A Survey on Speech Recognition Using HCI

Size: px
Start display at page:

Download "A Survey on Speech Recognition Using HCI"

Transcription

1 A Survey on Speech Recognition Using HCI Done By- Rohith Pagadala Department Of Data Science Michigan Technological University CS5760 Topic Assignment 2 rpagadal@mtu.edu

2 ABSTRACT In this paper, we will have a survey on Speech recognition using Human Computer Interface(HCI). Speech recognition software uses different methodologies and technologies that convert speech in to text. There are different models and algorithms to convert speech in to text and there are being used in many ways and a new method to use the speech recognition is to use it in the Automatic driving car. So, In this application, the user can use his voice to control his car such as pulling out of the car from the parking area to the location of the user and it can be done by using the key as a primary mode of communication which is connected to the car. INDEX TERMS Human Computer Interaction(HCI), Automatic Speech Recognition(ASR),Finger Print Censor, Hidden Markov Model(HMM), Deep Belief Networks(DBN). INTRODUCTION The new concept is that the car uses the concept of speech recognition algorithms which contains both electrical and mechanical domains and even the finger print sensor is also being used. Voice recognition system is used in car keys which is connected to car navigation system. The user will give instructions through the car keys which contains the finger print sensor and a microphone through which the command is received. The car navigation system which is a fully digital system consists of all the words which are used to control the car and the navigation system should consist off all the commands that is used to control the car such as when the user is far distance from the car and if he/she uses the car keys to unlock the voice recognition system by using the finger print censor and this can be done through

3 End-to-End Automatic Speech Recognition (ASR), it is a recognition system which mainly used for diction. Through this application, the user can get his car to his/her location without walking up to the car or for searching their car in a big parking lot. FUNCTION OF SPEECH RECOGNITION Speech recognition is used in many electronic devices such as phone and laptop, it is converted from speech to text using some specific software and algorithms. One such model is known as Hidden Markov Model(HMM), which is widely used because they are trained automatically and they are also very simple to use. Each word in the Hidden Markov model will have a different output. The speech can be decoded by using various algorithms to find the best output and it can be used to get accurate output. The other type of model for speech recognition would be Automatic Speech Recognition model, in the model the input is converted into a sequence of fixed size vectors and this process is known as feature extraction. In this model, it extracts a set of features from the given input speech and another type of model which comes under ASR is Deep Belief Networks(DBN). Deep Belief Networks come under neural network which consists of Restricted Boltzmann Machine(RBM) that consists of an input layer and a hidden layer which are connected to weight matrix and the matrix of the same weight is used for recognition and reconstruction. The model for voice recognition uses the complex relation between inputs and outputs to find patterns in data and the data input training can be done through MATLAB and the output that are in the form of waves can be decoded using MATLAB.

4 Training Data Applying Constraints Acoustic models Language Model Speech Feature Extraction Decoder Text Components of the flow chart diagram: Training Data: In a dataset, a training set is implemented to build up a model, while a test set is to validate the model built. Data points in the training set are excluded from the test set. Usually, a dataset is divided into a training set divided into a training set, a validation set and a test set in each iteration. Acoustic Models: It is a model that is used in ASR that represents the relation between an audio signal and other units that make up speech. It is created by taking audio recording of speech and the text.

5 Feature Extraction: It involves in the analysis of the speech signal and there are two types of techniques: 1.Temporal Analysis: In this, the speech waveform itself is used for analysis. 2. Spectral Analysis: In this, the speech signal is used for Analysis. Decoder: In this step, it decodes the speech and gives the output in the form of text. PROPOSED SYSTEM Our proposed system would be an application based on voice recognition and finger print censor which are used on car keys. Once the user parks his car and when tries to get back to the car in a big parking lot, the user can take his keys and unlock the speech recognition system by using the finger print censor. The finger print censor is being used for safety purpose so that no other person other than the owner can use the keys and control the car. The speech that is identified by giving some set of commands is being passed to car automatic navigation system and once the car gets the command the automatic

6 driving system starts and then the car reaches the user through the GPS navigation system and by using the system the user can control various option in car from a far distance such as switching on the heater system and switching on the headlights. COMPARISION OF EXISTING SYSTEM WITH PROPOSED SYSTEM In this section, we will be comparing the existing system with the proposed system. In the existing system, the user can control various option by operating them in the car navigation system such as using of wipers and opening/closing of windows. Based on the input given to the car navigation system, the application displays the outcome of it. The design of the existing application allows the user to control the car with his car keys where the user can give instructions to the car using the voice commands and after the instruction is given to the car navigation system, the application will try to process the command suchas if the user is using a command named Come To My Location the automatic driving car will get to the location of the user using the GPS coordinates. Another existing system is that the keys of the car does not contain any safety feature to identify the owner of the car. By including the Finger Print Censor, we can identify that the owner of the car is using the keys because if the keys are lost anyone could control the car and by using this safety feature we can use the voice recognition system without any problem. The idea to use voice recognition system along with finger print censor could help the owner of the car because the user need not search for his car in big parking places and he could just use a voice command and then the car would be coming to him.

7 CHANLLENGES Accuracy: Sometimes the input that is the audio may not be clear and it could impact the recognition accuracy. Talk-over problem: It occurs when two or people speak at the same time and it may also impact the recognition accuracy. User Responsiveness: The user may issue a command before the start of the voice recognition device. So the user must be careful and start issuing a command once the device is ready. Performance: Sometimes the device may not understand the user s grammar and it could misunderstand in a different way. Reliability: It is the ability of the system to operate accurately over a long period of time. CONCLUSION: The proposed system intends to develop a method and model that helps users to communicate with the vehicle in a better way. The proposed system is cost-effective and it works effectively. It is implemented by using voice recognition and finger print censor. This application would be more interactive with the user, as the ultimate aim of this application is to improve communication with the vehicle and with the help of finger print censor, the protection of the vehicle can also be increased.

8 REFERENCES: [1] C. Nikias and J. Mendel, Signal processing with higher-order spectra, Signal Processing Magazine, vol. 10, no. 3, pp , [2] Z. Koldovsky, J. M ` alek, J. Nouza, and M. Balık, Chime data separation based on target signal cancellation and noise masking, Proc. CHiME, [3] K. Wilson, B. Raj, P. Smaragdis, and A. Divakaran, Speech denoising using nonnegative matrix factorization with priors, in Proc. ICASSP, [4] F. Weninger, M. Wollmer, J. Geiger, B. Schuller, J. Gemmeke, A. Hurmalainen, T. Virtanen, and G. Rigoll, Non-negative matrix factorization for highly noiserobust asr: To enhance or to recognize? [5] G. E. Hinton, S. Osindero, and Y. W. Teh, A fast learning algorithm for deep belief nets [6] Mark JF Gales, Maximum likelihood linear transformations for hmm-based speech recognition, Computer speech & language [7] Spyros Matsoukas, Rich Schwartz, Hubert Jin, and Long Nguyen, Practical implementations of speakeradaptive training [8]Michael L Seltzer, Dong Yu, and Yongqiang Wang, An investigation of deep neural networks for noise robust speech recognition [9] Arun Narayanan and DeLiang Wang, Joint noise adaptive training for robust automatic speech recognition [10] T. T., Hewett, R., Baecker, S., Card and et. al., Report of the ACM Special Interest Group (SIG) on Computer-Human Interaction Curriculum Development Group: Curricula for Human-Computer Interaction [11] A.J., Dix, J., Finlay, G., Abowd, and R., Beale, Human-Computer Interaction. [12] J.P., Martens, Continuous Speech Recognition over the Telephone. Electronics and Information Systems, Ghent University, Belgium [13] M., Forsberg, Why is Speech Recognition Difficult?. [14] D., Jurafsky and J.H., Martin, Speech and Language Processing an Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition.

9

SPEECH FEATURE DENOISING AND DEREVERBERATION VIA DEEP AUTOENCODERS FOR NOISY REVERBERANT SPEECH RECOGNITION. Xue Feng, Yaodong Zhang, James Glass

SPEECH FEATURE DENOISING AND DEREVERBERATION VIA DEEP AUTOENCODERS FOR NOISY REVERBERANT SPEECH RECOGNITION. Xue Feng, Yaodong Zhang, James Glass 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) SPEECH FEATURE DENOISING AND DEREVERBERATION VIA DEEP AUTOENCODERS FOR NOISY REVERBERANT SPEECH RECOGNITION Xue Feng,

More information

Variable-Component Deep Neural Network for Robust Speech Recognition

Variable-Component Deep Neural Network for Robust Speech Recognition Variable-Component Deep Neural Network for Robust Speech Recognition Rui Zhao 1, Jinyu Li 2, and Yifan Gong 2 1 Microsoft Search Technology Center Asia, Beijing, China 2 Microsoft Corporation, One Microsoft

More information

Lecture 7: Neural network acoustic models in speech recognition

Lecture 7: Neural network acoustic models in speech recognition CS 224S / LINGUIST 285 Spoken Language Processing Andrew Maas Stanford University Spring 2017 Lecture 7: Neural network acoustic models in speech recognition Outline Hybrid acoustic modeling overview Basic

More information

SVD-based Universal DNN Modeling for Multiple Scenarios

SVD-based Universal DNN Modeling for Multiple Scenarios SVD-based Universal DNN Modeling for Multiple Scenarios Changliang Liu 1, Jinyu Li 2, Yifan Gong 2 1 Microsoft Search echnology Center Asia, Beijing, China 2 Microsoft Corporation, One Microsoft Way, Redmond,

More information

Introducing CURRENNT: The Munich Open-Source CUDA RecurREnt Neural Network Toolkit

Introducing CURRENNT: The Munich Open-Source CUDA RecurREnt Neural Network Toolkit Journal of Machine Learning Research 6 205) 547-55 Submitted 7/3; Published 3/5 Introducing CURRENNT: The Munich Open-Source CUDA RecurREnt Neural Network Toolkit Felix Weninger weninger@tum.de Johannes

More information

Reverberant Speech Recognition Based on Denoising Autoencoder

Reverberant Speech Recognition Based on Denoising Autoencoder INTERSPEECH 2013 Reverberant Speech Recognition Based on Denoising Autoencoder Takaaki Ishii 1, Hiroki Komiyama 1, Takahiro Shinozaki 2, Yasuo Horiuchi 1, Shingo Kuroiwa 1 1 Division of Information Sciences,

More information

Stacked Denoising Autoencoders for Face Pose Normalization

Stacked Denoising Autoencoders for Face Pose Normalization Stacked Denoising Autoencoders for Face Pose Normalization Yoonseop Kang 1, Kang-Tae Lee 2,JihyunEun 2, Sung Eun Park 2 and Seungjin Choi 1 1 Department of Computer Science and Engineering Pohang University

More information

An Arabic Optical Character Recognition System Using Restricted Boltzmann Machines

An Arabic Optical Character Recognition System Using Restricted Boltzmann Machines An Arabic Optical Character Recognition System Using Restricted Boltzmann Machines Abdullah M. Rashwan, Mohamed S. Kamel, and Fakhri Karray University of Waterloo Abstract. Most of the state-of-the-art

More information

Car Information Systems for ITS

Car Information Systems for ITS Car Information Systems for ITS 102 Car Information Systems for ITS Kozo Nakamura Ichiro Hondo Nobuo Hataoka, Ph.D. Shiro Horii OVERVIEW: For ITS (intelligent transport systems) car information systems,

More information

Combining Mask Estimates for Single Channel Audio Source Separation using Deep Neural Networks

Combining Mask Estimates for Single Channel Audio Source Separation using Deep Neural Networks Combining Mask Estimates for Single Channel Audio Source Separation using Deep Neural Networks Emad M. Grais, Gerard Roma, Andrew J.R. Simpson, Mark D. Plumbley Centre for Vision, Speech and Signal Processing,

More information

A NEURAL NETWORK APPLICATION FOR A COMPUTER ACCESS SECURITY SYSTEM: KEYSTROKE DYNAMICS VERSUS VOICE PATTERNS

A NEURAL NETWORK APPLICATION FOR A COMPUTER ACCESS SECURITY SYSTEM: KEYSTROKE DYNAMICS VERSUS VOICE PATTERNS A NEURAL NETWORK APPLICATION FOR A COMPUTER ACCESS SECURITY SYSTEM: KEYSTROKE DYNAMICS VERSUS VOICE PATTERNS A. SERMET ANAGUN Industrial Engineering Department, Osmangazi University, Eskisehir, Turkey

More information

Speech User Interface for Information Retrieval

Speech User Interface for Information Retrieval Speech User Interface for Information Retrieval Urmila Shrawankar Dept. of Information Technology Govt. Polytechnic Institute, Nagpur Sadar, Nagpur 440001 (INDIA) urmilas@rediffmail.com Cell : +919422803996

More information

SYNTHESIZED STEREO MAPPING VIA DEEP NEURAL NETWORKS FOR NOISY SPEECH RECOGNITION

SYNTHESIZED STEREO MAPPING VIA DEEP NEURAL NETWORKS FOR NOISY SPEECH RECOGNITION 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) SYNTHESIZED STEREO MAPPING VIA DEEP NEURAL NETWORKS FOR NOISY SPEECH RECOGNITION Jun Du 1, Li-Rong Dai 1, Qiang Huo

More information

Two-Layered Audio-Visual Speech Recognition for Robots in Noisy Environments

Two-Layered Audio-Visual Speech Recognition for Robots in Noisy Environments The 2 IEEE/RSJ International Conference on Intelligent Robots and Systems October 8-22, 2, Taipei, Taiwan Two-Layered Audio-Visual Speech Recognition for Robots in Noisy Environments Takami Yoshida, Kazuhiro

More information

DIRECT MODELING OF RAW AUDIO WITH DNNS FOR WAKE WORD DETECTION

DIRECT MODELING OF RAW AUDIO WITH DNNS FOR WAKE WORD DETECTION DIRECT MODELING OF RAW AUDIO WITH DNNS FOR WAKE WORD DETECTION Kenichi Kumatani, Sankaran Panchapagesan, Minhua Wu, Minjae Kim, Nikko Ström, Gautam Tiwari, Arindam Mandal Amazon Inc. ABSTRACT In this work,

More information

EMOTION DETECTION IN SPEECH USING DEEP NETWORKS. Mohamed R. Amer*, Behjat Siddiquie, Colleen Richey, and Ajay Divakaran

EMOTION DETECTION IN SPEECH USING DEEP NETWORKS. Mohamed R. Amer*, Behjat Siddiquie, Colleen Richey, and Ajay Divakaran 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) EMOTION DETECTION IN SPEECH USING DEEP NETWORKS Mohamed R. Amer*, Behjat Siddiquie, Colleen Richey, and Ajay Divakaran

More information

Time series, HMMs, Kalman Filters

Time series, HMMs, Kalman Filters Classic HMM tutorial see class website: *L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. of the IEEE, Vol.77, No.2, pp.257--286, 1989. Time series,

More information

Bidirectional Truncated Recurrent Neural Networks for Efficient Speech Denoising

Bidirectional Truncated Recurrent Neural Networks for Efficient Speech Denoising Bidirectional Truncated Recurrent Neural Networks for Efficient Speech Denoising Philémon Brakel, Dirk Stroobandt, Benjamin Schrauwen Department of Electronics and Information Systems, Ghent University,

More information

Detection and Extraction of Events from s

Detection and Extraction of Events from  s Detection and Extraction of Events from Emails Shashank Senapaty Department of Computer Science Stanford University, Stanford CA senapaty@cs.stanford.edu December 12, 2008 Abstract I build a system to

More information

Title. Author(s)Takeuchi, Shin'ichi; Tamura, Satoshi; Hayamizu, Sato. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)Takeuchi, Shin'ichi; Tamura, Satoshi; Hayamizu, Sato. Issue Date Doc URL. Type. Note. File Information Title Human Action Recognition Using Acceleration Informat Author(s)Takeuchi, Shin'ichi; Tamura, Satoshi; Hayamizu, Sato Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 829-832

More information

CS 532c Probabilistic Graphical Models N-Best Hypotheses. December

CS 532c Probabilistic Graphical Models N-Best Hypotheses. December CS 532c Probabilistic Graphical Models N-Best Hypotheses Zvonimir Rakamaric Chris Dabrowski December 18 2004 Contents 1 Introduction 3 2 Background Info 3 3 Brute Force Algorithm 4 3.1 Description.........................................

More information

Baseball Game Highlight & Event Detection

Baseball Game Highlight & Event Detection Baseball Game Highlight & Event Detection Student: Harry Chao Course Adviser: Winston Hu 1 Outline 1. Goal 2. Previous methods 3. My flowchart 4. My methods 5. Experimental result 6. Conclusion & Future

More information

COPYRIGHTED MATERIAL. Introduction. 1.1 Introduction

COPYRIGHTED MATERIAL. Introduction. 1.1 Introduction 1 Introduction 1.1 Introduction One of the most fascinating characteristics of humans is their capability to communicate ideas by means of speech. This capability is undoubtedly one of the facts that has

More information

Deep Learning. Volker Tresp Summer 2014

Deep Learning. Volker Tresp Summer 2014 Deep Learning Volker Tresp Summer 2014 1 Neural Network Winter and Revival While Machine Learning was flourishing, there was a Neural Network winter (late 1990 s until late 2000 s) Around 2010 there

More information

Object Tracking System Using Motion Detection and Sound Detection

Object Tracking System Using Motion Detection and Sound Detection Object Tracking System Using Motion Detection and Sound Detection Prashansha Jain Computer Science department Medicaps Institute of Technology and Management, Indore, MP, India Dr. C.S. Satsangi Head of

More information

Deep Belief Networks for phone recognition

Deep Belief Networks for phone recognition Deep Belief Networks for phone recognition Abdel-rahman Mohamed, George Dahl, and Geoffrey Hinton Department of Computer Science University of Toronto {asamir,gdahl,hinton}@cs.toronto.edu Abstract Hidden

More information

A Comparison of Sequence-Trained Deep Neural Networks and Recurrent Neural Networks Optical Modeling For Handwriting Recognition

A Comparison of Sequence-Trained Deep Neural Networks and Recurrent Neural Networks Optical Modeling For Handwriting Recognition A Comparison of Sequence-Trained Deep Neural Networks and Recurrent Neural Networks Optical Modeling For Handwriting Recognition Théodore Bluche, Hermann Ney, Christopher Kermorvant SLSP 14, Grenoble October

More information

SOUND EVENT DETECTION AND CONTEXT RECOGNITION 1 INTRODUCTION. Toni Heittola 1, Annamaria Mesaros 1, Tuomas Virtanen 1, Antti Eronen 2

SOUND EVENT DETECTION AND CONTEXT RECOGNITION 1 INTRODUCTION. Toni Heittola 1, Annamaria Mesaros 1, Tuomas Virtanen 1, Antti Eronen 2 Toni Heittola 1, Annamaria Mesaros 1, Tuomas Virtanen 1, Antti Eronen 2 1 Department of Signal Processing, Tampere University of Technology Korkeakoulunkatu 1, 33720, Tampere, Finland toni.heittola@tut.fi,

More information

DEEPFINNS. Group 3 Members FPGA IMPLEMENTATION OF A DEEP NEURAL NETWORK FOR SPEECH RECOGNITION. Fall 2016 LINDSAY DAVIS

DEEPFINNS. Group 3 Members FPGA IMPLEMENTATION OF A DEEP NEURAL NETWORK FOR SPEECH RECOGNITION. Fall 2016 LINDSAY DAVIS Fall 2016 DEEPFINNS FPGA IMPLEMENTATION OF A DEEP NEURAL NETWORK FOR SPEECH RECOGNITION Group 3 Members LINDSAY DAVIS Electrical Engineering MICHAEL LOPEZ-BRAU Electrical Engineering ESTELLA GONG Computer

More information

Human Computer Interaction Using Speech Recognition Technology

Human Computer Interaction Using Speech Recognition Technology International Bulletin of Mathematical Research Volume 2, Issue 1, March 2015 Pages 231-235, ISSN: 2394-7802 Human Computer Interaction Using Recognition Technology Madhu Joshi 1 and Saurabh Ranjan Srivastava

More information

Manual operations of the voice identification program GritTec's Speaker-ID: The Mobile Client

Manual operations of the voice identification program GritTec's Speaker-ID: The Mobile Client Manual operations of the voice identification program GritTec's Speaker-ID: The Mobile Client Version 4.00 2017 Title Short name of product Version 4.00 Manual operations of GritTec s Speaker-ID: The Mobile

More information

System Identification Related Problems at

System Identification Related Problems at media Technologies @ Ericsson research (New organization Taking Form) System Identification Related Problems at MT@ER Erlendur Karlsson, PhD 1 Outline Ericsson Publications and Blogs System Identification

More information

Maximum Likelihood Beamforming for Robust Automatic Speech Recognition

Maximum Likelihood Beamforming for Robust Automatic Speech Recognition Maximum Likelihood Beamforming for Robust Automatic Speech Recognition Barbara Rauch barbara@lsv.uni-saarland.de IGK Colloquium, Saarbrücken, 16 February 2006 Agenda Background: Standard ASR Robust ASR

More information

The Hitachi/JHU CHiME-5 system: Advances in speech recognition for everyday home environments using multiple microphone arrays

The Hitachi/JHU CHiME-5 system: Advances in speech recognition for everyday home environments using multiple microphone arrays CHiME2018 workshop The Hitachi/JHU CHiME-5 system: Advances in speech recognition for everyday home environments using multiple microphone arrays Naoyuki Kanda 1, Rintaro Ikeshita 1, Shota Horiguchi 1,

More information

On-line One Stroke Character Recognition Using Directional Features

On-line One Stroke Character Recognition Using Directional Features On-line One Stroke Character Recognition Using Directional Features Blind for review process 1 1 Blind for review process Abstract. This paper presents a method based on directional features for recognizing

More information

arxiv: v5 [cs.lg] 21 Feb 2014

arxiv: v5 [cs.lg] 21 Feb 2014 Do Deep Nets Really Need to be Deep? arxiv:1312.6184v5 [cs.lg] 21 Feb 2014 Lei Jimmy Ba University of Toronto jimmy@psi.utoronto.ca Abstract Rich Caruana Microsoft Research rcaruana@microsoft.com Currently,

More information

Making an on-device personal assistant a reality

Making an on-device personal assistant a reality June 2018 @qualcomm_tech Making an on-device personal assistant a reality Qualcomm Technologies, Inc. AI brings human-like understanding and behaviors to the machines Perception Hear, see, and observe

More information

Speech Technology Using in Wechat

Speech Technology Using in Wechat Speech Technology Using in Wechat FENG RAO Powered by WeChat Outline Introduce Algorithm of Speech Recognition Acoustic Model Language Model Decoder Speech Technology Open Platform Framework of Speech

More information

Voice. Voice. Patterson EagleSoft Overview Voice 629

Voice. Voice. Patterson EagleSoft Overview Voice 629 Voice Voice Using the Microsoft voice engine, Patterson EagleSoft's Voice module is now faster, easier and more efficient than ever. Please refer to your Voice Installation guide prior to installing the

More information

SSL for Circular Arrays of Mics

SSL for Circular Arrays of Mics SSL for Circular Arrays of Mics Yong Rui, Dinei Florêncio, Warren Lam, and Jinyan Su Microsoft Research ABSTRACT Circular arrays are of particular interest for a number of scenarios, particularly because

More information

ModelStructureSelection&TrainingAlgorithmsfor an HMMGesture Recognition System

ModelStructureSelection&TrainingAlgorithmsfor an HMMGesture Recognition System ModelStructureSelection&TrainingAlgorithmsfor an HMMGesture Recognition System Nianjun Liu, Brian C. Lovell, Peter J. Kootsookos, and Richard I.A. Davis Intelligent Real-Time Imaging and Sensing (IRIS)

More information

Environment Independent Speech Recognition System using MFCC (Mel-frequency cepstral coefficient)

Environment Independent Speech Recognition System using MFCC (Mel-frequency cepstral coefficient) Environment Independent Speech Recognition System using MFCC (Mel-frequency cepstral coefficient) Kamalpreet kaur #1, Jatinder Kaur *2 #1, *2 Department of Electronics and Communication Engineering, CGCTC,

More information

Lecture 13. Deep Belief Networks. Michael Picheny, Bhuvana Ramabhadran, Stanley F. Chen

Lecture 13. Deep Belief Networks. Michael Picheny, Bhuvana Ramabhadran, Stanley F. Chen Lecture 13 Deep Belief Networks Michael Picheny, Bhuvana Ramabhadran, Stanley F. Chen IBM T.J. Watson Research Center Yorktown Heights, New York, USA {picheny,bhuvana,stanchen}@us.ibm.com 12 December 2012

More information

A long, deep and wide artificial neural net for robust speech recognition in unknown noise

A long, deep and wide artificial neural net for robust speech recognition in unknown noise A long, deep and wide artificial neural net for robust speech recognition in unknown noise Feipeng Li, Phani S. Nidadavolu, and Hynek Hermansky Center for Language and Speech Processing Johns Hopkins University,

More information

From Gaze to Focus of Attention

From Gaze to Focus of Attention From Gaze to Focus of Attention Rainer Stiefelhagen, Michael Finke, Jie Yang, Alex Waibel stiefel@ira.uka.de, finkem@cs.cmu.edu, yang+@cs.cmu.edu, ahw@cs.cmu.edu Interactive Systems Laboratories University

More information

LOW-RANK MATRIX FACTORIZATION FOR DEEP NEURAL NETWORK TRAINING WITH HIGH-DIMENSIONAL OUTPUT TARGETS

LOW-RANK MATRIX FACTORIZATION FOR DEEP NEURAL NETWORK TRAINING WITH HIGH-DIMENSIONAL OUTPUT TARGETS LOW-RANK MATRIX FACTORIZATION FOR DEEP NEURAL NETWORK TRAINING WITH HIGH-DIMENSIONAL OUTPUT TARGETS Tara N. Sainath, Brian Kingsbury, Vikas Sindhwani, Ebru Arisoy, Bhuvana Ramabhadran IBM T. J. Watson

More information

Voice control PRINCIPLE OF OPERATION USING VOICE CONTROL. Activating the system

Voice control PRINCIPLE OF OPERATION USING VOICE CONTROL. Activating the system control PRINCIPLE OF OPERATION control enables operation of the audio and telephone systems without the need to divert your attention from the road ahead in order to change settings, or receive feedback

More information

3D model classification using convolutional neural network

3D model classification using convolutional neural network 3D model classification using convolutional neural network JunYoung Gwak Stanford jgwak@cs.stanford.edu Abstract Our goal is to classify 3D models directly using convolutional neural network. Most of existing

More information

Gesture Identification Based Remote Controlled Robot

Gesture Identification Based Remote Controlled Robot Gesture Identification Based Remote Controlled Robot Manjusha Dhabale 1 and Abhijit Kamune 2 Assistant Professor, Department of Computer Science and Engineering, Ramdeobaba College of Engineering, Nagpur,

More information

A Fast Learning Algorithm for Deep Belief Nets

A Fast Learning Algorithm for Deep Belief Nets A Fast Learning Algorithm for Deep Belief Nets Geoffrey E. Hinton, Simon Osindero Department of Computer Science University of Toronto, Toronto, Canada Yee-Whye Teh Department of Computer Science National

More information

Audio-visual interaction in sparse representation features for noise robust audio-visual speech recognition

Audio-visual interaction in sparse representation features for noise robust audio-visual speech recognition ISCA Archive http://www.isca-speech.org/archive Auditory-Visual Speech Processing (AVSP) 2013 Annecy, France August 29 - September 1, 2013 Audio-visual interaction in sparse representation features for

More information

ZEED T-Connect User Guide for DA Linkage

ZEED T-Connect User Guide for DA Linkage ZEED T-Connect User Guide for DA Linkage TABLE OF CONTENTS 1. Introduction 1. About DA Linkage 2. Operating Conditions 2. Screen Overview 1. Display Audio (DA) 2. App Suite Screen 3. Before Setup 1. App

More information

Acoustic to Articulatory Mapping using Memory Based Regression and Trajectory Smoothing

Acoustic to Articulatory Mapping using Memory Based Regression and Trajectory Smoothing Acoustic to Articulatory Mapping using Memory Based Regression and Trajectory Smoothing Samer Al Moubayed Center for Speech Technology, Department of Speech, Music, and Hearing, KTH, Sweden. sameram@kth.se

More information

Kernels vs. DNNs for Speech Recognition

Kernels vs. DNNs for Speech Recognition Kernels vs. DNNs for Speech Recognition Joint work with: Columbia: Linxi (Jim) Fan, Michael Collins (my advisor) USC: Zhiyun Lu, Kuan Liu, Alireza Bagheri Garakani, Dong Guo, Aurélien Bellet, Fei Sha IBM:

More information

Separating Speech From Noise Challenge

Separating Speech From Noise Challenge Separating Speech From Noise Challenge We have used the data from the PASCAL CHiME challenge with the goal of training a Support Vector Machine (SVM) to estimate a noise mask that labels time-frames/frequency-bins

More information

Dynamic Routing Between Capsules

Dynamic Routing Between Capsules Report Explainable Machine Learning Dynamic Routing Between Capsules Author: Michael Dorkenwald Supervisor: Dr. Ullrich Köthe 28. Juni 2018 Inhaltsverzeichnis 1 Introduction 2 2 Motivation 2 3 CapusleNet

More information

Machine Problem 8 - Mean Field Inference on Boltzman Machine

Machine Problem 8 - Mean Field Inference on Boltzman Machine CS498: Applied Machine Learning Spring 2018 Machine Problem 8 - Mean Field Inference on Boltzman Machine Professor David A. Forsyth Auto-graded assignment Introduction Mean-Field Approximation is a useful

More information

System Identification Related Problems at SMN

System Identification Related Problems at SMN Ericsson research SeRvices, MulTimedia and Network Features System Identification Related Problems at SMN Erlendur Karlsson SysId Related Problems @ ER/SMN Ericsson External 2016-05-09 Page 1 Outline Research

More information

Long Short-Term Memory Recurrent Neural Network Architectures for Large Scale Acoustic Modeling

Long Short-Term Memory Recurrent Neural Network Architectures for Large Scale Acoustic Modeling INTERSPEECH 2014 Long Short-Term Memory Recurrent Neural Network Architectures for Large Scale Acoustic Modeling Haşim Sak, Andrew Senior, Françoise Beaufays Google, USA {hasim,andrewsenior,fsb@google.com}

More information

Interactive Voice Response System for College automation

Interactive Voice Response System for College automation Interactive Voice Response System for College automation Ms. Ayesha Mahamadshafi Attar 1, Ms. ShrutiSudhir Aitavade 2, Ms. PoonamArjunKalkhambkar 3, Ms. SofiyaRiyaj Nadaf 4 1Department of Computer Science

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms for Inference Fall 2014

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms for Inference Fall 2014 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms for Inference Fall 2014 1 Course Overview This course is about performing inference in complex

More information

An Empirical Evaluation of Deep Architectures on Problems with Many Factors of Variation

An Empirical Evaluation of Deep Architectures on Problems with Many Factors of Variation An Empirical Evaluation of Deep Architectures on Problems with Many Factors of Variation Hugo Larochelle, Dumitru Erhan, Aaron Courville, James Bergstra, and Yoshua Bengio Université de Montréal 13/06/2007

More information

Perspectives on Multimedia Quality Prediction Methodologies for Advanced Mobile and IP-based Telephony

Perspectives on Multimedia Quality Prediction Methodologies for Advanced Mobile and IP-based Telephony Perspectives on Multimedia Quality Prediction Methodologies for Advanced Mobile and IP-based Telephony Nobuhiko Kitawaki University of Tsukuba 1-1-1, Tennoudai, Tsukuba-shi, 305-8573 Japan. E-mail: kitawaki@cs.tsukuba.ac.jp

More information

Hyperspectral Image Anomaly Targets Detection with Online Deep Learning

Hyperspectral Image Anomaly Targets Detection with Online Deep Learning This full text paper was peer-reviewed at the direction of IEEE Instrumentation and Measurement Society prior to the acceptance and publication. Hyperspectral Image Anomaly Targets Detection with Online

More information

BLUETOOTH HANDSFREELINK

BLUETOOTH HANDSFREELINK BLUETOOTH HANDSFREELINK Learn how to operate the vehicle s hands-free calling system. Basic HFL Operation Make and receive phone calls using the vehicle s audio system, without handling your phone. Visit

More information

Navi 900 IntelliLink, Touch R700 IntelliLink Frequently Asked Questions

Navi 900 IntelliLink, Touch R700 IntelliLink Frequently Asked Questions Index 1. Audio... 1 2. Navigation (only Navi 900 IntelliLink)... 2 3. Phone... 3 4. Apple CarPlay... 4 5. Android Auto... 6 6. Speech recognition... 8 7. Color instrument panel... 9 8. Favourites... 9

More information

Automatic Transcription of Speech From Applied Research to the Market

Automatic Transcription of Speech From Applied Research to the Market Think beyond the limits! Automatic Transcription of Speech From Applied Research to the Market Contact: Jimmy Kunzmann kunzmann@eml.org European Media Laboratory European Media Laboratory (founded 1997)

More information

NAVIGATION* Basic Navigation Operation. Learn how to enter a destination and operate the navigation system.

NAVIGATION* Basic Navigation Operation. Learn how to enter a destination and operate the navigation system. * Learn how to enter a destination and operate the navigation system. Basic Navigation Operation NAVIGATION A real-time navigation system uses GPS and a map database to show your current location and help

More information

WHO WANTS TO BE A MILLIONAIRE?

WHO WANTS TO BE A MILLIONAIRE? IDIAP COMMUNICATION REPORT WHO WANTS TO BE A MILLIONAIRE? Huseyn Gasimov a Aleksei Triastcyn Hervé Bourlard Idiap-Com-03-2012 JULY 2012 a EPFL Centre du Parc, Rue Marconi 19, PO Box 592, CH - 1920 Martigny

More information

Before using the Handsfree

Before using the Handsfree Handsfree Before using the Handsfree What can be made with the handsfree It is possible to connect the Bluetooth Phone of which the operation has been confirmed to the in-vehicle equipment through the

More information

INTERACTIVE REFINEMENT OF SUPERVISED AND SEMI-SUPERVISED SOUND SOURCE SEPARATION ESTIMATES

INTERACTIVE REFINEMENT OF SUPERVISED AND SEMI-SUPERVISED SOUND SOURCE SEPARATION ESTIMATES INTERACTIVE REFINEMENT OF SUPERVISED AND SEMI-SUPERVISED SOUND SOURCE SEPARATION ESTIMATES Nicholas J. Bryan Gautham J. Mysore Center for Computer Research in Music and Acoustics, Stanford University Adobe

More information

Ruslan Salakhutdinov and Geoffrey Hinton. University of Toronto, Machine Learning Group IRGM Workshop July 2007

Ruslan Salakhutdinov and Geoffrey Hinton. University of Toronto, Machine Learning Group IRGM Workshop July 2007 SEMANIC HASHING Ruslan Salakhutdinov and Geoffrey Hinton University of oronto, Machine Learning Group IRGM orkshop July 2007 Existing Methods One of the most popular and widely used in practice algorithms

More information

CS 4510/9010 Applied Machine Learning. Deep Learning. Paula Matuszek Fall copyright Paula Matuszek 2016

CS 4510/9010 Applied Machine Learning. Deep Learning. Paula Matuszek Fall copyright Paula Matuszek 2016 CS 4510/9010 Applied Machine Learning 1 Deep Learning Paula Matuszek Fall 2016 Beyond Simple Neural Nets 2 In the last few ideas we have seen some surprisingly rapid progress in some areas of AI Image

More information

Speech Applications. How do they work?

Speech Applications. How do they work? Speech Applications How do they work? What is a VUI? What the user interacts with when using a speech application VUI Elements Prompts or System Messages Prerecorded or Synthesized Grammars Define the

More information

TWO-STEP SEMI-SUPERVISED APPROACH FOR MUSIC STRUCTURAL CLASSIFICATION. Prateek Verma, Yang-Kai Lin, Li-Fan Yu. Stanford University

TWO-STEP SEMI-SUPERVISED APPROACH FOR MUSIC STRUCTURAL CLASSIFICATION. Prateek Verma, Yang-Kai Lin, Li-Fan Yu. Stanford University TWO-STEP SEMI-SUPERVISED APPROACH FOR MUSIC STRUCTURAL CLASSIFICATION Prateek Verma, Yang-Kai Lin, Li-Fan Yu Stanford University ABSTRACT Structural segmentation involves finding hoogeneous sections appearing

More information

D-Rex. Final Report. An Ho. April 21, 14

D-Rex. Final Report. An Ho. April 21, 14 D-Rex Final Report An Ho April 21, 14 University of Florida Department of Electrical and Computer Engineering EEL 4665 IMDL Instructors: A. Antonio Arroyo, Eric M. Schwartz TA: Andrew Gray Table of Contents

More information

TIME-DELAYED BOTTLENECK HIGHWAY NETWORKS USING A DFT FEATURE FOR KEYWORD SPOTTING

TIME-DELAYED BOTTLENECK HIGHWAY NETWORKS USING A DFT FEATURE FOR KEYWORD SPOTTING TIME-DELAYED BOTTLENECK HIGHWAY NETWORKS USING A DFT FEATURE FOR KEYWORD SPOTTING Jinxi Guo, Kenichi Kumatani, Ming Sun, Minhua Wu, Anirudh Raju, Nikko Ström, Arindam Mandal lennyguo@g.ucla.edu, {kumatani,

More information

Xing Fan, Carlos Busso and John H.L. Hansen

Xing Fan, Carlos Busso and John H.L. Hansen Xing Fan, Carlos Busso and John H.L. Hansen Center for Robust Speech Systems (CRSS) Erik Jonsson School of Engineering & Computer Science Department of Electrical Engineering University of Texas at Dallas

More information

System Identification Related Problems at SMN

System Identification Related Problems at SMN Ericsson research SeRvices, MulTimedia and Networks System Identification Related Problems at SMN Erlendur Karlsson SysId Related Problems @ ER/SMN Ericsson External 2015-04-28 Page 1 Outline Research

More information

An Introduction to Pattern Recognition

An Introduction to Pattern Recognition An Introduction to Pattern Recognition Speaker : Wei lun Chao Advisor : Prof. Jian-jiun Ding DISP Lab Graduate Institute of Communication Engineering 1 Abstract Not a new research field Wide range included

More information

Training LDCRF model on unsegmented sequences using Connectionist Temporal Classification

Training LDCRF model on unsegmented sequences using Connectionist Temporal Classification Training LDCRF model on unsegmented sequences using Connectionist Temporal Classification 1 Amir Ahooye Atashin, 2 Kamaledin Ghiasi-Shirazi, 3 Ahad Harati Department of Computer Engineering Ferdowsi University

More information

Proceedings of the International MultiConference of Engineers and Computer Scientists 2018 Vol I IMECS 2018, March 14-16, 2018, Hong Kong

Proceedings of the International MultiConference of Engineers and Computer Scientists 2018 Vol I IMECS 2018, March 14-16, 2018, Hong Kong , March 14-16, 2018, Hong Kong , March 14-16, 2018, Hong Kong , March 14-16, 2018, Hong Kong , March 14-16, 2018, Hong Kong TABLE I CLASSIFICATION ACCURACY OF DIFFERENT PRE-TRAINED MODELS ON THE TEST DATA

More information

Models with Display Audio Basic HFL Operation

Models with Display Audio Basic HFL Operation Basic HFL Operation Make and receive phone calls using the vehicle s audio system, without handling your phone. Visit automobiles.honda.com/handsfreelink/ (U.S.) or phone (888) 528-7876 (U.S. and Canada)

More information

IHF 1500 Bluetooth Handsfree Kit. Troubleshooting. and. Frequently Asked Questions Guide (FAQ) Version 1.0 Dec. 1st, 2006 All Rights Reserved

IHF 1500 Bluetooth Handsfree Kit. Troubleshooting. and. Frequently Asked Questions Guide (FAQ) Version 1.0 Dec. 1st, 2006 All Rights Reserved IHF 1500 Bluetooth Handsfree Kit Troubleshooting and Frequently Asked Questions Guide (FAQ) Version 1.0 Dec. 1st, 2006 All Rights Reserved Item Symptom Solution Next-Level Solution Last Solution a.1 Can't

More information

Using Speech Recognition for controlling a Pan-Tilt-Zoom Network Camera

Using Speech Recognition for controlling a Pan-Tilt-Zoom Network Camera Using Speech Recognition for controlling a Pan-Tilt-Zoom Network Camera Enrique Garcia Department of Computer Science University of Lund Lund, Sweden enriqueg@axis.com Sven Grönquist Department of Computer

More information

GENESIS G80 QUICK START GUIDE. Phone Pairing Navigation Genesis Connected Services Common Voice Commands

GENESIS G80 QUICK START GUIDE. Phone Pairing Navigation Genesis Connected Services Common Voice Commands GENESIS G80 QUICK START GUIDE Phone Pairing Navigation Genesis Connected Services Common Voice Commands Premium Navigation PHONE PAIRING CONNECTING FOR THE FIRST TIME 1. The vehicle s shifter must be in

More information

Collecting data types from the thermodynamic data and registering those at the DCO data portal.

Collecting data types from the thermodynamic data and registering those at the DCO data portal. Use Case: Collecting data types from the thermodynamic data and registering those at the DCO data portal. Point of Contact Name: Apurva Kumar Sinha (sinhaa2@rpi.edu) Use Case Name Give a short descriptive

More information

DEEP LEARNING TO DIVERSIFY BELIEF NETWORKS FOR REMOTE SENSING IMAGE CLASSIFICATION

DEEP LEARNING TO DIVERSIFY BELIEF NETWORKS FOR REMOTE SENSING IMAGE CLASSIFICATION DEEP LEARNING TO DIVERSIFY BELIEF NETWORKS FOR REMOTE SENSING IMAGE CLASSIFICATION S.Dhanalakshmi #1 #PG Scholar, Department of Computer Science, Dr.Sivanthi Aditanar college of Engineering, Tiruchendur

More information

Restricted Boltzmann Machines. Shallow vs. deep networks. Stacked RBMs. Boltzmann Machine learning: Unsupervised version

Restricted Boltzmann Machines. Shallow vs. deep networks. Stacked RBMs. Boltzmann Machine learning: Unsupervised version Shallow vs. deep networks Restricted Boltzmann Machines Shallow: one hidden layer Features can be learned more-or-less independently Arbitrary function approximator (with enough hidden units) Deep: two

More information

Fully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information

Fully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information Fully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information Ana González, Marcos Ortega Hortas, and Manuel G. Penedo University of A Coruña, VARPA group, A Coruña 15071,

More information

Modeling Spectral Envelopes Using Restricted Boltzmann Machines and Deep Belief Networks for Statistical Parametric Speech Synthesis

Modeling Spectral Envelopes Using Restricted Boltzmann Machines and Deep Belief Networks for Statistical Parametric Speech Synthesis IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 21, NO. 10, OCTOBER 2013 2129 Modeling Spectral Envelopes Using Restricted Boltzmann Machines and Deep Belief Networks for Statistical

More information

CS231A Course Project Final Report Sign Language Recognition with Unsupervised Feature Learning

CS231A Course Project Final Report Sign Language Recognition with Unsupervised Feature Learning CS231A Course Project Final Report Sign Language Recognition with Unsupervised Feature Learning Justin Chen Stanford University justinkchen@stanford.edu Abstract This paper focuses on experimenting with

More information

PHONE PAIRING QUICK START

PHONE PAIRING QUICK START PHONE PAIRING QUICK START QUICK START You must connect (pair) your smartphone to the vehicle to use the vehicle s hands-free phone function. Pairing can be done only when the vehicle is stopped. Follow

More information

2015 The MathWorks, Inc. 1

2015 The MathWorks, Inc. 1 2015 The MathWorks, Inc. 1 개발에서구현까지 MATLAB 환경에서의딥러닝 김종남 Application Engineer 2015 The MathWorks, Inc. 2 3 Why MATLAB for Deep Learning? MATLAB is Productive MATLAB is Fast MATLAB Integrates with Open Source

More information

Collecting data types from the thermodynamic data and registering those at the DCO data portal.

Collecting data types from the thermodynamic data and registering those at the DCO data portal. Use Case: Collecting data types from the thermodynamic data and registering those at the DCO data portal. Point of Contact Name: Apurva Kumar Sinha (sinhaa2@rpi.edu) Use Case Name Give a short descriptive

More information

Dynamic Time Warping

Dynamic Time Warping Centre for Vision Speech & Signal Processing University of Surrey, Guildford GU2 7XH. Dynamic Time Warping Dr Philip Jackson Acoustic features Distance measures Pattern matching Distortion penalties DTW

More information

Speech Synthesis. Simon King University of Edinburgh

Speech Synthesis. Simon King University of Edinburgh Speech Synthesis Simon King University of Edinburgh Hybrid speech synthesis Partial synthesis Case study: Trajectory Tiling Orientation SPSS (with HMMs or DNNs) flexible, robust to labelling errors but

More information

Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction

Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction Stefan Müller, Gerhard Rigoll, Andreas Kosmala and Denis Mazurenok Department of Computer Science, Faculty of

More information

dowing Syste Xspeak: A Use for a Speech Interface i Mark S. Ackerman, Sanjay Manandhar and Chris M. Schmandt

dowing Syste Xspeak: A Use for a Speech Interface i Mark S. Ackerman, Sanjay Manandhar and Chris M. Schmandt Xspeak: A Use for a Speech Interface i dowing Syste Mark S. Ackerman, Sanjay Manandhar and Chris M. Schmandt Media Laboratory, M.I.T. Cambridge, MA 02139 USA (612') 253-5156 We discuss an application to

More information

Modeling pigeon behaviour using a Conditional Restricted Boltzmann Machine

Modeling pigeon behaviour using a Conditional Restricted Boltzmann Machine Modeling pigeon behaviour using a Conditional Restricted Boltzmann Machine Matthew D. Zeiler 1,GrahamW.Taylor 1, Nikolaus F. Troje 2 and Geoffrey E. Hinton 1 1- University of Toronto - Dept. of Computer

More information