Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
In this paper we propose a fast and efficient iris recognition algorithm which makes use of local intensity variations in iris textures. The presented system provides fully revocab...
This paper addresses the problem of using unstructured queries to search a structured database in voice search applications. By incorporating structural information in music metad...
Young-In Song, Ye-Yi Wang, Yun-Cheng Ju, Mike Selt...
—The paper describes the process of designing a task-oriented continuous speech recognition system for Polish, based on CMU Sphinx4, to be used in the voice interface of a comput...
Our Distributed Telecommunication Management System (DTMS) uses an object-oriented model to describe the networked Voice Communication System (VCS) to be managed. In order to allo...