Affiliation:
1. School of Physical Education and Health, Wenzhou University, Wenzhou, Zhejiang 325035, China
Abstract
Based on dual-core technology and the theory of nontransmission and noninterference of information flow, this paper conducts a detailed system trust environment investigation on key issues such as trust routing design and reliability analysis in the embedded structure. At the same time, we will study the method of extracting features from speech data. When dealing with abnormal audio detection, firstly, the preprocessed valid audio clips are framed and windowed and have stable short-term characteristics; after the feature is stable, the frequency feature and time domain feature of audio data are analyzed and compared. And then combined with specific applications, a detailed demand analysis is carried out, and the development plan and implementation method of the college physical education network auxiliary system are proposed. The teaching system follows a three-tier system structure. In order to expand the existing functions, this paper uses the principle of modularity, starting from the following four aspects: educational resources, online question and answer, coursework, and test-related modules. We choose object-oriented and easy-to-expandable modules, such as the development and implementation of programming language environments and database systems. By applying the abnormal audio detection technology to the embedded system of college P.E. classroom, it can effectively optimize the traditional P.E. teaching mode and promote the teaching efficiency and the new development of P.E. teaching in the information age.
Subject
Computer Networks and Communications,Computer Science Applications
Reference20 articles.
1. Nonlinear signal processing with minimization of spectral distortion for embedded systems
2. Hardware Root-of-Trust-based integrity for shared library function pointers in embedded systems
3. Review of embedded systems security;C. C. Duru;Journal of Engineering and Applied Sciences,2020
4. Trusted platform module (tpm) based security on notebook pcs-white paper;S. Bajikar;Mobile Platforms Group Intel Corporation,2002
5. The security of cloud computing system enabled by trusted computing technology;Z. Shen