SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013
DOI : 10.5121/ijist.2013.3401 1
Implementation Of Back-Propagation Neural
Network For Isolated Bangla Speech Recognition
Md. Ali Hossain1
, Md. Mijanur Rahman2
, Uzzal Kumar Prodhan3
, Md.
Farukuzzaman Khan4
1
Dept. of Computer Science & Engineering, Bangladesh University, Bangladesh.
ali.cse.bd@gmail.com
2,3
Dept. of Computer Science & Engineering, Jatiya Kabi Kazi Nazrul Islam University, Bangladesh.
mijan_cse@yahoo.com2
and uzzal_bagerhat@yahoo.com3
4
Dept. of Computer Science & Engineering, Islamic University, Bangladesh.
mfkhanbd2@gmail.com
ABSTRACT
This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech
Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized.
The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient
(MFCC) analysis. The mfcc features of five speakers were used to train the network with Back propagation
algorithm. The mfcc features of ten bangla digit speeches, from 0 to 9, of another five speakers were used
to test the system. All the methods and algorithms used in this research were implemented using the
features of Turbo C and C++ languages. From our investigation it is seen that the developed system can
successfully encode and analyze the mfcc features of the speech signal to recognition. The developed
system achieved recognition rate about 96.332% for known speakers (i.e., speaker dependent) and 92% for
unknown speakers (i.e., speaker independent).
Keywords
Back-propagation,Feedforward Neural Networks, MFCC, Perceptrons, Speech Recognition.
1. Introduction
To communicate with each other, Speech is probably the most efficient way. It is possible to use
speech as a useful interface to interact with machines[1]. Speech recognition research work has
been started since 1930. However Bangla speech recognition research work has been started
since around 2000 [2]. Besides English language there is a lot of research experiment and
achieved result in various languages throughout the world. But in Bangla language, early
researchers in this field have limited success in phonemes [3,4], letters [5], words [6] or small
vocabulary continuous speech[7] for single speaker. In our system, we have captured speech from
ten different speakers, which may an early attempt for developing speaker independent isolated
Bangla digit speech recognition system in Bangla language. With a rich heritage, Bangla is an
important language . It is spoken by approximately 8% of the world population [8]. But, for the
computerization of this language, a systematic and scientific effort has not started yet. To support
rapidly developing computerization of Bangla Language, one of the most important issues is
Bangla speech recognition. Accordingly, we have developed a Bangla speech recognition system.
A Neural Network is an information Processing Paradigm and it is stimulated by the way
biological nervous systems, like the brain process Information[9]. Simple computational elements
operating in parallel are included in Neural networks [1]. The network function is determined
largely by the connections between elements. A neural network can be trained so that a particular
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013
2
input guides to a specific target output [1]. Neural network can be used in different sector. There
are many applications of NNs limited only by our thoughts. Innovation is a solution to success, so
dude use NNs to generate something which will modernize the world! For the sake of writing, a
few Neural Networks applications are in Speech Recognition, Optical Character Recognition
(OCR), Modelling human behaviour, Classification of patterns, Loan risk analysis, music
generation, Image analysis, Creating new art forms, Stock market prediction, etc. In our research
work, Multilayer Feed-forward Network with Back-propagation algorithm is used to recognize
isolated Bangla speech digits from 0 to 9. All the methods and algorithms discussed in this paper
were implemented using the features of C and C++ languages.
2. Feed forward Networks
The simplest type of feed-forward network that use supervised learning is Perceptron. Binary
threshold units arranged into layers made a perceptron shown in Figure-1[10]. It is trained by the
Delta Rule or variations thereof. The Delta Rule can be applied directly for the case of a single
layer perceptron, as shown in Figure-1(a). For being perceptron’s activations are binary, reduces
this general learning rule to the Perceptron Learning Rule. This rules says, if an input is yi =1
(Active) and the output yj is incorrect , then depending on the desired output , the weight wji need
to be either decreased(if desired output is 0) or increased(if desired output is 1) by a small
amount ε [10]. To find a set of weights to accurately organize the patterns in any training set, This
procedure is insured, if the patterns are linearly distinguishable ( i.e. by a straight line, they can be
split into two classes). However, most training sets are not linearly distinguishable (For instance,
the simple XOR function); for these cases we require multiple layers.
Figure-1(b) shows Multi-layer perceptrons (MLPs). It can theoretically learn any function, but
they are very complex to train. It is not possible to apply The Delta Rule directly to MLPs
because in the hidden layer, there are no targets. If an MLP don’t use discrete activation functions
(i.e., threshold functions) that is it uses continuous activation functions (i.e., sigmoids functions),
then it turn out to be possible to use partial derivatives and the chain rule .These rules is used to
derive the influence of any weight on any output activation, that indicates, to reduce the
network’s error, how to modify that weight [10]. This generalized Delta Rule is known as back-
propagation.
Any number of hidden layers can have in MLPs, although for many applications, a single
hidden layer is sufficient, and more hidden layers tend to make training slower, for this
reason the terrain in weight space becomes more complicated. There are many ways that
MLPs can also be architecturally constrained, such as by limiting the weights values, or
by limiting their geometrically local areas connectivity, or tying different weights
together.
Figure 1. Perceptrons. (a) Single layer perceptron; (b) multi-layer perceptron.
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013
3
2.1 Generalized Delta Rule (Back-Propagation)
The generalized delta rule is a supervised learning algorithm [11]. It is used to train a multilayer
neural network that maps the relation between the target output and actual output. During the
training period, the input pattern is passed through the network with network connection weights
and biases of the activation or transfer functions. Initially, the values and biases are assigned by a
small random numbers. In this rule, repeatedly presenting input-output pairs and then modifying
weights; the modification of weight reduces the network error. The training of the network
proceeds as follows:
• First, the input pattern is assigned to input neurons; and send to hidden neurons with
weights and computed its activation; and then send this to the output neurons with
weights and computed its activation, which represent the network’s output response of
the input pattern.
• Second, the output responses are compared to the desired output and an error term is
computed.
• Third, the error information is used to update the network weights and biases. The
modification of weight is computed by the four different parameters: a learning rate, the
derivative of activation function, the error term, and the current activity at the input layer.
• Fourth, each hidden unit computes its error. This is done with an output unit’s error,
which is sending it backwards as a signal to a hidden unit.
• Fifth, after computing the hidden unit error, the weights of the input-to-hidden units are
updated using the same equation that was used in the output layer.
If there is more than one layer of hidden units, then this procedure can be repeated iteratively.
That is, each hidden unit error in one layer, as an error signal, can be propagated backwards to an
adjacent layer once the hidden unit weights have been modified. Then the next training pattern
can be presented to the input units, and the learning process occurs again [12].
2.2 Working with back-propagation Algorithm
The application of the generalized delta rule involves two phases. At the first phase, to compute
the output values yp o for each output unit , the input x is presented and propagated forward
through the network. Desired output value do is compared with this output, for each output unit
resulting in an error signal δp o. To calculate the appropriate weight changes, a backward pass is
involved by the second phase through the network during which the error signal is passed to each
unit in the network [13]. Figure-2 shows the flowchart of the training of the neural network with
Back-propagation algorithm.
Weight adjustments with sigmoid activation function:
The weight of a connection is adjusted by an amount proportional to the product of an error signal
δ, on the unit k receiving the input and the output of the unit j sending this signal along the
connection: ∆pw jk = γ ᵟ
P
h yP
h
• The error signal for an output unit is given by: ᵟ
ᵨ
o = (d
ᵨ
o- y
ᵨ
o) (s
ᵨ
o)
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013
4
• If the activation function F, the 'sigmoid' function defined as:
)))) ====
• In this case the derivative is equal to
)))) ====
==== (- )
====
==== yP
(1- yP
).
• Such that the output unit error signal can be Written as:
ᵟ
P
o = (d
P
o- y
P
o) y
P
o(1- y
P
o).
• The error signal for a hidden unit is determined recursively in terms of error signals of the
units to which it directly connects and the weights of those connections. For the sigmoid
activation function:
ᵟ
P
h = h) ᵟ
P
o who= yP
h(1- yP
h) ᵟ
P
o who
Figure 2. Back-propagation training algorithm
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013
5
3. IMPLEMENTATION
3.1 Speech Data Acquisition
In a sound proof laboratory environment, Bangla speech words recording was completed with the
help of close-talking microphone, sound recorder software and high quality sound card. To
represent a signal, Wave form is the most general way [14-16]. To make a sample database, The
10 Bangla digits originated from ten speakers were recorded as wav file. At a sampling rate of
8.00 KHz and coded in 8 bits PCM [17], The utterances were recorded. At first, we discard 58
bytes (file header) from the beginning of the wave file for extracting wave data. After then wave
data read as character. Required voiced data is extracted from the input speech ( may containing
unvoice, voice and silence signal) by the data extraction process. By using the start and end-point
detection technique [8,18], the voiced data is extracted from the speech file and stored in a text
file as integer data.
3.2 Feature Extraction
The most important part of all recognition systems is the feature extraction that translates the
speech signal to some digital form having meaningful features. Obviously, for any recognition
system, a good feature may produce a good result. Frame blocking, Preemphasis, Windowing
and the computation of Mel Frequency Cepstrum Coefficient (MFCC) are the some signal
processing steps included in Feature extraction process, as shown in Figure-3 [8,19]. Initially,
each speech word was segmented into frame (a set of samples). A frame represent typically 16 to
32 ms of speech. Then apply the further computation on these speech frames. In our research
work, Hamming window function is used for feature extraction, which used in speech recognition
as one of the most popular windows. To extract a set of features that represents Mel Frequency
Cepstrum Coefficients (MFCC) of the signal, The pre-processed and windowed speech signal is
then passed through some computational steps. The Discrete Fourier Transform (DFT),
computation of first two formant frequencies, Mel frequency warping, Discrete Cosine Transform
(DCT) and finally the computation of Mel Frequency Cepstrum Coefficient (MFCC) are included
in the computation steps of MFCC, as shown in Figure-3 [8, 19-21].
Figure 3. Computation of MFCC features.
3.3 Training and Testing the Network
In the past, Neural networks were used by many authors for speech recognition [22-25]. For our
implementation, Multilayer Feed forward Network (three layer neural network) has been created
using C & C++. For training the network, Back Propagation algorithm was used. The network
consists of an input layer of 250 neurons, one hidden layer of 16 neurons and an output layer
contains 10 neurons used to recognize 10 speech words. We used a set of 250 mfcc (Mel
Frequency Cepstrum coefficients) feature values as input pattern for the neural network. The
input values are in a range of -7 up to 1.5. In our design we put all these input values in a 'Input
Layer' variable matrix. Linear activation function elements are included in the output layer. As 10
output neurons, output matrix contains 10x10 unit matrix. Non-linear sigmoidal activation
function is included in the hidden layer. For training the network, at first Randomize weights and
biases are set using random function ranging values from -1 to 1. Last layer does not require
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013
6
weights and first layer does not need biases. For each training pattern, network layers weights and
biases are updated using back-propagation algorithms to reach the target, with the following
equations.
For output layer:
Delta = (TargetO - ActualO) * ActualO * (1 - ActualO)
Weight = Weight + LearningRate * Delta * Input
For hidden layers:
Delta = ActualO * (1-ActualO) * Summation(Weight_from_current_to_next AND
Delta_of_next)
Weight = Weight + LearningRate * Delta * Input
Where, TargetO= Target Output (This outputs are set to recognize ten difference words )
ActualO= Actual Output (Calculated output for training phase)
Delta= Bias of Neuron
LearningRate = Learning Rate to Update network weight.
A set of 15 mfcc features pattern of each speech word are used as training pattern to reach its
target. The weights and biases of the network are updated until the network error reaches almost
zero. At testing phase, the trained network was simulated with unknown speech pattern. It was
observed that the trained network performs very well and more than ten words can be recognized
by using the developed system.
4. Results and Discussion
In this experiment, 300 samples of ten Bangla digits, from 0 to 9, (i.e., 30 samples for each digit)
were recorded from ten speakers and then extracted mfcc features from these Bangla speech
words. The MFCC features were used with 8-mfcc/frame. 150 mfcc features of speech words
were used for training the network and another 150 mfcc features were used for testing the
network in the recognition phase. The developed system achieved 96.332% recognition accuracy
for known speakers (i.e., speaker dependent) and 92% accuracy for unknown speakers (i.e.,
speaker independent). The detailed results are shown in Table-1.
In this paper, an attempt was made to develop Back-propagation Neural Network for Isolated
Bangla Speech Recognition system. This is a single word recognition system, where ten Bangla
digits are recognized at a time. All the test patterns were conducted with ten different Speakers
from different age. Where fives are trained speakers and fives are test speakers. Instruments
should have constant settings. The speaker was a 25-aged male person. Performance with some
speakers from different age group was also tested. It was observed that speaking habit or style of
speaker affects the performance of the system, so the speakers should be well trained. The
sources of errors also include speeds of utterance and loudness variation. Also, the characteristics
of microphone and other recording instruments and background noises affect the system
performance.
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013
7
Table 1. Details Recognition Results
5. CONCLUSION
The developed system with Back-propagation Neural Network achieved the reasonable results for
isolated Bangla digit speech recognition. The system can be used to recognize ten Bangla digits at
a time and achieved 92% recognition accuracy for multiple speakers. With properly trained
speakers and noise free environment, the developed system will produce better recognition
results. The variability in various parameters, like speed, noise, and loudness will properly handle
in our future research. A well-organized system should be completely speaker independent. So
speakers of different ages and genders should be employed in the future researchers. In Future,
speech recognition for continuous Bangla speech with more powerful recognition tools, like the
Hidden Markov Model (HMM), Time Delay Neural Network (TDNN) and Gaussian Mixture
Model (GMM) will be established.
References
[1] Wouter Gevaert, Georgi Tsenov, Valeri Mladenov, “Neural Networks used for Speech
Recognition”, Journal of Automatic Control, University of Belgrade, VOL. 20:1-7, 2010.
[2] Md. Abul Hasnat Jabir Mowla Mumit Khan, “Isolated and Continuous Bangla Speech Recognition:
Implementation, Performance and application perspective”, Conference Papers (Centre for Research
on Bangla Language Processing) Department of Computer Science and Engineering, BRAC
University, Bangladesh, 2007.
[3] S. M. Jahangir Alam, “System Development for Bangla Phoneme Recognition”, M.Sc. Thesis, Dept.
of Computer Science & Engineering, Islamic University, Kushtia-7003, July-2004.
[4] Karim, A.H. M. Rezaul, “ Bangla Phoneme Recognition”, Graduation Thesis report, Shahjalal
University of Science & Technology, Sylhet, 2002.
[5] Abul Hasanat Md. Rezaul Karim, Md. Shahidur Rahman and Md. Zafar Iqbal, “Recognition of
Spoken letters in Bangla”, 5th ICCIT 2002, East West University, Dhaka, Bangladesh, 27-28
December 2002.
[6] Kaushik Roy, Dipankar Das and M. Ganjer Ali, “Development of the Speech Recognition System
using Artificial Neural Network”, 5th ICCIT 2002, East West University, Dhaka, Bangladesh, 27-28,
December 2002.
Bangla
Digit
No. of
samples
for
testing
Speaker Dependent (Known speaker’s
speech were used for testing)
Speaker Independent (Unknown speaker’s
speech were used for testing)
No. of Properly
Recognized Digit
Recognition Rate
(%)
No. of Properly
Recognized Digit
Recognition
Rate (%)
0 15 14 93.33 14 93.33
1 15 15 100 14 93.33
2 15 14 93.33 13 86.67
3 15 15 100 14 93.33
4 15 15 100 14 93.33
5 15 14 93.33 14 93.33
6 15 15 100 14 93.33
7 15 13 86.67 13 86.67
8 15 14 93.33 14 93.33
9 15 14 93.33 14 93.33
Total 150 143 96.332 138 92
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013
8
[7] Md. Saidur Rahman, “Small Vocabulary Speech Recognition in Bangla Language”, M.Sc. Thesis,
Dept. of Computer Science & Engineering, Islamic University, Kushtia-7003, July-2004.
[8] Md. Mijanur Rahman, Fatema Khatun, and Dr. Md. Al-Amin Bhuiyan “Development of Isolated
Speech Recognition System for Bangla Words”, Vol. 1, Issue. 3, September - December, 2010
(IJARITAC), pp.272-278.
[9] Preet Ind, Gour Sundar Mitra Thakurer Singh, “Enhanced Password Based Security System Based
on User Behavior using Neural Networks” I.J. Information Engineering and Electronic Business,
Vol. 2, 29-35, 2012.
[10] Joe Tebelskis “Speech Recognition using Neural Networks” School of Computer Science Carnegie
Mellon University Pittsburgh, Pennsylvania 15213-3890, May 1995, CMU-CS-95-142
[11] Rumelhart, D. E., Hinton, G. E., and Williams, R. J., “Learning representations by back- propagating
Errors Nature”, 323, 533-536, 1986.
[12] http://www.bcp.psych.ualberta.ca/~mike/Pearl_Street/Dictionary/contents/G/generalizeddr.html
[13] R.Vijaya arjunan and Dr.V.Vijaya Kumar, “A Novel framework for Voice Signal recognition using
RASTA and Authentication by Neural Networks”, International Journal of Recent Trends in
Engineering, Vol 2, No. 3, November 2009.
[14] Rabiner L., Bing_Hwang J.,”Fundamentals of Speech Recognition”, Prentice_Hall, 1993.
[15] Jurafsky, Daniel and Martin, James H, “Speech and Language Processing: An Introduction to
Natural Language Processing, Computational Linguistics, and Speech Recognition”, Prentice Hall,
1st ed.1996.
[16] DSG Pollock, “A handbook of Time-series analysis, signal processing and dynamics”, Academic
press London, 1999.
[17] S. Gokul, “Multimedia Magic”, BPB Publications, B-14, Connaught Place, New Delhi-110001.
[18] Dr. Ramesh Chandra Debnath and Md. Farukuzzaman Khan, “Bangla Sentence Recognition Using
End- Point Detection”, Rajshahi University Studies: Part B, Journal of Science, Vol 32, 2004.
[19] Jean-Claude Junqua and Jean-Paul Haton, “Robustness in Automatic Speech Recognition:
Fundamentals and Applications”, Kluwer Academic Publishers, Dordrecht, Netherlands, 1997.
[20] F. Jelinek, L. R. Bahl, and R. L. Mercer, “Design of a Linguistic Statistical Decoder for the
Recognition of Continuous Speech”, IEEE Trans. Information Theory, IT-21, pp 250-256, 1975.
[21] Md. Farukuzzaman Khan and Dr. Ramesh Chandra Debnath, “Comparative Study of Feature
Extraction Methods for Bangla Phoneme Recognition”, 5th ICCIT 2002, East West University,
Dhaka, Bangladesh, PP.27-28, December 2002.
[22] Akram M. Othman, and May H. Riadh, “Speech Recognition Using Scaly Neural Networks”, World
Academy of Science, Engineering and Technology, vol. 38, 2008.
[23] Mohamad Adnan Al-Alaoui, Lina Al-Kanj, Jimmy Azar, and Elias Yaacoub, “Speech Recognition
using Artificial Neural Networks and Hidden Markov Models”, IEEE Multidisciplinary Engineering
Education Magazine, VOL. 3, 2008.
[24] Dou-Suk Kim and Soo-Young Lee, “Intelligent judge neural network for speech recognition”,
Neural Processing Letters, Vol.1, No.1, PP.17-20, 1994.
[25] Chee Peng Lim, Siew Chan Woo, Aun Sim Loh, Rohaizan Osman, “Speech Recognition Using
Artificial Neural Networks”, 1st International Conference on Web Information Systems Engineering
(WISE'00),Vol.1, 2000.
Biographies of Authors
Md. Ali Hossain
Mr. Hossain was born in Manikganj, Bangladesh. He received the B.Sc. and M.Sc.
degrees from the Department of Computer Science and Engineering, University of
Islamic University, Kushtia, Bangladesh, in 2008 and 2009, respectively. He is
serving as a Lecturer with the Department of Computer Science and Engineering
(CSE), Bangladesh University, Dhaka. He has got a number of research articles
published in different international journals. His current research interests include
speech processing, biomedical imaging, biomedical signal, bioinformatics, neural
networks and AI. Mr. Ali Hossain is an Associate Member of the Bangladesh
Computer Society and Executive Member of Islamic University Computer
Association (IUCA).
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013
9
Md. Mijanur Rahman
Mr. Rahman is working as an assistant professor of the department of Computer
Science and Engineering in Jatiya Kabi Kazi Nazrul Islam University, Trishal,
Mymensingh, Bangladesh. He completed his B Sc (Hons) and M Sc in CSE degree
from Islamic University, Kushtia, Bangladesh. At present he is continuing his PhD
research work in the department of Computer Science and Engineering, Jahangirnagar
University, Savar, Dhaka, Bangladesh. He has got a number of research articles
published in different local and international journals. His current research interests
include the fields of pattern recognition, image and speech processing, neural networks,
fuzzy logics and AI.
Uzzal Kumar Prodhan
Assistant Professor, Department of Computer Science & Engineering, Jatiya Kabi
Kazi Nazrul Islam University, Trishal, Mymensingh, Bangladesh. He has completed
his M.Sc. and B.Sc. from the department of Computer Science & Engineering, Islamic
University, Bangladesh. He got first class in both exams. He passed S.S.C. and H.S.C
with star marks. After completing M.Sc in CSE, he joined Bangladesh University as a
Lecturer & joined in Jatia Kabi Kazi Nazrul Islam University as an Assistant
Professor. In his long teaching life he was appointed as a head examiner in Computer
Technology by Bangladesh Technical Education Board, Dhaka. Due to his teaching
interest he was selected as a Book reviewer of National Curriculum of Textbook
Board, Dhaka. He has successfully completed Microsoft Certified IT Professional (MCITP) on Server 2008
platform. His research interest includes Artificial Intelligence, Neural Network, Cryptography, Computer
Architecture and Organization and Pattern Recognition. He has many international and national research
publications. His email addresses are uzzal_bagerhat@yahoo.com, uzzal.prodhan@bu.edu.bd.
Prof. Md. Farukuzzaman Khan
Prof. Khan is working as professor of the department of Computer Science and
Engineering in Islamic University, Kushtia, Bangladesh. He completed his B Sc
(Hons), M Sc and M. Phil degree from Rajshahi University, Rajshahi, Bangladesh. He
is a PhD researcher in the department of Computer Science and Engineering, Islamic
University, Kushtia, Bangladesh. He has has got a number of research articles
published in different local and international journals. His current research interests
pattern recognition, image and speech processing, DSP and AI.

Mais conteúdo relacionado

Mais procurados

Classification by back propagation, multi layered feed forward neural network...
Classification by back propagation, multi layered feed forward neural network...Classification by back propagation, multi layered feed forward neural network...
Classification by back propagation, multi layered feed forward neural network...bihira aggrey
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsaciijournal
 
Feedforward neural network
Feedforward neural networkFeedforward neural network
Feedforward neural networkSopheaktra YONG
 
15 Machine Learning Multilayer Perceptron
15 Machine Learning Multilayer Perceptron15 Machine Learning Multilayer Perceptron
15 Machine Learning Multilayer PerceptronAndres Mendez-Vazquez
 
Back propagation network
Back propagation networkBack propagation network
Back propagation networkHIRA Zaidi
 
MPerceptron
MPerceptronMPerceptron
MPerceptronbutest
 
Nural network ER. Abhishek k. upadhyay
Nural network ER. Abhishek  k. upadhyayNural network ER. Abhishek  k. upadhyay
Nural network ER. Abhishek k. upadhyayabhishek upadhyay
 
Neural Network - Feed Forward - Back Propagation Visualization
Neural Network - Feed Forward - Back Propagation VisualizationNeural Network - Feed Forward - Back Propagation Visualization
Neural Network - Feed Forward - Back Propagation VisualizationTraian Morar
 
Mitchell's Face Recognition
Mitchell's Face RecognitionMitchell's Face Recognition
Mitchell's Face Recognitionbutest
 
Review: “Implementation of Feedforward and Feedback Neural Network for Signal...
Review: “Implementation of Feedforward and Feedback Neural Network for Signal...Review: “Implementation of Feedforward and Feedback Neural Network for Signal...
Review: “Implementation of Feedforward and Feedback Neural Network for Signal...IJERA Editor
 
Artificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & BackpropagationArtificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & BackpropagationMohammed Bennamoun
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksAdri Jovin
 
Artificial Neural Networks-Supervised Learning Models
Artificial Neural Networks-Supervised Learning ModelsArtificial Neural Networks-Supervised Learning Models
Artificial Neural Networks-Supervised Learning ModelsDrBaljitSinghKhehra
 
Fundamental, An Introduction to Neural Networks
Fundamental, An Introduction to Neural NetworksFundamental, An Introduction to Neural Networks
Fundamental, An Introduction to Neural NetworksNelson Piedra
 
Adaptive modified backpropagation algorithm based on differential errors
Adaptive modified backpropagation algorithm based on differential errorsAdaptive modified backpropagation algorithm based on differential errors
Adaptive modified backpropagation algorithm based on differential errorsIJCSEA Journal
 

Mais procurados (20)

Classification by back propagation, multi layered feed forward neural network...
Classification by back propagation, multi layered feed forward neural network...Classification by back propagation, multi layered feed forward neural network...
Classification by back propagation, multi layered feed forward neural network...
 
Unit ii supervised ii
Unit ii supervised iiUnit ii supervised ii
Unit ii supervised ii
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithms
 
Feedforward neural network
Feedforward neural networkFeedforward neural network
Feedforward neural network
 
15 Machine Learning Multilayer Perceptron
15 Machine Learning Multilayer Perceptron15 Machine Learning Multilayer Perceptron
15 Machine Learning Multilayer Perceptron
 
Back propagation network
Back propagation networkBack propagation network
Back propagation network
 
MPerceptron
MPerceptronMPerceptron
MPerceptron
 
Back propagation
Back propagation Back propagation
Back propagation
 
Nural network ER. Abhishek k. upadhyay
Nural network ER. Abhishek  k. upadhyayNural network ER. Abhishek  k. upadhyay
Nural network ER. Abhishek k. upadhyay
 
Neural Network - Feed Forward - Back Propagation Visualization
Neural Network - Feed Forward - Back Propagation VisualizationNeural Network - Feed Forward - Back Propagation Visualization
Neural Network - Feed Forward - Back Propagation Visualization
 
Neural networks
Neural networksNeural networks
Neural networks
 
Mitchell's Face Recognition
Mitchell's Face RecognitionMitchell's Face Recognition
Mitchell's Face Recognition
 
Backpropagation algo
Backpropagation  algoBackpropagation  algo
Backpropagation algo
 
Review: “Implementation of Feedforward and Feedback Neural Network for Signal...
Review: “Implementation of Feedforward and Feedback Neural Network for Signal...Review: “Implementation of Feedforward and Feedback Neural Network for Signal...
Review: “Implementation of Feedforward and Feedback Neural Network for Signal...
 
Artificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & BackpropagationArtificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
 
Hopfield Networks
Hopfield NetworksHopfield Networks
Hopfield Networks
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural Networks
 
Artificial Neural Networks-Supervised Learning Models
Artificial Neural Networks-Supervised Learning ModelsArtificial Neural Networks-Supervised Learning Models
Artificial Neural Networks-Supervised Learning Models
 
Fundamental, An Introduction to Neural Networks
Fundamental, An Introduction to Neural NetworksFundamental, An Introduction to Neural Networks
Fundamental, An Introduction to Neural Networks
 
Adaptive modified backpropagation algorithm based on differential errors
Adaptive modified backpropagation algorithm based on differential errorsAdaptive modified backpropagation algorithm based on differential errors
Adaptive modified backpropagation algorithm based on differential errors
 

Destaque

Johnsson: applications of_self-organizing_maps
Johnsson: applications of_self-organizing_mapsJohnsson: applications of_self-organizing_maps
Johnsson: applications of_self-organizing_mapsArchiLab 7
 
Bangla brailletalkv2
Bangla brailletalkv2Bangla brailletalkv2
Bangla brailletalkv2Shuvo Habib
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERvineet raj
 
Multidimensional Perceptual Map for Project Prioritization and Selection - 20...
Multidimensional Perceptual Map for Project Prioritization and Selection - 20...Multidimensional Perceptual Map for Project Prioritization and Selection - 20...
Multidimensional Perceptual Map for Project Prioritization and Selection - 20...Jack Zheng
 
Learning Vector Quantization LVQ
Learning Vector Quantization LVQLearning Vector Quantization LVQ
Learning Vector Quantization LVQESCOM
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing anita maharjan
 
SPEECH RECOGNITION USING NEURAL NETWORK
SPEECH RECOGNITION USING NEURAL NETWORK SPEECH RECOGNITION USING NEURAL NETWORK
SPEECH RECOGNITION USING NEURAL NETWORK Kamonasish Hore
 
Adaptive Resonance Theory
Adaptive Resonance TheoryAdaptive Resonance Theory
Adaptive Resonance TheoryNaveen Kumar
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHarshana Madusanka Jayamaha
 
Kohonen self organizing maps
Kohonen self organizing mapsKohonen self organizing maps
Kohonen self organizing mapsraphaelkiminya
 
Adaline madaline
Adaline madalineAdaline madaline
Adaline madalineNagarajan
 
memristor
memristormemristor
memristorjithoot
 

Destaque (20)

Johnsson: applications of_self-organizing_maps
Johnsson: applications of_self-organizing_mapsJohnsson: applications of_self-organizing_maps
Johnsson: applications of_self-organizing_maps
 
Unit 1
Unit 1Unit 1
Unit 1
 
Bangla brailletalkv2
Bangla brailletalkv2Bangla brailletalkv2
Bangla brailletalkv2
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
 
face detection
face detectionface detection
face detection
 
Multidimensional Perceptual Map for Project Prioritization and Selection - 20...
Multidimensional Perceptual Map for Project Prioritization and Selection - 20...Multidimensional Perceptual Map for Project Prioritization and Selection - 20...
Multidimensional Perceptual Map for Project Prioritization and Selection - 20...
 
Learning Vector Quantization LVQ
Learning Vector Quantization LVQLearning Vector Quantization LVQ
Learning Vector Quantization LVQ
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing
 
SPEECH RECOGNITION USING NEURAL NETWORK
SPEECH RECOGNITION USING NEURAL NETWORK SPEECH RECOGNITION USING NEURAL NETWORK
SPEECH RECOGNITION USING NEURAL NETWORK
 
Vector quantization
Vector quantizationVector quantization
Vector quantization
 
Adaptive Resonance Theory
Adaptive Resonance TheoryAdaptive Resonance Theory
Adaptive Resonance Theory
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
HOPFIELD NETWORK
HOPFIELD NETWORKHOPFIELD NETWORK
HOPFIELD NETWORK
 
Kohonen self organizing maps
Kohonen self organizing mapsKohonen self organizing maps
Kohonen self organizing maps
 
Adaline madaline
Adaline madalineAdaline madaline
Adaline madaline
 
memristor
memristormemristor
memristor
 
Self-organizing map
Self-organizing mapSelf-organizing map
Self-organizing map
 
500 important and useful bangla translation
500 important and useful bangla translation500 important and useful bangla translation
500 important and useful bangla translation
 
Current affairs a to z for all competitive exams
Current affairs a to z for all competitive examsCurrent affairs a to z for all competitive exams
Current affairs a to z for all competitive exams
 
Health benefits and medicinal properties of bd fruits
Health benefits and medicinal properties of bd fruitsHealth benefits and medicinal properties of bd fruits
Health benefits and medicinal properties of bd fruits
 

Semelhante a Backpropagation Neural Network for Bangla Speech Recognition Achieves 92-96% Accuracy

Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabijcses
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithmsaciijournal
 
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...csandit
 
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptxssuser67281d
 
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...Cemal Ardil
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
 
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...IJCNCJournal
 
Text independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientsText independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientseSAT Publishing House
 
Comparison of Neural Network Training Functions for Hematoma Classification i...
Comparison of Neural Network Training Functions for Hematoma Classification i...Comparison of Neural Network Training Functions for Hematoma Classification i...
Comparison of Neural Network Training Functions for Hematoma Classification i...IOSR Journals
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Neural Network Based Individual Classification System
Neural Network Based Individual Classification SystemNeural Network Based Individual Classification System
Neural Network Based Individual Classification SystemIRJET Journal
 
Implementation of recurrent neural network for the forecasting of USD buy ra...
Implementation of recurrent neural network for the forecasting  of USD buy ra...Implementation of recurrent neural network for the forecasting  of USD buy ra...
Implementation of recurrent neural network for the forecasting of USD buy ra...IJECEIAES
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmAM Publications
 
Efficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classificationEfficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classificationIOSR Journals
 
Efficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkEfficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkIJSRD
 

Semelhante a Backpropagation Neural Network for Bangla Speech Recognition Achieves 92-96% Accuracy (20)

Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlab
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
 
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...
 
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
 
F017533540
F017533540F017533540
F017533540
 
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...
 
N ns 1
N ns 1N ns 1
N ns 1
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
 
D028018022
D028018022D028018022
D028018022
 
Text independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientsText independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficients
 
Comparison of Neural Network Training Functions for Hematoma Classification i...
Comparison of Neural Network Training Functions for Hematoma Classification i...Comparison of Neural Network Training Functions for Hematoma Classification i...
Comparison of Neural Network Training Functions for Hematoma Classification i...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Neural Network Based Individual Classification System
Neural Network Based Individual Classification SystemNeural Network Based Individual Classification System
Neural Network Based Individual Classification System
 
Jf3515881595
Jf3515881595Jf3515881595
Jf3515881595
 
Implementation of recurrent neural network for the forecasting of USD buy ra...
Implementation of recurrent neural network for the forecasting  of USD buy ra...Implementation of recurrent neural network for the forecasting  of USD buy ra...
Implementation of recurrent neural network for the forecasting of USD buy ra...
 
Unit 2 ml.pptx
Unit 2 ml.pptxUnit 2 ml.pptx
Unit 2 ml.pptx
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
 
Efficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classificationEfficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classification
 
Efficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkEfficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural Network
 

Mais de ijistjournal

Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...ijistjournal
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSijistjournal
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...ijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithmijistjournal
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKPUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKijistjournal
 
Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 

Mais de ijistjournal (20)

Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithm
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKPUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
 
Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 

Último

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Último (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Backpropagation Neural Network for Bangla Speech Recognition Achieves 92-96% Accuracy

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013 DOI : 10.5121/ijist.2013.3401 1 Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech Recognition Md. Ali Hossain1 , Md. Mijanur Rahman2 , Uzzal Kumar Prodhan3 , Md. Farukuzzaman Khan4 1 Dept. of Computer Science & Engineering, Bangladesh University, Bangladesh. ali.cse.bd@gmail.com 2,3 Dept. of Computer Science & Engineering, Jatiya Kabi Kazi Nazrul Islam University, Bangladesh. mijan_cse@yahoo.com2 and uzzal_bagerhat@yahoo.com3 4 Dept. of Computer Science & Engineering, Islamic University, Bangladesh. mfkhanbd2@gmail.com ABSTRACT This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized. The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient (MFCC) analysis. The mfcc features of five speakers were used to train the network with Back propagation algorithm. The mfcc features of ten bangla digit speeches, from 0 to 9, of another five speakers were used to test the system. All the methods and algorithms used in this research were implemented using the features of Turbo C and C++ languages. From our investigation it is seen that the developed system can successfully encode and analyze the mfcc features of the speech signal to recognition. The developed system achieved recognition rate about 96.332% for known speakers (i.e., speaker dependent) and 92% for unknown speakers (i.e., speaker independent). Keywords Back-propagation,Feedforward Neural Networks, MFCC, Perceptrons, Speech Recognition. 1. Introduction To communicate with each other, Speech is probably the most efficient way. It is possible to use speech as a useful interface to interact with machines[1]. Speech recognition research work has been started since 1930. However Bangla speech recognition research work has been started since around 2000 [2]. Besides English language there is a lot of research experiment and achieved result in various languages throughout the world. But in Bangla language, early researchers in this field have limited success in phonemes [3,4], letters [5], words [6] or small vocabulary continuous speech[7] for single speaker. In our system, we have captured speech from ten different speakers, which may an early attempt for developing speaker independent isolated Bangla digit speech recognition system in Bangla language. With a rich heritage, Bangla is an important language . It is spoken by approximately 8% of the world population [8]. But, for the computerization of this language, a systematic and scientific effort has not started yet. To support rapidly developing computerization of Bangla Language, one of the most important issues is Bangla speech recognition. Accordingly, we have developed a Bangla speech recognition system. A Neural Network is an information Processing Paradigm and it is stimulated by the way biological nervous systems, like the brain process Information[9]. Simple computational elements operating in parallel are included in Neural networks [1]. The network function is determined largely by the connections between elements. A neural network can be trained so that a particular
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013 2 input guides to a specific target output [1]. Neural network can be used in different sector. There are many applications of NNs limited only by our thoughts. Innovation is a solution to success, so dude use NNs to generate something which will modernize the world! For the sake of writing, a few Neural Networks applications are in Speech Recognition, Optical Character Recognition (OCR), Modelling human behaviour, Classification of patterns, Loan risk analysis, music generation, Image analysis, Creating new art forms, Stock market prediction, etc. In our research work, Multilayer Feed-forward Network with Back-propagation algorithm is used to recognize isolated Bangla speech digits from 0 to 9. All the methods and algorithms discussed in this paper were implemented using the features of C and C++ languages. 2. Feed forward Networks The simplest type of feed-forward network that use supervised learning is Perceptron. Binary threshold units arranged into layers made a perceptron shown in Figure-1[10]. It is trained by the Delta Rule or variations thereof. The Delta Rule can be applied directly for the case of a single layer perceptron, as shown in Figure-1(a). For being perceptron’s activations are binary, reduces this general learning rule to the Perceptron Learning Rule. This rules says, if an input is yi =1 (Active) and the output yj is incorrect , then depending on the desired output , the weight wji need to be either decreased(if desired output is 0) or increased(if desired output is 1) by a small amount ε [10]. To find a set of weights to accurately organize the patterns in any training set, This procedure is insured, if the patterns are linearly distinguishable ( i.e. by a straight line, they can be split into two classes). However, most training sets are not linearly distinguishable (For instance, the simple XOR function); for these cases we require multiple layers. Figure-1(b) shows Multi-layer perceptrons (MLPs). It can theoretically learn any function, but they are very complex to train. It is not possible to apply The Delta Rule directly to MLPs because in the hidden layer, there are no targets. If an MLP don’t use discrete activation functions (i.e., threshold functions) that is it uses continuous activation functions (i.e., sigmoids functions), then it turn out to be possible to use partial derivatives and the chain rule .These rules is used to derive the influence of any weight on any output activation, that indicates, to reduce the network’s error, how to modify that weight [10]. This generalized Delta Rule is known as back- propagation. Any number of hidden layers can have in MLPs, although for many applications, a single hidden layer is sufficient, and more hidden layers tend to make training slower, for this reason the terrain in weight space becomes more complicated. There are many ways that MLPs can also be architecturally constrained, such as by limiting the weights values, or by limiting their geometrically local areas connectivity, or tying different weights together. Figure 1. Perceptrons. (a) Single layer perceptron; (b) multi-layer perceptron.
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013 3 2.1 Generalized Delta Rule (Back-Propagation) The generalized delta rule is a supervised learning algorithm [11]. It is used to train a multilayer neural network that maps the relation between the target output and actual output. During the training period, the input pattern is passed through the network with network connection weights and biases of the activation or transfer functions. Initially, the values and biases are assigned by a small random numbers. In this rule, repeatedly presenting input-output pairs and then modifying weights; the modification of weight reduces the network error. The training of the network proceeds as follows: • First, the input pattern is assigned to input neurons; and send to hidden neurons with weights and computed its activation; and then send this to the output neurons with weights and computed its activation, which represent the network’s output response of the input pattern. • Second, the output responses are compared to the desired output and an error term is computed. • Third, the error information is used to update the network weights and biases. The modification of weight is computed by the four different parameters: a learning rate, the derivative of activation function, the error term, and the current activity at the input layer. • Fourth, each hidden unit computes its error. This is done with an output unit’s error, which is sending it backwards as a signal to a hidden unit. • Fifth, after computing the hidden unit error, the weights of the input-to-hidden units are updated using the same equation that was used in the output layer. If there is more than one layer of hidden units, then this procedure can be repeated iteratively. That is, each hidden unit error in one layer, as an error signal, can be propagated backwards to an adjacent layer once the hidden unit weights have been modified. Then the next training pattern can be presented to the input units, and the learning process occurs again [12]. 2.2 Working with back-propagation Algorithm The application of the generalized delta rule involves two phases. At the first phase, to compute the output values yp o for each output unit , the input x is presented and propagated forward through the network. Desired output value do is compared with this output, for each output unit resulting in an error signal δp o. To calculate the appropriate weight changes, a backward pass is involved by the second phase through the network during which the error signal is passed to each unit in the network [13]. Figure-2 shows the flowchart of the training of the neural network with Back-propagation algorithm. Weight adjustments with sigmoid activation function: The weight of a connection is adjusted by an amount proportional to the product of an error signal δ, on the unit k receiving the input and the output of the unit j sending this signal along the connection: ∆pw jk = γ ᵟ P h yP h • The error signal for an output unit is given by: ᵟ ᵨ o = (d ᵨ o- y ᵨ o) (s ᵨ o)
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013 4 • If the activation function F, the 'sigmoid' function defined as: )))) ==== • In this case the derivative is equal to )))) ==== ==== (- ) ==== ==== yP (1- yP ). • Such that the output unit error signal can be Written as: ᵟ P o = (d P o- y P o) y P o(1- y P o). • The error signal for a hidden unit is determined recursively in terms of error signals of the units to which it directly connects and the weights of those connections. For the sigmoid activation function: ᵟ P h = h) ᵟ P o who= yP h(1- yP h) ᵟ P o who Figure 2. Back-propagation training algorithm
  • 5. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013 5 3. IMPLEMENTATION 3.1 Speech Data Acquisition In a sound proof laboratory environment, Bangla speech words recording was completed with the help of close-talking microphone, sound recorder software and high quality sound card. To represent a signal, Wave form is the most general way [14-16]. To make a sample database, The 10 Bangla digits originated from ten speakers were recorded as wav file. At a sampling rate of 8.00 KHz and coded in 8 bits PCM [17], The utterances were recorded. At first, we discard 58 bytes (file header) from the beginning of the wave file for extracting wave data. After then wave data read as character. Required voiced data is extracted from the input speech ( may containing unvoice, voice and silence signal) by the data extraction process. By using the start and end-point detection technique [8,18], the voiced data is extracted from the speech file and stored in a text file as integer data. 3.2 Feature Extraction The most important part of all recognition systems is the feature extraction that translates the speech signal to some digital form having meaningful features. Obviously, for any recognition system, a good feature may produce a good result. Frame blocking, Preemphasis, Windowing and the computation of Mel Frequency Cepstrum Coefficient (MFCC) are the some signal processing steps included in Feature extraction process, as shown in Figure-3 [8,19]. Initially, each speech word was segmented into frame (a set of samples). A frame represent typically 16 to 32 ms of speech. Then apply the further computation on these speech frames. In our research work, Hamming window function is used for feature extraction, which used in speech recognition as one of the most popular windows. To extract a set of features that represents Mel Frequency Cepstrum Coefficients (MFCC) of the signal, The pre-processed and windowed speech signal is then passed through some computational steps. The Discrete Fourier Transform (DFT), computation of first two formant frequencies, Mel frequency warping, Discrete Cosine Transform (DCT) and finally the computation of Mel Frequency Cepstrum Coefficient (MFCC) are included in the computation steps of MFCC, as shown in Figure-3 [8, 19-21]. Figure 3. Computation of MFCC features. 3.3 Training and Testing the Network In the past, Neural networks were used by many authors for speech recognition [22-25]. For our implementation, Multilayer Feed forward Network (three layer neural network) has been created using C & C++. For training the network, Back Propagation algorithm was used. The network consists of an input layer of 250 neurons, one hidden layer of 16 neurons and an output layer contains 10 neurons used to recognize 10 speech words. We used a set of 250 mfcc (Mel Frequency Cepstrum coefficients) feature values as input pattern for the neural network. The input values are in a range of -7 up to 1.5. In our design we put all these input values in a 'Input Layer' variable matrix. Linear activation function elements are included in the output layer. As 10 output neurons, output matrix contains 10x10 unit matrix. Non-linear sigmoidal activation function is included in the hidden layer. For training the network, at first Randomize weights and biases are set using random function ranging values from -1 to 1. Last layer does not require
  • 6. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013 6 weights and first layer does not need biases. For each training pattern, network layers weights and biases are updated using back-propagation algorithms to reach the target, with the following equations. For output layer: Delta = (TargetO - ActualO) * ActualO * (1 - ActualO) Weight = Weight + LearningRate * Delta * Input For hidden layers: Delta = ActualO * (1-ActualO) * Summation(Weight_from_current_to_next AND Delta_of_next) Weight = Weight + LearningRate * Delta * Input Where, TargetO= Target Output (This outputs are set to recognize ten difference words ) ActualO= Actual Output (Calculated output for training phase) Delta= Bias of Neuron LearningRate = Learning Rate to Update network weight. A set of 15 mfcc features pattern of each speech word are used as training pattern to reach its target. The weights and biases of the network are updated until the network error reaches almost zero. At testing phase, the trained network was simulated with unknown speech pattern. It was observed that the trained network performs very well and more than ten words can be recognized by using the developed system. 4. Results and Discussion In this experiment, 300 samples of ten Bangla digits, from 0 to 9, (i.e., 30 samples for each digit) were recorded from ten speakers and then extracted mfcc features from these Bangla speech words. The MFCC features were used with 8-mfcc/frame. 150 mfcc features of speech words were used for training the network and another 150 mfcc features were used for testing the network in the recognition phase. The developed system achieved 96.332% recognition accuracy for known speakers (i.e., speaker dependent) and 92% accuracy for unknown speakers (i.e., speaker independent). The detailed results are shown in Table-1. In this paper, an attempt was made to develop Back-propagation Neural Network for Isolated Bangla Speech Recognition system. This is a single word recognition system, where ten Bangla digits are recognized at a time. All the test patterns were conducted with ten different Speakers from different age. Where fives are trained speakers and fives are test speakers. Instruments should have constant settings. The speaker was a 25-aged male person. Performance with some speakers from different age group was also tested. It was observed that speaking habit or style of speaker affects the performance of the system, so the speakers should be well trained. The sources of errors also include speeds of utterance and loudness variation. Also, the characteristics of microphone and other recording instruments and background noises affect the system performance.
  • 7. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013 7 Table 1. Details Recognition Results 5. CONCLUSION The developed system with Back-propagation Neural Network achieved the reasonable results for isolated Bangla digit speech recognition. The system can be used to recognize ten Bangla digits at a time and achieved 92% recognition accuracy for multiple speakers. With properly trained speakers and noise free environment, the developed system will produce better recognition results. The variability in various parameters, like speed, noise, and loudness will properly handle in our future research. A well-organized system should be completely speaker independent. So speakers of different ages and genders should be employed in the future researchers. In Future, speech recognition for continuous Bangla speech with more powerful recognition tools, like the Hidden Markov Model (HMM), Time Delay Neural Network (TDNN) and Gaussian Mixture Model (GMM) will be established. References [1] Wouter Gevaert, Georgi Tsenov, Valeri Mladenov, “Neural Networks used for Speech Recognition”, Journal of Automatic Control, University of Belgrade, VOL. 20:1-7, 2010. [2] Md. Abul Hasnat Jabir Mowla Mumit Khan, “Isolated and Continuous Bangla Speech Recognition: Implementation, Performance and application perspective”, Conference Papers (Centre for Research on Bangla Language Processing) Department of Computer Science and Engineering, BRAC University, Bangladesh, 2007. [3] S. M. Jahangir Alam, “System Development for Bangla Phoneme Recognition”, M.Sc. Thesis, Dept. of Computer Science & Engineering, Islamic University, Kushtia-7003, July-2004. [4] Karim, A.H. M. Rezaul, “ Bangla Phoneme Recognition”, Graduation Thesis report, Shahjalal University of Science & Technology, Sylhet, 2002. [5] Abul Hasanat Md. Rezaul Karim, Md. Shahidur Rahman and Md. Zafar Iqbal, “Recognition of Spoken letters in Bangla”, 5th ICCIT 2002, East West University, Dhaka, Bangladesh, 27-28 December 2002. [6] Kaushik Roy, Dipankar Das and M. Ganjer Ali, “Development of the Speech Recognition System using Artificial Neural Network”, 5th ICCIT 2002, East West University, Dhaka, Bangladesh, 27-28, December 2002. Bangla Digit No. of samples for testing Speaker Dependent (Known speaker’s speech were used for testing) Speaker Independent (Unknown speaker’s speech were used for testing) No. of Properly Recognized Digit Recognition Rate (%) No. of Properly Recognized Digit Recognition Rate (%) 0 15 14 93.33 14 93.33 1 15 15 100 14 93.33 2 15 14 93.33 13 86.67 3 15 15 100 14 93.33 4 15 15 100 14 93.33 5 15 14 93.33 14 93.33 6 15 15 100 14 93.33 7 15 13 86.67 13 86.67 8 15 14 93.33 14 93.33 9 15 14 93.33 14 93.33 Total 150 143 96.332 138 92
  • 8. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013 8 [7] Md. Saidur Rahman, “Small Vocabulary Speech Recognition in Bangla Language”, M.Sc. Thesis, Dept. of Computer Science & Engineering, Islamic University, Kushtia-7003, July-2004. [8] Md. Mijanur Rahman, Fatema Khatun, and Dr. Md. Al-Amin Bhuiyan “Development of Isolated Speech Recognition System for Bangla Words”, Vol. 1, Issue. 3, September - December, 2010 (IJARITAC), pp.272-278. [9] Preet Ind, Gour Sundar Mitra Thakurer Singh, “Enhanced Password Based Security System Based on User Behavior using Neural Networks” I.J. Information Engineering and Electronic Business, Vol. 2, 29-35, 2012. [10] Joe Tebelskis “Speech Recognition using Neural Networks” School of Computer Science Carnegie Mellon University Pittsburgh, Pennsylvania 15213-3890, May 1995, CMU-CS-95-142 [11] Rumelhart, D. E., Hinton, G. E., and Williams, R. J., “Learning representations by back- propagating Errors Nature”, 323, 533-536, 1986. [12] http://www.bcp.psych.ualberta.ca/~mike/Pearl_Street/Dictionary/contents/G/generalizeddr.html [13] R.Vijaya arjunan and Dr.V.Vijaya Kumar, “A Novel framework for Voice Signal recognition using RASTA and Authentication by Neural Networks”, International Journal of Recent Trends in Engineering, Vol 2, No. 3, November 2009. [14] Rabiner L., Bing_Hwang J.,”Fundamentals of Speech Recognition”, Prentice_Hall, 1993. [15] Jurafsky, Daniel and Martin, James H, “Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition”, Prentice Hall, 1st ed.1996. [16] DSG Pollock, “A handbook of Time-series analysis, signal processing and dynamics”, Academic press London, 1999. [17] S. Gokul, “Multimedia Magic”, BPB Publications, B-14, Connaught Place, New Delhi-110001. [18] Dr. Ramesh Chandra Debnath and Md. Farukuzzaman Khan, “Bangla Sentence Recognition Using End- Point Detection”, Rajshahi University Studies: Part B, Journal of Science, Vol 32, 2004. [19] Jean-Claude Junqua and Jean-Paul Haton, “Robustness in Automatic Speech Recognition: Fundamentals and Applications”, Kluwer Academic Publishers, Dordrecht, Netherlands, 1997. [20] F. Jelinek, L. R. Bahl, and R. L. Mercer, “Design of a Linguistic Statistical Decoder for the Recognition of Continuous Speech”, IEEE Trans. Information Theory, IT-21, pp 250-256, 1975. [21] Md. Farukuzzaman Khan and Dr. Ramesh Chandra Debnath, “Comparative Study of Feature Extraction Methods for Bangla Phoneme Recognition”, 5th ICCIT 2002, East West University, Dhaka, Bangladesh, PP.27-28, December 2002. [22] Akram M. Othman, and May H. Riadh, “Speech Recognition Using Scaly Neural Networks”, World Academy of Science, Engineering and Technology, vol. 38, 2008. [23] Mohamad Adnan Al-Alaoui, Lina Al-Kanj, Jimmy Azar, and Elias Yaacoub, “Speech Recognition using Artificial Neural Networks and Hidden Markov Models”, IEEE Multidisciplinary Engineering Education Magazine, VOL. 3, 2008. [24] Dou-Suk Kim and Soo-Young Lee, “Intelligent judge neural network for speech recognition”, Neural Processing Letters, Vol.1, No.1, PP.17-20, 1994. [25] Chee Peng Lim, Siew Chan Woo, Aun Sim Loh, Rohaizan Osman, “Speech Recognition Using Artificial Neural Networks”, 1st International Conference on Web Information Systems Engineering (WISE'00),Vol.1, 2000. Biographies of Authors Md. Ali Hossain Mr. Hossain was born in Manikganj, Bangladesh. He received the B.Sc. and M.Sc. degrees from the Department of Computer Science and Engineering, University of Islamic University, Kushtia, Bangladesh, in 2008 and 2009, respectively. He is serving as a Lecturer with the Department of Computer Science and Engineering (CSE), Bangladesh University, Dhaka. He has got a number of research articles published in different international journals. His current research interests include speech processing, biomedical imaging, biomedical signal, bioinformatics, neural networks and AI. Mr. Ali Hossain is an Associate Member of the Bangladesh Computer Society and Executive Member of Islamic University Computer Association (IUCA).
  • 9. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013 9 Md. Mijanur Rahman Mr. Rahman is working as an assistant professor of the department of Computer Science and Engineering in Jatiya Kabi Kazi Nazrul Islam University, Trishal, Mymensingh, Bangladesh. He completed his B Sc (Hons) and M Sc in CSE degree from Islamic University, Kushtia, Bangladesh. At present he is continuing his PhD research work in the department of Computer Science and Engineering, Jahangirnagar University, Savar, Dhaka, Bangladesh. He has got a number of research articles published in different local and international journals. His current research interests include the fields of pattern recognition, image and speech processing, neural networks, fuzzy logics and AI. Uzzal Kumar Prodhan Assistant Professor, Department of Computer Science & Engineering, Jatiya Kabi Kazi Nazrul Islam University, Trishal, Mymensingh, Bangladesh. He has completed his M.Sc. and B.Sc. from the department of Computer Science & Engineering, Islamic University, Bangladesh. He got first class in both exams. He passed S.S.C. and H.S.C with star marks. After completing M.Sc in CSE, he joined Bangladesh University as a Lecturer & joined in Jatia Kabi Kazi Nazrul Islam University as an Assistant Professor. In his long teaching life he was appointed as a head examiner in Computer Technology by Bangladesh Technical Education Board, Dhaka. Due to his teaching interest he was selected as a Book reviewer of National Curriculum of Textbook Board, Dhaka. He has successfully completed Microsoft Certified IT Professional (MCITP) on Server 2008 platform. His research interest includes Artificial Intelligence, Neural Network, Cryptography, Computer Architecture and Organization and Pattern Recognition. He has many international and national research publications. His email addresses are uzzal_bagerhat@yahoo.com, uzzal.prodhan@bu.edu.bd. Prof. Md. Farukuzzaman Khan Prof. Khan is working as professor of the department of Computer Science and Engineering in Islamic University, Kushtia, Bangladesh. He completed his B Sc (Hons), M Sc and M. Phil degree from Rajshahi University, Rajshahi, Bangladesh. He is a PhD researcher in the department of Computer Science and Engineering, Islamic University, Kushtia, Bangladesh. He has has got a number of research articles published in different local and international journals. His current research interests pattern recognition, image and speech processing, DSP and AI.