{"created":"2020-03-08T23:12:22.697682+00:00","id":1740,"links":{},"metadata":{"_buckets":{"deposit":"6b48d4d4-e67a-4555-90c7-b600ab873c71"},"_deposit":{"id":"1740","owners":[],"pid":{"revision_id":0,"type":"recid","value":"1740"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/1740","sets":["1582963390870:1582967549708"]},"communities":["ccm","ccp","kyauksetu","ltc","maas","miit","mlmu","mmu","mtlu","mtu","mub","mude","mufl","pathein","scu","suoe","tcu","tgu","tuh","tum","ucsm","ucsmtla","ucsmub","ucspathein","ucstaungoo","ucsy","udmm","udmy","uit","um","um1","um2","umkn","umm","uphy","urj","uvs","uy","yau","ydbu","ytu","yude","yueco","yufl","yuoe"],"control_number":"1740","item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Design and Construction of Voice Recognition Security System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Since new technologies are advanced in this century,\r many of the security are developed. Most of the old security\r systems are lack of human interacting. As advanced technology\r results, today security system such as voice command control\r system, voice recognition system, video surveillance system,\r human face recognition system are still in developed in run way.\r Among the most of the new technology, human biometric\r featured security system such as eye signature, face processing\r and voice processing security systems are most popular because\r of their advantages. The aim of this paper is to develop a “Voice\r Recognition Security System”. By using this system, a door is\r controlled by human voice signature. Voice recognition software\r can process and verify human voice that the voice of the human\r can pass the door. The system is composed of two main parts,\r personal computer based voice processing system and parallel\r (LPT) port interfacing and control circuit. PC based voice\r processing system is attached with a microphone to PC’s\r soundcard and running with human voice recognition system\r and processing with engine software."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Video Surveillance"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-05-05"}],"displaytype":"preview","filename":"3.Design and Construction of Voice Recognition by Ei Ei Toe.pdf","filesize":[{"value":"2333 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/1740/files/3.Design and Construction of Voice Recognition by Ei Ei Toe.pdf"},"version_id":"b7d65358-ff40-4d58-97a5-8d006bace5ad"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{}]},"item_1583103147082":{"attribute_name":"Conference papaers","attribute_value_mlt":[{}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_supervisor(s)":[]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Ei Ei Toe"},{"subitem_authors_fullname":"Maung Maung Latt"},{"subitem_authors_fullname":"Sandahna, U Clement"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://uyr.uy.edu.mm/handle/123456789/73"},"item_title":"Design and Construction of Voice Recognition Security System","item_type_id":"21","owner":"1","path":["1582967549708"],"publish_date":"2020-03-05","publish_status":"0","recid":"1740","relation_version_is_last":true,"title":["Design and Construction of Voice Recognition Security System"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:06:03.925268+00:00"}