In this thesis, I suggest a way of using voice to make up for the weak points in current security systems and downsize the load of users by affording natural and convenient speaker verification. This thesis contains the basic technology to build a practical speaker verification system using neural networks and research for implementing the system, which guarantees reliability. Firstly, this thesis will focus on making up for the weak points in current existing methods by applying the characteristics of neural networks like learning ability, parallel processing ability and adaptability. And this thesis will advance to characteristic presentation and extracting method, technique of dividing voice signal, research on new neural network model t...
This paper compares kernel-based probabilistic neural networks for speaker verification based on 138...
Speaker recognition is becoming an increasingly popular technology in today’s society. Besides being...
Speaker Recognition is a process by which a machine authenticates the claimed of a person from voice...
Speaker recognizer may be employed as part of a security system requiring user authentication. Mostl...
Speaker authentication has been developed rapidly in the last few decades. This research work attemp...
xvii, 158 leaves : ill. (some col.) ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P EIE 2005 YiuSp...
Data verification systems evolve towards a more natural system using biometric media. In daily inter...
Speaker verification is the process of authenticating a person’s identity. Most of the available spe...
In this paper, wavelet transform technique and neural network is used for development of Speak...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
\Lambda, sundarg.iitm.ernet.in Abstract In this paper, we propose two neural network-based approache...
In this paper we investigate the use of deep neural networks (DNNs) for a small footprint text-depen...
The system on the computer can make everything run quickly and efficiently, so that it becomes a too...
Speaker recognition is defined as to make sure that if the person is the same person he claims to be...
One solution to the crime and illegal immigration problem in South Africa may be the use of biometri...
This paper compares kernel-based probabilistic neural networks for speaker verification based on 138...
Speaker recognition is becoming an increasingly popular technology in today’s society. Besides being...
Speaker Recognition is a process by which a machine authenticates the claimed of a person from voice...
Speaker recognizer may be employed as part of a security system requiring user authentication. Mostl...
Speaker authentication has been developed rapidly in the last few decades. This research work attemp...
xvii, 158 leaves : ill. (some col.) ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P EIE 2005 YiuSp...
Data verification systems evolve towards a more natural system using biometric media. In daily inter...
Speaker verification is the process of authenticating a person’s identity. Most of the available spe...
In this paper, wavelet transform technique and neural network is used for development of Speak...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
\Lambda, sundarg.iitm.ernet.in Abstract In this paper, we propose two neural network-based approache...
In this paper we investigate the use of deep neural networks (DNNs) for a small footprint text-depen...
The system on the computer can make everything run quickly and efficiently, so that it becomes a too...
Speaker recognition is defined as to make sure that if the person is the same person he claims to be...
One solution to the crime and illegal immigration problem in South Africa may be the use of biometri...
This paper compares kernel-based probabilistic neural networks for speaker verification based on 138...
Speaker recognition is becoming an increasingly popular technology in today’s society. Besides being...
Speaker Recognition is a process by which a machine authenticates the claimed of a person from voice...