc2833). In addition, the latest RFC has been adopted for the requirements of DTMF In the 3GPP IMS specification.4733 replaces RFC 2833.
1. Sip info
For out-of-band detection, DTMF
Pjsip source code is relatively powerful. Let's talk about what DTMF is?
Dual-Tone Multi-frequency DTMF (Dual Tone Multi frequency), dual-Tone Multi-frequency, composed of high frequency groups and low frequency groups, each of which contains four frequencies. A high-frequency signal and a low-frequency signal are combined to form a combined signal, representing a number. The
This item is the starting point for accurate identification of DTMF signals. After detecting this item, the DTMF decoder is triggered to decode the received data and wait until the corresponding dial key value is reached.1. analysis of input signal features: the signal is the circuit noise in the DTMF signal plus the channel. Now, preliminary analysis shows that
DTMF encoding transmitted by rfc2833 in Voice Transmission
2007-03-23 11:13:48
The class is defined as follows:
# If! Defined (afx_head_2833_h000093b5c358_6f19_475b_a49f_13bfcc9dfe1c00000000ded _)# DefineAfx_head_2833_h000093b5c358_6f19_475b_a49f_13bfcc9dfe1c00000000ded _
# If _ msc_ver> 1000# Pragma once# Endif // _ msc_ver> 1000
Class chead_2833{Public:Bool dispelhead (char *Cvalue );Int btodd (char * cvalue );Char * dtob (intNvalue );Che
This article from csdn ucser, http://blog.csdn.net/perfectpdl reprinted to indicate the source, thank you!
DTMF is called multi-tone dual-join, also called secondary dialing. There are three methods for VoIP to carry DTMF: inband, RFC 2833 (the latest RFC is 4733, which is referenced in IMS), and SIP info.
The inband mode transfers the buffer generated by keys to the audio RTP stream, instead of definin
, BlackBerry, and Android). They are available in every native application market.Ii. Web Applications Web applications are essentially Web-based applications designed for mobile browsers. They are developed in common Web development languages and can run on various smart phone browsers.Advantages:
Supports a wide range of devices;
Low development costs;
See weibo. com1874255663xh1jrom4w. Visit m. baidu. comxs on a tablet such as an ipad, and you will also see that the interface is dazzling and will not be lost to nativeapp. In the desktop application field, native applications have lost to webapps. If html5 is more mature in the future, will nativeapp also lose to webapps in the mobile application field? See http://weibo.com/1873795663/xh1JRom4w for what I saw on Weibo
Access http://m.baidu.com/xs w
Configurable security for beans used in JSF applications
This series is made up of five parts, describes the Acegi security System, and demonstrates how to use Acegi to protect enterprise-class Java applications. This article is the last part of the series and will continue to discuss the use of Acegi to protect JSF applications. In part 4th, I described how to
Sometimes our applications need to invoke applications that others have already written (provided that they are already installed on the user's phone). Their application a calls their own application B, there are more methods, for example, in the activity of the invoked application B, set Intent-filter, and then use the intent call directly. After that, let's talk about how to invoke a third party applicati
Java Applications (non-Web applications) log4j.properties dynamically modify the configuration file, no need to restart, can take effect immediately, how to achieve.
Main use: Propertyconfigurator.configureandwatch (path,1000),//interval specific time, detect files are modified, automatically re-read configuration
To implement automatic overloading of log4j configuration files after modification.
Log4jcon
ZF-developed methods for integrating PHP applications with traditional PHP applications
As you know, ZF needs to have all HTTP requests processed by index.php (bootstrap), so we need to configure the URL rewrite rules for the server, such as Apache httpd.conf:
Rewriteengine on
Rewritecond%{request_uri}!^.* (. css|. js|. html|. Zf|. Gif|. Pdf|. rar|. Ppt|. Chm|. Png|. Jpg|. JPEG) $
Rewriterule ^ (/.*) $/
Original If you want to ensure that Windows 10 does not install the built-in application when a new user logs on, you must remove all configured applications. the contents of this article
Applications that have been installed and configured
Remove the configured application
Installing and configuring the application^before I describe how to remove all built-in
Preface:
At the beginning, virtualization research aimed to achieve mobile office of mobile phones. The application scenario is very simple, that is, to use the current popular IPHONE or IPAD to perform a variety of enterprise-level application operations, such as the boss can use the IPAD to use the B/S structure of the OA program. At the beginning, I naturally thought of remote terminal connection software and the IPAD application provided by the vendor. The former has the famous Splashtop Rem
directly performs operations on strings through append, remove, insert, and other methods, and returns the operation results through the tostring method. Its definition and operation statement are as follows:
Int num; system. text. stringbuilder STR = new system. text. stringbuilder (); // create a string Str. append (Num. tostring (); // Add the numeric value num response. write (Str. tostring); // display the operation result 3. optimize configuration files for Web server computers and specif
In our ACCP course, we learned the C # and Java languages. C # language we have learned how to develop Windows applications (visual applications) and Web applications (mainly ASP. NET. Java language we mainly learn Web application (JSP) development.
Many students cannot understand why ASP. NET is mainly used to develop small and medium
This article describes the infrastructure of Oracle's integrated cloud agent, the components it contains, and how to connect to cloud and op applications.Current/Typical integration methodsThe current common way to connect cloud applications/Internet-based applications to on-premises (OP) applications is to penetrate one or more firewalls, using reverse proxies,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.