In this paper, we propose an extension of the backoff word n-gram language model that allows a better likelihood estimation of unseen events. Instead of usingthe (n-1)-gram to estimate the probability of an unseen n-...
详细信息
In this paper, we propose an extension of the backoff word n-gram language model that allows a better likelihood estimation of unseen events. Instead of usingthe (n-1)-gram to estimate the probability of an unseen n-gram, the proposed approach uses a class hierarchy to define a context which is more general than the unseen n-gram but more specific than the (n-1)-gram. Each node in the hierarchy is a class containing all the words of the descendant nodes (classes). Hence, the closer a node is to the root, the more general the corresponding class is. Performance is evaluated both in terms of test perplexity and word error rate (WER) on a simplified WSJ database. Experiments show an improvement of more than 26% on the unseen events perplexity.
the multiple-pronunciation lexicon (MPL) is very important to model the pronunciation variations for spontaneous speech recognition. But the introduction of MPL brings out two problems. First, the MPL will increase th...
详细信息
the multiple-pronunciation lexicon (MPL) is very important to model the pronunciation variations for spontaneous speech recognition. But the introduction of MPL brings out two problems. First, the MPL will increase the among-lexicon confusion and degrade the recognizer's performance. Second, the MPL needs more data with phonetic transcription so as to cover as many surface forms as possible. Accordingly, two solutions are proposed, they are the context-dependent weighting method and the iterative forced-alignment based transcription method. the use of them can compensate what the MPL causes and improve the overall performance. Experiments across a naturally spontaneous speech database show that the proposed methods are effective and better than other methods.
In this work we present a generic architecture for interfacing various input devices to VRML browsers. Concentrating on the aspect of navigation, our system supports the full range of potential input devices from conv...
详细信息
ISBN:
(纸本)1581134681
In this work we present a generic architecture for interfacing various input devices to VRML browsers. Concentrating on the aspect of navigation, our system supports the full range of potential input devices from conventional haptic devices like keyboard and mouse over special Virtual-Reality devices like spacemouse and joystick to, as a special feature, semantically higher level input like speech and gesture recognition. the communication between the individual components of the system is based on a context free grammar, allowing abstract modeling of the various devices and handling both discrete and continuous navigation information. Two new node extensions support the VRML author in creating highly customizable 3D applications: the DeviceSensor node allows grabbing arbitrary user input in a systematic way and the Camera node gives full control over the scene view by specifying velocity vectors and thus enabling arbitrary navigation modes. Finally, the proof of concept is given by a prototypical implementation in VRML. Copyright 2002 ACM.
A significant fact about speech perception is that intelligibility is preserved when the spectrum is shifted up or down along the frequency scale, across a fairly wide range. To study the relationship between fundamen...
详细信息
A significant fact about speech perception is that intelligibility is preserved when the spectrum is shifted up or down along the frequency scale, across a fairly wide range. To study the relationship between fundamental frequency (F0) and spectrum envelope shifts in vowel perception, we used a high-quality vocoder (STRAIGHT) to process a set of vowels spoken by 3 adult males in/hVd/context. Identification accuracy dropped by about 30% when the spectrum envelope was scaled upwards by a factor of 2.0, and in a separate condition, by about 50% when F0 was raised by 2 octaves. However, when spectrum envelope and F0 were both increased at the same time, identification accuracy showed a marked improvement, compared to conditions where each cue was manipulated separately. the synergy between formant frequency and F0 was predicted by a model which accounts for the intelligibility of frequency-shifted vowels in terms of learned relationships between measured values of F0 and formant frequencies. A second model, based on auditory excitation patterns, predicted the main effects of F0 and spectrum envelope, but did not predict the pattern of interaction.
Access control, which is one of the most important aspects of security services, is becoming increasingly an important challenge in workflow management systems. However, the traditional models of access control, such ...
详细信息
ISBN:
(纸本)8528500500
Access control, which is one of the most important aspects of security services, is becoming increasingly an important challenge in workflow management systems. However, the traditional models of access control, such as the role-based access control (RBAC), are static models without recognition of the dynamic environments in which the workflows are rooted. these context-independent models rarely can meet the requirements that the highly dynamic environments raise. In this paper, we regard authorization as a dynamic process instead of the traditional static view and take two contextual factors into account: (1) the state of related authorization processes; and (2) the state of related process instances. then, we propose a Petri-net-based model as a practical solution to the context-sensitive access control on this basis.
this paper presents a distributed dynamic object model that is aligned withthe concept of design history in the context of design problem solving activities. A distributed object model is proposed as an enabling feat...
详细信息
ISBN:
(纸本)8528500500
this paper presents a distributed dynamic object model that is aligned withthe concept of design history in the context of design problem solving activities. A distributed object model is proposed as an enabling feature for distributed CAD (computer-aided design) allowing teams to work cooperatively, accessing and exchanging information at run time in a distributed engineering environment. the architecture of the proposed CAD environment allows for the artefact properties to be associated with any relevant aspect of the design process, including those related withthe artefact specification, but also withthe organisation hierarchy, planning and process workflow.
Withthe intensification of the competition in manufacture, the distributed technology, whose aim is to promote product design process, has changed the traditional CAD serial design approach. But the distributed desig...
详细信息
ISBN:
(纸本)8528500500
Withthe intensification of the competition in manufacture, the distributed technology, whose aim is to promote product design process, has changed the traditional CAD serial design approach. But the distributed design systems also bring some new problems such as design conflict. To avoid this inconsistent situation, there must be some coordination mechanisms. At the same time, these mechanisms must not constrain the freedom of the designers too much to take their creativity away. this paper introduces a feature-based distributed CAD system to support this collaborative work. We analyze the reason of the design conflict. For addressing this conflict, we present feature-based concurrency operation model. In such model, the feature is the basic atom that can be locked and excluded from other designers using. Comparing with part level concurrency system, this mechanism doesn't limit the design flexibility too much.
the goal of our project ("Ouvej") is to conceive and realize a navigation helping system for disabled, and more specifically visually impaired people, designed around a Global Positioning System (GPS). In th...
详细信息
Collaborative design is a major industrial issue, where people from different expertise fields strongly need to cooperate. New Internet Collaboration Tools (ICT) possibilities now allow design processes to be hold ove...
详细信息
Collaborative design is a major industrial issue, where people from different expertise fields strongly need to cooperate. New Internet Collaboration Tools (ICT) possibilities now allow design processes to be hold over distributed teams. Our goal is to define a collaborative environment based on Internet technologies: Techniques, methods, and tools for CSCW in design. From the design experiment of an electromechanical plunger hold over Internet and involving mechanical and electrical engineers, this paper looks at their collaborative design activity. this leads us to present now communication tools, dedicated to specific tasks that are actually not supported, especially shared concept formalization among technical experts.
In this paper we describe a people tracking system addressing the visual surveillance of outdoor environments. this context involves the detection of objects moving in a sequence of images acquired by a TV camera and ...
详细信息
In this paper we describe a people tracking system addressing the visual surveillance of outdoor environments. this context involves the detection of objects moving in a sequence of images acquired by a TV camera and the recognition and tracking of human figures to allow the analysis of their gestures. the proposed tracking approach does not consider the human body parts as features to be tracked, nor uses a priori body models. Moreover, also classical prediction models are useless in the specific context (visual surveillance of archaeological sites) because the behaviors identified as illegal imply a sequence of unpredictable gestures performed in a small area. the proposed method is based on the estimation of similarity between human figures segmented in the temporal sequence. the similarity score is estimated as a function of the number of corresponding feature points. the system has been verified on real image sequences acquired by a static TV camera while the gestures normally performed by intruders were simulated in a real archaeological site.
暂无评论