We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Speech Data Sample Clauses

Speech Data. To assess the labeling conventions of K-ToBI and to demonstrate that these conventions are applicable to various types of speech, we selected twenty utterances representing five different discourse types: TV drama, interview, news, text reading, and story reading. Four sentences were selected from each discourse type. These sentences contained a total of 153 words, and lasted a total of 78.5 seconds. 18 speakers (8 male and 10 female) produced the sentences. Table 1 shows a summary of the speech files: Twenty-one labelers, differing in their experience with intonation transcription and in their familiarity with the ToBI model, participated in the experiment. The labelers were divided into four groups: Group 1 (Experts), Group 2 (Familiar with K- ToBI), Group 3 (Familiar with the British intonation model, but new to K-ToBI and intonation transcription), and Group 4 (Beginners, completely new to any model of intonation or prosodic transcription). Each group included five labelers, except for Group 2 which had six labelers. The labelers came from four sites. Six of the labelers from Site A and all of the labelers from Site B and C were provided with 2-3 hours of lecture by the person in charge of each site during which the labeling conventions and background assumptions of K-ToBI were introduced. Site C had 4 hours of group discussion and a review session after the lecture. Two of the labelers from Site A and the one labeler from Site D performed their transcriptions based on the K-ToBI manual alone. Table 2 shows the distribution of labeler groups at each site. Sites # Experts (G1) # Familiar to K-ToBI (G2) # Familiar toother model (G3) # Beginners (G4) Discourse Types # of Utter- ances # of Words # of Speakers Total durat- ion (ms) interview 4 29 2 female 14,911 news 4 35 2 male, 2 female 16,869 reading 4 28 2 male, 2 female 15,849 story 4 30 2 male, 2 female 16,086 We selected 20 speech files from the data bank in Korea. The first author sent the following materials to the person in charge at each site: 1) the speech files in wave format, 2) the K-ToBI manual, version 3, together with the example sentence files mentioned in the manual, and 3) a Hangul file in which the sentences from each speech file were written in Hangul orthography with empty spaces below for writing tones and break indices. The wave files and the Hangul files for writing transcriptions were necessary because not all sites used the same speech analysis software (they ranged from xwaves ...
AutoNDA by SimpleDocs
Speech Data. To assess the labeling conventions of K-ToBI and to demonstrate that these conventions are applicable to various types of speech, we selected twenty utterances representing five different discourse types: TV drama, interview, news, text reading, and story reading. Four sentences were selected from each discourse type. These sentences contained a total of 153 words, and lasted a total of 78.5 seconds. 18 speakers (8 male and 10 female) produced the sentences. Table 1 shows a summary of the speech files: Discourse Types # of Utter-ances # of Words # of Speakers Total durat- ion (ms) drama 4 31 2 male, 2 female 14,841 interview 4 29 2 female 14,911 news 4 35 2 male, 2 female 16,869 reading 4 28 2 male, 2 female 15,849 story 4 30 2 male, 2 female 16,086 Total 20 153 8 male, 10 female 78,556
Speech Data. If Client receives speech recognition services as part of the Epocrates EHR Service, Epocrates or its licensors may collect and use the audio files, associated transcriptions and log files provided by Authorized Users pursuant to this Agreement or generated in connection with the Epocrates EHR Service (“Speech Data”) to tune, enhance and improve the speech recognition and other components of the Epocrates EHR Service, and other services and products. In accepting the terms and conditions of this Agreement, Client acknowledges, consents and agrees that Epocrates and its licensors may collect the Speech Data as part of the Epocrates EHR Service and that such information shall only be used by Epocrates and its licensors, or third parties acting under the direction of Epocrates or its licensors pursuant to confidentiality agreements, to tune, enhance and improve the speech recognition and other components of the Epocrates EHR Service, and other services and products.
Speech Data. The audio recordings used were sourced from the JASMIN cor- pus [18]. The XXXXXX xxxxxx is a Dutch-Flemish corpus of read and extemporaneous speech collected from children, non- native speakers, and elderly people. Due to time restraints of the session in which the responses were collected, the ques- tionnaire was designed to be relatively short. Eight sentences were selected, each produced by a different non-native speaker of Dutch, aged between 11-17 years (Group 3 in the corpus). Second language (L2) learners were chosen as a reflection of the increasing diversity and multilingualism in society and schools. Furthermore, feedback on intelligibility is particularly benefi- cial for L2 learners. The sentences were extracted from recordings of children reading texts intended for L2 Dutch learners. The sentences were selected based on age-appropriateness for the listeners, in- telligibility, and the number and type of speech and/or reading errors, to produce a sample of sentences ranging in difficulty for each task. During selection the reader’s age, sex and read- ing level were also taken into account to try create a balanced sample. The sentences ranged from six to twelve words, except for one of twenty-one words (S5). 1xxxxx://xxx.xxxxxxxxx.xxx/

Related to Speech Data

  • Product Data Illustrations, standard schedules, performance charts, instructions, brochures, diagrams, and other information furnished by Developer to illustrate a material, product, or system for some portion of the Work.

  • Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.

  • Licensee Data Licensee acknowledges and agrees that Licensee will be solely responsible for backing-up, and taking all appropriate measures to protect and secure, Licensee Data. Licensee acknowledges that Nuix may make, store and maintain back up copies of Licensee Data, but is not obliged to do so. Nuix will not be liable for any loss or corruption of Licensee Data.

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • Customer Data 8.1 You, not bookinglab or JRNI, have sole responsibility for the entry, deletion, correction, accuracy, quality, integrity, legality, reliability, appropriateness, and right to use the Customer Data. bookinglab and JRNI is not responsible for any of the foregoing or for any destruction, damage, loss, or failure to store any Customer Data beyond its reasonable control or resulting from any failure in data transmission or operation of the Booking Service by you. 8.2 As of the MSA Start Date, JRNI is certified under ISO 27001 and shall maintain an information security program for the Services that complies with the ISO 27001 standards or such other standards as are substantially equivalent to ISO 27001. 8.3 If JRNI and/or bookinglab processes any Personal Data on your behalf when performing its obligations under this Agreement, the Parties acknowledge that you shall be the Data Controller and JRNI and/or bookinglab shall be a Data Processor and in any such case: (a) you shall ensure that you are entitled to transfer the relevant Customer Personal Data to JRNI and/or bookinglab so that they may lawfully use, process and transfer the Customer Personal Data in accordance with this Agreement on your behalf; (b) you shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable Data Protection Laws; (c) each Party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage; and (d) notwithstanding any other provision of this Agreement, but subject always to Appendix B(1) Data Protection and B(2) Data Processing Activities, nothing shall prevent JRNI or bookinglab from disclosing Customer Personal Data or Customer Data to their Group Companies, Affiliates and third party service providers as necessary to provide the Services in accordance with clause 3, and otherwise in order to comply with Applicable Law or at the request of a governmental, regulatory or supervisory authority. 8.4 From the MSA Start Date the Parties shall comply with Appendix B(1) Data Protection and Appendix B(2) Data Processing Activities 8.5 ensure that Customer Data and Personal Data deemed as a special category of Data under GDPR is not given to us in any form unless pre-agreed by us in writing 8.6 You are solely responsible and liable for any transfer of Customer Data made by you (or made by JRNI or bookinglab at your request) from the Booking Service to a third party and for ensuring that such transfer is in compliance with the Parties' obligations under the Data Protection Laws.

  • Customer Materials Subject to Section 4(a), all right, title and interest (including all Intellectual Property Rights) in and to the Customer Materials are owned by Customer or Customer’s suppliers.

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • Programming Each electronic voting system used is specially pro- grammed by the firm PG Elections inc. for the munici- pality in order to recognize and tally ballot papers in accordance with this agreement.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!