<--- Back to Details
First PageDocument Content
Fingerprints / Identification / Surveillance / Automatic identification and data capture / Facial recognition system / Authentication / Speaker recognition / Password / Biometric points / Security / Biometrics / National security
Date: 2014-09-09 14:34:56
Fingerprints
Identification
Surveillance
Automatic identification and data capture
Facial recognition system
Authentication
Speaker recognition
Password
Biometric points
Security
Biometrics
National security

Microsoft Word[removed]Research Portfolio_updated_Spring2014.doc

Add to Reading List

Source URL: www.clarkson.edu

Download Document from Source Website

File Size: 605,79 KB

Share Document on Facebook

Similar Documents

Speaker Recognition in Encrypted Voice Streams Michael Backes1,2 , Goran Doychev1 , Markus D¨ urmuth1 , and Boris K¨opf2 1 2

DocID: 1uQ4z - View Document

INTERSPEECHComparative Study of Speaker Personality Traits Recognition in Conversational and Broadcast News Speech Firoj Alam, Giuseppe Riccardi Department of Information Engineering and Computer Science, Universi

DocID: 1sSKw - View Document

November 19th 2:00 pm EST Is Your Company Prepared for the Upcoming Revenue Recognition Changes? Speaker: Craig Davied, Grant Thornton LLP Presented by: JD Edwards Financials SIG In May 2014, the Financial Accounting Sta

DocID: 1rSdD - View Document

In-Vehicle Speaker Recognition Using Independent Vector Analysis

DocID: 1rLqj - View Document

Automatic identification and data capture / Humancomputer interaction / Machine learning / Artificial intelligence / Speech recognition / Speaker recognition / FMLLR / Artificial neural network / International Conference on Acoustics /  Speech /  and Signal Processing / Language model

SAT-LHUC: SPEAKER ADAPTIVE TRAINING FOR LEARNING HIDDEN UNIT CONTRIBUTIONS Pawel Swietojanski and Steve Renals The Centre for Speech Technology Research, University of Edinburgh {p.swietojanski, s.renals}@ed.ac.uk

DocID: 1qQuQ - View Document