MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "9d84bf10-6ce5-43e5-858a-86400de6e2b7"}, "_deposit": {"id": "3801", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3801"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3801", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Voice Authorization using Voice Recognition and Verification Method", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "A method for enabling to obtain access via amicrophone without typing password in login pageis described. Voice recognition is the task ofdetermining the identity of a person from his or hervoice. Voice verification is defined as deciding if aspeaker is who he claims to be. After entry andrecognition of password, the set of parameters areused to generate speaker verification for passwordhas a predetermined relationship, the user isaccepted. If not, the user is rejected to allowaccess. A voice recognizer performs voicerecognition functions on the speech. A framemapper marks the beginning and ending of eachdigit, if the password utterance is numbers, withinthe utterance. Verification method generates averification signal in response to verifying aminimum number of the passwords within theutterance being matched with the verificationtemplates."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Voice recognition"}, {"interim": "Voice verification"}, {"interim": "parameters"}, {"interim": "matching"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-31"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "54115.pdf", "filesize": [{"value": "537 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 537000.0, "url": {"url": "https://meral.edu.mm/record/3801/files/54115.pdf"}, "version_id": "81b3e414-5d53-473d-8fbb-d438b2c7ca31"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Hlaing, Yimon"}, {"subitem_authors_fullname": "Aye, Soe Soe"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1530"}, "item_title": "Voice Authorization using Voice Recognition and Verification Method", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003801", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-31"}, "publish_date": "2019-07-31", "publish_status": "0", "recid": "3801", "relation": {}, "relation_version_is_last": true, "title": ["Voice Authorization using Voice Recognition and Verification Method"], "weko_shared_id": -1}
Voice Authorization using Voice Recognition and Verification Method
http://hdl.handle.net/20.500.12678/0000003801
http://hdl.handle.net/20.500.12678/00000038014c44090b-d409-446d-9ea5-443a1b2f20b3
9d84bf10-6ce5-43e5-858a-86400de6e2b7
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Voice Authorization using Voice Recognition and Verification Method | |||||
Language | en | |||||
Publication date | 2009-12-30 | |||||
Authors | ||||||
Hlaing, Yimon | ||||||
Aye, Soe Soe | ||||||
Description | ||||||
A method for enabling to obtain access via amicrophone without typing password in login pageis described. Voice recognition is the task ofdetermining the identity of a person from his or hervoice. Voice verification is defined as deciding if aspeaker is who he claims to be. After entry andrecognition of password, the set of parameters areused to generate speaker verification for passwordhas a predetermined relationship, the user isaccepted. If not, the user is rejected to allowaccess. A voice recognizer performs voicerecognition functions on the speech. A framemapper marks the beginning and ending of eachdigit, if the password utterance is numbers, withinthe utterance. Verification method generates averification signal in response to verifying aminimum number of the passwords within theutterance being matched with the verificationtemplates. | ||||||
Keywords | ||||||
Voice recognition, Voice verification, parameters, matching | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1530 | |||||
Journal articles | ||||||
Fourth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |