[HTML][HTML] Evaluating the performance of speaker recognition solutions in e-commerce applications

O Krčadinac, U Šošević, D Starčević - Sensors, 2021 - mdpi.com
Two important tasks in many e-commerce applications are identity verification of the user
accessing the system and determining the level of rights that the user has for accessing and …

Graphic symbol recognition using graph based signature and bayesian network classifier

MM Luqman, T Brouard… - 2009 10th International …, 2009 - ieeexplore.ieee.org
We present a new approach for recognition of complex graphic symbols in technical
documents. Graphic symbol recognition is a well known challenge in the field of document …

Study of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF

SA Mokhov - Proceedings of the 2008 C3S2E conference, 2008 - dl.acm.org
This work reports experimental results and their analysis in various speech processing tasks
using SpeakerIdentApp, a text-independent speaker identification application, based on …

Towards Security Hardening of Scientific Demand-Driven and Pipelined Distributed Computing Systems

SA Mokhov - 2008 International Symposium on Parallel and …, 2008 - ieeexplore.ieee.org
This work highlights and takes aim at the most critical security aspects required for two
different types of distributed systems for scientific computation. It covers two open-source …

Choosing best algorithm combinations for speech processing tasks in machine learning using MARF

SA Mokhov - Advances in Artificial Intelligence: 21st Conference of …, 2008 - Springer
This work reports experimental results in various speech processing tasks using an
application based on the Modular Audio Recognition Framework (MARF) in terms of the best …

Towards syntax and semantics of hierarchical contexts in multimedia processing applications using MARFL

SA Mokhov - 2008 32nd Annual IEEE International Computer …, 2008 - ieeexplore.ieee.org
We focus on defining context expressions in terms of initial syntax and semantics for an
intensional MARF language, MARFL. It is there to allow scripting Modular Audio Recognition …

The use of machine learning with signal-and NLP processing of source code to fingerprint, detect, and classify vulnerabilities and weaknesses with MARFCAT

SA Mokhov - arxiv preprint arxiv:1010.2511, 2010 - arxiv.org
We present a machine learning approach to static code analysis and fingerprinting for
weaknesses related to security, software engineering, and others using the open-source …

Distributed modular audio recognition framework (DMARF) and its applications over web services

SA Mokhov, R Jayakumar - Novel Algorithms and Techniques in …, 2010 - Springer
In this work we present the software architecture design and implementation of a Distributed
Modular Audio Recognition Framework (DMARF), and its applications, such as Speaker …

Self-optimization property in autonomic specification of Distributed MARF with ASSL

E Vassev, SA Mokhov - 2009 - researchrepository.ul.ie
In this work, we venture out to develop self-optimization features in the Distributed Modular
Audio Recognition Framework (DMARF). Here, we use the Autonomic System Speci cation …

Self-Forensics Through Case Studies of Small-to-Medium Software Systems

SA Mokhov, E Vassev - … IT Security Incident Management and IT …, 2009 - ieeexplore.ieee.org
The notion and definition of self-forensics was introduced by Mokhov to encompass software
and hardware capabilities for autonomic and other systems to record their own states …