Research Article
Feature Extraction Approach for Speaker Verification to Support Healthcare System Using Blockchain Security for Data Privacy
| D:\DB_50\0\00 | D:\DB_50\0\01 | D:\DB_50\0\02 | D:\DB_50\0\03 | D:\DB_50\0\04 | D:\DB_50\0\05 | D:\DB_50\0\06 | D:\DB_50\0\07 | D:\DB_50\0\08 | D:\DB_50\0\09 | D:\DB_50\1\00 | D:\DB_50\1\01 | D:\DB_50\1\02 | D:\DB_50\1\03 | D:\DB_50\1\04 | D:\DB_50\1\05 | D:\DB_50\1\06 | D:\DB_50\1\07 | D:\DB_50\1\08 | D:\DB_50\1\09 | D:\DB_50\2\00 | D:\DB_50\2\01 | D:\DB_50\2\02 | D:\DB_50\2\03 | D:\DB_50\2\04 | D:\DB_50\2\05 | D:\DB_50\2\06 | D:\DB_50\2\07 | D:\DB_50\2\08 | D:\DB_50\2\09 | D:\DB_50\3\00 | D:\DB_50\3\01 | D:\DB_50\3\02 | D:\DB_50\3\03 | D:\DB_50\3\04 | D:\DB_50\3\05 | D:\DB_50\3\06 | D:\DB_50\3\07 | D:\DB_50\3\08 | D:\DB_50\3\09 | D:\DB_50\4\00 | D:\DB_50\4\01 | D:\DB_50\4\02 | D:\DB_50\4\03 | D:\DB_50\4\04 | D:\DB_50\4\05 | D:\DB_50\4\06 | D:\DB_50\4\07 | D:\DB_50\4\08 | D:\DB_50\4\09 |
|
|