Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Umut Uludag"'
Publikováno v:
Elektronika ir Elektrotechnika, Vol 26, Iss 1, Pp 46-51 (2020)
This paper introduces two significant contributions: one is a new feature based on histograms of MFCC (Mel-Frequency Cepstral Coefficients) extracted from the audio files that can be used in emotion classification from speech signals, and the other
Externí odkaz:
https://doaj.org/article/fa5966e2c78141c3a628061378ac035d
Publikováno v:
2022 3rd URSI Atlantic and Asia Pacific Radio Science Meeting (AT-AP-RASC).
Publikováno v:
2021 13th International Conference on Electrical and Electronics Engineering (ELECO).
Publikováno v:
SPIE Future Sensing Technologies.
In this paper, a fiber optic based acoustic sensing system (FOTAS) is presented. Utilizing such cables as hundreds of acoustic movement detectors has become a novel approach for many security applications. Developed for securing critical infrastructu
Publikováno v:
TSP
In this paper, the sound arising from the friction of paper and pen is considered as a biometric data for handwritten signature verification. Sounds were recorded with two different mobile phone models with different operating systems. To expand the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5e0500f7d6004cbc8f09707bb212f833
https://aperta.ulakbim.gov.tr/record/91241
https://aperta.ulakbim.gov.tr/record/91241
Publikováno v:
Elektronika ir Elektrotechnika, Vol 26, Iss 1, Pp 46-51 (2020)
This paper introduces two significant contributions: one is a new feature based on histograms of MFCC (Mel-Frequency Cepstral Coefficients) extracted from the audio files that can be used in emotion classification from speech signals, and the other -
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::13302cd705b447051673386f2ef76c31
https://hdl.handle.net/20.500.12684/5943
https://hdl.handle.net/20.500.12684/5943
Publikováno v:
Pattern Recognition. 37:1533-1542
A biometric authentication system operates by acquiring biometric data from a user and comparing it against the template data stored in a database in order to identify a person or to verify a claimed identity. Most systems store multiple templates pe
Publikováno v:
Proceedings of the IEEE. 92:948-960
In traditional cryptosystems, user authentication is based on possession of secret keys; the method falls apart if the keys are not kept secret (i.e., shared with non-legitimate users). Further, keys can be forgotten, lost, or stolen and, thus, canno
Autor:
Anil K. Jain, Umut Uludag
Publikováno v:
IEEE Transactions on Pattern Analysis and Machine Intelligence. 25:1494-1498
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with
Publikováno v:
Pattern Recognition. 35:2739-2747
This paper introduces two spatial methods in order to embed watermark data into fingerprint images, without corrupting their features. The first method inserts watermark data after feature extraction, thus preventing watermarking of regions used for