Mathematical Technique Based Speaker Recognition for Total Security System
Journal Title: INTERNATIONAL JOURNAL OF MATHEMATICS TRENDS AND TECHNOLOGY - Year 2014, Vol 5, Issue 2
Abstract
Today security system is rapidly growing and updating simultaneously due to advance of technology. This growth in electronic transactions results in a rise of demand for fast and accurate user identification and authentication system. Total security system solve this problem as a number of parameters like face, speech, fingerprint, palm print etc. are undeniably connected to its owner which verifies quantitative data like E-cards, password and Login ID etc. of human being. This paper discusses Mel frequency Cepstral Coefficient (MFCC) to extract the features from voice and Vector quantization technique to identify the speaker for the speaker’s recognition in MATLAB for TSS.
Authors and Affiliations
S. K. Patel , Dr. J. M Dhodiya , Dr. D. C. Joshi
Normalized Hamming Similarity Measure for Intuitionistic Fuzzy Multi Sets and Its Application in Medical Diagnosis
As Similarity measure for fuzzy sets is one of the important research topics of fuzzy set theory, there are several methods to measure similarity between two fuzzy sets (FS), Intuitionistic fuzzy sets (IFS) and Intuition...
Ability of Evolutionary and Recurrent SOM model GA-RSOM in Phonemic Recognition Optimization
The phoneme recognition aims to process a speech signal, characterized by a non-linearity with very high dynamics, allowing to perform various tasks on an information processing machine by an operator using orally...
On b#-Open Sets
Andrijivic introduced and studied the concept of b-open sets. Following this Bharathi et.al. introduced the concept of b**-open sets. Recently Indira et.al. studied the notions of *b-open sets and **b-open sets. In this...
Some New Families of Divisor Cordial Graphs
In this paper, the duplication of arbitrary vertex vk of cycle Cn (n ≥ 3),<Sn:Sn>, <Wn:Wn> , the graph obtained by joining two copies of cycle Wn by a path Pk (n ≥ 3), GvK1, where Gv denotes graph obtained by...
Degree of Approximation of a Function Belongingto W (Lr, ξ (t)) (r > 1)-Class by (E, 1)(C, 2) Product Summabilty Transform
The field of approximation theory is so vast that it plays an increasingly important role in applications in pure and applied mathematics. The present study deals with a theorem concerning the degree of approximation of...