Search Results - (( using codification system algorithm ) OR ( program implementation drops algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1
  2. 2
  3. 3

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Comparisons are done between systems implementing authentication and those that do not. The results show that the average delay is not much affected by the implementation of the program. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani by Mirhassani, Seyedmostafa

    Published 2015
    “…In the next step, based on the cepstral features provided by the filterbanks a hierarchical phoneme classification is performed. Systems using the provided features were evaluated in phoneme recognition/classification task. …”
    Get full text
    Get full text
    Thesis