Loading...
  • Home
  • Search Results
787-788 of 4327 Papers

AUTOMATION SYSTEM USING SPEECH RECOGNITION FOR SPEAKER DEPENDENCY THROUGH MFCC

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION
Author(s): AMOL C.WANI , PRABHAKAR V. MHADSE

Abstract: This paper discusses the methodology for project named “Automation System Using Speech Recognition for Speaker Dependency through MFCC”. Automation system is growing to improve the quality; the goal of design of speaker dependent automation is to provide an efficient integration and higher security among appliances. Such automation systems must comply with the household equipments. This paper discusses the overall design of Automation System Using Speech Recognition for Speaker Dependency through MFCC which is to be implemented. This system will have hardware for appliance interface using Zigbee wireless modules and speech processor. Software section includes development of Mel Frequency cepstral coefficient (MFCC) algorithm using MATLAB. The system focus on recognition of speech commands stored in data base of MATLAB and it is matched with incoming speech command of speaker. Using MFCC system will be speaker dependent, for speaker independent systems speech processor of will be used.

  • Publication Date: 28-Apr-2013
  • DOI: 10.15224/978-981-07-6260-5-62
  • Views: 0
  • Downloads: 0

STUDY OF GRAPHICAL PASSWORD SCHEMES AND “TWO LEVEL” AUTHENTICATION TECHNIQUE FOR SOFTWARE APPLICATIONS

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION
Author(s): HEMANGI KULKARNI , SONAL AHUJA

Abstract: Login is the basic and primary stage of authentication to any system. For Login users create memorable passwords, so that they remember those passwords when they next need access to the system Users create their own passwords as system generated passwords are difficult to remember. Going with same fact such text based factors are vulnerable to many well known attacks. So an alternative method was designed that used Graphical Passwords that use images or representation of Images as passwords. There are various graphical password schemes and software’s in market. Text based passwords are mercilessly broken down so to mitigate the issues with the old methods advanced techniques have been proposed using Graphical Passwords. This paper aims at providing a comparative study of the various advance graphical password techniques available and I have also proposed a system using Cued Click Point Based Authentication for tightening the authentication process of any Online Application.

  • Publication Date: 28-Apr-2013
  • DOI: 10.15224/978-981-07-6260-5-48
  • Views: 0
  • Downloads: 0