Implementation of Speech Recognition System on Raspberry Pi
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 2
Abstract
[1] V.Amudha, B.Venkataramani, R.Vinoth Kumar and S. Ravishankar,“SOC Implementation of HMM Based Speaker Independent Isolated Digit Recognition System”, in Proc. of IEEE Int. Conf. on VLSI Design VLSI’07, Tiruchirappalli, 2007, [2] Ackenhusen, J. Rabiner, L, "Microprocessor implementation of an LPC-based isolated word recognizer," IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP '81.vol.6, New Jersey, Apr 1981, [3] V. Naresh, B. Venkataramani, Abhishek Karan and J. Manikandan, “PSoC based Isolated Speech Recognition System” International Conference on Communication and Signal Processing, April 3-5, India, 2013, [5] Charles Severance, “Eben Upton: Raspberry Pi,” IEEE Journal, Volume 46, Issue 10, 2013, [6] J.Manikandan, B.Venkataramani, P.Preeti, G.Sananda, and K.V. Sadhana, "Implementation of a phoneme recognition system using zero-crossing and magnitude sum function," IEEE Region 10 Conference TENCON, Trichy, 2009,
Authors and Affiliations
Sonal Agrawal, Mrs. S. Krithiga
IoT Sensor Networks- Orchestrating Connectivity, Efficiency, and Intelligence Across Diverse Domains
The advent of the Internet of Things (IoT) has led to the proliferation of sensor networks, enabling a new era of connectivity, data collection, and automation across various domains. IoT-based sensor networks comprise i...
AI-Driven UX/UI Design: Empirical Research and Applications in FinTech
This study explores the transformative impact of AI-driven UX/UI design in the FinTech sector, examining current practices, user preferences, and emerging trends. Through a mixed-methods approach, including surveys, inte...
Study and Evaluation of Student Performance Parameters using statistical features of excel
Now-a-days the performance in higher education in India is a turning point in the academics for all students. This academic performance is influenced by many factors; therefore it is essential to analyze statistically ea...
Secure Extended CVS for Academia
During the academic lifespan, almost all students find it difficult to manage and backup the coding assignments conducted during their practical. Although students are instructed to create a folder on the computer and sa...
Enhancement of Security in Wireless Sensor Network by Using Trust Evaluation and TCP/IP Based Technology
Today Wireless network technology are widely used technology in many organizations. Wireless LANs transmit and receive data without physical channel means over the air so no need for a wired connection. For this radio fr...