Experiments on acoustic model supervised adaptation and evaluation by K-Fold Cross Validation technique

This paper is an analysis of adaptation techniques for French acoustic models (hidden Markov models). The LVCSR engine Julius, the Hidden Markov Model Toolkit (HTK) and the K-Fold CV technique are used together to build three different adaptation methods: Maximum Likelihood a priori (ML), Maximum Likelihood Linear Regression (MLLR) and Maximum a posteriori (MAP). Experimental results by means of word and phoneme error rate indicate that the best adaptation method depends on the adaptation data, and that the acoustic models performance can be improved by the use of alignments at phoneme-level and K-Fold Cross Validation (CV). The very known K-Fold CV technique will point to the best adaptation technique to follow considering each case of data type.

[1]  Ralf Kompe,et al.  A Combined MAP + MLLR Approach for Speaker Adaptation , 2002 .

[2]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[3]  Mostafa Azizi,et al.  Implementation of secure key distribution based on quantum cryptography , 2009, 2009 International Conference on Multimedia Computing and Systems.

[4]  Mostafa Azizi,et al.  Analysis of the Security of BB84 by Model Checking , 2010, ArXiv.

[5]  N. Gisin,et al.  Quantum key distribution over 67 km with a plug , 2002 .

[6]  Jian-Wei Pan,et al.  Experimental free-space distribution of entangled photon pairs over 13 km: towards satellite-based global quantum communication. , 2005, Physical review letters.

[7]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[8]  Steve Young,et al.  The HTK book version 3.4 , 2006 .

[9]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs , 2005, RFC.

[10]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[11]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[12]  Guillaume Gravier,et al.  Corpus description of the ESTER Evaluation Campaign for the Rich Transcription of French Broadcast News , 2004, LREC.

[13]  Tanja Schultz,et al.  Comparison of acoustic model adaptation techniques on non-native speech , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[14]  Mostafa Azizi,et al.  Integration of Quantum Key Distribution in the TLS Protocol , 2009 .

[15]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[16]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[17]  W. Marsden I and J , 2012 .

[18]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[19]  R. Schwartz,et al.  Maximum a posteriori adaptation for large scale HMM recognizers , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.