Username   Password       Forgot your password?  Forgot your username? 


Reliability Modeling of Speech Recognition Tasks

Volume 14, Number 12, December 2018, pp. 2994-3004
DOI: 10.23940/ijpe.18.12.p9.29943004

Hui Qiu, Xiangbin Yan, Rui Peng, Kaiye Gao, and Langtao Wu

Donlinks School of Economics and Management, University of Science and Technology Beijing, Beijing, 100083, China

(Submitted on September 20, 2018; Revised on October 16, 2018; Accepted on November 17, 2018)


Speech recognition is becoming the key technology of man-machine interfaces in information technology. The application of voice technology has become a competitive and new high-tech industry. However, due to the big volume of vocabulary, continuous voice, and personalized accents, it is hard to make speech recognition completely accurate. In this paper, a reliability model is proposed to measure the performance of speech recognition. In particular, two types of task failures are suggested and an iterative approach is adopted. Numerical examples are proposed for illustrative purposes.


References: 15

                    1. A. Abdelaziz and D. Kolossa, “General Hybrid Framework for Uncertainty-Decoding-based Automatic Speech Recognition Systems,” Speech Communication, Vol. 79, pp. 1-13, 2016
                    2. H. Dui, S. Si, and R. Yam, “Importance Measures for Optimal Structure in Linear Consecutive-K-out-of-N Systems,” Reliability Engineering & SystemSafety, Vol. 169, pp. 339-350, 2018
                    3. Y. He, J. Han, T. Zhang, and G. Sun, “A New Framework for Robust Speech Recognition in Complex Channel Environments,” Digital Signal Processing, Vol. 32, pp. 109-123, 2014
                    4. M. Khademian and M. MehdiHomayounpour, “Monaural Multi-Talker Speech Recognition Using Factorial Speech Processing Models,” Speech Communication, Vol. 98, pp. 1-16, 2018
                    5. J. Matthews and J. Cheng, “Recognition of High Frequency Words Fromspeechasapredictor of L2 Listening Comprehension,” System, Vol. 52, pp. 1-13, 2015
                    6. S. Mattys and L. Wiget, “Effects of Cognitive Load on Speech Recognition,” Journal of Memory and Language, Vol. 65, No. 2, pp. 145-160, 2011
                    7. F. Mohammadi, E. Sáenz-de-Cabezón, and H. Wynn, “Efficient Multicut Enumeration of K-out-of-N: F and Consecutive K-out-of-N: Fsystems,” Pattern Recognition Letters, Vol. 102, pp. 82-88, 2018
                    8. N. U. Nair and T. V. Sreenivas, “Joint Evaluation of Multiple Speech Patterns for Speech Recognition and Training,” Computer Speech & Language, Vol. 25, No. 2, pp. 307-340, 2010
                    9. A. Ogawa and A. Nakamura, “Joint Estimation of Confidence and Error Causes in Speech Recognition,” Speech Communication, Vol. 54, No. 9, pp. 10241028, 2012
                    10. A. Ogawa and T. Hori, “Error Detection and Accuracy Estimation in Automatic Speech Recognition Using Deep Bidirectional Recurrent Neural Networks,” Speech Communication, Vol. 89, pp. 70-83, 2017
                    11. J. Ooster, R. Huber, B. Kollmeier, and B. T. Meyer, “Evaluation of an Automated Speech-Controlled Listening Test with Spontaneous and Read Responses,” Speech Communication, Vol. 98, pp. 85-94, 2018
                    12. R. Peng, M. Xie, S. H. Ng, and G. Levitin, “Element Maintenance and Allocation for Linear Consecutively Connected Systems,” IIE Transactions, Vol. 44, No. 11, pp. 964-973, 2012
                    13. S. Srinivasan and D. Wang, “Robust Peeche Cognitiony Integrating Seech Eparation and Hypothesis Testing,” Speech Communication, Vol. 52, No. 1, pp. 72-81, 2010
                    14. H. Xiao, R. Peng, W. Wang, and F. Zhao, “Optimal Element Loading for Linear Sliding Window Systems,” Journal of Risk and Reliability, Vol. 230, No. 1, pp. 75-84, 2015
                    15. Y. Xiang and G. Levitin, “Combinedm-Consecutiveand K-out-of-N Sliding Window Systems,” European Journal of Operational Research, Vol. 219, No. 1, pp. 105-113, 2012


                                      Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                                      This site uses encryption for transmitting your passwords.