期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
最大熵软决策树HMM最大似然藏语音合成
1
作者 曲珍 扎西加 春燕 《计算机工程与设计》 北大核心 2017年第4期981-988,共8页
针对传统的硬决策树藏语音合成系统存在泛化性能不强的问题,设计改进一种二进制软决策树算法,实现基于语境因子的藏语音合成模型参数估计。内部节点根据子代节点隶属度进行选取,每个节点可视为基于语境依赖隶属度的模糊集合,将每个语境... 针对传统的硬决策树藏语音合成系统存在泛化性能不强的问题,设计改进一种二进制软决策树算法,实现基于语境因子的藏语音合成模型参数估计。内部节点根据子代节点隶属度进行选取,每个节点可视为基于语境依赖隶属度的模糊集合,将每个语境分配给几个重叠的叶节点,提高模型概括和函数逼近性能;采用最大熵平滑分布进行局部一阶矩和全局二阶矩特征捕捉,实现隐式马尔可夫(HMM)输出概率分布的软决策参数最大似然估计。仿真验证结果表明,所提算法在满足应用实时性要求的前提下,可有效提高藏语音合成效果。 展开更多
关键词 软决策树 藏语音合成 隐式马尔可夫 最大熵 隶属度
下载PDF
常用藏语词汇语音评价关键技术研究和仿真实现
2
作者 陈浩 柴鹏鑫 卓嘎 《信息与电脑》 2023年第2期177-180,共4页
藏语音存在语料库缺少和地区方言较多等问题,因此关于藏语音的识别技术相对缺乏。基于此,提出一种使用卷积神经网络(Convolutional Neural Network,CNN)、长短期记忆(Long Short Term Memory,LSTM)神经网路和动态神经网络(Dynamic Neura... 藏语音存在语料库缺少和地区方言较多等问题,因此关于藏语音的识别技术相对缺乏。基于此,提出一种使用卷积神经网络(Convolutional Neural Network,CNN)、长短期记忆(Long Short Term Memory,LSTM)神经网路和动态神经网络(Dynamic Neural Network,DNN)的基于Python平台上TensorFlow框架的深度混合网络模型。首先,录制来自拉萨市、安多县和昌都市3个地区的藏语音数据制作语音数据集,并通过改进模型深度、结构、参数和算法来提升藏语音识别的准确率;其次,使用多层卷积残差网络和改进的LSTM神经网络解决模型训练过程中的梯度爆炸问题;最后,使用反向传播算法提高模型训练的准确度。仿真实验表明,该模型虽然在不同地区的藏语音数据识别准确率上存在差异,但是在整体的识别准确率和模型的收敛性上具有不错的效果。 展开更多
关键词 语音识别 深度学习 藏语音
下载PDF
东巴文藏语音字研究 被引量:3
3
作者 和继全 《西南民族大学学报(人文社会科学版)》 CSSCI 北大核心 2012年第5期52-57,共6页
东巴文藏语音字是中国西南多民族聚居区语言接触产生的特殊语言现象。本文对东巴文藏语音字的范围、类型、语音特征等作了分析研究,认为藏语音字主要用来表属相、记数字、东巴教专用词读音标注、藏语音读文献标音字、形声字声符等;类型... 东巴文藏语音字是中国西南多民族聚居区语言接触产生的特殊语言现象。本文对东巴文藏语音字的范围、类型、语音特征等作了分析研究,认为藏语音字主要用来表属相、记数字、东巴教专用词读音标注、藏语音读文献标音字、形声字声符等;类型可分为有标志藏语音字和无标志藏语音字两类,读音基本保留康方言香格里拉藏语土语读音特征,声调已纳西语化。纳西族东巴古籍文献中的东巴文藏语音字是东巴教长期受到藏族本教、佛教影响的结果。 展开更多
关键词 东巴文 藏语音 语言接触
原文传递
A NOVEL APPROACH OF SECURE COMMUNICATION BASED ON THE TECHNIQUE OF SPEECH INFORMATION HIDING
4
作者 Wu Zhijun Duan Haixin Li Xing 《Journal of Electronics(China)》 2006年第2期304-309,共6页
The proposed secure communication approach adopts the proposed algorithm of Analysis-By- Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminai Channel (SSSC) for speech secure communica... The proposed secure communication approach adopts the proposed algorithm of Analysis-By- Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminai Channel (SSSC) for speech secure communication over PSTN (Public Switched Telephone Network), and employs the algorithm of ABS speech information extracting to recovery the secret information, This approach is more reliable, covert and securable than traditional and chaotic secure communication. 展开更多
关键词 Secure communication SPEECH Information hiding Subliminal channel Analysis-By-Synthesis(ABS)
下载PDF
A NOVEL COVERT SPEECH COMMUNICATION SYSTEM AND ITS IMPLEMENTATION
5
作者 Deng Zongyuan Shao Xi +1 位作者 Yang Zhen Zheng Baoyu 《Journal of Electronics(China)》 2008年第6期737-745,共9页
In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time informatio... In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time information hiding, a steganographic system combined with a watermarking scheme is proposed, which skillfully transfers the secret speech into watermarking information. The basic idea is to use the speech recognition to significantly reduce the size of information that has to be transmitted in a hidden way. Furthermore, an improved DFT watermarking scheme is proposed which adaptively chooses the embedding locations and applies the multi-ary modulation technique. Based on the GUI (Graphical User Interface) software, the CST operates on both ordinary and secure mode. It is a completely digital system with high speech quality. Objective and subjective tests show that the CST is robust against normal signal processing attacks and steganalysis. The proposed scheme can be used in terms of military applications. 展开更多
关键词 STEGANOGRAPHY Information hiding Speech recognition Covert Speech Telephone (CST)
下载PDF
Covert voice over internet protocol communications based on spatial model 被引量:3
6
作者 HUANG YongFeng TANG ShanYu 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2016年第1期117-127,共11页
This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without c... This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert Vo IP communications. By taking into account the variation characteristics of Vo IP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on Vo IP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of Vo IP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert Vo IP communications. 展开更多
关键词 covert communication multimedia networking Vo IP data security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部