摘要:
The voice print system of the present invention is a subword-based, text-dependent automatic speaker verification system that embodies the capability of user-selectable passwords with no constraints on the choice of vocabulary words or the language. Automatic blind speech segmentation allows speech to be segmented into subword units without any linguistic knowledge of the password. Subword modeling is performed using a multiple classifiers. The system also takes advantage of such concepts as multiple classifier fusion and data resampling to successfully boost the performance. Key word/key phrase spotting is used to optimally locate the password phrase. Numerous adaptation techniques increase the flexibility of the base system, and include: channel adaptation, fusion adaptation, model adaptation and threshold adaptation.
摘要:
The present invention relates to a pattern recognition system which uses data fusion to combine data from a plurality of extracted features and a plurality of classifiers. Speaker patterns can be accurately verified with the combination of discriminant based and distortion based classifiers. A novel approach using a training set of a "leave one out" data can be used for training the system with a reduced data set. Extracted features can be improved with a pole filtered method for reducing channel effects and an affine transformation for improving the correlation between training and testing data.
摘要:
The voice print system of the present invention is a subword-based, text-dependent automatic speaker verification system that embodies the capability of user-selectable passwords with no constraints on the choice of vocabulary words or the language. An estimate of the enrollement channel and of the test channel is developed for inverse filtering of the enrollment or the test speech, respectively. Automatic blind speech segmentation allows speech to be segmented into subword units without any linguistic knowledge of the password. Subword modeling is performed using a multiple classifiers. The system also takes advantage of such concepts as multiple classifier fusion and data resampling to successfully boost the performance. Key word/key phrase spotting is used to optimally locate the password phrase. Numerous adaptation techniques increase the flexibility of the base system, and include: channel adaptation, fusion adaptation, model adaptation and threshold adaptation.
摘要:
The present invention relates to a method for segmenting speech into subword speech segments. Optimal boundary locations for each estimate of a number of segments are determined within an estimated range of the number of segments. In addition, an optimality criteria is found for each estimate of the number of segments within the range. Using the optimality criteria, the optimal number of subwords are determined. From the location of the boundaries and the optimal number of segments, data can be clustered or speech can be segmented. The method can be used in data processing systems, speaker verification, medium size vocabulary speech recognition systems, language identification systems and coarse subword level speech segmentation processes.
摘要:
The present invention is a reliable system and method for detecting a recorded voice, which can be employed independently or to provide protection from fraudulent use of a recording to defeat an automatic speaker recognition system. Several techniques and systems are employed either independently or in combination to verify that a detected audio sample is live and not recorded. Temporal speech characteristics of an audio sample are analyzed to determine whether a sample under examination is so similar to a previous sample as to indicate a recording. Communications channel characteristics are examined to determine whether an sample was recorded on a different channel from a predetermined communications channel. A pattern classifier is trained to distinguish between live and recorded speech. Finally, an “audio watermark” is used to determine whether a detected audio sample is a recording of a previous communication by an authorized user. In addition, the various techniques of the present invention may be employed in serial or parallel combination with a variety of decisionmaking schemes to provide increased performance.
摘要:
The present invention is related to detecting location of a navigation device using sensor data analysis, where the sensor is coupled to the navigation device. A hierarchical algorithm is used for making a series of decisions regarding the location of the navigation device, with each decision corresponding to a class among a plurality of classes related to the possible motion modes and/or precise location of the device, including the location of the device with respect to a person's body. By accurately identifying the device location, the hierarchical algorithm facilitates in providing relevant contextual information, thereby enhancing situational awareness.
摘要:
A communication system that comprises at least two links to carry signals, a first communication unit and a second communication unit. The first communication unit comprises at least two ports, each port configured to transmit and receive signals; and a logic unit configured to process the signals transmitted and received by each of the at least two ports in the first communication unit. The second communication unit comprises at least two ports, each port configured to transmit and receive signals and coupled to a respective one of the at least two ports in the first communication unit via a respective one of the at least two links; a programmable logic unit configured to process the signals transmitted and received by each of the at least two ports in the second communication unit; and a processor. The processor is configured to detect a crossover connection between one of the at least two ports in the second communication unit and the respective one of the at least two ports in the first communication unit based on an analysis of a pair identifier field in a message received at the second communication unit, wherein the pair identifier field is separate from the address field of the received message.
摘要:
Fiber-optic communications systems are provided for optical communications networks. Fiber-optic communications links may be provided that use spans of transmission fiber to carry optical data signals on wavelength-division-multiplexing channels at different wavelengths between nodes. An apparatus and method are disclosed to use one optical light source per node to perform OTDR and LCV to satisfy safety concerns and accelerate the verification of the integrity of optical fiber links, before the application of high Raman laser powered light sources to a fiber link. A system using only one receiver per node is also disclosed.
摘要:
A multicast optical switch includes a free-space optical assembly of discrete splitters, cylindrical optics, and a linear array of reflective switching devices, such as microelectromechanical systems (MEMS) mirrors, to provide low-loss, high-performance multicast switching in a compact configuration. The assembly of optical splitters may include multiple planar lightwave circuit splitters or a multi-reflection beam splitter that includes a linear array of partially reflecting mirrors, each of a different reflectivity.
摘要:
A communication comprises a plurality of digital subscriber line (DSL) links, a first node having at least one application port configured for an elastic service and a plurality of DSL ports, and a second node having at least one application port configured for an elastic service and a plurality of DSL ports. Each of the first and second nodes is configured to interleave data received over the at least one application port across the plurality of DSL ports, each DSL port allocated a set of DSL timeslots for transport of the data received over the at least one application port. When a failure is detected on one of the DSL links, each of the first and second nodes is configured to interleave the data received over the at least one application port across the remaining DSL ports not connected to the failed DSL link without adjusting the set of DSL timeslots allocated to each of the remaining DSL ports for transport of the data from the at least one application port.