{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:18Z","timestamp":1773615618927,"version":"3.50.1"},"reference-count":10,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s014641162108006x","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"924-931","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Architecture and Operation Algorithm of a Biometric Voice Authentication System"],"prefix":"10.3103","volume":"55","author":[{"given":"E. P.","family":"Belova","sequence":"first","affiliation":[]},{"given":"I. V.","family":"Mashkina","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7418_CR1","doi-asserted-by":"publisher","first-page":"889","DOI":"10.3103\/S0146411619080194","volume":"53","author":"E.V. Malyshev","year":"2019","unstructured":"Malyshev, E.V., Moskvin, D.A., and Zegzhda, D.P., Application of an artificial neural network for detection of attacks in VANETs, Autom. Control Comput. Sci., 2019, vol. 53, no.\u00a08, pp. 889\u2013894. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080194","journal-title":"Autom. Control Comput. Sci."},{"key":"7418_CR2","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Pavlenko, E., and Ignatev, G., Applying deep learning techniques for Android malware detection, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, UK, 2018, New York: Association for Computing Machinery, 2018, p. 7. https:\/\/doi.org\/10.1145\/3264437.3264476","DOI":"10.1145\/3264437.3264476"},{"key":"7418_CR3","doi-asserted-by":"publisher","first-page":"874","DOI":"10.3103\/S0146411617080296","volume":"51","author":"P.D. Zegzhda","year":"2017","unstructured":"Zegzhda, P.D., Malyshev, E.V., and Pavlenko, E.Yu., The use of an artificial neural network to detect automatically managed accounts in social networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 874\u2013880. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080296","journal-title":"Autom. Control Comput. Sci."},{"key":"7418_CR4","doi-asserted-by":"publisher","unstructured":"Belova, Ye.P. and Mashkina, I.V., Research results of artificial neural network for user authentication according to frequency of fourth formant of vowel sound phoneme, in Int. Russian Automation Conf. (RusAutoCon), Sochi, Russia, 2018, IEEE, 2018, pp. 1\u20136. \u00a0https:\/\/doi.org\/10.1109\/RUSAUTOCON.2018.8501680","DOI":"10.1109\/RUSAUTOCON.2018.8501680"},{"key":"7418_CR5","unstructured":"Rabiner, L.R. and Shafer, R.V., Tsifrovaya obrabotka rechevykh signalov (Digital Processing of Speech Signals), Moscow: Radio i Svyaz\u2019, 1981."},{"key":"7418_CR6","unstructured":"Sidorenko, I.A. and Kuskova, P.A., On spectral analysis of phoneme using sound editors, Nauch. Ved. Belgorod. Gos. Univ. Ser.: Ekon. Inf., 2013, no. 22, pp. 246\u2013250."},{"key":"7418_CR7","unstructured":"Mashkina, I.V. and Belova, E.P., Development of the biometric images neural network database for voice authentication system, Probl. Inf. Bezop. Komp\u2019yut. Sist., 2019, no. 2, pp.\u00a086\u201393."},{"key":"7418_CR8","first-page":"177","volume":"59","author":"A.G. Oganesyan","year":"2006","unstructured":"Oganesyan, A.G., Effective algorithm for separating formants from the spectrum of speech signal, Izv. Nats. Akad. Nauk Resp. Arm. Gos. Inzh. Univ. Arm. Vychislit. Tekh. Inf., 2006, vol. 59, no. 1, pp. 177\u2013183.","journal-title":"Izv. Nats. Akad. Nauk Resp. Arm. Gos. Inzh. Univ. Arm. Vychislit. Tekh. Inf."},{"key":"7418_CR9","first-page":"205","volume":"29","author":"V.V. Kafarov","year":"1995","unstructured":"Kafarov, V.V., Gordeev, L.S., Glebov, M.B., and Jinbao, G., On the question of modeling and control of continuous technological processes using neural networks, TOKhT, 1995, vol.\u00a029, no. 2, p. 205.","journal-title":"TOKhT"},{"key":"7418_CR10","unstructured":"Privalov, M.V. and Kulibaba, O.V., Choice of features for authentication by voice in a\u00a0computer access control system, Nauk. Pratsi Donetsk. Nats. Tekh. Univ. Ser.: Obchisl. Tekh. Avtom., 2010, no. 18, pp. 216\u2013222."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162108006X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641162108006X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162108006X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:21Z","timestamp":1773612141000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641162108006X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":10,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7418"],"URL":"https:\/\/doi.org\/10.3103\/s014641162108006x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"2 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}