Skip to main content

Showing 1–5 of 5 results for author: Sen, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2105.11728  [pdf

    cs.LG eess.SP

    Utterance partitioning for speaker recognition: an experimental review and analysis with new findings under GMM-SVM framework

    Authors: Nirmalya Sen, Md Sahidullah, Hemant Patil, Shyamal Kumar das Mandal, Sreenivasa Krothapalli Rao, Tapan Kumar Basu

    Abstract: The performance of speaker recognition system is highly dependent on the amount of speech used in enrollment and test. This work presents a detailed experimental review and analysis of the GMM-SVM based speaker recognition system in presence of duration variability. This article also reports a comparison of the performance of GMM-SVM classifier with its precursor technique Gaussian mixture model-u… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

    Comments: International Journal of Speech Technology, Springer Verlag, In press

  2. arXiv:1209.4784   

    cs.CR

    An Identity based Node Authentication and Session Key Management Algorithm using Elliptic Curve Cryptography

    Authors: Nilanjan Sen

    Abstract: This paper has been withdrawn for modification.

    Submitted 15 August, 2013; v1 submitted 21 September, 2012; originally announced September 2012.

    Comments: The paper has been withdrawn for modification and the newer version will be uploaded soon

  3. arXiv:1209.0286  [pdf

    cs.CR

    CAWS - Security Algorithms for Wireless Sensor Networks: A Cellular Automata Based Approach

    Authors: Nilanjan Sen, Indrajit Banerjee

    Abstract: Security in the Wireless Sensor Networks (WSN) is a very challenging task because of their dissimilarities with the conventional wireless networks. The related works so far have been done have tried to solve the problem keeping in the mind the constraints of WSNs. In this paper we have proposed a set of cellular automata based security algorithms (CAWS) which consists of CAKD, a Cellular Automata… ▽ More

    Submitted 3 September, 2012; originally announced September 2012.

    Comments: Proceedings of "All India Seminar on Role of ICT in Improving Quality of Life" on March 26-27, 2010 organized by The Institution of Engineers (India) and Bengal Engineering and Science University, Shibpur

    Journal ref: Proceedings of "All India Seminar on Role of ICT in Improving Quality of Life", Dated on March 26-27, 2010; pp: 81-88

  4. arXiv:1201.4109  [pdf, ps, other

    cs.IT

    On the Multiple Access Channel with Asymmetric Noisy State Information at the Encoders

    Authors: Nevroz Şen, Fady Alajaji, Serdar Yüksel, Giacomo Como

    Abstract: We consider the problem of reliable communication over multiple-access channels (MAC) where the channel is driven by an independent and identically distributed state process and the encoders and the decoder are provided with various degrees of asymmetric noisy channel state information (CSI). For the case where the encoders observe causal, asymmetric noisy CSI and the decoder observes complete CSI… ▽ More

    Submitted 19 January, 2012; originally announced January 2012.

    Comments: Submitted to the IEEE Transactions on Information Theory

  5. arXiv:1103.3054  [pdf, ps, other

    cs.IT

    On the Capacity of Memoryless Finite-State Multiple Access Channels with Asymmetric Noisy State Information at the Encoders

    Authors: Nevroz Şen, Giacomo Como, Serdar Yüksel, Fady Alajaji

    Abstract: We consider the capacity of memoryless finite-state multiple access channel (FS-MAC) with causal asymmetric noisy state information available at both transmitters and complete state information available at the receiver. Single letter inner and outer bounds are provided for the capacity of such channels when the state process is independent and identically distributed. The outer bound is attained… ▽ More

    Submitted 1 June, 2011; v1 submitted 15 March, 2011; originally announced March 2011.

    Comments: To be submitted Allerton Conference 2011