This number will be updated
نویسندگان: ثبت نشده
چکیده مقاله:
این مقاله چکیده ندارد
منابع مشابه
Will this paper ever be cited?
It is an accepted fact of academic life that some papers, in whatever discipline and wherever published, will never be cited. Empirical support for this can be found in studies such as those reported by Glanzel (1992), Rousseau (1994), and Egghe (2000) where the distribution of the time of first citation is investigated. In all cases, it is assumed that never-citation is connected with the perc...
متن کاملThis is a placeholder. Final title will be filled later
This paper presents a framework of using Chinese speech to access images via English captions. The formulation and the structure mapping rules of Chinese and English named entities are extracted from an NICT foreign location name corpus. For a named location, name part and keyword part are usually transliterated and translated, respectively. Keyword spotting identifies the keyword from speech q...
متن کاملThis is a placeholder. Final title will be filled later
A technique for high-accuracy tracking of formants or vocal tract resonances is presented in this paper using a novel nonlinear predictor and using a target-directed temporal constraint. The nonlinear predictor is constructed from a parameter-free, discrete mapping function from the formant (frequencies and bandwidths) space to the LPC-cepstral space, with trainable residuals. We examine in thi...
متن کاملThis is a placeholder. Final title will be filled later
Current Automatic Speech Recognition systems convert the speech signal into a sequence of discrete units, such as phonemes, and then apply statistical methods on the units to produce the linguistic message. Similar methodology has also been applied to recognize speaker and language, except that the output of the system can be the speaker or language information. Therefore, we propose the use of...
متن کاملThis is a placeholder. Final title will be filled later
In this paper, we investigate achievable rates for data transmission from sources to sinks through multiple relay networks. We consider myopic coding, a constrained communication strategy in which each node has only a local view of the network, meaning that nodes can only transmit to and decode from neighboring nodes. We compare this with omniscient coding, in which every node has a global view...
متن کاملThis is a placeholder. Final title will be filled later
Speaker verification systems require some kind of background model to reliably perform the verification task. Several algorithms have been proposed for the selection of cohort models to form a background model. This paper proposes a new cohort selection method called the Close Impostor Clustering (CIC). The new method is shown to outperform several other methods in a text-dependent verification...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 6 شماره 1
صفحات 1- 60
تاریخ انتشار 2013-02-01
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023