Learn More
The purpose of this study is to develop robust techniques for speaker segmentation and clustering with focus on meetings domain. The techniques examined can however be applied to any other domains such as telephone and broadcast news. Traditional techniques for speaker diarization developed for telephone conversations or broadcast news are based on a single(More)
This paper proposes a new block cipher called KT-64. We make a cipher using components that are believed secure. The structure of KT-64 is very simple, strong and efficient. We use the controlled substitution-permutation networks (CSPNs) based on controlled elements (CEs) for designing fast block cipher suitable to cheap hardware implementation. Security(More)
— Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. This paper concerns the problem of using of the switchable data-dependent operations (SDDOs) oriented to(More)
Routing holes in wireless sensor networks (WSN) do occur due to several reasons, including cases caused by natural obstacles or disaster suffered areas. Computing the exact boundary of a hole is possible [5], but can be impractical with large holes. In this paper, we consider the problem of how to approximate a hole by a simplistic shape, covering polygon(More)
Computing semantic word similarity and relatedness requires access to vast amounts of semantic space for effective analysis. As a consequence, it is time-consuming to extract useful information from a large amount of data on a single workstation. In this paper, we propose a system, called Distributed Semantic Analysis (DSA), that integrates a(More)
People are observed to assortitavely connect on a set of traits. Uncovering the reasons for people exhibiting this strong assortative mixing in social networks is of great interest to researchers and in practice. A popular case application exploiting the insights about social correlation in social networks is in marketing and product promotion. Suggested(More)