VOICE CONTROL COMMAND RECOGNITION SYSTEM OF UAV BASED ON STEGANOGRAPHIC-CEPSTRAL ANALYSIS
DOI:
https://doi.org/10.18372/1990-5548.56.12928Keywords:
Classification of the object, semantic identification of the voice commands, Unmanned Aerial Vehicles, voice recognition, mel-frequency cepstral coefficientsAbstract
The article suggests the developed voice command recognition system based on steganographic-cepstral analysis and the computational algorithm of mel-frequency cepstral coefficients which is used for creation the basic voice command recognition system on the basis of which can be created more complex voice control solutions. To prove experimentally and substantiate the usefulness of using the developed voice command recognition system and the computational algorithm of mel-frequency cepstral coefficients. The detailed results of preliminary experimental studies of the developed voice command recognition system and the computational algorithm of mel-frequency cepstral coefficients in MATLAB in the case of the identification of control commands "up", "down", "right", "left" spoken by different subjects. The article presents the developed voice command recognition system based on steganographic-cepstral analysis which allows to increase the efficiency of voice command recognition. The conclusion based on the detailed results of preliminary experimental studies shows the usefulness of using the developed voice command recognition system and the computational algorithm of mel-frequency cepstral coefficients and thorough substantiation of the scientific-technical experimental study.
References
O. Lavrynenko, G. Konakhovych, and D. Bakhtiiarov, “Method of Voice Control Functions of the UAV,” Methods and Systems of Navigation and Motion Control (MSNMC), IEEE 4th International Conference, 2016, pp. 47–50.
D. Bakhtiiarov, G. Konakhovych, and O. Lavrynenko, “Protected System of Radio Control of Unmanned Aerial Vehicle,” Methods and Systems of Navigation and Motion Control (MSNMC), IEEE 4th International Conference, 2016, pp. 196–199.
G. F. Konakhovych, O. Y. Lavrynenko, V. V. Antonov, and D. I. Bakhtiiarov, “A digital speech signal compression algorithm based on wavelet transform,” Electronics and control systems, vol. 48, no. 2, pp. 30–36, 2016.
L. F. Sanchez, H. Abaunza, and P. Castillo, "Safe navigation control for a quadcopter using user's arm commands," Unmanned Aircraft Systems (ICUAS) 2017 International Conference, 2017, pp. 981–988.
O. Yu. Lavrynenko, G. F. Konakhovych, and D. I. Bakhtiiarov, "Compression algorithm of voice control commands of UAV based on wavelet transform," Electronics and control systems, vol. 55, no. 1, pp. 17–22, 2018.
G. F. Konahovich, D. I. Bakhtiyarov, and O. Y. Lavrynenko, "Computer modeling of drone protected control channel," Science-Based Technologies, vol. 28, no. 4, pp. 283–290, 2015.
G. F. Konahovich, A. І. Davletyants, A. Y. Lavrynenko and D. I. Bakhtiyarov, "The comparative analysis the Fourier transform, cosine transform and wavelet transform as a spectral analysis of the digital speech signals," Science-Based Technologies, vol. 27, no. 3, pp. 210–220, 2015.
O. Lavrynenko, G. Konakhovych, R. Odarchenko and D. Bakhtiiarov, "Voice Command Signal Compression Algorithm by Functions of Unmanned Aerial Vehicles," Aerospace Technic and Technology, vol. 130, no. 3, pp. 57–67, 2016.
I. O. Kozlyuk, D. І. Bakhtiiarov, O. Y. Lavrynenko and І. V. Tretiak, "Problems of unauthorized interference to the work of UAV and methods of its solving," Science-Based Technologies, vol. 30, no. 2, pp. 206–211, 2016.
Downloads
Issue
Section
License
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).