Investigating Lattice-Free Acoustic Modeling for Children Automatic Speech Recognition in Low-Resource Settings Under Mismatched Conditions
Abstract The progress of Automatic Speech Recognition (ASR) for children has been slower
in languages with limited resources due to various challenges such as lack of training data …
in languages with limited resources due to various challenges such as lack of training data …
[PDF][PDF] 基于HMM 的车辆行驶状态实时判别方法研究
王相海, 丛志环, 方玲玲, 秦钜鳌 - 自动化学报, 2013 - aas.net.cn
摘要对交通视频车辆轨迹时序特征下的车辆行驶状态进行研究, 提出了一种基于隐马尔科夫模型
(Hidden Markov model, HMM) 的车辆行驶状态实时判别方法. 首先对轨迹序列进行了基于轨迹 …
(Hidden Markov model, HMM) 的车辆行驶状态实时判别方法. 首先对轨迹序列进行了基于轨迹 …
Network anomaly detection by continuous hidden markov models: An evolutionary programming approach
JJ Flores, F Calderon, A Antolino… - Intelligent Data …, 2015 - content.iospress.com
Abstract Information security is an important and growing need. The most common schemes
used for detection systems include pattern-or signature-based and anomaly-based …
used for detection systems include pattern-or signature-based and anomaly-based …
隐马尔科夫模型在列车无线传输中的应用.
张金良, 裴春宝, 拥措 - Journal of Xi'an Polytechnic …, 2015 - search.ebscohost.com
English In view of the imcomplete wireless data transmission of ARIMA Model and MM
Model in train operation, the HMM (Hidden Markov Model) process theory is put forward to …
Model in train operation, the HMM (Hidden Markov Model) process theory is put forward to …
[PDF][PDF] Classification of musical genres using hidden Markov models
S Dalin-Volsing - 2017 - lup.lub.lu.se
The music content online is expanding fast, and music streaming services are in need for
algorithms that sort new music. Sorting music by their characteristics often comes down to …
algorithms that sort new music. Sorting music by their characteristics often comes down to …
[PDF][PDF] Hybrid network anomaly detection–learning hmms through evolutionary computation
Security threats for computer systems have increased immensely; these threats include
virus, denial of service, vulnerability break-in, etc. While many security mechanisms have …
virus, denial of service, vulnerability break-in, etc. While many security mechanisms have …
[PDF][PDF] MARKOV MODELS
S DALIN-VOLSING - core.ac.uk
The music content online is expanding fast, and music streaming services are in need for
algorithms that sort new music. Sorting music by their characteristics often comes down to …
algorithms that sort new music. Sorting music by their characteristics often comes down to …
[引用][C] DECLARATION OF THESIS/UNDERGRADUATE PROJECT PAPER AND COPYRIGHT
A VIJAYALAKSHMI, P DEVASVARAN, ENZBIN YAHYA - 2012