You are on page 1of 41

Table of Contents

Abstract............................................................................................................................................6

Chapter 1..........................................................................................................................................6

1. Introduction..............................................................................................................................6

1.1 Overview...........................................................................................................................6

1.2 Statement of Problem........................................................................................................6

1.3 The objective of this venture:............................................................................................7

1.4 Purpose of the Project.......................................................................................................7

1.5 Applications of the research..............................................................................................7

1.6 Theoreticl Bases and Organizations..................................................................................7

1.7 Summary...........................................................................................................................7

Chapter 2..........................................................................................................................................8

2. LITERATURE REVIEW........................................................................................................8

2.1 Related Technologies........................................................................................................8

 Related technology 1.........................................................................................................8

 Related technology 2.........................................................................................................8

2.2 Related projects.................................................................................................................8

2.3 Related studies..................................................................................................................9

Voice Search............................................................................................................................9

Speech to text...........................................................................................................................9

Voice commands for smarthome widgets................................................................................9

Academic.................................................................................................................................9

Voice biometrics for safety..........................................................................................................9

2.4 Their limitations and bottlenecks....................................................................................10


Accents and Speech Recognition...........................................................................................10

Background Noise Disturbance.............................................................................................10

Physical Side Effects.............................................................................................................10

Chapter 3........................................................................................................................................10

3. Tool and Techniques..............................................................................................................10

3.1 Hardware used with technical specifications..................................................................10

3.2 Software used with technical specifications...................................................................10

Operating system:..................................................................................................................10

Web connection:....................................................................................................................11

Software:................................................................................................................................11

IDE:........................................................................................................................................11

3.2.1 Python Programming Language..................................................................................11

Software Quality:.......................................................................................................................11

Uses for developers:..................................................................................................................12

Portability Programs:.............................................................................................................12

Library support:.........................................................................................................................12

Component Integration:.............................................................................................................12

3.2.2 NumPy.........................................................................................................................12

3.2.3 PyAudio.......................................................................................................................13

3.2.4 TensorFlow..................................................................................................................13

3.2.5 Keras............................................................................................................................13

Chapter 4........................................................................................................................................13

4. Methodologies.......................................................................................................................13

4.1 Design of the investigation/Algorithms/ Hardware........................................................13

4.2 Analysis procedures........................................................................................................14


4.3 Implementation procedure..............................................................................................15

4.3.1 Hardware Details.........................................................................................................15

4.3.2 Software Details..........................................................................................................15

4.3.3 Use Case Diagrams.....................................................................................................16

Use case Voice Recognition..................................................................................................18

4.4 Verification of functionalities.........................................................................................19

4.5 Details about simulation / mathematical modeling.........................................................19

Chapter 5........................................................................................................................................19

5 System Testing.......................................................................................................................19

5.1 Objective Testing............................................................................................................19

5.2 Usability Testing.............................................................................................................19

 Easy to introduce.............................................................................................................19

 Easy to renew..................................................................................................................19

 Live events provided by IBM.........................................................................................20

 Instinctively.....................................................................................................................20

 Productive.......................................................................................................................20

 Beautiful GUI and easy to browse..................................................................................20

 Easy to remove................................................................................................................20

 No obstacle to external programming.............................................................................21

 Easy to investigate..........................................................................................................21

 Stick to the guidelines.....................................................................................................21

 Strong Maintenance Error...............................................................................................21

5.3 Software performance testing.........................................................................................21

5.4 Compatibility Test...........................................................................................................22


5.5 Load Testing...................................................................................................................22

 Complete their system.....................................................................................................22

 Energetic Properties........................................................................................................22

 Press the light..................................................................................................................22

 Evaluation of the client...................................................................................................22

 Maximum case Maximum..............................................................................................22

 Do the story.....................................................................................................................22

 Observing the Situation...................................................................................................22

 Dissecting Test Results...................................................................................................22

5.6 Security testing................................................................................................................23

5.7 Installation Test...............................................................................................................23

5.8 Test Cases.......................................................................................................................23

Chapter 6........................................................................................................................................24

6 Result and Findings...............................................................................................................24

6.1 Presentation of the Findings............................................................................................24

6.1.1 Hardware Results........................................................................................................24

Hardware Verification...........................................................................................................24

Test hardware.........................................................................................................................24

Hardware maintenance..........................................................................................................24

6.1.2 Software Results..........................................................................................................25

Software check.......................................................................................................................25

Testing software.....................................................................................................................25

Software Support...................................................................................................................25

6.2 Discussion of the Findings..............................................................................................26


6.2.1 Comparison with Initial Findings................................................................................26

6.2.2 Reasons for Shortcomings...........................................................................................26

6.3 Limitations......................................................................................................................26

6.4 Recommendation............................................................................................................26

6.5 Conclusion......................................................................................................................27

Chapter 7........................................................................................................................................27

7 Future Work...........................................................................................................................27
Table of Figures
Figure 1: design of hardware.............................................................................................16
Figure 2: analysisi procedure.............................................................................................17
Figure 3:implementation procedure...................................................................................20
Figure 4:use case diagram 1..............................................................................................23
Figure 5: use case of voice recognition.............................................................................24
Figure 6:UML Diagram.....................................................................................................25
Figure 7:Main Interface of the Calculator.........................................................................26
Figure 8:about....................................................................................................................26
Figure 9:classes in AI calculator........................................................................................27
Abstract
Minicomputer AI is an autonomous system consisting of manual and speech recognition
used to perform basic mathematical operations. It recognizes spoken or arranged long
distance numbers from 0 to 9, and other words such as plus, minus, times, equivalent and
clear. It then performs the respective math operations and displays the final answer on the
GUI display.

Chapter 1

1. Introduction
This project is a software project, "AI voice recognition calculator", to calculate human
speech recognition to calculate numbers. Number recognition by speech is the
mechanism or electronic translation of human voice to machine-edited material.

AI numerical processors and speech recognition have a very high chance of being
required in the future work environment. Such a system will have the opportunity to
further develop usability and become more profitable to use.

The possibility of an AI calculator that sees the voice without time preparation is
promising associated with the systems used today and can be very well marketed.

At the most basic level, speech recognition allows users to perform parallel tasks (eg
busy hands and eyes elsewhere) while constantly interacting with a computer or machine.
Another feature of this kit is that it helps people with hand disabilities.

1.1Overview
The Voice Recognition Calculator aims to further simplify the creation of individuals by
using their voices as information. The existing products do not meet the needs of people
with disabilities, they are hands-free and neat compared to this product. It will be easy to
understand and the system can be adapted to technological improvements.[ CITATION
Che18 \l 1033 ]
1.2Statement of Problem
 On a regular plugin, we can only consider juggling numbers by contributing via a
console or button, which is a time consuming process.This is the limit of normal
calculators.
 Our AI calculator has a solution to this problem.
 The solution is that we use the human voice as a contribution identified by the Ai
calculator and perform the mathematical operations.

1.3The objective of this venture:


The goal of this effort is to identify human voices through the use of neural networks. We
need to build the right neural organization and train it the right way.

Digital programs should have the ability to delete one by one and map objective results
for preliminary purposes. After registered voice recognition processing, a preliminary
data set must be used to prepare a "classified engine" for identification purposes.

He will then see the information and perform arithmetic on it and then display the result
on the screen. The program code must be written in PyCharm and supported by the use of
a Graphical User Interface (GUI).[ CITATION Yas20 \l 1033 ]

This is a Windows application that will be built on a free base platform and therefore will
be portable. Planned to further simplify individuals by using their voice as information.
The system interprets the information and identifies operators and operas. Then calculate
the result and show it to the user. It will be easy to understand and the system can be
adapted to technological progress.

1.4Purpose of the Project


To whom?

People with disabilities (hearing, visual and developmental disabilities) and general
individuals to facilitate their work.

Why make this product?


Existing products do not meet the needs of people with disabilities, they are hands free
and boring compared to these products.

1.5 Applications of the research


 The idea is to design productive algorithms that contribute to the shape of the
human voice.
 After the information predicts or differentiates the numerical base of the Machine
Learning algorithm.
 Upon detection, it will perform a number juggling operation.
 The last step produces estimation results.

1.6Theoretical Bases and Organizations


1.7 Summary

In this chapter we have discussed what is the actual problem that we are solving by our
project it makes the use of calculator easy and time saving by voice.

Chapter 2

2. LITERATURE REVIEW
Speech recognition, on the other hand, is software recognition software is a computer or
gadget device that can interpret human voices. Speech recognition is most commonly
used to operate a device, execute commands, or write without pressing a console, mouse,
or button. Currently, this is done on a computer with an ASR (programmed speech
recognition) software program. Many ASR programs require users to "train" the ASR
program to understand their voice so that they can convert speech into more accurate
messages. For example, you can say "open the internet" and the computer opens an
internet browser.[ CITATION Gha12 \l 1033 ]

The first ASR device was used in 1952, and it discovered certain tunes that the user had
spoken (not on a computer). Medical services, the military (e.g., F-16 fighter jets),
telecommunications, and private registration are all areas that use ASR programmes
today (i.e. no manual processing).

What is needed for speech recognition?

A computer with a sound card and a receiver or headset are required for speech
recognition to work. Also, the software you're using may require voice recognition
capability, or vice versa; if you need speech recognition everywhere, you'll need to install
an application like Nuance Naturally Speaking.

You can also utilise the inbuilt Windows Speech Recognition application if you're using
Microsoft Windows Vista, 7, 8, or 10..

2.1Related Technologies
Examples where you might use speech recognition

As speech recognition improves, it is being used in more places and you may have used it
effectively. The following are examples of where you can get speech recognition.

 Related technology 1
Google Voice - Google Voice is a service that allows you to search and ask questions
on your PC, tablet and phone.

 Related technology 2
Bluetooth car - For cars with a Bluetooth phone agreement or hands-free, you can use
voice recognition to give commands, such as “call your other half” to make decisions
without taking your eyes off the road

2.2Related projects
Digital Assistant - Speech recognition is used by Amazon Echo, Apple Siri, and Google
Assistant to connect with an automated assistant that answers inquiries..
2.3Related studies
Voice Search
This is the most well-known use of speech recognition. In 2019, the meter reported that
112 million people in the US would use the right-wing vote month-over-month, up 10%
from a year ago. Another survey also found that about 7 in 10 shoppers (71%) like to use
voice search to answer questions about traditional writing techniques. Because of the
usage, such as Siri and Google Voice Search, mostly the voice interface was used.

Speech to text
Speech recognition enables hands-free calculation. Customers don't have to type multiple
messages, reports, and archives.

 You can use these features for creating speech and voice commands in Google
Docs, for example, if you use the Google Chrome program.
 Automatic text with speech recognition (YouTube)
 Automatic expression

Voice commands for smarthome widgets


Smart home apps usually involve taking certain steps after the customer gives a voice
command. Great home gadgets are widely used as speech recognition applications,
especially considering:

 the total number of smart widgets supported by voice partners has increased
significantly somewhere in the 2018 and 2019 series
 30% of right-handed customers cite the voice of smart home gadgets as a major
reason for adding resources to Amazon Echo or Google Home.

Academic
80% of children's learning on Earth comes from their vision and is an important incentive
to explore the environment around them. Speech recognition can reduce barriers for
visually impaired or partially sighted students.
There are also language learning tools, such as Duolingo, that use speech recognition to
assess the client's language pronunciation. Expression assessment is a sensible computer
that aids in language learning.[ CITATION Gup14 \l 1033 ]

Voice biometrics for safety


Voice biometrics uses a human voice as a unique natural feature to confirm it. Speech
recognition can also be used for voice prompts to replace actions that require the client to
present their own information to validate themselves.

Speech biometrics improves the overall customer experience as it eliminates customer


disappointment from slow login steps and lost or stolen accreditation.

2.4Their limitations and bottlenecks


Accents and Speech Recognition
Speech recognition frames can cause speech problems. While some people may find a
way to discourage your speech over time, you need to find a way to speak consistently
and consistently to limit errors. If you mumble, talk too fast or talk to each other, the
product usually won't fit. Speech projects can be difficult to see as normal when your
voice changes, such as with a cold, hacking, sinus or throat problems.[ CITATION
YiJay \l 1033 ]

Background Noise Disturbance


To get the most out of speech recognition programs, you need a calm climate. The
framework will not work properly if there is a lot of background noise. They are more
likely to be unable to distinguish between your speech, the other person speaking, and the
surrounding noise, leading to notes and errors. This can be a problem if you work in a
busy office or happy environment. Wearing a compact amplifier or noise-cancelling
headphones can help move the frame around your speech.

Physical Side Effects


Frequent use of speech recognition technology can cause physical discomfort and voice
problems. Talking for a long time can cause dry mouth, dry mouth, muscle weakness,
brief loss of voice and vocal tension. The way you normally don't speak can make this
worse and you may need to find a way to control your voice if you start using the
program regularly.

Chapter 3

3. Tool and Techniques


3.1Hardware used with technical specifications

Component Minimum Recommended


CPU 1.6 GHz 2.53GHz
RAM 2 GB 4gb
Microphone Mic High quality microphones
Sound card Sound card Sound cards with
exceptionally clear signals

3.2Software used with technical specifications


Operating system:
Windows:

Windows 7 – Windows 10

MacOS:

Macintosh OS X 10.9 (Mavericks) - macOS Big Sur (11)

Web connection:
1 Mbps or higher

Software:
Python 3.6 version or above
IDE:
PyCharm

3.2.1 Python Programming Language


Python is a handy open source computer programming language. It promotes software
quality, designer efficiency, program integration and part combinations. Python employs
at least hundreds of thousands of developers around the world in areas such as web
scripting, programming systems, user interfaces, item customization, numerical
programming, and much more. It is widely regarded as one of the four or five most
widely used programming languages on Earth. As a well-known language that aims to
reduce repair times, Python comes in a wide variety of products and roles. Google, 49
YouTube, the light and charm of the industry, esri, the torrent document sharing system,
NASA's streaming drive lab, web game night and the public weather service are
considered a tangible part of today's user base . Python's areas of application range from
systems administration, website development, telephone scripts, and schools to
equipment testing, investment analysis, computer games, and spacecraft control. Apart
from that, python has a very simple, visible and decent syntax; coordination with external
components coded in other languages; multiparadigm design, with OPW, practical and
certain structure; and a wide variety of pre-coded interfaces and utilities. The toolkit
makes it a customizable and coordinated language, suitable for quick strategic tasks and
for enhancing strategic applications at a distance. Python has a unique programming
system and functional programming memory and supports multiple programming
paradigms, including object positioning, programming, useful programming, and
procedural styles. There is a large comprehensive standard library. The Python translator
can be accessed by multiple operating systems, allowing Python code to run on a variety
of systems. Despite being a very useful language, Python is often referred to as a
scripting language because it makes it easy to use and navigate other software
components. But perhaps the best asset of python is that it makes software upgrades
faster and more enjoyable. The main reasons for using the Python programming language
for this endeavor are to summarize the points discussed below.[ CITATION Sch13 \l
1033 ]
Software Quality:
For some, Python's focus is on the readability, clarity, and overall quality of the software
than any other tool in the scripting scene. Python code is designed to be coherent and
therefore much more reusable and workable than normal scripting languages. The
uniformity of Python's code makes it easy to understand whether you've compiled it or
not. In addition, Python provides extensive support for additional software reuse
mechanisms, such as item programming (OPW) and resource programming.

Uses for developers:


In static assembly or compound languages like C, C++, and Java, Python often improves
machine efficiency. Python code is typically one-fifth to one-third the size of comparable
C++ or Java code. In the interim, that means less typing, research, and tracking. Python
applications also run quickly, without the accumulated stages and extensive linkages that
some other tools require, which aids developers even more.

Portability Programs:
On all major PC systems, the majority of Python programmes remain unmodified. If
Python code is distributed to Linux and Windows, for example, a50 script code must be
replicated between machines. Furthermore, Python provides a wide range of
programming possibilities for creating portable graphical user interfaces, database access
programmes, electronic systems, and much more. After all, the system interface, which
includes programme addresses, is one of the most important aspects of the system.

Library support:
Python comes with a plethora of pre-assembled and portable applications, known as
standard libraries. This library supports a variety of user-level programming tasks, from
coordinating text design to scripting. Python can also be accomplished using local
libraries and a variety of third-party application support packages. Python's space
includes tools for creating websites, numerical programming, serial port access, and turn-
game events, among other things. The NumPy extension, for example, has been described
as free and, more importantly, identical to Matlab's numerical registration system.
Component Integration:
Using a coordinate mechanism, Python programmes may simply communicate with other
portions of an application. Python can now be used as a customization tool and item
extension thanks to the integration. Python code can currently call C and C++ libraries,
be called from C and C++ applications, work with Java and.NET components, leverage
frameworks like Bring COM and Silverlight, and communicate with devices via the
internet.

Chapter 4

4. Methodologies
4.1Design of the investigation/Algorithms/ Hardware

Figure 1: design of hardware

4.2Analysis procedures
Figure 2: analysisi procedure

4.3Methods in the Project


Voice:
The main method of the whole calculator is voice for which we used three libraries voice
recognition,tkinter,pytssx3. This method is used for converting voice of user into text so
that calculator can perform different operations on it.

Operations:
This method contains all tha operations of that a calculator can perform from plus minus
to different trigonometry functions.
Text:
Most simplest method in which user enter the text and it displayed on the screen for
performing calculations.

4.4Used Libraries
4.4.1 Voice recognition:
Here we use one of the liberal python, i.e. speech recognition used to make speech
recognition, using some engines and APIs, on the web and disconnected.

Identification Class:

The SpeechRecognition library has many classes, but we will not implement for a class
named Identifier. This is a lesson that allows us to convert audio recordings to text. To
enter the Identifier class, we must first import the library.

import speech recognition as sr

How do we characterize variables and assign identity class events by calling them.

identifier = sr.Recognizer()

Speech Recognition Function

In this development we will still see our identifier in real life before it works as we see
some cool features of this event. Speech Recognition has the understandable ability to
work with the plethora of APIs out there:

 aithn_bing()
 recognize_intelligence(), etc.

Bing Identifier works using Microsoft psychological administration.

Google Identifier works with Google's free web search API.

Google Cloud Recognizer works with the Google Cloud Speech API.

White Recognizer works use the wit.ai stage.


We'll be utilising the work of Google Recognizer, which is recognition google (). It is
completely free and does not necessitate the use of an API key. There is one disadvantage
to this identifier: it restricts your options when working with older audio recordings. As
far as I'm aware, working with audio recordings of less than 5 minutes is not a problem
for me. With extended audio documents, I don't advocate utilising this identification. I
intend to explain numerous strategies for working with more valuable papers in a
separate post.

4.4.2 pyttsx3:
Pyttsx3 is a library for converting books to speech in Python. Unlike the option library, it
works occasionally and can be achieved with Python 2 and 3.

Installation

pip install pyttsx3

If you find errors such as No module named win32com.client, No module named win32
or No module named win32api, you should also install pypiwin32.

Usage:

import pyttsx3

engine = pyttsx3.init ()

engine.say ("I'm going to talk about this")

motor.runAndWait ()

4.4.3 tkinter:
Tkinter is a Python interface for the Tk GUI toolbox ported in Python. Tkinter is a
standard Python GUI library. When Python and Tkinter are combined, it gives a rapid
and straightforward way to create GUI applications. With a Tk GUI tool compartment,
Tkinter provides an outstanding article interface.

It's simple to make a GUI application with Tkinter. All you have to do now is play the
game's progress.
 Import the Tkinter module.
 Make it the default GUI application window.
 Add at least one of the above widgets to the GUI application.
 Step into the headliner circle to go against every opportunity the client creates.

4.5Implementation procedure

Figure 3:implementation procedure

Complete block diagram of Smart AI calculator. This includes text input, speech Input,
excellent analytics, activity module and demonstration module. Supports smart AI
calculator has text information or voice input. Excellent analysts have an action module
Who is responsible for running computers on input information. After you have prepared
the input information or The activities performed by the action module are far from the
estimated output show module. Display the module, because the audio output is sent to
the client in the same way. Great The analyzer has two modes in text format and audio
format. It depends on the decision of the user. The way he should practice numerical
skills. The text method performs numerical calculations. The traditional minicomputer
method. Speech mode can be numeric in client selection Count using speech or
expression. Excellent functions in the analysis activity module, Performs calculations in
text mode or audio mode according to customer's decision. Because the customer chooses
the voice Format, it is necessary to select the language for the training apparatus. The
gadget takes speech as information and It counts in the action module. Because the
gadget shown in the tree performs the calculations Voice for customer only. Where a
customer selects a text mode, the output of the count will be displayed LED Number
Cruncher show. The amazing show module that does this activity analysts.[ CITATION
Muk17 \l 1033 ]

4.5.1 Hardware Details


Machine: Custom Computer

Processor: Intel core i3

Ram: 4 GB DDR3

Motherboard: Intel Corporation - DH61WW

4.5.2 Software Details


Operating System: Microsoft Windows 10 Pro [64-bit]

Integrated Development Environment (IDE): pycharm

Paycharm3.6or obeve

Software Model Used

Agile Software Development

Iterative method of development and delivery.

Development in short span of time.

Features and capabilities are added depending on feedback.

New versions are build by modifying the previous version.

4.5.3 Use Case Diagrams


Use case:

Ai Calculator

Primary actor:

Person speaking in front of Microphone of writing something on the Touch pad.


Goal in context:

To keep exact record of the voice of the person and give them the result.

Preconditions:

The calculator has to detect the voice of a person to give them an accurate answer.

Trigger and Scenario:

User have to select the input method. If select 1 then speak recognition trigger and if
press 2 then text mode is on.

Exception:

Calculator unable to detect the voice clearly.

Priority:

Essential, must be experimented.

Frequency of use:

Many times, per day

Channel to actor:

Operating via control panel interface

Secondary actors:

Performer, External Devices,

Channels to secondary actors:

Microphone.
Figure 4:use case diagram 1
4.5.4 Use case Voice Recognition:

Figure 5: use case of voice recognition


4.5.5 UML or Class Diagram

Figure 6:UML Diagram


4.5.6 Main Interface

Figure 7:Main Interface of the Calculator

4.5.7 About

Figure 8:about
4.5.8 Classes

Figure 9:classes in AI calculator

4.6Verification of functionalities
We have checked each and every functionality and feature of project and it works in the
way it should be.

4.7Details about simulation / mathematical modeling


Applying AI to enhancement and alignment is another critical chance in reproduction
displaying. Specialist based frameworks frequently have a great deal of boundaries and to
investigate every one of their stages can require unreasonable run times. AI and keen
inspecting can be utilized to make meta-models that can convey emotional speed
increments for huge scope specialist based models.

Chapter 5

5 System Testing
5.1Objective Testing
Start by making sure all screenshots work on every screen. Likewise, you should ensure
that you can absorb basic content in all areas without damaging the product. You don't
have to consider all the different shot and character combinations, or preconditions,
because that's what your analysts do - and they're pretty good at it. The goal here is: don't
let other people touch your work for fear of falling if they enter their own name in the
username field. If you plan to acquire components through an API, you should run tests
to make sure the required API functionality works before installing it for more serious
testing. Where your basic usability test identifies something that doesn't work, that's fine.
Just show them that it doesn't work, that you're paying attention and that they shouldn't
try. You can fix it later, don't leave any shocks there.[ CITATION Har05 \l 1033 ]

5.2Usability Testing
The purpose of this testing is to ensure that the framework is well known to the customer
and meets the objectives for which it is expected. With each progress, customers test the
AI Calculator with this focus on:

 Easy to introduce
This applies to everything from frameworks to programming modules. The establishment
is the main source for customers, so it should be a friendly cycle. Otherwise they will get
tired when they start using your device. Regardless of whether it is a work system or an
individual customer application, the installation should be archived simply and
thoroughly. When the company is confused, the customer will make a declaration and
move on to something simpler.

 Easy to renew
Producing new skills. Save the Earth. Answer the call.

Leverage artificial intelligence, Internet of Things and information in the cloud to create
responses to social influences to combat environmental change. Apply before July 31st.

 Live events provided by IBM


As with branches, the app’s update cycle should be simple. If innovations are predictable,
customers are sure to avoid interaction. This can lead to bad results on a regular basis, as
many updates fix security vulnerabilities, memory loss, and other issues. Updates should
be simple enough to ensure that customers continue to benefit from the hard work of the
product makers. When a customer does not update a problem and then finds out, the
product is less robust and secure (e.g. skipping a new high).

 Instinctively
The programming is similar only to the GUI. If the GUI and quality are not thoroughly
checked, people will have problems using the items. A well-planned GUI can often
override basic unfriendly constructions (or unaided coding). Don't expect a decent GUI
though - the product must be well stocked!

 Productive
Not only should the form be part of the registration function, it should also be productive.
It needs to be upgraded for explicit design, must stop all memory releases, and must work
consistently with original buildings and subsystems. From the customer’s point of view,
the product must be an effective way to accomplish its tasks. The programming should
not add to the work done, nor should it provide the customer with a customer. His
instincts have limited program effectiveness. The original model was a change to the
Microsoft Office interface. If you switch from the standard interface to the Ribbon
interface, end customers waste valuable work time just to find out where to find
highlights. This was a wasted (and candid) decision.

 Beautiful GUI and easy to browse


You may be thinking, "Microsoft Office Ribbon interface is so unnatural, but it looks
beautiful." However, the look of a GUI that architects generally break with is dangerous.
When a planner chooses to follow a pattern beyond what works, it disappoints the end
customer. Instead of following a pattern, add your own interpretation of what is shown.
The reliable drop-down menu configuration has been in the works for a while, but it's
long gone - but this update shouldn't break the places. The basic function of a GUI is to
make the end customer's job easier... at least. If you can with a sharper plan, delete
everything. However, if your fidget plan is ignorant and misleading, it bombs a usability
test.[ CITATION Har09 \l 1033 ]
 Easy to remove
Other than being easy to introduce and use, uninstalling a program shouldn't be difficult.
Without immediate evacuation action, the product becomes bulky. It is also not easy to
use awkwardly. While many designers don't want their customers to lose their product,
the evacuation cycle can be the final impression your product gives. Don't try to build a
negative relationship.

 No obstacle to external programming


Perhaps the worst problem with Windows frameworks is that, as a rule, external
programs are needed to keep it running. This third-party programming is provided as
anti-virus, anti-virus and other warranty-based tools. Without this tool, your computer is
powerless against all the people who attack you. This is not easy to use as it creates a
level of combination that most normal end customers cannot handle.

 Easy to investigate
It’s not a great product. Even if something goes wrong with any part of the programming,
it is important that the end customer can contact support and help solve the problem. If
the product does not offer anything under investigation, how will the end customer or
director be able to maintain the product? Windows 7 does its best to help customers with
the journey when a program crashes and does a great job with it. On Linux, if you have a
problem with an application, you can usually run it from the command line to find out
what problems occur. There are also external devices that can be used. But again, relying
on third-party troubleshooting tools is not easy to understand.

 Stick to the guidelines


Standards are explained - to make connections between applications or equipment easy.
Problems arise when designers do not adhere to the standard. That has never been so
obvious compared to Microsoft Office. Essentially, Microsoft has violated the universe of
common standards for its own principles. This creates problems with the various
applications that speak to the product. OpenOffice is one of those office suites that
implements guidelines but often survives on the grounds that Microsoft doesn't agree
with the standards set by regulatory bodies. When clients are inconsistent with principles,
they will have unpleasant contacts if they ask their instruments to speak with devices that
meet the guidelines.

 Strong Maintenance Error


What happens if some programs go wrong? Did he suddenly leave? Is he trying to solve
the problem? Does he just take a break and get on with the business? When a program
makes a mistake, it must point out the error, especially among the engineers. The end
customer is not obliged to report defects, but by providing alternatives to reporting
defects, the product can be improved. When a program fails and essentially guarantees
sudden or planned action, clients are examined with their eyes and hands visible
everywhere. Basically let the customer know that there is a problem and how he can help
to solve it, for example by sending a bug report to the designer.

5.3Software performance testing


The reliability of the AI minicomputer is determined not only by the number of normal
errors, but also by its behavior in case of errors. Care must be taken to ensure that no
mistakes are made to take the prize back. This article describes a unified way to address
blunder scatter limits, extended bike IDs, and blunder recovery settings.

5.4Compatibility Test
Compatibility testing is software testing that is in the unused test class and performed on
a numerical AI processor to check compatibility (feasibility) at different
stages/conditions. This test is performed only when the application is . Essentially this
functionality test is scheduling to check usability of software applications created on
various software, device steps, organizations and programs and so on. This compatibility
test is very important before creating and running an article because it is done to avoid
future problems.

5.5Load Testing
Another Liberal Measure Yes There is a charge where the legal charge is in accordance
with the law we believe in. That is why we measure the law as accurately as possible and
with many clients at the same time. The Load Test is the watch holder that made and
named it.

Reduce the real burden of progress by:

 Complete their system


In a thriving climate, this is the thing for polar skins. Other climates are at least mild

 Energetic Properties
Hardness is the main steel that characterizes and excites in this development. This
reduces shortcuts in throughput, service time, reduces stress, and so on.

 Press the light


This reduces it to an insurmountable burden and creates an atmosphere of respect.

 Evaluation of the client


By law, the name of the Vuser script is the measurement object for each vuser. Ax
assigns as many tasks as possible.

 Maximum case Maximum


Other information from machines (estimates), probabilities and users, as far as the law is
known, goes down. In Loadrunner, you can shrink and manage the Loadrunner domain
controller. Reduce brain size in other situations: light and other targets.

 Do the story
The plight of workers is imitated by running multiple vusers to perform tasks at the same
time. Before the case is made, the design and planning of the case must be prepared. We
can run the whole case, vuser meeting or individual vuser.

 Observing the Situation


Scenarios can be observed using Loadrunner online screen, such as runtime exchange,
framework assets, web assets, network delays, and so on.
 Dissecting Test Results
This is an important step forward in the field of load testing. In this developmental
analysis, performance bottlenecks are explored through graphs and reports generated
during the completion of the situation. The load test may need to be repeated after solving
the problem identified in the stacking test.

5.6Security testing
Security testing is an interaction that is expected to reveal flaws in the data framework's
security tools that guarantee information and track usability as recommended. Given the
reasonable limitations of the security test, passing a security test is not a sign that there
are no flaws or that the framework satisfies the security requirements.

Regular security requirements may include explicit components of confidentiality, trust,


validation, accessibility, consent, and non-denial. Security requirements try to depend on
the security requirements performed by the framework. Security testing as a term has
different implications and can be accomplished in many different ways. So the security
taxonomy helps us understand these different methodologies and implications by
providing a basic level to work with.

5.7Installation Test
Installation tests are performed to verify that the software has been effectively introduced
with all built-in features and that the item is performing as expected. Also known as
performance testing, this is done in the final testing period before the end customer enters
into their first collaboration with the item.

In addition, the analysis group can use branch tests to make agreements about, for
example, the correctness of the branch cycle and guarantee that the customer receives the
ideal customer experience.

5.8Test Cases
1) See the typical additional engine or minicomputer AI is a number processor.
2) Make sure that all recordings are available and that the text consists of a working
microphone.
3) Check if the math activity is correct +, -, /, * and so on.
4) Ensure that BODMAS is applied to complex queries and that correct results are
returned.
5) Verify that the incremental engine returns the correct results for activities with
decimal numbers.
6) Check the distance between the two straps, the catching position should not be too
tight.
7) Check the pressure factor needed to stimulate catching, the pressure factor should not
be too high.
8) Confirm the number of digits that can be entered into the additional machine for each
activity.
9) Confirm the comment rating constraint.
10) Confirm the operation of the memory capacity.
11) Check if the minicomputer allows checks with predictions.
12) Check that every number or activity added to press 'C' has been omitted
13) Verify that the newest admin is calling the previous admin while consistently pushing
two admins.
14) Check the condition of the auxiliary motor if two pawls are pressed continuously.
15) Check if the client can delete the numbers one by one with the delete button.

Chapter 6

6 Result and Findings


6.1Presentation of the Findings
6.1.1 Hardware Results
Hardware Verification
If changes are made to hardware, software or potential correspondence as a result of
support or repair, further changes in software inspection and testing may be critical to
ensure that the modified software does not conform to guidelines.
For critical software, such as electronic democracy software, it is best to use a self-test
site to test software. For minor software, software certification can be done in-house.

Hardware assurance tests (also called aptitude tests) can:

 test hardware in conditions that reproduce the expected original conditions, including
capacity, transport, activity and support conditions
 ensuring hardware meets the most stringent environmental requirements, including
enclosures, space, goods and hardware, electrical supply and significant limits for
temperature, humidity and contamination

Test hardware
Hardware testing is usually point-by-point and more extensive than inspection. Testing is
considered as a guarantee that all parts of the software will function properly and the
software will work properly according to the specific requirements surrounding it.

 stimulate a number of test steps


 implement 'non-functioning' testing to ensure the gear can withstand the expected
stage of maintenance, e.g. drop test for travel
 see if it matches the programmed code in the hardware (this code was once called
firmware) to ensure reasonable accuracy and ensure that appropriate standards are
adhered to
 apply tests that are useful for determining compliance with testing standards.
 Perform subjective evaluations to determine compliance with testing standards.

Hardware maintenance
Once your hardware is certified, tested and completed, it must be kept up to date. The
support schedule will differ depending on the nature and complexity of the innovation.
The support schedule or program recommended by the manufacturer or supplier involves
a lot of hardware. Likewise, the manufacturer or supplier may provide maintenance under
the purchase agreement.
When hardware changes as a result of software maintenance or repair, it may be
important to make additional changes to software verification and testing to ensure that
the modified software continues to conform to standards.

6.1.2 Software Results


Software check
For critical software, such as electronic democracy software, it is appropriate to use the
power of free testing to perform software assurance testing. For mini-software, software
checks can be performed internally.

Software verification tests (also known as proficiency tests) may include:

 test the hardware under conditions that mimic the expected original conditions
 software testing to ensure that installation principles are followed and that the
software operates to its recommended capability, including code review
 ensure that appropriate quality assurance measures are in place

Testing software
Software testing is usually more precise and careful than confirming software. Software
testing is expected to ensure that all segments of the software function as intended, and
that the software functions properly according to immediate specific requirements.

For key software, such as democracy electronic software, an organized software testing
program is a way to ensure that all parts of the software are tested. Trackable test
estimates include:

 push a lot of test standards


 check all non-standard codes to ensure consistent accuracy and adherence to proper
planning and development principles
 implements 'not working' testing to ensure hardware maintains expected level of
maintenance
 implement practical tests to determine compliance with testing standards
 apply subjective judgments to determine compliance with test standards
 confirming that ‘what goes in’ is ‘things out’, by entering known information and
observing that the results match the information

Software Support
After the software has been inspected, tested and run, it must be continuously updated to
ensure that it can continue to operate at the level indicated during the software testing
phase. The support schedule depends on the nature and complexity of the innovation. The
schedule or support program recommended by the manufacturer or supplier is
accompanied by many items. The manufacturer or supplier can also provide support as
part of the purchasing arrangement.

6.2Discussion of the Findings


6.2.1 Comparison with Initial Findings
At initial stage our objective was just make an adding machine with voice
acknowledgment framework however as we continue we additionally add the highlight so
what we accomplish is significantly more than the objective.[ CITATION Renly \l 1033 ]

6.2.2 Reasons for Shortcomings


No short comings

6.3Limitations
 Speech information can be absorbed and some fears can interfere with defenses.
 Additional machines can fight jargon, especially if there are technical terms.
 Words can be confusing if you don't speak clearly - check out YouTube's automatic
inscriptions!

6.4Recommendation
Innovations in discourse recognition are unique in terms of the different developments
that will help clients with disabilities. The main motivation behind the development of
discourse recognition is not the market of incompetence, but how everyone, including
professionals, embraces discourse recognition. Experts, lawyers, financial managers and
various other professionals try to find ways to capture information using discourse. These
clients need to remove barriers to converting ideas into electronic form, for example by
using a secretary or interpreting their own handwriting.

People cannot use innovation to push boundaries, but convenience is not the positive side
of discourse recognition, but a legitimate necessity. Many people with disabilities benefit
from innovations from complete dependence on others to the independence needed to
work without hands. It's never been more important for customers to fight with modest
console orders. People with disabilities have potential advantages and disadvantages for
the development of discourse recognition as a standardized innovation. Depending on the
idea of one's disability or handicap and the way the innovation is conducted with that
client, discourse recognition can be the best setting that benefits or misuses the client's
time.

The ideal framework for recognizing discourse is a forward goal. Patterns in a disabled
client's discourse will energize and stall. The baseline variable will not focus on
innovation, but on the needs of individual customers. Organizations that recognize
progress should be aware of the importance of putting the needs of people with
disabilities at the top of their list of priorities. Monitoring issues related to the current
state of call recognition and using that information to tailor recommendations to specific
clients will not only help clients with disabilities become more helpful and independent.

6.5Conclusion
 By the end of the Android Voice PC mini development, he was doing most of the
work. The voice-activated number processor has the ability to understand words
expressed in common habitats and has the ability to deliver accurate results.
 Apps like Android Voice Calculator are the future of how mini computers are used.
This marks the decline of the era of console-based minicomputers and invites the rise
of all other artificial intelligence applications.
 This project is open to further improvement.
 The usability of Android Voice Calculator can be extended by adding complex math
activities to logical tasks.
 The output can be increased by providing content for use in discourse, which will
facilitate the use of applications for the visually impaired.
 In addition to mathematical calculations, the application can enter unit changes (e.g.
Celsius to Fahrenheit, liters to gallons, km to miles, and so on)

Chapter 7

7 Future Work
To develop this framework in the future, we can create more SRAM on our discourse
recognition set so that we see more than one digit activity and we can do more activities
like hollow, ln, square root and more by changing the PIC controller code. We can make
a simple audio display and LCD, so it is also commonly used to blind people. While the
original sound enhancement engine doesn't work like the original in the show, many tests
have been done to show that the framework is still workable. From this, understand the
importance of determining the right design choice for this plan.
References
Chen, K. D. Y. Q. X. a. C. Z., 2018.. Neural arithmetic expression calculator. arXiv
preprint arXiv:1809.08590.. s.l.:s.n.

Available : https://arxiv.org/abs/1809.08590

Ghai, W. a. S. N., 2012. . Literature review on automatic speech recognition.


International Journal of Computer Applications,. s.l.:41(8)..

Availble at : https://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.259.445&rep=rep1&type=pdf

Gupta, S. P. A. a. S. A., 2014. . A study on speech recognition system: a literature


review. International Journal of Science, Engineering and Technology Research,.
s.l.:3(8), pp.2192-2196..

Available at : https://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.1080.2553&rep=rep1&type=pdf

Hara, R. K. H. T. T. S. H. K. A. a. M. S., 2009. . Testing the technologies. IEEE Power


and Energy Magazine,. s.l.:7(3), pp.77-85..

Availble at : https://ieeexplore.ieee.org/abstract/document/4907283

Hartmann, J. V. M. F. H. a. R. A., 2005. . A UML-based approach to system testing.


Innovations in Systems and Software Engineering,. s.l.:1(1), pp.12-24..

Availble at : https://link.springer.com/article/10.1007/s11334-005-0006-0

Mukhtar, W., 2017. . A PROPOSED FRAMEWORK FOR ASSOCIATION RULES


MINING (Doctoral dissertation, Sudan University of Science & Technology).. s.l.:s.n.

Availble at : http://repository.sustech.edu/bitstream/handle/123456789/20494/A
%20PROPOSED%20FRAMEWORK%20FOR....pdf?sequence=1
Rendon, R. H. T. a. O. J., 2010, July.. Toward Efficient and Effective Contracting
Structures and Processes for Systems‐of‐Systems Acquisition. In INCOSE International
Symposium. s.l.:(Vol. 20, No. 1, pp. 769-779)..

Availble at : https://onlinelibrary.wiley.com/doi/abs/10.1002/j.2334-5837.2010.tb01103.x

Schaumont, P., 2013. . Data flow implementation in software and hardware. In A


Practical Introduction to Hardware/Software Codesign. s.l.:(pp. 61-88). Springer,
Boston, MA..

Availble at : https://link.springer.com/chapter/10.1007/978-1-4614-3737-6_3

Yasin, Q. S. G. D. Y. I. A. a. D. Q., 2020. . Estimation of petrophysical parameters from


seismic inversion by combining particle swarm optimization and multilayer linear
calculator. Natural Resources Research,. s.l.: 29(5), pp.3291-3317..

Availble at : https://link.springer.com/article/10.1007/s11053-020-09641-3

Yi, J. T. J. a. B. Y., 2019, May. . Language-invariant bottleneck features from


adversarial end-to-end acoustic models for low resource speech recognition. In ICASSP
2019-2019. s.l.:s.n.

Availble at : https://ieeexplore.ieee.org/abstract/document/8682972

You might also like