Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "9d84bf10-6ce5-43e5-858a-86400de6e2b7"}, "_deposit": {"id": "3801", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3801"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3801", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Voice Authorization using Voice Recognition and Verification Method", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "A method for enabling to obtain access via amicrophone without typing password in login pageis described. Voice recognition is the task ofdetermining the identity of a person from his or hervoice. Voice verification is defined as deciding if aspeaker is who he claims to be. After entry andrecognition of password, the set of parameters areused to generate speaker verification for passwordhas a predetermined relationship, the user isaccepted. If not, the user is rejected to allowaccess. A voice recognizer performs voicerecognition functions on the speech. A framemapper marks the beginning and ending of eachdigit, if the password utterance is numbers, withinthe utterance. Verification method generates averification signal in response to verifying aminimum number of the passwords within theutterance being matched with the verificationtemplates."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Voice recognition"}, {"interim": "Voice verification"}, {"interim": "parameters"}, {"interim": "matching"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-31"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "54115.pdf", "filesize": [{"value": "537 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 537000.0, "url": {"url": "https://meral.edu.mm/record/3801/files/54115.pdf"}, "version_id": "81b3e414-5d53-473d-8fbb-d438b2c7ca31"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Hlaing, Yimon"}, {"subitem_authors_fullname": "Aye, Soe Soe"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1530"}, "item_title": "Voice Authorization using Voice Recognition and Verification Method", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003801", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-31"}, "publish_date": "2019-07-31", "publish_status": "0", "recid": "3801", "relation": {}, "relation_version_is_last": true, "title": ["Voice Authorization using Voice Recognition and Verification Method"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Voice Authorization using Voice Recognition and Verification Method

http://hdl.handle.net/20.500.12678/0000003801
http://hdl.handle.net/20.500.12678/0000003801
4c44090b-d409-446d-9ea5-443a1b2f20b3
9d84bf10-6ce5-43e5-858a-86400de6e2b7
None
Preview
Name / File License Actions
54115.pdf 54115.pdf (537 Kb)
Publication type
Article
Upload type
Publication
Title
Title Voice Authorization using Voice Recognition and Verification Method
Language en
Publication date 2009-12-30
Authors
Hlaing, Yimon
Aye, Soe Soe
Description
A method for enabling to obtain access via amicrophone without typing password in login pageis described. Voice recognition is the task ofdetermining the identity of a person from his or hervoice. Voice verification is defined as deciding if aspeaker is who he claims to be. After entry andrecognition of password, the set of parameters areused to generate speaker verification for passwordhas a predetermined relationship, the user isaccepted. If not, the user is rejected to allowaccess. A voice recognizer performs voicerecognition functions on the speech. A framemapper marks the beginning and ending of eachdigit, if the password utterance is numbers, withinthe utterance. Verification method generates averification signal in response to verifying aminimum number of the passwords within theutterance being matched with the verificationtemplates.
Keywords
Voice recognition, Voice verification, parameters, matching
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1530
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:32:54.866908
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL