Browse Definitions :
Definition

noisy channel model

The noisy channel model is a framework used in natural language processing (NLP) to identify the correct word in situations where it is unclear. The framework helps detect intended words for spell checkers, virtual assistants, translation programs, question answering systems and speech to text software.

Noise, in this context, is anything that obscures signals and data. The noisy channel model is so-named because the original signal – the intended word -- is obscured in transmission when disruptions or errors create noise in the channel. In this case, noise could consist of a misspelling in written language, for example, or ambient sounds, mispronunciation or slurred speech in spoken language.

Here’s a basic example of how the noisy channel model might work with a spell check program:

When a word is not found in the spell check dictionary, it is identified as a misspelling and candidate words are suggested based on their probability of being the intended word, usually as a result of how close those words are to the misspelling. As a rule, the most likely candidates will involve a single change, and there are four different types of single-change errors: deletion, insertion, substitution and reversal. If the misspelled word is acress, for example, acres could have been intended but an extra s added; actress could have been intended but the t missed; across could have been intended but e typed instead of o; caress could have been intended but the first two letters typed in the wrong sequence. Thus, if the user types acress, the spell check program might suggest those four words.

Due to the vagaries of human speech and the potential for actual noise, speech recognition software has additional challenges to text-based systems. However, the basic framework is similar.

This was last updated in August 2019

Continue Reading About noisy channel model

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • cyberterrorism

    Cyberterrorism is often defined as any premeditated, politically motivated attack against information systems, programs and data ...

  • click fraud (pay-per-click fraud)

    Click fraud -- sometimes called 'pay-per-click fraud' -- is a type of fraud that artificially inflates traffic statistics for ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close