{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:01:37Z","timestamp":1725548497644},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icmlc.2010.5580758","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T15:57:54Z","timestamp":1285171074000},"page":"2950-2955","source":"Crossref","is-referenced-by-count":3,"title":["Speech recognition via Hidden Markov Model and neural network trained by genetic algorithm"],"prefix":"10.1109","author":[{"given":"Shing-Tai","family":"Pan","sequence":"first","affiliation":[]},{"given":"Ching-Fa","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jian-Hong","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"401","article-title":"Research and Improvement on Embedded System Application of DTW-based Speech Recognition","author":"wan","year":"2008","journal-title":"International Conference on Anti-counterfeiting Security and Identification"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE.2008.4580709"},{"article-title":"Discrete-Time Signal Processing","year":"2005","author":"oppenheim","key":"ref10"},{"key":"ref6","first-page":"53","article-title":"Robust Speech Recognition Using Noise Suppression Based on Multiple Composite Models and Multi-pass Search","author":"jitsuhiro","year":"2007","journal-title":"IEEE Workshop on Automatic Speech Recognition & Understanding"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2002.804317"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2006.347837"},{"key":"ref8","article-title":"Spoken Language Pprocessing A Guide to Theory","author":"huang","year":"2005","journal-title":"Algorithm and System Developmen"},{"journal-title":"Introduction to Algorithms 2nd Editon","year":"2002","author":"cormen","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2005.851952"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/78.984749"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSP.2008.4697206"}],"event":{"name":"2010 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2010,7,11]]},"location":"Qingdao, China","end":{"date-parts":[[2010,7,14]]}},"container-title":["2010 International Conference on Machine Learning and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5570011\/5580670\/05580758.pdf?arnumber=5580758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T17:57:06Z","timestamp":1489859826000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5580758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2010.5580758","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}