Analysis of Top-k Strategies for Open-set Speaker Identification Applications

نویسندگان

  • David Colella
  • Fred Goodman
چکیده

Recent performance gains in speaker verification systems suggest it is now viable to employ these systems in open-set speaker identification applications where an automated decision is passed to a human-in-the-loop for final analysis and decision. This paper examines the performance for when a speaker verification system expands into the identification domain. Our results indicate that separate thresholds should be adopted for the verification and the speaker identification phases. Furthermore, adopting a “top-k” approach where the best k matches are passed to the analyst for final matching does not greatly improve system detection performance and has a significant impact on overall human workload. OPEN-SET SPEAKER IDENTIFICATION ANALYSIS PAGE 1

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Posteriori probabilities and likelihoods combination for speech and speaker recognition

This paper investigates a new approach to perform simultaneous speech and speaker recognition. The likelihood estimated by a speaker identification system is combined with the posterior probability estimated by the speech recognizer. So, the joint posterior probability of the pronounced word and the speaker identity is maximized. A comparison study with other standard techniques is carried out ...

متن کامل

Computer Recognition of Speakers Who Disguise Their Voice

Speaker identification is the process of determining who spoke a recorded utterance through computer analysis of the recorded speech. More specifically, given a set of speakers Σ={S1 . . SN}, a set of utterance sets Υ={U1 . . UN} made by those speakers, and an utterance uX made by an unknown speaker: closed set speaker identification determines a value for X in {1 . . N}; open set speaker ident...

متن کامل

Identification of Teaching Strategies for Young Entrepreneurs: A Qualitative Study

With the aim of helping to improve the teaching of entrepreneurship in high schools, this study set out to identify appropriate teaching strategies. A selective group of 22 experts in the area of teaching entrepreneurship was extensively interviewed. The interviews were   semi-structured and the data collected from them were coded using an open, axial, and selective coding system. Results show ...

متن کامل

Functionally closed sets and functionally convex sets in real Banach spaces

‎Let $X$ be a real normed  space, then  $C(subseteq X)$  is  functionally  convex  (briefly, $F$-convex), if  $T(C)subseteq Bbb R $ is  convex for all bounded linear transformations $Tin B(X,R)$; and $K(subseteq X)$  is  functionally   closed (briefly, $F$-closed), if  $T(K)subseteq Bbb R $ is  closed  for all bounded linear transformations $Tin B(X,R)$. We improve the    Krein-Milman theorem  ...

متن کامل

Analysis of multitarget detection for speaker and language recognition

The general multitarget detection (open-set identification) task is the intersection of the more familiar tasks of close-set identification and open-set verification/detection. In the multitarget detection task, an input of unknown class is processed by a bank of parallel detectors and a decision is required as to whether the input is from among the target classes and, if so, which one. In this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012