[1] Hartmut T, Anders E. Acoustic effects of variation in vocal effort by men, women, and children[J]. Journal of the Acoustical Society of America, 2000, 107(6):3438-3451.
[2] Ghaffarzadegan S, Bo?il H, Hansen JHL. UT-rocal effort Ⅱ:analysis and constrained-lexicon recognition of whispered speech[C]//ICASSP. Florence:IEEE, 2014:2563-2567.
[3] Saeidi R, Alku P, Backstrom T. Feature extraction using power-law adjusted linear prediction with application to speaker recognition under severe vocal effort mismatch[J]. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2016, 24(1):42-53.
[4] Tumomo R, Antti Suni, Jouni P, et al. Analysis and synthesis of shouted speech[C]//Interspeech. Lyon:ISCA, 2013:1544-1548.
[5] Zhang Chi, Hansen, John H L. Advancements in whisper-island detection within normally phonated audio streams[C]//Interspeech. Brighton:ISCA, 2009:860-863.
[6] Carlin M A, Smolenski B Y, Wenndt S J. Unsupervised detection of whispered speech in the presence of normal phonation[C]//Interspeech. Pittsburgh:ISCA, 2006:685-688.
[7] Zhang Chi, Hansen, John H L. Analysis and classification of speech mode:whispered through shouted[C]//Interspeech. Antwerp:ISCA, 2007:2289-2292.
[8] Petr Z, Milan S, Jiri S. Impact of vocal effort variability on automatic speech recognition[J]. Speech Communication, 2012, 54(6):732-742.
[9] 晁浩, 宋成, 刘志中. 基于元音模板匹配的声效多级检测[J]. 北京邮电大学学报, 2016, 39(4):98-102. Chao Hao, Song Cheng, Liu Zhizhong. Multi-level detection of vocal effort based on vowel template matching[J]. Journal of Beijing University of Posts and Telecommunications, 2016, 39(4):98-102.
[10] Ni Chongjia, Liu Wenju, Xu Bo. Mandarin prosodic break detection based on complementary model[C]//ISCSLP. Tainan:IEEE, 2011:353-357.
[11] Ni Chongjia, Liu Wenju, Xu Bo. From English pitch accent detection to mandarin stress detection, where is the difference?[J]. Computer Speech & Language, 2012, 26(3):127-148.
[12] Chang Chihchung and Lin Chihjen. LIBSVM:a library for support vector machines[J]. ACM Transactions on Intelligent Systems and Technology, 2011, 2(3):1-27. |