Computer Science – Seminar Topics

Computer Science – Seminar Topics

Speech recognition technology is used more and more for telephone applications like travel booking and information, financial account information, customer service call routing, and directory assistance. Using constrained grammar recognition, such applications can achieve remarkably high accuracy. Research and development in speech recognition technology has continued to grow as the cost for implementing such voice-activated systems has dropped and the usefulness and efficacy of these systems has improved. For example, recognition systems optimized for telephone applications can often supply information about the confidence of a particular recognition, and if the confidence is low, it can trigger the application to prompt callers to confirm or repeat their request. Furthermore, speech recognition has enabled the automation of certain applications that are not automatable using push-button interactive voice response (IVR) systems, like directory assistance and systems that allow callers to “dial” by speaking names listed in an electronic phone book.

Speaker identity is correlated with the physiological and behavioral characteristics of the speaker. These characteristics exist both in the spectral envelope (vocal tract characteristics) and in the supra-segmental features (voice source characteristics and dynamic features spanning several segments). The most common short-term spectral measurements currently used are Linear Predictive Coding (LPC)-derived cepstral coefficients and their regression coefficients. A spectral envelope reconstructed from a truncated set of cepstral coefficients is much smoother than one reconstructed from LPC coefficients. Therefore it provides a stabler representation from one repetition to another of a particular speaker’s utterances. As for the regression coefficients, typically the first- and second-order coefficients are extracted at every frame period to represent the spectral dynamics. These coefficients are derivatives of the time functions of the cepstral coefficients and are respectively called the delta- and delta-delta-cepstral coefficients.


  Subscribe to the seminars calendar.

Public seminars

Algorithms Seminars

Categories, Logic and Foundations of Physics

Computational Biology Seminars

Computational Mathematics and Applications Seminars

Cyber Security Seminars

Departmental Seminars

Distinguished Speakers – Oxford Women in Computer Science

Industry seminars

Information Security and Privacy Programme

Information Systems Seminar

Interdisciplinary Seminar in Fundamental Physics

Machine Learning Seminars

OASIS: The Oxford Advanced Seminar on Informatic Structures

OxWoCS Industry Events

Oxford Computational Linguistics Seminars

Physics of Information


Seminars not part of a series

The Strachey Lectures in Computing Science

Verification Seminars

Internal seminars

Cakes seminars

Computational Biology Group Meetings

Department of Computer Science Operational Briefings

Metacomputation Seminar Series

Programming Languages

Selected Topics in Database Theory

Software Engineering Seminars

Software Engineering at Credit Suisse

Other related seminars

Oxford Centre for Industrial and Applied Mathematics seminar series

Seminars at the Oxford e-Research Centre

Seminars at the Oxford Internet Institute

Seminars at the Mathematical Institute

Seminars at the Department of Statistics

Seminars at the Department of Engineering Science

  1. Raspberry Pi
  1. WhatsApp
  1. Focused Web Crawling for E-Learning Content
  1. Smart Glasses
  1. Secure Shell
  1. 3D-Doctor
  1. Google Chrome Laptop or Chrome Book
  1. Femtocell
  1. xMax Technology
  1. EyePhone
  1. XBOX 360 System
  1. iSphere
  1. zForce Touch Screen
  1. Wireless Body Area Network
  1. E-Ball Technology
  1. Google Glass
  1. Symbian Mobile Operating System
  1. Multiple Access Control Protocol
  1. Digital Preservation
  1. E-Paper Technology
  1. Smart Skin for Machine Handling
  1. Nvidia Tegra 250 Developer Kit Hardware
  1. Zenoss Core
  1. 5 Pen PC Technology
  1. High Performance Computing with Accelerators
  1. iPAD
  1. Browser Security
  1. Google File System
  1. Measuring Universal Intelligence
  1. Fast And Secure Protocol
  1. Case Based Reasoning System
  1. Mobile Number Portability
  1. Mobile TV
  1. Mobile WiMax
  1. Mobile Phone Cloning
  1. Nano Cars Into The Robotics
  1. Exterminator
  1. Bluetooth V2.1
  1. DOS Attack
  1. Privacy Preserving Data Publishing
  1. Transactional Memory
  1. Example Based Machine Translation
  1. Microsoft Palladium
  1. iCloud
  1. 3D Searching
  1. Rain Technology
  1. Bluetooth Broadcasting
  1. 3d Optical Data Storage
  1. Web 2.0
  1. Li-Fi Technology
  1. Multi-Touch Interaction
  1. Gesture Recognition Technology
  1. CORBA
  1. BlackBerry Technology
  1. Facebook Thrift
  1. Bluejacking
  1. Multiparty Nonrepudiation
  1. Domain Driven Data Mining
  1. Web Clustering Engines
  1. Confidential Data Storage and Deletion
  1. Computational Intelligence in Wireless Sensor Networks
  1. Capacitive And Resistive Touch Systems
  1. Wireless Video Service in CDMA Systems
  1. JOOMLA and CMS
  1. Intrusion Tolerance
  1. Green Computing
  1. NVIDIA Tesla Personal Supercomputer
  1. Zettabyte FileSystem
  1. Breaking the Memory Wall in MonetDB
  1. Enhancing LAN Using Cryptography and Other Modules
  1. Generic Access Network
  1. RESTful Web Services
  1. Google’s Bigtable
  1. Cloud Computing
  1. Keil C
  1. Wine
  1. Sixth Sense Technology
  1. Security Features of ATM
  1. Palm Vein Technology
  1. Sniffer for detecting lost mobiles
  1. Brain Chips
  1. Phishing
  1. Blue Brain
  1. Hadoop
  1. Generic Visual Perception Processor GVPP
  1. Yii Framework
  1. Word Sense Disambiguation
  1. Wolfram Alpha
  1. Wardriving
  1. Tool Command Language
  1. Computational Visual Attention Systems
  1. Software Reuse
  1. Visible Light Communication
  1. Skinput Technology
  1. Semantic Digital Library
  1. Ambient Intelligence
  1. Public Key Infrastructure
  1. Plagiarism Detection Techniques
  1. Neural Interfacing
  1. Middleware
  1. Fiber Channel
  1. Compute Unified Device Architecture CUDA
  1. Bio-inspired Networking
  1. Anonymous Communication
  1. Java Database Connectivity
  1. Tsunami Warning System
  1. iDEN
  1. Hi-Fi
  1. Intelligent Speed Adaptation
  1. GSM Based Vehicle Theft Control System
  1. Global Wireless E-Voting
  1. Green Cloud
  1. Digital Jewelry
  1. Biometric Voting System
  1. 3D Television
  1. Voice Browser
  1. Graphical Password Authentication
  1. Finger Tracking In Real Time Human Computer Interaction
  1. Eye Movement-Based Human Computer Interaction Techniques
  1. E-Cash Payment System
  1. Brain Fingerprinting
  1. Biometrics in SECURE e-transaction
  1. X- Internet
  1. Secure ATM by Image Processing
  1. Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol
  1. Telepresence
  1. System in Package
  1. Smart Memories
  1. Slammer Worm
  1. Pixie Dust
  1. Linux Kernel 2.6
  1. Lamp Technology
  1. Humanoid Robot
  1. HTAM
  1. Haptic Technology
  1. Elastic Quotas
  1. Diamond chip
  1. Digital Rights Management
  1. A Plan For No Spam
  1. BEOWULF Cluster
  1. Digital Scent Technology
  1. Dynamic TCP Connection Elapsing
  1. Virtual Retinal Display
  1. Wireless LAN Security
  1. Chameleon Chip
  1. Intelligent RAM
  1. iSCSI
  1. Linux Kernel 2.6
  1. Real Time Application Interface
  1. GPS
  1. HALO
  1. BitTorrent
  1. Compositional Adaptation
  1. Rover Technology
  1. Semantic Web
  1. Cooperative Linux
  1. Longhorn