The ASR Post-Processor Performance Challenges of BackTranScription (BTS): Data-Centric and Model-Centric Approaches

نویسندگان

چکیده

Training an automatic speech recognition (ASR) post-processor based on sequence-to-sequence (S2S) requires a parallel pair (e.g., result and human post-edited sentence) to construct the dataset, which demands great amount of labor. BackTransScription (BTS) proposes data-building method mitigate limitations existing S2S ASR post-processors, can automatically generate vast amounts training datasets, reducing time cost in data construction. Despite emergence this novel approach, BTS-based still has research challenges is mostly untested diverse approaches. In study, we highlight these through detailed experiments by analyzing data-centric approach (i.e., controlling without model alteration) model-centric modification). other words, attempt point out problems with current trend pursuing alert against ignoring importance data. Our experiment results show that outperformed +11.69, +17.64, +19.02 F1-score, BLEU, GLEU tests.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data - centric , without data model

alizing large 3D data sets from scientific or medical applications. Transfer functions are particularly important to the quality of direct volume-rendered images. A transfer function assigns optical properties, such as color and opacity, to original values of the data set being visualized. Unfortunately, finding good transfer functions proves difficult. Pat Hanrahan called it one of the top 10 ...

متن کامل

Data - Centric Approaches to Kernel Malware Defense

Rhee, Junghwan Ph.D., Purdue University, August 2011. Data-Centric Approaches to Kernel Malware Defense. Major Professor: Dongyan Xu. An operating system kernel is the core of system software which is responsible for the integrity and operations of a conventional computer system. Authors of malicious software (malware) have been continuously exploring various attack vectors to tamper with the k...

متن کامل

Data - Centric Approaches to Kernel Malware

Rhee, Junghwan Ph.D., Purdue University, August 2011. Data-Centric Approaches to Kernel Malware Defense. Major Professor: Dongyan Xu. An operating system kernel is the core of system software which is responsible for the integrity and operations of a conventional computer system. Authors of malicious software (malware) have been continuously exploring various attack vectors to tamper with the k...

متن کامل

Performance Analysis of User-Centric Network Selection and Network-Centric Resource Allocation Approaches in Wireless Networks

The possible leveraging of high deployment costs, and the possibility to increase revenue have also introduced the concept of network sharing between different operators. On the other hand, the realization of a user-centric paradigm in future heterogeneous wireless networks, which implies free and automatic choice among different available wireless and mobile access networks, will revolutionize...

متن کامل

Observation Centric Sensor Data Model

Management of sensor data requires metadata to understand the semantics of observations. While e-science researchers have high demands on metadata, they are selective in entering metadata. The claim in this paper is to focus on the essentials, i.e., the actual observations being described by location, time, owner, instrument, and measurement. The applicability of this approach is demonstrated i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2022

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math10193618