Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "6b48d4d4-e67a-4555-90c7-b600ab873c71"}, "_deposit": {"id": "1740", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "1740"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/1740", "sets": ["user-uy"]}, "communities": ["ccm", "ccp", "kyauksetu", "ltc", "maas", "miit", "mlmu", "mmu", "mtlu", "mtu", "mub", "mude", "mufl", "pathein", "scu", "suoe", "tcu", "tgu", "tuh", "tum", "ucsm", "ucsmtla", "ucsmub", "ucspathein", "ucstaungoo", "ucsy", "udmm", "udmy", "uit", "um", "um1", "um2", "umkn", "umm", "uphy", "urj", "uvs", "uy", "yau", "ydbu", "ytu", "yude", "yueco", "yufl", "yuoe"], "control_number": "1740", "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Design and Construction of Voice Recognition Security System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Since new technologies are advanced in this century,\r many of the security are developed. Most of the old security\r systems are lack of human interacting. As advanced technology\r results, today security system such as voice command control\r system, voice recognition system, video surveillance system,\r human face recognition system are still in developed in run way.\r Among the most of the new technology, human biometric\r featured security system such as eye signature, face processing\r and voice processing security systems are most popular because\r of their advantages. The aim of this paper is to develop a “Voice\r Recognition Security System”. By using this system, a door is\r controlled by human voice signature. Voice recognition software\r can process and verify human voice that the voice of the human\r can pass the door. The system is composed of two main parts,\r personal computer based voice processing system and parallel\r (LPT) port interfacing and control circuit. PC based voice\r processing system is attached with a microphone to PC’s\r soundcard and running with human voice recognition system\r and processing with engine software."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Video Surveillance"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-05-05"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "3.Design and Construction of Voice Recognition by Ei Ei Toe.pdf", "filesize": [{"value": "2333 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 2333000.0, "url": {"url": "https://meral.edu.mm/record/1740/files/3.Design and Construction of Voice Recognition by Ei Ei Toe.pdf"}, "version_id": "b7d65358-ff40-4d58-97a5-8d006bace5ad"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{}]}, "item_1583103147082": {"attribute_name": "Conference papaers", "attribute_value_mlt": [{}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_supervisor(s)": []}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Ei Ei Toe"}, {"subitem_authors_fullname": "Maung Maung Latt"}, {"subitem_authors_fullname": "Sandahna, U Clement"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://uyr.uy.edu.mm/handle/123456789/73"}, "item_title": "Design and Construction of Voice Recognition Security System", "item_type_id": "21", "owner": "1", "path": ["1582967549708"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000001740", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-03-05"}, "publish_date": "2020-03-05", "publish_status": "0", "recid": "1740", "relation": {}, "relation_version_is_last": true, "title": ["Design and Construction of Voice Recognition Security System"], "weko_shared_id": -1}
  1. University of Yangon
  2. Department of Physics

Design and Construction of Voice Recognition Security System

http://hdl.handle.net/20.500.12678/0000001740
http://hdl.handle.net/20.500.12678/0000001740
2558126f-322b-4d5c-a9f3-ded5aec19f84
6b48d4d4-e67a-4555-90c7-b600ab873c71
None
Preview
Name / File License Actions
3.Design 3.Design and Construction of Voice Recognition by Ei Ei Toe.pdf (2333 Kb)
Publication type
Conference paper
Upload type
Publication
Title
Title Design and Construction of Voice Recognition Security System
Language en
Publication date 2010
Authors
Ei Ei Toe
Maung Maung Latt
Sandahna, U Clement
Description
Since new technologies are advanced in this century,
many of the security are developed. Most of the old security
systems are lack of human interacting. As advanced technology
results, today security system such as voice command control
system, voice recognition system, video surveillance system,
human face recognition system are still in developed in run way.
Among the most of the new technology, human biometric
featured security system such as eye signature, face processing
and voice processing security systems are most popular because
of their advantages. The aim of this paper is to develop a “Voice
Recognition Security System”. By using this system, a door is
controlled by human voice signature. Voice recognition software
can process and verify human voice that the voice of the human
can pass the door. The system is composed of two main parts,
personal computer based voice processing system and parallel
(LPT) port interfacing and control circuit. PC based voice
processing system is attached with a microphone to PC’s
soundcard and running with human voice recognition system
and processing with engine software.
Keywords
Video Surveillance
Identifier http://uyr.uy.edu.mm/handle/123456789/73
Journal articles
Conference papaers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-03-08 23:12:23.586812
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL