{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:45:00Z","timestamp":1730234700147,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,7]]},"DOI":"10.1109\/icce53296.2022.9730224","type":"proceedings-article","created":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T15:55:19Z","timestamp":1647359719000},"page":"1-2","source":"Crossref","is-referenced-by-count":0,"title":["Speaker Authentication Method using Reservoir Computing for Security System"],"prefix":"10.1109","author":[{"given":"Yuki","family":"Sakaguchi","sequence":"first","affiliation":[{"name":"Kyushu Institute of Technology,Kitakyushu,Japan"}]},{"given":"Rin","family":"Hirakawa","sequence":"additional","affiliation":[{"name":"Kyushu Institute of Technology,Kitakyushu,Japan"}]},{"given":"Hideaki","family":"Kawano","sequence":"additional","affiliation":[{"name":"Kyushu Institute of Technology,Kitakyushu,Japan"}]},{"given":"Yoshihisa","family":"Nakatoh","sequence":"additional","affiliation":[{"name":"Kyushu Institute of Technology,Kitakyushu,Japan"}]}],"member":"263","reference":[{"key":"ref4","article-title":"Concept of Reservoir Computing and Its Recent Trends","author":"tanaka","year":"2019","journal-title":"The Institute of Electronics Information and Communication Engineers (IEICE)"},{"journal-title":"Reservoir Computing -Theory and hardware of fast machine learning for time series pattern recognition","year":"2021","author":"tanaka","key":"ref3"},{"key":"ref6","volume":"2","author":"kong","year":"0","journal-title":"The reddots data collection for speaker recognition"},{"journal-title":"RedDots","year":"0","key":"ref5"},{"journal-title":"A Study on Comparison of Speaker Verification Methods Using Various Machine Learning","year":"2019","author":"hiroki","key":"ref7"},{"journal-title":"Lyon's Auditory Model Inversion a Tool for Sound Separation and Speech Enhancement","year":"1996","author":"piero","key":"ref2"},{"journal-title":"Speaker Verification Method Using HTM for Security System","year":"2020","author":"sakaguchi","key":"ref1"}],"event":{"name":"2022 IEEE International Conference on Consumer Electronics (ICCE)","start":{"date-parts":[[2022,1,7]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2022,1,9]]}},"container-title":["2022 IEEE International Conference on Consumer Electronics (ICCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9730107\/9730121\/09730224.pdf?arnumber=9730224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T16:16:23Z","timestamp":1655309783000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9730224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,7]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/icce53296.2022.9730224","relation":{},"subject":[],"published":{"date-parts":[[2022,1,7]]}}}