2015
DOI: 10.1109/tase.2015.2467311
|View full text |Cite
|
Sign up to set email alerts
|

Speaker Identification With Whispered Speech for the Access Control System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…3) Interactivity: Different schools have different management systems [6] , and good human-computer interaction can be modified and adjusted through the terminal installed on the computer [7] to better match the management model of the user. 4) Perfectibility: Through the multi-hierarchy management model, while ensuring that the trapped students are rescued at the first time and safeguarding the property of the library.…”
Section: B Application Of Intelligent University Library Access Contmentioning
confidence: 99%
“…3) Interactivity: Different schools have different management systems [6] , and good human-computer interaction can be modified and adjusted through the terminal installed on the computer [7] to better match the management model of the user. 4) Perfectibility: Through the multi-hierarchy management model, while ensuring that the trapped students are rescued at the first time and safeguarding the property of the library.…”
Section: B Application Of Intelligent University Library Access Contmentioning
confidence: 99%
“…Jia-Ching, et al [20] proposed a speaker identification system using instantaneous frequencies of the whispered speech signal approximated probability product kernel support vector machine for an access control and compared the performance with pyknogram-based system.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Because of these characteristics, whispered speech is widely used in places where loud noises are prohibited such as conference rooms, libraries, and concert halls. Because of its potential applications [3][4][5][6], in recent years, studies on whispered speech (e.g., whispered speech emotion recognition, whispered speech enhancement, whispered speech recognition, and whispered speech conversion) have gradually attracted researchers' attention. Among them, whispered speech conversion, a technique that converts whispered speech to normal speech, has been widely used in mobile communication, medical equipment, security monitoring, and crime identification [7][8][9].…”
Section: Introductionmentioning
confidence: 99%