Abstract: | A primary medium for the human beings to communicate through language is Speech. Automatic Speech Recognition is wide spread today. Recognizing single digits is vital to a number of applications such as voice dialling of telephone numbers, automatic data entry, credit card entry, PIN (personal identification number) entry, entry of access codes for transactions, etc. In this paper we present a comparative study of SVM (Support Vector Machine) and HMM (Hidden Markov Model) to recognize and identify the digits used in Malayalam speech. |
URI: | http://dyuthi.cusat.ac.in/purl/4232 |
Files | Size |
---|---|
A Comparative s ... alam Digit Recognition.pdf | (200.2Kb) |
Abstract: | The median (antimedian) set of a profile π = (u1, . . . , uk) of vertices of a graphG is the set of vertices x that minimize (maximize) the remoteness i d(x,ui ). Two algorithms for median graphs G of complexity O(nidim(G)) are designed, where n is the order and idim(G) the isometric dimension of G. The first algorithm computes median sets of profiles and will be in practice often faster than the other algorithm which in addition computes antimedian sets and remoteness functions and works in all partial cubes |
Description: | Algorithmica (2010) 57: 207–216 DOI 10.1007/s00453-008-9200-4 |
URI: | http://dyuthi.cusat.ac.in/purl/4193 |
Files | Size |
---|---|
Computing median and antimedian sets in median.pdf | (290.4Kb) |
Abstract: | A connected digit speech recognition is important in many applications such as automated banking system, catalogue-dialing, automatic data entry, automated banking system, etc. This paper presents an optimum speaker-independent connected digit recognizer forMalayalam language. The system employs Perceptual Linear Predictive (PLP) cepstral coefficient for speech parameterization and continuous density Hidden Markov Model (HMM) in the recognition process. Viterbi algorithm is used for decoding. The training data base has the utterance of 21 speakers from the age group of 20 to 40 years and the sound is recorded in the normal office environment where each speaker is asked to read 20 set of continuous digits. The system obtained an accuracy of 99.5 % with the unseen data. |
Description: | Sadhana Vol. 38, Part 6, December 2013, pp. 1339–1346 |
URI: | http://dyuthi.cusat.ac.in/purl/4227 |
Files | Size |
---|---|
Connected digit ... for Malayalam language.pdf | (242.7Kb) |
Abstract: | The median problem is a classical problem in Location Theory: one searches for a location that minimizes the average distance to the sites of the clients. This is for desired facilities as a distribution center for a set of warehouses. More recently, for obnoxious facilities, the antimedian was studied. Here one maximizes the average distance to the clients. In this paper the mixed case is studied. Clients are represented by a profile, which is a sequence of vertices with repetitions allowed. In a signed profile each element is provided with a sign from f+; g. Thus one can take into account whether the client prefers the facility (with a + sign) or rejects it (with a sign). The graphs for which all median sets, or all antimedian sets, are connected are characterized. Various consensus strategies for signed profiles are studied, amongst which Majority, Plurality and Scarcity. Hypercubes are the only graphs on which Majority produces the median set for all signed profiles. Finally, the antimedian sets are found by the Scarcity Strategy on e.g. Hamming graphs, Johnson graphs and halfcubes |
Description: | Ars Math. Contemp. 6 (2013) 127–145 |
URI: | http://dyuthi.cusat.ac.in/purl/4234 |
Files | Size |
---|---|
Consensus strat ... ned profiles on graphs.pdf | (315.9Kb) |
Abstract: | Retrieval of similar anatomical structures of brain MR images across patients would help the expert in diagnosis of diseases. In this paper, modified local binary pattern with ternary encoding called modified local ternary pattern (MOD-LTP) is introduced, which is more discriminant and less sensitive to noise in near-uniform regions, to locate slices belonging to the same level from the brain MR image database. The ternary encoding depends on a threshold, which is a user-specified one or calculated locally, based on the variance of the pixel intensities in each window. The variancebased local threshold makes the MOD-LTP more robust to noise and global illumination changes. The retrieval performance is shown to improve by taking region-based moment features of MODLTP and iteratively reweighting the moment features of MOD-LTP based on the user’s feedback. The average rank obtained using iterated and weighted moment features of MOD-LTP with a local variance-based threshold, is one to two times better than rotational invariant LBP (Unay, D., Ekin, A. and Jasinschi, R.S. (2010) Local structure-based region-of-interest retrieval in brain MR images. IEEE Trans. Inf. Technol. Biomed., 14, 897–903.) in retrieving the first 10 relevant images |
Description: | The Computer Journal,bxu008 |
URI: | http://dyuthi.cusat.ac.in/purl/4224 |
Files | Size |
---|---|
Content-Based I ... ith a Ternary Encoding.pdf | (2.206Mb) |
Abstract: | Magnetic Resonance Imaging play a vital role in the decision-diagnosis process of brain MR images. For an accurate diagnosis of brain related problems, the experts mostly compares both T1 and T2 weighted images as the information presented in these two images are complementary. In this paper, rotational and translational invariant form of Local binary Pattern (LBP) with additional gray scale information is used to retrieve similar slices of T1 weighted images from T2 weighted images or vice versa. The incorporation of additional gray scale information on LBP can extract more local texture information. The accuracy of retrieval can be improved by extracting moment features of LBP and reweighting the features based on users’ feedback. Here retrieval is done in a single subject scenario where similar images of a particular subject at a particular level are retrieved, and multiple subjects scenario where relevant images at a particular level across the subjects are retrieved |
Description: | International Journal of Electrical, Robotics, Electronics and Communications Engineering Vol:7 No:8, 2013 |
URI: | http://dyuthi.cusat.ac.in/purl/4233 |
Files | Size |
---|---|
Content Based I ... ross Different Classes.pdf | (1.187Mb) |
Abstract: | Content Based Image Retrieval is one of the prominent areas in Computer Vision and Image Processing. Recognition of handwritten characters has been a popular area of research for many years and still remains an open problem. The proposed system uses visual image queries for retrieving similar images from database of Malayalam handwritten characters. Local Binary Pattern (LBP) descriptors of the query images are extracted and those features are compared with the features of the images in database for retrieving desired characters. This system with local binary pattern gives excellent retrieval performance |
Description: | Neural Computing and Applications Vol 21(7),pp 1757-1763 |
URI: | http://dyuthi.cusat.ac.in/purl/4207 |
Files | Size |
---|---|
Content Based I ... Handwritten Characters.pdf | (547.1Kb) |
Abstract: | Cryptosystem using linear codes was developed in 1978 by Mc-Eliece. Later in 1985 Niederreiter and others developed a modified version of cryptosystem using concepts of linear codes. But these systems were not used frequently because of its larger key size. In this study we were designing a cryptosystem using the concepts of algebraic geometric codes with smaller key size. Error detection and correction can be done efficiently by simple decoding methods using the cryptosystem developed. Approach: Algebraic geometric codes are codes, generated using curves. The cryptosystem use basic concepts of elliptic curves cryptography and generator matrix. Decrypted information takes the form of a repetition code. Due to this complexity of decoding procedure is reduced. Error detection and correction can be carried out efficiently by solving a simple system of linear equations, there by imposing the concepts of security along with error detection and correction. Results: Implementation of the algorithm is done on MATLAB and comparative analysis is also done on various parameters of the system. Attacks are common to all cryptosystems. But by securely choosing curve, field and representation of elements in field, we can overcome the attacks and a stable system can be generated. Conclusion: The algorithm defined here protects the information from an intruder and also from the error in communication channel by efficient error correction methods. |
URI: | http://dyuthi.cusat.ac.in/xmlui/purl/2007 |
Files | Size |
---|---|
A Cryptosystem using....pdf | (93.25Kb) |
Abstract: | Performance of any continuous speech recognition system is dependent on the accuracy of its acoustic model. Hence, preparation of a robust and accurate acoustic model lead to satisfactory recognition performance for a speech recognizer. In acoustic modeling of phonetic unit, context information is of prime importance as the phonemes are found to vary according to the place of occurrence in a word. In this paper we compare and evaluate the effect of context dependent tied (CD tied) models, context dependent (CD) and context independent (CI) models in the perspective of continuous speech recognition of Malayalam language. The database for the speech recognition system has utterance from 21 speakers including 11 female and 10 males. Our evaluation results show that CD tied models outperforms CI models over 21%. |
Description: | Procedia Engineering,vol 30,pp 1081-1088 |
URI: | http://dyuthi.cusat.ac.in/purl/4211 |
Files | Size |
---|---|
Development & e ... ous speech recognition.pdf | (444.9Kb) |
Abstract: | Given a graph G and a set X ⊆ V(G), the relative Wiener index of X in G is defined as WX (G) = {u,v}∈X 2 dG(u, v) . The graphs G (of even order) in which for every partition V(G) = V1 +V2 of the vertex set V(G) such that |V1| = |V2| we haveWV1 (G) = WV2 (G) are called equal opportunity graphs. In this note we prove that a graph G of even order is an equal opportunity graph if and only if it is a distance-balanced graph. The latter graphs are known by several characteristic properties, for instance, they are precisely the graphs G in which all vertices u ∈ V(G) have the same total distance DG(u) = v∈V(G) dG(u, v). Some related problems are posed along the way, and the so-called Wiener game is introduced. |
Description: | Discrete Optimization 12 (2014) 150–154 |
URI: | http://dyuthi.cusat.ac.in/purl/4220 |
Files | Size |
---|---|
Equal opportuni ... raphs, and Wiener game.pdf | (367.3Kb) |
Abstract: | Given a non empty set S of vertices of a graph, the partiality of a vertex with respect to S is the di erence between maximum and minimum of the distances of the vertex to the vertices of S. The vertices with minimum partiality constitute the fair center of the set. Any vertex set which is the fair center of some set of vertices is called a fair set. In this paper we prove that the induced subgraph of any fair set is connected in the case of trees and characterise block graphs as the class of chordal graphs for which the induced subgraph of all fair sets are connected. The fair sets of Kn, Km;n, Kne, wheel graphs, odd cycles and symmetric even graphs are identi ed. The fair sets of the Cartesian product graphs are also discussed |
Description: | arXiv preprint arXiv:1304.5378 |
URI: | http://dyuthi.cusat.ac.in/purl/4230 |
Files | Size |
---|---|
Fair Sets of Some Classes of Graphs.pdf | (443.4Kb) |
Abstract: | Grey Level Co-occurrence Matrices (GLCM) are one of the earliest techniques used for image texture analysis. In this paper we defined a new feature called trace extracted from the GLCM and its implications in texture analysis are discussed in the context of Content Based Image Retrieval (CBIR). The theoretical extension of GLCM to n-dimensional gray scale images are also discussed. The results indicate that trace features outperform Haralick features when applied to CBIR. |
Description: | International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 |
URI: | http://dyuthi.cusat.ac.in/purl/4199 |
Files | Size |
---|---|
Grey Level Co-O ... And Some New Features.pdf | (379.3Kb) |
Abstract: | Handwritten character recognition is always a frontier area of research in the field of pattern recognition and image processing and there is a large demand for OCR on hand written documents. Even though, sufficient studies have performed in foreign scripts like Chinese, Japanese and Arabic characters, only a very few work can be traced for handwritten character recognition of Indian scripts especially for the South Indian scripts. This paper provides an overview of offline handwritten character recognition in South Indian Scripts, namely Malayalam, Tamil, Kannada and Telungu |
Description: | National Conference on Indian Language Computing, Kochi, Feb 19-20, 2011 |
URI: | http://dyuthi.cusat.ac.in/purl/4191 |
Files | Size |
---|---|
Handwritten Cha ... ndian Scripts A Review.pdf | (189.7Kb) |
Abstract: | Few major Research works are going in the field of Handwriting Word Recognition (HWR) of Indian languages. This paper surveys the major works of offline/online handwritten word recognition. Techniques involved in word recognition are also discussed. Major works carried out in Bangla, Urdu, Tamil and Hindi are mentioned in this paper. Advancement towards HWR in other Indian languages are also discussed. Application of offline HWR is also discussed |
URI: | http://dyuthi.cusat.ac.in/purl/4223 |
Files | Size |
---|---|
HWR for Indian ... A Comprehensive Survey.pdf | (381.5Kb) |
Abstract: | Learning Disability (LD) is a neurological condition that affects a child’s brain and impairs his ability to carry out one or many specific tasks. LD affects about 15 % of children enrolled in schools. The prediction of LD is a vital and intricate job. The aim of this paper is to design an effective and powerful tool, using the two intelligent methods viz., Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System, for measuring the percentage of LD that affected in school-age children. In this study, we are proposing some soft computing methods in data preprocessing for improving the accuracy of the tool as well as the classifier. The data preprocessing is performed through Principal Component Analysis for attribute reduction and closest fit algorithm is used for imputing missing values. The main idea in developing the LD prediction tool is not only to predict the LD present in children but also to measure its percentage along with its class like low or minor or major. The system is implemented in Mathworks Software MatLab 7.10. The results obtained from this study have illustrated that the designed prediction system or tool is capable of measuring the LD effectively |
Description: | Soft Comput (2014) 18:1093–1112 DOI 10.1007/s00500-013-1129-0 |
URI: | http://dyuthi.cusat.ac.in/purl/4219 |
Files | Size |
---|---|
Learning disabi ... ol using ANN and ANFIS.pdf | (2.950Mb) |
Abstract: | Axial brain slices containing similar anatomical structures are retrieved using features derived from the histogram of Local binary pattern (LBP). A rotation invariant description of texture in terms of texture patterns and their strength is obtained with the incorporation of local variance to the LBP, called Modified LBP (MOD-LBP). In this paper, we compare Histogram based Features of LBP (HF/LBP), against Histogram based Features of MOD-LBP (HF/MOD-LBP) in retrieving similar axial brain images. We show that replacing local histogram with a local distance transform based similarity metric further improves the performance of MOD-LBP based image retrieval |
Description: | 2012 IEEE International Conference on Computational Intelligence and Computing Research |
URI: | http://dyuthi.cusat.ac.in/purl/4205 |
Files | Size |
---|---|
Level Identific ... ogram of a LBP variant.pdf | (2.083Mb) |
Abstract: | Development of Malayalam speech recognition system is in its infancy stage; although many works have been done in other Indian languages. In this paper we present the first work on speaker independent Malayalam isolated speech recognizer based on PLP (Perceptual Linear Predictive) Cepstral Coefficient and Hidden Markov Model (HMM). The performance of the developed system has been evaluated with different number of states of HMM (Hidden Markov Model). The system is trained with 21 male and female speakers in the age group ranging from 19 to 41 years. The system obtained an accuracy of 99.5% with the unseen data |
Description: | International Journal of Advanced Information Technology (IJAIT) Vol. 1, No.5, October 2011 |
URI: | http://dyuthi.cusat.ac.in/purl/4214 |
Files | Size |
---|---|
Malayalam Isola ... P cepstral coefficient.pdf | (172.8Kb) |
Abstract: | The focus of this paper is to develop computationally efficient mathematical morphology operators on hypergraphs. To this aim we consider lattice structures on hypergraphs on which we build morphological operators. We develop a pair of dual adjunctions between the vertex set and the hyperedge set of a hypergraph 𝐻, by defining a vertex-hyperedge correspondence. This allows us to recover the classical notion of a dilation/erosion of a subset of vertices and to extend it to subhypergraphs of 𝐻. This paper also studies the concept of morphological adjunction on hypergraphs for which both the input and the output are hypergraphs |
Description: | ISRN Discrete Mathematics Volume 2014, Article ID 436419, 6 pages |
URI: | http://dyuthi.cusat.ac.in/purl/4222 |
Files | Size |
---|---|
Mathematical Mo ... peredge Correspondence.pdf | (2.544Mb) |
Abstract: | Following the Majority Strategy in graphs, other consensus strategies, namely Plurality Strategy, Hill Climbing and Steepest Ascent Hill Climbing strategies on graphs are discussed as methods for the computation of median sets of pro¯les. A review of algorithms for median computation on median graphs is discussed and their time complexities are compared. Implementation of the consensus strategies on median computation in arbitrary graphs is discussed |
Description: | Report/Econometric Institute, Erasmus University Rotterdam,EI 2007-34 |
URI: | http://dyuthi.cusat.ac.in/purl/4218 |
Files | Size |
---|---|
Median computat ... g consensus strategies.pdf | (195.4Kb) |
Abstract: | The median of a profile = (u1, . . . , uk ) of vertices of a graph G is the set of vertices x that minimize the sum of distances from x to the vertices of . It is shown that for profiles with diameter the median set can be computed within an isometric subgraph of G that contains a vertex x of and the r -ball around x, where r > 2 − 1 − 2 /| |. The median index of a graph and r -joins of graphs are introduced and it is shown that r -joins preserve the property of having a large median index. Consensus strategies are also briefly discussed on a graph with bounded profiles. |
Description: | Discrete Applied Mathematics 156 (2008) 2882–2889 |
URI: | http://dyuthi.cusat.ac.in/purl/4216 |
Files | Size |
---|---|
The median func ... with bounded profiles.pdf | (410.2Kb) |
Dyuthi Digital Repository Copyright © 2007-2011 Cochin University of Science and Technology. Items in Dyuthi are protected by copyright, with all rights reserved, unless otherwise indicated.