System login authentication using voice recognition and ai methods / Metrius Benedict Sunggoh
This thesis will show how the voice recognition technique can be combined with template matching technique (Vector Quantization) to validate a login process. This system will be divided into two modules; Enrollment and Verification During the Enrollment process,the person offers a 'live sample&...
| Main Author: | Metrius, Benedict Sunggoh |
|---|---|
| Format: | Thesis |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/9130/ http://studentsrepo.um.edu.my/9130/1/System_login_authentication_using_voice_recogniyion.pdf |
Similar Items
System login authentication using voice recognition and other AI methods / Zati Hakim Azizul Hasan
by: Zati Hakim, Azizul Hasan
Published: (2000)
by: Zati Hakim, Azizul Hasan
Published: (2000)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Religious coping, religiosity, depressive and anxiety symptoms among Malaysian medical students / Benedict Francis
by: Benedict , Francis
Published: (2019)
by: Benedict , Francis
Published: (2019)
Revolution of ID card / Belinda Michelle Benedict...[et.al]
by: Benedict, Belinda Michelle, et al.
Published: (2016)
by: Benedict, Belinda Michelle, et al.
Published: (2016)
Lecture assessment system (login module and manage user module)
by: Ibrahim, Noraini
Published: (2003)
by: Ibrahim, Noraini
Published: (2003)
Staff management and fingerprint login module of shop management system
by: Foong, Jek
Published: (2010)
by: Foong, Jek
Published: (2010)
A study on the effectiveness if In-House Union SESB Headquarter in Kota Kinabalu / Bibianah Nasir and Rachel Benedict
by: Nasir, Bibianah, et al.
Published: (2013)
by: Nasir, Bibianah, et al.
Published: (2013)
Benedict atasi 'trauma' false start
by: Utusan Malaysia
Published: (2022)
by: Utusan Malaysia
Published: (2022)
Personal identification by Keystroke Pattern for login security
by: Abdullah, Norhayati
Published: (2001)
by: Abdullah, Norhayati
Published: (2001)
Cross–language transfer of phonological and morphological awareness among young Malay second language learners / Anne Benedict Nair
by: Nair, Anne Benedict
Published: (2013)
by: Nair, Anne Benedict
Published: (2013)
Assessment of food safety knowledge, attitudes, practices, and training of foodhandlers in the context of HACCP guidelines in Malaysian public universities / Lovelyna Benedict Jipiu
by: Benedict Jipiu, Lovelyna
Published: (2016)
by: Benedict Jipiu, Lovelyna
Published: (2016)
Assessment of food safety knowledge, attitudes, practices, and training of foodhandlers in the context of HACCP guidelines in Malaysian Public Universities / Lovelyna Benedict Jipiu
by: Benedict Jipiu, Lovelyna
Published: (2017)
by: Benedict Jipiu, Lovelyna
Published: (2017)
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002)
by: Mohd Shahman , Samsul Ambia
Published: (2002)
Loans, logins and lasting the course: Academic library use and student retention
by: Haddow, Gaby, et al.
Published: (2010)
by: Haddow, Gaby, et al.
Published: (2010)
Ethical leadership in modern employment relations: Lessons from St. Benedict
by: Chan, C., et al.
Published: (2011)
by: Chan, C., et al.
Published: (2011)
Effect of EDX accelerating voltage on ZnO thin film doped with sodium / Benedict Wen Cheun Au ... [et al.]
by: Wen, Benedict Cheun Au, et al.
Published: (2018)
by: Wen, Benedict Cheun Au, et al.
Published: (2018)
Voice recognition preprocessing voice signal / Yeoh Ling Tze
by: Yeoh, Ling Tze
Published: (2004)
by: Yeoh, Ling Tze
Published: (2004)
The effect of class absenteeism on students performance: evidence from Faculty of Accountancy UITM Sabah / Emelia A. Girau, Marius Benedict and Yvonne Joseph Ason
by: A. Girau, Emelia, et al.
Published: (2011)
by: A. Girau, Emelia, et al.
Published: (2011)
Justification of voice recognition system : case study of the Quran.
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Improved voice activity detection for speech recognition system
by: Chin, S., et al.
Published: (2010)
by: Chin, S., et al.
Published: (2010)
Animal voice recognition for identification (ID) detection system
by: Yeo, Che Yong, et al.
Published: (2011)
by: Yeo, Che Yong, et al.
Published: (2011)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
Development of voice recognition for student attendance
by: Uddin , Nasir, et al.
Published: (2016)
by: Uddin , Nasir, et al.
Published: (2016)
Automated grass cutter using voice recognition
by: Muhamad Salihin, Nasir, et al.
Published: (2021)
by: Muhamad Salihin, Nasir, et al.
Published: (2021)
Hand Gesture Recognition: Sign to Voice System (S2V)
by: Foong, Oi Mean
Published: (2009)
by: Foong, Oi Mean
Published: (2009)
Traffic Sign Board Recognition and Voice Alert System using CNN
by: Yogesh, C.M., et al.
Published: (2024)
by: Yogesh, C.M., et al.
Published: (2024)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Voice to text conversion app with speaker recognition
by: Ang, Sea Zhe
Published: (2022)
by: Ang, Sea Zhe
Published: (2022)
Voice and image recognition for smart pet app
by: Lee, Yen Long
Published: (2019)
by: Lee, Yen Long
Published: (2019)
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
by: A. Rashid, Rozeha, et al.
Published: (2008)
by: A. Rashid, Rozeha, et al.
Published: (2008)
On the use of voice activity detection in speech emotion recognition
by: Alghifari, Muhammad Fahreza, et al.
Published: (2019)
by: Alghifari, Muhammad Fahreza, et al.
Published: (2019)
Voices of the other: authenticity and consciousness of language in an East Indonesian song tradition
by: Timo Kaartinen,
Published: (1998)
by: Timo Kaartinen,
Published: (1998)
Enhancement Of Login Process Multi-Server Conmmnication For Multimedia Conferencing System (Mcs) Using Distributed Lightweight Directory Access Protocol (Ldap).
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
Design Of Protected Iris Recognition Systems With Improved Authentication Performance
by: Chai, Tong Yuen
Published: (2022)
by: Chai, Tong Yuen
Published: (2022)
Evaluating the effect of voice activity detection in
isolated Yoruba Word Recognition System
by: Aibinu, Abiodun Musa, et al.
Published: (2011)
by: Aibinu, Abiodun Musa, et al.
Published: (2011)
Voice Recognition Algorithm in the Development of Universal Remote Control
by: Muda, Lindasalwa, et al.
Published: (2009)
by: Muda, Lindasalwa, et al.
Published: (2009)
Voice Driven Emotion Recognition For Virtual Reality Telecommunications
by: Abdul Razak, Aishah
Published: (2005)
by: Abdul Razak, Aishah
Published: (2005)
Development of smart talking plant with voice recognition function
by: Zaragoza, Mechelle Grace, et al.
Published: (2017)
by: Zaragoza, Mechelle Grace, et al.
Published: (2017)
Planning Application with Voice Recognition to Assist Procrastinators in Managing Time
by: Kayalvily, Tabianan, et al.
Published: (2018)
by: Kayalvily, Tabianan, et al.
Published: (2018)
Plan recognition scheme using multi-factors authentication for smart card online system
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
Similar Items
-
System login authentication using voice recognition and other AI methods / Zati Hakim Azizul Hasan
by: Zati Hakim, Azizul Hasan
Published: (2000) -
Secure login authentication system
by: Chow, Wen Chai
Published: (2018) -
Religious coping, religiosity, depressive and anxiety symptoms among Malaysian medical students / Benedict Francis
by: Benedict , Francis
Published: (2019) -
Revolution of ID card / Belinda Michelle Benedict...[et.al]
by: Benedict, Belinda Michelle, et al.
Published: (2016) -
Lecture assessment system (login module and manage user module)
by: Ibrahim, Noraini
Published: (2003)