A Novel Approach for Text Dependent Speaker Recognition
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature Matching are introduced to authenticate person in security system. In this paper comparison of identification rate of combination of Liner Predictive Coding Coefficients (LPCC) and Mel Frequency Cepstral Coefficients (MFCCs) with feature matching techniques like Vector Quantization (VQ) and Gaussian Mixture Models (GMM) is carried out using Matlab Simulation.
Authors and Affiliations
Tejal Chauhan, Hemant Soni, Sameena Zafar
A Novel approach on ΙΈ - Disposition Pulse Width Modulation for Modular Multilevel Inverter
In this project implemented a novel approach in the modulation technique based on selective virtual loop mapping, to attain dynamic capacitor voltage balance without any compensated signal.An improvised proposed metho...
A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam
In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then r...
Wavelet Based Dual Encoding Lossless Medical Image Compression
Medical image compression using dual encoding scheme which helps in lossless image compression and wavelet helps in increasing the sparsity of the image. Dual encoding scheme comprised with Run length Coding and 8X8...
Mobile Positioning Techniques in GSM Cellular Networks based on Signal Strength
Locating the site of a mobile user with a high degree of correctness is a research interest that holds the key to a get through in many service challenges faced by operators in the wireless communication world. The b...
A Mixture Cloud Approach For Safe Official Deduplications.
Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machin...