Please wait a minute...
Computer & Telecommunication  2022, Vol. 1 Issue (3): 1-4    DOI: 10.15966/j.cnki.dnydx.2022.03.019
Current Issue | Archive | Adv Search |
Design of an Intelligent Blind Guide System
Everbright Environmental Technology (China) Co.
Nanjing University of Science and Technology Zijing College
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  
With the continuous progress and development of society, the government and the public are showing more and more care
for the blind, and the travel safety of the blind has received great attention. The article describes an intelligent guide cane system that
can help the blind to travel daily. The system is designed to automatically detect obstacles in the blind’s walking process, and can be
combined with ultrasonic sensors to use human voices. Voice prompts and vibration reminders effectively solve the problem of blind
people who are not aware of the road section. The system uses deep learning training so that the camera can recognize blind roads
and crosswalks, making it easier for the blind to travel and ensuring the safety of the blind.
Key words     
Published: 10 March 2023

Cite this article:

GUO Zhao-feng XIE Ling ZHUANG Yi-fan.

Design of an Intelligent Blind Guide System
. Computer & Telecommunication, 2022, 1(3): 1-4.

URL:

http://www.computertelecom.com.cn/EN/10.15966/j.cnki.dnydx.2022.03.019     OR     http://www.computertelecom.com.cn/EN/Y2022/V1/I3/1

[1] ZHANG Li.
Research on Macro Virus Processing Model Based on SVM Algorithm
[J]. 电脑与电信, 2022, 1(1-2): 41-45.
[2] LIU Hui-fang. Research and Application of Anti-fraud Model Based on Big Data of Communication Operator[J]. 电脑与电信, 2021, 1(7): 46-52.
[3] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[4] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[5] TONG Lian. Research and Application of Machine Learning in Big Data[J]. 电脑与电信, 2018, 1(9): 29-31.
[6] SONG Tian-shu, LI Jiang-yu, ZHANG Qin-zhe. Research on Personal Microblog Clustering Based on CBOW Model[J]. 电脑与电信, 2018, 1(4): 69-72.
[7] Wang Wang. Coverage Simulation of Base Stations Based on Machine Learning[J]. 电脑与电信, 2018, 1(11): 45-47.
[8] LIU Li-ping. An Anomaly Detection Algorithm Based on Artificial Immune Intelligence[J]. 电脑与电信, 2017, 1(12): 67-70.
[9] Xu Lulei. Comparison of The two Methods of Sentiment Terms Identification on the Web[J]. , 2011, 1(01): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd