Verification of Unconstrained Handwritten Words at Character Level

Size: px
Start display at page:

Download "Verification of Unconstrained Handwritten Words at Character Level"

Transcription

1 th International Conference on Frontiers in Handwriting Recognition Verification of Unconstrained Handwritten Words at Character Level Alessandro L. Koerich Dept. of Computer Science PUCPR Dept. of Electrical Engineering UFPR Curitiba, PR, Brazil Alceu de S. Britto Jr. Dept. of Computer Science PUCPR Curitiba, PR, Brazil Luiz Eduardo S. de Oliveira Dept. of Computer Science UFPR Curitiba, PR, Brazil Abstract In this paper we present a verification module that has as input the output provided by a word recognizer which is based on the segmentation-recognition paradigm. The word recognizer models words as the concatenation of character hidden Markov models (HMMs) and it provides at the output a list with the Top N best word hypotheses, including their likelihoods and the segmentation points of the words into subwords, which ideally should be characters. The verification module uses the segmentation points provided by the word recognizer for each word hypothesis to extract different features from each subword. A classifier based on a multilayer perceptron neural network assigns a character class (A-Z) and estimates the a posteriori probability to each subword that make up a word. Further, both the character class and the a posteriori probabilities are combined with the original output of the word recognizer to re-rank the word hypothesis into the Top N list. Experimental results show that the verification module improves the Top 1 recognition rate in 3.9% for an 85,092-word recognition task. Keywords-Verification; Character recognition; Word recognition. I. INTRODUCTION During the last few years, hidden Markov models (HMMs) have become a very popular approach in handwriting recognition. One of the main reasons is their high performance in medium to large vocabulary applications where segmentation-recognition methods are used to cope with the difficulties of segmenting words into characters. Segmentation-recognition methods first loosely segment (oversegment) words into graphemes that ideally consist of either characters or parts of characters, and use dynamic programming techniques together with a lexicon to find the definitive segmentation as well as the best word hypotheses [1], [2], [3], [4], [5]. Many handwriting recognition systems use HMMs to model sub-word units (characters) and the Viterbi algorithm to find the best match between a sequence of observations and the models [1], [2], [4]. The Viterbi algorithm is optimal in the sense of maximum likelihood and it looks at the match of the whole sequence of features (observations) before deciding on the most likely state sequence. This is particularly valuable in applications such as handwritten word recognition where an intermediate character may be garbled or lost, but the overall sense of the word may be detectable. On the other hand, the local information is somewhat overlooked in such an approach. Furthermore, the conditional-independence imposed by the Markov Model (each observation is independent of its neighbors) prevents an HMM from taking full advantage of the correlation that exists among the observations of a single character [6]. In this paper we propose a verification module that attempts to overcome such a deficiency of the Viterbi algorithm in considering local information by carrying out recognition at character level in a post-processing procedure. The proposed verification module uses the segmentation information provided by the word recognizer to return to the input word image and, for each segment, that is supposed to represent a whole character, extract another set of features more suitable for isolated character recognition. This feature set is used to train a multilayer perceptron (MLP) neural network classifier [7]. Further, the results of the character classifier are used to re-rank the list of Top N best word hypotheses provided by the word recognizer. The focus of this paper is on the integration of the results of the isolated character classifier and the word recognizer. The organization of this paper is as follows. Section 2 presents the large vocabulary off-line word handwritten word recognizer. Section 3 presents the isolated handwritten character classifier. The verification of words at character level is presented in Section 4. Section 5 shows the experimental results of the recognition-verification scheme. Finally, the concluding remarks are presented in the last section. II. WORD RECOGNITION The baseline handwritten word recognition system is composed of several modules: pre-processing, segmentation, feature extraction, training and recognition. The pre-processing normalizes the word images in terms of slant and size. After, the images are segmented into graphemes and the sequence of segments is transformed into a sequence of symbols (or features). There is a set of seventy classes among letters (26 uppercase and 26 lowercase), digits (10) and special symbols (8) that are modeled by 10-state transition-based HMMs with forward and null transitions [2]. The character HMMs were trained and validated on a set of 12,049 and 3,470 words respectively, by using the maximum likelihood criterion and through the Baum-Welch algorithm /10 $ IEEE DOI /ICFHR

2 The word recognizer perform a huge task of classifying a pattern to one of the possible G classes, where G corresponds to the size of the lexicon. The lexicon has 85,092 entries representing city names. Single and compound words such as Chire en Montreiul are present in lexicon. The average length of the words is characters, and the shortest and the longest word have two and fifty six characters respectively. Recognition is carried out by a lexicondriven search based on a two-pass Viterbi-like decoding algorithm [4]. Figure 1 shows the average performance of the word recognizer on a testing set with 4,674 images for different sizes of lexicon. The results are shown for the Top 1, Top 2, Top 5, and Top 10 best choices. The output of the word recognizer is a list with the Top N best word hypotheses ranked according to the a posteriori probability assigned to each word hypothesis. Furthermore, the information of the segmentation of the word hypotheses into subwords is also available and it is obtained by backtracking the best state sequence. Therefore, the output of the word recognizer, denoted as Ψ, can be represented by a triple: Ψ = {L n, S n, P n } (1) where L n is the label for the n-th word hypothesis and it is given as a sequence of ASCII characters l1 n l2 n... lh n, S n = s n 1 s n 2... s n H is a set of segments that correspond to the segmentation of the n-th word hypothesis into subwords, and P n is the a posteriori probability assigned to the n-th word hypothesis by the classifier. H is the number of characters and s n h is the segment that represents the h-th word character from the n-th word hypothesis. III. CHARACTER RECOGNITION Handwritten character recognition has been the subject of much attention in the field of handwriting recognition. Several proposals to solve this problem have been presented throughout the last decade [7], [8], [9], [10], [11], [12]. However, most of the research efforts in recognition of characters have been focused on the recognition of digits due to the reduced number of classes when compared with letters. Even if these two problems are very similar, the recognition of letters is a much more difficult task due to the number of classes (up to 52) and the ambiguity between characters of different classes. To build an unconstrained character recognizer we have to define some features to build feature vectors representing the characters and a classifier. The feature set adopted was previously validated on the NIST database and it consists of global (projections and profiles) and local (directional histogram) features. The former were extracted from the whole character, while the later was extracted on a 3 x 3 grid. The combination of the features yields to a 108-dimensional feature vector. More details on the unconstrained character recognizer can be founf in [7]. Neural network classifiers exhibit powerful discriminative properties and they have been used in handwriting recognition particularly with digits, isolated characters, and words in small vocabularies. However, the use of neural networks in the recognition of handwritten words from larger vocabularies depends heavily on a very efficient segmentation scheme. Due to the lack of such an efficient segmentation scheme, neural networks are usually employed in combination with other classifiers, e.g. hybrid NN/HMM approaches that use neural networks to estimate a priori probabilities [5], or used to validate grapheme hypotheses generated by HMM classifiers [13]. Besides that, the choice of a multilayer perceptron (MLP) as the classifier to perform the character recognition task was determined by several constraints such as: recognition speed, unbalanced distribution of samples per class, very few samples for some classes, etc. Even though some of the requirements are not fulfilled, a multilayer perceptron neural network was chosen as the classifier for the following reasons: it is fast, it has a powerful nonlinear decision capability, it is easy to implement, it generalizes well, and it estimates Bayesian a posteriori probabilities at the output. The architecture of the network, which has 108 neurons at the input layer, 90 at the hidden layer and 26 at the output layer, was determined in an exploratory study which indicated that better classification results are achieved when uppercase and lowercase versions of the same characters are merged into single classes. Table I shows the number of samples and recognition rates for the three datasets of NIST SD19 and a proprietary database. From the hsf0, hsf1, hsf2, and hsf3 sets of the NIST database 1,660 samples per character class (uppercase A-Z) and 1,440 samples per character class (lowercase a-z) were taken randomly for training the neural classifier using the backpropagation algorithm. From the hsf7 set was generated the feature vector used as validation sets during the training procedure to watch over the generalization and to stop the training at the minimum of the error. From the hsf4 set was generated the feature vector to test the performance of the classifier. The proprietary character database was built automatically from the three datasets described in the previous section. For the training and validation sets, we have selected the words correctly recognized in an 85,092-word recognition task, and based on the segmentation of such words into characters given by the backtracking of the Viterbi algorithm, segments representing characters were recovered. It is important to mention that for the experiments reported in this paper, no cleaning or visual inspection of the resulting character quality was done. Therefore, the character database may contain some garbled shapes that actually do not represent characters. The best character hypothesis at the output of the character recognizer is the character class which provides the highest a posteriori probability. Therefore, the output of the 40

3 Figure 1. Performance of the handwritten word recognizer for different lexicon sizes. Table I SIZE OF THE DATASETS AND RESULTS FOR THE RECOGNITION OF ISOLATED HANDWRITTEN CHARACTERS FOR THE NIST AND THE PROPRIETARY DATABASE. NIST Proprietary Dataset # of Recog. # of Recog. Samples Rate (%) Samples Rate (%) Training 80, , Validation 23, , Testing 16, , unconstrained character recognizer, denoted as Γ, can be represented by: Γ = {C n l, P n l } (2) where Cl n is the class of the l-th character from the n-th word hypothesis, and it is given as an ASCII character, and Pl n is the a posteriori probability assigned to the character class by the MLP neural network classifier. IV. VERIFICATION OF WORD CHARACTERS Now, our interest is in combining the information provided by both classifiers, that is, the a posteriori probability of each word hypothesis provided by the word recognizer, and the classes and a posteriori probabilities of each character that make up the word hypothesis, which is provided by the unconstrained character recognizer. The methods that can be used to combine multiple classifier decisions depend on the types of information produced by the individual classifier. The word recognizer produces at the output a ranked list of classes (words) with attached a posteriori probabilities. The output of the character classifier is the class C l that best matches the input data together with the a posteriori probability P l. Therefore, the problem of verification is to integrate these outputs in a convenient manner to improve the final recognition accuracy. However, due to the uncertainty in the correct segmentation of words into characters, we restrain the verification to the first characters of the words. We investigate different manners of combining the outputs of the classifiers: product of the a posteriori probabilities provided by both classifiers given c n 1 = l1 n ; heuristic rule that shift down the word hypotheses in the Top N list for which c n 1 l1 n ; heuristic rule that re-rank word hypotheses only when the difference between the probabilities of the Top n and Top n + 1 word hypotheses is greater than a threshold. A. Verification using Segments (VS) In this verification scheme the output of the isolated character classifier is taken as stated in Section 3. The task of the verifier is to find the character class (A-Z) with the highest a posteriori probability for each segment (s n 1 ). 41

4 Therefore, the output of the verifier is a character class with its a posteriori probability, that is, {c n 1, P n c 1 }. Figure 2 shows this verification scheme where the interaction between the isolated character recognizer and word recognizer are presented. Given the tuple {P n, L n, S n } provided by the word recognizer, this scheme of verification uses S n to locate at the input image the segments representing the subwords. Another feature extraction module is used to extract features from such segments and a different feature vector is formed. Then, the task of the verifier is to assign Bayesian a posteriori probabilities to such a new feature vector that hopefully represents a character as well as the class to which the segment may belong (A-Z). Having the label and the a posteriori probability of the segments, such a result can be combined with the output of the word classifier by a suitable rule. To combine the outputs of both classifiers, we use some heuristic rules: Rule 1: If the class provided by the isolated character classifier is coincident with the character class provided by the word recognizer, that is, c n 1 = l1 n, accepts the hypothesis provided by the word recognizer; Rule 2: If the class provided by the isolated character classifier is not coincident with the character class provided by the word recognizer, that is, c n 1 l1 n, check the probability estimated by the isolated character classifier. If such a probability is low, that is, Pc n 1 T L c, accepts the hypothesis provided by the word recognizer. If the probability is high, that is, Pc n 1 T H c, shift down the word hypothesis in Top N list. However, the second rule is not sufficient because the character recognizer is susceptible to incur in errors for certain classes that have similar shapes. The most frequent confusions occur between the classes I and J, g and q, and O and D. Therefore, these confusions produced by the character recognizer may cause undesirable changes in the Top N list, shifting up wrong word hypotheses. Therefore, we have added a third rule to be used in conjunction with the second rule: Rule 3: A word hypothesis L n in the Top N list will be shift down only if the probability assigned by the word recognizer P n is greater than the probability of the word hypothesis L n+1 plus a threshold T w. In Rule 2, T L c and T H c are class dependent thresholds which values are determined on the validation dataset. In Rule 3, T w is a threshold which value is also determined on the validation dataset. B. Verification using Segments and Classes (VSC) In this verification scheme the output of the isolated character classifier is taken in a different manner from that stated in Section 3. Instead of using the neural network as a conventional classifier, we use it as a probability Table II WORD RECOGNITION RATES WITH AND WITHOUT VERIFICATION FOR AN 85,100-WORD RECOGNITION TASK. Configuration Recognition Rate (%) Word Recognizer Word Recognizer + Verification (V S) Word Recognizer + Verification (V SC 12 ) Word Recognizer + Verification (V SC 123 ) estimator to assign a probability to the character class given by the word hypotheses. For example, if first word hypothesis provided by the word recognizer is Paris, we provide the image corresponding to the first character to the isolated character recognizer, and, at the output, we take the a posteriori probability that it assigns to the class P, in other words, c n 1 = l n 1. After estimating the probabilities for the first characters of all word hypotheses in the Top N list, we simply combine them with the probability provided by the word recognizer to all word hypotheses. Therefore, the composite probability, denoted as ˆP n for the n-th word hypothesis will be given as: ˆP n = P n wp n c 1 (3) Based on the composite probabilities ˆP n, the Top N list is re-ranked. It is expected that the isolated character recognition estimated low probability values when the first character of the word hypotheses are not correct. In this case, such word hypotheses will be shifted down in the Top N list. Figure 3 shows the main modules of the word recognizer and the isolated character recognizer, as well as the interactions between both. V. EXPERIMENTS Experiments have been carried out with unconstrained handwritten words of the proprietary database that is described in Section II. The setup of the threshold parameters (T H c, T L w, T w ) was done using the validation set. The performance of the verification scheme was evaluated on the testing dataset using the same threshold values determined beforehand. Table II shows the results on the testing dataset for the word recognizer alone as well as the word recognizer combined with the proposed verification schemes. In such a Table, V S denotes the verification scheme based on the product of probabilities, V SC 12 denotes the heuristic verification scheme that employs the first and the second rules, and V SC 123 denotes the heuristic verification scheme that employs the first, second and third rules. The recognition rates presented in Table 2 show that improvements in the word recognition rate is achieved by using the verification scheme. The verification scheme that multiplies the probability of the first character by the word probability is somewhat efficient if we consider that we 42

5 Figure 2. An overview of the verification of unconstrained handwritten words: only the segments are provided to the isolated character recognizer. are neglecting the probabilities of all other characters that form the word hypothesis. Hopefully, such accuracy can be further improved, by taking into account all characters. For the verification schemes that employ heuristic rules, the improvements in the recognition rate when compared with the word recognizer alone is also interesting. The scheme that uses the three rules has achieved the best recognition results. However, the main problem with such heuristic schemes is the necessity to setup several thresholds. If such thresholds are not carefully chosen, the performance of the verification scheme is completely flawed. VI. CONCLUSIONS In this paper we have presented a simple scheme for the verification of unconstrained handwritten words. The verification scheme uses the segmentation points produced by a word recognizer which is based on a segmentationrecognition strategy. The verification scheme is based on an unconstrained isolated character recognizer that operates in two distinct manners: estimating a posteriori probability to segments representing character, given their classes, and assigning character-class and a posteriori probabilities to the segments. Depending on the value of the probability estimated by the character recognizer and the probability of each word, the verification takes place and re-ranks the Top N list, shifting up the words that start with the same character recognized by the isolated character recognizer. This verification scheme is very limited since it attempts to verify only the first character of the words, neglecting the other characters that make up a word and which are also available at the output of the word recognizer. However, the results are very promising and our future work will focus on the verification of all characters that make up the word hypotheses, as well as on more sophisticated strategies to combine the word classifier and the character classifier. REFERENCES [1] M. Y. Chen, A. Kundu, and S. N. Srihari, Variable duration hidden markov model and morphological segmentation for handwritten word recognition, IEEE Transactions on Image Processing, vol. 4, no. 12, pp , [2] A. El-Yacoubi, M. Gilloux, R. Sabourin, and C. Y. Suen, Unconstrained handwritten word recognition using hidden markov models, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 21, no. 8, pp , [3] A. L. Koerich, R. Sabourin, and C. Y. Suen, Large vocabulary off line handwriting recognition: A survey, Pattern Analysis and Applications, vol. 6, no. 2, pp , [4], Recognition and verification of unconstrained handwritten words, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 10, pp , [5] A. Senior, Off line cursive handwriting recognition using recurrent neural networks, Ph.D. dissertation, University of Cambridge, Cambridge, England, September

6 Figure 3. recognizer. An overview of the verification of unconstrained handwritten words: the segments and their classes are provided to the isolated character [6] G. Zavaliagkos, Y. Zhao, R. Schwartz, and J. Makhoul, A hybrid segmental neural net/hidden markov model system for continuous speech recognition, IEEE Transactions on Speech and Audio Processing, vol. 2, no. 1, pp , [7] A. L. Koerich and P. R. Kalva, Unconstrained handwritten character recognition using metaclasses of characters, in Proc. International Conference on Image Processing, Genova, Italy, 2005, pp [8] F. Camastra and A. Vinciarelli, Cursive character recognition by learning vector quantization, Pattern Recognition Letters, vol. 22, pp , [9] L. Heutte, T. Paquet, J. V. Moreau, Y. Lecourtier, and C. Olivier, A structural/statistical feature based vector for handwritten character recognition, Pattern Recognition Letters, vol. 19, pp , [10] F. Kimura, N. Kayahara, Y. Miyake, and M. Shridhar, Machine and human recognition of segmented characters from handwritten words, in Proc. 4th International Conference on Document Analysis and Recognition, Ulm, Germany, 1997, pp [11] E. Vellasques, L. E. S. Oliveira, A. S. B. Jr., A. L. Koerich, and R. Sabourin, Filtering segmentation cuts for digit string recognition, Pattern Recognition, vol. 41, no. 10, pp , [12] F. Wang, L. Vuurpijl, and L. Schomaker, Support vector machines for the classification of western handwritten capitals, in Proc. 7th International Workshop on Frontiers in Handwriting Recognition, Amsterdam, Netherlands, 2000, pp [13] S. J. Cho, J. Kim, and J. H. Kim, Verification of graphemes using neural networks in an hmm based on line korean handwriting recognition system, in Proc. 7th International Workshop on Frontiers in Handwriting Recognition, Amsterdam, Netherlands, 2000, pp

Large vocabulary off-line handwriting recognition: A survey

Large vocabulary off-line handwriting recognition: A survey Pattern Anal Applic (2003) 6: 97 121 DOI 10.1007/s10044-002-0169-3 ORIGINAL ARTICLE A. L. Koerich, R. Sabourin, C. Y. Suen Large vocabulary off-line handwriting recognition: A survey Received: 24/09/01

More information

Word Segmentation of Off-line Handwritten Documents

Word Segmentation of Off-line Handwritten Documents Word Segmentation of Off-line Handwritten Documents Chen Huang and Sargur N. Srihari {chuang5, srihari}@cedar.buffalo.edu Center of Excellence for Document Analysis and Recognition (CEDAR), Department

More information

OCR for Arabic using SIFT Descriptors With Online Failure Prediction

OCR for Arabic using SIFT Descriptors With Online Failure Prediction OCR for Arabic using SIFT Descriptors With Online Failure Prediction Andrey Stolyarenko, Nachum Dershowitz The Blavatnik School of Computer Science Tel Aviv University Tel Aviv, Israel Email: stloyare@tau.ac.il,

More information

A New Perspective on Combining GMM and DNN Frameworks for Speaker Adaptation

A New Perspective on Combining GMM and DNN Frameworks for Speaker Adaptation A New Perspective on Combining GMM and DNN Frameworks for Speaker Adaptation SLSP-2016 October 11-12 Natalia Tomashenko 1,2,3 natalia.tomashenko@univ-lemans.fr Yuri Khokhlov 3 khokhlov@speechpro.com Yannick

More information

Python Machine Learning

Python Machine Learning Python Machine Learning Unlock deeper insights into machine learning with this vital guide to cuttingedge predictive analytics Sebastian Raschka [ PUBLISHING 1 open source I community experience distilled

More information

Speech Recognition at ICSI: Broadcast News and beyond

Speech Recognition at ICSI: Broadcast News and beyond Speech Recognition at ICSI: Broadcast News and beyond Dan Ellis International Computer Science Institute, Berkeley CA Outline 1 2 3 The DARPA Broadcast News task Aspects of ICSI

More information

Lecture 1: Machine Learning Basics

Lecture 1: Machine Learning Basics 1/69 Lecture 1: Machine Learning Basics Ali Harakeh University of Waterloo WAVE Lab ali.harakeh@uwaterloo.ca May 1, 2017 2/69 Overview 1 Learning Algorithms 2 Capacity, Overfitting, and Underfitting 3

More information

Learning Methods in Multilingual Speech Recognition

Learning Methods in Multilingual Speech Recognition Learning Methods in Multilingual Speech Recognition Hui Lin Department of Electrical Engineering University of Washington Seattle, WA 98125 linhui@u.washington.edu Li Deng, Jasha Droppo, Dong Yu, and Alex

More information

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System QuickStroke: An Incremental On-line Chinese Handwriting Recognition System Nada P. Matić John C. Platt Λ Tony Wang y Synaptics, Inc. 2381 Bering Drive San Jose, CA 95131, USA Abstract This paper presents

More information

Human Emotion Recognition From Speech

Human Emotion Recognition From Speech RESEARCH ARTICLE OPEN ACCESS Human Emotion Recognition From Speech Miss. Aparna P. Wanare*, Prof. Shankar N. Dandare *(Department of Electronics & Telecommunication Engineering, Sant Gadge Baba Amravati

More information

Rule Learning With Negation: Issues Regarding Effectiveness

Rule Learning With Negation: Issues Regarding Effectiveness Rule Learning With Negation: Issues Regarding Effectiveness S. Chua, F. Coenen, G. Malcolm University of Liverpool Department of Computer Science, Ashton Building, Ashton Street, L69 3BX Liverpool, United

More information

Modeling function word errors in DNN-HMM based LVCSR systems

Modeling function word errors in DNN-HMM based LVCSR systems Modeling function word errors in DNN-HMM based LVCSR systems Melvin Jose Johnson Premkumar, Ankur Bapna and Sree Avinash Parchuri Department of Computer Science Department of Electrical Engineering Stanford

More information

An Online Handwriting Recognition System For Turkish

An Online Handwriting Recognition System For Turkish An Online Handwriting Recognition System For Turkish Esra Vural, Hakan Erdogan, Kemal Oflazer, Berrin Yanikoglu Sabanci University, Tuzla, Istanbul, Turkey 34956 ABSTRACT Despite recent developments in

More information

A Neural Network GUI Tested on Text-To-Phoneme Mapping

A Neural Network GUI Tested on Text-To-Phoneme Mapping A Neural Network GUI Tested on Text-To-Phoneme Mapping MAARTEN TROMPPER Universiteit Utrecht m.f.a.trompper@students.uu.nl Abstract Text-to-phoneme (T2P) mapping is a necessary step in any speech synthesis

More information

System Implementation for SemEval-2017 Task 4 Subtask A Based on Interpolated Deep Neural Networks

System Implementation for SemEval-2017 Task 4 Subtask A Based on Interpolated Deep Neural Networks System Implementation for SemEval-2017 Task 4 Subtask A Based on Interpolated Deep Neural Networks 1 Tzu-Hsuan Yang, 2 Tzu-Hsuan Tseng, and 3 Chia-Ping Chen Department of Computer Science and Engineering

More information

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, 2013 10.12753/2066-026X-13-154 DATA MINING SOLUTIONS FOR DETERMINING STUDENT'S PROFILE Adela BÂRA,

More information

Analysis of Speech Recognition Models for Real Time Captioning and Post Lecture Transcription

Analysis of Speech Recognition Models for Real Time Captioning and Post Lecture Transcription Analysis of Speech Recognition Models for Real Time Captioning and Post Lecture Transcription Wilny Wilson.P M.Tech Computer Science Student Thejus Engineering College Thrissur, India. Sindhu.S Computer

More information

Semi-Supervised GMM and DNN Acoustic Model Training with Multi-system Combination and Confidence Re-calibration

Semi-Supervised GMM and DNN Acoustic Model Training with Multi-system Combination and Confidence Re-calibration INTERSPEECH 2013 Semi-Supervised GMM and DNN Acoustic Model Training with Multi-system Combination and Confidence Re-calibration Yan Huang, Dong Yu, Yifan Gong, and Chaojun Liu Microsoft Corporation, One

More information

Modeling function word errors in DNN-HMM based LVCSR systems

Modeling function word errors in DNN-HMM based LVCSR systems Modeling function word errors in DNN-HMM based LVCSR systems Melvin Jose Johnson Premkumar, Ankur Bapna and Sree Avinash Parchuri Department of Computer Science Department of Electrical Engineering Stanford

More information

Rule Learning with Negation: Issues Regarding Effectiveness

Rule Learning with Negation: Issues Regarding Effectiveness Rule Learning with Negation: Issues Regarding Effectiveness Stephanie Chua, Frans Coenen, and Grant Malcolm University of Liverpool Department of Computer Science, Ashton Building, Ashton Street, L69 3BX

More information

A Reinforcement Learning Variant for Control Scheduling

A Reinforcement Learning Variant for Control Scheduling A Reinforcement Learning Variant for Control Scheduling Aloke Guha Honeywell Sensor and System Development Center 3660 Technology Drive Minneapolis MN 55417 Abstract We present an algorithm based on reinforcement

More information

Speech Emotion Recognition Using Support Vector Machine

Speech Emotion Recognition Using Support Vector Machine Speech Emotion Recognition Using Support Vector Machine Yixiong Pan, Peipei Shen and Liping Shen Department of Computer Technology Shanghai JiaoTong University, Shanghai, China panyixiong@sjtu.edu.cn,

More information

Australian Journal of Basic and Applied Sciences

Australian Journal of Basic and Applied Sciences AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean

More information

Learning Methods for Fuzzy Systems

Learning Methods for Fuzzy Systems Learning Methods for Fuzzy Systems Rudolf Kruse and Andreas Nürnberger Department of Computer Science, University of Magdeburg Universitätsplatz, D-396 Magdeburg, Germany Phone : +49.39.67.876, Fax : +49.39.67.8

More information

How to Judge the Quality of an Objective Classroom Test

How to Judge the Quality of an Objective Classroom Test How to Judge the Quality of an Objective Classroom Test Technical Bulletin #6 Evaluation and Examination Service The University of Iowa (319) 335-0356 HOW TO JUDGE THE QUALITY OF AN OBJECTIVE CLASSROOM

More information

On-Line Data Analytics

On-Line Data Analytics International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] On-Line Data Analytics Yugandhar Vemulapalli #, Devarapalli Raghu *, Raja Jacob

More information

ADVANCES IN DEEP NEURAL NETWORK APPROACHES TO SPEAKER RECOGNITION

ADVANCES IN DEEP NEURAL NETWORK APPROACHES TO SPEAKER RECOGNITION ADVANCES IN DEEP NEURAL NETWORK APPROACHES TO SPEAKER RECOGNITION Mitchell McLaren 1, Yun Lei 1, Luciana Ferrer 2 1 Speech Technology and Research Laboratory, SRI International, California, USA 2 Departamento

More information

INPE São José dos Campos

INPE São José dos Campos INPE-5479 PRE/1778 MONLINEAR ASPECTS OF DATA INTEGRATION FOR LAND COVER CLASSIFICATION IN A NEDRAL NETWORK ENVIRONNENT Maria Suelena S. Barros Valter Rodrigues INPE São José dos Campos 1993 SECRETARIA

More information

Course Outline. Course Grading. Where to go for help. Academic Integrity. EE-589 Introduction to Neural Networks NN 1 EE

Course Outline. Course Grading. Where to go for help. Academic Integrity. EE-589 Introduction to Neural Networks NN 1 EE EE-589 Introduction to Neural Assistant Prof. Dr. Turgay IBRIKCI Room # 305 (322) 338 6868 / 139 Wensdays 9:00-12:00 Course Outline The course is divided in two parts: theory and practice. 1. Theory covers

More information

IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 17, NO. 3, MARCH

IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 17, NO. 3, MARCH IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 17, NO. 3, MARCH 2009 423 Adaptive Multimodal Fusion by Uncertainty Compensation With Application to Audiovisual Speech Recognition George

More information

WHEN THERE IS A mismatch between the acoustic

WHEN THERE IS A mismatch between the acoustic 808 IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 14, NO. 3, MAY 2006 Optimization of Temporal Filters for Constructing Robust Features in Speech Recognition Jeih-Weih Hung, Member,

More information

A Case Study: News Classification Based on Term Frequency

A Case Study: News Classification Based on Term Frequency A Case Study: News Classification Based on Term Frequency Petr Kroha Faculty of Computer Science University of Technology 09107 Chemnitz Germany kroha@informatik.tu-chemnitz.de Ricardo Baeza-Yates Center

More information

BAUM-WELCH TRAINING FOR SEGMENT-BASED SPEECH RECOGNITION. Han Shu, I. Lee Hetherington, and James Glass

BAUM-WELCH TRAINING FOR SEGMENT-BASED SPEECH RECOGNITION. Han Shu, I. Lee Hetherington, and James Glass BAUM-WELCH TRAINING FOR SEGMENT-BASED SPEECH RECOGNITION Han Shu, I. Lee Hetherington, and James Glass Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cambridge,

More information

Class-Discriminative Weighted Distortion Measure for VQ-Based Speaker Identification

Class-Discriminative Weighted Distortion Measure for VQ-Based Speaker Identification Class-Discriminative Weighted Distortion Measure for VQ-Based Speaker Identification Tomi Kinnunen and Ismo Kärkkäinen University of Joensuu, Department of Computer Science, P.O. Box 111, 80101 JOENSUU,

More information

AUTOMATIC DETECTION OF PROLONGED FRICATIVE PHONEMES WITH THE HIDDEN MARKOV MODELS APPROACH 1. INTRODUCTION

AUTOMATIC DETECTION OF PROLONGED FRICATIVE PHONEMES WITH THE HIDDEN MARKOV MODELS APPROACH 1. INTRODUCTION JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 11/2007, ISSN 1642-6037 Marek WIŚNIEWSKI *, Wiesława KUNISZYK-JÓŹKOWIAK *, Elżbieta SMOŁKA *, Waldemar SUSZYŃSKI * HMM, recognition, speech, disorders

More information

have to be modeled) or isolated words. Output of the system is a grapheme-tophoneme conversion system which takes as its input the spelling of words,

have to be modeled) or isolated words. Output of the system is a grapheme-tophoneme conversion system which takes as its input the spelling of words, A Language-Independent, Data-Oriented Architecture for Grapheme-to-Phoneme Conversion Walter Daelemans and Antal van den Bosch Proceedings ESCA-IEEE speech synthesis conference, New York, September 1994

More information

Test Effort Estimation Using Neural Network

Test Effort Estimation Using Neural Network J. Software Engineering & Applications, 2010, 3: 331-340 doi:10.4236/jsea.2010.34038 Published Online April 2010 (http://www.scirp.org/journal/jsea) 331 Chintala Abhishek*, Veginati Pavan Kumar, Harish

More information

A study of speaker adaptation for DNN-based speech synthesis

A study of speaker adaptation for DNN-based speech synthesis A study of speaker adaptation for DNN-based speech synthesis Zhizheng Wu, Pawel Swietojanski, Christophe Veaux, Steve Renals, Simon King The Centre for Speech Technology Research (CSTR) University of Edinburgh,

More information

Handling Concept Drifts Using Dynamic Selection of Classifiers

Handling Concept Drifts Using Dynamic Selection of Classifiers Handling Concept Drifts Using Dynamic Selection of Classifiers Paulo R. Lisboa de Almeida, Luiz S. Oliveira, Alceu de Souza Britto Jr. and and Robert Sabourin Universidade Federal do Paraná, DInf, Curitiba,

More information

Lecture 1: Basic Concepts of Machine Learning

Lecture 1: Basic Concepts of Machine Learning Lecture 1: Basic Concepts of Machine Learning Cognitive Systems - Machine Learning Ute Schmid (lecture) Johannes Rabold (practice) Based on slides prepared March 2005 by Maximilian Röglinger, updated 2010

More information

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING Yong Sun, a * Colin Fidge b and Lin Ma a a CRC for Integrated Engineering Asset Management, School of Engineering Systems, Queensland

More information

Artificial Neural Networks written examination

Artificial Neural Networks written examination 1 (8) Institutionen för informationsteknologi Olle Gällmo Universitetsadjunkt Adress: Lägerhyddsvägen 2 Box 337 751 05 Uppsala Artificial Neural Networks written examination Monday, May 15, 2006 9 00-14

More information

PREDICTING SPEECH RECOGNITION CONFIDENCE USING DEEP LEARNING WITH WORD IDENTITY AND SCORE FEATURES

PREDICTING SPEECH RECOGNITION CONFIDENCE USING DEEP LEARNING WITH WORD IDENTITY AND SCORE FEATURES PREDICTING SPEECH RECOGNITION CONFIDENCE USING DEEP LEARNING WITH WORD IDENTITY AND SCORE FEATURES Po-Sen Huang, Kshitiz Kumar, Chaojun Liu, Yifan Gong, Li Deng Department of Electrical and Computer Engineering,

More information

Calibration of Confidence Measures in Speech Recognition

Calibration of Confidence Measures in Speech Recognition Submitted to IEEE Trans on Audio, Speech, and Language, July 2010 1 Calibration of Confidence Measures in Speech Recognition Dong Yu, Senior Member, IEEE, Jinyu Li, Member, IEEE, Li Deng, Fellow, IEEE

More information

Linking Task: Identifying authors and book titles in verbose queries

Linking Task: Identifying authors and book titles in verbose queries Linking Task: Identifying authors and book titles in verbose queries Anaïs Ollagnier, Sébastien Fournier, and Patrice Bellot Aix-Marseille University, CNRS, ENSAM, University of Toulon, LSIS UMR 7296,

More information

SARDNET: A Self-Organizing Feature Map for Sequences

SARDNET: A Self-Organizing Feature Map for Sequences SARDNET: A Self-Organizing Feature Map for Sequences Daniel L. James and Risto Miikkulainen Department of Computer Sciences The University of Texas at Austin Austin, TX 78712 dljames,risto~cs.utexas.edu

More information

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur Module 12 Machine Learning 12.1 Instructional Objective The students should understand the concept of learning systems Students should learn about different aspects of a learning system Students should

More information

Entrepreneurial Discovery and the Demmert/Klein Experiment: Additional Evidence from Germany

Entrepreneurial Discovery and the Demmert/Klein Experiment: Additional Evidence from Germany Entrepreneurial Discovery and the Demmert/Klein Experiment: Additional Evidence from Germany Jana Kitzmann and Dirk Schiereck, Endowed Chair for Banking and Finance, EUROPEAN BUSINESS SCHOOL, International

More information

Reducing Features to Improve Bug Prediction

Reducing Features to Improve Bug Prediction Reducing Features to Improve Bug Prediction Shivkumar Shivaji, E. James Whitehead, Jr., Ram Akella University of California Santa Cruz {shiv,ejw,ram}@soe.ucsc.edu Sunghun Kim Hong Kong University of Science

More information

BUILDING CONTEXT-DEPENDENT DNN ACOUSTIC MODELS USING KULLBACK-LEIBLER DIVERGENCE-BASED STATE TYING

BUILDING CONTEXT-DEPENDENT DNN ACOUSTIC MODELS USING KULLBACK-LEIBLER DIVERGENCE-BASED STATE TYING BUILDING CONTEXT-DEPENDENT DNN ACOUSTIC MODELS USING KULLBACK-LEIBLER DIVERGENCE-BASED STATE TYING Gábor Gosztolya 1, Tamás Grósz 1, László Tóth 1, David Imseng 2 1 MTA-SZTE Research Group on Artificial

More information

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS Václav Kocian, Eva Volná, Michal Janošek, Martin Kotyrba University of Ostrava Department of Informatics and Computers Dvořákova 7,

More information

arxiv: v1 [cs.cv] 10 May 2017

arxiv: v1 [cs.cv] 10 May 2017 Inferring and Executing Programs for Visual Reasoning Justin Johnson 1 Bharath Hariharan 2 Laurens van der Maaten 2 Judy Hoffman 1 Li Fei-Fei 1 C. Lawrence Zitnick 2 Ross Girshick 2 1 Stanford University

More information

Speech Segmentation Using Probabilistic Phonetic Feature Hierarchy and Support Vector Machines

Speech Segmentation Using Probabilistic Phonetic Feature Hierarchy and Support Vector Machines Speech Segmentation Using Probabilistic Phonetic Feature Hierarchy and Support Vector Machines Amit Juneja and Carol Espy-Wilson Department of Electrical and Computer Engineering University of Maryland,

More information

Dropout improves Recurrent Neural Networks for Handwriting Recognition

Dropout improves Recurrent Neural Networks for Handwriting Recognition 2014 14th International Conference on Frontiers in Handwriting Recognition Dropout improves Recurrent Neural Networks for Handwriting Recognition Vu Pham,Théodore Bluche, Christopher Kermorvant, and Jérôme

More information

Machine Learning from Garden Path Sentences: The Application of Computational Linguistics

Machine Learning from Garden Path Sentences: The Application of Computational Linguistics Machine Learning from Garden Path Sentences: The Application of Computational Linguistics http://dx.doi.org/10.3991/ijet.v9i6.4109 J.L. Du 1, P.F. Yu 1 and M.L. Li 2 1 Guangdong University of Foreign Studies,

More information

INVESTIGATION OF UNSUPERVISED ADAPTATION OF DNN ACOUSTIC MODELS WITH FILTER BANK INPUT

INVESTIGATION OF UNSUPERVISED ADAPTATION OF DNN ACOUSTIC MODELS WITH FILTER BANK INPUT INVESTIGATION OF UNSUPERVISED ADAPTATION OF DNN ACOUSTIC MODELS WITH FILTER BANK INPUT Takuya Yoshioka,, Anton Ragni, Mark J. F. Gales Cambridge University Engineering Department, Cambridge, UK NTT Communication

More information

arxiv: v1 [cs.cl] 2 Apr 2017

arxiv: v1 [cs.cl] 2 Apr 2017 Word-Alignment-Based Segment-Level Machine Translation Evaluation using Word Embeddings Junki Matsuo and Mamoru Komachi Graduate School of System Design, Tokyo Metropolitan University, Japan matsuo-junki@ed.tmu.ac.jp,

More information

Phonetic- and Speaker-Discriminant Features for Speaker Recognition. Research Project

Phonetic- and Speaker-Discriminant Features for Speaker Recognition. Research Project Phonetic- and Speaker-Discriminant Features for Speaker Recognition by Lara Stoll Research Project Submitted to the Department of Electrical Engineering and Computer Sciences, University of California

More information

Deep search. Enhancing a search bar using machine learning. Ilgün Ilgün & Cedric Reichenbach

Deep search. Enhancing a search bar using machine learning. Ilgün Ilgün & Cedric Reichenbach #BaselOne7 Deep search Enhancing a search bar using machine learning Ilgün Ilgün & Cedric Reichenbach We are not researchers Outline I. Periscope: A search tool II. Goals III. Deep learning IV. Applying

More information

Knowledge Transfer in Deep Convolutional Neural Nets

Knowledge Transfer in Deep Convolutional Neural Nets Knowledge Transfer in Deep Convolutional Neural Nets Steven Gutstein, Olac Fuentes and Eric Freudenthal Computer Science Department University of Texas at El Paso El Paso, Texas, 79968, U.S.A. Abstract

More information

Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling

Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling Notebook for PAN at CLEF 2013 Andrés Alfonso Caurcel Díaz 1 and José María Gómez Hidalgo 2 1 Universidad

More information

CS Machine Learning

CS Machine Learning CS 478 - Machine Learning Projects Data Representation Basic testing and evaluation schemes CS 478 Data and Testing 1 Programming Issues l Program in any platform you want l Realize that you will be doing

More information

Predicting Student Attrition in MOOCs using Sentiment Analysis and Neural Networks

Predicting Student Attrition in MOOCs using Sentiment Analysis and Neural Networks Predicting Student Attrition in MOOCs using Sentiment Analysis and Neural Networks Devendra Singh Chaplot, Eunhee Rhim, and Jihie Kim Samsung Electronics Co., Ltd. Seoul, South Korea {dev.chaplot,eunhee.rhim,jihie.kim}@samsung.com

More information

Evolutive Neural Net Fuzzy Filtering: Basic Description

Evolutive Neural Net Fuzzy Filtering: Basic Description Journal of Intelligent Learning Systems and Applications, 2010, 2: 12-18 doi:10.4236/jilsa.2010.21002 Published Online February 2010 (http://www.scirp.org/journal/jilsa) Evolutive Neural Net Fuzzy Filtering:

More information

Knowledge-Based - Systems

Knowledge-Based - Systems Knowledge-Based - Systems ; Rajendra Arvind Akerkar Chairman, Technomathematics Research Foundation and Senior Researcher, Western Norway Research institute Priti Srinivas Sajja Sardar Patel University

More information

Twitter Sentiment Classification on Sanders Data using Hybrid Approach

Twitter Sentiment Classification on Sanders Data using Hybrid Approach IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. I (July Aug. 2015), PP 118-123 www.iosrjournals.org Twitter Sentiment Classification on Sanders

More information

Reinforcement Learning by Comparing Immediate Reward

Reinforcement Learning by Comparing Immediate Reward Reinforcement Learning by Comparing Immediate Reward Punit Pandey DeepshikhaPandey Dr. Shishir Kumar Abstract This paper introduces an approach to Reinforcement Learning Algorithm by comparing their immediate

More information

Longest Common Subsequence: A Method for Automatic Evaluation of Handwritten Essays

Longest Common Subsequence: A Method for Automatic Evaluation of Handwritten Essays IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. IV (Nov Dec. 2015), PP 01-07 www.iosrjournals.org Longest Common Subsequence: A Method for

More information

Lip reading: Japanese vowel recognition by tracking temporal changes of lip shape

Lip reading: Japanese vowel recognition by tracking temporal changes of lip shape Lip reading: Japanese vowel recognition by tracking temporal changes of lip shape Koshi Odagiri 1, and Yoichi Muraoka 1 1 Graduate School of Fundamental/Computer Science and Engineering, Waseda University,

More information

A student diagnosing and evaluation system for laboratory-based academic exercises

A student diagnosing and evaluation system for laboratory-based academic exercises A student diagnosing and evaluation system for laboratory-based academic exercises Maria Samarakou, Emmanouil Fylladitakis and Pantelis Prentakis Technological Educational Institute (T.E.I.) of Athens

More information

Autoregressive product of multi-frame predictions can improve the accuracy of hybrid models

Autoregressive product of multi-frame predictions can improve the accuracy of hybrid models Autoregressive product of multi-frame predictions can improve the accuracy of hybrid models Navdeep Jaitly 1, Vincent Vanhoucke 2, Geoffrey Hinton 1,2 1 University of Toronto 2 Google Inc. ndjaitly@cs.toronto.edu,

More information

DIRECT ADAPTATION OF HYBRID DNN/HMM MODEL FOR FAST SPEAKER ADAPTATION IN LVCSR BASED ON SPEAKER CODE

DIRECT ADAPTATION OF HYBRID DNN/HMM MODEL FOR FAST SPEAKER ADAPTATION IN LVCSR BASED ON SPEAKER CODE 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) DIRECT ADAPTATION OF HYBRID DNN/HMM MODEL FOR FAST SPEAKER ADAPTATION IN LVCSR BASED ON SPEAKER CODE Shaofei Xue 1

More information

MULTILINGUAL INFORMATION ACCESS IN DIGITAL LIBRARY

MULTILINGUAL INFORMATION ACCESS IN DIGITAL LIBRARY MULTILINGUAL INFORMATION ACCESS IN DIGITAL LIBRARY Chen, Hsin-Hsi Department of Computer Science and Information Engineering National Taiwan University Taipei, Taiwan E-mail: hh_chen@csie.ntu.edu.tw Abstract

More information

Learning From the Past with Experiment Databases

Learning From the Past with Experiment Databases Learning From the Past with Experiment Databases Joaquin Vanschoren 1, Bernhard Pfahringer 2, and Geoff Holmes 2 1 Computer Science Dept., K.U.Leuven, Leuven, Belgium 2 Computer Science Dept., University

More information

On the Combined Behavior of Autonomous Resource Management Agents

On the Combined Behavior of Autonomous Resource Management Agents On the Combined Behavior of Autonomous Resource Management Agents Siri Fagernes 1 and Alva L. Couch 2 1 Faculty of Engineering Oslo University College Oslo, Norway siri.fagernes@iu.hio.no 2 Computer Science

More information

Unsupervised Acoustic Model Training for Simultaneous Lecture Translation in Incremental and Batch Mode

Unsupervised Acoustic Model Training for Simultaneous Lecture Translation in Incremental and Batch Mode Unsupervised Acoustic Model Training for Simultaneous Lecture Translation in Incremental and Batch Mode Diploma Thesis of Michael Heck At the Department of Informatics Karlsruhe Institute of Technology

More information

Circuit Simulators: A Revolutionary E-Learning Platform

Circuit Simulators: A Revolutionary E-Learning Platform Circuit Simulators: A Revolutionary E-Learning Platform Mahi Itagi Padre Conceicao College of Engineering, Verna, Goa, India. itagimahi@gmail.com Akhil Deshpande Gogte Institute of Technology, Udyambag,

More information

Semi-supervised methods of text processing, and an application to medical concept extraction. Yacine Jernite Text-as-Data series September 17.

Semi-supervised methods of text processing, and an application to medical concept extraction. Yacine Jernite Text-as-Data series September 17. Semi-supervised methods of text processing, and an application to medical concept extraction Yacine Jernite Text-as-Data series September 17. 2015 What do we want from text? 1. Extract information 2. Link

More information

Computerized Adaptive Psychological Testing A Personalisation Perspective

Computerized Adaptive Psychological Testing A Personalisation Perspective Psychology and the internet: An European Perspective Computerized Adaptive Psychological Testing A Personalisation Perspective Mykola Pechenizkiy mpechen@cc.jyu.fi Introduction Mixed Model of IRT and ES

More information

The A2iA Multi-lingual Text Recognition System at the second Maurdor Evaluation

The A2iA Multi-lingual Text Recognition System at the second Maurdor Evaluation 2014 14th International Conference on Frontiers in Handwriting Recognition The A2iA Multi-lingual Text Recognition System at the second Maurdor Evaluation Bastien Moysset,Théodore Bluche, Maxime Knibbe,

More information

Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models

Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models Stephan Gouws and GJ van Rooyen MIH Medialab, Stellenbosch University SOUTH AFRICA {stephan,gvrooyen}@ml.sun.ac.za

More information

Likelihood-Maximizing Beamforming for Robust Hands-Free Speech Recognition

Likelihood-Maximizing Beamforming for Robust Hands-Free Speech Recognition MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Likelihood-Maximizing Beamforming for Robust Hands-Free Speech Recognition Seltzer, M.L.; Raj, B.; Stern, R.M. TR2004-088 December 2004 Abstract

More information

MYCIN. The MYCIN Task

MYCIN. The MYCIN Task MYCIN Developed at Stanford University in 1972 Regarded as the first true expert system Assists physicians in the treatment of blood infections Many revisions and extensions over the years The MYCIN Task

More information

Segmental Conditional Random Fields with Deep Neural Networks as Acoustic Models for First-Pass Word Recognition

Segmental Conditional Random Fields with Deep Neural Networks as Acoustic Models for First-Pass Word Recognition Segmental Conditional Random Fields with Deep Neural Networks as Acoustic Models for First-Pass Word Recognition Yanzhang He, Eric Fosler-Lussier Department of Computer Science and Engineering The hio

More information

International Journal of Advanced Networking Applications (IJANA) ISSN No. :

International Journal of Advanced Networking Applications (IJANA) ISSN No. : International Journal of Advanced Networking Applications (IJANA) ISSN No. : 0975-0290 34 A Review on Dysarthric Speech Recognition Megha Rughani Department of Electronics and Communication, Marwadi Educational

More information

Automatic Pronunciation Checker

Automatic Pronunciation Checker Institut für Technische Informatik und Kommunikationsnetze Eidgenössische Technische Hochschule Zürich Swiss Federal Institute of Technology Zurich Ecole polytechnique fédérale de Zurich Politecnico federale

More information

Learning to Schedule Straight-Line Code

Learning to Schedule Straight-Line Code Learning to Schedule Straight-Line Code Eliot Moss, Paul Utgoff, John Cavazos Doina Precup, Darko Stefanović Dept. of Comp. Sci., Univ. of Mass. Amherst, MA 01003 Carla Brodley, David Scheeff Sch. of Elec.

More information

Off-line handwritten Thai name recognition for student identification in an automated assessment system

Off-line handwritten Thai name recognition for student identification in an automated assessment system Griffith Research Online https://research-repository.griffith.edu.au Off-line handwritten Thai name recognition for student identification in an automated assessment system Author Suwanwiwat, Hemmaphan,

More information

A Model to Detect Problems on Scrum-based Software Development Projects

A Model to Detect Problems on Scrum-based Software Development Projects A Model to Detect Problems on Scrum-based Software Development Projects ABSTRACT There is a high rate of software development projects that fails. Whenever problems can be detected ahead of time, software

More information

NCU IISR English-Korean and English-Chinese Named Entity Transliteration Using Different Grapheme Segmentation Approaches

NCU IISR English-Korean and English-Chinese Named Entity Transliteration Using Different Grapheme Segmentation Approaches NCU IISR English-Korean and English-Chinese Named Entity Transliteration Using Different Grapheme Segmentation Approaches Yu-Chun Wang Chun-Kai Wu Richard Tzong-Han Tsai Department of Computer Science

More information

Problems of the Arabic OCR: New Attitudes

Problems of the Arabic OCR: New Attitudes Problems of the Arabic OCR: New Attitudes Prof. O.Redkin, Dr. O.Bernikova Department of Asian and African Studies, St. Petersburg State University, St Petersburg, Russia Abstract - This paper reviews existing

More information

Bootstrapping Personal Gesture Shortcuts with the Wisdom of the Crowd and Handwriting Recognition

Bootstrapping Personal Gesture Shortcuts with the Wisdom of the Crowd and Handwriting Recognition Bootstrapping Personal Gesture Shortcuts with the Wisdom of the Crowd and Handwriting Recognition Tom Y. Ouyang * MIT CSAIL ouyang@csail.mit.edu Yang Li Google Research yangli@acm.org ABSTRACT Personal

More information

Testing A Moving Target: How Do We Test Machine Learning Systems? Peter Varhol Technology Strategy Research, USA

Testing A Moving Target: How Do We Test Machine Learning Systems? Peter Varhol Technology Strategy Research, USA Testing A Moving Target: How Do We Test Machine Learning Systems? Peter Varhol Technology Strategy Research, USA Testing a Moving Target How Do We Test Machine Learning Systems? Peter Varhol, Technology

More information

Mandarin Lexical Tone Recognition: The Gating Paradigm

Mandarin Lexical Tone Recognition: The Gating Paradigm Kansas Working Papers in Linguistics, Vol. 0 (008), p. 8 Abstract Mandarin Lexical Tone Recognition: The Gating Paradigm Yuwen Lai and Jie Zhang University of Kansas Research on spoken word recognition

More information

Iterative Cross-Training: An Algorithm for Learning from Unlabeled Web Pages

Iterative Cross-Training: An Algorithm for Learning from Unlabeled Web Pages Iterative Cross-Training: An Algorithm for Learning from Unlabeled Web Pages Nuanwan Soonthornphisaj 1 and Boonserm Kijsirikul 2 Machine Intelligence and Knowledge Discovery Laboratory Department of Computer

More information

Probabilistic Latent Semantic Analysis

Probabilistic Latent Semantic Analysis Probabilistic Latent Semantic Analysis Thomas Hofmann Presentation by Ioannis Pavlopoulos & Andreas Damianou for the course of Data Mining & Exploration 1 Outline Latent Semantic Analysis o Need o Overview

More information

Axiom 2013 Team Description Paper

Axiom 2013 Team Description Paper Axiom 2013 Team Description Paper Mohammad Ghazanfari, S Omid Shirkhorshidi, Farbod Samsamipour, Hossein Rahmatizadeh Zagheli, Mohammad Mahdavi, Payam Mohajeri, S Abbas Alamolhoda Robotics Scientific Association

More information

FUZZY EXPERT. Dr. Kasim M. Al-Aubidy. Philadelphia University. Computer Eng. Dept February 2002 University of Damascus-Syria

FUZZY EXPERT. Dr. Kasim M. Al-Aubidy. Philadelphia University. Computer Eng. Dept February 2002 University of Damascus-Syria FUZZY EXPERT SYSTEMS 16-18 18 February 2002 University of Damascus-Syria Dr. Kasim M. Al-Aubidy Computer Eng. Dept. Philadelphia University What is Expert Systems? ES are computer programs that emulate

More information

Robust Speech Recognition using DNN-HMM Acoustic Model Combining Noise-aware training with Spectral Subtraction

Robust Speech Recognition using DNN-HMM Acoustic Model Combining Noise-aware training with Spectral Subtraction INTERSPEECH 2015 Robust Speech Recognition using DNN-HMM Acoustic Model Combining Noise-aware training with Spectral Subtraction Akihiro Abe, Kazumasa Yamamoto, Seiichi Nakagawa Department of Computer

More information

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1 Notes on The Sciences of the Artificial Adapted from a shorter document written for course 17-652 (Deciding What to Design) 1 Ali Almossawi December 29, 2005 1 Introduction The Sciences of the Artificial

More information