首页 > 最新文献

2006 IEEE 14th Signal Processing and Communications Applications最新文献

英文 中文
On the Orthogonality of Block Wavelet Transforms 块小波变换的正交性
Pub Date : 2006-04-17 DOI: 10.1109/SIU.2006.1659738
M. Dogan, O. Gerek
In this paper, orthogonality of block wavelet transforms (BWT) is shown. First the orthogonality of one-stage and two-stage block wavelet transforms is shown, then the result is generalized for multi-stage block wavelet transform
研究了块小波变换的正交性。首先给出了一级和二级分块小波变换的正交性,然后将其推广到多级分块小波变换
{"title":"On the Orthogonality of Block Wavelet Transforms","authors":"M. Dogan, O. Gerek","doi":"10.1109/SIU.2006.1659738","DOIUrl":"https://doi.org/10.1109/SIU.2006.1659738","url":null,"abstract":"In this paper, orthogonality of block wavelet transforms (BWT) is shown. First the orthogonality of one-stage and two-stage block wavelet transforms is shown, then the result is generalized for multi-stage block wavelet transform","PeriodicalId":415037,"journal":{"name":"2006 IEEE 14th Signal Processing and Communications Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Texture Classification Using Edge Detection and Association Rules 基于边缘检测和关联规则的纹理分类
Pub Date : 2006-04-17 DOI: 10.1109/SIU.2006.1659696
M. Karabatak, A. Şengur, M. C. Ince
Texture can be defined as a local statistical pattern of texture primitives in observer's domain of interest. Texture classification aims to assign texture labels to unknown textures, according to training samples and classification rules. Association rules capture both structural and statistical information, and automatically identify the structures that occur most frequently and relationships that have significant discriminative power. So, association rules can be adapted to capture frequently occurring local structures in textures. This paper describes the usage of association rules for texture classification problem. The performed experimental studies show the effectiveness of the association rules
纹理可以定义为纹理原语在观察者感兴趣的区域的局部统计模式。纹理分类的目的是根据训练样本和分类规则为未知纹理分配纹理标签。关联规则捕获结构信息和统计信息,并自动识别出现最频繁的结构和具有显著判别能力的关系。因此,关联规则可以用于捕获纹理中频繁出现的局部结构。本文描述了关联规则在纹理分类问题中的应用。实验研究表明了该关联规则的有效性
{"title":"Texture Classification Using Edge Detection and Association Rules","authors":"M. Karabatak, A. Şengur, M. C. Ince","doi":"10.1109/SIU.2006.1659696","DOIUrl":"https://doi.org/10.1109/SIU.2006.1659696","url":null,"abstract":"Texture can be defined as a local statistical pattern of texture primitives in observer's domain of interest. Texture classification aims to assign texture labels to unknown textures, according to training samples and classification rules. Association rules capture both structural and statistical information, and automatically identify the structures that occur most frequently and relationships that have significant discriminative power. So, association rules can be adapted to capture frequently occurring local structures in textures. This paper describes the usage of association rules for texture classification problem. The performed experimental studies show the effectiveness of the association rules","PeriodicalId":415037,"journal":{"name":"2006 IEEE 14th Signal Processing and Communications Applications","volume":"14 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123720007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Boosting Classifiers for Music Genre Classification 促进音乐类型分类的分类器
Pub Date : 2006-04-17 DOI: 10.1007/11569596_60
Ulas Bagci, E. Erzin
{"title":"Boosting Classifiers for Music Genre Classification","authors":"Ulas Bagci, E. Erzin","doi":"10.1007/11569596_60","DOIUrl":"https://doi.org/10.1007/11569596_60","url":null,"abstract":"","PeriodicalId":415037,"journal":{"name":"2006 IEEE 14th Signal Processing and Communications Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
H.264 Long-Term Reference Selection for Videos with Frequent Camera Transitions H.264长期参考选择与频繁的镜头转换视频
Pub Date : 2006-04-17 DOI: 10.1109/SIU.2006.1659860
N. Ozbek, A. Tekalp
Long-term reference prediction is an important feature of the H.264/MPEG-4 AVC standard, which provides a tradeoff between compression gain and computational complexity. In this study, we propose a long-term reference selection method for videos with frequent camera transitions to optimize compression efficiency at shot boundaries without increasing the computational complexity. Experimental results show up to 50% reduction in the number of bits (at the same PSNR) for frames at the border of camera transitions
长期参考预测是H.264/MPEG-4 AVC标准的一个重要特性,它提供了压缩增益和计算复杂度之间的权衡。在本研究中,我们提出了一种针对镜头切换频繁的视频的长期参考选择方法,在不增加计算复杂度的情况下优化镜头边界的压缩效率。实验结果表明,在相同的PSNR下,在相机过渡边界处的帧的比特数减少了50%
{"title":"H.264 Long-Term Reference Selection for Videos with Frequent Camera Transitions","authors":"N. Ozbek, A. Tekalp","doi":"10.1109/SIU.2006.1659860","DOIUrl":"https://doi.org/10.1109/SIU.2006.1659860","url":null,"abstract":"Long-term reference prediction is an important feature of the H.264/MPEG-4 AVC standard, which provides a tradeoff between compression gain and computational complexity. In this study, we propose a long-term reference selection method for videos with frequent camera transitions to optimize compression efficiency at shot boundaries without increasing the computational complexity. Experimental results show up to 50% reduction in the number of bits (at the same PSNR) for frames at the border of camera transitions","PeriodicalId":415037,"journal":{"name":"2006 IEEE 14th Signal Processing and Communications Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132851723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combination Strategies for 2D Features to Recognize 3D Gestures 二维特征组合策略识别三维手势
Pub Date : 2006-04-17 DOI: 10.1109/SIU.2006.1659820
O. Aran
In this study, using a two camera setup, we designed a system that recognizes 3D gestures. When 3D reconstruction is not possible or infeasible, combining 2D hand trajectories at feature or decision level increases the system performance drastically. The trajectories are extracted by tracking the center-of-mass of the hand and the width, height and orientation of the enclosing ellipse. Trajectories are then smoothed using a Kalman filter. Following the translation and scale normalization, the trajectories are modelled using hidden Markov models (HMM) and using support vector machines (SVM) by converting the trajectories to fixed length using re-sampling. Trajectories extracted from different cameras are combined at different levels and the effect to the system performance is observed. The best result is obtained by modelling the trajectories using HMMs and combining at decision level, with %1 error in 210 test examples
在这项研究中,我们使用双摄像头设置,设计了一个识别3D手势的系统。当三维重建不可能或不可行时,在特征或决策层面结合二维手轨迹可以显著提高系统性能。通过跟踪手的质心和外围椭圆的宽度、高度和方向来提取轨迹。然后使用卡尔曼滤波器平滑轨迹。在平移和尺度归一化之后,使用隐马尔可夫模型(HMM)和支持向量机(SVM)对轨迹进行建模,通过重采样将轨迹转换为固定长度。从不同摄像机提取的轨迹在不同层次上进行组合,观察对系统性能的影响。利用hmm模型对轨迹进行建模,并在决策层面进行组合,得到了最佳结果,210个测试样例的误差为%1
{"title":"Combination Strategies for 2D Features to Recognize 3D Gestures","authors":"O. Aran","doi":"10.1109/SIU.2006.1659820","DOIUrl":"https://doi.org/10.1109/SIU.2006.1659820","url":null,"abstract":"In this study, using a two camera setup, we designed a system that recognizes 3D gestures. When 3D reconstruction is not possible or infeasible, combining 2D hand trajectories at feature or decision level increases the system performance drastically. The trajectories are extracted by tracking the center-of-mass of the hand and the width, height and orientation of the enclosing ellipse. Trajectories are then smoothed using a Kalman filter. Following the translation and scale normalization, the trajectories are modelled using hidden Markov models (HMM) and using support vector machines (SVM) by converting the trajectories to fixed length using re-sampling. Trajectories extracted from different cameras are combined at different levels and the effect to the system performance is observed. The best result is obtained by modelling the trajectories using HMMs and combining at decision level, with %1 error in 210 test examples","PeriodicalId":415037,"journal":{"name":"2006 IEEE 14th Signal Processing and Communications Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130800542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Turkish Word Error Detection Using Syllable Bigram Statistics 使用音节双图统计的土耳其语单词错误检测
Pub Date : 2006-04-17 DOI: 10.1109/SIU.2006.1659786
K. Gunel, R. Asliyan
In this study, we have designed and implemented a system, which uses n-gram statistical language model in order to facilitate optical character recognition, speech synthesis and recognition systems. First, the syllables bigram frequencies are extracted from Turkish corpora. Then, the test database including the words, which are written correctly and wrongly, is created. The probability of the words appears the given text is calculated and the wrongly and, correctly written words are determined. The system finds the wrongly written words about 86.13% with the proposed approach and the correctly written words are found about 88.32%
在这项研究中,我们设计并实现了一个系统,该系统使用n-gram统计语言模型来促进光学字符识别,语音合成和识别系统。首先,从土耳其语语料库中提取音节双元频率。然后,创建包含正确和错误的单词的测试数据库。计算给定文本中出现的单词的概率,并确定错误和正确书写的单词。系统发现写错的单词占86.13%,正确的单词占88.32%
{"title":"Turkish Word Error Detection Using Syllable Bigram Statistics","authors":"K. Gunel, R. Asliyan","doi":"10.1109/SIU.2006.1659786","DOIUrl":"https://doi.org/10.1109/SIU.2006.1659786","url":null,"abstract":"In this study, we have designed and implemented a system, which uses n-gram statistical language model in order to facilitate optical character recognition, speech synthesis and recognition systems. First, the syllables bigram frequencies are extracted from Turkish corpora. Then, the test database including the words, which are written correctly and wrongly, is created. The probability of the words appears the given text is calculated and the wrongly and, correctly written words are determined. The system finds the wrongly written words about 86.13% with the proposed approach and the correctly written words are found about 88.32%","PeriodicalId":415037,"journal":{"name":"2006 IEEE 14th Signal Processing and Communications Applications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127939821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distance and Speed Measurement using Stereo Analysis 用立体分析测量距离和速度
Pub Date : 2006-04-17 DOI: 10.1109/SIU.2006.1659740
M. Torun, A. Ozkurt
This study offers an alternative method for speed detection of the automobiles on a highway. The system we develop, captures live video from two cameras, meaning left and right, simultaneously and obtains the difference of the successive frames. Then, it converts the difference frame into a binary image using image processing techniques and calculates the center of mass of this binary image. The distance information is calculated using stereo analysis and the difference information between mass centers of left and right frames. The speed of the moving object between t1 and t2 is calculated using the difference of calculated distance datas and Deltat=t2 -t1. The system performance is calculated as minimum 95%
本研究为高速公路上的汽车速度检测提供了一种替代方法。我们开发的系统,从两个摄像机,即左、右,同时捕获实时视频,并得到连续帧的差值。然后,利用图像处理技术将差分帧转换为二值图像,并计算该二值图像的质心。利用立体分析和左右两帧质心的差值信息计算距离信息。通过计算距离数据与delta =t2 -t1的差值计算运动物体在t1和t2之间的速度。系统性能至少按95%计算
{"title":"Distance and Speed Measurement using Stereo Analysis","authors":"M. Torun, A. Ozkurt","doi":"10.1109/SIU.2006.1659740","DOIUrl":"https://doi.org/10.1109/SIU.2006.1659740","url":null,"abstract":"This study offers an alternative method for speed detection of the automobiles on a highway. The system we develop, captures live video from two cameras, meaning left and right, simultaneously and obtains the difference of the successive frames. Then, it converts the difference frame into a binary image using image processing techniques and calculates the center of mass of this binary image. The distance information is calculated using stereo analysis and the difference information between mass centers of left and right frames. The speed of the moving object between t1 and t2 is calculated using the difference of calculated distance datas and Deltat=t2 -t1. The system performance is calculated as minimum 95%","PeriodicalId":415037,"journal":{"name":"2006 IEEE 14th Signal Processing and Communications Applications","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Time-Memory Trade-off Attack to Bit Search Generator and Its Variants 位搜索生成器及其变体的时-内存权衡攻击
Pub Date : 2006-04-17 DOI: 10.1109/SIU.2006.1659878
Y. Altug, N. P. Ayerden, I. Erguler, E. Anarim
In 2004, A. Gouget and H. Sibert proposed a new keystream generator called the bit search generator (BSG), to provide high resistance against algebraic attacks. BSG has a very simple algorithm and attractive properties. However it has been cryptanalyzed in different studies by using the fact that output of BSG can be uniquely expressed by differential of the input sequence. Recently, Gouget et al. introduced two modified versions of BSG, named as MBSG and ABSG, to increase its security and also presented their security analysis in the same paper. The best attack that they give against ABSG and MBSG has complexity O(2L/2) and requires O(L2L/2) bits of keystream. In this study, we have shown that BSG, MBSG and ABSG can be cryptanalyzed with a time complexity O(2L/3) by using a time-memory trade-off attack. The method requires 22L/3 words of memory and O(2L+2L/3) bits of keystream. According to computer simulation results, we have found out that MBSG is the most vulnerable generator among BSG and variants to proposed attack. Moreover, ABSG doesn't bring any additional security to original BSG for proposed time-memory trade-off attack
2004年,a . Gouget和H. Sibert提出了一种新的密钥流生成器,称为比特搜索生成器(BSG),以提供高抗代数攻击的能力。BSG具有非常简单的算法和吸引人的特性。然而,在不同的研究中,利用BSG的输出可以由输入序列的微分唯一表示这一事实对其进行了密码分析。最近,Gouget et al.引入了BSG的两个修改版本,分别命名为MBSG和ABSG,以增加其安全性,并在同一篇论文中介绍了他们的安全性分析。他们给出的针对ABSG和MBSG的最佳攻击复杂度为0 (2L/2),并且需要O(L2L/2)位密钥流。在这项研究中,我们已经证明了BSG, MBSG和ABSG可以使用时间-记忆权衡攻击以时间复杂度0 (2L/3)进行密码分析。该方法需要22L/3个字的内存和O(2L+2L/3)位的密钥流。根据计算机仿真结果,我们发现在BSG和变体中,MBSG是最容易受到攻击的发生器。此外,对于所提出的时间-内存权衡攻击,ABSG不会给原始BSG带来任何额外的安全性
{"title":"A Time-Memory Trade-off Attack to Bit Search Generator and Its Variants","authors":"Y. Altug, N. P. Ayerden, I. Erguler, E. Anarim","doi":"10.1109/SIU.2006.1659878","DOIUrl":"https://doi.org/10.1109/SIU.2006.1659878","url":null,"abstract":"In 2004, A. Gouget and H. Sibert proposed a new keystream generator called the bit search generator (BSG), to provide high resistance against algebraic attacks. BSG has a very simple algorithm and attractive properties. However it has been cryptanalyzed in different studies by using the fact that output of BSG can be uniquely expressed by differential of the input sequence. Recently, Gouget et al. introduced two modified versions of BSG, named as MBSG and ABSG, to increase its security and also presented their security analysis in the same paper. The best attack that they give against ABSG and MBSG has complexity O(2L/2) and requires O(L2L/2) bits of keystream. In this study, we have shown that BSG, MBSG and ABSG can be cryptanalyzed with a time complexity O(2L/3) by using a time-memory trade-off attack. The method requires 22L/3 words of memory and O(2L+2L/3) bits of keystream. According to computer simulation results, we have found out that MBSG is the most vulnerable generator among BSG and variants to proposed attack. Moreover, ABSG doesn't bring any additional security to original BSG for proposed time-memory trade-off attack","PeriodicalId":415037,"journal":{"name":"2006 IEEE 14th Signal Processing and Communications Applications","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving Object Edge Detection and Segmentation using Multi-Wavelets 基于多小波的运动目标边缘检测与分割
Pub Date : 2006-04-17 DOI: 10.1109/SIU.2006.1659814
H. Ozkaramali, A. Baradarani, H. Demirel, B. Ozmen, T. Çelik
Moving object edge detection and segmentation method is presented with utilizing multi-wavelets. The subsequent segmentation of moving objects is achieved by binary morphological operations. The proposed multi-wavelet based method is compared with the methods based on scalar wavelets using both single and double change detection techniques. The simulation results indicate that multi-wavelets with repeated row pre-processing employing double change detection method outperform scalar wavelet-based methods in the number of detected moving edges and better preserve the moving edges. As a result the quality of moving object segmentation has been improved over the scalar methods
提出了一种基于多小波的运动目标边缘检测与分割方法。运动目标的后续分割是通过二值形态运算实现的。将基于多小波的方法与基于标量小波的方法进行了单变化检测和双变化检测的比较。仿真结果表明,采用双变化检测方法进行重复行预处理的多小波在检测运动边缘的数量上优于基于标量小波的方法,并且能更好地保留运动边缘。相对于标量分割方法,运动目标分割的质量得到了提高
{"title":"Moving Object Edge Detection and Segmentation using Multi-Wavelets","authors":"H. Ozkaramali, A. Baradarani, H. Demirel, B. Ozmen, T. Çelik","doi":"10.1109/SIU.2006.1659814","DOIUrl":"https://doi.org/10.1109/SIU.2006.1659814","url":null,"abstract":"Moving object edge detection and segmentation method is presented with utilizing multi-wavelets. The subsequent segmentation of moving objects is achieved by binary morphological operations. The proposed multi-wavelet based method is compared with the methods based on scalar wavelets using both single and double change detection techniques. The simulation results indicate that multi-wavelets with repeated row pre-processing employing double change detection method outperform scalar wavelet-based methods in the number of detected moving edges and better preserve the moving edges. As a result the quality of moving object segmentation has been improved over the scalar methods","PeriodicalId":415037,"journal":{"name":"2006 IEEE 14th Signal Processing and Communications Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124920242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TREN-SI: A DCOM-Based Speaker Identification Software 基于dcom的说话人识别软件
Pub Date : 2006-04-17 DOI: 10.1109/SIU.2006.1659697
A. Kanak, Y. Bicil, M. U. Dogan, H. Palaz
Recognition engines are common tools for both speech and speaker recognition. With this respect, TREN-SI (Turkish recognition engine for speaker identification) is presented as a hidden Markov model-based (HMM-based), two-layered distributed speaker identification software. TREN-SI contains specialized modules that allow a full interoperable platform including a speaker recognizer, feature extractor and a performance monitoring module. TREN-SI has basically two layers: First layer is the central server that distributes the calls acquired from different people to the appropriate remote servers according to their current CPU load of the recognition process after some speech signal preprocessing and the second layer consists of the remote servers which performs the critical speaker recognition task. This component-based architecture enables TREN-SI applicable to distributed environments. TREN-SI is developed as a solution especially for physical or logical access control problems considering user authentication and authorization
识别引擎是语音和说话人识别的常用工具。在这方面,trenn - si(土耳其语识别引擎,用于说话人识别)是一种基于隐马尔可夫模型(HMM-based)的两层分布式说话人识别软件。trenn - si包含专门的模块,允许一个完整的可互操作平台,包括扬声器识别器,特征提取器和性能监控模块。trenn - si基本上有两层:第一层是中央服务器,经过一些语音信号预处理后,根据识别过程中不同人的呼叫分配给相应的远程服务器,第二层由远程服务器组成,执行关键的说话人识别任务。这种基于组件的体系结构使treni - si能够适用于分布式环境。trenn - si是专门为考虑用户身份验证和授权的物理或逻辑访问控制问题而开发的解决方案
{"title":"TREN-SI: A DCOM-Based Speaker Identification Software","authors":"A. Kanak, Y. Bicil, M. U. Dogan, H. Palaz","doi":"10.1109/SIU.2006.1659697","DOIUrl":"https://doi.org/10.1109/SIU.2006.1659697","url":null,"abstract":"Recognition engines are common tools for both speech and speaker recognition. With this respect, TREN-SI (Turkish recognition engine for speaker identification) is presented as a hidden Markov model-based (HMM-based), two-layered distributed speaker identification software. TREN-SI contains specialized modules that allow a full interoperable platform including a speaker recognizer, feature extractor and a performance monitoring module. TREN-SI has basically two layers: First layer is the central server that distributes the calls acquired from different people to the appropriate remote servers according to their current CPU load of the recognition process after some speech signal preprocessing and the second layer consists of the remote servers which performs the critical speaker recognition task. This component-based architecture enables TREN-SI applicable to distributed environments. TREN-SI is developed as a solution especially for physical or logical access control problems considering user authentication and authorization","PeriodicalId":415037,"journal":{"name":"2006 IEEE 14th Signal Processing and Communications Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2006 IEEE 14th Signal Processing and Communications Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1