Diagonalization Matrix Method of Solving the First Basic Problem of Hidden Markov Model in Speech Recognition System
Journal Title: Annals. Computer Science Series - Year 2010, Vol 8, Issue 1
Abstract
This paper proposes a computationally efficient method of solving evaluation problem of Hidden Markov Model (HMM) with a given set of discrete observation symbols, number of states and probability distribution matrices. The observation probability for a given HMM model is evaluated using an approach in which the probability evaluation is reduced to the problem of evaluating the product of matrices with different powers and formed out of state transition probabilities and observation probabilities. Finding powers of a matrix is done by using the computationally efficient diagonalization method thereby reducing the overall computational effort for evaluating the Evaluation problem of HMM.The proposed method is compared with the existing direct method. It is found that evaluating matrix power by diagnolisation method is more suitable than that of the direct, method.
Authors and Affiliations
R. Gnanajeyaraman, G. Seenivasan
On the Role of Service Concept in IT
Hard times affecting world-wide economy have strong consequences and are challenging IT departments from all sorts of enterprises. Expensive software projects are replaced by component-based agile systems and paradigms l...
Intelligent Car System
In modern life the road safety has becomes the core issue. One single move of a driver can cause horrifying accident. The main goal of intelligent car system is to make communication with other cars on the road. The syst...
Variance Components of Models of Sudoku Square Design
This study aimed at obtaining variance component estimators for all effects of Sudoku square models. The analysis of variance (ANOVA) method was used for the derivation of the variance components for the four Sudoku mode...
Kerberos Authentication in Wireless Sensor Networks
We proposed an authentication mechanism in the wireless sensor network. Sensor network uses the Kerberos authentication scheme for the authentication of bases station in the network. Kerberos provides a centralized authe...
Proposition d’une méthode de qualification et de sélection d’un logiciel d’analyse et de suivi du référencement dans les moteurs de recherche