{"id":83588,"date":"2018-03-10T00:07:43","date_gmt":"2018-03-10T00:07:43","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/robustez-en-reconocimiento-fonetico-de-voz-para-aplicaciones-telefonicas\/"},"modified":"2018-03-10T00:07:43","modified_gmt":"2018-03-10T00:07:43","slug":"robustez-en-reconocimiento-fonetico-de-voz-para-aplicaciones-telefonicas","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/matematicas\/robustez-en-reconocimiento-fonetico-de-voz-para-aplicaciones-telefonicas\/","title":{"rendered":"Robustez en reconocimiento fon\u00e9tico de voz para aplicaciones telef\u00f3nicas."},"content":{"rendered":"<h2>Tesis doctoral de <strong>  Puertas Tera Jos\u00e9 Ignacio <\/strong><\/h2>\n<p>La tesis estudia diferentes t\u00e9cnicas orientadas a combatir las principales fuentes o causas de error en los sistemas de reconocimiento autom\u00e1tico de habla que operan en aplicaciones telef\u00f3nicas.  los trabajos comienzan con la presentaci\u00f3n de los aspectos b\u00e1sicos de dise\u00f1o de un reconocedor de habla basado en modelos ocultos de markov.  se consideran, estudian y eval\u00faan t\u00e9cnicas de robustez orientadas, principalmente, a la diferente forma de hablar de locutores diferentes, a las variaciones del canal, y a la posible presencia de ruidos, distorisiones y palabras fuera del vocabulario que emplee el usuario del sistema.  concretamente se estudian t\u00e9cnicas como las sutracci\u00f3n de la media cepstral (cmn), y la t\u00e9cnica conocida como rasta. Se discute tambi\u00e9n la utilizaci\u00f3n del procedimientos para el rechazo de pronunciaciones incorrectas.  la evoluci\u00f3n de resultados se realiza sobre una base de datos telef\u00f3nica capturada dentro de los trabajos de la tesis, y que contiene un vocabulario reducido de d\u00edgitos, comandos y 100 nombres.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Robustez en reconocimiento fon\u00e9tico de voz para aplicaciones telef\u00f3nicas.<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Robustez en reconocimiento fon\u00e9tico de voz para aplicaciones telef\u00f3nicas. <\/li>\n<li><strong>Autor:<\/strong>\u00a0  Puertas Tera Jos\u00e9 Ignacio <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Polit\u00e9cnica de Madrid<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 28\/02\/2000<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Ram\u00f3n Garc\u00eda G\u00f3mez<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal:  G\u00f3mez mena Juan  Francisco <\/li>\n<li>carmen Garc\u00eda mateo (vocal)<\/li>\n<li>Antonio  Jos\u00e9 Rubio ayuso (vocal)<\/li>\n<li>Mar\u00eda asunci\u00f3n Moreno bilbao (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Puertas Tera Jos\u00e9 Ignacio La tesis estudia diferentes t\u00e9cnicas orientadas a combatir las principales fuentes o causas [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[1890,332,4149,126,16008,27844,2489,2535,16597],"tags":[4151,22108,38765,15976,177059,30680],"class_list":["post-83588","post","type-post","status-publish","format-standard","hentry","category-ciencia-de-los-ordenadores","category-ciencias-tecnologicas","category-diseno-y-componentes-de-sistemas-de-informacion","category-matematicas","category-politecnica-de-madrid","category-reconocimiento-y-sintetizacion-de-habla","category-tecnologia-de-las-telecomunicaciones","category-tecnologia-de-los-ordenadores","category-telefono","tag-antonio-jose-rubio-ayuso","tag-carmen-garcia-mateo","tag-gomez-mena-juan-francisco","tag-maria-asuncion-moreno-bilbao","tag-puertas-tera-jose-ignacio","tag-ramon-garcia-gomez"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/83588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=83588"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/83588\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=83588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=83588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=83588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}