{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:46:14Z","timestamp":1725522374825},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/ispa.2013.6703775","type":"proceedings-article","created":{"date-parts":[[2014,4,30]],"date-time":"2014-04-30T21:13:13Z","timestamp":1398892393000},"page":"404-409","source":"Crossref","is-referenced-by-count":0,"title":["Forensic evidence reporting using GMM-UBM, JFA and I-vector methods: Application to Algerian Arabic dialect"],"prefix":"10.1109","author":[{"given":"Z.","family":"Boulkenafet","sequence":"first","affiliation":[]},{"given":"M.","family":"Bengherabi","sequence":"additional","affiliation":[]},{"given":"F.","family":"Harizi","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Nouali","sequence":"additional","affiliation":[]},{"given":"Cheriet","family":"Mohamed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1007\/978-3-642-80029-0_20"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ICTTA.2008.4530024"},{"key":"12","article-title":"Speech recognition using hidden markov model","author":"nilsson","year":"2002","journal-title":"Department of Telecommunications and Speech Processing"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1006\/dspr.1999.0361"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1016\/j.csl.2005.08.005"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/ICASSP.2009.4960519"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1002\/0470011238"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/ICB.2012.6199797"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/TASL.2010.2064307"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/TSA.2004.825668"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/TSA.2004.840940"},{"key":"9","article-title":"Joint factor analysis of speaker and session variability theory and algorithms","author":"kenny","year":"2005","journal-title":"Technical Report Montreal CRIM"},{"key":"8","doi-asserted-by":"crossref","first-page":"21","DOI":"10.21437\/Interspeech.2011-6","article-title":"Evaluation of ivector speaker recognition systems for forensic application","author":"mandasari","year":"2011","journal-title":"InterSpeech '11"}],"event":{"name":"2013 8th International Symposium on Image and Signal Processing and Analysis (ISPA)","start":{"date-parts":[[2013,9,4]]},"location":"Trieste, Italy","end":{"date-parts":[[2013,9,6]]}},"container-title":["2013 8th International Symposium on Image and Signal Processing and Analysis (ISPA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6693156\/6703696\/06703775.pdf?arnumber=6703775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T16:34:04Z","timestamp":1648917244000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6703775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ispa.2013.6703775","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}