Continuous Bangla Speech Segmentation using Short-term Speech Features Extraction Approaches
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 11
Abstract
This paper presents simple and novel feature extraction approaches for segmenting continuous Bangla speech sentences into words/sub-words. These methods are based on two simple speech features, namely the time-domain features and the frequency-domain features. The time-domain features, such as short-time signal energy, short-time average zero crossing rate and the frequency-domain features, such as spectral centroid and spectral flux features are extracted in this research work. After the feature sequences are extracted, a simple dynamic thresholding criterion is applied in order to detect the word boundaries and label the entire speech sentence into a sequence of words/sub-words. All the algorithms used in this research are implemented in Matlab and the implemented automatic speech segmentation system achieved segmentation accuracy of 96%.
Authors and Affiliations
Md Mijanur Rahman , Md. Al-Amin Bhuiyan
Detection of Climate Crashes using Fuzzy Neural Networks
In this paper the detection of the climate crashes or failure that are associated with the use of climate models based on parameters induced from the climate simulation is considered. Detection and analysis of the crashe...
Rule Based Artificial Intelligent System of Cucumber Greenhouse Environment Control with IoT Technology
The method proposed here allows control cucumber greenhouse environment based on IoT technology. IoT sensors are to measure the room and air temperature, relative humidity, CO2 content, water supply, liquid fertilizer, w...
A Framework for Satellite Image Enhancement Using Quantum Genetic and Weighted IHS+Wavelet Fusion Method
This paper examined the applicability of quantum genetic algorithms to solve optimization problems posed by satellite image enhancement techniques, particularly super-resolution, and fusion. We introduce a framework star...
Design, Release, Update, Repeat: The Basic Process of a Security Protocol’s Evolution
Companies, businesses, colleges, etc. throughout the world use computer networks and telecommunications to run their operations. The convenience, information-gathering, and organizational abilities provided by computer n...
The Design and Development of Spam Risk Assessment Prototype: In Silico of Danger Theory Variants
Now-a-days, data is flowing with various types of information and it is absolutely enormous and moreover, it is in unstructured form. These raw data is meaningless unless it is processed and analyzed to retrieve all the...