Text Independent Speaker Identification using Integrating Independent Component Analysis with Generalized Gaussian Mixture Model
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 12
Abstract
Recently much work has been reported in literature regarding Text Independent speaker identification models. Sailaja et al (2010)[34] has developed a Text Independent speaker identification model assuming that the speech spectra of each individual speaker can be modeled by Mel frequency cepstral coefficient and Generalized Gaussian mixture model. The limitation of this model is the feature vectors (Mel frequency cepstral coefficients) are high in dimension and assumed to be independent. But feature represented by MFCC’s are dependent and chopping some of the MFCC’s will bring falsification in the model. Hence, in this paper a new and novel Text Independent speaker identification model is developed by integrating MFCC’s with Independent component analysis(ICA) for obtaining independency and to achieve low dimensionality in feature vector extraction. Assuming that the new feature vectors follows a Generalized Gaussian Mixture Model (GGMM), the model parameters are estimated by using EM algorithm. A Bayesian classifier is used to identify each speaker. The experimental result with 50 speaker’s data base reveals that the proposed procedure outperforms the existing methods.
Authors and Affiliations
N M Ramaligeswararao, , Dr. V Sailaja, , Dr. K. Srinivasa Rao
The Impact of Quantum Computing on Present Cryptography
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subj...
Arabic Text Question Answering from an Answer Retrieval Point of View: a survey
Arabic Question Answering (QA) is gaining more importance due to the importance of the language and the dramatic increase in online Arabic content. The goal of this article is to review the state-of-the-art of Arabic QA...
Evaluation of OLSR Protocol Implementations using Analytical Hierarchical Process (AHP)
Adhoc networks are part of IEEE 802.11 Wireless LAN Standard also called Independent Basic Service Set (IBSS) and work as Peer to Peer network by default. These work without the requirement of an Infrastructure (such as...
An Algorithmic approach for abstracting transient states in timed systems
In previous works, the timed logic TCTL was extended with importants modalities, in order to abstract transient states that last for less than k time units. For all modalities of this extension, called TCTL?, the decidab...
Security Concerns in E-payment and the Law in Jordan
Recently communications and information technology became widely used in various aspects of life. The internet becomes the main network for information support. Using of internet enabled public and private organizations...