2016 18th Mediterranean Electrotechnical Conference (MELECON) 2016
DOI: 10.1109/melcon.2016.7495395
|View full text |Cite
|
Sign up to set email alerts
|

Android voice recognition application with multi speaker feature

Abstract: In this paper, we discuss two things. In the first part of the paper, we discuss the means of processing the speech signal using the Mel Frequency Cepstral Coefficients and the basics of voice characteristics. The problem of voice recognition was already implemented at the hardware level, but in this we propose a solution to the problem on the software end with a higher level of accuracy. Then in the second part, we will discuss the application developed on Android which is able to perform both single speaker … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…An improved RNN named Long Short Term Memory (LSTM) [147], including complex gates and memory cells within the hidden units for "better memories", became popular in various applications such as speech recognition [126], video analysis [335], language translation [215], activity recognition [130] etc. Since data streaming is most common in the IoT environment, RNN (LSTM) is deemed as one of the most powerful modelling techniques, and there are various IoT applications such as smart assistant [109,336], smart car navigator system [161], malware threat hunting [134], network traffic forecasting [272], equipment condition forecasting [387], energy demand prediction system [243], load forecasting [181], etc.…”
Section: Convolutional Neural Network (Cnn)mentioning
confidence: 99%
“…An improved RNN named Long Short Term Memory (LSTM) [147], including complex gates and memory cells within the hidden units for "better memories", became popular in various applications such as speech recognition [126], video analysis [335], language translation [215], activity recognition [130] etc. Since data streaming is most common in the IoT environment, RNN (LSTM) is deemed as one of the most powerful modelling techniques, and there are various IoT applications such as smart assistant [109,336], smart car navigator system [161], malware threat hunting [134], network traffic forecasting [272], equipment condition forecasting [387], energy demand prediction system [243], load forecasting [181], etc.…”
Section: Convolutional Neural Network (Cnn)mentioning
confidence: 99%
“…etc. Since data streaming the most common form in the IoT environment, RNN(LSTM) is deemed as one of the most powerful modelling techniques, and there are various IoT applications such as smart assistant [82,266], smart car navigator system [119], malware threat hunting [101], network traffic forecasting [208], equipment condition forecasting [304], Energy Demand Prediction system [182], load forecasting [131], etc.…”
Section: Super Vised Lear Ning Unsuper Vised Lear Ningmentioning
confidence: 99%
“…Among these technologies, the best security technology is the biometric recognition technology to be utilized. It can be expected to increase security and convenience by applying Speaker Recognition through this biometric recognition technology [2]. However, Echo cannot capable to cover entire home, this great digital companion works perfect if you are in a room or in the adjacent room.…”
Section: Literature Reviewmentioning
confidence: 99%