G
Goutam Saha
Researcher at North Eastern Hill University
Publications - 151
Citations - 860
Goutam Saha is an academic researcher from North Eastern Hill University. The author has contributed to research in topics: Speaker recognition & Gene regulatory network. The author has an hindex of 13, co-authored 143 publications receiving 583 citations. Previous affiliations of Goutam Saha include Indian Institute of Technology Kharagpur & West Bengal University of Technology.
Papers
More filters
Proceedings ArticleDOI
Mitigating the Effects of External Perturbations on a Gene Regulatory Network using Feedback Controllers
TL;DR: The results obtained herein show that the proposed formalism can mitigate the unwanted effects of external disturbances effectively and is one of the first research works in this domain to consider a completely non-linear scenario.
Journal ArticleDOI
A Low-Error, Memory-Based Fast Binary Logarithmic Converter
TL;DR: In Otsu’s image thresholding algorithm, the proposed logarithmic converter with 3.08 kbits memory size adequately meets the accuracy requirement for improved image segmentation.
Posted Content
In Search of Autocorrelation Based Vocal Cord Cues for Speaker Identification
Md. Sahidullah,Goutam Saha +1 more
TL;DR: This paper has used Gaussian mixture model (GMM) based speaker modeling and results are shown on two public databases to validate the proposition that fusing these two sources of information in representing speaker characteristics yield better speaker identification accuracy.
Proceedings ArticleDOI
Relevant subspace selection in Kernel feature space for speech recognition
Jaydeep De,Goutam Saha +1 more
TL;DR: Using this approach to select the most relevant subspace in Kernel PCA feature space applied on MFCC coefficients for speech recognition, better results are obtained as compared to standard technique.
Book ChapterDOI
Designing Lightweight S-Box Using Simplified Finite Field Inversion Mapping
TL;DR: In this paper, a technique was proposed to design smaller S-boxes that can be used in lightweight block ciphers, hash functions, etc. The design technique used in the AES S-box was adopted and simplified in order to make these smaller Sboxes.