Abstract
In this research, a new speech recognition method based on improved feature extraction and improved support vector machine (ISVM) is developed. A Gaussian filter is used to denoise the input speech signal. The feature extraction method extracts five features such as peak values, Mel frequency cepstral coefficient (MFCC), tri-spectral features, discrete wavelet transform (DWT), and the difference values between the input and the standard signal. Next, these features are scaled using linear identical scaling (LIS) method with the same scaling method and the same scaling factors for each set of features in both training and testing phases. Following this, to accomplish the training process, an ISVM is developed with best fitness validation. The ISVM consists of two stages: (i) linear dual classifier that finds the same class attributes and different class attributes simultaneously and (ii) cross fitness validation (CFV) method to prevent over fitting problem. The proposed speech recognition method offers 98.2% accuracy.
Similar content being viewed by others
Change history
01 September 2023
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s00779-023-01773-6
References
Kumar K, Aggarwal, Jain A (2011) An analysis of speech recognition performance based upon network layers and transfer functions. J Comput Sci Eng Appl 1(3):11–20
Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput:1–10
Biem A, Katagiri S (1997) Cepstrum-based filter-bank design using discriminative feature extraction training at various levels. In: Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, pp 1503–1506
Varatharajan R, Manogaran G, Priyan MK, Balaş VE, Barna C (2017) Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimedia Tools Appl:1–21
Balan EV, Priyan MK, Gokulnath C, Devi GU (2015) Fuzzy based intrusion detection systems in MANET. Procedia Comput Sci 50:109–114
Manogaran G, Varatharajan R, Priyan MK (2018) Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimedia Tools Appl 77(4):4379–4399
Devi GU, Balan EV, Priyan MK, Gokulnath C (2015) Mutual authentication scheme for IoT application. Indian J Sci Technol 8(26)
Priyan MK, Devi GU (2017) Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles. Clust Comput:1–15
Varatharajan R, Manogaran G, Priyan MK (2017) A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools Appl:1–21
Abdullaa W, Kasabov N (2003) Reduced feature-set based parallel CHMM speech recognition systems. J Inf Sci 156(1):21–38
Devi GU, Priyan MK, Balan EV, Nath CG, Chandrasekhar M (2015) Detection of DDoS attack using optimized hop count filtering technique. Indian J Sci Technol 8(26)
Gokulnath C, Priyan MK, Balan EV, Prabha KR, Jeyanthi R (2015) Preservation of privacy in data mining by using PCA based perturbation technique. In: Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on IEEE, pp 202-206
Manogaran CTG, Priyan M (2017) Centralized fog computing security platform for IoT and cloud in healthcare system. Exploring the convergence of big data and the internet of things, 141
Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In Communications and Signal Processing (ICCSP), 2015 International Conference on (pp 0185-0189). IEEE
Kumar PM, Gandhi U, Varatharajan R, Manogaran G, Jidhesh R, Vadivel T (2017) Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things. Clust Comput:1–12
Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C (2017) A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Futur Gener Comput Syst
Manogaran G, Vijayakumar V, Varatharajan R, Kumar PM, Sundarasekar R, Hsu CH (2017) Machine learning based big data processing framework for cancer diagnosis using hidden Markov model and gm clustering. Wirel Pers Commun:1–18
Kumar PM, Gandhi UD (2017) A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases. Comput Electr Eng
Manickam A, Devarasan E, Manogaran G, Priyan MK, Varatharajan R, Hsu CH, Krishnamoorthi R (2018) Score level based latent fingerprint enhancement and matching using SIFT feature. Multimedia Tools Appl:1–21
Priyan MK, Nath CG, Balan EV, Prabha KR, Jeyanthi R (2015) Desktop phishing attack detection and elimination using TSO program. In: Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on (pp 198-201). IEEE
Rawal BS, Vijayakumar V, Manogaran G, Varatharajan R, Chilamkurti N. Secure disintegration protocol for privacy preserving cloud storage. Wirel Pers Commun:1–17
Author information
Authors and Affiliations
Corresponding author
About this article
Cite this article
Kanisha, B., Lokesh, S., Kumar, P.M. et al. RETRACTED ARTICLE: Speech recognition with improved support vector machine using dual classifiers and cross fitness validation. Pers Ubiquit Comput 22, 1083–1091 (2018). https://doi.org/10.1007/s00779-018-1139-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-018-1139-0