Computer Science and Information Technologies, Computer Science and Information Technologies 2006

Font Size: 
Parallel Implementation of Baum-Welch Algorithm
M. V. Anikeev, O. B. Makarevich

Last modified: 2020-12-26


Besides the fact that hidden Markov models (HMMs) became a state-of-the-art technique for speech recognition applications, they find major use in other areas as well. Some problems require huge training sets for fitting HMMs to experimental data, which leads to increased complexity of training algorithms. We propose a simple strategy of organizvng parallel HMM training, which can be effectively implemented using inexpensive network clusters.


Baum-Welch Algorithm; Parallel programming; Markov models


1. Rabiner L.R. 'A tutorial on Hidden Markov Models and selected applications in speech recognition". In: Proc. of IEEE, 1986; 77(2): pp. 257-286.2. "Noise reduction in speech application", Davis G.M. (ed). CRC Press LLC, 2002.
3. Turin W., van Nobelen R. "Hidden Markov modeling of flat fading channels". IEEE Journal on Selected Areas is Communications, 1998; 16: 1809-1817.
4. Nechyba M.C., Xu Y. "Stochastic similarity for validating human control strategy models". IEEE Trans. Robotics and Automation, 1998, 14(3): 437-451.
5. Mangold S., Kyriazakos S. -'Applying pattern recognition techniques based on hidden Markov models for vehicular position location in cellular networks". In: Proc. of IEEE Vehicular Technology Conference, Vol. 2, 1999, pp. 780-784.
6. Eickeller S., Müller S., Rigoll G. "Recognition of JPEG compressed face images based on statistical methods". Image and Vision Computing, 2000; 18: 279-287.
7. Elms A.J., Procter S., Illingworth J. ''The advantage of using and HMM-based approach for faxed word recognition". International Journal on Document Analysis and Recognition (IJDAR), 1998; 1(1): 18-36.
8. Kulp D., Haussler D, Reese M.G., Eeckman F.H. "A generalized hidden Markov model for the recognition of human genes in DNA". In: Proc. of 4th International Conference on Intelligent Systems for Molecular Biologv, 1996, pp. 134-142.
9. Lane T. ''Hidden Markov models for human/computer interface modeling". In: Proc. of the IJCA1-99 Workshop on Learning About Users, 1999 pp. 35-44.
10. Park H.-J., Cho S.-B. "Efficient anomaly detection by modeling privilege flows using hidden Markov model". Computers & Security, 2003; 1(22): 45-55.
11. I l . Ye N. "A Markov chain model of temporal behavior for anomaly detection". In: Proc. of 2000 IEEE Workshop on Information Assurance and Security, 2000, pp. 171-174.12. War-render C., Forrest S., Pearlmutter B. "Detecting intrusions using system calls: alternative data models". In: Proc. of 1999 IEEE Symposium on Security and Privacy, 1999, pp. 133-145.13. Turin W. "Unidirectional and parallel Baum-Welch algorithms". In: IEEE Trans. of Speech and Audio Processing, 1998, pp. 516-523.14. Espinosa-Manzo A., López-López A., Arias-Estrada M,O. "Implementing Hidden Markov Models in a Hardware Architecture". In: Proc. of International Meeting of Computer Science ENC '01, Vol. Il. Aguascalientes, México, 2001, pp. 1007-1016.

Full Text: PDF