Speaker authentication using adapted background models

2010 ◽  
Vol 127 (2) ◽  
pp. 1178
Author(s):  
Zhengyou Zhang ◽  
Ming Liu
Solid Earth ◽  
2014 ◽  
Vol 5 (1) ◽  
pp. 425-445 ◽  
Author(s):  
T. Nissen-Meyer ◽  
M. van Driel ◽  
S. C. Stähler ◽  
K. Hosseini ◽  
S. Hempel ◽  
...  

Abstract. We present a methodology to compute 3-D global seismic wavefields for realistic earthquake sources in visco-elastic anisotropic media, covering applications across the observable seismic frequency band with moderate computational resources. This is accommodated by mandating axisymmetric background models that allow for a multipole expansion such that only a 2-D computational domain is needed, whereas the azimuthal third dimension is computed analytically on the fly. This dimensional collapse opens doors for storing space–time wavefields on disk that can be used to compute Fréchet sensitivity kernels for waveform tomography. We use the corresponding publicly available AxiSEM (www.axisem.info) open-source spectral-element code, demonstrate its excellent scalability on supercomputers, a diverse range of applications ranging from normal modes to small-scale lowermost mantle structures, tomographic models, and comparison with observed data, and discuss further avenues to pursue with this methodology.


1986 ◽  
Vol 80 (3) ◽  
pp. 957-967 ◽  
Author(s):  
S. Sidney Ulmer

In this research note I seek to determine whether a significantly predicting social background model for analyzing the votes of Supreme Court justices is time-bound. I argue that an affirmative result poses serious questions for past uses of such models, none of which has controlled for the possibility that time is a confounding variable. A model that significantly predicted the votes of the justices in the Court's 1903–1968 terms was constructed. Analysis with this model for two periods—from 1903 to 1935, and from 1936 to 1968—established that the model was not timeneutral. Appropriate theoretical implications are drawn.


1999 ◽  
Vol 6 (1) ◽  
pp. 24-34 ◽  
Author(s):  
Qi Li ◽  
Biing-Hwang Juang ◽  
Chin-Hui Lee ◽  
Qiru Zhou ◽  
F.K. Soong

Author(s):  
Manjunath Ramachandra Iyer

Speaker authentication has become increasingly important. It goes with the other forms of security checks such as user login and personal identification number and has a say in the final decision about the authenticity. One of the issues with the authentication algorithms is that the automated devices that take the call have to work with a limited data set. In this chapter, a new class of intelligent element called differentially fed artificial neural network has been introduced to predict the data and use it effectively. It keeps the model simple and helps in taking online and crisp decisions with the available limited data.


Sign in / Sign up

Export Citation Format

Share Document