Secure-Access System via Fixed and Mobile Telephone Networks
نویسندگان
چکیده
This paper presents a double-digit system for textdependent speaker verification and text validation that can be accessed with security via a telephone network. A speech recognition and a user authentication scheme are proposed that utilize concatenated phoneme HMMs and operate in a sound-prompted mode. The recognition performance of the system is evaluated through extended simulations on Hidden Markov Models (HMMs) using Perceptual Linear Prediction (PLP), Mel Frequency Cepstral Coefficients (MFCC), as well as Cepstral Mean Subtraction (CMS). The effect of various factors such as the length of the training data, the number of embedded re-estimations, and Gaussian mixtures in training of the HMMs, the use of world models, bootstrapping, and user-dependent thresholds on the performance of speech recognition and speaker verification is also examined.
منابع مشابه
Resilience Enhancement of Active Distribution Networks Via Mobile Energy Storage Systems and Protection Coordination Consideration
Owing to the portability and flexibility of mobile energy storage systems (MESSs), they seem to be a promising solution to improve the resilience of the distribution system (DS). So, this paper presents a rolling optimization mechanism for dispatching MESSs and other resources in microgrids in case of a natural disaster occurrence. The proposed mechanism aims to minimize the total system cost b...
متن کاملVehicular Networks: A Survey on Architecture, Communication Technologies and Applications
The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable. This system consists of many fixed and mobile nodes (Vehicles, Trains, Vessels, Air planes), Wireless and Wired Telecommunication Technologies to exchange information between mobile nodes or betwee...
متن کاملIntuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کاملNetwork Investigation and Performance Analysis of ZigBee Technology using OPNET
Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking (WSN) system, and most important thing in communication is to be free from interference, attenu...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کامل