Tuesday, October 29, 2019
Methodology Essay Example | Topics and Well Written Essays - 4750 words
Methodology - Essay Example In the training step, the characteristics will be derived from a recognized speaker sound then stored in a database that has a model or an outline like Password or Name. The stored information is then extracted by means of the model given by an unidentified speaker. The recovered data is then compared with characteristics extracted from the unidentified speaker sound. If the evaluation result is positive, then the unidentified speaker will be validated. The figure above 3.2.2 demonstrates two things: how the word will be accepted from the speakers voice as well as how to distinguish the personality of the speaker. The speech identification will need from the speaker to record the word. The classifier will be employed so as to extract the characteristics of the voice of the speaker and then the representation will be made and saved in the catalog. Just for the speaker identification the speakers voice will be recorded then features will be taken out and will be evaluated against the other speakers models so as to accept or reject the personality of a speaker. The figure above 3.2.3 demonstrates the enrollment along with verification phases, in the previous stage the speakers voice will be recorded so as to extract the attribute from his/her voice. After that, the replica will be created for every speaker word and will be stored it in the database. During the verification stage, the speakerââ¬â¢s voice will be recorded, and then the traits will be extorted from the speakers voice. After that, the choice will be made so as to accept or reject the speaker depending on the assessment of the extracted characteristic from a speaker along with the other recognized speaker models that were stored in the database. For this project, I employed Hidden Markov Model (HMM) for recognition of speech. 3.1 Hardware depiction: The software will be executed by means of some devices such as Microphone in addition to the computer, the microphone should
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.