نتایج جستجو برای: verification
تعداد نتایج: 75312 فیلتر نتایج به سال:
Speaker verification from talking a few words of sentences has many applications. Many methods as DTW, HMM, VQ and MQ can be used for speaker verification. We applied MQ for its precise, reliable and robust performance with computational simplicity. We also used pitch frequency and log gain contour for further improvement of the system performance.
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
a parallel hybrid system of hmm and gmm modeling techniques was implemented and used in a telephony speaker verification and identification system. spectral subtraction and weighted projection measure were used to render this system more robust against additional noise. cepstral mean subtraction method was also applied for the compensation of convolution noise due to transmission channel degrad...
Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...
Introduction: Radiation therapy is one of the methods of cancer treatment. In this method, it is necessary to avoid harming the healthy tissues of the patient which is in the vicinity of the target, as much as possible. Treatment verification is one of the most important steps of radiation therapy which has two usual methods, using Port film and EPID. The accuracy and precision of treatment in ...
Over the last years, witness-based validation of verification results has become an established practice in software verification: An independent validator re-establishes a verifier using witnesses, which are stored standardized exchange format. In addition to validation, such exchangable information about proofs and alarms found by can be shared across tools, users apply third-party tools visu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید