Showing 241 - 260 results of 1,076 for search '((((pinn OR pinggn) OR (voice OR spike)) OR pine) OR (sspinal OR ((ping OR ming) OR min)))', query time: 0.08s Refine Results
  1. 241

    Digital speech interpolation advantage of statistical time division multiplexer by Shah , Asadullah, Khatri, Krishan Lal

    Published 2011
    “…Keywords: Digital Speech Interpolation (DSI), Statistical Time Division Multiplexing (STDM), Voice Activity Detector (VAD)…”
    Get full text
    Article
  2. 242
  3. 243

    Multimodal user interaction with in-car equipment in real conditions based on touch and speech modes in the Persian language by Nazari, Fateme, Tabibian, Shima, Homayounvala, Elaheh

    Published 2022
    “…This input mode faces several technical challenges such as the need to memorize voice commands and the difficulties of canceling them. …”
    Get full text
    Article
  4. 244

    Synthesis-condition dependence of carbon nanotube growth by alcohol catalytic chemical vapor deposition method by Inami, Nobuhito, Mohamed, Mohd Ambri, Shikoh, Eiji, Fujiwara, Akihiko

    Published 2007
    “…Three types of heat-treatment, synthesis of 30 min, synthesis of 30 min after annealing of 30 min, and synthesis of 60 min, were investigated. …”
    Get full text
    Article
  5. 245

    Ethnic recognition system for Malay language speakers using gammatone frequency cepstral coefficients pitch (GFCCP) and pattern classification by Mohd Hanifa, Rafizah

    Published 2022
    “…The research focused on establishing a novel method, Gammatone Frequency Cepstral Coefficients and pitch (GFFCP) coupled with the K-Nearest Neighbours (KNN) and the voice text-independent system were used to identify the speaker's ethnicity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 246

    Biotar ironmaking using wooden biomass and nanoporous iron ore by Hata, Yuichi, Purwanto, Hadi, Hosokai, Sou, Hayashi, Jun-ichiro, Kashiwaya, Yoshiaki, Akiyama, Tomohiro

    Published 2009
    “…In our experiments, three types of iron ores containing different amounts of combined water (CW; 1.6, 3.8, and 9.0 mass %) were first dehydrated at 450 °C to make them porous and then heated with pine tree biomass at 500-600 °C for the gasification and the tar vapor generated was decomposed to deposit carbon within/on the porous ores. …”
    Get full text
    Article
  7. 247
  8. 248

    Identifying key drivers of food price inflation in Malaysia by Norazman, Umi Zakiah, Khalid, Haniza, Mat Ghani, Gairuzazmi

    Published 2016
    “…In Malaysia, food price inflation reached its highest level at 8.8% in mid-2008 compared to overall inflation of 5.5% for the same period, mainly blamed on the spike in world commodity prices. However, recent moves by the government to rationalize food and energy subsidies have also led to higher than normal headline inflation figures and cause public concern. …”
    Get full text
    Proceeding Paper
  9. 249

    Decoy ACE2-expressing extracellular vesicles that competitively bind SARS-CoV-2 as a possible COVID-19 therapy by Inal, Jameel

    Published 2020
    “…As for SARS-CoV that caused the SARS 2003 epidemic, the receptor on host cells that promotes uptake, through attachment of the spike (S) protein of the virus, is angiotensin-converting enzyme 2 (ACE2). …”
    Get full text
    Article
  10. 250

    VoIP in next generation converged networks by Toral-Cruz, Homero, Ramirez-Pacheco, Julio, Velarde-Alvarado, Pablo, Pathan, Al-Sakib Khan

    Published 2013
    “…These heterogeneous networks were designed to provide a specific service, which are initially distinct, and then converge into a single network. Voice over IP is a clear example of such convergent services, pushing towards adoption of next generation networks. …”
    Get full text
    Book Chapter
  11. 251

    Development of an intelligent multimodal biometric system for household appliances control by Abiodun musa, Aibinu

    Published 2012
    “…Hence, in this research, multimodal biometric system involving the integration of palmprint, teeth and voice biometrics was developed. The development of the multimodal biometric system was conducted in two phases. …”
    Get full text
    Get full text
    Monograph
  12. 252

    Development of coated peanut separator and frying skillet machine by Yusof, M Sallehuddin, Fadilullah, M Zul Nadzmi, Hassan, Suhaimi, Maksud, M Idris, Yunos, Muhamad Zaini

    Published 2018
    “…The groundnut is sticking and become like a ping pong size ball and the time consuming to fry is longer. …”
    Get full text
    Article
  13. 253
  14. 254

    Peranan guru besar, guru, dan, ibubapa mencapai objektif persekolahan sekolah rendah : perspektif ibu bapa by Salleh, Mohamad Johdi, Jamian, Mohd Faesal Mazian, Mastor, Azrina, Yacob, Nor Azura, Mohamad Nagib, Nor Fatihah, Mohd Roslan, Che Norhuda

    Published 2012
    “…Data respons dianalisis menggunakan perisian Statistical Package For The Social Sciences (SPSS) Version 16.0 dan dibentangkan dalam min. Kajian menunjukkan respons dimensi ’Perkembangan Asas Kendiri Murid’ mendapat skor tertinggi terhadap peranan guru dengan min 4.450, dimensi ‘Pembinaan Minat dan Bakat Murid’ skor tertinggi kepada peranan guru dengan min 4.212, dimensi ‘Persediaan Persekolahan Rendah’ skor tertinggi adalah ke atas peranan guru dengan min 4.374, dimensi ‘Persediaan Persekolahan Menengah’ skor tertinggi kepada peranan guru dengan min 4.374, dimensi ‘Pemahaman Budaya dan Kemahiran Sosial’ skor tertinggi kepada peranan guru dengan min 4.336, dimensi ’Keagamaan dan Moral’ skor tertinggi kepada peranan ibubapa dengan min 4.530, dimensi ‘Persediaan Pekerjaan’ skor tertinggi kepada peranan guru dengan min 4.352, dimensi ‘Sumbangan kepada Masyarakat’ skor tertinggi kepada peranan guru dengan min 4.503. …”
    Get full text
    Proceeding Paper
  15. 255

    Kinetics of water disinfection with Moringa Oleifera seeds extract by Bichi, Mustafa Hassan, Agunwamba, Jonah Chukwumemeka, Muyibi, Suleyman Aremu

    Published 2012
    “…One mL of Moringa extract was added to 10mL of the cell cultures and incubated for 0, 30min, 60min, 90min, and 120min without agitation. …”
    Get full text
    Article
  16. 256

    A case study: submarine cable in Bangladesh - its prospects, present status, and challenges ahead by Rahman, Mohammad Ziaur, Pathan, Al-Sakib Khan

    Published 2010
    “…To predict the demand for various telecommunication services, such as, voice, data, Internet etc., an empirical formula has been derived considering five major parameters. …”
    Get full text
    Article
  17. 257
  18. 258

    A comparative study on flank wear and work surface finish during high speed milling of cast iron with different carbide tools by Khan, Ahsan Ali, Aman Nor Rasid, Zuraida, Yusof, Izausmawati

    Published 2011
    “…Tool life sharply reduced for all the carbide tools while increasing cutting speed twice (from 500m/min to 1000m/min) during machining cast iron. Though the productivity would be double at the speed of 1000m/min than that at the speed of 500m/min, tool wear increases to a few times which indicates that the inserts used are not suitable for machining at a high speed like 1000m/min. …”
    Get full text
    Book Chapter
  19. 259

    Development and validation of analytical method by RP-HPLC for quantification of Alpha-Mangostin Encapsulated in PLGA microspheres by Elsaid Ali, Aimen Abdo, Muhammad, Taher, Helal Uddin, A.B.M., Mohamed, Farahidah

    Published 2012
    “…Method was developed using a silica-based deactivated C-18 column (4.6×100 mm, 3 μm) with a mobile phase of 70-80 % v/v acetonitrile (A) and 0.1% v/v orthophosphoric acid (B), with the following pre-determined timed-gradient program: 70% (A) isocratic for 6 min, 70-75% (A) in 1.2 min, 75-80% (A) in 0.4 min, 80% (A) isocratic for 2.4 min, 80-70% (A) in 0.4 min, finally 70% (A)isocratic for 5 min, with a flow rate of 1 mL/min, detected at 320 nm by a UV detector. …”
    Get full text
    Article
  20. 260

    Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes by Waqar, Ali, Sang, Jun, Naeem, Hamad, Naeem, Rashid, Soomro, Ali Raza

    Published 2015
    “…As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. …”
    Get full text
    Get full text
    Proceeding Paper