An Analysis of Automatic Voice Recognition and Speaker Identification Algorithms and its Applications
DOI:
https://doi.org/10.14419/ijet.v7i2.24.12125Published:
2018-04-25Keywords:
MFCC, Voice Recognition, Speaker Recognition, Speaker Identification, Applications.Abstract
Voice recognition is the domain which is used to identify the speaker behind a speech through their voice. In the field of research, Voice recognition is a domain which has been widely explored by data mining experts and used for various applications. The features of the voice are extracted through methods like MFCC and then various Data Mining and Machine learning algorithms are applied for each specific application. Researchers have explored and tested the efficiencies of various algorithms for various purposes. There appears to be specific algorithms which outperform the rest in certain applications whereas they tend to perform badly for certain other applications. This paper aims to discuss the various Voice recognition techniques and its uses in various domains. The work aims in providing the characteristics and limitations of these approaches.
References
[1] T. seehapoch and S. Wongthanavasu, “Speech emotion recognition using Support Vector Machinesâ€, IEEE Int. conference on knowledge and smart technology (KST), 2013.
[2] Kim EH, Hyun KH, Kim SH, Kwak YK. Improved emotion recognition with a novel speaker-independent feature. IEEE/ASME Transactions on Mechatronics. 2009; 14(3):317–25.
[3] S. Prasomphan. Detecting human emotion via speech recognition by using speech spectrogram 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA) pp. 1-10 2015.
[4] Vishakha Pareek, Sharma RK. Coronary heart disease detection from voice analysis. IEEE students conference on electrical, electronics and computer science; 2016
[5] Arsha Nagrani, Andrew Zisserman. From Benedict Cumberbatch to Sherlock Holmes: Character Identification in TV series; 2018
[6] Pribil, J., Pribilova, A., Matousek, J. (2016). GMM-based speaker gender and age classification after voice conversion. In First international workshop on sensing, processing and learning for intelligent machines (SPLINE), Denmark.
[7] C.Y. Yeo, S.A.R. Al-Haddad, C.K. Ng. Dog voice identification (ID) for detection system. Second International Conference Digital Information Processing and Communications; (2012), pp. 120-123
[8] M. Fezari, F. Z. Taif, M. M. Lafifi, and B. Boulebtateche, Noise emission analysis a way for early detection and classification faults in rotating machines, in Power Electronics and Motion Control Conference and Exposition (PEMC), 2014 16th International, 2014, pp. 1094-1099.
[9] S.V.Manikanthan and D.Sugandhi “ Interference Alignment Techniques For Mimo Multicell Based On Relay Interference Broadcast Channel †International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume- 7 ,Issue 1 –MARCH 2014.
[10] T. Padmapriya and V. Saminadan, “Inter-cell Load Balancing technique for multi-class traffic in MIMO-LTE-A Networksâ€, International Journal of Electrical, Electronics and Data Communication (IJEEDC), ISSN: 2320- 2084, vol.3, no.8, pp. 22-26, Aug 2015.
[11] S.V.Manikanthan and K.Baskaran “Low Cost VLSI Design Implementation of Sorting Network for ACSFD in Wireless Sensor Networkâ€, CiiT International Journal of Programmable Device Circuits and Systems,Print: ISSN 0974 – 973X & Online: ISSN 0974 – 9624, Issue : November 2011, PDCS112011008.
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-04-25
Published 2018-04-25