ÌÀÒÅÌÀÒÈÊÀ / 5. Ìàòåìàòè÷åñêîå ìîäåëèðîâàíèå

 

Ph.D., Professor Abdimomynova M., Master IS Doumcharieva Zh., Master INF Aitbaeva Z.

 

Taraz State University, Kazakhstan

 

Computer and Mathematical modeling of two voice signals

 

In today's world, more often interested in speech technologies, in particular, identification by voice. This is due, on the one hand, the advent of high-performance computing systems based on personal computers and hardware, allowing to make the input signal to the computer, and, on the other hand, a high demand authentication systems in different fields of human activity. This method is easy to use.

Today is the time - when developing new technologies. On the streets in the stores set the camcorder. They allow you to record not only video but also audio. For example: a person walking down the street talking and the sound of the camcorder is writing gave him a computer and he analyzed his voice was checked for a match on the database. When you need to determine the identity of a specific person voice, the program will compare the spectra of a few words and give the probability of a match. Precise identification of the person is an important element in various situations, for example in law, criminology, legal paperwork, and many other areas.

Study of the problem analysis of two voice signals can be successfully applied in forensic science, case management, at security checkpoints to restrict the admission and finding people for various emergencies such as plane crashes, based on the records of talks can be restored setting and a picture of the incident, to determine who speaks a particular phrase. Moreover, the voice may be approximately appearance (appearance) portrait telephone blackmailers, terrorists and other criminals. In modern jurisprudence voice can serve as a clear piece of evidence in court. The aim is to create a program capable to analyze the human voice with a record from the database.

One of the challenges in the field of speech technology is to determine which person corresponds to a particular speech signal. System solves this problem fall into two broad classes - the system of verification and identification. Verification - a procedure to confirm the identity of the speaker, and the identification - determination of the individual from a given, limited list of people. Currently, the system of identification and verification of voice are becoming increasingly popular around the world. This is primarily due to natural and habitual speech interaction between man and computer system.

To analyze voice signals necessary:

• Get a voice signal,

• Improve signal (to remove noise)

• Highlight words

• Compare the received signal to the database,

• Find the percentage of matches.

For voice signal algorithm that allows you to record sound from a microphone.

To record a sound, first set the buffer size «BufSize: = TrackBar1.Position * 500 + 100" and then the following parameters sampling: «wFormatTag: = WAVE_FORMAT_PCM, nChannels: = 1 (1 mono 2 - stereo) - the number of channels, frequency, equal to 44100 (8000 possible values, 11025. 22050 and 44100). and bit rate equal to 16 bits, leveling blocks «nBlockAlign: = nChannels * (wBitsPerSample div 8)" The number of bytes per second. For this is the result WAVE_FORMAT_PCM nSamplesPerSec * nBlockAlign.

Then open the audio device «WaveInOpen (Addr (WaveIn), WAVE_MAPPER, addr (header), Form1.Handle, 0," set to the length of the buffer, its name, and load data into it.

Obtained from the microphone signal to be processed by a Fourier transform obtain spectrum.

The Fourier Transform - a mathematical process that allows us to take the time (seismic trace) and express it as a function of frequency (spectrum) of the formula:

 

                    (1)

 

But it is quite complicated and therefore has been used "Fast Fourier Transform".

The resulting range of 4 seconds output using TChart screen.

Îïèñàíèå: \\Alexx\êàðòèíêè\1.bmp

Figure 1. The window program (Voice Recording). Recording from a microphone and receiving range of sound.

 

To date, most of the work to clean up the sound is reduced to getting a sample from the hiss and noise - «hiss," high-frequency noise. Hiss - even hiss. Noise - a broad term, in fact, the same.

There are two methods of cleaning. The first - the threshold - noise gate, simply filtering. It frequency filtered out. To begin with - all of top, which not clogged sound formants, namely noise.

The second method is that the program is scanned sample of noise, and then the algorithm would be deducted from the noise of the waves.

I had to use the second type of program.

Further it is necessary to amplify the signal and remove noise (filter), using the following algorithm:

s:=trunc(s/bit);   s1:=trunk (s1/bit)-20;

if abs(s1)<11 then s1:=0;

ss [i+k]:=s1;

form1.Chart4.Series[ng].Add(s);   form1.Chart3.Series[ng].Add(s1);

i:=i+bit ;

Then select from the signal words and working more with words.

Now we can compare the two voices, a new and already existing in the database.

 

Find the differences between the two signals. We calculate the percentage of matches, as far as one signal coincides with the other according to the formula:

 

Ð=   (2)

 

In the Delphi-voice analyzer developed algorithm and program in the language of Code Gear Delphi Architect 2009 can record and compare the audio material to the database. It happens that the anomalous voices defined and recognized relatively easy. In other cases, the ruggedness and the duality of sound does not allow them to identify reliably. In such cases, only the computer analysis can give more data than a regular hearing, unbiased information.

The signal can vary over a wide range of pure and easily analyzed to noisy and not treatable.

Over time, the study of the votes based on computer analysis using a variety of methods of analysis of voice put a solid foundation for accurate identification of people.

 
REFERENCES
 
1. Programming in Delphi 7 \ Author: P. Darakhvelidze, Markov
2. Programming in Delphi for Windows \ Author: AY Archangel \ Binom-Press \: 2007
3. Database Programming in Delphi 7. Training \ Author: Valeriy Faronov \ Piter \: 2006