Voice based management system
Voice based management system
To the
By
DHARSHANA M
C21UG166CSC022
SALEM – 636010
(MAR-2024)
Mr.R.MANIKANDAN,M,Sc.,B.Ed.,
Salem.
CERTIFICATE
This is to certify that the project work VOICE BASED MAIL FOR VISUALLY
CHALLENGED PERSONS submitted in partial fulfillment of the requirements of the degree of
Bachelor of Science in Computer Science to the Periyar University, Salem is a record of bonafide
work carried out by DHARSHANA M Reg. no: C21UG166CSC022 Under my supervision and
guidance.
Date of Viva-voice:
ii
PERIYAR UNIVERSITY
Name of the College : Sri Vidya Mandir College Of Arts & Science
CHALLENGED PERSONS
Address of Organization / Institution : Sri Vidya Mandir College of Arts & Science
Neikkarapatti,Salem-10
Qualification :
iii
ACKNOWLEDGEMENT
I wish to first thank and praise ALMIGHT GOD for countless blessing that he showered upon me to
complete this study.
I am grateful our benevolent management, SRI VIDYA MANDIR COLLEGE OF ARTS AND
SCIENCE, SALEM-10 for Facilities they offered me to complete my project work .
I wish to convey my heartfelt thanks to PRINCIPAL, for permitting me todo my project in this institution.
I own many thanks to my parents, Mr. G. MOHAN and Mrs. M. AMBIKA always support and give full
attention for me to solve my problem.
My sincere thanks are due to my dear and near ones for the help rendered by them directly and indirectly
throughout the course of my work.
(DHARSHANA M)
iv
CONTENTES
S.No: PAGE
PARTICULARS No.
ABSTRACT
VI
01. INTRODUCTION 1
SYSTEM SPECIFICATION 2
SOFTWARE DESCRIPTIONS 9
PROJECT DESCRIPTION 15
18
5.3 MODULES DESCRIPTION
07. CONCLUSION 25
APPENDIX 27
v
ABSTRACT
The inception of Internet has caused a dramatic revolution in many fields. Internet, being a
global computer network, has made life of people easier, as they could access any information they
want, more efficiently. Communication is one of the main fields that Internet has revolutionized.
Communication has become so easy due to the integration of communication technologies with the
internet. E-mails are considered to be the most reliable way of Internet communication, for sending
or receiving some important information. Visually challenged person feels difficulty in using these
technologies as it requires visual perception. Around 250 million people in this world, are unaware
about the usage of Internet or E-mail. The only way by which a visually impaired person can use the
current email application is that, they require the help of a third person who would send mail on the
behalf of the them. But this does not guarantee privacy and security for that person. This gave the
idea of developing a voice-based email which requires only less training. It makes use of mouse
operations and speech recognition. It could be used by both visually impaired and also by a normal
person Index Terms: Feature extraction, MFCC, GMM, Speech recognition, Google API
vi
1. INTRODUCTION
The Voice based Email for visually challenged; however, is a technology which has greater
significance that could lead to growing digital world. We will be developing a voice based email
system which provides an aid to the visually impaired folks that are na¨?ve to computer systems to
use email facilities more securely and efficiently. This e-mail system can be accessed by any user
of any age bracket easily. It provides the feature of speech to text and also text to speech with
speech reader which makes designed system to be handled by visually impaired person with more
ease.
It would be a web-based application for visually impaired persons that make use of IVR-
Interactive voice response, thus enabling everyone to regulate their mail accounts using their voice
only and also to read, send, and perform all other useful activities. The system will prompt the user
with voice commands to perform certain action and then, the user will respond accurately to the
same. The main advantage of this system is that the use of keyboard is eliminated. The user will
have to respond through voice and mouse click only. Also the user needn’t worry about which
mouse click operation he/she must perform so as to avail a given service as the system itself would
be prompting them on which click will provide them with what operations. This project used for
blind people visit in mail account. Basically all people visit in Gmail account so that same time
blind people visit in Gmail account. As the number of Internet users and the number of accessible
Web pages grows, it is becoming increasingly difficult for users to find documents that are relevant
to their particular needs. Users of the Internet basically have two ways to find the information for
which they are looking: they can browse or they can search with a search engine. Browsing is
usually done by clicking through a hierarchy of concepts, or ontology, until the area of interest has
been reached.
The corresponding node then provides the user with links to related Web sites. Search
engines allow users to enter keywords to retrieve documents that contain these keywords. The
browsing and searching algorithms are essentially the same for all users. It is estimated that there are
nearly 2 million individuals in the United States who are blind with no residual vision in the United
Kingdom with significant sight loss 14 million individuals worldwide who are visually impaired
and 45 million worldwide who are fully blind World Health Organization.
1
When one considers the unemployment statistics of between 70-75% for working-age blind
individuals in the United States and 75% for blind and visually impaired individuals in the United
Kingdom the usability of email becomes a major concern due to its intersection with many
vocational responsibilities. As studies have shown that email frustrations waste the time of all users,
the difficulties relating to usability issues combined with the required use of email in the workplace
may be creating a possible workplace barrier for blind users. Blind users face many challenges and
obstacles when using computers at home and in the workplace, including difficulties in accessing
websites and using corporate software.
Email usability challenges for blind users have not been studied in detail, so gaining a better
understanding of any problems that exist can lead to improvements in email software interfaces. To
help understand the challenges faced, a web-based survey on email usage by blind users was
developed in late 2008 and administered by the researchers in early 2009. The first question relating
to extended features of email usage was whether an email address book was used to manage
contacts, and out of 127 respondents, who answered the question, reported using an email address
book. When asked about the level of difficulty that is experienced when using the email address book,
58 out of 109 respondents rated their email address book as a scale of 1 to 5, with 5 being the most
difficult.
This system would be a better aid for visually challenged people to access the mail services
without the help of a third person. One of the main objective of this system is that it provides more
privacy. Also, the system does not require the use of keyboard. Instead, it works only on mouse
operations and speech conversions to text. This project is proposed for the betterment of the
society. One of the major issue faced by visually impaired people while using the current mail
system is that, they lacks privacy as they requires the support of a third person to use this system.
An ideal solution for this problem is to develop a voice based email system that could be accessible
by visually impaired people without a third person help. The proposed system makes use of Google
API and Gaussian Mixture Model (GMM) for feature extraction and speech recognition.
2
2. SYSTEM SPECIFICATIONS
3
3. SYSTEM STUDY AND ANALYSIS EXISTING SYSTEM
For a visually challenged person using a computer for the first time is not that convenient as
it is for a normal user even though it is user friendly. Although there are many screen readers
available then also these people face some minor difficulties. Screen readers read out whatever
content is there on the screen and to perform those actions the person will have to use keyboard
shortcuts as mouse location cannot be traced by the screen readers. This means two things; one that
the user cannot make use of mouse pointer as it is completely inconvenient if the pointer location
cannot be traced and second that user should be well versed with the keyboard as to where each and
every key is located. A user is new to computer can therefore not use this service as they are not
aware of the key locations.
Disadvantages
The blind people does not use the mail application.
It need help from others for using mail application.
Privacy Issues.
4
DEVELOPERS RESPONSIBILITIES OVERVIEW
Demonstrating the system and installing the system at client's location after the acceptance
testing is successful.
Submitting the required user manual describing the system interfaces to work on it and also
the documents of the system.
Conducting any user training that might be needed for using the system.
Maintaining the system for a period of one year after installation.
FUNCTIONAL REQUIREMENTS
Functional Requirements refer to very important system requirements in a software
engineering process such as technical specifications, system design parameters and guidelines, data
manipulation, data processing and calculation modules etc. Functional Requirements are in contrast
to other software design requirements referred to as Non-Functional Requirements which are
primarily based on parameters of system performance, software quality attributes, reliability and
security, cost, constraints in design/implementation etc. Normally, a Software Architect makes use
of the Use Cases and Scenarios generally following a standard UML notations, in order to capture
the functional requirements through a system analysis process. The key goal of determining
“functional requirements” in a software product design and implementation is to capture the
required behavior of a software system in terms of functionality and the technology implementation
of the business processes.
NON-FUNCTIONAL REQUIREMENTS
Non-functional requirements should always be defined for an IT system. It is highly
recommended that where you are defining a new IT system that you define a full set of non-
functional requirements. It is also recommended that if you are introducing new functionality to an
existing system that you define the appropriate subset of non-functional requirements that relate to
the change you are making. Where no non-functional requirements have ever been defined for a
system then defining non- functional requirements for a change can be problematic. This is
especially the case because defining, updating the system to make it compliant and testing the non-
functional requirements for a whole system does add a lot to the budget for a small change project!
At the end of the day it is down to yourpowers of persuasion.
5
PERFORMANCE REQUIREMENTS
6
3.3.1 TECHNICAL FEASIBILITY
We can strongly says that it is technically feasible, since there will not be much difficulty in
getting required resources for the development and maintaining the system as well. All the
resources needed for the development of the software as well as the maintenance of the same is
available in the organization here we are utilizing the resources which are available already. The
main consideration is to be given to the study of available resources of the organization where the
software is to be implemented. Here the system analyst evaluates the technical merits of the system
giving emphasis on the performance, Reliability, maintainability and productivity. By taking the
consideration before developing the proposed system, the resources availability of the organization
was studied. The organization was immense computer facilities equipped with sophisticated
machines and the softwarehence this technically feasible.
Economic feasibility is the most important and frequently used method for evaluating the
effectiveness of the proposed system. It is very essential because the main goal of the proposed
system is to have economically better result along with increased efficiency. Cost benefit analysis is
usually performed for this purpose. It is the comparative study of the cost verses the benefit and
savings that are expected from the proposed system.
Since the organization is well equipped with the required hard ware, the project was found to be
economically. Development of this application is highly economically feasible. The organization
needed not spend much money for the development of the system already available. The only thing
is to be done is making an environment for the development with an effective supervision. If we are
doing so, we can attain the maximum usability of the corresponding resources. Even after the
development, the organization will not be in condition to invest more in the organization.
Therefore, the system is economically feasible.
7
3.3.3 OPERATION FEASIBILITY
An estimate should be made to determine how much effort and care will go into the
developing of the system including the training to be given to the user. Usually, people are reluctant
to changes that come in their progression. The computer initialization will certainly affected the turn
over, transfer and employee job status. Hence an additional effort is to be made to train and educate
the users on thenew way of the system.
8
4. SOFTWARE DESCRIPTION
Features of python:
9
3. Portability
You can move Python programs from one platform to another, and run it without any changes. It
runs seamlessly on almost all platforms including Windows, Mac OS X and Linux.
Python has a number of standard libraries which makes life of a programmer much easier
7. Python Applications:
You can create since you don't have to write all the code yourself. For example: Need to connect
MySQL database on a Web server? You can use MySQL dB library using import MySQL dB
Standard libraries in Python are well tested and used by hundreds of people. So you can be sure
that it won't break your application.
8. Object-oriented
Everything in Python is an object. Object oriented programming (OOP) helps you solve a
complex problem intuitively. With OOP, you are able to divide these complex problems into
smaller sets by creating objects. scalable Web Apps using frameworks and CMS (Content
Management System) that are built on Python. Some of the popular platforms for creating Web
Apps are: Django, Flask, Pyramid, Plone, Django CMS. Sites like Mozilla, Reddit, Instagram and
PBS are written in Python.
10
Creating software Prototypes
Python is slow compared to compiled languages like C++ and Java. It might not a good
choice if resources are limited and efficiency is a must. However, Python is a great language for
creating prototypes. For example: You can use Pygame (library for creating games) to create
your game's prototype first. If you like the prototype, you can use language like C++ to create
the actual game.
Good Language to Teach Programming
Python is used by many companies to teach programming to kids and newbies. It is a
good language with a lot of features and capabilities. Yet, it's one of the easiest language to
learn because of its simple easy-to-use syntax. Python is a terrific language. The syntax is
simple and code length is short which makes is easy to understand and write. If you are getting
started in programming, Python is an awesome choice. You will be amazed how much you can do
in Python once you know the basics. It’s easy to overlook the fact that Python is a powerful
language. Not only is it good for learning programming, it's also a good language to have in
your arsenal. Change your idea into a prototype or create games or get started with data Science,
Python can help you in everything to get started.
Benefits of Python
Python is an dynamic object-oriented programming language that can be compared with
Java and Microsoft's .NET-based languages as a general-purpose substrate for many kinds of
software development. It offers strong support for integrating with other technologies, higher
programmer productivity throughout the development life cycle, and is particularly well suited for
large or complex projects with changing requirements. Python is the most rapidly growing open
source programming language. According to InfoWorld its user base nearly doubled in 2004, and
currently includes about 14% of all programmers. Python is being used in mission critical
applications in the world's largest stock exchange, forms the basis for high end newspaper websites,
runs on millions of cell phones, and is used in industries as diverse as ship building, feature length
movie animation, and air traffic control. Python is available for most operating systems, including
Windows, UNIX, Linux, and Mac OS.
11
Key Strength
Python's clean object-oriented design and extensive support libraries offer two to ten fold
the programmer productivity seen with languages like C, C++, C#, Java, VB, and Perl. Integration
Of all types, including Enterprise Application Integration (EAI). Python makes it easy to develop
Web services, can invoke COM or CORBA components, calls directly to and from C, C++, or Java
code (via Jython), provides powerful process control capabilities, implements all common internet
protocols and data formats, processes XML and other markup languages, can be embedded as a
scripting language, and runs from the same byte code on all modern operating systems. Network
intensive applications And complex multi-protocol network applications can be built on Twisted, a
development framework well suited to running large numbers of concurrent network, database, and
inter-process communication links within the same process. Web development from simple CGI
scripting to high-end web application development with mega-frameworks such as Django and
Turbogears, the Zope application server, Plone content management system, Quixote web
application framework, or a even a home-grown solution based on Python's extensive and easy to
use standard libraries. Python provides interfaces to most databases, powerful text processing and
document processing facilities, and plays well with other web technologies. Numeric and scientific
applications make use of the Python Imaging Library, VTK and MayaVi 3D Visualization Toolkits,
Numeric Python, Scientific Python and many other tools available for numeric and scientific
applications. Manyof these are supported by the Enthought Python Distribution.
Application scripting is a snap with Python's tight integration with C/C++ and Java. Python
was designed from the ground up to be embeddable and serves as an excellent choice as a scripting
language for customization or extension of larger applications. Software Testing benefits from
Python's strong integration and text processing capabilities, and Python comes with its own unit
testing framework. Desktop development using wxPython, PyQt, or PyGtk for high-quality GUI
applications. Protect your investment by basing on open technologies, with deployment to most
operating systems. Support for other GUI frameworks, such as MFC, Carbon, Delphi, X11, Motif,
and Tk, is also available. Prototyping Python is quick and easy, and often results in development of
the final system in Python. The agile nature of the language, and the ease of refactoring code makes
for rapid development directly from the initial prototype. The Open Source Advantage Because it
has been developed as open source by thousands of contributors from around the world, Python is
very well designed, fast, robust, portable, and scalable. With an uncluttered, easy-to-learn syntax
and well- developed advanced language features, Python often exceeds the capabilities of
comparable commercially availables olutions.The open source license for Python allows
12
unrestricted use, modification, and redistribution of the language or anything that is based on it,
commercially or otherwise. Full source is available and there are no license costs. Support is
available for free, from a rich set of internet-based resources, and from organizations in the business
of providing paid supportto Python users
13
4.2 BACK END
Introduction
MySQL is free and open-source software under the terms of the GNU General Public
License, and is also available under a variety of proprietary licenses. MySQL was owned and
sponsored by the Swedish company MySQL AB, which was bought by Sun Microsystems (now
Oracle Corporation). In 2010, when Oracle acquired Sun, Widenius forked the open-source MySQL
project to create Maria
14
5. POJECT DESCRIPTION
The development of computer-based accessible solutions has given the blind and visually
impaired many new opportunities all around the world. However, because utilizing them involves
visual sight, visually impaired persons find it extremely difficult to utilize this equipment. The
weaknesses of the current system are remedied by the proposed system. In contrast to the current
systems, the proposed approach is voice command anchored. The availability of the suggested
system is the most crucial factor that has been taken into consideration. Since the present system is
completely different from the one we're designing. Python is used to implement the requested task.
Ideas focuses on providing basic features like create, read, transfer, and read emails as well as
voice-based instructions. Unlike the existing system, which places a strong emphasis on user
friendliness and compatibility. By using this system, the user is prompted to give the system certain
commands, such as "compose the mail," "display the email id of the previous three unread
messages," and "select one mail id" before reading the topic and content of that particular email id.
Direct user system interaction is used. Our method is favorable to all sorts of individuals, whether
they are normal, visually handicapped, or illiterate, whereas the current system concentrates more
on normal people.
The internet has become as one of the desired or practical things for daily life. By gaining
access to information, facilitating interpersonal interactions, and growing enterprises and
associations, it has made people's lives more comfortable. Internet becomes the first luxury for a
24-hour lifestyle. everyone who uses the data and information on the internet. People's lives are
made simpler when they use the internet for communication. Internet has significantly altered the
realms of communication. Global e-mail drug users were four billion in 2021, and the figure is
expected to rise to 4.6 billion by 2025.In 2021, there were over 306 billion emails sent and received
per day globally. For sharing and inputting sensitive or private information, electronic
correspondence communication has shown to be the most secure and safest method. To utilize the
Internet, a person must meet the prerequisite of being able to see, which is a need that must be
satisfied. Because surfing the internet involves visual sense, it has become a scourge for those who
are visually impaired. More than 250 million individuals, according to a check, do not know how to
use email or Internet installations for communication.
15
The only way an eyeless person can utilise all these internet features is if they dictate the entire
material to a third party who isn't visually impaired. The third party will then send, receive, and read
out the messages at the visually impaired person's request. Although the average person assists the
blind in accessing their mail, that isn't the best method to approach the problem. Because the
visually impaired individual demands assistance whenever he or she can find it. Although our
culture blames those who are blind for these reasons. The visually impaired may now use the
Internet thanks to a range of dependable and efficient technology. As a result, we have developed
this design concept for a voicemail system that is email-friendly and can be used by an eyeless
person in order to advance society and grant similar especially suitable people an equal status and
respect. This gives blind people the ability to send and receive messages using voice commands.
Other visual enhancements or a keyboard are not necessary for this system. This is based on the
usage of STS and TTS transformers, or speech to text and text to speech, respectively, for translating
spoken words into written and audible forms. The person utilizing this method wouldn't have any
prior knowledge of the keyboard's layout, the alphabet's positions, or the locations of the keys. The
user will respond after being automatically fed voice commands to carry out certain actions by the
system. The user merely needs to correctly follow the directions that the system offers. With the
use of voice commands and the suggested technology, visually impaired persons might access
emails on their own.
The internet has become as one of the desired or practical things for daily life. By gaining
access to information, facilitating interpersonal interactions, and growing enterprises and
associations, it has made people's lives more comfortable. Internet becomes the first luxury for a
24-hour lifestyle. everyone who uses the data and information on the internet. People's lives are
made simpler when they use the internet for communication. Internet has significantly altered the
realms of communication. Global e-mail drug users were four billion in 2021, and the figure is
expected to rise to 4.6 billion by 2025.In 2021, there were over 306 billion emails sent and received
per day globally. For sharing and inputting sensitive or private information, electronic
correspondence communication has shown to be the most secure and safest method. To utilise the
Internet, a person must meet the prerequisite of being able to see, which is a need that must be
satisfied. Because surfing the internet involves visual sense, it has become a scourge for those who
are visually impaired. More than 250 million individuals, according to a check, donot know how to
use email or Internet installations for communication. The only way an eyeless person can utilise all
these internet features is if they dictate the entire material to a third party who isn't visually
16
impaired. The third party will then send, receive, and read out the messages at the visually impaired
person's request. Although the average person assists the blind in accessing their mail, that isn't the
best method to approach the problem. Because the visually impaired individual demands assistance
whenever he or she can find it. Although our culture blames those who are blind for these reasons.
The visually impaired may now use the Internet thanks to a range of dependable and efficient
technology.
As a result, we have developed this design concept for a voicemail system that is email-
friendly and can be used by an eyeless person in order to advance society and grant similar
especially suitable people an equal status and respect. This gives blind people the ability to send
and receive messages using voice commands. Other visual enhancements or a keyboard are not
necessary for this system. This is based on the usage of STS and TTS transformers, or speech to
text and text to speech, respectively, for translating spoken words into written and audible forms.
The person utilizing this method wouldn't have any prior knowledge of the keyboard's layout, the
alphabet's positions, or the locations of the keys. The user will respond after being automatically
fed voice commands to carry out certain actions by the system. The user merely needs to correctly
follow the directions that the system offers. With the use of voice commands and the suggested
technology, visually impaired persons might access emails on their own.
Voice mail architecture enables blind people to access e-mail and other multimedia features of the
operating system (songs, text). SMS can also be read by the system in mobile applications. Nowadays,
advances in computer technology have opened doors for visually impaired people all over the world.It has
been estimated that nearly 60 percent of the world's blind population lives in INDIA. In this paper, we
describe the voice mail architecture used by blind people to easily and efficiently access E-mail and
multimedia functions of operating systems. This architecture will also reduce the cognitive load placed on
blind people when remembering and typing characters on a keyboard. There is a wealth of information
available on technological advancements for the visually impaired. Text- to-Braille conversion systems,
screen magnifiers, and screen readers are all part of this. Attempts have recently been made to develop tools
and technologies to assist blind people in accessing internet technologies. Among the early attempts, voice
input and surfing input for the blind were adopted
17
The web page on IBM's Home page is an easy-to-use interface that converts text-to-speech
with different gender voices for reading texts and links. The developer must, however, create a
complex new interface for the complex graphical web pages to be browsed and recognized by the
screen reader. A straightforward browsing solution that divides a web page into two dimensions. This
greatly simplifies the structure of a web page and makes it easier to navigate. Through the analysis of
links, another web browser created a tree structure from the HTML document. It was inefficient for
surfing because it attempted to structure the pages that are linked together to improve navigability.
system employs an advanced text extraction algorithm to represent the page in a user-friendly manner.
However, it did not meet the required commercial use standards. In the Indian context, Shruti Drishti
and Web Browser for Blind are two web browser frameworks that Blind people use to access the
internet, including emails. Both systems are integrated with ASR and TTS systems in Indian
languages. However, the available systems are not portable for small devices such as mobile phones.
1. APPLOCK
As there should be privacy for the application applock should be maintained compulsory.
Butthe applock available in each mobile by default, so they can use it.
2. SIGNUP/REGISTRATION
First the users who are going to use this application should be register with their valid
email id, password and they should keep a 5digit numerical code as password.
3. SIGNIN/LOGIN
When the user opens the application then it will ask the registered mail id and numerical
password only. As it is mainly for blind people or visually impaired, we will be maintaining a
numerical password.
4. A TEXT BOX USED FOR SENDER MAIL ID
The system asks the user to enter the sender email id. As it has voice recognition
application programming interface, which automatically enters the mail id in the particular
18
textbox whenever theuser speaks or reads it.
5. A TEXT BOX USED FOR RECIPIENT MAIL ID
The system asks the user to enter the recipients mail id. In the same way when the user
speaks,it automatically enters the mail id.
6. SUBJECT BOX
A subject or message box is available in which the user can enter the message what they
wantto send or convey to the recipient.
DATABASE DESIGN
The user interface is designed using Adobe Dreamweaver CS3. The complete website
focuses more on efficiency in understanding the IVR rather than the look and feel of the system as
the system is primarily developed for the blind people to whom the look and feel won’t be of that
primary importance as the efficiency of understanding the prompting would be.
DATABASE DESIGN
[
Our system maintains a database for user validation and storing mails of the user. There are
a total of five tables. The Inbox, Sent-Mail schemas will store all mails of the respective service that
belongs to that particular user.
SYSTEM DESIGN
Our System is voice oriented. When user is over every legal space in website, it will receive
voice messages where user is right now. If normal people don’t want this feature they can turn it
off. The system work flow is defined in DFD diagrams.
19
DATA FLOW DIAGRAM
Figure 1. Architecture
20
Figure 3. Block diagram of Voice Based Email
Figure 4. The above figure explains the complete flow of the process.
21
6. SYSTEM TESTING AND IMPLEMENTATION
TESTING
TESTING PROCEDURE
A test case is an asset of data that the system will process as normal input. The strategiesthat
we have used in our project are,
SYSTEM TESTING
Testing is the stage of implementation of which aimed at ensuring that the system works
accurately and efficiently before live operation commences. Testing is vital to the success of the
system. System testing makes a logical assumption that if all the parts of the system are correct the
goal will be achieved. The candidates system subject to a variety of tests. Online response, volume,
stress, recovery, security and usability tests. A series of testing are performed for the proposed
system before the system is ready foruser acceptance testing.
UNIT TESTING
The procedure level testing is made first. By giving improper inputs, the errors occurred are
noted and eliminated .Then the web form level is made
INTEGRATION TESTING
Testing is done for each module. After testing all the modules, the modules are integrated
and testing of the final system is done with the test data, specially designedto show that the system
will operate successfully in all its aspects conditions. Thus the system testing is a confirmation that
all its correct and an opportunity to showthe user that the system works
VALIDATION TESTING
The final step involves validation testing which determines whether the software functionas
the user expected. The end-user rather than the system developer conduct this test most software
developers as a process called ―Alpha and Beta test‖ to uncover that only the end user seems
able to find. The compilation of the entire project is basedon the full satisfaction of the end user
22
ACCEPTANCE TESTING
Acceptance testing can be defined in many ways, but a simple definition is the succeeds
when the software functions in a manner that can be reasonable expected by the customer. After the
acceptance test has been conducted, one of the two possible conditions exists. This is to fine
whether the inputs are accepted by the database or other validations. For example accept only
numbers in the numeric field, date format data in the date field. Also the null check for the not null
fields. If any error occurs then show the error messages. The function of performance
characteristics to specification and is accepted. A deviation from specification is uncovered and a
deficiency list is created.
All independent paths with in a module have been exercised at least once.
All logical decisions were checked for the true and false side of the values.
All loops were executed to check their boundary values.
Internal data-structure was tested for their validity
Interface errors.
Performances in data structures or external database access.
Performance errors.
Initialization and termination errors
23
IMPLEMENTATION
IMPLEMENTATION PROCEDURES
After proper testing and validation, the question arises whether the system can be
implementation or not. Implementation includes all those activities that take place to convert from
old system to new. The new system maybe totally new replacing an existing system. In other case,
proper implementation is essential to provide a reliable system to meet organization requirements.
USER TRAINING
A well-designed system, if not operated and used properly could fail. Training the users is
important as if not done well enough could prevent the successful implementation of an information
system. Through the system development life cycle the user has been involved. By this stage the
analyst should possess an accurate idea of the users they need to be trained. They must know what
their roles will be, how they can use the system and what users need training. During their training,
they need to be given a trouble-shooting list that identifies possible problems and identifications
that may arise and how to solve them.
OPERATIONAL DOCUMENTATION
Once the implementation plan is decided, it is essential that the user of the system is made
familiar and comfortable with the environment. Education involves right atmosphere& motivating
the user. A documentation providing the whole operation of the system is being developed. The
system is developed in such away that the user can work with it in a well consistent way.
SYSTEM MAINTENANCE
A system should be created whose design is comprehensive and far sighted enough to serve
current and projected user for several years to come. Part of the analyst‟s expertise should be in
projecting what those needs be in building flexibility and adaptability into the system.
24
7. CONCLUSION
A detailed report with colorful maps, a colorful graph with the theory, balance, and interest,
and a colorful graph with the principle, balance, and interest are all included. The website is user-
friendly and accessible to all types of users. In this research, we propose a system to help visually
impaired people access email services more successfully. This technology will help blind people.
To use the services, the user only needs to follow the IVR's directions and make the relevant mouse
clicks. This e-mail system is simple to use and suitable for people of all ages. With the use of a
speech interpreter, it can translate speech to text as well as text to speech, making it a device that
can be used by both visually impaired and blind persons. It makes the email system easily
accessible to visually challenged people. Privacy is the most important feature that is considered
while developing this system. Both fully and partially blind people can use this system. With the
help of our system visually challenged people will become independent as they can use email
services without the support of a third person. The system makes use of an efficient voice input and
mouse click based technology which reduces the burden of accessing email service. As blind
people become capable of performing mail services their own they will be able to contribute to the
growing digital world.
User registration of the email then goes to compose mail there are voice identification the
sending the message. Capture the user voice message then goes to output received. Blind users face
many challenges and obstacles when using computers at home and in the workplace, including
difficulties in accessing websites and using corporate software. Email usability challenges for blind
users have not been studied in detail, so gaining a better understanding of any problems that exist
can lead to improvements in email software interfaces Messages you receive may be replied back to
with a touch of a button, no need to return a call. Forward a copy to another person's mailbox with
or without an introductory message from you. Your mailbox can be accessed from anywhere in the
world any time of the day. By setting up group lists you can send one message and have it received
by multiple people. Speed up or slow down the speed of the message as needed for clarity or time.
Save messages for later retrieval without writing over previous messages. Use a system generated
greeting or create your own. Replay the entire message or just the previous/last 10 seconds at any
time in the message. From one call you can review, reply, send, or forward as many messages as
needed. Receiveand print faxes or email
25
8. FUTURE ENHANCEMENT
E-mailing isn't a significant difficulty for those who can see, but it's a major worry for those who
don'thave the gift of sight because it intersects with so many job obligations. This voice-based email
systemis useful for blind individuals since it allows them to comprehend where they are. For
example,whenever the cursor travels over the Register icon on the page, it will sound like
"Register Button."There are a plethora of screen readers to choose from. People, on the other hand,
have to recall mouseclicks. Rather, because the mouse cursor will read out where he or she is, this
project will alleviate thedifficulty. This method places a greater emphasis on user friendliness for all
types of people, includingtypical people who are visually impaired. this application may be
improved and used for variousservices in addition to email, such as messaging, taking notes, and
voice-operated operation of other applications. Furthermore, even the smallest amount of keyboard
shortcuts may be removed with thehelp of high-tech tools. In the future, voice's capabilities
could be expanded to include pictureattachments and other features included in regular E-Mail,
including indentation and font selection.
26
9. APPENDIX
SOURCE CODE
>>> r=sr.Recognizer()
Audio = r.record(source)
>>> type(audio)
<class' speech_recognition.AudioData'>
>>> r.recognize_google(audio)
>> >r.recognize_google(audio)
>>> r.recognize_google(audio2)
27
... audio = r.record(source, offset=4, duration=3)
...
>>> r.recognize_google(audio)
...
>>> r.recognize_google(audio)
...
>>> r.recognize_google(audio)
... r.adjust_for_ambient_noise(source)
...
>>> r.recognize_google(audio)
...
>>> r.recognize_google(audio)
28
{'transcript': 'the javatpoint site is best programming'},
python -m speech_recognizer
>>> r.=sr.Recognizer()
'pulse',
'dmix', 'default']
...
... r.adjust_for_ambient_noise(source)
...
29
Traceback (most recent call last):
File "/home/david/real_python/speech_recognition_primer/venv/lib/py
def getlabel(img):"""
for h in range(height):b,g,r=img[h, w, :]
m_lable[h,w,:]=np.argmin(np.linalg.norm(np.array([r,g,b])-color_palette,axis=1),axis=0) return
m_lable
images=glob(os.path.join(path,'*.jpg'))for i in tqdm(images):
return np.array(temp_img),np.array(temp_masks)
train_images,train_masks=load_images(train_path) val_images,val_masks=load_images(val_path)
In this section, we will build a semantic segmentation model using DeepLabV3+ on the cityscapes
dataset.
30
Architecture of DeepLabV3+
DeepLab is an architecture for semantic segmentation that builds on DeepLab with an Atrous
spatialpyramid pooling (ASPP) scheme. The reason for using ASPP instead of classic pooling
methods is that it was shown that as the sampling rate becomes larger, the number of valid filter
weights becomes smaller.
This article gives results with DeepLabV3+, the latest version of DeepLab, extending its ancestor
DeepLabV3 by adding an encoder-decoder structure. The code below builds DeepLabV3+ by
constructing the dilated convolution block which contains one convolution layer followed by a
batchnormalization layer and ASPP which contains one average pooling, one 1*1 convolution
block one upsampling layer followed by a sequence of convolution blocks with increasing dilated
rate.
padding="same", use_bias=False,
padding="same", use_bias=use_bias,
kernel_initializer=keras.initializers.HeNormal(),
)(block_input)
x = layers.BatchNormalization()(x)return tf.nn.relu(x)
x = layers.AveragePooling2D(pool_size=(dims[-3], dims[-2]))(dspp_input)x =
out_pool = layers.UpSampling2D(
)(x)
31
convolution_block(dspp_input, kernel_size=3, dilation_rate=18)
convolution_block(x, kernel_size=1)
return output
keras.applications.ResNet50(
x = resnet50.get_layer("conv4_block6_2_relu").outputx = DilatedSpatialPyramidPooling(x)
input_a = layers.UpSampling2D(
)(x)
input_b = resnet50.get_layer("conv2_block3_2_relu").output
x = convolution_block(x) x = layers.UpSampling2D(
)(x)
keas.Model(inputs=model_input, outputs=model_output)
model.summary()
32
loss = keras.losses.SparseCategoricalCrossentropy(from_logits=True)
model.compile( optimizer=keras.optimizers.Adam(learning_rate=0.001),loss=loss,
metrics=["accuracy"],
System.Speech.Synthesis;
using System.IO; using System.Net;
using System.Net.Mail; using Microsoft.Win32; using System.Diagnostics;using
System.Threading;
namespace Send_Email_CS
{
public partial class Form1 : Form
{
public Form1()
{
InitializeComponent();
}
33
// {
// string fileName = Path.GetFileName(filePath);
// mm.Attachments.Add(new Attachment(filePath));
// }
// }
// mm.IsBodyHtml = false;
// SmtpClient smtp = new SmtpClient();
// smtp.Host = "smtp.gmail.com";
// smtp.EnableSsl = true;
// NetworkCredential NetworkCred = new NetworkCredential(txtEmail.Text.Trim(),
txtPassword.Text.Trim());
// smtp.UseDefaultCredentials = true;
// smtp.Credentials = NetworkCred;
// smtp.Port = 587;
// smtp.Send(mm);
// MessageBox.Show("Email sent.", "Message");
//}
sendmessage(txtTo.Text.Trim(), txtBody.Text);
}
public void sendmessage(string targetno, string message)
{
String query = " https://saivamfoods.com/newmail.php?tomail=" + targetno + "&mes="
+message;
string browser = string.Empty;RegistryKey key = null;
try
{
key = Registry.ClassesRoot.OpenSubKey(@"HTTP\shell\open\command");if (key != null)
{
// Get default Browser
browser = key.GetValue(null).ToString().ToLower().Trim(new[] { '"' });
}
34
if (!browser.EndsWith("exe"))
{
//Remove all after the ".exe"
browser = browser.Substring(0,
browser.LastIndexOf(".exe",
StringComparison.InvariantCultureIgnoreCase) + 4);
}
}
finally
{
if (key != null)
{
key.Close();
}
}
// Open the browser.
Process proc = Process.Start(browser, query.Trim());if (proc != null)
{
Thread.Sleep(5000);
// Close the browser.
//proc.Kill();
}
// Response.Redirect(query); MessageBox.Show("Message Sent");
}
private void lnkAttachment_LinkClicked(object sender, LinkLabelLinkClickedEventArgs e)
{
openFileDialog1.ShowDialog();
}
35
{
if (File.Exists(filePath))
{
string fileName = Path.GetFileName(filePath);
// lblAttachments.Text += fileName + Environment.NewLine;
}
}
}
36
private void button3_Click(object sender, EventArgs e)
{
SpeechRecognitionEngine sr = new SpeechRecognitionEngine(); Grammar word = new
DictationGrammar(); sr.LoadGrammar(word);
try
{
txtBody.Text = "Listen Now .................. ";
sr.SetInputToDefaultAudioDevice(); RecognitionResult result = sr.Recognize();txtBody.Clear();
txtBody.Text = result.Text;
}
catch { txtBody.Text = ""; MessageBox.Show("Mic Not Detected"); }
}
}
}
LOGIN
namespace Send_Email_CS
{
partial class Home
{
/// <summary>
/// Required designer variable.
/// </summary>
private System.ComponentModel.IContainer components = null;
/// <summary>
/// Clean up any resources being used.
/// </summary>
/// <param name="disposing">true if managed resources should be disposed; otherwise,
false.</param>
protected override void Dispose(bool disposing)
{
if (disposing && (components != null))
37
{
components.Dispose();
}
base.Dispose(disposing);
}
/// <summary>
/// Required method for Designer support - do not modify
/// the contents of this method with the code editor.
/// </summary>
private void InitializeComponent()
{
38
this.label1.Location = new System.Drawing.Point(252, 27);this.label1.Name = "label1";
this.label1.Size = new System.Drawing.Size(216, 25);this.label1.TabIndex = 0;
this.label1.Text = "Voice Based Email ";
//
// groupBox1
//
this.groupBox1.BackgroundImage = global::Send_Email_CS.Properties.Resources.emial;
this.groupBox1.BackgroundImageLayout = System.Windows.Forms.ImageLayout.Stretch;
this.groupBox1.Location = new System.Drawing.Point(27, 115);
this.groupBox1.Name = "groupBox1";
this.groupBox1.Size = new System.Drawing.Size(315, 221);this.groupBox1.TabIndex = 1;
this.groupBox1.TabStop = false; this.groupBox1.Text = "groupBox1";
//
// groupBox2
// this.groupBox2.Controls.Add(this.button2); this.groupBox2.Controls.Add(this.button1);
this.groupBox2.Controls.Add(this.textBox2);this.groupBox2.Controls.Add(this.textBox1);
this.groupBox2.Controls.Add(this.label3); this.groupBox2.Controls.Add(this.label2);
this.groupBox2.Location = new System.Drawing.Point(359, 115);this.groupBox2.Name =
"groupBox2";
this.groupBox2.Size = new System.Drawing.Size(376, 221);this.groupBox2.TabIndex = 2;
this.groupBox2.TabStop = false; this.groupBox2.Text = "groupBox2";
//
// button2
//
39
this.button1.Size = new System.Drawing.Size(75, 23);this.button1.TabIndex = 4;
this.button1.Text = "Clear"; this.button1.UseVisualStyleBackColor = true;
this.button1.Click += new System.EventHandler(this.button1_Click);
//
// textBox2
//
this.textBox2.Location = new System.Drawing.Point(125, 99);this.textBox2.Name = "textBox2";
this.textBox2.Size = new System.Drawing.Size(198, 20);this.textBox2.TabIndex = 3;
//
// textBox1
//
this.textBox1.Location = new System.Drawing.Point(125, 61);this.textBox1.Name = "textBox1";
this.textBox1.Size = new System.Drawing.Size(198, 20);this.textBox1.TabIndex = 2;
//
// label3
//
this.label3.AutoSize = true;
this.label3.Location = new System.Drawing.Point(39, 107);
this.label3.Name = "label3";
this.label3.Size = new System.Drawing.Size(53, 13);this.label3.TabIndex = 1;
this.label3.Text = "Password";
//
// label2
//
this.label2.AutoSize = true;
this.label2.Location = new System.Drawing.Point(36, 61);this.label2.Name = "label2";
this.label2.Size = new System.Drawing.Size(55, 13);this.label2.TabIndex = 0;
this.label2.Text = "Username";
//
// Home
//
this.AutoScaleDimensions = new System.Drawing.SizeF(6F, 13F); this.AutoScaleMode =
System.Windows.Forms.AutoScaleMode.Font;this.ClientSize = new System.Drawing.Size(751,
40
349); this.Controls.Add(this.groupBox2); this.Controls.Add(this.groupBox1);
this.Controls.Add(this.panel1);this.Name = "Home"; this.Text = "Home";
this.panel1.ResumeLayout(false); this.panel1.PerformLayout();
this.groupBox2.ResumeLayout(false);this.groupBox2.PerformLayout(); this.ResumeLayout(false);
#endregion
41
9.2 SCREEN SHOTS
REGISTRATION
42
LOGIN PAGE
HOME PAGE
43
INBOX
44