Based on some of the studies we made above, we have also used a Raspberry Pi to control the Home Door with a magnetic lock. We have used some specific algorithms for facial detection and locking and unlocking the door and REST APIs to access it via our iOS app, which are discussed specifically in the following sections. A. Alexa and Siri for voice service Integrating the Home Security System with voice commands could be really helpful for the visually impaired, physically challenged or old people, who cannot respond immediately after they hear the home bell or can find it challenging to look manually into the app and use it. Also in some rare conditions of fire/emergency, where you cannot get in and out of the home without keys, you can tell Siri to open/close the door as soon as possible. Furthermore, enhancing the user experience by integrating iOS App with Alexa and Siri are an added advantage. In [7], Shilpa H Baria and Chintan Bhatt have discussed the need for the voice recognition in our daily lives, which would help us live a hands-free lifestyle instead of texting and using everything manually or how it helps the visually impaired. They have discussed about all the voice assistants that are available in the market today i.e., Amazon’s Alexa Echo, iPhone Siri, Microsoft’s Cortana and Google’s Google Assistant and compared their pros and cons. Automatic Speech Recognition (ASR) is used in most of the voice assistants these days. They have proposed a prototype
For example, the camera inputs video data while the microphone in the doorbell inputs audio data which is recorded if in range of the device. Its produced into video and audio data which is streamed to the user through the product’s app. Motion sensors send your mobile device a notification when motion is detected within the set range. Thus, it is recording 24/7 however notifications are sent to the user only when motions detected. One privacy concern is that the video and audio data is accessible to the company since it is sent through their app. The app grants access to the mobile device’s and doorbell’s current location. (4) This raises privacy concerns because the company knows where it’s users are and the user may not want that information exposed.They know when the owner leaves and enters their house. Potential hackers with malicious intent know when when the home is vacant which can leave the owner and their family in danger. The company also sees directly outside the owner’s house which also violates the user’s privacy. Ring stores this data thus making the concern of the user’s privacy being violated, apparent. As opposed to the input, the output is strictly audio data. The innovation allows the user to speak to whoever is outside the door, thus outputting audio data. As opposed to the input, the output does not utilize the owner’s mobile device, for they can speak to who is outside
If an individual has a hard time getting up and adjusting things such as how bright the lights are, the individual can say, “Hey Alexa, dim the lights please”.[2] Then the Amazon Echo will proceed to dim the lights. The Echo Dot could also control the temperature of the room as well and adjust it with a command [6]. Also, if an individual decides to watch TV but does not want to get the phone and order pizza, he or she can say, “Hey Alexa, order a large cheese from domino's.” A negative effect Amazon Echo has on society is how it's always listening. Currently the Amazon Echo is being used in a murder case in Arkansas, which raises the question about how private an individual's conversations are. However, the police had to obtain a search warrant in order to access the Amazon Echo. This answers the question that an individual's conversations are being recorded by the Amazon Echo because it’s always on and listening. This can deteriorate people from buying the Amazon Echo, and other personal home assistants as well. As a result of this possible outcome, the economy could take a hit as well since everything has started to go with using voice commands such as the Xfinity X1. People would not invest their money into these companies and sell off their stocks because since the Amazon Echo stores the conversations on the cloud, a hacker could gain access to it and it could be used against them in a court of
Wireless Sensor Networks (WSN) are made up of tiny sensing devices; capable of sensing some changes of incident/parameters and communicating with other devices, over a specific area. Mainly used for tracking, surveillance and environmental monitoring. These devices make it possible to be used in a system such as Home Automation and Security. Our purpose is to make our Home secure from any attacks physically and to the sensor network. Securing our Home starts from the outside, setting up a perimeter around house sensing intrusion and alerting the home owner. Allowing only predetermined users to enter the home. From the inside you can monitor for fires, leak, humidity or smoke, which the system will promptly report this to the owner as well as alert the proper authorities. Making most of the home voice controlled only recognized by the owner’s voice can add another layer of security.
Based on Chapter 2, Neural Network Method (NN) will be chosen for voice-based command recognition method because it can handle bigger databased. For Neural Network to implement pattern recognition is quite common, and beneficial to use is backpropagation. Supervised learning that starts by inputting the training data through the network is a form of this method. When the data is put in the network, it will generate propagation output activations and then propagated backwards through the neural network, and generating a delta value for all hidden and output neuron. The weights of the network are then update by calculated delta values that generate by neural network, which increase the speech and quality of the learning process.
Now, 27 years later, we have the ability to use voice commands to control computers, smartphones, appliances, and other electronic devices. You may have heard of the Amazon Echo, which is a small voice-driven electronic device that sits on a desk or table and responds to the name Alexa. The Echo can respond to commands requesting music tracks and radio stations and can also answer questions and control “smart appliances.” More than 4% of the homes in America now have an Amazon Echo sitting on a desk or a
. The second component of this project is the chip that is going to receive the analog signal from the microphone sensor when the person speaks. It is the critical part of this project. The chip that will be proposed in this project called voice recognition 3. This chip has a small flash memory that can save 80 voice commands. However, the maximum number of the voice commands that can work at the same time are 7 voice commands. Any word can by a command (2). However, we must train the module first before let it recognizing any voice command. This chip has two controlling ways. The way that is going to be proposed in this project called serial UART because it is easier to train it and save the commands in the memory. Also, perform the required functions which are “go forward, stop, left, right and reverse”.
An additional application of automation is called home automation. Home automation works by using advanced technology to control and do the jobs that people would normally do manually ("Home automation," 2010). The best and simplest way to install home automation is while a house is still being built. However, people who have houses already built can still have home automation installed through wireless
Having a home automation can go a long way in presenting your home as ‘smart home’. This is because most people nowadays have a smart-phone with them. However, just like other technology products, home automation cost varies from most affordable to extremely high cost.
I believe alexa and things like cortana, and siri are very useful but could turn dangerous to. Right now they aren't that smart and the echo is the smartest to come yet. They all have different things that are good with them and have different makers.
Specific Purpose: By the end of this speech I would like the audience to recall the reasons that workplace automation is better for humanity in both short and long term.
A monitored alarm system with video surveillance may best fit your needs. With this type of system, your home is constantly monitored even when you are away. Monitored home security systems have sensors that are responsive not only to intruders, but fire and carbon monoxide as well as a sudden change in your home's temperature or even the effects of a natural disaster. When something untoward occurs, the monitoring company will be alerted and appropriate measures taken.
The main purpose behind the smart home is to offer comfort, energy conservation, energy management, security, safety etc. It maintains the living standards and provide flexible environment. The smart environment mainly consists of sensors and actuators that assist the
Nowadays, computer systems play a major role in our lives. They are used everywhere beginning with homes, offices, restaurants, gas stations, and so on. Nonetheless, for some, computers still represent the machine they will never know how to use. Communicating with a computer is done using a keyboard or a mouse, devices many people are not comfortable using. Speech recognition solves this problem and destroys the boundaries between humans and computers. Using a computer will be as easy as talking with your friend.
Review of literature on speech recognition systems authentically demands consideration towards the finding of Alexander Graham Bell regarding the method of converting sound waves into electrical impulses and the first speech recognition system developed by Davis et al. [6] for finding telephone superiority digits spoken at normal speech rate. This attempt for automatic speech recognition was mainly centered on the edifice of an electronic circuit for discovering ten digits of telephone superiority. Spoken words were examined to obtain a 2-D plot of formant 1 vs. formant 2. A circuit is developed for finding the greatest correlation coefficient among a set of novel incoming data for pattern matching. These features are grouped into feature vectors that serve the purpose of reducing dimensionality and redundancy in the input to the speaker recognition system. An indication circuit was created to exhibit the already discovered spoken digit. The proposed approach lays stress on recognizing speech sounds and providing appropriate labels to these sounds. Various approaches and types of speech recognition systems came into existence in last five decades gradually. This evolution has led to a remarkable impact on the development of speech recognition systems for various languages worldwide. The exact nature of the feature set depends on what part of a speech signal the features are expected to represent and thus what type of information is to be extracted. In
Speech recognition applications include voice user interfaces such as voice dialing (e.g., "Call home"), call routing (e.g., "I would like to make a collect call"), domotic