Speech recognition with improved support vector machine using dual classifiers and cross fitness validation

In this research, a new speech recognition method based on improved feature extraction and improved support vector machine (ISVM) is developed. A Gaussian filter is used to denoise the input speech signal. The feature extraction method extracts five features such as peak values, Mel frequency cepstral coefficient (MFCC), tri-spectral features, discrete wavelet transform (DWT), and the difference values between the input and the standard signal. Next, these features are scaled using linear identical scaling (LIS) method with the same scaling method and the same scaling factors for each set of features in both training and testing phases. Following this, to accomplish the training process, an ISVM is developed with best fitness validation. The ISVM consists of two stages: (i) linear dual classifier that finds the same class attributes and different class attributes simultaneously and (ii) cross fitness validation (CFV) method to prevent over fitting problem. The proposed speech recognition method offers 98.2% accuracy.

[1]  Ching-Hsien Hsu,et al.  Score level based latent fingerprint enhancement and matching using SIFT feature , 2018, Multimedia Tools and Applications.

[2]  G. Usha Devi,et al.  Fuzzy Based Intrusion Detection Systems in MANET , 2015 .

[3]  Gunasekaran Manogaran,et al.  Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System , 2018 .

[4]  Gunasekaran Manogaran,et al.  RETRACTED ARTICLE: A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing , 2017, Multimedia Tools and Applications.

[5]  Gunasekaran Manogaran,et al.  Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis , 2017, Multimedia Tools and Applications.

[6]  Alain Biem,et al.  Cepstrum-based filter-bank design using discriminative feature extraction training at various levels , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[7]  G. Usha Devi,et al.  Detection of DDoS Attack using Optimized Hop Count Filtering Technique , 2015 .

[8]  Waleed H. Abdulla,et al.  Reduced feature-set based parallel CHMM speech recognition systems , 2003, Inf. Sci..

[9]  E. Vishnu Balan,et al.  Hybrid architecture with misuse and anomaly detection techniques for wireless networks , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[10]  Usha Devi Gandhi,et al.  A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases , 2017, Comput. Electr. Eng..

[11]  Naveen K. Chilamkurti,et al.  Secure Disintegration Protocol for Privacy Preserving Cloud Storage , 2018, Wirel. Pers. Commun..

[12]  Gunasekaran Manogaran,et al.  RETRACTED ARTICLE: Hybrid Recommendation System for Heart Disease Diagnosis based on Multiple Kernel Learning with Adaptive Neuro-Fuzzy Inference System , 2017, Multimedia Tools and Applications.

[13]  G. Usha Devi,et al.  Mutual Authentication Scheme for IoT Application , 2015 .

[14]  G. Usha Devi,et al.  Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles , 2017, Cluster Computing.

[15]  Gunasekaran Manogaran,et al.  A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system , 2017, Future Gener. Comput. Syst..

[16]  M. K. Priyan,et al.  Desktop phishing attack detection and elimination using TSO program , 2015, 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).

[17]  Kuldeep Kumar,et al.  AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND TRANSFER FUNCTIONS , 2011 .

[18]  E. Vishnu Balan,et al.  Preservation of privacy in data mining by using PCA based perturbation technique , 2015, 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).

[19]  Gunasekaran Manogaran,et al.  Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things , 2017, Cluster Computing.

[20]  Ching-Hsien Hsu,et al.  Machine Learning Based Big Data Processing Framework for Cancer Diagnosis Using Hidden Markov Model and GM Clustering , 2017, Wireless Personal Communications.

[21]  Gunasekaran Manogaran,et al.  Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm , 2018, Cluster Computing.