Analytic model of sentence streaming using TCP for speech recognition

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

An implementation scheme of speech recognition over Internet called network speech recognition (NSR) can use TCP to ensure the reception of speech data on the server so that the accuracy of recognition obtained could be better. Although TCP can not guarantee the timeliness of data delivery as required by multimedia streaming applications, NSR prefer to receive the whole speech data to be recognized on the server rather than delay. In this paper, we enhance our study [1] about an analytic model of NSR recognizing a speech sent via TCP sentence by sentence by realizing and solving the model with the help of modeling tool TANGRAM-II.

Original languageEnglish
Title of host publication14th International Conference on QiR (Quality in Research), QiR 2015 - In conjunction with 4th Asian Symposium on Material Processing, ASMP 2015 and International Conference in Saving Energy in Refrigeration and Air Conditioning, ICSERA 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages69-72
Number of pages4
ISBN (Electronic)9781479965519
DOIs
Publication statusPublished - 7 Jan 2016
Event14th International Conference on QiR (Quality in Research), QiR 2015 - Lombok, Indonesia
Duration: 10 Aug 201513 Aug 2015

Publication series

Name14th International Conference on QiR (Quality in Research), QiR 2015 - In conjunction with 4th Asian Symposium on Material Processing, ASMP 2015 and International Conference in Saving Energy in Refrigeration and Air Conditioning, ICSERA 2015

Conference

Conference14th International Conference on QiR (Quality in Research), QiR 2015
Country/TerritoryIndonesia
CityLombok
Period10/08/1513/08/15

Keywords

  • TANGRAM-II
  • analytic model
  • network speech recognition
  • sentence streaming
  • streaming via TCP

Fingerprint

Dive into the research topics of 'Analytic model of sentence streaming using TCP for speech recognition'. Together they form a unique fingerprint.

Cite this