SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 6 (April 2019) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – Mendeley (Elsevier Indexed); Citefactor 1.9 (2017); SJIF: Innospace, Morocco
(2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 | ISRAJIF (2017): 4.011 | Indexcopernicus: (ICV 2016): 64.35
IJIRAE © 2014- 19, All Rights Reserved Page–273
HMM APPLICATION IN ISOLATED WORD SPEECH
RECOGNITION
Sonali Rawat*
Department of Computer Science and Engineering
IMS Engineering College, Ghaziabad, Uttar Pradesh, India
rawatsonali3003@gmail.com
Shalvika Shrotriya
Department of Computer Science and Engineering
IMS Engineering College, Ghaziabad, Uttar Pradesh, India
shalvikashrotriya@gmail.com
Juhi Chaudhary
Department of Computer Science and Engineering
IMS Engineering College, Ghaziabad, Uttar Pradesh, India
juhi.chaudhary@imsec.ac.in
Manuscript History
Number: IJIRAE/RS/Vol.06/Issue04/APAE10081
Received: 02, April 2019
Final Correction: 05, April 2019
Final Accepted: 08, April 2019
Published: April 2019
Citation: Rawat, S., Shrotriya, S. & Chaudhary, J. (2019). HMM Application in Isolated Eord Speech
Recognition. IJIRAE::International Journal of Innovative Research in Advanced Engineering, Volume VI, 273-277.
doi://10.26562/IJIRAE.2019.APAE10081
Editor: Dr.A.Arul L.S, Chief Editor, IJIRAE, AM Publications, India
Copyright: ©2019 This is an open access article distributed under the terms of the Creative Commons Attribution
License, Which Permits unrestricted use, distribution, and reproduction in any medium, provided the original author
and source are credited
Abstract —Speech recognition is always being an all-time trendy topic for discussion and also for researches and
we see a major application in our life. This paper provides the work done on the application of Hidden Markov
model to implement isolated word speech recognition on MATLAB and to develop and train the system for set of
self-selective words for specific user (user dependent) to get maximum efficiency in word recognition system.
Which uses the forward and Baum-welch algorithm and fitting Gaussian of the Baum-welch algorithm for all the
iteration perform. We use a sample of 7 alphabets which are recorded in 15 different ways giving total of 105
word to use for training with each word with 15 variations. This system can be used in real world in system
security using voice security system and mainly for children and impaired people.
Keyword: Hidden Markov Model; Isolated word recognition; Baum-welch; Gaussian Fitting;
I. INTRODUCTION
Sound or speech is always the part of every human being and is associated till life. Speech generation can be
natural or by computer called speech synthesis. Vocalization causing speech and is important form of human
conversation and plays an important role in human life, while speech recognition in making computer interactions
easier. Speech recognition, made major steps in the past era, and it has various advance application towards
several commercial systems and is embedded in customer call centres, google assistant, and many other voice-
activated routing systems which are currently available and this isolated word speech training is found most
efficient in term of dealing with noisy data as most of the systems lacs the robustness[1] and it can filter noise and
can opt for multiple acoustic conditions including person’s speech rate and frequency.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 6 (April 2019) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – Mendeley (Elsevier Indexed); Citefactor 1.9 (2017); SJIF: Innospace, Morocco
(2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 | ISRAJIF (2017): 4.011 | Indexcopernicus: (ICV 2016): 64.35
IJIRAE © 2014- 19, All Rights Reserved Page–274
Speech recognition is a technology procedure to extract the feature of speech and then process it which allows
computer to understand isolated word by humans inputted by hardware or in audio format then the system is
trained for a single user results to train in a specific voice model by strictly using a single stochastic model Hidden
Markov Model (HMM), using forward and backward algorithm along with Baum-Welch algorithm, Which
resulting in creating trainer dependent or independent system using supervised along with label training in which
training one model for individual word then further using this in various applications, to convert the voice for text
or understanding commands, data entry and most importantly for impaired people, real time vehicle control[2]
home security system etc.
II. ANALYSIS OF TYPES OF SPEECH RECOGNITION SYSTEM
Speech recognition system either work on continuous speech in which there is no or minimum pause in a fused
manner and isolated speech recognition system which include a maximum pause in-between each word or spoken
separately. System can be further divided on the basis of speaker, dependent or independent. In speaker
independent the system is trained in a way to recognize any speech irrespective of the speaker which also make it
very adaptive and robust[3]. Which have major application in voice to text for any valid speaker. In dependent
system is restricted to recognize speech only from specific selected speaker as it needs the recoding of a speech
and the system is trained under the selective speaker. Its major application is in command based security system
or voice based security in real word.
III. SYSTEM WORK FLOW DEVELOPMENT
In our system we are using a pre-recorded voice of 7 fruits names in which each fruit is having 15 variations in
speech by a single speaker in all the clips. The system is trained by using the total of 105 words which can be
increases according to the need. The workflow is divided into 3 major phases, plotting of frequency time graph for
each of the voice clip followed by loading into the HMM model and final is Gaussian fitting this is done on a self-
testing basis in which the system recognizes and compare the generated word from the phenomes with the
original word.
Fig.1 The workflow diagram of system implemented on MATLAB
IV. HIDDEN MARKOV MODEL
We are assuming to have a basic knowledge of Hidden Markov model and we focus to describe the two important
algorithms that we used in this project. Multivariate Gaussian distributed is used for the generation of hidden
states which create a mean vector and second a covariance vector. A homogenous HMM is used to which makes
state transitional probabilities independent of time[4]. Total number of N states are used. An element assis used in
the transition probability matrix denoted by A which further denotes the transition probability from state s to
state s’, and πs is the probability for the chain to start in state s. The mean vector is µs and covariance matrix is Σs
for the multivariate Gaussian distribution modelling the observable output from state s. Here we are using
collection of parameters to define our HMM model as λ = {A,π,µ,Σ}.
A. The Forward Algorithm
This is used to select the voice which is most likely to happen or the log likelihood and the probability density
from observation o1
( , … . . , ; λ) = ∑ ( , … . . , , ; λ) (1)
= ∑ ( | , … . . , , ; λ) ( , … . . , , ; λ) (2)
=∑ ( ) ∑ ( | , … . . , , ; λ) (3)
=∑ ( ) ∑ ( | , … . . , , ;λ) 	 ( | , … . . , , ; λ) (4)
=∑ ( ) ∑ ( | , … . . , , ;λ) (5)
The recursive structure is revealed as we reduced the problem from needing f(o1,...,oT,sT;λ) for all sT to needing
f(o1,...,oT−1,sT−1;λ) for all sT−1. Now using forward variable.
Speaker Voice
Ploting .Wav
files
Feature
extraction
Processing
Feature
Calculating
log_likelihood
Gaussian
Fitting
Recoginzing
Word
Comparing
recognized
with original
Calculating
Effiviency
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 6 (April 2019) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – Mendeley (Elsevier Indexed); Citefactor 1.9 (2017); SJIF: Innospace, Morocco
(2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 | ISRAJIF (2017): 4.011 | Indexcopernicus: (ICV 2016): 64.35
IJIRAE © 2014- 19, All Rights Reserved Page–275
∝ ( ) ≡ ( , = ; λ) (6)
= ( ) (7)
∝ ( ) ≡ ( , = ; λ (8)
= ( )∑ ′′ ∝ ( ′) (9)
B. The Baum-Welch Algorithm
Maximization of the log likelihood of observation is done using this algorithm along with the training of the
samples of hidden Markov model. The Baum-Welch algorithm is an iterative expectation-maximization (EM)
algorithm that converges to a locally optimal solution from the initialization values.
=
	 	 	 	 	 	 	 	 	 	
	 	 	 	 	 	 	
(11)
=
	 	 	 	 	 	 	 	
	 	 	 	 	
(12)
	= 	 	 	 ℎ 	 	 	 	 (13)
= 	 	 ℎ 	 	 	 (14)
Indicator functions and linearity of expectation are used for calculating the expected values. To calculate the
probabilities, we use the backward variable similar to the forward variable. Works in same way but just in
opposite manner. The iteration of algorithm done until the results are satisfactory.
V. DESIGNING THE SYSTEM
Fig. 2 Showing Amplitude Vs Seconds plot of few sample data.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 6 (April 2019) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – Mendeley (Elsevier Indexed); Citefactor 1.9 (2017); SJIF: Innospace, Morocco
(2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 | ISRAJIF (2017): 4.011 | Indexcopernicus: (ICV 2016): 64.35
IJIRAE © 2014- 19, All Rights Reserved Page–276
A. Acquiring Speech and feature extraction
The sound is recoded using the microphone us then converted into a frequency of 8000 Hz by using the MATLAB
function
Fs = 8000; framesize = 80; overlap = 20; D = 6; y = wavrecord(Duration*Fs,Fs);
Recording and saving each of the 7 fruits sounds with each fruit 15 times. Then plotting the frequency time for
each of the sound for feature extraction.
B. Training
As we are using label based learning which implies that both supervised as well as unsupervised learning will be
there for the given dataset. We train one state for each speech signals and each state is nothing but the phenome
of the sound. Gaussian clustering is unsupervised and is based on the initial values of the Baum-Welch algorithm.
We randomly generate the initial values of matrix A and π which strictly follows the statistical properties. Σs,
which is the diagonal covariance matrix as defined in all the iterations performed. For initial we found 15
iterations are effective for Baum-Welch algorithm
VI. SETUP AND RESULT
Fig.3 Comparison between the training Apple
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Issue 04, Volume 6 (April 2019) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – Mendeley (Elsevier Indexed); Citefactor 1.9 (2017); SJIF: Innospace, Morocco
(2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 | ISRAJIF (2017): 4.011 | Indexcopernicus: (ICV 2016): 64.35
IJIRAE © 2014- 19, All Rights Reserved Page–277
For set of each word i we denote parameter as λi having observation state from o1,…….oT, from which the section of
word is done using arg max f (o1,…….oT ; λi) which is given by the forward algorithm. Fitted Gaussian after iteration
from the first fitted plot vs the final iteration plot can been seen in the figure 3and the variation is very observable
along with at each iteration the efficiency increases from 15% to 95% efficiency is calculated by using the mcr
(misses / length (word labels)) *100 which we see vary from 92% to 94%. For the complete set used.
VII. CONCLUSIONS
We finally able to create a system which is able to train the isolated speech word using HMM and supervised and
unsupervised learning. The results generated are valid for only single speakers. The system could make robust by
using multiple users and using continues speech instead of individual word. This results for limited word set of
105 samples and efficiency can vary for different amount of dataset.
REFERENCES
1. S.A.R. Al-Haddad, S.A. Samad, A. Hussain, K.A. Ishak and A.O.A. Noor, Robust Speech Recognition Using Fusion
Techniques and Adaptive Filtering American Journal of Applied Sciences 6 (2): 290-295, 2009.
2. Shi-Huang Chen, YuRu Wei, A Study on Speech-Controlled Real-TimeRemote Vehicle On-Board Diagnostic
SystemProceeding of the International multiconference on Engineers and Computer Scientists 2010, IMECS
2010, March, 7-19,2010,vol I.
3. Fadhilah Rosdi, Raja N. Ainon Isolated Malay Speech Recognition Using Hidden Markov Models, Proceedings of
the International Conference on Computer and Communication Engineering, Kuala Lumpur, Malaysia, May, 13-
15,2008.
4. L. R. Rabiner, A tutorial on hidden markov models and selected applications in speech recognitionProc. IEEE,
Feb. 1989, vol. 77, no. 2, pp. 257–286.

More Related Content

Similar to HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION

AN EFFICIENT SPEECH RECOGNITION SYSTEM
AN EFFICIENT SPEECH RECOGNITION SYSTEMAN EFFICIENT SPEECH RECOGNITION SYSTEM
AN EFFICIENT SPEECH RECOGNITION SYSTEMcseij
 
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...AIRCC Publishing Corporation
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYIJCERT
 
IRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation SystemIRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation SystemIRJET Journal
 
MultiObjective(11) - Copy
MultiObjective(11) - CopyMultiObjective(11) - Copy
MultiObjective(11) - CopyAMIT KUMAR
 
Architecture of a morphological malware detector
Architecture of a morphological malware detectorArchitecture of a morphological malware detector
Architecture of a morphological malware detectorUltraUploader
 
NYAI #5 - Fun With Neural Nets by Jason Yosinski
NYAI #5 - Fun With Neural Nets by Jason YosinskiNYAI #5 - Fun With Neural Nets by Jason Yosinski
NYAI #5 - Fun With Neural Nets by Jason YosinskiRizwan Habib
 
A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...TELKOMNIKA JOURNAL
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET Journal
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice RecognitionAmrita More
 
Holistic Approach for Arabic Word Recognition
Holistic Approach for Arabic Word RecognitionHolistic Approach for Arabic Word Recognition
Holistic Approach for Arabic Word RecognitionEditor IJCATR
 
Using genetic algorithms and simulation as decision support in marketing stra...
Using genetic algorithms and simulation as decision support in marketing stra...Using genetic algorithms and simulation as decision support in marketing stra...
Using genetic algorithms and simulation as decision support in marketing stra...infopapers
 
On the use of voice activity detection in speech emotion recognition
On the use of voice activity detection in speech emotion recognitionOn the use of voice activity detection in speech emotion recognition
On the use of voice activity detection in speech emotion recognitionjournalBEEI
 
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Waqas Tariq
 

Similar to HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION (20)

AN EFFICIENT SPEECH RECOGNITION SYSTEM
AN EFFICIENT SPEECH RECOGNITION SYSTEMAN EFFICIENT SPEECH RECOGNITION SYSTEM
AN EFFICIENT SPEECH RECOGNITION SYSTEM
 
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
 
50120140505010
5012014050501050120140505010
50120140505010
 
speech enhancement
speech enhancementspeech enhancement
speech enhancement
 
40120130406014 2
40120130406014 240120130406014 2
40120130406014 2
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEY
 
IRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation SystemIRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation System
 
IRJET- Vocal Code
IRJET- Vocal CodeIRJET- Vocal Code
IRJET- Vocal Code
 
MultiObjective(11) - Copy
MultiObjective(11) - CopyMultiObjective(11) - Copy
MultiObjective(11) - Copy
 
Architecture of a morphological malware detector
Architecture of a morphological malware detectorArchitecture of a morphological malware detector
Architecture of a morphological malware detector
 
NYAI #5 - Fun With Neural Nets by Jason Yosinski
NYAI #5 - Fun With Neural Nets by Jason YosinskiNYAI #5 - Fun With Neural Nets by Jason Yosinski
NYAI #5 - Fun With Neural Nets by Jason Yosinski
 
A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice Recognition
 
50120140502007
5012014050200750120140502007
50120140502007
 
Holistic Approach for Arabic Word Recognition
Holistic Approach for Arabic Word RecognitionHolistic Approach for Arabic Word Recognition
Holistic Approach for Arabic Word Recognition
 
Using genetic algorithms and simulation as decision support in marketing stra...
Using genetic algorithms and simulation as decision support in marketing stra...Using genetic algorithms and simulation as decision support in marketing stra...
Using genetic algorithms and simulation as decision support in marketing stra...
 
On the use of voice activity detection in speech emotion recognition
On the use of voice activity detection in speech emotion recognitionOn the use of voice activity detection in speech emotion recognition
On the use of voice activity detection in speech emotion recognition
 
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
 
BTP paper
BTP paperBTP paper
BTP paper
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 
DATA MINING WITH CLUSTERING ON BIG DATA FOR SHOPPING MALL’S DATASET
DATA MINING WITH CLUSTERING ON BIG DATA FOR SHOPPING MALL’S DATASETDATA MINING WITH CLUSTERING ON BIG DATA FOR SHOPPING MALL’S DATASET
DATA MINING WITH CLUSTERING ON BIG DATA FOR SHOPPING MALL’S DATASETAM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 
DATA MINING WITH CLUSTERING ON BIG DATA FOR SHOPPING MALL’S DATASET
DATA MINING WITH CLUSTERING ON BIG DATA FOR SHOPPING MALL’S DATASETDATA MINING WITH CLUSTERING ON BIG DATA FOR SHOPPING MALL’S DATASET
DATA MINING WITH CLUSTERING ON BIG DATA FOR SHOPPING MALL’S DATASET
 

Recently uploaded

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 04, Volume 6 (April 2019) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – Mendeley (Elsevier Indexed); Citefactor 1.9 (2017); SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 | ISRAJIF (2017): 4.011 | Indexcopernicus: (ICV 2016): 64.35 IJIRAE © 2014- 19, All Rights Reserved Page–273 HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION Sonali Rawat* Department of Computer Science and Engineering IMS Engineering College, Ghaziabad, Uttar Pradesh, India rawatsonali3003@gmail.com Shalvika Shrotriya Department of Computer Science and Engineering IMS Engineering College, Ghaziabad, Uttar Pradesh, India shalvikashrotriya@gmail.com Juhi Chaudhary Department of Computer Science and Engineering IMS Engineering College, Ghaziabad, Uttar Pradesh, India juhi.chaudhary@imsec.ac.in Manuscript History Number: IJIRAE/RS/Vol.06/Issue04/APAE10081 Received: 02, April 2019 Final Correction: 05, April 2019 Final Accepted: 08, April 2019 Published: April 2019 Citation: Rawat, S., Shrotriya, S. & Chaudhary, J. (2019). HMM Application in Isolated Eord Speech Recognition. IJIRAE::International Journal of Innovative Research in Advanced Engineering, Volume VI, 273-277. doi://10.26562/IJIRAE.2019.APAE10081 Editor: Dr.A.Arul L.S, Chief Editor, IJIRAE, AM Publications, India Copyright: ©2019 This is an open access article distributed under the terms of the Creative Commons Attribution License, Which Permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited Abstract —Speech recognition is always being an all-time trendy topic for discussion and also for researches and we see a major application in our life. This paper provides the work done on the application of Hidden Markov model to implement isolated word speech recognition on MATLAB and to develop and train the system for set of self-selective words for specific user (user dependent) to get maximum efficiency in word recognition system. Which uses the forward and Baum-welch algorithm and fitting Gaussian of the Baum-welch algorithm for all the iteration perform. We use a sample of 7 alphabets which are recorded in 15 different ways giving total of 105 word to use for training with each word with 15 variations. This system can be used in real world in system security using voice security system and mainly for children and impaired people. Keyword: Hidden Markov Model; Isolated word recognition; Baum-welch; Gaussian Fitting; I. INTRODUCTION Sound or speech is always the part of every human being and is associated till life. Speech generation can be natural or by computer called speech synthesis. Vocalization causing speech and is important form of human conversation and plays an important role in human life, while speech recognition in making computer interactions easier. Speech recognition, made major steps in the past era, and it has various advance application towards several commercial systems and is embedded in customer call centres, google assistant, and many other voice- activated routing systems which are currently available and this isolated word speech training is found most efficient in term of dealing with noisy data as most of the systems lacs the robustness[1] and it can filter noise and can opt for multiple acoustic conditions including person’s speech rate and frequency.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 04, Volume 6 (April 2019) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – Mendeley (Elsevier Indexed); Citefactor 1.9 (2017); SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 | ISRAJIF (2017): 4.011 | Indexcopernicus: (ICV 2016): 64.35 IJIRAE © 2014- 19, All Rights Reserved Page–274 Speech recognition is a technology procedure to extract the feature of speech and then process it which allows computer to understand isolated word by humans inputted by hardware or in audio format then the system is trained for a single user results to train in a specific voice model by strictly using a single stochastic model Hidden Markov Model (HMM), using forward and backward algorithm along with Baum-Welch algorithm, Which resulting in creating trainer dependent or independent system using supervised along with label training in which training one model for individual word then further using this in various applications, to convert the voice for text or understanding commands, data entry and most importantly for impaired people, real time vehicle control[2] home security system etc. II. ANALYSIS OF TYPES OF SPEECH RECOGNITION SYSTEM Speech recognition system either work on continuous speech in which there is no or minimum pause in a fused manner and isolated speech recognition system which include a maximum pause in-between each word or spoken separately. System can be further divided on the basis of speaker, dependent or independent. In speaker independent the system is trained in a way to recognize any speech irrespective of the speaker which also make it very adaptive and robust[3]. Which have major application in voice to text for any valid speaker. In dependent system is restricted to recognize speech only from specific selected speaker as it needs the recoding of a speech and the system is trained under the selective speaker. Its major application is in command based security system or voice based security in real word. III. SYSTEM WORK FLOW DEVELOPMENT In our system we are using a pre-recorded voice of 7 fruits names in which each fruit is having 15 variations in speech by a single speaker in all the clips. The system is trained by using the total of 105 words which can be increases according to the need. The workflow is divided into 3 major phases, plotting of frequency time graph for each of the voice clip followed by loading into the HMM model and final is Gaussian fitting this is done on a self- testing basis in which the system recognizes and compare the generated word from the phenomes with the original word. Fig.1 The workflow diagram of system implemented on MATLAB IV. HIDDEN MARKOV MODEL We are assuming to have a basic knowledge of Hidden Markov model and we focus to describe the two important algorithms that we used in this project. Multivariate Gaussian distributed is used for the generation of hidden states which create a mean vector and second a covariance vector. A homogenous HMM is used to which makes state transitional probabilities independent of time[4]. Total number of N states are used. An element assis used in the transition probability matrix denoted by A which further denotes the transition probability from state s to state s’, and πs is the probability for the chain to start in state s. The mean vector is µs and covariance matrix is Σs for the multivariate Gaussian distribution modelling the observable output from state s. Here we are using collection of parameters to define our HMM model as λ = {A,π,µ,Σ}. A. The Forward Algorithm This is used to select the voice which is most likely to happen or the log likelihood and the probability density from observation o1 ( , … . . , ; λ) = ∑ ( , … . . , , ; λ) (1) = ∑ ( | , … . . , , ; λ) ( , … . . , , ; λ) (2) =∑ ( ) ∑ ( | , … . . , , ; λ) (3) =∑ ( ) ∑ ( | , … . . , , ;λ) ( | , … . . , , ; λ) (4) =∑ ( ) ∑ ( | , … . . , , ;λ) (5) The recursive structure is revealed as we reduced the problem from needing f(o1,...,oT,sT;λ) for all sT to needing f(o1,...,oT−1,sT−1;λ) for all sT−1. Now using forward variable. Speaker Voice Ploting .Wav files Feature extraction Processing Feature Calculating log_likelihood Gaussian Fitting Recoginzing Word Comparing recognized with original Calculating Effiviency
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 04, Volume 6 (April 2019) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – Mendeley (Elsevier Indexed); Citefactor 1.9 (2017); SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 | ISRAJIF (2017): 4.011 | Indexcopernicus: (ICV 2016): 64.35 IJIRAE © 2014- 19, All Rights Reserved Page–275 ∝ ( ) ≡ ( , = ; λ) (6) = ( ) (7) ∝ ( ) ≡ ( , = ; λ (8) = ( )∑ ′′ ∝ ( ′) (9) B. The Baum-Welch Algorithm Maximization of the log likelihood of observation is done using this algorithm along with the training of the samples of hidden Markov model. The Baum-Welch algorithm is an iterative expectation-maximization (EM) algorithm that converges to a locally optimal solution from the initialization values. = (11) = (12) = ℎ (13) = ℎ (14) Indicator functions and linearity of expectation are used for calculating the expected values. To calculate the probabilities, we use the backward variable similar to the forward variable. Works in same way but just in opposite manner. The iteration of algorithm done until the results are satisfactory. V. DESIGNING THE SYSTEM Fig. 2 Showing Amplitude Vs Seconds plot of few sample data.
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 04, Volume 6 (April 2019) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – Mendeley (Elsevier Indexed); Citefactor 1.9 (2017); SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 | ISRAJIF (2017): 4.011 | Indexcopernicus: (ICV 2016): 64.35 IJIRAE © 2014- 19, All Rights Reserved Page–276 A. Acquiring Speech and feature extraction The sound is recoded using the microphone us then converted into a frequency of 8000 Hz by using the MATLAB function Fs = 8000; framesize = 80; overlap = 20; D = 6; y = wavrecord(Duration*Fs,Fs); Recording and saving each of the 7 fruits sounds with each fruit 15 times. Then plotting the frequency time for each of the sound for feature extraction. B. Training As we are using label based learning which implies that both supervised as well as unsupervised learning will be there for the given dataset. We train one state for each speech signals and each state is nothing but the phenome of the sound. Gaussian clustering is unsupervised and is based on the initial values of the Baum-Welch algorithm. We randomly generate the initial values of matrix A and π which strictly follows the statistical properties. Σs, which is the diagonal covariance matrix as defined in all the iterations performed. For initial we found 15 iterations are effective for Baum-Welch algorithm VI. SETUP AND RESULT Fig.3 Comparison between the training Apple
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 04, Volume 6 (April 2019) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – Mendeley (Elsevier Indexed); Citefactor 1.9 (2017); SJIF: Innospace, Morocco (2016): 3.916 | PIF: 2.469 | Jour Info: 4.085 | ISRAJIF (2017): 4.011 | Indexcopernicus: (ICV 2016): 64.35 IJIRAE © 2014- 19, All Rights Reserved Page–277 For set of each word i we denote parameter as λi having observation state from o1,…….oT, from which the section of word is done using arg max f (o1,…….oT ; λi) which is given by the forward algorithm. Fitted Gaussian after iteration from the first fitted plot vs the final iteration plot can been seen in the figure 3and the variation is very observable along with at each iteration the efficiency increases from 15% to 95% efficiency is calculated by using the mcr (misses / length (word labels)) *100 which we see vary from 92% to 94%. For the complete set used. VII. CONCLUSIONS We finally able to create a system which is able to train the isolated speech word using HMM and supervised and unsupervised learning. The results generated are valid for only single speakers. The system could make robust by using multiple users and using continues speech instead of individual word. This results for limited word set of 105 samples and efficiency can vary for different amount of dataset. REFERENCES 1. S.A.R. Al-Haddad, S.A. Samad, A. Hussain, K.A. Ishak and A.O.A. Noor, Robust Speech Recognition Using Fusion Techniques and Adaptive Filtering American Journal of Applied Sciences 6 (2): 290-295, 2009. 2. Shi-Huang Chen, YuRu Wei, A Study on Speech-Controlled Real-TimeRemote Vehicle On-Board Diagnostic SystemProceeding of the International multiconference on Engineers and Computer Scientists 2010, IMECS 2010, March, 7-19,2010,vol I. 3. Fadhilah Rosdi, Raja N. Ainon Isolated Malay Speech Recognition Using Hidden Markov Models, Proceedings of the International Conference on Computer and Communication Engineering, Kuala Lumpur, Malaysia, May, 13- 15,2008. 4. L. R. Rabiner, A tutorial on hidden markov models and selected applications in speech recognitionProc. IEEE, Feb. 1989, vol. 77, no. 2, pp. 257–286.