MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "6b48d4d4-e67a-4555-90c7-b600ab873c71"}, "_deposit": {"id": "1740", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "1740"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/1740", "sets": ["user-uy"]}, "communities": ["ccm", "ccp", "kyauksetu", "ltc", "maas", "miit", "mlmu", "mmu", "mtlu", "mtu", "mub", "mude", "mufl", "pathein", "scu", "suoe", "tcu", "tgu", "tuh", "tum", "ucsm", "ucsmtla", "ucsmub", "ucspathein", "ucstaungoo", "ucsy", "udmm", "udmy", "uit", "um", "um1", "um2", "umkn", "umm", "uphy", "urj", "uvs", "uy", "yau", "ydbu", "ytu", "yude", "yueco", "yufl", "yuoe"], "control_number": "1740", "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Design and Construction of Voice Recognition Security System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Since new technologies are advanced in this century,\r many of the security are developed. Most of the old security\r systems are lack of human interacting. As advanced technology\r results, today security system such as voice command control\r system, voice recognition system, video surveillance system,\r human face recognition system are still in developed in run way.\r Among the most of the new technology, human biometric\r featured security system such as eye signature, face processing\r and voice processing security systems are most popular because\r of their advantages. The aim of this paper is to develop a “Voice\r Recognition Security System”. By using this system, a door is\r controlled by human voice signature. Voice recognition software\r can process and verify human voice that the voice of the human\r can pass the door. The system is composed of two main parts,\r personal computer based voice processing system and parallel\r (LPT) port interfacing and control circuit. PC based voice\r processing system is attached with a microphone to PC’s\r soundcard and running with human voice recognition system\r and processing with engine software."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Video Surveillance"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-05-05"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "3.Design and Construction of Voice Recognition by Ei Ei Toe.pdf", "filesize": [{"value": "2333 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 2333000.0, "url": {"url": "https://meral.edu.mm/record/1740/files/3.Design and Construction of Voice Recognition by Ei Ei Toe.pdf"}, "version_id": "b7d65358-ff40-4d58-97a5-8d006bace5ad"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{}]}, "item_1583103147082": {"attribute_name": "Conference papaers", "attribute_value_mlt": [{}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_supervisor(s)": []}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Ei Ei Toe"}, {"subitem_authors_fullname": "Maung Maung Latt"}, {"subitem_authors_fullname": "Sandahna, U Clement"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://uyr.uy.edu.mm/handle/123456789/73"}, "item_title": "Design and Construction of Voice Recognition Security System", "item_type_id": "21", "owner": "1", "path": ["1582967549708"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000001740", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-03-05"}, "publish_date": "2020-03-05", "publish_status": "0", "recid": "1740", "relation": {}, "relation_version_is_last": true, "title": ["Design and Construction of Voice Recognition Security System"], "weko_shared_id": -1}
Design and Construction of Voice Recognition Security System
http://hdl.handle.net/20.500.12678/0000001740
http://hdl.handle.net/20.500.12678/00000017402558126f-322b-4d5c-a9f3-ded5aec19f84
6b48d4d4-e67a-4555-90c7-b600ab873c71
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Conference paper | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Design and Construction of Voice Recognition Security System | |||||
Language | en | |||||
Publication date | 2010 | |||||
Authors | ||||||
Ei Ei Toe | ||||||
Maung Maung Latt | ||||||
Sandahna, U Clement | ||||||
Description | ||||||
Since new technologies are advanced in this century, many of the security are developed. Most of the old security systems are lack of human interacting. As advanced technology results, today security system such as voice command control system, voice recognition system, video surveillance system, human face recognition system are still in developed in run way. Among the most of the new technology, human biometric featured security system such as eye signature, face processing and voice processing security systems are most popular because of their advantages. The aim of this paper is to develop a “Voice Recognition Security System”. By using this system, a door is controlled by human voice signature. Voice recognition software can process and verify human voice that the voice of the human can pass the door. The system is composed of two main parts, personal computer based voice processing system and parallel (LPT) port interfacing and control circuit. PC based voice processing system is attached with a microphone to PC’s soundcard and running with human voice recognition system and processing with engine software. |
||||||
Keywords | ||||||
Video Surveillance | ||||||
Identifier | http://uyr.uy.edu.mm/handle/123456789/73 | |||||
Journal articles | ||||||
Conference papaers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |