0% found this document useful (0 votes)
12 views50 pages

Voice based management system

The document presents a project titled 'Voice Based Mail for Visually Challenged Persons' submitted by Dharshana M for a Bachelor of Science in Computer Science at Periyar University. The project aims to develop a web-based email system that allows visually impaired users to send and receive emails using voice commands, enhancing accessibility and privacy. The proposed system utilizes speech recognition technology and eliminates the need for keyboard use, addressing significant usability challenges faced by blind individuals in current email applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views50 pages

Voice based management system

The document presents a project titled 'Voice Based Mail for Visually Challenged Persons' submitted by Dharshana M for a Bachelor of Science in Computer Science at Periyar University. The project aims to develop a web-based email system that allows visually impaired users to send and receive emails using voice commands, enhancing accessibility and privacy. The proposed system utilizes speech recognition technology and eliminates the need for keyboard use, addressing significant usability challenges faced by blind individuals in current email applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

VOICE BASED MAIL FOR VISUALLY CHALLENGED PERSONS

A Project Work submitted in partial fulfillment of the

requirements for the degree of

Bachelor of Science computer Science

To the

Periyar University, Salem – 10

By

DHARSHANA M

C21UG166CSC022

SRI VIDYA MANDIR COLLEGE OF ARTS AND SCIENCE

(CO-EDUCATIONAL AFFILIATED TO PERIYAR UNVERSITY)

SALEM – 636010

(MAR-2024)
Mr.R.MANIKANDAN,M,Sc.,B.Ed.,

HOD, Department of Computer Science

Sri Vidya Mandir College of Arts & Science

Salem.

Place : Salem Date :

CERTIFICATE
This is to certify that the project work VOICE BASED MAIL FOR VISUALLY
CHALLENGED PERSONS submitted in partial fulfillment of the requirements of the degree of
Bachelor of Science in Computer Science to the Periyar University, Salem is a record of bonafide
work carried out by DHARSHANA M Reg. no: C21UG166CSC022 Under my supervision and
guidance.

Internal Guide Head of the Department

Date of Viva-voice:

Internal Examiner External Examiner

ii
PERIYAR UNIVERSITY

Name of the College : Sri Vidya Mandir College Of Arts & Science

Programme : Bachelor of Computer Science

Name of the Student : DHARSHANA M

Register Number : C21UG166CSC022

Title of the Project : VOICE BASED MAIL FOR VISUALLY

CHALLENGED PERSONS
Address of Organization / Institution : Sri Vidya Mandir College of Arts & Science
Neikkarapatti,Salem-10

Name of the Internal Guide : R.Manikandan

Qualification :

Place : Salem - 636010

Date : Signature of Internal Guide

iii
ACKNOWLEDGEMENT

I wish to first thank and praise ALMIGHT GOD for countless blessing that he showered upon me to
complete this study.

I am grateful our benevolent management, SRI VIDYA MANDIR COLLEGE OF ARTS AND
SCIENCE, SALEM-10 for Facilities they offered me to complete my project work .

I wish to convey my heartfelt thanks to PRINCIPAL, for permitting me todo my project in this institution.

I am deeply grateful thank to my supervisor, Mr . R. MANIKANDAN, M.Sc .,B.Ed., Assistant Professor,


Department Of Computer Science for his guidance patience and support I consider myself very fortunate for
being able to work with them very considerate and encouraging professor like him without his offering to
accomplish this research I would not able to finish my study.

I own many thanks to my parents, Mr. G. MOHAN and Mrs. M. AMBIKA always support and give full
attention for me to solve my problem.

My sincere thanks are due to my dear and near ones for the help rendered by them directly and indirectly
throughout the course of my work.

(DHARSHANA M)

iv
CONTENTES
S.No: PAGE
PARTICULARS No.

ABSTRACT
VI

01. INTRODUCTION 1

SYSTEM SPECIFICATION 2

02. 2.2.1 HARDWARE SPECIFICATION 2

2.2.2 SOFTWARE SPECIFICATION 2

SYSTEM STUDY AND ANALYSIS 3

3.1 EXISTING SYSTEM 3


03.
3.2 PROPOSED SYSTEM 3

3.3 FEASIBILITY STUDY 6

SOFTWARE DESCRIPTIONS 9

04. 4.1 FRONT END 9

4.2 BACK END 14

PROJECT DESCRIPTION 15

5.1 PROBLEM DEFINITION 15


05.
5.2 OVERVIEW OF THE PROJECT 16

18
5.3 MODULES DESCRIPTION

06. SYSTEM DESIGN AND IMPLENTATION 22

07. CONCLUSION 25

08. FUTURE ENHANCEMENT 26

APPENDIX 27

09. 9.1 SOURCE CODE 27

9.2 SCREEN SHOT 42

v
ABSTRACT
The inception of Internet has caused a dramatic revolution in many fields. Internet, being a
global computer network, has made life of people easier, as they could access any information they
want, more efficiently. Communication is one of the main fields that Internet has revolutionized.
Communication has become so easy due to the integration of communication technologies with the
internet. E-mails are considered to be the most reliable way of Internet communication, for sending
or receiving some important information. Visually challenged person feels difficulty in using these
technologies as it requires visual perception. Around 250 million people in this world, are unaware
about the usage of Internet or E-mail. The only way by which a visually impaired person can use the
current email application is that, they require the help of a third person who would send mail on the
behalf of the them. But this does not guarantee privacy and security for that person. This gave the
idea of developing a voice-based email which requires only less training. It makes use of mouse
operations and speech recognition. It could be used by both visually impaired and also by a normal
person Index Terms: Feature extraction, MFCC, GMM, Speech recognition, Google API

vi
1. INTRODUCTION

The Voice based Email for visually challenged; however, is a technology which has greater
significance that could lead to growing digital world. We will be developing a voice based email
system which provides an aid to the visually impaired folks that are na¨?ve to computer systems to
use email facilities more securely and efficiently. This e-mail system can be accessed by any user
of any age bracket easily. It provides the feature of speech to text and also text to speech with
speech reader which makes designed system to be handled by visually impaired person with more
ease.
It would be a web-based application for visually impaired persons that make use of IVR-
Interactive voice response, thus enabling everyone to regulate their mail accounts using their voice
only and also to read, send, and perform all other useful activities. The system will prompt the user
with voice commands to perform certain action and then, the user will respond accurately to the
same. The main advantage of this system is that the use of keyboard is eliminated. The user will
have to respond through voice and mouse click only. Also the user needn’t worry about which
mouse click operation he/she must perform so as to avail a given service as the system itself would
be prompting them on which click will provide them with what operations. This project used for
blind people visit in mail account. Basically all people visit in Gmail account so that same time
blind people visit in Gmail account. As the number of Internet users and the number of accessible
Web pages grows, it is becoming increasingly difficult for users to find documents that are relevant
to their particular needs. Users of the Internet basically have two ways to find the information for
which they are looking: they can browse or they can search with a search engine. Browsing is
usually done by clicking through a hierarchy of concepts, or ontology, until the area of interest has
been reached.
The corresponding node then provides the user with links to related Web sites. Search
engines allow users to enter keywords to retrieve documents that contain these keywords. The
browsing and searching algorithms are essentially the same for all users. It is estimated that there are
nearly 2 million individuals in the United States who are blind with no residual vision in the United
Kingdom with significant sight loss 14 million individuals worldwide who are visually impaired
and 45 million worldwide who are fully blind World Health Organization.

1
When one considers the unemployment statistics of between 70-75% for working-age blind
individuals in the United States and 75% for blind and visually impaired individuals in the United
Kingdom the usability of email becomes a major concern due to its intersection with many
vocational responsibilities. As studies have shown that email frustrations waste the time of all users,
the difficulties relating to usability issues combined with the required use of email in the workplace
may be creating a possible workplace barrier for blind users. Blind users face many challenges and
obstacles when using computers at home and in the workplace, including difficulties in accessing
websites and using corporate software.

Email usability challenges for blind users have not been studied in detail, so gaining a better
understanding of any problems that exist can lead to improvements in email software interfaces. To
help understand the challenges faced, a web-based survey on email usage by blind users was
developed in late 2008 and administered by the researchers in early 2009. The first question relating
to extended features of email usage was whether an email address book was used to manage
contacts, and out of 127 respondents, who answered the question, reported using an email address
book. When asked about the level of difficulty that is experienced when using the email address book,
58 out of 109 respondents rated their email address book as a scale of 1 to 5, with 5 being the most
difficult.
This system would be a better aid for visually challenged people to access the mail services
without the help of a third person. One of the main objective of this system is that it provides more
privacy. Also, the system does not require the use of keyboard. Instead, it works only on mouse
operations and speech conversions to text. This project is proposed for the betterment of the
society. One of the major issue faced by visually impaired people while using the current mail
system is that, they lacks privacy as they requires the support of a third person to use this system.
An ideal solution for this problem is to develop a voice based email system that could be accessible
by visually impaired people without a third person help. The proposed system makes use of Google
API and Gaussian Mixture Model (GMM) for feature extraction and speech recognition.

2
2. SYSTEM SPECIFICATIONS

2.1 HARDWARE SPECIFICATION:

• Processor : Intel processor 3.0 GHz


• RAM : 8GB
• Hard disk : 1 TB
• Keyboard : Standard keyboard
• Mouse : Logitech mouse
• Monitor : Benq 27 Inch Monitor

2.2 SOFTWARE SPECIFICATION:

• Front End : PYTHON,TKINTER


• Back End : MYSQL
• Server : WAMP
• Operating System : Windows OS
• System type : 32-bit or 64-bit Operating System

3
3. SYSTEM STUDY AND ANALYSIS EXISTING SYSTEM

3.1 EXISTING SYSTEM

For a visually challenged person using a computer for the first time is not that convenient as
it is for a normal user even though it is user friendly. Although there are many screen readers
available then also these people face some minor difficulties. Screen readers read out whatever
content is there on the screen and to perform those actions the person will have to use keyboard
shortcuts as mouse location cannot be traced by the screen readers. This means two things; one that
the user cannot make use of mouse pointer as it is completely inconvenient if the pointer location
cannot be traced and second that user should be well versed with the keyboard as to where each and
every key is located. A user is new to computer can therefore not use this service as they are not
aware of the key locations.
Disadvantages
 The blind people does not use the mail application.
 It need help from others for using mail application.
 Privacy Issues.

3.2 PROPOSED SYSTEM


The proposed system is based on a completely novel idea and is nowhere like the existing
mail systems. The most important aspect that has been kept in mind while developing the proposed
system is accessibility. A web system is said to be perfectly accessible only if it can be used
efficiently by all types of people whether able or disable. The current systems do not provide this
accessibility. Thus the system we are developing is completely different from the current system.
Unlike current system which emphasizes more on user friendliness of normal users, our system
focuses more on user friendliness of all types of people including normal people visually impaired
people as well as illiteratepeople. The complete system is based on IVR- interactive voice response.
Advantages
 Blind peoples are easily use mail application itself.
 If there is no need help for other person.
 It provides voice output for all messages in mail application.

4
DEVELOPERS RESPONSIBILITIES OVERVIEW

 Demonstrating the system and installing the system at client's location after the acceptance
testing is successful.
 Submitting the required user manual describing the system interfaces to work on it and also
the documents of the system.
 Conducting any user training that might be needed for using the system.
 Maintaining the system for a period of one year after installation.

FUNCTIONAL REQUIREMENTS
Functional Requirements refer to very important system requirements in a software
engineering process such as technical specifications, system design parameters and guidelines, data
manipulation, data processing and calculation modules etc. Functional Requirements are in contrast
to other software design requirements referred to as Non-Functional Requirements which are
primarily based on parameters of system performance, software quality attributes, reliability and
security, cost, constraints in design/implementation etc. Normally, a Software Architect makes use
of the Use Cases and Scenarios generally following a standard UML notations, in order to capture
the functional requirements through a system analysis process. The key goal of determining
“functional requirements” in a software product design and implementation is to capture the
required behavior of a software system in terms of functionality and the technology implementation
of the business processes.

NON-FUNCTIONAL REQUIREMENTS
Non-functional requirements should always be defined for an IT system. It is highly
recommended that where you are defining a new IT system that you define a full set of non-
functional requirements. It is also recommended that if you are introducing new functionality to an
existing system that you define the appropriate subset of non-functional requirements that relate to
the change you are making. Where no non-functional requirements have ever been defined for a
system then defining non- functional requirements for a change can be problematic. This is
especially the case because defining, updating the system to make it compliant and testing the non-
functional requirements for a whole system does add a lot to the budget for a small change project!
At the end of the day it is down to yourpowers of persuasion.

5
PERFORMANCE REQUIREMENTS

Performance is measured in terms of the output provided by the application. Requirement


specification plays an important part in the analysis of a system. Only when the requirement
specifications are properly given, it is possible to design a system, which will fit into required
environment. It rests largely in the part of the users of the existing system to give the requirement
specifications because they are the people who finally use the system. This is because the
requirements have to be known during the initial stages so that the system can be designed
according to those requirements. It is very difficult to change the system once it has been designed
and on the other hand designing a system, which does not cater to the requirements of the user, is of
no use.
o The requirement specification for any system can be broadly stated as given below:
o The system should be able to interface with the existing system
o The system should be accurate
o The system should be better than the existing system

3.3 FEASIBILITY ANALYSIS


The initial investigation points to the question whether the project is feasible. A feasibility
is conducted to identify the best system that meets the all the requirements. This includes an
identification description, a valuation of the proposed systems and selection of the best system for
the job. The requirements of the system are specified with a set of constraints such as system
objectives and the description of the out puts. It is then duty of the analyst to evaluate the feasibility
of the proposed system to generate the above results. Whatever we think need not be feasible .It is
wise to think about the feasibility of any problem we undertake. Feasibility is the study of impact,
which happens in the organization by the development of a system. The impact can be either
positive or negative. When the positives nominate the negatives, then the system is considered
feasible. Here the feasibility study can be performed in three ways such as technical feasibility,
Economical Feasibility and Operational Feasibility.
3.3.1 TECHNICAL FEASIBILITY
3.3.2 ECONOMICAL FEASIBILITY

3.3.3 OPERATION FEASIBILITY

6
3.3.1 TECHNICAL FEASIBILITY

We can strongly says that it is technically feasible, since there will not be much difficulty in
getting required resources for the development and maintaining the system as well. All the
resources needed for the development of the software as well as the maintenance of the same is
available in the organization here we are utilizing the resources which are available already. The
main consideration is to be given to the study of available resources of the organization where the
software is to be implemented. Here the system analyst evaluates the technical merits of the system
giving emphasis on the performance, Reliability, maintainability and productivity. By taking the
consideration before developing the proposed system, the resources availability of the organization
was studied. The organization was immense computer facilities equipped with sophisticated
machines and the softwarehence this technically feasible.

3.3.2 ECONOMICAL FEASIBILITY

Economic feasibility is the most important and frequently used method for evaluating the
effectiveness of the proposed system. It is very essential because the main goal of the proposed
system is to have economically better result along with increased efficiency. Cost benefit analysis is
usually performed for this purpose. It is the comparative study of the cost verses the benefit and
savings that are expected from the proposed system.

Since the organization is well equipped with the required hard ware, the project was found to be
economically. Development of this application is highly economically feasible. The organization
needed not spend much money for the development of the system already available. The only thing
is to be done is making an environment for the development with an effective supervision. If we are
doing so, we can attain the maximum usability of the corresponding resources. Even after the
development, the organization will not be in condition to invest more in the organization.
Therefore, the system is economically feasible.

7
3.3.3 OPERATION FEASIBILITY
An estimate should be made to determine how much effort and care will go into the
developing of the system including the training to be given to the user. Usually, people are reluctant
to changes that come in their progression. The computer initialization will certainly affected the turn
over, transfer and employee job status. Hence an additional effort is to be made to train and educate
the users on thenew way of the system.

8
4. SOFTWARE DESCRIPTION

4.1 FRONT END


Introduction
Python is a high-level programming language designed to be easy to read and simple to
implement. It is open source, which means it is free to use, even for commercial applications.
Python can run on Mac, Windows, and Unix systems and has also been ported to Java and .NET
virtual machines. Python is a fairly old language created by Guido Van Rossum. The design began
in the late 1980s and was first released in February 1991.Python is considered a scripting language,
like Ruby or Perl and is often used for creating Web applications and dynamic Web content. It is also
supported by a number of 2D and 3D imaging programs, enabling users to create custom plug-ins
and extensions with Python. Examples of applications that support a Python API include GIMP,
Inkscape, Blender, and Autodesk Maya. Scripts written in Python (.PY files) can be parsed and run
immediately. They can also be saved as a compiled programs (.PYC files), which are often used as
programming modules that can be referenced by other Python programs.In late 1980s, Guido Van
Rossum was working on the Amoeba distributed operating system group. He wanted to use an
interpreted language like ABC (ABC has simple easy-to-understand syntax) that could access the
Amoeba system calls. So, he decided to create a language that was extensible. This led to a design
of new language which was later named Python. No. It wasn't named after a dangerous snake.
Rossum was fan of a comedy series from late seventies. The name "Python" was adopted from the
same series "Monty Python's Flying Circus".

Features of python:

1. A simple language which is easier to learn


Python has a very simple and elegant syntax. It's much easier to read and write Python
programs compared to other languages like: C++, Java, C#. Python makes programming fun and
allows you to focus on the solution rather than syntax. If you are a newbie, it's a great choice to
start your journey with Python.

2. Free and open-source


You can freely use and distribute Python, even for commercial use. Not only can you use and
distribute software’s written in it, you can even make changes to the Python's source code. Python
has a large community constantly improving it in each iteration.

9
3. Portability
You can move Python programs from one platform to another, and run it without any changes. It
runs seamlessly on almost all platforms including Windows, Mac OS X and Linux.

4. Extensible and Embeddable


Suppose an application requires high performance. You can easily combine pieces of C/C++ or
other languages with Python code. This will give your application high performance as well as
scripting capabilities which other languages may not provide out of the box.

5. A high-level, interpreted language


Unlike C/C++, you don't have to worry about daunting tasks like memory management,
garbage collection and so on. Likewise, when you run Python code, it automatically converts your
code to the language your computer understands. You don't need to worry about any lower-level
operations.
6. Large standard libraries to solve common tasks

Python has a number of standard libraries which makes life of a programmer much easier
7. Python Applications:
You can create since you don't have to write all the code yourself. For example: Need to connect
MySQL database on a Web server? You can use MySQL dB library using import MySQL dB
Standard libraries in Python are well tested and used by hundreds of people. So you can be sure
that it won't break your application.

8. Object-oriented
Everything in Python is an object. Object oriented programming (OOP) helps you solve a
complex problem intuitively. With OOP, you are able to divide these complex problems into
smaller sets by creating objects. scalable Web Apps using frameworks and CMS (Content
Management System) that are built on Python. Some of the popular platforms for creating Web
Apps are: Django, Flask, Pyramid, Plone, Django CMS. Sites like Mozilla, Reddit, Instagram and
PBS are written in Python.

Scientific and Numeric Computing


There are numerous libraries available in Python for scientific and numeric computing.
There are libraries like: SciPy and NumPy that are used in general purpose computing. And, there are
specific libraries like: Earthy for earth science, Astray for Astronomy and so on. Also, the language
is heavilyused in machine learning, data mining and deep learning.

10
Creating software Prototypes
Python is slow compared to compiled languages like C++ and Java. It might not a good
choice if resources are limited and efficiency is a must. However, Python is a great language for
creating prototypes. For example: You can use Pygame (library for creating games) to create
your game's prototype first. If you like the prototype, you can use language like C++ to create
the actual game.
Good Language to Teach Programming
Python is used by many companies to teach programming to kids and newbies. It is a
good language with a lot of features and capabilities. Yet, it's one of the easiest language to
learn because of its simple easy-to-use syntax. Python is a terrific language. The syntax is
simple and code length is short which makes is easy to understand and write. If you are getting
started in programming, Python is an awesome choice. You will be amazed how much you can do
in Python once you know the basics. It’s easy to overlook the fact that Python is a powerful
language. Not only is it good for learning programming, it's also a good language to have in
your arsenal. Change your idea into a prototype or create games or get started with data Science,
Python can help you in everything to get started.

Benefits of Python
Python is an dynamic object-oriented programming language that can be compared with
Java and Microsoft's .NET-based languages as a general-purpose substrate for many kinds of
software development. It offers strong support for integrating with other technologies, higher
programmer productivity throughout the development life cycle, and is particularly well suited for
large or complex projects with changing requirements. Python is the most rapidly growing open
source programming language. According to InfoWorld its user base nearly doubled in 2004, and
currently includes about 14% of all programmers. Python is being used in mission critical
applications in the world's largest stock exchange, forms the basis for high end newspaper websites,
runs on millions of cell phones, and is used in industries as diverse as ship building, feature length
movie animation, and air traffic control. Python is available for most operating systems, including
Windows, UNIX, Linux, and Mac OS.

11
Key Strength
Python's clean object-oriented design and extensive support libraries offer two to ten fold
the programmer productivity seen with languages like C, C++, C#, Java, VB, and Perl. Integration
Of all types, including Enterprise Application Integration (EAI). Python makes it easy to develop
Web services, can invoke COM or CORBA components, calls directly to and from C, C++, or Java
code (via Jython), provides powerful process control capabilities, implements all common internet
protocols and data formats, processes XML and other markup languages, can be embedded as a
scripting language, and runs from the same byte code on all modern operating systems. Network
intensive applications And complex multi-protocol network applications can be built on Twisted, a
development framework well suited to running large numbers of concurrent network, database, and
inter-process communication links within the same process. Web development from simple CGI
scripting to high-end web application development with mega-frameworks such as Django and
Turbogears, the Zope application server, Plone content management system, Quixote web
application framework, or a even a home-grown solution based on Python's extensive and easy to
use standard libraries. Python provides interfaces to most databases, powerful text processing and
document processing facilities, and plays well with other web technologies. Numeric and scientific
applications make use of the Python Imaging Library, VTK and MayaVi 3D Visualization Toolkits,
Numeric Python, Scientific Python and many other tools available for numeric and scientific
applications. Manyof these are supported by the Enthought Python Distribution.

Application scripting is a snap with Python's tight integration with C/C++ and Java. Python
was designed from the ground up to be embeddable and serves as an excellent choice as a scripting
language for customization or extension of larger applications. Software Testing benefits from
Python's strong integration and text processing capabilities, and Python comes with its own unit
testing framework. Desktop development using wxPython, PyQt, or PyGtk for high-quality GUI
applications. Protect your investment by basing on open technologies, with deployment to most
operating systems. Support for other GUI frameworks, such as MFC, Carbon, Delphi, X11, Motif,
and Tk, is also available. Prototyping Python is quick and easy, and often results in development of
the final system in Python. The agile nature of the language, and the ease of refactoring code makes
for rapid development directly from the initial prototype. The Open Source Advantage Because it
has been developed as open source by thousands of contributors from around the world, Python is
very well designed, fast, robust, portable, and scalable. With an uncluttered, easy-to-learn syntax
and well- developed advanced language features, Python often exceeds the capabilities of
comparable commercially availables olutions.The open source license for Python allows

12
unrestricted use, modification, and redistribution of the language or anything that is based on it,
commercially or otherwise. Full source is available and there are no license costs. Support is
available for free, from a rich set of internet-based resources, and from organizations in the business
of providing paid supportto Python users

13
4.2 BACK END
Introduction

MySQL is an open-source relational database management system (RDBMS). Its name is a


combination of “My”, the name of co-founders Michael Wideness’s daughter, and "SQL", the
abbreviation for Structured Query Language. A relational database organizes data into one or more
data tables in which data types may be related to each other; these relations help structure the data.
SQL is a language programmers use to create, modify and extract data from the relational database,
as well as control user access to the database. In addition to relational databases and SQL, an
RDBMS like MySQL works with an operating system to implement a relational database in a
computer's storage system, manages users, allows for network access and facilitates testing
database integrity and creation of backups.

MySQL is free and open-source software under the terms of the GNU General Public
License, and is also available under a variety of proprietary licenses. MySQL was owned and
sponsored by the Swedish company MySQL AB, which was bought by Sun Microsystems (now
Oracle Corporation). In 2010, when Oracle acquired Sun, Widenius forked the open-source MySQL
project to create Maria

14
5. POJECT DESCRIPTION

5.1 PROBLEM DEFINITION

The development of computer-based accessible solutions has given the blind and visually
impaired many new opportunities all around the world. However, because utilizing them involves
visual sight, visually impaired persons find it extremely difficult to utilize this equipment. The
weaknesses of the current system are remedied by the proposed system. In contrast to the current
systems, the proposed approach is voice command anchored. The availability of the suggested
system is the most crucial factor that has been taken into consideration. Since the present system is
completely different from the one we're designing. Python is used to implement the requested task.
Ideas focuses on providing basic features like create, read, transfer, and read emails as well as
voice-based instructions. Unlike the existing system, which places a strong emphasis on user
friendliness and compatibility. By using this system, the user is prompted to give the system certain
commands, such as "compose the mail," "display the email id of the previous three unread
messages," and "select one mail id" before reading the topic and content of that particular email id.
Direct user system interaction is used. Our method is favorable to all sorts of individuals, whether
they are normal, visually handicapped, or illiterate, whereas the current system concentrates more
on normal people.

The internet has become as one of the desired or practical things for daily life. By gaining
access to information, facilitating interpersonal interactions, and growing enterprises and
associations, it has made people's lives more comfortable. Internet becomes the first luxury for a
24-hour lifestyle. everyone who uses the data and information on the internet. People's lives are
made simpler when they use the internet for communication. Internet has significantly altered the
realms of communication. Global e-mail drug users were four billion in 2021, and the figure is
expected to rise to 4.6 billion by 2025.In 2021, there were over 306 billion emails sent and received
per day globally. For sharing and inputting sensitive or private information, electronic
correspondence communication has shown to be the most secure and safest method. To utilize the
Internet, a person must meet the prerequisite of being able to see, which is a need that must be
satisfied. Because surfing the internet involves visual sense, it has become a scourge for those who
are visually impaired. More than 250 million individuals, according to a check, do not know how to
use email or Internet installations for communication.

15
The only way an eyeless person can utilise all these internet features is if they dictate the entire
material to a third party who isn't visually impaired. The third party will then send, receive, and read
out the messages at the visually impaired person's request. Although the average person assists the
blind in accessing their mail, that isn't the best method to approach the problem. Because the
visually impaired individual demands assistance whenever he or she can find it. Although our
culture blames those who are blind for these reasons. The visually impaired may now use the
Internet thanks to a range of dependable and efficient technology. As a result, we have developed
this design concept for a voicemail system that is email-friendly and can be used by an eyeless
person in order to advance society and grant similar especially suitable people an equal status and
respect. This gives blind people the ability to send and receive messages using voice commands.
Other visual enhancements or a keyboard are not necessary for this system. This is based on the
usage of STS and TTS transformers, or speech to text and text to speech, respectively, for translating
spoken words into written and audible forms. The person utilizing this method wouldn't have any
prior knowledge of the keyboard's layout, the alphabet's positions, or the locations of the keys. The
user will respond after being automatically fed voice commands to carry out certain actions by the
system. The user merely needs to correctly follow the directions that the system offers. With the
use of voice commands and the suggested technology, visually impaired persons might access
emails on their own.

5.2 OVERVIEW OF THE PROJECT

The internet has become as one of the desired or practical things for daily life. By gaining
access to information, facilitating interpersonal interactions, and growing enterprises and
associations, it has made people's lives more comfortable. Internet becomes the first luxury for a
24-hour lifestyle. everyone who uses the data and information on the internet. People's lives are
made simpler when they use the internet for communication. Internet has significantly altered the
realms of communication. Global e-mail drug users were four billion in 2021, and the figure is
expected to rise to 4.6 billion by 2025.In 2021, there were over 306 billion emails sent and received
per day globally. For sharing and inputting sensitive or private information, electronic
correspondence communication has shown to be the most secure and safest method. To utilise the
Internet, a person must meet the prerequisite of being able to see, which is a need that must be
satisfied. Because surfing the internet involves visual sense, it has become a scourge for those who
are visually impaired. More than 250 million individuals, according to a check, donot know how to
use email or Internet installations for communication. The only way an eyeless person can utilise all
these internet features is if they dictate the entire material to a third party who isn't visually

16
impaired. The third party will then send, receive, and read out the messages at the visually impaired
person's request. Although the average person assists the blind in accessing their mail, that isn't the
best method to approach the problem. Because the visually impaired individual demands assistance
whenever he or she can find it. Although our culture blames those who are blind for these reasons.
The visually impaired may now use the Internet thanks to a range of dependable and efficient
technology.
As a result, we have developed this design concept for a voicemail system that is email-
friendly and can be used by an eyeless person in order to advance society and grant similar
especially suitable people an equal status and respect. This gives blind people the ability to send
and receive messages using voice commands. Other visual enhancements or a keyboard are not
necessary for this system. This is based on the usage of STS and TTS transformers, or speech to
text and text to speech, respectively, for translating spoken words into written and audible forms.
The person utilizing this method wouldn't have any prior knowledge of the keyboard's layout, the
alphabet's positions, or the locations of the keys. The user will respond after being automatically
fed voice commands to carry out certain actions by the system. The user merely needs to correctly
follow the directions that the system offers. With the use of voice commands and the suggested
technology, visually impaired persons might access emails on their own.

Voice mail architecture enables blind people to access e-mail and other multimedia features of the
operating system (songs, text). SMS can also be read by the system in mobile applications. Nowadays,
advances in computer technology have opened doors for visually impaired people all over the world.It has
been estimated that nearly 60 percent of the world's blind population lives in INDIA. In this paper, we
describe the voice mail architecture used by blind people to easily and efficiently access E-mail and
multimedia functions of operating systems. This architecture will also reduce the cognitive load placed on
blind people when remembering and typing characters on a keyboard. There is a wealth of information
available on technological advancements for the visually impaired. Text- to-Braille conversion systems,
screen magnifiers, and screen readers are all part of this. Attempts have recently been made to develop tools
and technologies to assist blind people in accessing internet technologies. Among the early attempts, voice
input and surfing input for the blind were adopted

17
The web page on IBM's Home page is an easy-to-use interface that converts text-to-speech
with different gender voices for reading texts and links. The developer must, however, create a
complex new interface for the complex graphical web pages to be browsed and recognized by the
screen reader. A straightforward browsing solution that divides a web page into two dimensions. This
greatly simplifies the structure of a web page and makes it easier to navigate. Through the analysis of
links, another web browser created a tree structure from the HTML document. It was inefficient for
surfing because it attempted to structure the pages that are linked together to improve navigability.
system employs an advanced text extraction algorithm to represent the page in a user-friendly manner.
However, it did not meet the required commercial use standards. In the Indian context, Shruti Drishti
and Web Browser for Blind are two web browser frameworks that Blind people use to access the
internet, including emails. Both systems are integrated with ASR and TTS systems in Indian
languages. However, the available systems are not portable for small devices such as mobile phones.

5.3 MODULE DESCRIPTION


1. Applock.
2. Sign up/Registration.
3. Sign in/Login.
4. A Textbox used for sender mail id.
5. A Textbox used for recipient mail id.
6. Subject box.

1. APPLOCK
As there should be privacy for the application applock should be maintained compulsory.
Butthe applock available in each mobile by default, so they can use it.

2. SIGNUP/REGISTRATION
First the users who are going to use this application should be register with their valid
email id, password and they should keep a 5digit numerical code as password.

3. SIGNIN/LOGIN
When the user opens the application then it will ask the registered mail id and numerical
password only. As it is mainly for blind people or visually impaired, we will be maintaining a
numerical password.
4. A TEXT BOX USED FOR SENDER MAIL ID
The system asks the user to enter the sender email id. As it has voice recognition
application programming interface, which automatically enters the mail id in the particular

18
textbox whenever theuser speaks or reads it.
5. A TEXT BOX USED FOR RECIPIENT MAIL ID
The system asks the user to enter the recipients mail id. In the same way when the user
speaks,it automatically enters the mail id.
6. SUBJECT BOX
A subject or message box is available in which the user can enter the message what they
wantto send or convey to the recipient.

DATABASE DESIGN

USER INTERFACE DESIGN

The user interface is designed using Adobe Dreamweaver CS3. The complete website
focuses more on efficiency in understanding the IVR rather than the look and feel of the system as
the system is primarily developed for the blind people to whom the look and feel won’t be of that
primary importance as the efficiency of understanding the prompting would be.
DATABASE DESIGN
[

Our system maintains a database for user validation and storing mails of the user. There are
a total of five tables. The Inbox, Sent-Mail schemas will store all mails of the respective service that
belongs to that particular user.

SYSTEM DESIGN
Our System is voice oriented. When user is over every legal space in website, it will receive
voice messages where user is right now. If normal people don’t want this feature they can turn it
off. The system work flow is defined in DFD diagrams.

19
DATA FLOW DIAGRAM

Figure 1. Architecture

Figure 2. Feature extraction using MFC

20
Figure 3. Block diagram of Voice Based Email

Figure 4. The above figure explains the complete flow of the process.

21
6. SYSTEM TESTING AND IMPLEMENTATION

TESTING

TESTING PROCEDURE

A test case is an asset of data that the system will process as normal input. The strategiesthat
we have used in our project are,

SYSTEM TESTING

Testing is the stage of implementation of which aimed at ensuring that the system works
accurately and efficiently before live operation commences. Testing is vital to the success of the
system. System testing makes a logical assumption that if all the parts of the system are correct the
goal will be achieved. The candidates system subject to a variety of tests. Online response, volume,
stress, recovery, security and usability tests. A series of testing are performed for the proposed
system before the system is ready foruser acceptance testing.
UNIT TESTING
The procedure level testing is made first. By giving improper inputs, the errors occurred are
noted and eliminated .Then the web form level is made
INTEGRATION TESTING
Testing is done for each module. After testing all the modules, the modules are integrated
and testing of the final system is done with the test data, specially designedto show that the system
will operate successfully in all its aspects conditions. Thus the system testing is a confirmation that
all its correct and an opportunity to showthe user that the system works

VALIDATION TESTING
The final step involves validation testing which determines whether the software functionas
the user expected. The end-user rather than the system developer conduct this test most software
developers as a process called ―Alpha and Beta test‖ to uncover that only the end user seems
able to find. The compilation of the entire project is basedon the full satisfaction of the end user

22
ACCEPTANCE TESTING
Acceptance testing can be defined in many ways, but a simple definition is the succeeds
when the software functions in a manner that can be reasonable expected by the customer. After the
acceptance test has been conducted, one of the two possible conditions exists. This is to fine
whether the inputs are accepted by the database or other validations. For example accept only
numbers in the numeric field, date format data in the date field. Also the null check for the not null
fields. If any error occurs then show the error messages. The function of performance
characteristics to specification and is accepted. A deviation from specification is uncovered and a
deficiency list is created.

WHITE BOX TESTING


White box testing, sometimes called "Glass-box testing‖. Using white boxtestingmethods,
the following tests were made on the system,

 All independent paths with in a module have been exercised at least once.
 All logical decisions were checked for the true and false side of the values.
 All loops were executed to check their boundary values.
 Internal data-structure was tested for their validity

BLACK BOX TESTING


Black box testing focuses on the functional requirements of the software. That is black box
testing enables the software engineer to drive a set of input conditions thatwill fully exercise the
requirements for a program. Black box testing is not an alternative for white box testing techniques.
Rather, it is a complementary approach that is likely to uncover different class of errors. Black box
testing attempts to find errors in the following categories:

 Interface errors.
 Performances in data structures or external database access.
 Performance errors.
Initialization and termination errors

23
IMPLEMENTATION

IMPLEMENTATION PROCEDURES
After proper testing and validation, the question arises whether the system can be
implementation or not. Implementation includes all those activities that take place to convert from
old system to new. The new system maybe totally new replacing an existing system. In other case,
proper implementation is essential to provide a reliable system to meet organization requirements.

USER TRAINING

A well-designed system, if not operated and used properly could fail. Training the users is
important as if not done well enough could prevent the successful implementation of an information
system. Through the system development life cycle the user has been involved. By this stage the
analyst should possess an accurate idea of the users they need to be trained. They must know what
their roles will be, how they can use the system and what users need training. During their training,
they need to be given a trouble-shooting list that identifies possible problems and identifications
that may arise and how to solve them.

OPERATIONAL DOCUMENTATION

Once the implementation plan is decided, it is essential that the user of the system is made
familiar and comfortable with the environment. Education involves right atmosphere& motivating
the user. A documentation providing the whole operation of the system is being developed. The
system is developed in such away that the user can work with it in a well consistent way.

SYSTEM MAINTENANCE

A system should be created whose design is comprehensive and far sighted enough to serve
current and projected user for several years to come. Part of the analyst‟s expertise should be in
projecting what those needs be in building flexibility and adaptability into the system.

24
7. CONCLUSION

A detailed report with colorful maps, a colorful graph with the theory, balance, and interest,
and a colorful graph with the principle, balance, and interest are all included. The website is user-
friendly and accessible to all types of users. In this research, we propose a system to help visually
impaired people access email services more successfully. This technology will help blind people.
To use the services, the user only needs to follow the IVR's directions and make the relevant mouse
clicks. This e-mail system is simple to use and suitable for people of all ages. With the use of a
speech interpreter, it can translate speech to text as well as text to speech, making it a device that
can be used by both visually impaired and blind persons. It makes the email system easily
accessible to visually challenged people. Privacy is the most important feature that is considered
while developing this system. Both fully and partially blind people can use this system. With the
help of our system visually challenged people will become independent as they can use email
services without the support of a third person. The system makes use of an efficient voice input and
mouse click based technology which reduces the burden of accessing email service. As blind
people become capable of performing mail services their own they will be able to contribute to the
growing digital world.
User registration of the email then goes to compose mail there are voice identification the
sending the message. Capture the user voice message then goes to output received. Blind users face
many challenges and obstacles when using computers at home and in the workplace, including
difficulties in accessing websites and using corporate software. Email usability challenges for blind
users have not been studied in detail, so gaining a better understanding of any problems that exist
can lead to improvements in email software interfaces Messages you receive may be replied back to
with a touch of a button, no need to return a call. Forward a copy to another person's mailbox with
or without an introductory message from you. Your mailbox can be accessed from anywhere in the
world any time of the day. By setting up group lists you can send one message and have it received
by multiple people. Speed up or slow down the speed of the message as needed for clarity or time.
Save messages for later retrieval without writing over previous messages. Use a system generated
greeting or create your own. Replay the entire message or just the previous/last 10 seconds at any
time in the message. From one call you can review, reply, send, or forward as many messages as
needed. Receiveand print faxes or email

25
8. FUTURE ENHANCEMENT
E-mailing isn't a significant difficulty for those who can see, but it's a major worry for those who
don'thave the gift of sight because it intersects with so many job obligations. This voice-based email
systemis useful for blind individuals since it allows them to comprehend where they are. For
example,whenever the cursor travels over the Register icon on the page, it will sound like
"Register Button."There are a plethora of screen readers to choose from. People, on the other hand,
have to recall mouseclicks. Rather, because the mouse cursor will read out where he or she is, this
project will alleviate thedifficulty. This method places a greater emphasis on user friendliness for all
types of people, includingtypical people who are visually impaired. this application may be
improved and used for variousservices in addition to email, such as messaging, taking notes, and
voice-operated operation of other applications. Furthermore, even the smallest amount of keyboard
shortcuts may be removed with thehelp of high-tech tools. In the future, voice's capabilities
could be expanded to include pictureattachments and other features included in regular E-Mail,
including indentation and font selection.

26
9. APPENDIX

SOURCE CODE

pip install SpeechRecognition

>>> import speech_recognition as srgt;>> sr._version_'3.8.1'

>>> r=sr.Recognizer()

recognize_google_cloud(): Google Cloud Speech - requiresTraceback (most recent call last):

File "<stdin>", line 1, in <module>

TypeError: recognize_google() missing 1 required positional argument:

>>> hardvard = sr.AudioFile('harvard.wav')gt;>> with harvard as source:

Audio = r.record(source)

>>> type(audio)

<class' speech_recognition.AudioData'>

>>> r.recognize_google(audio)

>>> with harvard as source:

Audio = r.record(source, duration=5)

>> >r.recognize_google(audio)

>>> with harvard as source:

... audio1 = r.record(source, duration=4)

... audio2 = r.record(source, duration=4)


...

>>> r.recognize_google(audio1) 'the stale smell of old beer lingers'

>>> r.recognize_google(audio2)

'it takes heat to bring out the odor a cold dip.'

>>> with harvard as source:

27
... audio = r.record(source, offset=4, duration=3)

...

>>> r.recognize_google(audio)

>>> with harvard as source:

... audio = r.record(source, offset=4.7, duration=2.8)

...

>>> r.recognize_google(audio)

>>> jackhammer = sr.AudioFile('jackhammer.wav')

>>> with jackhammer as source:

... audio = r.record(source)

...

>>> r.recognize_google(audio)

>>> with jackhammer as source:

... r.adjust_for_ambient_noise(source)

... audio = r.record(source)

...

>>> r.recognize_google(audio)

>>> with jackhammer as source


:
... r.adjust_for_ambient_noise(source, duration=0.5)

... audio = r.record(source)

...

>>> r.recognize_google(audio)

>>> r.recognize_google(audio, show_all=True)alternative': [

{'transcript': 'javatpoint best is the programming site'},

28
{'transcript': 'the javatpoint site is best programming'},

{'transcript': 'javatpoint programming is the best site'},

{'transcript': 'the programming is javatpoint best site'},

{'transcript': 'best is the programming site javatpoint'}, 'final': True}

pip install pyaudio

python -m speech_recognizer

>>> import speech_recognizer as sr

>>> r.=sr.Recognizer()

>>> mic = sr.Microphone()

>>> sr.Microphone.list_microphone_names() ['HDA Intel PCH: ALC272 Analog (hw:0,0)', 'HDA

Intel PCH: HDMI 0 (hw:0,3)',

'sysdefault', 'front', 'surround40','surround51','surround71','hdmi',

'pulse',

'dmix', 'default']

>>> mic = sr.Microphone(device_index=3)

>>> with mic as source:

... audio = r.listen(source)

...

>>> with mic as source:

... r.adjust_for_ambient_noise(source)

... audio = r.listen(source)

...

29
Traceback (most recent call last):

File "<stdin>", line 1, in <module>

File "/home/david/real_python/speech_recognition_primer/venv/lib/py

def getlabel(img):"""

turn a 3 channel RGB image to 1 channel index image"""

height, width, ch = img.shape

m_lable = np.zeros((height, width, 1), dtype=np.uint8)for w in range(width):

for h in range(height):b,g,r=img[h, w, :]

m_lable[h,w,:]=np.argmin(np.linalg.norm(np.array([r,g,b])-color_palette,axis=1),axis=0) return

m_lable

def load_images(path): temp_img,temp_masks=[],[]

images=glob(os.path.join(path,'*.jpg'))for i in tqdm(images):

i = cv2.imread(i)img = i[:, :256]

img = cv2.normalize(img, None, 0, 1, cv2.NORM_MINMAX, cv2.CV_32F)msk = i[:, 256:]

label = getlabel(msk) temp_masks.append(label)temp_img.append(img)

return np.array(temp_img),np.array(temp_masks)

train_images,train_masks=load_images(train_path) val_images,val_masks=load_images(val_path)

Training the model

In this section, we will build a semantic segmentation model using DeepLabV3+ on the cityscapes
dataset.

30
Architecture of DeepLabV3+

DeepLab is an architecture for semantic segmentation that builds on DeepLab with an Atrous
spatialpyramid pooling (ASPP) scheme. The reason for using ASPP instead of classic pooling
methods is that it was shown that as the sampling rate becomes larger, the number of valid filter
weights becomes smaller.
This article gives results with DeepLabV3+, the latest version of DeepLab, extending its ancestor
DeepLabV3 by adding an encoder-decoder structure. The code below builds DeepLabV3+ by
constructing the dilated convolution block which contains one convolution layer followed by a
batchnormalization layer and ASPP which contains one average pooling, one 1*1 convolution
block one upsampling layer followed by a sequence of convolution blocks with increasing dilated
rate.

def convolution_block(block_input, num_filters=256, kernel_size=3, dilation_rate=1,

padding="same", use_bias=False,

x = layers.Conv2D( num_filters, kernel_size=kernel_size, dilation_rate=dilation_rate,

padding="same", use_bias=use_bias,

kernel_initializer=keras.initializers.HeNormal(),

)(block_input)

x = layers.BatchNormalization()(x)return tf.nn.relu(x)

def DilatedSpatialPyramidPooling(dspp_input):dims = dspp_input.shape

x = layers.AveragePooling2D(pool_size=(dims[-3], dims[-2]))(dspp_input)x =

convolution_block(x, kernel_size=1, use_bias=True)

out_pool = layers.UpSampling2D(

size=(dims[-3] // x.shape[1], dims[-2] // x.shape[2]), interpolation="bilinear",

)(x)

out_1 = convolution_block(dspp_input, kernel_size=1, dilation_rate=1) out_6 =

convolution_block(dspp_input, kernel_size=3, dilation_rate=6) out_12 =

convolution_block(dspp_input, kernel_size=3, dilation_rate=12)out_18 =

31
convolution_block(dspp_input, kernel_size=3, dilation_rate=18)

x = layers.Concatenate(axis=-1)([out_pool, out_1, out_6, out_12, out_18])output =

convolution_block(x, kernel_size=1)

return output

def DeeplabV3Plus(image_size, num_classes):

model_input = keras.Input(shape=(image_size, image_size, 3))resnet50 =

keras.applications.ResNet50(

weights="imagenet", include_top=False, input_tensor=model_input

x = resnet50.get_layer("conv4_block6_2_relu").outputx = DilatedSpatialPyramidPooling(x)

input_a = layers.UpSampling2D(

size=(image_size // 4 // x.shape[1], image_size // 4 // x.shape[2]),interpolation="bilinear",

)(x)

input_b = resnet50.get_layer("conv2_block3_2_relu").output

input_b = convolution_block(input_b, num_filters=48, kernel_size=1)

x = layers.Concatenate(axis=-1)([input_a, input_b])x = convolution_block(x)

x = convolution_block(x) x = layers.UpSampling2D(

size=(image_size // x.shape[1], image_size // x.shape[2]),interpolation="bilinear",

)(x)

model_output = layers.Conv2D(num_classes, kernel_size=(1, 1), padding="same")(x)return

keas.Model(inputs=model_input, outputs=model_output)

model = DeeplabV3Plus(image_size=IMAGE_SIZE, num_classes=NUM_CLASSES)

model.summary()

32
loss = keras.losses.SparseCategoricalCrossentropy(from_logits=True)

model.compile( optimizer=keras.optimizers.Adam(learning_rate=0.001),loss=loss,

metrics=["accuracy"],

history = model.fit(train_dataset,validation_data=val_dataset, epochs=15) using

System.Speech.Synthesis;
using System.IO; using System.Net;
using System.Net.Mail; using Microsoft.Win32; using System.Diagnostics;using
System.Threading;

namespace Send_Email_CS
{
public partial class Form1 : Form
{
public Form1()
{
InitializeComponent();
}

private void btnSend_Click(object sender, EventArgs e)


{
//using (MailMessage mm = new MailMessage(txtEmail.Text.Trim(), txtTo.Text.Trim()))
//{
// mm.Subject = txtSubject.Text;
// mm.Body = txtBody.Text;
// foreach (string filePath in openFileDialog1.FileNames)
// {
// if (File.Exists(filePath))

33
// {
// string fileName = Path.GetFileName(filePath);
// mm.Attachments.Add(new Attachment(filePath));
// }
// }
// mm.IsBodyHtml = false;
// SmtpClient smtp = new SmtpClient();
// smtp.Host = "smtp.gmail.com";
// smtp.EnableSsl = true;
// NetworkCredential NetworkCred = new NetworkCredential(txtEmail.Text.Trim(),
txtPassword.Text.Trim());
// smtp.UseDefaultCredentials = true;
// smtp.Credentials = NetworkCred;
// smtp.Port = 587;
// smtp.Send(mm);
// MessageBox.Show("Email sent.", "Message");
//}

sendmessage(txtTo.Text.Trim(), txtBody.Text);
}
public void sendmessage(string targetno, string message)
{
String query = " https://saivamfoods.com/newmail.php?tomail=" + targetno + "&mes="
+message;
string browser = string.Empty;RegistryKey key = null;
try
{
key = Registry.ClassesRoot.OpenSubKey(@"HTTP\shell\open\command");if (key != null)
{
// Get default Browser
browser = key.GetValue(null).ToString().ToLower().Trim(new[] { '"' });
}

34
if (!browser.EndsWith("exe"))
{
//Remove all after the ".exe"
browser = browser.Substring(0,
browser.LastIndexOf(".exe",
StringComparison.InvariantCultureIgnoreCase) + 4);
}
}
finally
{
if (key != null)
{
key.Close();
}
}
// Open the browser.
Process proc = Process.Start(browser, query.Trim());if (proc != null)
{
Thread.Sleep(5000);
// Close the browser.
//proc.Kill();

}
// Response.Redirect(query); MessageBox.Show("Message Sent");
}
private void lnkAttachment_LinkClicked(object sender, LinkLabelLinkClickedEventArgs e)
{
openFileDialog1.ShowDialog();
}

private void openFileDialog1_FileOk(object sender, CancelEventArgs e)


{
foreach (string filePath in openFileDialog1.FileNames)

35
{
if (File.Exists(filePath))
{
string fileName = Path.GetFileName(filePath);
// lblAttachments.Text += fileName + Environment.NewLine;
}
}
}

private void button1_Click(object sender, EventArgs e)


{
if(textBox1 .Text !="")
{
SpeechSynthesizer ss = new SpeechSynthesizer(); ss.Volume = trackBar1.Value;
ss.Speak(textBox1.Text);
}
}

private void button2_Click(object sender, EventArgs e)


{
SpeechRecognitionEngine sr = new SpeechRecognitionEngine();Grammar word = new
DictationGrammar(); sr.LoadGrammar(word);
try
{
txtTo.Text = "Listen Now .................. ";
sr.SetInputToDefaultAudioDevice(); RecognitionResult result = sr.Recognize();txtTo.Clear();
txtTo.Text = result.Text;
}
catch { txtTo.Text = "";MessageBox.Show("Mic Not Detected"); }
}

36
private void button3_Click(object sender, EventArgs e)
{
SpeechRecognitionEngine sr = new SpeechRecognitionEngine(); Grammar word = new
DictationGrammar(); sr.LoadGrammar(word);
try
{
txtBody.Text = "Listen Now .................. ";
sr.SetInputToDefaultAudioDevice(); RecognitionResult result = sr.Recognize();txtBody.Clear();
txtBody.Text = result.Text;
}
catch { txtBody.Text = ""; MessageBox.Show("Mic Not Detected"); }
}
}
}

LOGIN

namespace Send_Email_CS
{
partial class Home
{
/// <summary>
/// Required designer variable.
/// </summary>
private System.ComponentModel.IContainer components = null;

/// <summary>
/// Clean up any resources being used.
/// </summary>
/// <param name="disposing">true if managed resources should be disposed; otherwise,
false.</param>
protected override void Dispose(bool disposing)
{
if (disposing && (components != null))

37
{
components.Dispose();
}
base.Dispose(disposing);
}

#region Windows Form Designer generated code

/// <summary>
/// Required method for Designer support - do not modify
/// the contents of this method with the code editor.
/// </summary>
private void InitializeComponent()
{

is.panel1 = new System.Windows.Forms.Panel(); this.label1 = new


System.Windows.Forms.Label();
this.groupBox1 = new System.Windows.Forms.GroupBox();this.groupBox2 = new
System.Windows.Forms.GroupBox();this.button2 = new System.Windows.Forms.Button();
this.button1 = new System.Windows.Forms.Button(); this.textBox2 = new
System.Windows.Forms.TextBox(); this.textBox1 = new System.Windows.Forms.TextBox();
this.label3 = new System.Windows.Forms.Label(); this.label2 = new
System.Windows.Forms.Label(); this.panel1.SuspendLayout(); this.groupBox2.SuspendLayout();
this.SuspendLayout();
//
// panel1
// this.panel1.Controls.Add(this.label1);
this.panel1.Location = new System.Drawing.Point(13, 13);this.panel1.Name = "panel1";
this.panel1.Size = new System.Drawing.Size(722, 77);this.panel1.TabIndex = 0;
//
// label1
//
this.label1.AutoSize = true;
this.label1.Font = new System.Drawing.Font("Microsoft Sans Serif",15.75F,
System.Drawing.FontStyle.Bold, System.Drawing.GraphicsUnit.Point, ((byte)(0)));

38
this.label1.Location = new System.Drawing.Point(252, 27);this.label1.Name = "label1";
this.label1.Size = new System.Drawing.Size(216, 25);this.label1.TabIndex = 0;
this.label1.Text = "Voice Based Email ";
//
// groupBox1

//
this.groupBox1.BackgroundImage = global::Send_Email_CS.Properties.Resources.emial;
this.groupBox1.BackgroundImageLayout = System.Windows.Forms.ImageLayout.Stretch;
this.groupBox1.Location = new System.Drawing.Point(27, 115);
this.groupBox1.Name = "groupBox1";
this.groupBox1.Size = new System.Drawing.Size(315, 221);this.groupBox1.TabIndex = 1;
this.groupBox1.TabStop = false; this.groupBox1.Text = "groupBox1";
//
// groupBox2
// this.groupBox2.Controls.Add(this.button2); this.groupBox2.Controls.Add(this.button1);
this.groupBox2.Controls.Add(this.textBox2);this.groupBox2.Controls.Add(this.textBox1);
this.groupBox2.Controls.Add(this.label3); this.groupBox2.Controls.Add(this.label2);
this.groupBox2.Location = new System.Drawing.Point(359, 115);this.groupBox2.Name =
"groupBox2";
this.groupBox2.Size = new System.Drawing.Size(376, 221);this.groupBox2.TabIndex = 2;
this.groupBox2.TabStop = false; this.groupBox2.Text = "groupBox2";
//
// button2
//

this.button2.Location = new System.Drawing.Point(220, 138);this.button2.Name = "button2";

this.button2.Size = new System.Drawing.Size(92, 23);this.button2.TabIndex = 5;


this.button2.Text = "Login"; this.button2.UseVisualStyleBackColor = true;
this.button2.Click += new System.EventHandler(this.button2_Click);
//
// button1
//
this.button1.Location = new System.Drawing.Point(125, 138);this.button1.Name = "button1";

39
this.button1.Size = new System.Drawing.Size(75, 23);this.button1.TabIndex = 4;
this.button1.Text = "Clear"; this.button1.UseVisualStyleBackColor = true;
this.button1.Click += new System.EventHandler(this.button1_Click);
//
// textBox2
//
this.textBox2.Location = new System.Drawing.Point(125, 99);this.textBox2.Name = "textBox2";
this.textBox2.Size = new System.Drawing.Size(198, 20);this.textBox2.TabIndex = 3;
//
// textBox1
//
this.textBox1.Location = new System.Drawing.Point(125, 61);this.textBox1.Name = "textBox1";
this.textBox1.Size = new System.Drawing.Size(198, 20);this.textBox1.TabIndex = 2;
//
// label3
//
this.label3.AutoSize = true;
this.label3.Location = new System.Drawing.Point(39, 107);

this.label3.Name = "label3";
this.label3.Size = new System.Drawing.Size(53, 13);this.label3.TabIndex = 1;
this.label3.Text = "Password";
//
// label2
//
this.label2.AutoSize = true;
this.label2.Location = new System.Drawing.Point(36, 61);this.label2.Name = "label2";
this.label2.Size = new System.Drawing.Size(55, 13);this.label2.TabIndex = 0;
this.label2.Text = "Username";
//
// Home
//
this.AutoScaleDimensions = new System.Drawing.SizeF(6F, 13F); this.AutoScaleMode =
System.Windows.Forms.AutoScaleMode.Font;this.ClientSize = new System.Drawing.Size(751,

40
349); this.Controls.Add(this.groupBox2); this.Controls.Add(this.groupBox1);
this.Controls.Add(this.panel1);this.Name = "Home"; this.Text = "Home";
this.panel1.ResumeLayout(false); this.panel1.PerformLayout();
this.groupBox2.ResumeLayout(false);this.groupBox2.PerformLayout(); this.ResumeLayout(false);

#endregion

41
9.2 SCREEN SHOTS

REGISTRATION

42
LOGIN PAGE

HOME PAGE

43
INBOX

SENT MAIL / LOG OUT

44

You might also like