283 research outputs found
Hierarchical multi-stream posterior based speech secognition system
Abstract. In this paper, we present initial results towards boosting posterior based speech recognition systems by estimating more informative posteriors using multiple streams of features and taking into account acoustic context (e.g., as available in the whole utterance), as well as possible prior information (such as topological constraints). These posteriors are estimated based on “state gamma posterior ” definition (typically used in standard HMMs training) extended to the case of multi-stream HMMs.This approach provides a new, principled, theoretical framework for hierarchical estimation/use of posteriors, multi-stream feature combination, and integrating appropriate context and prior knowledge in posterior estimates. In the present work, we used the resulting gamma posteriors as features for a standard HMM/GMM layer. On the OGI Digits database and on a reduced vocabulary version (1000 words) of the DARPA Conversational Telephone Speech-to-text (CTS) task, this resulted in significant performance improvement, compared to the stateof-the-art Tandem systems.
The Entropy of a Binary Hidden Markov Process
The entropy of a binary symmetric Hidden Markov Process is calculated as an
expansion in the noise parameter epsilon. We map the problem onto a
one-dimensional Ising model in a large field of random signs and calculate the
expansion coefficients up to second order in epsilon. Using a conjecture we
extend the calculation to 11th order and discuss the convergence of the
resulting series
Hidden Quantum Markov Models and Open Quantum Systems with Instantaneous Feedback
Hidden Markov Models are widely used in classical computer science to model
stochastic processes with a wide range of applications. This paper concerns the
quantum analogues of these machines --- so-called Hidden Quantum Markov Models
(HQMMs). Using the properties of Quantum Physics, HQMMs are able to generate
more complex random output sequences than their classical counterparts, even
when using the same number of internal states. They are therefore expected to
find applications as quantum simulators of stochastic processes. Here, we
emphasise that open quantum systems with instantaneous feedback are examples of
HQMMs, thereby identifying a novel application of quantum feedback control.Comment: 10 Pages, proceedings for the Interdisciplinary Symposium on Complex
Systems in Florence, September 2014, minor correction
Multistream dynamic Bayesian network for meeting segmentation
Consonant duration is influenced by a number of linguistic factors such as the consonant s identity, within-word position, stress level of the previous and following vowels, phrasal position of the word containing the target consonant, its syllabic position, identity of the previous and following segments. In our work, consonant duration is predicted from a Bayesian belief network (BN) consisting of discrete nodes for the linguistic factors and a single continuous node for the consonant s duration. Interactions between factors are represented as conditional dependency arcs in this graphical model. Given the parameters of the belief network, the duration of each consonant in the test set is then predicted as the value with the maximum probability. We compare the results of the belief network model with those of sums-of-products (SoP) and classification and regression tree (CART) models using the same data. In terms of RMS error, our BN model performs better than both CART and SoP models. In terms of the correlation coefficient, our BN model performs better than SoP model, and no worse than CART model. In addition, the Bayesian model reliably predicts consonant duration in cases of missing or hidden linguistic factors
Partial core power transformer
This thesis describes the design, construction, and testing of a 15kVA, 11kV/230V partial
core power transformer (PCPT) for continuous operation. While applications for the partial
core transformer have been developed for many years, the concept of constructing a partial
core transformer, from conventional copper windings, as a power transformer has not been
investigated, specifically to have a continuous operation. In this thesis, this concept has been
investigated and tested.
The first part of the research involved creating a computer program to model the physical
dimensions and the electrical performance of a partial core transformer, based on the existing
partial core transformer models.
Also, since the hot-spot temperature is the key factor for limiting the power rating of the
PCPT, the second part of the research investigates a thermal model to simulate the change of
the hot-spot temperature for the designed PCPT. The cooling fluid of the PCPT applied in
this project was BIOTEMP®. The original thermal model used was from the IEEE Guide for
Loading Mineral-Oil-Immersed transformer. However, some changes to the original thermal
model had to be made since the original model does not include BIOTEMP® as a type of
cooling fluid. The constructed partial core transformer was tested to determine its hot-spot
temperature when it is immersed by BIOTEMP®, and the results compared with the thermal
model.
The third part of the research involved using both the electrical model and the thermal model
to design a PCPT. The PCPT was tested to obtain the actual electrical and the thermal
performance for the PCPT.
The overall performance of the PCPT was very close to the model estimation. However,
cooling of the PCPT was not sufficient to allow the PCPT to operate at the design rated load
for continuous operation. Therefore, the PCPT was down rated from 15kVA to maintain the
hot-spot temperature at 100°C for continuous operation. The actual rating of the PCPT is 80%
of the original power rating, which is 12kVA
Asymptotic information leakage under one-try attacks
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability in information hiding systems modelled as noisy channels. Specifically, we assume the attacker can make a single guess after observing n independent executions of the system, throughout which the secret information is kept fixed. We show that the asymptotic behaviour of quantities (a) and (b) can be determined in a simple way from the channel matrix. Moreover, simple and tight bounds on them as functions of n show that the convergence is exponential. We also discuss feasible methods to evaluate the rate of convergence. Our results cover both the Bayesian case, where a prior probability distribution on the secrets is assumed known to the attacker, and the maximum-likelihood case, where the attacker does not know such distribution. In the Bayesian case, we identify the distributions that maximize the leakage. We consider both the min-entropy setting studied by Smith and the additive form recently proposed by Braun et al., and show the two forms do agree asymptotically. Next, we extend these results to a more sophisticated eavesdropping scenario, where the attacker can perform a (noisy) observation at each state of the computation and the systems are modelled as hidden Markov models
Hmm-based monitoring of packet channels
Abstract. Performance of real-time applications on network communication channels are strongly related to losses and temporal delays. Several studies showed that these network features may be correlated and exhibit a certain degree of memory such as bursty losses and delays. The memory and the statistical dependence between losses and temporal delays suggest that the channel may be well modelled by a Hidden Markov Model (HMM) with appropriate hidden variables that capture the current state of the network. In this paper we discuss on the effectiveness of using an HMM to model jointly loss and delay behavior of real communication channel. Excellent performance in modelling typical channel behavior in a set of real packet links are observed. The system parameters are found via a modified version of the EM algorithm. Hidden state analysis shows how the state variables characterize channel dynamics. State-sequence estimation is obtained by use of the Viterbi algorithm. Real-time modelling of the channel is the first step to implement adaptive communication strategies.
- …