0% found this document useful (0 votes)
27 views

Project Report pdf

Uploaded by

varunsh245
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Project Report pdf

Uploaded by

varunsh245
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

A

PROJECT PHASE-I REPORT


ON

Voice Based Email For Physically Handicapped

SUBMITTED TOWARDS THE


PARTIAL FULFILLMENT OF THE REQUIREMENTS OF

BACHELOR OF ENGINEERING (Computer Engineering)

SUBMITTED BY

Tambe Nikita Exam No:72175625F


Vyavahare Ranjana Exam No:72175625D
Parsaiyya Kajal Exam No:72035774J
Shingte Gita Exam No:72035795M

Under The Guidance of

Prof. R. A. Ghadage

Ahmednagar Jilha Maratha Vidya Prasarak Samaj’s


Shri Chhatrapati Shivaji Maharaj College of Engineering,
Nepti, Ahmednagar
Ahmednagar Jilha Maratha Vidya Prasarak Samaj’s
Shri Chhatrapati Shivaji Maharaj College of Engineering,
Nepti, Ahmednagar

CERTIFICATE

This is to certify that the Project Entitled

Voice Based Email For Physically Handicapped

Submitted by

Tambe Nikita Exam No: 72175625F


Vyavahare Ranjana Exam No: 72175625D
Parsaiyya Kajal Exam No: 72035774J
Shingte Gita Exam No: 72035795M

is a bonafide work carried out by Students under the supervision of Prof. R. A.


Ghadage and it is submitted towards the partial fulfillment of the requirement of
Bach-elor of Engineering (Computer Engineering) Project.

Prof. R. A. Ghadage Prof. Yashaanjali Sisodia


Internal Guide H.O.D
Dept. of Computer Engg. Dept. of Computer Engg.
Prof. P. S. Faulsaundar Dr. Y. R. Kharde
External Principal
Date:
Place:
Acknowledgments

We take this opportunity to express my hearty thanks to all those who helped me
in the completion of the Project stage -1 on on ‘Voice Based Email For Physically
Handicapped’.

We would especially like to express my sincere gratitude to Prof.R.A.Ghadage, my


Guide and Prof. Yashaanjali Sisodia HOD Department of Computer Engineer- ing
who extended their moral support, inspiring guidance and encouraging indepen-
dence throughout this task.

We are also grateful to Dr. Y. R. Kharde, Principal of SHRI Chhatrapati Shivaji


Maharaj College Of Engineering And Management forhis indispensable support,
suggestions.

Tambe Nikita
Vyavahare Ranjana
Parsaiyya Kajal
Shingte Gita

(B.E. Computer Engg.)

SCSMCOE Department of Computer Engineering 2022-23 I


INDEX

1 Introduction 2
1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.2 Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2 Literature survey 5

3 Software Requirement Specification 12


3.1 Introduction .......................................................................................... 13
3.1.1 Scope ....................................................................................... 13
3.1.2 Assumptions and Dependencies ............................................... 13
3.2 EXTERNAL INTERFACE REQUIREMENT ...................................... 13
3.2.1 User Interface ........................................................................... 13
3.2.2 Hardware Interfaces: ................................................................ 13
3.2.3 Software Interfaces................................................................... 14
3.3 NON FUNCTIONAL REQUIREMENT............................................... 14
3.3.1 PerformanceRequirements ....................................................... 14
3.3.2 Safety Requirement .................................................................. 14
3.3.3 Software Quality Attributes ...................................................... 15
3.4 Analysis Models: SDLC Model to be applied ...................................... 16

4 System Designs 17
4.1 system Architecture .............................................................................. 18
4.1.1 Module .................................................................................... 18
4.1.2 Data Flow Diagram . . . . . . . . . . . . . . . . . . . . . . 19
4.2 UML DIAGRAMS . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.3 Software Information . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.4 Project Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.5 Stakeholder List . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.6 System Implementation Plan . . . . . . . . . . . . . . . . . . . . . 29
4.7 Algorithm: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

5 OTHER SPECIFICATION 31
5.1 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5.2 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

6 Conclusion 32
6.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

7 References 33

Annexure A problem Definition 34


A.1 problem Definition ............................................................................... 34
A.2 NP-hard, NP-Complete Analysis .......................................................... 34

SCSMCOE Department of Computer Engineering 2022-23 III


List of Figures

3.1 waterfall model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

4.1 system Architecturel . . . . . . . . . . . . . . . . . . . . . . . . . 18


4.2 Data Flow(0) diagram . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.3 Data Flow(1) diagram . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.4 Data Flow(2) diagram . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.5 Class Diagram Diagram . . . . . . . . . . . . . . . . . . . . . . . . 21
4.6 Use case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.7 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.8 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Abstract
In the present scenario, everybody needs communication technol- ogy
to connect with each other. Communication technologies are
significant these days for the betterment of social and personal in-
teraction. The combination of technologies with the internet makes
communication easy. However, the person who is physically chal-
lenged suffered a lot to utilize this technology due to visual and phys-ical
difficulties. There are many technologies advancements have come
though it is not possible to use like normal users. This paper aims at
creating an email system that helps even new users or phys- ically
impaired people to use the system for communication without any
previous practices. There is no use of keywords, only with the help of
mouse actions and voice conversion the email system works. The
person who is not literate can also send emails as it is based on
speech recognition and text to speech. The system is completely based
on responsive voice interaction to utilize the technology easy and
hassle free manner. The system is well designed to send the mails
quickly. There are all the options available to send emails and perform
all the functions for the email system.
Keywords: Email, Internet, Voice, Speech recognition, Physically
challenged, Text to speech

SCSMCOE Department of Computer Engineering 2022-23 1


CHAPTER 1

INTRODUCTION
1.1 OVERVIEW

The navigation system uses TTS (Text-to-Speech) and STT (Speech-to-text for blind-
ness in order to provide a navigation service through voice. Suggested system, as an
independent program, is fairly cheap held by blind people. This allows blind people
to easy access the program. An increasing number of studies have used technol-
ogy to help Handicapped people to integrate more fully into a global world. The
software considers a system of instant messenger to favor interaction of blind users
with any other user connected to the network. Nowadays the advancement made in
computer technology opened platforms for visually impaired people across the
world. It has been observed that nearly about 60 of the total blind population across
the world is present in INDIA. In this paper, we describe the voice mail architecture
used by Handicapped people to access E-mail and multimedia functions of the
operating system easily and efficiently. This architecture will also reduce cognitive
load taken by the blind to remember and type characters using the keyboard. It also
helps handicapped and illiterate people.

1.1.1 Motivation

We use Face detection and recognisaction using Haar cascade Algorithm After we
use NLP algorithm for Voice based E-mail system architecture that can be used by
a Handicapped person to access E-mails easily and efficiently. The contribution
made by this research has enabled the Blind people to send and receive voice based
eMail messages in their native language with the help of a computer

1.1.2 Objective

• to The goal of the project is to easily Handicapped People handle mail system
and also provide login security. It is very easy to handle.

SCSMCOE Department of Computer Engineering 2022-23 3


1.2 PROBLEM STATEMENT

To the main problem of to implement this system is to help handicapped people to


handleemail system easily and help to read incoming mail.and provide login
security.

SCSMCOE Department of Computer Engineering 2022-23 4


CHAPTER 2

LITERATURE SURVEY
Sr.no Title Author Summary
1 Algorithms and Alexandru Cazan; This paper
Techniques for Radu Varbanescu; presents a system
Image to Sound Dan Popescu that transforms
Conversion for images acquired
Helping the with a camera
Visually Impaired into sounds. The
People - system is
Application designed for the
Proposal visually impaired
people and will
convert real time
images into
sounds,
respecting a
certain algorithm,
to preserve the
Visual
information, but
not forgetting the
limitations
imposed by the
human hearing
system.
2 Camera based G.Sophia There are a unit
text and Product Jasmine; over billions of
Lable Reading for D.Magdalin visually impaired
Blind People Marry; S.Swetha People
Lakshmi world-wide. A
significant part of
this population
remains blind
even in developed
countries.
SCSMCOE Department of Computer Engineering 2022-23 6
Sr.no Title Author Summary
3 Hy-Demosaicing: Lina This article
Hyperspectral Zhuang; Michael proposes a smart
Blind K. Ng; Xiyou hyperspectral
Reconstruction Fu; Jose´ M. sensing strategy,
From Spectral Bioucas-Dias implemented in
Subsampling the spectral
domain,
conceived for
spaceborne sensor
systems, where
physical space,
storage resources,
And
communication
bandwidth are
extremely scarce
and expensive.
4 The Design and Jingyang Wang , With the rapid
Implementation Peng Ren, Min development of
of Voice Mailbox Huang and Liwei CTI and VoIP
System Based on Guo technology, more
VoIP and more
attention is paid
to the voice
mailbox based on
VoIP which is a
kind of important
telecom
value-added
service.

SCSMCOE Department of Computer Engineering 2022-23 7


Sr.no Title Author Summary
5 VoiceMail Tirthankar The advancement
architecture in Dasgupta; Aakash in computer based
desktop and Anuj; Manjira accessible
mobile devices Sinha; Ritwika systems has
for the Blind Ghose; Anupam opened up many
people Basu avenues for the
visually impaired
across a wide
majority of the
globe. Audio
feedback based
virtual
environment like,
the screen readers
have helped Blind
people to access
internet
applications
immensely.
6 Speech Sanjib Das The
Recognition communication
Technique: A among human
Review computer
interaction is
called human
computer
interface. Speech
has potential of
being important
mode of
interaction with
computer.

SCSMCOE Department of Computer Engineering 2022-23 8


Sr.no Title Author Summary
7 The role of Satyanand Singh Day by day
speech Optimism is
technology in growing that in
biometrics, the near future
forensics and our society will
man-machine witness the
interface Man-Machine
Interface (MMI)
using voice
technology.
Computer
manufacturers are
building voice
recognition
sub-systems in
their new product
lines.
8 A prior case study Shruthi J.1, Suma In the present
of natural Swamy2 state of digital
language world, computer
processing on machine do not
different domain understand the
human’s ordinary
language. This is
the great barrier
between humans
and digital
systems. Hence,
researchers found
an advanced
technology that
provides
information to the
SCSMCOE De partment of Compute r Engineering 2022- 23users from19t0he
digital machine.
Sr.no Title Author Summary
9 Speech to Text B. Raghavendhar However, with
Conversion using Reddy 1, E. modern
Android Platform Mahender*2 processes,
algorithms, and
methods we can
process speech
signals easily and
recognize the text.
In this project, we
are going to
develop an
on-line
speech-to-text
engine.
10 Optimization Stephen J. Optimization
Algorithms and Wright, Dimitri techniques have
Applications for Kanevsky been used for
Speech many years in the
Optimization formulation and
techniques solution of
computational
problems arising
in speech and
language
processing. Such
techniques are
found in the
Baum-Welch,
extended
Baum-Welch
(EBW), Rprop,
and GIS
algorithms,

SCSMCOE Department of Computer Engineering 2022-23 11


CHAPTER 3

SOFTWARE REQUIREMENT
SPECIFICATION
3.1 INTRODUCTION

3.1.1 Scope:

The user only requires listening to the voice commands given by the system and re-
spond accordingly in order to get the desired operations performed. This requires
user to speak the operation in the email application and then the system will perform
the required operations.

3.1.2 Assumptions and Dependencies

in this system used for Handicapped People.

3.2 EXTERNAL INTERFACE REQUIREMENT

3.2.1 User Interface

Application Based Smart E-Mail System For Handicapped People.

3.2.2 Hardware Interfaces:

RAM : 8 GB
As we are using Machine Learning Algorithm and Various High Level Libraries
Laptop
RAM minimum required is 8 GB.
Hard Disk : 40 GB
Data Set of CT Scan images is to be used hence minimum 40 GB Hard Disk memory
is required.
Processor : Intel i5 Processor
Pycharm IDE that Integrated Development Environment is to be used and data load-
ing should be fast hence Fast Processor is required
IDE : Sypder Spyder is an open-source cross-platform integrated development envi-
ronment for scientific programming in the Python language.
Coding Language : Python Version 3.5

SCSMCOE Department of Computer Engineering 2022-23 13


Highly specified Programming Language for Machine Learning because of avail-
ability of High Performance Libraries.
Operating System : Windows 10
Latest Operating System that supports all type of installation and development En-
vironment

3.2.3 Software Interfaces

Operating System: Windows 10

IDE: Pycharm ,Spyder

Programming Language : Python

3.3 NON FUNCTIONAL REQUIREMENT

3.3.1 PerformanceRequirements

The performance of the functions and every module must be well. The overallper-
formance of the software will enable the users to work eciently. Perfor-mance of
encryption of data should be fast. Performance of the providingvirtual environment
should be fastSafety Requirement•The application is designed in modules where er-
rors can be detected and xedeasily. This makes it easier to install and update new
functionality if required.

3.3.2 Safety Requirement

The application is designed in modules where errors can be detected and fixed easily.
This makes it easier to install and update new functionality if required.

SCSMCOE Department of Computer Engineering 2022-23 14


3.3.3 Software Quality Attributes

Our software has many quality attribute that are given below:-

Adaptability: This software is adaptable by all users.

Availability: This software is freely available to all users. The availability of the
software is easy for everyone.

Maintainability: After the deployment of the project if any error occurs then it can
be easily maintained by the software developer.

Reliability: The performance of the software is better which will increase the relia-
bilityof the Software.

User Friendliness: Since, the software is a GUI application; the output generated is
much user friendly in its behavior.

Integrity: Integrity refers to the extent to which access to software or data by unau-
thorized persons can be controlled.

Security: Users are authenticated using many security phases so reliable security is
provided.

Testability: The software will be tested considering all the aspects.

SCSMCOE Department of Computer Engineering 2022-23 15


3.4 ANALYSIS MODELS: SDLC MODEL TO BE APPLIED

SDLC Models stands for Software Development Life Cycle Models. In this article,
we explore the most widely used SDLC methodologies such as Agile ... Each soft-
ware development life cycle model starts with the analysis, in which the Also, here
are defined the technologies used in the project, team load.
One of the basic notions of the software development process is SDLC models which
stands for Software Development Life Cycle models. SDLC – is a continuous pro-
cess, which starts from the moment, when it’s made a decision to launch the project,
and it ends at the moment of its full remove from the exploitation. There is no one
single SDLC model. They are divided into main groups, each with its features and
weaknesses.

Figure 3.1: waterfall model

SCSMCOE Department of Computer Engineering 2022-23 16


CHAPTER 4

SYSTEM DESIGNS
4.1 SYSTEM ARCHITECTURE

Figure 4.1: system Architecturel

4.1.1 Module

• Admin

• In this module,the Admin has to log in by using valid user name and password.
After login successful he can do some operations such as View All Users and
Authorize, View All E-Commerce Website and Authorize,View All Products
and Reviews,View All Products Early Reviews, View All Keyword Search
Details, View All Products Search Ratio, View All Keyword Search Results,
View All Product Review Rank Results.

• View and Authorize Users

• In this module, the admin can view the list of users who all registered. In this,
the admin can view the user’s details such as, user name, email, address and
admin authorizes the users.

SCSMCOE Department of Computer Engineering 2022-23 18


• View Charts Results

• View All Products Search Ratio,View All Keyword Search Results,View All
Product Review Rank Results.

• Ecommerce User

• In this module, there are n numbers of users are present. User should register
before doing any operations. Once user registers, their details will be stored
to the database. After registration successful,he has to login by using autho-
rized user name and password Once Login is successful user will do some
operations like Add Products, View All Products with reviews, View All Early
Product’s reviews, View All Purchased Transactions.

• End User

• In this module, there are n numbers of users are present. User should register
before doing any operations. Once user registers, their details will best or to
the database. After registration successful,he has to login by using authorized
user name and password. Once Login is successful user will do some opera-
tions like Manage Account, Search Products by keyword and Purchase, View
Your Search Transactions, View.

4.1.2 Data Flow Diagram

In Data Flow Diagram,we Show that flow of data in our system in DFD0 we show
that base DFD in which rectangle present input as well as output and circle show
our system,In DFD1 we show actual input and actual output of system input of our
system is text or image and output is rumor detected like wise in DFD 2 we present
operation of user as well as admin.

SCSMCOE Department of Computer Engineering 2022-23 19


Figure 4.2: Data Flow(0) diagram

Figure 4.3: Data Flow(1) diagram

Figure 4.4: Data Flow(2) diagram

SCSMCOE Department of Computer Engineering 2022-23 20


4.2 UML DIAGRAMS

Unified Modeling Language is a standard language for writing software blueprints.


TheUML may be used to visualize, specify, construct and document the artifacts of a
soft- wareintensive system .UML is process independent ,although optimally it
should be used in process that is use case driven, architecture-centric, iterative ,and
incremen- tal. The Number of UML Diagram is available.

Class Diagram.

Use case Diagram.

Activity Diagram.

Sequence Diagram.

Figure 4.5: Class Diagram Diagram

SCSMCOE Department of Computer Engineering 2022-23 21


Figure 4.6: Use case Diagram

SCSMCOE Department of Computer Engineering 2022-23 22


Figure 4.7: Activity Diagram

SCSMCOE Department of Computer Engineering 2022-23 23


Figure 4.8: Sequence Diagram

4.3 SOFTWARE INFORMATION

Python is an interpreted, high-level and general-purpose programming language.


Created by Guido van Rossum and first released in 1991, Python’s design philos-
ophy emphasizes code readability with its notable use of significant whitespace. Its
language constructs and object-oriented approach aim to help programmers write
clear, logical code for small and large-scale projects.
Python is dynamically typed and garbage-collected. It supports multiple pro-
gramming paradigms, including structured (particularly, procedural), object-oriented,
and functional programming. Python is often described as a ”batteries included” lan-
guage due to its comprehensive standard library.
Python was created in the late 1980s as a successor to the ABC language.
Python 2.0, released in 2000, introduced features like list comprehensions and a

SCSMCOE Department of Computer Engineering 2022-23 24


garbage collection system with reference counting.
Python 3.0, released in 2008, was a major revision of the language that is not
completely backward-compatible, and much Python 2 code does not run unmodified
on Python 3.
The Python 2 language was officially discontinued in 2020 (first planned for
2015), and ”Python 2.7.18 is the last Python 2.7 release and therefore the last Python
2 release.”[30] No more security patches or other improvements will be released for
it. With Python 2’s end-of-life, only Python 3.6.x and later are supported.
Python interpreters are available for many operating systems. A global com-
munity of programmers develops and maintains CPython, a free and open-source
reference implementation. A non-profit organization, the Python Software Founda-
tion, manages and directs resources for Python and CPython development.

Python was conceived in the late 1980s by Guido van Rossum at Centrum
Wiskunde Informatica (CWI) in the Netherlands as a successor to the ABC lan-
guage (itself inspired by SETL), capable of exception handling and interfacing with
the Amoeba operating system. Its implementation began in December 1989. Van
Rossum shouldered sole responsibility for the project, as the lead developer, until 12
July 2018, when he announced his ”permanent vacation” from his responsibilities
as Python’s Benevolent Dictator For Life, a title the Python community bestowed
upon him to reflect his long-term commitment as the project’s chief decision-maker.
He now shares his leadership as a member of a five-person steering council. In Jan-
uary 2019, active Python core developers elected Brett Cannon, Nick Coghlan, Barry
Warsaw, Carol Willing and Van Rossum to a five-member ”Steering Council” to lead
the project.

SCSMCOE Department of Computer Engineering 2022-23 25


Anaconda: Anaconda is a free and open-source distribution of the Python and
R programming languages for scientific computing (data science, machine learning
applications, large-scale data processing, predictive analytics, etc.), that aims to sim-
plify package management and deployment. The distribution includes data-science
packages suitable for Windows, Linux, and macOS. It is developed and maintained
by Anaconda, Inc., which was founded by Peter Wang and Travis Oliphant in 2012.
As an Anaconda, Inc. product, it is also known as Anaconda Distribution or Ana-
conda Individual Edition, while other products from the company are Anaconda
Team Edition and Anaconda Enterprise Edition, both of which are not free.
Package versions in Anaconda are managed by the package management sys-
tem conda. This package manager was spun out as a separate open-source package
as it ended up being useful on its own and for other things than Python. There is
also a small, bootstrap version of Anaconda called Miniconda, which includes only
conda, Python, the packages they depend on, and a small number of other packages.
Anaconda distribution comes with over 250 packages automatically installed, and
over 7,500 additional open-source packages can be installed from PyPI as well as
the conda package and virtual environment manager. It also includes a GUI, Ana-
conda Navigator, as a graphical alternative to the command line interface (CLI).
The big difference between conda and the pip package manager is in how
package dependencies are managed, which is a significant challenge for Python data
science and the reason conda exists.
When pip installs a package, it automatically installs any dependent Python
packages without checking if these conflict with previously installed packages[citation
needed]. It will install a package and any of its dependencies regardless of the state
of the existing installation[citation needed]. Because of this, a user with a working
installation of, for example, Google Tensorflow, can find that it stops working having
used pip to install a different package that requires a different version of the depen-
dent numpy library than the one used by Tensorflow. In some cases, the package
may appear to work but produce different results in detail.
In contrast, conda analyses the current environment including everything cur-
rently installed, and, together with any version limitations specified (e.g. the user

SCSMCOE Department of Computer Engineering 2022-23 26


may wish to have Tensorflow version 2,0 or higher), works out how to install a com-
patible set of dependencies, and shows a warning if this cannot be done.
Open source packages can be individually installed from the Anaconda repos-
itory, Anaconda Cloud (anaconda.org), or the user’s own private repository or mirror,
using the conda install command. Anaconda, Inc. compiles and builds the packages
available in the Anaconda repository itself, and provides binaries for Windows 32/64
bit, Linux 64 bit and MacOS 64-bit. Anything available on PyPI may be installed
into a conda environment using pip, and conda will keep track of what it has installed
itself and what pip has installed.
Custom packages can be made using the conda build command, and can be
shared with others by uploading them to Anaconda Cloud, PyPI or other repositories.
The default installation of Anaconda2 includes Python 2.7 and Anaconda3 in-
cludes Python 3.7. However, it is possible to create new environments that include
any version of Python packaged with conda

SCSMCOE Department of Computer Engineering 2022-23 27


Sypder
Spyder is an open-source cross-platform integrated development environment
(IDE) for scientific programming in the Python language. Spyder has useful fea-
tures for general Python development, but unless you work mainly with IPython and
scientific computing packages, you’re probably better off with a different IDE. The
biggest reason not to use Spyder as a general-purpose Python development environ-
ment isn’t the feature set, but the setup process
Features

• Coding assistance and analysis, with code completion, syntax and error high-
lighting, linter integration, and quick fixes

• Project and code navigation: specialized project views, file structure views and
quick jumping between files, classes, methods and usages

• Python refactoring: includes rename, extract method, introduce variable, in-


troduce constant, pull up, push down and others

• Support for web frameworks: Django, web2py and Flask [professional edition
only]

• Integrated Python debugger

• Integrated unit testing, with line-by-line code coverage Google App Engine
Python development [professional edition only]

• Version control integration: unified user interface for Mercurial, Git, Subver-
sion, Perforce and CVS with change lists and merge

SCSMCOE Department of Computer Engineering 2022-23 28


• Support for scientific tools like matplotlib, numpy and scipy [professional edi-
tion only]

4.4 PROJECT PLAN

In this chapter we are going to have an overview about how much time does it took
to complete each task like- Preliminray Survey Introduction and Problem Statement,
Literature Survey, Project Statement, Software Requirement and Specification, Sys-
tem Design, Partial Report Submission, Architecture Design, Implementation, De-
ployment, Testing, Paper Publish, Report Submission and etcetera. This chapter also
gives focus on stakeholder list which gives information about project type, customer
of the proposed system, user and project member who developed the system.

4.5 STAKEHOLDER LIST

Sr. No. Stackholder User


1 project Type Chat Bot
2. Customer Any one
3 User User

4.6 SYSTEM IMPLEMENTATION PLAN

The System Implementation plan table, shows the overall schedule of tasks compi-
lation and time duration required for each task.
Sr. No. Name/Title Start Date End Date
1 Preliminary Survey
2 Introduction and Problem State-
Ment
3 Literature Survey
4 Project Statement
5 Software Requirement And Specifi-
Cation
6 System Design
7 Partial Report Submission
8 Architecture Design
9 Implementation
10 Deployement
11 Testing
12 Paper Publish
13 Report Submission

4.7 ALGORITHM:

NLP:- Natural Language Processing:


- NLP algorithms are typically based on machine learning algorithms. Instead of
hand-coding large sets of rules, NLP can rely on machine learning to automatically
learn these rules by analyzing a set of example sand making a statistical inference.
- Natural Language Processing (NLP) Natural language processing strives to build
machines that understand and respond to text or voice data and respond with text or
speech of their own.
Haar Cascade
It is an Object Detection Algorithm used to identify faces in an image or a real time
video.
Chapter 5

OTHER SPECIFICATION

5.1 ADVANTAGES

1. The fundamental advantage of this system is that the user just needs to answer
by speaking and clicking a mouse; the keyboard is completely eliminated.

2. You’re probably wondering how a blind person will be able to click the mouse
in the proper location on the screen at this point.

5.2 APPLICATIONS

This requires user to speak the operation in the email application and then the sys-
tem will perform the required operations. The user would be requested to feed info
through voice inputs whenever required and system will ensure the authentication of
the user details.
Chapter 6

Conclusion

6.1 CONCLUSION

We put forward our project to pave a way for the blind people to easily access their
Mails with a good interactive Manner and we use Speech to text and text to Speech
Method in our Project . Our Project Help To Blind People Handle or access email
easily.
Chapter 7

References

1 K. Müller, P. Merkle, and T. Wiegand, “3-D video representation using depth


maps,” Proc. IEEE, vol. 99, no. 4, pp. 643–656, Apr. 2011.

2 P. Merkle, A. Smolic, K. Müller, and T. Wiegand, “Efficient prediction struc-


tures for multiview video coding,” IEEE Trans. Circuits Syst. Video Technol.,
vol. 17, no. 11, pp. 1461–1473, Nov. 2007.

3 High Efficiency Video Coding, document Rec. ITU-T H.265, International


Telecommunications Union Standard, April 2013.

4 G. J. Sullivan, J. M. Boyce, Y. Chen, J.-R. Ohm, C. A. Segall, and A. Vetro,


“Standardized extensions of High Efficiency Video Coding (HEVC),” IEEE J.
Sel. Topics Signal Process., vol. 7, no. 6, pp. 1001–1016, Dec. 2013.

5 P. Merkle, A. Smolic, K. Müller, and T. Wiegand, “Multi-view video plus


depth representation and coding,” in Proc. IEEE Int. Conf. Image Process.
(ICIP), vol. 1. Sep. 2007, pp. I-201–I-204.

6 P. Merkle et al., “The effects of multiview depth video compression on mul-


tiview rendering,” Signal Process., Image Commun., vol. 24, nos. 1–2, pp.
73–88, Jan. 2009.

7 P. Merkle, C. Bartnik, K. Müller, D. Marpe, and T. Wiegand, “3D video: Depth


coding based on inter-component prediction of block partitions,” in Proc. Pic-
ture Coding Symp. (PCS), May 2012, pp. 149–152.
Annexure A

problem Definition

A.1 PROBLEM DEFINITION

To the main problem of to implement this system is to help blind people to handle
email system easily and help to read incoming mail.and provide login security.

A.2 NP-HARD, NP-COMPLETE ANALYSIS:

When solving problems we have to decide the difficulty level of our problem. There
are three types of classes provided for that. These are as follows:
1) P Class
2) NP-hard Class
3) NP-Complete Class
P Class:
The class of polynomially solvable problems, P contains all sets in which member-
ship may be decided by an algorithm whose running time is bounded by a polyno-
mial. Besides containing all of what we have decided to consider practical compu-
tational tasks, the class P has another attractive attribute. Its use allows us to not
worry about our machine model since all reasonable models of computation (includ-
ing programs and Turing machines) have time complexities, which are polynomially
related.
NP Class:
Informally the class P is the class of decision problems solvable by some algorithm
within a number of steps bounded by some fixed polynomial in the length of the
input. Turing was not concerned with the efficiency of his machines, but rather his
concern was whether they can simulate arbitrary algorithms given sufficient time.
However it turns out Turing machines can generally simulate more efficient com-
puter models (for example machines equipped with many tapes or an unbounded
random access memory) by at most squaring or cubing the computation time. Thus
P is a robust class and has equivalent definitions over a large class of computer mod-
els. Here we follow standard practice and define the class P in terms of Turing
machines.
NP Hard:
A problem is NP-hard if solving it in polynomial time would make it possible to
solve all problems in class NP in polynomial time. Some NP-hard problems are
also in NP (these are called ”NP-complete”), some are not. If you could reduce an
NP problem to an NP-hard problem and then solve it in polynomial time, you could
solve all NP problems. Also, there are decision problems in NP-hard but are not
NP-complete, such as the infamous halting problem.
NP-complete:
A decision problem L is NP-complete if it is in the set of NP problems so that any
given solution to the decision problem can be verified in polynomial time, and also
in the set of NP-hard problems so that any NP problem can be converted into L by a
transformation of the inputs in polynomial time. The complexity class NP-complete
is the set of problems that are the hardest problems in NP, in the sense that they are
the ones most likely not to be in P. If you can find a way to solve an NP-complete
problem quickly, then you can use that algorithm to solve all NP problems quickly.

You might also like