{"title":"使用键盘和语音识别实现两级安全门禁","authors":"Morkat M. Yilwatda, J. A. Enokela, N. Goshwe","doi":"10.14257/ijsia.2017.11.4.04","DOIUrl":null,"url":null,"abstract":"It is possible today to automate a growing number of speaker-recognition tasks with such technologies as voice or speaker verification and voice identification. These systems have been applied to real-world security applications. They have, however, been undergoing modifications due to the poor level of security architecture that they provide to users. Hence there is the need, as has been done in this work, to develop a more efficient, user friendly and complex security system that can curtail illegal intrusion into special facilities. The system described in this paper uses matrix keypad which is interfaced with a microcontroller for first level security validation to monitor and control the execution of desired tasks within the keypad and voice recognition (KVR) system. A voice recognition Integrated Circuit is used for second level security verification. A tristate buffer is also employed to logically isolate the buses of the digital signal processing (DSP) chip and those of the microcontroller. From the research, tests were conducted for both noiseless and noisy environments and the recommended distance between the user and microphone in a noiseless environment using electrets type condenser microphone is 1.0 cm to 16 cm while under noisy condition it was found to be 1.0 cm to 6.0 cm. These results depend on the sensitivity of the microphone and the environmental conditions at the time. It can be deduced from the research that integrating the keypad and voice recognition design can help to optimize the security level of the system and by implication help in controlling unwanted intrusion into the special facilities such as museum, military armory, financial institution, etc.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation of a Two-Level Security Door Access Using Keypad and Voice Recognition\",\"authors\":\"Morkat M. Yilwatda, J. A. Enokela, N. Goshwe\",\"doi\":\"10.14257/ijsia.2017.11.4.04\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is possible today to automate a growing number of speaker-recognition tasks with such technologies as voice or speaker verification and voice identification. These systems have been applied to real-world security applications. They have, however, been undergoing modifications due to the poor level of security architecture that they provide to users. Hence there is the need, as has been done in this work, to develop a more efficient, user friendly and complex security system that can curtail illegal intrusion into special facilities. The system described in this paper uses matrix keypad which is interfaced with a microcontroller for first level security validation to monitor and control the execution of desired tasks within the keypad and voice recognition (KVR) system. A voice recognition Integrated Circuit is used for second level security verification. A tristate buffer is also employed to logically isolate the buses of the digital signal processing (DSP) chip and those of the microcontroller. From the research, tests were conducted for both noiseless and noisy environments and the recommended distance between the user and microphone in a noiseless environment using electrets type condenser microphone is 1.0 cm to 16 cm while under noisy condition it was found to be 1.0 cm to 6.0 cm. These results depend on the sensitivity of the microphone and the environmental conditions at the time. It can be deduced from the research that integrating the keypad and voice recognition design can help to optimize the security level of the system and by implication help in controlling unwanted intrusion into the special facilities such as museum, military armory, financial institution, etc.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/ijsia.2017.11.4.04\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijsia.2017.11.4.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementation of a Two-Level Security Door Access Using Keypad and Voice Recognition
It is possible today to automate a growing number of speaker-recognition tasks with such technologies as voice or speaker verification and voice identification. These systems have been applied to real-world security applications. They have, however, been undergoing modifications due to the poor level of security architecture that they provide to users. Hence there is the need, as has been done in this work, to develop a more efficient, user friendly and complex security system that can curtail illegal intrusion into special facilities. The system described in this paper uses matrix keypad which is interfaced with a microcontroller for first level security validation to monitor and control the execution of desired tasks within the keypad and voice recognition (KVR) system. A voice recognition Integrated Circuit is used for second level security verification. A tristate buffer is also employed to logically isolate the buses of the digital signal processing (DSP) chip and those of the microcontroller. From the research, tests were conducted for both noiseless and noisy environments and the recommended distance between the user and microphone in a noiseless environment using electrets type condenser microphone is 1.0 cm to 16 cm while under noisy condition it was found to be 1.0 cm to 6.0 cm. These results depend on the sensitivity of the microphone and the environmental conditions at the time. It can be deduced from the research that integrating the keypad and voice recognition design can help to optimize the security level of the system and by implication help in controlling unwanted intrusion into the special facilities such as museum, military armory, financial institution, etc.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security