Speaker authentication system using soft computing approaches
Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-L...
| Main Authors: | Abdul Rahman, Abdul Wahab, See Ng, Goek, Dickiyanto, Romy |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2005
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/38183/ http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf |
Similar Items
Integrated biometric verification system using soft computing approach
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2007)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2007)
Feature extraction for neural-fuzzy inference system
by: Quek, Chai, et al.
Published: (2003)
by: Quek, Chai, et al.
Published: (2003)
Driving profile modeling and recognition based on soft computing approach
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009)
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002)
by: Mohd Shahman , Samsul Ambia
Published: (2002)
Soft computing approach for solving elevator scheduling problem
by: Norzatul Hajar, Abd Majid
Published: (2010)
by: Norzatul Hajar, Abd Majid
Published: (2010)
A context-aware authentication method using blockchain for pervasive computing
by: Ng, Miao Xuan
Published: (2021)
by: Ng, Miao Xuan
Published: (2021)
Understanding brain developmental disorder based on EEG in soft computing approach
Published: (2011)
Published: (2011)
Implementation of speaker identification system by means of personal computer
by: Shaikh Salleh, Sheikh Hussain, et al.
Published: (2000)
by: Shaikh Salleh, Sheikh Hussain, et al.
Published: (2000)
Fingerprint authentication system using MATLAB
by: Gunawan, Teddy Surya, et al.
Published: (2011)
by: Gunawan, Teddy Surya, et al.
Published: (2011)
Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2017)
by: Nematollahi, Mohammad Ali, et al.
Published: (2017)
Using soft computing methods as an effective tool in predicting surface roughness
by: Al Hazza, Muataz Hazza Faizi, et al.
Published: (2016)
by: Al Hazza, Muataz Hazza Faizi, et al.
Published: (2016)
Development of compound clustering techniques using hybrid soft-computing algorithms
by: Salim, Naomie, et al.
Published: (2006)
by: Salim, Naomie, et al.
Published: (2006)
Computational visualization of customer mood using affective space model approach
by: Kamaruddin, Norhaslinda, et al.
Published: (2017)
by: Kamaruddin, Norhaslinda, et al.
Published: (2017)
Enhancement of Magnetic Resonance Images Using Soft Computing Based Segmentation
by: Javed, Arshad, et al.
Published: (2014)
by: Javed, Arshad, et al.
Published: (2014)
Certificate authentication system using QR code
by: Chan, Ming Ting
Published: (2014)
by: Chan, Ming Ting
Published: (2014)
A study on soft computing approach in weather forecasting
by: Yen, Wee Khun
Published: (2010)
by: Yen, Wee Khun
Published: (2010)
Novel detection soft-computing algorithm for structural health monitoring system
by: Ng, Kian Theng
Published: (2013)
by: Ng, Kian Theng
Published: (2013)
Improving computational complexity using I-zag for text image authentication scheme
by: ‘Aqilah, Abd. Ghani
Published: (2024)
by: ‘Aqilah, Abd. Ghani
Published: (2024)
Optimization of Assembly Sequence Planning Using Soft Computing Approaches: A Review
by: Muhammad Arif, Abdullah, et al.
Published: (2019)
by: Muhammad Arif, Abdullah, et al.
Published: (2019)
Soft computing approach for predicting OPEC countries’ oil consumption
by: Chiroma, Haruna, et al.
Published: (2017)
by: Chiroma, Haruna, et al.
Published: (2017)
State of the art review of the existing soft computing based approaches to trust and reputation computation
by: Hussain, Farookh, et al.
Published: (2007)
by: Hussain, Farookh, et al.
Published: (2007)
Speaker verification using neural responses from the model of the auditory system / Noor Fadzilah Razali
by: Noor Fadzilah , Razali
Published: (2014)
by: Noor Fadzilah , Razali
Published: (2014)
A Review of Multi-holes Drilling Path Optimization Using Soft Computing Approaches
by: Najwa Wahida, Zainal Abidin, et al.
Published: (2017)
by: Najwa Wahida, Zainal Abidin, et al.
Published: (2017)
Biometric authentication using fingerprint and keypad for door lock securtiy system
by: Al-Azam, Sharaf Ahmed, et al.
Published: (2021)
by: Al-Azam, Sharaf Ahmed, et al.
Published: (2021)
Development of a Timetabling Software Using Soft-computing Techniques With a Case Study
by: Sabri, M.F.M., et al.
Published: (2010)
by: Sabri, M.F.M., et al.
Published: (2010)
Novitect; a novelty detection soft-computing algorithm for Structural Health Monitoring (SHM) system
by: Mustapha, Faizal, et al.
by: Mustapha, Faizal, et al.
Renowned Yahoo, Google speakers at IT conference
by: The Star, Sarawak
Published: (2013)
by: The Star, Sarawak
Published: (2013)
A usability-evaluation metric based on a soft-computing approach
by: Chang, Elizabeth, et al.
Published: (2006)
by: Chang, Elizabeth, et al.
Published: (2006)
Digital watermarking for mammogram authentication
by: Abdul Manaf, Azizah, et al.
Published: (2010)
by: Abdul Manaf, Azizah, et al.
Published: (2010)
Graphical user authentication system (GUAS)
by: Tan, Woei Wen
Published: (2014)
by: Tan, Woei Wen
Published: (2014)
Recent trend in mixed-model assembly line balancing optimization using soft computing approaches
by: Razali, Muhamad Magffierah, et al.
Published: (2019)
by: Razali, Muhamad Magffierah, et al.
Published: (2019)
Decentralized authentication system utilizing blockchain
by: Wee, Chun Ming
Published: (2022)
by: Wee, Chun Ming
Published: (2022)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
An analysis of problems of understanding in native speakers-non-native speakers talk
by: Khatijah Abdul Rasool,
Published: (2011)
by: Khatijah Abdul Rasool,
Published: (2011)
Natural speaker-independent Arabic speech recognition system based on Hidden Markov Models using Sphinx tools
by: Abushariah, Mohammad A. M., et al.
Published: (2010)
by: Abushariah, Mohammad A. M., et al.
Published: (2010)
A Soft Computing Approach for the Memory Storage of a Sound Signal Processor
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2010)
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2010)
Hybrid Soft Computing Approach for Determining Water Quality Indicator: Euphrates River
by: Jing, Li, et al.
Published: (2017)
by: Jing, Li, et al.
Published: (2017)
System login authentication using voice recognition and ai methods / Metrius Benedict Sunggoh
by: Metrius, Benedict Sunggoh
Published: (2003)
by: Metrius, Benedict Sunggoh
Published: (2003)
Keystroke pressure-based typing biometrics
authentication system using support vector machines
by: Martono, Wahyudi, et al.
Published: (2007)
by: Martono, Wahyudi, et al.
Published: (2007)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
Similar Items
-
Integrated biometric verification system using soft computing approach
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2007) -
Feature extraction for neural-fuzzy inference system
by: Quek, Chai, et al.
Published: (2003) -
Driving profile modeling and recognition based on soft computing approach
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009) -
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002) -
Soft computing approach for solving elevator scheduling problem
by: Norzatul Hajar, Abd Majid
Published: (2010)