Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2
Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2
Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2
Blockchain Framework for Communication between Vehicle through IoT Devices and Sensors
Volume-3 | Issue-2
Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3
Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2
A Review on Data Securing Techniques using Internet of Medical Things
Volume-3 | Issue-3
Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4
Maximizing the Prediction Accuracy in Tweet Sentiment Extraction using Tensor Flow based Deep Neural Networks
Volume-3 | Issue-2
DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING
Volume-1 | Issue-1
Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3
Construction of a Framework for Selecting an Effective Learning Procedure in the School-Level Sector of Online Teaching Informatics
Volume-3 | Issue-4
Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2
Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2
Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2
Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2
Characterizing WDT subsystem of a Wi-Fi controller in an Automobile based on MIPS32 CPU platform across PVT
Volume-2 | Issue-4
Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4
LoRa-IoT Focused System of Defense for Equipped Troops [LIFE]
Volume-2 | Issue-3
Design of Data Mining Techniques for Online Blood Bank Management by CNN Model
Volume-3 | Issue-3
Volume - 4 | Issue - 4 | december 2022
Published
30 January, 2023
The deep learning technique uses speech recognition in many different applications, including voice assistants, voice authentication, audio transcriptions, etc. Children who are dyslexic, blind persons and those with impairments can all benefit from spoken digit recognition. The goal of this paper is to create spoken digit recognition for the categorization of digits from 0 to 9 utilizing Convolution Neural Networks (CNN) and Long Short -Term Memory neural networks. With the addition of autoencoders, the performance of the CNN model is assessed. Finally, a comparative analysis is performed on the performances of the models based on the performance metrics.
KeywordsAutoencoders Convolution Neural Network Deep learning Long Short -Term Memory Neural Network Spoken digit recognition.
Full Article PDF Download Article PDF