The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Vowel onset point (VOP) is the instant of time at which the vowel region starts in a speech signal. The VOPs are used as anchor points to design various speech based systems. Different algorithms exist in the literature to identify the occurrences of vowels in continuous spoken utterances. The algorithm based on combined evidences derived from source excitation, spectral peaks and modulation spectrum...
Statistical pattern recognition has been considered to be one of the most successful approaches in the recent advancement of speech and speaker recognition. Out of all the approaches Hidden Markov Models, Gaussian mixture models and Vector Quantization has been considered to be one of the most successful techniques in regards to the performance of the speaker recognition systems. However the performance...
Speaker verification is among the widely used biometrics which generally offers more secure authentication for user access compared to regular passwords. Speaker verification is the process of automatically authenticating the identity of the speaker in order to protect the resources by controlling its access. Usually identity is claimed by presenting a unique personal possession, here in this case...
Speaker verification is the process of automatically authenticating the identity of the speaker in order to protect the resources by the method of access control. Usually identity is claimed by presenting a unique personal possession, here in this case a sample of the user's voice. This paper presents an approach of text dependent speaker verification using MFCC as feature vector with Algebraic Approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.