[BOOK][B] Cloud computing
NK Sehgal, PC Bhatt - 2018 - Springer
The idea for this book started with a call from Prof. PCP Bhatt, whom Naresh has known for
over a decade. Prof. Bhatt is the author of a widely used Operating Systems book, which is in …
over a decade. Prof. Bhatt is the author of a widely used Operating Systems book, which is in …
A brief review of speaker recognition technology
This paper reviews the development of speaker recognition systems from pre-computing
days to current trends. Advances in various sciences which have allowed autonomous …
days to current trends. Advances in various sciences which have allowed autonomous …
[PDF][PDF] A framework of secure biometric based online exam authentication: an alternative to traditional exam
T Ramu, T Arivoli - Int J Sci Eng Res, 2013 - Citeseer
In the past fifteen years the use of Internet technologies has been substantially growing for
delivery of educational content and online learning has become increasingly popular and …
delivery of educational content and online learning has become increasingly popular and …
Profile based student authentication in online examination
Online examination is an increasingly important component of online courses, and student
authentication is widely seen as one of the major concerns for online examinations. In most …
authentication is widely seen as one of the major concerns for online examinations. In most …
A cross section of the issues and research activities related to both information security and cloud computing
Cloud computing amplifies computer security issues that have proliferated with the growth of
the Internet. A broad range of security research is being applied to cloud computing. This …
the Internet. A broad range of security research is being applied to cloud computing. This …
Cloud computing and information security
Computer security issues exacerbate with growth of the Internet as more people and
computers join the web, opening new ways to compromise an ever-increasing amount of …
computers join the web, opening new ways to compromise an ever-increasing amount of …
Robust speaker recognition based on low-level-and prosodic-level-features
Speaker recognition is an important task in security applications where a person is
recognized through speech input. In speaker recognition, a person is recognized from his or …
recognized through speech input. In speaker recognition, a person is recognized from his or …
Authentication in E-learning systems: Challenges and Solutions
LQ Huan, DM Nguyen… - VNUHCM …, 2020 - stdjet.scienceandtechnology.com.vn
Digitization is gradually penetrating all aspects of modern society. As it changes the way
people communicate, technology has revolutionized education and training in the 21st …
people communicate, technology has revolutionized education and training in the 21st …
[PDF][PDF] State-of-the-art Modeling Techniques in Speaker Recognition
A Sharma, SK Singla - International Journal of Electronics …, 2017 - csjournals.com
The voice based recognition system also referred as automatic speaker recognition system
has attracted many researchers over the last few decades due to its tremendous …
has attracted many researchers over the last few decades due to its tremendous …
E-invigilation of e-assessments
S Ketab - 2017 - plymouth.researchcommons.org
E-learning and particularly distance-based learning is becoming an increasingly important
mechanism for education. A leading Virtual Learning Environment (VLE) reports a user base …
mechanism for education. A leading Virtual Learning Environment (VLE) reports a user base …