Thesis (M.A.)--Özyeğin University, Graduate School of Sciences and Engineering, Department of Computer Science, October 2015.There has been substantial progress in the speaker verification field in recent years. I-vector based approach in particular received significant attention due to its high performance. Improvements in the verification technology also led to concerns about spoofing attacks to which the i-vector based methods are vulnerable. Here, we first investigated the vulnerability of an i-vector based verification system to attacks using statistical speech synthesis (SSS) with a particular focus on the case where the attacker has only a very limited amount of data from the target speaker. However, it is well-known that speech that...
ÖZETlİSE ÖĞRENCİLERİNİN EBOB-EKOK PROBLEMLERİNİN ÇÖZÜM SÜREÇLERİNİN KAVRAMSAL VE İŞLEMSEL BİLGİ AÇIS...
It is expected that the grieving process will be completed within about 6 months after the loss of a...
The communicative content taking place between speakers and listeners yield variation in which peopl...
Broadcast nature of wireless communications enables reaching multiple parties simultaneously. Howeve...
Speech/voice recognition by machines has been a topic of interest since 1950s. Research ...
Kill assessment is the ability to decide whether the relevant threat has been hit or not as a result...
Internet of Things (IoT) is a heterogeneous network of constrained devices connected both to each ot...
The configuration space of a software system forms a combinatorial space, whose large size generally...
The scalability problem in blockchain technology seems to be the essential issue to be solved. It is...
With the advances in unmanned aerial vehicle (UAV) technology, the variety of UAVs has increased and...
Tez (Doktora) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 1985Thesis (Ph.D.) -- İstanb...
Collective activity recognition, which analyses the behavior of groups of people in videos, is an es...
Personalization is a technique used in Web search engines to improve the effectiveness of in- forma...
In this study, the effect of different ions and different types of spacers on salinity gradient powe...
Sözcük edinimi ikinci dil sınıflarındaki temel görevlerden biridir. Birçok dil öğretmeni sözcük edin...
ÖZETlİSE ÖĞRENCİLERİNİN EBOB-EKOK PROBLEMLERİNİN ÇÖZÜM SÜREÇLERİNİN KAVRAMSAL VE İŞLEMSEL BİLGİ AÇIS...
It is expected that the grieving process will be completed within about 6 months after the loss of a...
The communicative content taking place between speakers and listeners yield variation in which peopl...
Broadcast nature of wireless communications enables reaching multiple parties simultaneously. Howeve...
Speech/voice recognition by machines has been a topic of interest since 1950s. Research ...
Kill assessment is the ability to decide whether the relevant threat has been hit or not as a result...
Internet of Things (IoT) is a heterogeneous network of constrained devices connected both to each ot...
The configuration space of a software system forms a combinatorial space, whose large size generally...
The scalability problem in blockchain technology seems to be the essential issue to be solved. It is...
With the advances in unmanned aerial vehicle (UAV) technology, the variety of UAVs has increased and...
Tez (Doktora) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 1985Thesis (Ph.D.) -- İstanb...
Collective activity recognition, which analyses the behavior of groups of people in videos, is an es...
Personalization is a technique used in Web search engines to improve the effectiveness of in- forma...
In this study, the effect of different ions and different types of spacers on salinity gradient powe...
Sözcük edinimi ikinci dil sınıflarındaki temel görevlerden biridir. Birçok dil öğretmeni sözcük edin...
ÖZETlİSE ÖĞRENCİLERİNİN EBOB-EKOK PROBLEMLERİNİN ÇÖZÜM SÜREÇLERİNİN KAVRAMSAL VE İŞLEMSEL BİLGİ AÇIS...
It is expected that the grieving process will be completed within about 6 months after the loss of a...
The communicative content taking place between speakers and listeners yield variation in which peopl...