{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:13:08Z","timestamp":1730207588513,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/cis.2014.19","type":"proceedings-article","created":{"date-parts":[[2015,1,23]],"date-time":"2015-01-23T21:32:30Z","timestamp":1422048750000},"page":"732-735","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of Hybrid Feature Research Based on Extraction LPCC and MFCC"],"prefix":"10.1109","author":[{"given":"Jianchen","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Zengli","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"iv461","article-title":"Physiological feature extraction for text independent speaker identification using non-uniform subbed processing[c]","author":"lu","year":"2007","journal-title":"IEEE"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.847861"},{"key":"1","first-page":"iv281","article-title":"Improving the filter bank of a classic speech feature extraction algorithm[C]","author":"skowronski","year":"2003","journal-title":"IEEE"},{"key":"7","first-page":"128","author":"gawker","year":"2010","journal-title":"Advances in Nonlinear Speech Processing [M]"},{"key":"6","article-title":"Speech recognition as feature extraction for speaker recognition[c]","author":"stolcke","year":"2007","journal-title":"Proc Signal Processing Applications Public Security Forensics"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INDCON.2009.5409411"},{"key":"4","first-page":"1842","volume":"15","author":"chakrabartty","year":"2007","journal-title":"Robust Speech Feature Extraction by Growth Transformation in Reproducing Kernel Hilbert Space [J]"}],"event":{"name":"2014 Tenth International Conference on Computational Intelligence and Security (CIS)","start":{"date-parts":[[2014,11,15]]},"location":"Kunming, Yunnan, China","end":{"date-parts":[[2014,11,16]]}},"container-title":["2014 Tenth International Conference on Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008825\/7016831\/07016995.pdf?arnumber=7016995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:16:46Z","timestamp":1490303806000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7016995\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/cis.2014.19","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}