摘要:
Systems and methods for the matching of datasets, such as input audio segments, with known datasets in a database are disclosed. In an illustrative embodiment, the use of the presently disclosed systems and methods is described in conjunction with recognizing known network message recordings encountered during an outbound telephone call. The methodologies include creation of a ternary fingerprint bitmap to make the comparison process more efficient. Also disclosed are automated methodologies for creating the database of known datasets from a larger collection of datasets.
摘要:
A system and method are presented for the use of natural language processing to automate the disposition of completed interactions in an environment such as a contact center system. Communications may be inbound or outbound. A communication is received or placed by the contact center system and processed through the contact center system. After the interaction of the communication and the contact center is completed, data from the completed interaction may be processed through an automated customer interaction disposition system. Transcript data from the interaction may be processed through an NLP engine to generate data from the interaction. The data may then be automatically matched with a disposition/wrap-up code for the interaction.
摘要:
A system and method are presented for selectively biased linear discriminant analysis in automatic speech recognition systems. Linear Discriminant Analysis (LDA) may be used to improve the discrimination between the hidden Markov model (HMM) tied-states in the acoustic feature space. The between-class and within-class covariance matrices may be biased based on the observed recognition errors of the tied-states, such as shared HMM states of the context dependent tri-phone acoustic model. The recognition errors may be obtained from a trained maximum-likelihood acoustic model utilizing the tied-states which may then be used as classes in the analysis.
摘要:
A system and method are presented for real-time speech analytics in the speech analytics field. Real time audio is fed along with a keyword model, into a recognition engine. The recognition engine computes the probability of the audio stream data matching keywords in the keyword model. The probability is compared to a threshold where the system determines if the probability is indicative of whether or not the keyword has been spotted. Empirical metrics are computed and any false alarms are identified and rejected. The keyword may be reported as found when it is deemed not to be a false alarm and passes the threshold for detection.
摘要:
A system and method are presented for multi-language communication sequencing. Communication flows may support one or more languages, which may need to be created, removed, or edited. During sequence editing, prompts, data, expressions, pauses, and text-to-speech may be added. This may be done through the use of inline-selectors, which comprise a prompt or TTS, or through the use of dialogs, which may also provide error feedback. A main sequence may be capable of handling multiple languages which are supported and managed independent of each other.
摘要:
A system and method are presented for outlier identification to remove poor alignments in speech synthesis. The quality of the output of a text-to-speech system directly depends on the accuracy of alignments of a speech utterance. The identification of mis-alignments and mis-pronunciations from automated alignments may be made based on fundamental frequency methods and group delay based outlier methods. The identification of these outliers allows for their removal, which improves the synthesis quality of the text-to-speech system.
摘要:
A system and method are presented for language specific routing. Language assignment may be used to efficiently route inbound interactions in a contact center. The inbound interaction's original location may be determined and assigned a language based on the location of the interaction. The interaction is assigned a language tag that can be referenced throughout routing. The interaction may be routed to the appropriate endpoints within the system based on the language tag.
摘要:
A system and method are presented for multi-factor authentication comprising the authentication of users, physical locations, and schedules. A combination of the physical location of a user and user devices can be utilized to bypass multi-factor authentication. Devices may be GPS-enabled and/or network connected in order to determine the location of the device and if the device and the credentials are within the authorized location. Scheduling factors may also be considered such that if a user is not within a particular space-time region, multi-factor authentication may not be by-passed. Time intervals may be approved based on authorized schedules for a location, authorized schedules for a device, and authorized schedules for the credentials.
摘要:
A system and method are presented for generating staffing requirements for deferred work in a contact center environment. In an embodiment, a simulation of deferred work performance is used to generate staffing requirement. Information, such as volume offered, expected handle time, available staff distributed throughout the intervals over a period of time, etc., are utilized for determining service performance metrics. The simulation accounts for transient data (e.g., number of deferred work handled or completed, number of backlog from an interval to the next, starting number of deferred work in the system, etc.) and determines performance metrics using that transient data.
摘要:
A computer-implemented system and method for the deployment of automatically configuring network communication endpoints is disclosed. At least one logical profile is stored in a plurality of configuration files resident on a network. The logical profile includes configuration information as well as an extension from a communication distribution system which a device should serve. Upon connection to the network and input of configuration information corresponding to a pre-existing logical profile, the device automatically configures itself for use, reboots, and is operational in the desired form.