当前位置:网站首页>Blind separation of speech signals based on ICA and DL
Blind separation of speech signals based on ICA and DL
2022-07-29 02:04:00 【abcwsp】
Independent component analysis aims to solve Colin Cherry Put forward
The famous ” cocktail lounge ” problem , In a room , Yes
Eight people are talking at the same time , At this time, there are eight wheat in different positions
Kefeng , Record eight time signals respectively x ( i ) ( t ) , i = 1 ⋅ ⋅ ⋅ 8 , x(i)(t), i = 1 · · · 8, x(i)(t),i=1⋅⋅⋅8,
If each source signal is independent of each other , Then each recorded signal
It is the weighted sum of the speech signals sent by eight speakers , With
s ( i ) ( t ) , i = 1 ⋅ ⋅ ⋅ 8 s(i)(t), i = 1 · · · 8 s(i)(t),i=1⋅⋅⋅8 To represent eight original signals . This voice mix
The combination process can be described as shown in the right figure 2.1 Shown :
It is easy to indicate that there is the following relationship between the original signal and the recorded signal
system :
ICA Multiple objective functions can be selected ( Contrast function ) To optimize . First of all, from the perspective of information theory , Take the maximum likelihood principle as the starting point , There are maximum likelihood and minimum mutual information as objective functions ; Then another kind of objective function based on high-order correlation ———— Higher order cumulants and negative entropy ; Finally, the hypothesis testing principle is introduced into ICA Modeling , Get the likelihood ratio objective function .
Deep learning speech blind separation
边栏推荐
- 【流放之路-第六章】
- Solution of Lenovo notebook camera unable to open
- FPGA实现10M多功能信号发生器
- The scientific research environment has a great impact on people
- Lua third-party byte stream serialization and deserialization module --lpack
- LeetCode 练习——剑指 Offer 45. 把数组排成最小的数
- E-commerce keyword research helps data collection
- Wonderful use of data analysis
- 【7.21-26】代码源 - 【好序列】【社交圈】【namonamo】
- [云原生]微服务架构是什么
猜你喜欢
Data security is a competitive advantage. How can companies give priority to information security and compliance
Leetcode 112: path sum
With the explosive growth of digital identity in 2022, global organizations are facing greater network security
【流放之路-第八章】
How companies make business decisions -- with the help of data-driven marketing
[the road of Exile - Chapter 5]
Super technology network security risk assessment service, comprehensively understand the security risks faced by the network system
How to protect WordPress website from network attack? It is essential to take safety measures
Introduction to shared data center agent
Force deduction brush question (1): sum of two numbers
随机推荐
Sigma-DSP-OUTPUT
[golang] network connection net.dial
九天后我们一起,聚焦音视频、探秘技术新发展
【流放之路-第六章】
How companies make business decisions -- with the help of data-driven marketing
[the road of Exile - Chapter 4]
StoneDB 邀请您参与开源社区月会!
知道创宇上榜CCSIP 2022全景图多个领域
E-commerce keyword research helps data collection
[the road of Exile - Chapter III]
LeetCode 112:路径总和
【7.21-26】代码源 - 【好序列】【社交圈】【namonamo】
【流放之路-第五章】
Promise solves asynchrony
LeetCode 113:路径总和 II
druid. io index_ Realtime real-time query
[WesternCTF2018]shrine
Slow storage scheme
TDA75610-I2C-模拟功放I2C地址的确定
Code reading - ten C open source projects