This number will be updated

نویسندگان: ثبت نشده
چکیده مقاله:

این مقاله چکیده ندارد

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Will this paper ever be cited?

It is an accepted fact of academic life that some papers, in whatever discipline and wherever published, will never be cited. Empirical support for this can be found in studies such as those reported by Glanzel (1992), Rousseau (1994), and Egghe (2000) where the distribution of the time of first citation is investigated. In all cases, it is assumed that never-citation is connected with the perc...

متن کامل

This is a placeholder. Final title will be filled later

This paper presents a framework of using Chinese speech to access images via English captions. The formulation and the structure mapping rules of Chinese and English named entities are extracted from an NICT foreign location name corpus. For a named location, name part and keyword part are usually transliterated and translated, respectively. Keyword spotting identifies the keyword from speech q...

متن کامل

This is a placeholder. Final title will be filled later

A technique for high-accuracy tracking of formants or vocal tract resonances is presented in this paper using a novel nonlinear predictor and using a target-directed temporal constraint. The nonlinear predictor is constructed from a parameter-free, discrete mapping function from the formant (frequencies and bandwidths) space to the LPC-cepstral space, with trainable residuals. We examine in thi...

متن کامل

This is a placeholder. Final title will be filled later

Current Automatic Speech Recognition systems convert the speech signal into a sequence of discrete units, such as phonemes, and then apply statistical methods on the units to produce the linguistic message. Similar methodology has also been applied to recognize speaker and language, except that the output of the system can be the speaker or language information. Therefore, we propose the use of...

متن کامل

This is a placeholder. Final title will be filled later

In this paper, we investigate achievable rates for data transmission from sources to sinks through multiple relay networks. We consider myopic coding, a constrained communication strategy in which each node has only a local view of the network, meaning that nodes can only transmit to and decode from neighboring nodes. We compare this with omniscient coding, in which every node has a global view...

متن کامل

This is a placeholder. Final title will be filled later

Speaker verification systems require some kind of background model to reliably perform the verification task. Several algorithms have been proposed for the selection of cohort models to form a background model. This paper proposes a new cohort selection method called the Close Impostor Clustering (CIC). The new method is shown to outperform several other methods in a text-dependent verification...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 6  شماره 1

صفحات  1- 60

تاریخ انتشار 2013-02-01

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023