{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:26:31Z","timestamp":1775665591076,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/ncc.2014.6811345","type":"proceedings-article","created":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T21:51:49Z","timestamp":1400277109000},"page":"1-6","source":"Crossref","is-referenced-by-count":61,"title":["Speech biometric based attendance system"],"prefix":"10.1109","author":[{"given":"Subhadeep","family":"Dey","sequence":"first","affiliation":[]},{"given":"Sujit","family":"Barman","sequence":"additional","affiliation":[]},{"given":"Ramesh K.","family":"Bhukya","sequence":"additional","affiliation":[]},{"given":"Rohan K.","family":"Das","sequence":"additional","affiliation":[]},{"given":"B C","family":"Haris","sequence":"additional","affiliation":[]},{"given":"S. R. M.","family":"Prasanna","sequence":"additional","affiliation":[]},{"given":"R.","family":"Sinha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","year":"0"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0360"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.11.022"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-012-9160-6"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICA.2011.6130187"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-012-0683-5"},{"key":"3","author":"kawaguchi","year":"2009","journal-title":"Face recognition-based lecture attendance system"},{"key":"2","article-title":"Development of academic attendence monitoring system using fingerprint identification","volume":"9","author":"nawas","year":"2009","journal-title":"International Journal of Computer Science and Network Security"},{"key":"1","article-title":"An attendance monitoring system using biometrics authentication","volume":"3","author":"rao","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"10","first-page":"3317","article-title":"Joint application of speech and speaker recognition for automation and security in smart home","author":"lee","year":"2011","journal-title":"InterSpeech"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0360"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2011.5734775"},{"key":"5","first-page":"788","article-title":"Frontend factor analysis for speaker verification,\" audio, speech, and language processing","volume":"19","author":"dehak","year":"2011","journal-title":"IEEE Trans on"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2007.902410"},{"key":"8","first-page":"14711474","article-title":"Within-class covariance normalization for svm-based speaker recognition","author":"hatch","year":"2006","journal-title":"Proc of ICSLP"}],"event":{"name":"2014 Twentieth National Conference on Communications (NCC)","location":"Kanpur, India","start":{"date-parts":[[2014,2,28]]},"end":{"date-parts":[[2014,3,2]]}},"container-title":["2014 Twentieth National Conference on Communications (NCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6802611\/6811235\/06811345.pdf?arnumber=6811345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T15:51:38Z","timestamp":1490284298000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6811345\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ncc.2014.6811345","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}