Speaker Independent Recognition System with Mouse Movements
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2012, Vol 2, Issue 1
Abstract
Speech recognition is potentially a multi-billion dollar industry in the near future. It is a natural alternative interface to computers for people with limited mobility in their arms and hands, sight, hearing limitation. For most current voice-mail systems, one has to follow series of touch-tone button presses to navigate through a hierarchical menu. Speech Recognition has the potential to cut through the menu hierarchy. Recently, neural networks have been considered for speech recognition tasks since in many cases they have shown comparable performance than the traditional approaches. There are two in-built threads in the recognition system. Thread 1 maintains the details about input acquisition where as thread 2 contains the classifier and decoder. The classifier used in this research is Radial Basis Function Neural Networks. The HMM graph is used as a decoder. The objective of the research is to make sure that the system is free from bugs. 100% accuracy is achieved by the recognition system.
Authors and Affiliations
Dr. R. L. K. Venkateswarlu#1 , Dr. R. Vasantha Kumari*2 , G. Vani JayaSri#3
Policy Management in Adhoc Networks
Policy-based management is based on defining a set of global rules, according to which a network or distributed system must operate. In the last few years, policy-based management has begun to emerge as the dominan...
Artificial Intelligent Bionic Devices and Robotic Controls
Functionality and design of a bionic robot arm consisting of three joints driven by elastic and compliant actuators derived from biologically inspired principles are presented. In the first design standa...
Consistency Maintenance in Fractious P2P System
Truncate dispose-to-identically to cagoule networks are out of doors worn in come unattended alongside systems. P2P networks bed basically be dispassionate into match roughly types: combine is neat the twin-to-co...
Contrast Enhancement for Emissive Display Using Histogram Equalization and Bilateral Tone Adjustment
Contrast enhancement has an important role in image processing applications. Conventional contrast enhancement techniques often fail to produce satisfactory results for broad variety of low contrast images or canno...
Offensive Decoy Technology For Cloud Data Attacks
Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of...