Javascript must be enabled to continue!
Machine Learning Based Implementation of Home Automation Using Smart Mirror
View through CrossRef
When ordered, it may be folded in half quickly and effortlessly. IoT (Internet of Things) technology drives the Smart Mirror's functionality. Standard mirror functionality is included, in addition to showing the user's social notifications, daily tasks, weather updates, breaking news, reminders, voice assistant notifications, and smartphone notifications. The Smart Mirror is connected to the Raspberry Pi-based network through Wi-Fi. A two-way mirror or an acrylic mirror sheet is used with the Raspberry-Pi mainboard to conceal the Mirror's rear end from the user. It supports modules written in any programming language. When Python is used as the primary programming language, these changes take care of the hardware and software limitations. This work discusses the creation and building of the Mirror in appropriate manner. In addition, possible uses of the Mirror are discussed. Compared to this DIY method, the cost is substantially lower, and the result is more predictable. The result produced by the support vector machine classifier are of accuracy which is 84% for detecting theft, and the confusion matrix is often diagonal, showing that this classifier can accurately labelled the data. Similarly, F1 score of 0.82% shows that there are a few false positives and false negatives, which is a favorable indicator.
University of Management and Technology
Title: Machine Learning Based Implementation of Home Automation Using Smart Mirror
Description:
When ordered, it may be folded in half quickly and effortlessly.
IoT (Internet of Things) technology drives the Smart Mirror's functionality.
Standard mirror functionality is included, in addition to showing the user's social notifications, daily tasks, weather updates, breaking news, reminders, voice assistant notifications, and smartphone notifications.
The Smart Mirror is connected to the Raspberry Pi-based network through Wi-Fi.
A two-way mirror or an acrylic mirror sheet is used with the Raspberry-Pi mainboard to conceal the Mirror's rear end from the user.
It supports modules written in any programming language.
When Python is used as the primary programming language, these changes take care of the hardware and software limitations.
This work discusses the creation and building of the Mirror in appropriate manner.
In addition, possible uses of the Mirror are discussed.
Compared to this DIY method, the cost is substantially lower, and the result is more predictable.
The result produced by the support vector machine classifier are of accuracy which is 84% for detecting theft, and the confusion matrix is often diagonal, showing that this classifier can accurately labelled the data.
Similarly, F1 score of 0.
82% shows that there are a few false positives and false negatives, which is a favorable indicator.
Related Results
Prostor doma u hrvatskim igranim filmovima s temom domovinskog rata
Prostor doma u hrvatskim igranim filmovima s temom domovinskog rata
The dissertation explores the formation of domestic space in contemporary Croatian society through its presentations in the medium of feature films. The cinematic domestic spaces a...
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND
As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
A STUDY ON THE IMPACT OF MARKETING AUTOMATION ADOPTION
A STUDY ON THE IMPACT OF MARKETING AUTOMATION ADOPTION
Marketing automation adoption refers to the process of implementing and using marketing automation technology to streamline, automate, and measure marketing tasks and workflows. It...
Everyday Life in the "Tourist Zone"
Everyday Life in the "Tourist Zone"
This article makes a case for the everyday while on tour and argues that the ability to continue with everyday routines and social relationships, while at the same time moving thro...
On Privacy and Security in Smart Connected Homes
On Privacy and Security in Smart Connected Homes
The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, t...
On Privacy and Security in Smart Connected Homes
On Privacy and Security in Smart Connected Homes
The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, t...
Network Automation
Network Automation
Purpose: The article "Network Automation in the Contemporary Economy" explores the concepts and methods of effective network management. The application stack, Jinja template engin...
Smart home cybersecurity awareness and behavioral incentives
Smart home cybersecurity awareness and behavioral incentives
Purpose
Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studi...

