Chebychev polynomials in a speech recognition model

نویسندگان

  • Gloria Carballo
  • Renato Álvarez-Nodarse
  • Jesús Sánchez-Dehesa
چکیده

Advanced speech mformatlon processmg systems require further research on speakerdependent mformatlon Recently, a specific system of discrete orthogonal polynomials {4:(l), 1 = 1,2, ,L },“=, has been encountered to play a dommant role m a segmental probability model recently proposed m the speaker-dependent feature extra&on from speech waves and apphed to text-independent speaker verlficatlon Here, these speech polynomrals are shown to be the shifted Chebyshev polynomials on a dtscrete variable t,(l1, L), whose structural and spectral properties are discussed and reviewed m light of the recent discoveries m the field of discrete orthogonal polynomials @ 2001 Elsevler Science Ltd All rights reserved Keywords-Discrete Chebyshev polynomials, Speech recogmtlon, Speaker venficatlon, Speech ldentdicatlon, Speech sound, Speech compression This work has been partially supported by the European ProJect INTAS-93-219-ext and by the Spamsh Dlreccdn General de EnseBnza Superior (DGES) Grant PB-96-0120-C03-01 This work has been partially supported by the European ProJect INTAS-93-219ext, the Junta de Andalucia Grant FQM-207 and by the Spamsh Dlreccdn General de Enseiinza Superior (DGES) Grants PB-96-0120-COl-01 (R A N ) and PB-95-1205 (J S D ) This paper was done durmg the stay of the second author m the Umversldad de Granada 0893-9659/01/s see front matter @ 2001 Elsevler Science Ltd All rights reserved Typeset by .A&-W PI1 SO893-9659(00)00197-X

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Voice Authenticationa Study Of Polynomial Representation Of Speech Signals

A subset of speech recognition is the use of speech recognition techniques for voice authentication. Voice authentication is an alternative security application to the other biometric security measures such as the use of fingerprints or iris scans. Voice authentication has advantages over the other biometric measures in that it can be utilized remotely, via a device like a telephone. However, v...

متن کامل

Persian Phone Recognition Using Acoustic Landmarks and Neural Network-based variability compensation methods

Speech recognition is a subfield of artificial intelligence that develops technologies to convert speech utterance into transcription. So far, various methods such as hidden Markov models and artificial neural networks have been used to develop speech recognition systems. In most of these systems, the speech signal frames are processed uniformly, while the information is not evenly distributed ...

متن کامل

Speaker Adaptation in Continuous Speech Recognition Using MLLR-Based MAP Estimation

A variety of methods are used for speaker adaptation in speech recognition. In some techniques, such as MAP estimation, only the models with available training data are updated. Hence, large amounts of training data are required in order to have significant recognition improvements. In some others, such as MLLR, where several general transformations are applied to model clusters, the results ar...

متن کامل

شبکه عصبی پیچشی با پنجره‌های قابل تطبیق برای بازشناسی گفتار

Although, speech recognition systems are widely used and their accuracies are continuously increased, there is a considerable performance gap between their accuracies and human recognition ability. This is partially due to high speaker variations in speech signal. Deep neural networks are among the best tools for acoustic modeling. Recently, using hybrid deep neural network and hidden Markov mo...

متن کامل

Speaker Adaptation in Continuous Speech Recognition Using MLLR-Based MAP Estimation

A variety of methods are used for speaker adaptation in speech recognition. In some techniques, such as MAP estimation, only the models with available training data are updated. Hence, large amounts of training data are required in order to have significant recognition improvements. In some others, such as MLLR, where several general transformations are applied to model clusters, the results ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Appl. Math. Lett.

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2001