The present disclosure relates to normalizing text and more specifically to language independent text normalization using atomic tokens and classification labels.
Text normalization is a way of adapting text to a standard form, such as for comparison to other normalized text or for facilitating searches. One approach to data-driven text normalization is to annotate text data manually in concordance format, according to a set of category labels. This approach breaks data processing into two parts, (a) a version of Named Entity extraction, and (b) subsequent actions based on the entities. This approach seeks, approximately, to reproduce the steps that might be carried out in a traditional hand-crafted text-to-speech (TTS) system. The patterns to be classified are generally language-specific, and are typically separated by white space. This approach does not translate well to other languages. For example, when moving English to Asian languages, two major differences are calculating word boundaries, and that not all the English labels are relevant for Asian languages. The complexity of the rules required for dealing with the broad categories of text are difficult to overcome.
In Asian languages, letter expansions are generally much simpler than for English while number expansions are similar in complexity. One approach exemplified by Chinese text focuses solely on normalization rather than word splitting. This approach uses a Finite State Automaton (FSA) to give an initial classification followed by a Maximum Entropy (MaxEnt) classifier to distinguish subclasses. The Moses Machine Translation (MT) framework considers normalization to be a form of machine translation. The primary goal of the Moses MT framework is to evaluate how effective Statistical Machine Translation (SMT) is in the context of normalizing text in a language, both in terms of having unskilled “translators” and the pros and cons of combinations of SMT and language-independent and language-specific rules. None of these approaches is language neutral and none normalizes text for both TTS and automatic speech recognition (ASR) purposes.
A system, method and computer-readable storage devices are disclosed which train data for normalizing text in a language neutral way and so that the normalized text can be used for both TTS and ASR. A system operating per this disclosure defines simple “atomic” tokens that are processed by a MaxEnt-based classifier trained on labeled text data. The labels correspond to pronunciations rather than any predefined Named Entity categories. The annotation of the training data is a relatively simple task for non-experts. For each class, the system uses a distinct text conversion process to provide normalized text that can be spoken by a synthesizer or used for ASR text normalization purposes.
The system operation is based on two observations. First, Unicode provides a general framework that can be used to divide text into meaningful chunks (“atomic” tokens). Second, a strong correlation exists between the “atomic” tokens and pronunciations. The tokenization approach described herein combines with a data-driven classification scheme, followed by class-determined actions to convert text to normalized form. The classification labels are based on pronunciation, unlike alternative approaches that typically employ Named Entity-based categories. Labels based on pronunciation can more readily be adapted to new languages. Annotation of training data by non-experts is also straightforward. Occasionally conversion from tokens to a normalized form will require reordering, also accommodated by this disclosure. The systems disclosed herein apply tokenization and labeling training, each of which will be discussed below.
Such a system for text normalization can be constructed in various embodiments and configurations. Some of the various embodiments of the disclosure are described in detail below. While specific implementations are described, it should be understood that this is done for illustration purposes only. Other components and configurations may be used without parting from the spirit and scope of the disclosure. A brief introductory description of a basic general purpose system or computing device in
With reference to
The system bus 110 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input/output (BIOS) stored in ROM 140 or the like, may provide the basic routine that helps to transfer information between elements within the computing device 100, such as during start-up. The computing device 100 further includes storage devices 160 or computer-readable storage media such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive, solid-state drive, RAM drive, removable storage devices, a redundant array of inexpensive disks (RAID), hybrid storage device, or the like. The storage device 160 can include software modules 162, 164, 166 for controlling the processor 120. The system 100 can include other hardware or software modules. The storage device 160 is connected to the system bus 110 by a drive interface. The drives and the associated computer-readable storage devices provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for the computing device 100. In one aspect, a hardware module that performs a particular function includes the software component stored in a tangible computer-readable storage device in connection with the necessary hardware components, such as the processor 120, bus 110, display 170, and so forth, to carry out a particular function. In another aspect, the system can use a processor and computer-readable storage device to store instructions which, when executed by the processor, cause the processor to perform operations, a method or other specific actions. The basic components and appropriate variations can be modified depending on the type of device, such as whether the device 100 is a small, handheld computing device, a desktop computer, or a computer server. When the processor 120 executes instructions to perform “operations”, the processor 120 can perform the operations directly and/or facilitate, direct, or cooperate with another device or component to perform the operations.
Although the exemplary embodiment(s) described herein employs the hard disk 160, other types of computer-readable storage devices which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks (DVDs), cartridges, random access memories (RAMs) 150, read only memory (ROM) 140, a cable containing a bit stream and the like, may also be used in the exemplary operating environment. Tangible computer-readable storage media, computer-readable storage devices, or computer-readable memory devices, expressly exclude media such as transitory waves, energy, carrier signals, electromagnetic waves, and signals per se.
To enable user interaction with the computing device 100, an input device 190 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device 170 can also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems enable a user to provide multiple types of input to communicate with the computing device 100. The communications interface 180 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic hardware depicted may easily be substituted for improved hardware or firmware arrangements as they are developed.
For clarity of explanation, the illustrative system embodiment is presented as including individual functional blocks including functional blocks labeled as a “processor” or processor 120. The functions these blocks represent may be provided through the use of either shared or dedicated hardware, including, but not limited to, hardware capable of executing software and hardware, such as a processor 120, that is purpose-built to operate as an equivalent to software executing on a general purpose processor. For example the functions of one or more processors presented in
The logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit; and/or (3) interconnected machine modules or program engines within the programmable circuits. The system 100 shown in
One or more parts of the example computing device 100, up to and including the entire computing device 100, can be virtualized. For example, a virtual processor can be a software object that executes according to a particular instruction set, even when a physical processor of the same type as the virtual processor is unavailable. A virtualization layer or a virtual “host” can enable virtualized components of one or more different computing devices or device types by translating virtualized operations to actual operations. Ultimately however, virtualized hardware of every type is implemented or executed by some underlying physical hardware. Thus, a virtualization compute layer can operate on top of a physical compute layer. The virtualization compute layer can include one or more of a virtual machine, an overlay network, a hypervisor, virtual switching, and any other virtualization application.
The processor 120 can include all types of processors disclosed herein, including a virtual processor. However, when referring to a virtual processor, the processor 120 includes the software components associated with executing the virtual processor in a virtualization layer and underlying hardware necessary to execute the virtualization layer. The system 100 can include a physical or virtual processor 120 that receive instructions stored in a computer-readable storage device, which cause the processor 120 to perform certain operations. When referring to a virtual processor 120, the system also includes the underlying physical hardware executing the virtual processor 120.
Having disclosed some components of a computer system which can be used to implement all or part of the principles set forth herein, the disclosure returns to a discussion of normalizing text. The system tokenizes input text, such as a corpus of Unicode text, into “atomic” components, then performs feature extraction on the tokenized text to generate training data for normalizing text.
The tokenizer 204 processes the input text 202 in a more general way than space-based tokenization. For example, languages with ideograms typically don't use spaces between words. The labeler 208 selects labels from label sets 210 to assign to the tokenized text, such as the example label sets 210 provided below in Table 1. The example label sets 210 are not limiting. The label sets 210 can include a larger or smaller number of labels than the ones shown in Table 1. Each label in the label sets 210 has a corresponding action or behavior for that type of labeled token.
The labels in the label sets 210 are based on categories, but refer only to pronunciations and not to any specific Named Entities. In this example, only EXPAND, SPLIT and REORDER have sub-labels. Two labels deserve some additional comments. SPLIT is used in cases such as “3rd,” which is tokenized as “3” and “rd”, where more than one token is required to be present to pronounce a word properly. In this case, the label would be “SPLIT:third.” Sometimes pronunciations are reordered, e.g. “$12 billion” is pronounced “twelve billion dollars.” In this case, automatic or human labelers use REORDER to indicate what happens. In English one common example of REORDER is in relation to currency examples, while in Chinese REORDER also applies to percentages.
The labeling guidelines were refined over time to facilitate the manual labeling task. For example REORDER originally applied to all the members of a group to be reordered, but after consideration of test data, was modified to apply to just the currency element, at least for English, which was more reliable.
For actions, certain basic actions such as SPELL and ASWORD are essentially language-independent. Others may be more limited in scope. A set of possible actions can be shared across languages. If new actions are needed, the system can expand the list of available actions in a language-independent way. Some actions, such as EXPAND, will inevitably be mostly language-specific.
The labeler 208 outputs labeled atomic tokens from the input text 202 to a feature extraction module 212. The feature extraction module 212 performs two steps. First, the feature extraction module 212 extracts a number of morphological and lexical text features from every token and its n-left/n-right tokens. In one embodiment, the number of morphological and lexical text features is 28. These feature extraction module 212 can compute and extract features either from the token or the word from which the token originates. Some examples are: is_number_only, is_alpha_only, has_money_sign, token_string, token_shape, token_length, is_token_in_dictionary, etc. The feature extraction module 212 can construct a feature vector by concatenating the features of the n-left context tokens, the token itself, and n-right context tokens. The feature set can include both categorical and binary features. Binary features can be represented as categorical and can also use n-grams of features. In one embodiment, binary features are only included if the feature is present. The feature extraction module 212 generates training data 214 which can be used to train an automatic labeler, tokenizer, or other component of a text processing system.
An experimental system for text normalization using atomic tokens used the Gigaword corpus as the base corpus to generate the training data. Since the majority of words in a corpus likely fall in the category ASWORD, labeling the whole corpus blindly was an inefficient use of labeling resources. An algorithm extracts patterns that most likely require some non-ASWORD form of normalization.
In order to generate the patterns, the system passes the word list through a filter which performs as below:
[a-z]+→a
[A-Z]+→A
[0-9]+→0
This process extracts or converts the word list into a pattern list 302. Next, the system generates a list of N most frequent words 304, called “target” words per pattern. Then, the system extracts all instances of target words 306 alongside their left/right context words from the base corpus. For every target token, the system constructs each line as concordance data 308 by composing three tab-separated columns as shown in
An example classifier can offer the choice between standard sparse vector input (SVM lite format) and unstructured input that requires further feature extraction (for instance text, with n-gram feature extraction). Unstructured input can be used when textual features are available. The example classifier can implement Large Margin algorithms such as SVMs, AdaBoost, or Regularized Maximum Entropy.
An experimental classifier operated using two classification algorithms: linear SVM and MaxEnt. The experimental classifier processed various n-grams (n=1 to n=4) and two context window sizes, ±2 and ±4, to investigate the effect of context information on the classification error rate. The experimental classifier also used different cut-off thresholds for the n-gram frequency.
Table 3, reproduced below, summarizes the experimental results for various setups. The experimental classifier achieved the lowest error rate with a 3-gram MaxEnt model with ±2 context and a cut-off frequency of 1. These configurations are based on a context of ±4 that shows evidence of the model overfitting the training data.
The experimental data showed that the largest confusion occurs between the class EXPAND and SPELL. This is mostly on abbreviations such as “pm” for which the proper normalization action can only be determined based on the context in which the token is present. For example, in some cases the “PM” token expands to “prime minister” such as in a context where the French PM speaks to the nation. In other cases, the “PM” token is pronounced “pee-em” such as in the context of “I'll meet you at 3:45 pm.” The EXPAND class covers non-overlapping categories and could be split into three distinct categories. For some feature sets this results in an improvement, but in other configurations the reverse was found to be true.
An example system configured to perform the method receives a text corpus (402). The text corpus can be from a single source or of a single type, or can be from multiple sources and be of multiple types. For example, the text corpus can originate from a website, from a book, a chat history, emails, and so forth. The text corpus can be authored by multiple individuals. Then the system can tokenize the text corpus into tokens, each token including one of a sequence of letters, a sequence of digits, or punctuation (404). The tokens are not large size tokens such as a word or a space separated token, but are instead “atomic tokens.” This approach is useful because a larger token such as the word ‘token’ itself would require extra meta information (indicating, for example, whether the token is a date, a number, a time, a name, and so forth) in order to then normalize the text. The meta information would require expert labeling which is expensive and time consuming. Instead, these atomic tokens, such as the tokens indicated in the token column of Table 2, are more or less the same and non-experts can easily label the data. Atomic tokens can include any concatenation of characters, whether alphanumeric, punctuation, or others. Classes can define and label the tokens. The token and label framework is based on how the token is pronounced, rather than what it is. Because the tokens are labeled based on pronunciation, this approach is language independent. The tokenizer can work on Unicode text, which includes most languages.
The system can further examine the context of the tokens, such as the left and right context in the text, to decide how to classify the tokens. The context of the token can provide all the features so the system can label the token correctly. Sometimes different tokens are pronounced differently in different contexts (PM as in time versus PM as in prime minister). The system can decide from context which pronunciation or which classification to select.
Based on a language-independent pattern list generated from training data and further based on pronunciation guidelines or features associated with each token, the system generates speech from the tokens in the text corpus (406). Alternatively, the system can generate pronunciation guidelines or categorize the token into a class that instructs a text-to-speech module how to treat the token. The pronunciation guidelines can include at least one of spell, expand, reorder, asword, digits, cardinal, split, none, and foreign. The system can further generate speech for a given token based on N tokens to a left context or a right context of the given token.
After getting the data, training the model, the system can use that normalized text in conjunction with or during ASR or TTS. The system receives the text to be rendered by the TTS, normalizes the text, and passes the normalized atomic tokens to the TTS system. The text and tokens provided are more robust, and lead to higher accuracy speech synthesis. In this way, the system normalizes text in a data driven way, so that the normalizer and resulting output improve as more data is provided. This is a distinct improvement over text normalization using rules and regular expressions alone.
The method and other principles set forth herein provide a language-neutral way to normalize text for TTS and ASR. This tokenization method is combined with a data-driven classification scheme, followed by class-determined actions. The classification labels are based on pronunciation, unlike alternative approaches that typically employ Named Entity based categories. The classification labels are easily adaptable to new languages. Further, non-experts can manually annotate training data. Active learning can enrich the training data with examples intended to reduce inter-class confusion.
Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage devices for carrying or having computer-executable instructions or data structures stored thereon. Such tangible computer-readable storage devices can be any available device that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as described above. By way of example, and not limitation, such tangible computer-readable devices can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other device which can be used to carry or store desired program code in the form of computer-executable instructions, data structures, or processor chip design. When information or instructions are provided via a network or another communications connection (either hardwired, wireless, or combination thereof) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable storage devices.
Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.
Other embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. For example, the principles herein apply to a unified framework of ASR and TTS using a common normalization and dictionary, but can also apply to performing ASR and TTS using a common dictionary without normalization. Various modifications and changes may be made to the principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure. Claim language reciting “at least one of” a set indicates that one member of the set or multiple members of the set satisfy the claim.
The present application is a continuation of U.S. patent application Ser. No. 14/533,589, filed Nov. 5, 2014, the content of which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6321372 | Poirier | Nov 2001 | B1 |
6442523 | Siegel | Aug 2002 | B1 |
6606598 | Holthouse | Aug 2003 | B1 |
6810375 | Ejerhed | Oct 2004 | B1 |
6963832 | Vanhilst | Nov 2005 | B2 |
7092871 | Pentheroudakis | Aug 2006 | B2 |
7302394 | Baray | Nov 2007 | B1 |
7672832 | Huang et al. | Mar 2010 | B2 |
8024174 | Wang et al. | Sep 2011 | B2 |
8027837 | Silverman et al. | Sep 2011 | B2 |
8352270 | Wang et al. | Jan 2013 | B2 |
8612205 | Hanneman et al. | Dec 2013 | B2 |
8626486 | Och et al. | Jan 2014 | B2 |
8688455 | Bells et al. | Apr 2014 | B2 |
8701162 | Pedersen | Apr 2014 | B1 |
8849651 | Selegey et al. | Sep 2014 | B2 |
8924212 | Allauzen | Dec 2014 | B1 |
20010056344 | Ramaswamy | Dec 2001 | A1 |
20030069880 | Harrison | Apr 2003 | A1 |
20030088415 | Kobal | May 2003 | A1 |
20030149562 | Walther | Aug 2003 | A1 |
20040073427 | Moore | Apr 2004 | A1 |
20040078204 | Segond | Apr 2004 | A1 |
20050267757 | Iso-Sipila | Dec 2005 | A1 |
20060116862 | Carrier | Jun 2006 | A1 |
20060149558 | Kahn | Jul 2006 | A1 |
20060277030 | Bedworth | Dec 2006 | A1 |
20070016398 | Buchholz | Jan 2007 | A1 |
20070294179 | Krawetz | Dec 2007 | A1 |
20080147656 | Kahn | Jun 2008 | A1 |
20090037174 | Seltzer | Feb 2009 | A1 |
20090157830 | Kim | Jun 2009 | A1 |
20090240501 | Chen | Sep 2009 | A1 |
20090326925 | Crider | Dec 2009 | A1 |
20100010815 | Bells | Jan 2010 | A1 |
20100306260 | Dejean | Dec 2010 | A1 |
20100332224 | Makela et al. | Dec 2010 | A1 |
20110040552 | Van Guilder | Feb 2011 | A1 |
20120089400 | Henton | Apr 2012 | A1 |
20120179694 | Sciacca | Jul 2012 | A1 |
20120290511 | Frank | Nov 2012 | A1 |
20120303355 | Liu | Nov 2012 | A1 |
20120330971 | Thomas | Dec 2012 | A1 |
20130006973 | Caldwell | Jan 2013 | A1 |
20130007648 | Gamon | Jan 2013 | A1 |
20130103624 | Thieberger | Apr 2013 | A1 |
20130173258 | Liu | Jul 2013 | A1 |
20130246098 | Habboush | Sep 2013 | A1 |
20130339000 | Zhang et al. | Dec 2013 | A1 |
20140201113 | Harz | Jul 2014 | A1 |
20140222415 | Legat | Aug 2014 | A1 |
20160110528 | Gupta | Apr 2016 | A1 |
Entry |
---|
Xydas et al., “Text Normalization for the Pronunciation of Non-standard Words in an Inflected Language,” Methods and Applications of Artificial Intelligence. Springer Berlin Heidelberg, 2004. 390-399. |
Mollá, Diego, Menno van Zaanen, and Steve Cassidy. “Named entity recognition in question answering of speech data.” Proceedings of the Australasian Language Technology Workshop. 2007. |
Liberman, Mark Y., and Kenneth W. Church. “Text analysis and word pronunciation in text-to-speech synthesis.” Advances in speech signal processing (1992): 791-831. |
Sproat et al., “Normalization of Non-Standard Words,” Computer Speech and Language, 2001, 15, pp. 287-333. |
Olinsky et al., “Non-Standard Word and Homograph Resolution for Asian Language Text Analysis,” ICSLP 2000, Beijing, 4 pages. |
Jia et al., “Text Normalization in Mandarin Text-to-Speech System,” ICASSP 2008, Las Vegas, pp. 4693-4696. |
Zhou et al., “A Three-Stage Text Normalization Strategy for Mandarin Text-to-Speech Systems,” ISCSLEP 2008, pp. 1-4. |
Schlippe et al., “Text Normalization based on Statistical Machine Translation and Internet User Support,” INTERSPEECH 2010, 4 pages. |
Koehn et al., “Moses: Open Source Toolkit for Statistical Machine Translation,” Proceedings of the 45th Annual Meeting of the ACL on Interactive Poster and Demonstration Sessions, Prague, Czech Republic, 2007, p. 177-180. |
Eds: Mark Davis, Laurentiu Iancu, and Ken Whistler, “Unicode Character Database,” http://www.unicode.org/reports/tr44/2013. |
Graff et al., “English Gigaword Third Edition,” Linguistic Data Consortium, Philadelphia 2007. |
Reichel et al., Text Preprocessing for speech synthesis, 2006, University of Munich, full document. |
Number | Date | Country | |
---|---|---|---|
20190371294 A1 | Dec 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14533589 | Nov 2014 | US |
Child | 16542514 | US |