283 research outputs found

    Hierarchical multi-stream posterior based speech secognition system

    Get PDF
    Abstract. In this paper, we present initial results towards boosting posterior based speech recognition systems by estimating more informative posteriors using multiple streams of features and taking into account acoustic context (e.g., as available in the whole utterance), as well as possible prior information (such as topological constraints). These posteriors are estimated based on “state gamma posterior ” definition (typically used in standard HMMs training) extended to the case of multi-stream HMMs.This approach provides a new, principled, theoretical framework for hierarchical estimation/use of posteriors, multi-stream feature combination, and integrating appropriate context and prior knowledge in posterior estimates. In the present work, we used the resulting gamma posteriors as features for a standard HMM/GMM layer. On the OGI Digits database and on a reduced vocabulary version (1000 words) of the DARPA Conversational Telephone Speech-to-text (CTS) task, this resulted in significant performance improvement, compared to the stateof-the-art Tandem systems.

    Text segmentation by topic

    Full text link

    Continuous Realtime Gesture Following and Recognition

    Full text link

    The Entropy of a Binary Hidden Markov Process

    Full text link
    The entropy of a binary symmetric Hidden Markov Process is calculated as an expansion in the noise parameter epsilon. We map the problem onto a one-dimensional Ising model in a large field of random signs and calculate the expansion coefficients up to second order in epsilon. Using a conjecture we extend the calculation to 11th order and discuss the convergence of the resulting series

    Hidden Quantum Markov Models and Open Quantum Systems with Instantaneous Feedback

    Full text link
    Hidden Markov Models are widely used in classical computer science to model stochastic processes with a wide range of applications. This paper concerns the quantum analogues of these machines --- so-called Hidden Quantum Markov Models (HQMMs). Using the properties of Quantum Physics, HQMMs are able to generate more complex random output sequences than their classical counterparts, even when using the same number of internal states. They are therefore expected to find applications as quantum simulators of stochastic processes. Here, we emphasise that open quantum systems with instantaneous feedback are examples of HQMMs, thereby identifying a novel application of quantum feedback control.Comment: 10 Pages, proceedings for the Interdisciplinary Symposium on Complex Systems in Florence, September 2014, minor correction

    Comparing Two Markov Methods for Part-of-Speech Tagging of Portuguese

    Full text link

    Multistream dynamic Bayesian network for meeting segmentation

    Get PDF
    Consonant duration is influenced by a number of linguistic factors such as the consonant s identity, within-word position, stress level of the previous and following vowels, phrasal position of the word containing the target consonant, its syllabic position, identity of the previous and following segments. In our work, consonant duration is predicted from a Bayesian belief network (BN) consisting of discrete nodes for the linguistic factors and a single continuous node for the consonant s duration. Interactions between factors are represented as conditional dependency arcs in this graphical model. Given the parameters of the belief network, the duration of each consonant in the test set is then predicted as the value with the maximum probability. We compare the results of the belief network model with those of sums-of-products (SoP) and classification and regression tree (CART) models using the same data. In terms of RMS error, our BN model performs better than both CART and SoP models. In terms of the correlation coefficient, our BN model performs better than SoP model, and no worse than CART model. In addition, the Bayesian model reliably predicts consonant duration in cases of missing or hidden linguistic factors

    Partial core power transformer

    Get PDF
    This thesis describes the design, construction, and testing of a 15kVA, 11kV/230V partial core power transformer (PCPT) for continuous operation. While applications for the partial core transformer have been developed for many years, the concept of constructing a partial core transformer, from conventional copper windings, as a power transformer has not been investigated, specifically to have a continuous operation. In this thesis, this concept has been investigated and tested. The first part of the research involved creating a computer program to model the physical dimensions and the electrical performance of a partial core transformer, based on the existing partial core transformer models. Also, since the hot-spot temperature is the key factor for limiting the power rating of the PCPT, the second part of the research investigates a thermal model to simulate the change of the hot-spot temperature for the designed PCPT. The cooling fluid of the PCPT applied in this project was BIOTEMP®. The original thermal model used was from the IEEE Guide for Loading Mineral-Oil-Immersed transformer. However, some changes to the original thermal model had to be made since the original model does not include BIOTEMP® as a type of cooling fluid. The constructed partial core transformer was tested to determine its hot-spot temperature when it is immersed by BIOTEMP®, and the results compared with the thermal model. The third part of the research involved using both the electrical model and the thermal model to design a PCPT. The PCPT was tested to obtain the actual electrical and the thermal performance for the PCPT. The overall performance of the PCPT was very close to the model estimation. However, cooling of the PCPT was not sufficient to allow the PCPT to operate at the design rated load for continuous operation. Therefore, the PCPT was down rated from 15kVA to maintain the hot-spot temperature at 100°C for continuous operation. The actual rating of the PCPT is 80% of the original power rating, which is 12kVA

    Asymptotic information leakage under one-try attacks

    Get PDF
    We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability in information hiding systems modelled as noisy channels. Specifically, we assume the attacker can make a single guess after observing n independent executions of the system, throughout which the secret information is kept fixed. We show that the asymptotic behaviour of quantities (a) and (b) can be determined in a simple way from the channel matrix. Moreover, simple and tight bounds on them as functions of n show that the convergence is exponential. We also discuss feasible methods to evaluate the rate of convergence. Our results cover both the Bayesian case, where a prior probability distribution on the secrets is assumed known to the attacker, and the maximum-likelihood case, where the attacker does not know such distribution. In the Bayesian case, we identify the distributions that maximize the leakage. We consider both the min-entropy setting studied by Smith and the additive form recently proposed by Braun et al., and show the two forms do agree asymptotically. Next, we extend these results to a more sophisticated eavesdropping scenario, where the attacker can perform a (noisy) observation at each state of the computation and the systems are modelled as hidden Markov models

    Hmm-based monitoring of packet channels

    Get PDF
    Abstract. Performance of real-time applications on network communication channels are strongly related to losses and temporal delays. Several studies showed that these network features may be correlated and exhibit a certain degree of memory such as bursty losses and delays. The memory and the statistical dependence between losses and temporal delays suggest that the channel may be well modelled by a Hidden Markov Model (HMM) with appropriate hidden variables that capture the current state of the network. In this paper we discuss on the effectiveness of using an HMM to model jointly loss and delay behavior of real communication channel. Excellent performance in modelling typical channel behavior in a set of real packet links are observed. The system parameters are found via a modified version of the EM algorithm. Hidden state analysis shows how the state variables characterize channel dynamics. State-sequence estimation is obtained by use of the Viterbi algorithm. Real-time modelling of the channel is the first step to implement adaptive communication strategies.
    corecore