Project Report pdf
Project Report pdf
SUBMITTED BY
Prof. R. A. Ghadage
CERTIFICATE
Submitted by
We take this opportunity to express my hearty thanks to all those who helped me
in the completion of the Project stage -1 on on ‘Voice Based Email For Physically
Handicapped’.
Tambe Nikita
Vyavahare Ranjana
Parsaiyya Kajal
Shingte Gita
1 Introduction 2
1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.2 Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Literature survey 5
4 System Designs 17
4.1 system Architecture .............................................................................. 18
4.1.1 Module .................................................................................... 18
4.1.2 Data Flow Diagram . . . . . . . . . . . . . . . . . . . . . . 19
4.2 UML DIAGRAMS . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.3 Software Information . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.4 Project Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.5 Stakeholder List . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.6 System Implementation Plan . . . . . . . . . . . . . . . . . . . . . 29
4.7 Algorithm: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
5 OTHER SPECIFICATION 31
5.1 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5.2 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6 Conclusion 32
6.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
7 References 33
INTRODUCTION
1.1 OVERVIEW
The navigation system uses TTS (Text-to-Speech) and STT (Speech-to-text for blind-
ness in order to provide a navigation service through voice. Suggested system, as an
independent program, is fairly cheap held by blind people. This allows blind people
to easy access the program. An increasing number of studies have used technol-
ogy to help Handicapped people to integrate more fully into a global world. The
software considers a system of instant messenger to favor interaction of blind users
with any other user connected to the network. Nowadays the advancement made in
computer technology opened platforms for visually impaired people across the
world. It has been observed that nearly about 60 of the total blind population across
the world is present in INDIA. In this paper, we describe the voice mail architecture
used by Handicapped people to access E-mail and multimedia functions of the
operating system easily and efficiently. This architecture will also reduce cognitive
load taken by the blind to remember and type characters using the keyboard. It also
helps handicapped and illiterate people.
1.1.1 Motivation
We use Face detection and recognisaction using Haar cascade Algorithm After we
use NLP algorithm for Voice based E-mail system architecture that can be used by
a Handicapped person to access E-mails easily and efficiently. The contribution
made by this research has enabled the Blind people to send and receive voice based
eMail messages in their native language with the help of a computer
1.1.2 Objective
• to The goal of the project is to easily Handicapped People handle mail system
and also provide login security. It is very easy to handle.
LITERATURE SURVEY
Sr.no Title Author Summary
1 Algorithms and Alexandru Cazan; This paper
Techniques for Radu Varbanescu; presents a system
Image to Sound Dan Popescu that transforms
Conversion for images acquired
Helping the with a camera
Visually Impaired into sounds. The
People - system is
Application designed for the
Proposal visually impaired
people and will
convert real time
images into
sounds,
respecting a
certain algorithm,
to preserve the
Visual
information, but
not forgetting the
limitations
imposed by the
human hearing
system.
2 Camera based G.Sophia There are a unit
text and Product Jasmine; over billions of
Lable Reading for D.Magdalin visually impaired
Blind People Marry; S.Swetha People
Lakshmi world-wide. A
significant part of
this population
remains blind
even in developed
countries.
SCSMCOE Department of Computer Engineering 2022-23 6
Sr.no Title Author Summary
3 Hy-Demosaicing: Lina This article
Hyperspectral Zhuang; Michael proposes a smart
Blind K. Ng; Xiyou hyperspectral
Reconstruction Fu; Jose´ M. sensing strategy,
From Spectral Bioucas-Dias implemented in
Subsampling the spectral
domain,
conceived for
spaceborne sensor
systems, where
physical space,
storage resources,
And
communication
bandwidth are
extremely scarce
and expensive.
4 The Design and Jingyang Wang , With the rapid
Implementation Peng Ren, Min development of
of Voice Mailbox Huang and Liwei CTI and VoIP
System Based on Guo technology, more
VoIP and more
attention is paid
to the voice
mailbox based on
VoIP which is a
kind of important
telecom
value-added
service.
SOFTWARE REQUIREMENT
SPECIFICATION
3.1 INTRODUCTION
3.1.1 Scope:
The user only requires listening to the voice commands given by the system and re-
spond accordingly in order to get the desired operations performed. This requires
user to speak the operation in the email application and then the system will perform
the required operations.
RAM : 8 GB
As we are using Machine Learning Algorithm and Various High Level Libraries
Laptop
RAM minimum required is 8 GB.
Hard Disk : 40 GB
Data Set of CT Scan images is to be used hence minimum 40 GB Hard Disk memory
is required.
Processor : Intel i5 Processor
Pycharm IDE that Integrated Development Environment is to be used and data load-
ing should be fast hence Fast Processor is required
IDE : Sypder Spyder is an open-source cross-platform integrated development envi-
ronment for scientific programming in the Python language.
Coding Language : Python Version 3.5
3.3.1 PerformanceRequirements
The performance of the functions and every module must be well. The overallper-
formance of the software will enable the users to work eciently. Perfor-mance of
encryption of data should be fast. Performance of the providingvirtual environment
should be fastSafety Requirement•The application is designed in modules where er-
rors can be detected and xedeasily. This makes it easier to install and update new
functionality if required.
The application is designed in modules where errors can be detected and fixed easily.
This makes it easier to install and update new functionality if required.
Our software has many quality attribute that are given below:-
Availability: This software is freely available to all users. The availability of the
software is easy for everyone.
Maintainability: After the deployment of the project if any error occurs then it can
be easily maintained by the software developer.
Reliability: The performance of the software is better which will increase the relia-
bilityof the Software.
User Friendliness: Since, the software is a GUI application; the output generated is
much user friendly in its behavior.
Integrity: Integrity refers to the extent to which access to software or data by unau-
thorized persons can be controlled.
Security: Users are authenticated using many security phases so reliable security is
provided.
SDLC Models stands for Software Development Life Cycle Models. In this article,
we explore the most widely used SDLC methodologies such as Agile ... Each soft-
ware development life cycle model starts with the analysis, in which the Also, here
are defined the technologies used in the project, team load.
One of the basic notions of the software development process is SDLC models which
stands for Software Development Life Cycle models. SDLC – is a continuous pro-
cess, which starts from the moment, when it’s made a decision to launch the project,
and it ends at the moment of its full remove from the exploitation. There is no one
single SDLC model. They are divided into main groups, each with its features and
weaknesses.
SYSTEM DESIGNS
4.1 SYSTEM ARCHITECTURE
4.1.1 Module
• Admin
• In this module,the Admin has to log in by using valid user name and password.
After login successful he can do some operations such as View All Users and
Authorize, View All E-Commerce Website and Authorize,View All Products
and Reviews,View All Products Early Reviews, View All Keyword Search
Details, View All Products Search Ratio, View All Keyword Search Results,
View All Product Review Rank Results.
• In this module, the admin can view the list of users who all registered. In this,
the admin can view the user’s details such as, user name, email, address and
admin authorizes the users.
• View All Products Search Ratio,View All Keyword Search Results,View All
Product Review Rank Results.
• Ecommerce User
• In this module, there are n numbers of users are present. User should register
before doing any operations. Once user registers, their details will be stored
to the database. After registration successful,he has to login by using autho-
rized user name and password Once Login is successful user will do some
operations like Add Products, View All Products with reviews, View All Early
Product’s reviews, View All Purchased Transactions.
• End User
• In this module, there are n numbers of users are present. User should register
before doing any operations. Once user registers, their details will best or to
the database. After registration successful,he has to login by using authorized
user name and password. Once Login is successful user will do some opera-
tions like Manage Account, Search Products by keyword and Purchase, View
Your Search Transactions, View.
In Data Flow Diagram,we Show that flow of data in our system in DFD0 we show
that base DFD in which rectangle present input as well as output and circle show
our system,In DFD1 we show actual input and actual output of system input of our
system is text or image and output is rumor detected like wise in DFD 2 we present
operation of user as well as admin.
Class Diagram.
Activity Diagram.
Sequence Diagram.
Python was conceived in the late 1980s by Guido van Rossum at Centrum
Wiskunde Informatica (CWI) in the Netherlands as a successor to the ABC lan-
guage (itself inspired by SETL), capable of exception handling and interfacing with
the Amoeba operating system. Its implementation began in December 1989. Van
Rossum shouldered sole responsibility for the project, as the lead developer, until 12
July 2018, when he announced his ”permanent vacation” from his responsibilities
as Python’s Benevolent Dictator For Life, a title the Python community bestowed
upon him to reflect his long-term commitment as the project’s chief decision-maker.
He now shares his leadership as a member of a five-person steering council. In Jan-
uary 2019, active Python core developers elected Brett Cannon, Nick Coghlan, Barry
Warsaw, Carol Willing and Van Rossum to a five-member ”Steering Council” to lead
the project.
• Coding assistance and analysis, with code completion, syntax and error high-
lighting, linter integration, and quick fixes
• Project and code navigation: specialized project views, file structure views and
quick jumping between files, classes, methods and usages
• Support for web frameworks: Django, web2py and Flask [professional edition
only]
• Integrated unit testing, with line-by-line code coverage Google App Engine
Python development [professional edition only]
• Version control integration: unified user interface for Mercurial, Git, Subver-
sion, Perforce and CVS with change lists and merge
In this chapter we are going to have an overview about how much time does it took
to complete each task like- Preliminray Survey Introduction and Problem Statement,
Literature Survey, Project Statement, Software Requirement and Specification, Sys-
tem Design, Partial Report Submission, Architecture Design, Implementation, De-
ployment, Testing, Paper Publish, Report Submission and etcetera. This chapter also
gives focus on stakeholder list which gives information about project type, customer
of the proposed system, user and project member who developed the system.
The System Implementation plan table, shows the overall schedule of tasks compi-
lation and time duration required for each task.
Sr. No. Name/Title Start Date End Date
1 Preliminary Survey
2 Introduction and Problem State-
Ment
3 Literature Survey
4 Project Statement
5 Software Requirement And Specifi-
Cation
6 System Design
7 Partial Report Submission
8 Architecture Design
9 Implementation
10 Deployement
11 Testing
12 Paper Publish
13 Report Submission
4.7 ALGORITHM:
OTHER SPECIFICATION
5.1 ADVANTAGES
1. The fundamental advantage of this system is that the user just needs to answer
by speaking and clicking a mouse; the keyboard is completely eliminated.
2. You’re probably wondering how a blind person will be able to click the mouse
in the proper location on the screen at this point.
5.2 APPLICATIONS
This requires user to speak the operation in the email application and then the sys-
tem will perform the required operations. The user would be requested to feed info
through voice inputs whenever required and system will ensure the authentication of
the user details.
Chapter 6
Conclusion
6.1 CONCLUSION
We put forward our project to pave a way for the blind people to easily access their
Mails with a good interactive Manner and we use Speech to text and text to Speech
Method in our Project . Our Project Help To Blind People Handle or access email
easily.
Chapter 7
References
problem Definition
To the main problem of to implement this system is to help blind people to handle
email system easily and help to read incoming mail.and provide login security.
When solving problems we have to decide the difficulty level of our problem. There
are three types of classes provided for that. These are as follows:
1) P Class
2) NP-hard Class
3) NP-Complete Class
P Class:
The class of polynomially solvable problems, P contains all sets in which member-
ship may be decided by an algorithm whose running time is bounded by a polyno-
mial. Besides containing all of what we have decided to consider practical compu-
tational tasks, the class P has another attractive attribute. Its use allows us to not
worry about our machine model since all reasonable models of computation (includ-
ing programs and Turing machines) have time complexities, which are polynomially
related.
NP Class:
Informally the class P is the class of decision problems solvable by some algorithm
within a number of steps bounded by some fixed polynomial in the length of the
input. Turing was not concerned with the efficiency of his machines, but rather his
concern was whether they can simulate arbitrary algorithms given sufficient time.
However it turns out Turing machines can generally simulate more efficient com-
puter models (for example machines equipped with many tapes or an unbounded
random access memory) by at most squaring or cubing the computation time. Thus
P is a robust class and has equivalent definitions over a large class of computer mod-
els. Here we follow standard practice and define the class P in terms of Turing
machines.
NP Hard:
A problem is NP-hard if solving it in polynomial time would make it possible to
solve all problems in class NP in polynomial time. Some NP-hard problems are
also in NP (these are called ”NP-complete”), some are not. If you could reduce an
NP problem to an NP-hard problem and then solve it in polynomial time, you could
solve all NP problems. Also, there are decision problems in NP-hard but are not
NP-complete, such as the infamous halting problem.
NP-complete:
A decision problem L is NP-complete if it is in the set of NP problems so that any
given solution to the decision problem can be verified in polynomial time, and also
in the set of NP-hard problems so that any NP problem can be converted into L by a
transformation of the inputs in polynomial time. The complexity class NP-complete
is the set of problems that are the hardest problems in NP, in the sense that they are
the ones most likely not to be in P. If you can find a way to solve an NP-complete
problem quickly, then you can use that algorithm to solve all NP problems quickly.