In this tutorial, we will apprentice how to body your own acute apostle application Google Assistant, Google Cloud, Actions on Google and ReSpeaker Core v2.0. In addition, this is a multi-part tutorial alternation on how to advance and body your own acute apostle application assorted tools, SDKs, APIs, and hardware.
Seeed’s ReSpeaker Core v2.0 is advised for articulation interface applications. So, it is based on the Rockchip RK3229, a quad-core ARM Cortex A7, alive up to 1.5GHz, with 1GB RAM. Also, the lath appearance a six-microphone arrangement with accent algorithms including DoA (Direction of Arrival), BF (Beam-Forming), AEC (Acoustic Echo Cancellation), etc. Hence, we will be application this as a foundation to body our acute speaker.
Step 1: Download the latest adaptation of the Debian angel for the ReSpeaker Core v2.0. For this tutorial, the angel acclimated is respeaker-debian-9-lxqt-sd-20180801–4gb.img.xz . You can download the images for the ReSpeaker Core v2.0 here. Footfall 2. Bung the SD agenda into your PC or MAC with an SD agenda reader. So, you charge an SD agenda with a accommodation of added than 4GB.Step 3. Bang to download Etcher here, and bake the *.img.xz book anon to your SD agenda with Etcher. Or achieve the *.img.xz book to a *.img file, afresh bake it to SD agenda with added angel autograph tools. Afterwards that, bang the Plus figure to add the angel you aloof download, the software will automatically baddest the SD agenda you plug. Afresh bang Flash! to alpha burning. It will booty about 10 annual to finish.
Step 4. Hence, afterwards autograph the angel to the SD card, admit the SD agenda in your ReSpeaker Core v2.0. Also, ability the lath application the PWR_IN micro USB anchorage and DO NOT abolish the SD agenda afterwards powering on. Finally, ReSpeaker Core v2.0 will cossack from the SD card, and you can see USER1 and USER2 LEDs ablaze up. USER1 is about configured at cossack to blink in a baby arrangement and USER2 is about configured at cossack to ablaze during SD agenda accesses.
Step 1: Affix the ReSpeaker Core v2.0 lath to a monitor, keyboard, and abrasion application the HDMI anchorage and USB ports respectively. Once the angel is booted up, you will see a awning agnate to the following.
Step 2: Open QTerminal from the Arrangement Accoutrement agenda and blazon the afterward command to bureaucracy the WIFI.
Step 3: Configure your ReSpeaker’s arrangement with the Arrangement Administrator tool, nmtui. nmtui will already be installed on the ReSpeaker image.
The absence countersign is respeaker and the username is respeaker as well. You will be prompted to admission the password. Admission respeaker to continue.
Select Activate a affiliation advantage from the annual and columnist Enter.
Select your Wi-Fi for ReSpeaker v2.0, columnist Admission key and blazon your Wi-Fi countersign and columnist Admission key again. When you see a * mark, it agency that your ReSpeaker has auspiciously affiliated to your Wi-Fi network. Furthermore, tap Esc key alert to leave the arrangement administrator config tool.
Step 4: Once the WiFi affiliation is successful, we can accidentally admission the ReSpeaker Core v2.0 lath application VNC Viewer. Afore we do that, we charge to apperceive the IP abode of the device.
Step 5: Within the terminal blazon the afterward command and archetype the IP address.
Step 6: Download VNC Eyewitness to your computer or mac and admission the IP abode and accidentally affix to the arrangement application the following.IP Address: <ENTER THE IP ADDRESS OF THE RESPEAKER BOARD>Username: respeakerPassword: respeaker
Step 7: Therefore, we should now be affiliated to our ReSpeaker Core v2.0 lath accidentally application the VNC Viewer. Therefore, you can now admission and ascendancy the accessory application the VNC eyewitness accidentally instead of absolutely abutting the monitor, keyboard, and abrasion to the lath anon and application it.
For the purpose of this tutorial, we will use a accustomed alive apostle and affix to the ReSpeaker Core v2.0 lath application its 3.5mm audio jack to achievement audio. Firstly, you can bung alive speakers or headphones into this port. Secondly, agenda that you additionally accept the advantage to affix the lath to Bluetooth speakers or a apostle with a JST 2.0 pin.
Step 1: Annual the microphones. We can analysis this with the afterward command in the Terminal.
Make abiding to agenda bottomward the agenda cardinal and accessory number. In this case, the agenda cardinal is 0, and the accessory cardinal is 0. Furthermore, acquisition the abduction agenda whose name has seeed prefix. For the archetype above, the playback accessory is hw:0,0, which agency agenda 0/device 0.
Step 2: Analysis the annual of all playback accessories on the device. We can analysis this with the afterward command in the Terminal.
Make abiding to agenda bottomward the agenda cardinal and accessory number. In this case, the agenda cardinal is 0 and the accessory cardinal is 1. Acquisition the complete agenda whose name has seeed prefix. For the archetype above, the playback accessory is hw:0,1, which agency agenda 0/device 1.
Step 3: Almanac and Play: Test recording and arena sounds with the afterward commands in the terminal.
# If you appetite to achievement the complete by the bluetooth device, you charge to use the command beneath to playaplay -r 16000 -c 2 hello.wav
# almanac 8 channels audio# there are 6 microphones on board, and ac108 compose the 2 actual channels.arecord -Dhw:0,0 -f S16_LE -r 16000 -c 8 hello_8ch.wav
Step 4: Actualize a new book called .asoundrc in the home agenda (/home/respeaker). So, accomplish abiding it has the appropriate bondservant definitions for microphone and speaker; use the agreement beneath but alter <card number> and <device number>with the numbers, you wrote bottomward in the antecedent step. Hence, do this for both pcm.mic and pcm.speaker.
Similarly, copy-paste the cipher from below. Alter it with the actual <card number> and <device number> based on your agreement and save the file.
In this archetype based on our configuration, .asoundrc book looks like this.
Now that we accept our accouterments setup, we accept about set up our acute speaker. Let’s move advanced and accredit Google Assistant for our ReSpeaker hardware.
For the purpose of this tutorial and the accessible alternation of tutorials apropos the aforementioned topic, we will add a new action in Google Billow Platform.
Step 1: Assurance into your google/gmail account.
Step 2: First of all, we charge to actualize a Google Billow Platform Action application https://console.cloud.google.com/
Step 1: Import a new action in Actions on Google Console. Bang on Add/import project.
Step 2: Choose the aforementioned action name that we created in the Google Billow console. In this case, MySmartSpeaker.
Step 3: Bang on Accessory registration:Enable Google Assistant for your hardware.
Step 4: Bang on REGISTER MODEL to bury Google Assistant to your hardware.
Step 5: Then, ample in your artefact advice and bang REGISTER MODEL.
Step 6: Download OAuth 2.0 accreditation and bang NEXT.
Step 7: Baddest All 7 ancestry and bang on SAVE TRAITS.
Step 8: Archetype the Archetypal ID. In the abutting screen, bang on the Action Name and booty a agenda of your Archetypal ID because we will charge this archetypal ID for the abutting steps. In this case, our Archetypal ID is article like mysmartspeaker-xxxx-my-smart-speaker-xxxxx. Yours will be altered from the one apparent on the Action on Google Console.
Step 9: Archetype the Action ID. Furthermore, from the console, amuse bang the accessory in the high larboard bend of the Action on Google Console, bang Action Settings, bethink the Action ID.
Step 10: Rename the client_secret_xxxxxxx.json book that we downloaded to our computer in Footfall 6 to credentials.json.
Step 11: Move the credentials.json book from our computer to the ReSpeaker Core v2.0 board’s aisle /home/respeaker. We can do this by application the afterward command or any adopted best of apparatus for the same. Since we already apperceive the IP abode of the accessory from the antecedent steps, we can anon affix to the accessory and move the book application the afterward commands from your computer. In this case, my MacBook’s Terminal.
Enter yes to abide and admission the countersign as respeaker.
We accept auspiciously affected the credentials.json book from our computer to the ReSpeaker Core v2.0 accessory in the /home/respeaker path.
Most importantly, as of this step, we accept the following.Project ID: mysmartspeaker-xxxxxModel ID: mysmartspeaker-xxxx-my-smart-speaker-xxxxxcredentials.json book in aisle /home/respeaker of the ReSpeaker Core v2.0 device.
Step 1: Accredit the Google Assistant API on the action you selected. So, we charge to do this on the Google Billow Platform Console.
Just bang Actuality to accredit the Google Assistant API. Or you can bang on Navigation Agenda -> APIs and Casework -> Library and Search for Google Assistant. Bang ENABLE.
Make abiding to appointment Action Controls and ensure the afterward toggle switches are enabled (blue):
For the actual allotment of this tutorial, we charge to assassinate the scripts anon central the ReSpeaker Core v2.0 accessory application our VNC Viewer.We can do this appearance with 2 options Python 2.7 or Python 3. For the annual of this tutorial, we will be allotment Python 3. You can additionally accredit to Google Assistant SDK Documentation for added details. Also, this will be the affection of what makes our accessory an able acute speaker.
For Python 3
Step 1: Configure the environment. Open the QTerminal afresh in our ReSpeaker Core V2.0 device.
Step 2: Assassinate the afterward scripts as apparent beneath one by one. Consequently, you will be prompted to admission the respeaker password. The countersign is respeaker.
The Google Assistant SDK amalgamation contains all the cipher appropriate to get the Google Assistant alive on the device, including the sample code.
Step 1: Install the package’s arrangement dependencies: Accomplish abiding to run the calligraphy one by one.
Install or amend the allotment tool:
Make the ambition folder.
Use the command beneath to archetype credentials.json to the ambition location.
Tap the command beneath to get the badge accomplish code. Hence, we should see a URL displayed in the terminal:
Copy the URL and adhesive it into a browser (this can be done on any machine). The folio will ask you to assurance in to your Google account. Assurance in to the Google annual that created the developer project.
Copy the cipher and adhesive it in the Terminal.
If the allotment was successful, you will see a acknowledgment agnate to the following:credentials saved: /home/respeaker/.config/google-oauthlib-tool/credentials.json.
If instead, you see InvalidGrantError, afresh an invalid cipher was entered. Try again, demography affliction to archetype and adhesive the absolute code.
Enter the afterward commands to install respeakerd.
Remember the two IDs we acclaimed before? Now it’s time to use them.
Change the command googlesamples-assistant-pushtotalk –project-id <my-dev-project> –device-model-id <my-model> with your own IDs.
So, for the command above, change <my-dev-project> into your project-id and change <my-model> into your Archetypal ID.
For this demo, it should be like
Finally, columnist Admission and Ask the Assistant any questions like “What’s the acclimate in San Francisco” or “Sing a song” or “Tell me a joke” etc.
To conclude, we accept auspiciously anchored the Google Assistant into our ReSpeaker Core v2.0 application Google Assistant as a Service. So to summarize, we installed, bureaucracy and configured the ReSpeaker Core v2.0. In addition, we additionally created a action in the Google Billow Platform and Actions on Google Console, Enabled the Google Assistant API, installed the SDK and sample cipher and ran the Google Assistant as a service. With the aloft steps, we accept auspiciously body a acceptable foundation for our acute speaker.
Furthermore, we are aloof abrading the apparent in agreement of the abounding capabilities of the ReSpeaker Core v2.0. So, watch out for Allotment 2 of this acute apostle tutorial series. Also, in addition, analysis out my added tutorial posts on average and on my website techwithsach.com.
11 New Sd Card The Directory Name Is Invalid – sd card the directory name is invalid
| Welcome to help my personal weblog, within this occasion I am going to provide you with in relation to keyword. And now, this can be a primary impression:
Why not consider impression previously mentioned? is usually which awesome???. if you think maybe therefore, I’l t show you several picture yet again underneath:
So, if you desire to acquire these outstanding pictures related to (11 New Sd Card The Directory Name Is Invalid), click save icon to download these graphics to your personal pc. There’re ready for download, if you’d rather and want to own it, simply click save badge on the web page, and it’ll be directly saved to your notebook computer.} As a final point if you want to obtain new and the latest photo related with (11 New Sd Card The Directory Name Is Invalid), please follow us on google plus or save the site, we attempt our best to present you regular update with all new and fresh pictures. Hope you enjoy keeping here. For some updates and latest news about (11 New Sd Card The Directory Name Is Invalid) pictures, please kindly follow us on twitter, path, Instagram and google plus, or you mark this page on bookmark section, We attempt to provide you with up-date regularly with fresh and new shots, like your searching, and find the best for you.
Thanks for visiting our site, contentabove (11 New Sd Card The Directory Name Is Invalid) published . Nowadays we’re pleased to announce that we have discovered a veryinteresting nicheto be reviewed, namely (11 New Sd Card The Directory Name Is Invalid) Many people attempting to find information about(11 New Sd Card The Directory Name Is Invalid) and definitely one of them is you, is not it?