Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Shetty, Surendra"'
Publikováno v:
In Journal of King Saud University - Computer and Information Sciences November 2022 34(10) Part B:9836-9843
Automatic Speech Recognition involves mainly two steps; feature extraction and classification . Mel Frequency Cepstral Coefficient is used as one of the prominent feature extraction techniques in ASR. Usually, the set of all 12 MFCC coefficients is u
Externí odkaz:
http://arxiv.org/abs/1505.03239
Publikováno v:
Cybernetics and Information Technologies, Vol 17, Iss 4, Pp 134-164 (2017)
As in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications. This paper exhibits a
Externí odkaz:
https://doaj.org/article/3eded353868d4a6da9c27c682799b43e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
International Journal on Electrical Engineering & Informatics; Sep2023, Vol. 15 Issue 3, p465-482, 18p
Autor:
Ramesh, Raghunandan Kemmannu, Dodmane, Radhakrishna, Shetty, Surendra, Aithal, Ganesh, Sahu, Monalisa, Sahu, Aditya Kumar
Publikováno v:
Cryptography (2410-387X); Sep2023, Vol. 7 Issue 3, p44, 20p
Publikováno v:
In Journal of Voice November 2019 33(6):947-947
Autor:
Dodmane, Radhakrishna1 (AUTHOR) rkdodmane@gmail.com, K. R., Raghunandan1 (AUTHOR) raghunandan@nitte.edu.in, N. S., Krishnaraj Rao2 (AUTHOR), Kallapu., Bhavya3 (AUTHOR), Shetty, Surendra4 (AUTHOR) hsshetty@nitte.edu.in, Aslam, Muhammad5,6 (AUTHOR) raghunandan@nitte.edu.in, Jilani, Syeda Fizzah7 (AUTHOR) sjf7@aber.ac.uk
Publikováno v:
Information (2078-2489). May2023, Vol. 14 Issue 5, p280. 18p.
Publikováno v:
International Journal of Electrical & Computer Engineering (2088-8708); Apr2023, Vol. 13 Issue 2, p1914-1921, 8p
Publikováno v:
Cybernetics and Information Technologies. 20:86-101
RSA is one among the most popular public key cryptographic algorithm for security systems. It is explored in the results that RSA is prone to factorization problem, since it is sharing common modulus and public key exponent. In this paper the concept