A study on the multipulse LPC analysis and a novel multi-pulse speech coder

Hacıoğlu, Kadri


A unifying theory for rank-based multiple classifier systems, with applications in speaker identification and speech recognition
Saranlı, Afşar; Demirekler, Mübeccel; Department of Electrical and Electronics Engineering (2000)
Improving the performance of speaker identification systems by classifier combination techniques
Altınçay, Hakan; Demirekler, Mübeccel; Department of Electrical and Electronics Engineering (2000)
On lexicon creation for turkish LVCSR
Kadri, Hacıoğlu; Bryan, Pellom; Çiloğlu, Tolga; Öztürk, Özlem; Mikko, Kurimo; Mathias, Creutz (null; 2003-09-14)
In this paper, we address the lexicon design problem in Turkish large vocabulary speech recognition. Although we focus only on Turkish, the methods described here are general enough that they can be considered for other agglutinative languages like Finnish, Korean etc. In an agglutinative language, several words can be created from a single root word using a rich collection of morphological rules. So, a virtually infinite size lexicon is required to cover the language if words are used as the basic units. T...
Performance evaluation of real-time noisy speech recognition for mobile devices
Yurtcan, Yaser; Günel Kılıç, Banu; Department of Information Systems (2019)
Communication is important for people. There are many available communication methods. One of the most effective methods is through the use of speech. People can comfortably express their feelings and thoughts by using speech. However, some people may have a hearing problem. Furthermore, understanding spoken words in a noisy environment could be a challenge even for healthy people. Speech recognition systems enable real-time speech to text conversion. They mainly involve capturing of the sound waves and con...
A study of lightweight cryptography
Çamur, Zeliha; Doğanaksoy, Ali; Department of Cryptography (2020)
Technology is evolving rapidly and with technology, the internet is also changing. People used to use internet to connect to each other. But with the changes in recent years, the internet is starting to be used more to connect devices to each other. These devices can range from powerful computing devices, such as desktop computers and tablets, to resource contrained devices, such as RFID tags and sensor networks. When it comes to these constrained devices, conventional cryptographic algorithms fail to provi...
Citation Formats
K. Hacıoğlu, “A study on the multipulse LPC analysis and a novel multi-pulse speech coder,” Ph.D. - Doctoral Program, Middle East Technical University, 1990.