{"created":"2020-09-01T13:32:50.835214+00:00","id":3801,"links":{},"metadata":{"_buckets":{"deposit":"9d84bf10-6ce5-43e5-858a-86400de6e2b7"},"_deposit":{"id":"3801","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3801"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3801","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Voice Authorization using Voice Recognition and Verification Method","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"A method for enabling to obtain access via amicrophone without typing password in login pageis described. Voice recognition is the task ofdetermining the identity of a person from his or hervoice. Voice verification is defined as deciding if aspeaker is who he claims to be. After entry andrecognition of password, the set of parameters areused to generate speaker verification for passwordhas a predetermined relationship, the user isaccepted. If not, the user is rejected to allowaccess. A voice recognizer performs voicerecognition functions on the speech. A framemapper marks the beginning and ending of eachdigit, if the password utterance is numbers, withinthe utterance. Verification method generates averification signal in response to verifying aminimum number of the passwords within theutterance being matched with the verificationtemplates."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Voice recognition"},{"interim":"Voice verification"},{"interim":"parameters"},{"interim":"matching"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-31"}],"displaytype":"preview","filename":"54115.pdf","filesize":[{"value":"537 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3801/files/54115.pdf"},"version_id":"81b3e414-5d53-473d-8fbb-d438b2c7ca31"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Hlaing, Yimon"},{"subitem_authors_fullname":"Aye, Soe Soe"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1530"},"item_title":"Voice Authorization using Voice Recognition and Verification Method","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-31","publish_status":"0","recid":"3801","relation_version_is_last":true,"title":["Voice Authorization using Voice Recognition and Verification Method"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T03:57:13.383531+00:00"}