You are on page 1of 45

VOICE MAIL

A
Major Project Report
Submitted to

CHHATTISGARH SWAMI VIVEKANAND


TECHNICAL UNIVERSITY
BHILAI (C.G.), INDIA
In partial fulfillment of requirement for the award of the Degree
of
Bachelor of Engineering
in
Information Technology
By
APURVA NIRMALKAR - BA1403
MAUMITA DAS - BA5955
MONIKA RAWTE - BA6288
PURNIMA SAHU - BA8006

Under the Guidance of


Mrs. Shweta Mishra
(Assistant Professor)

DEPARTMENT OF INFORMATION TECHNOLOGY


CHHATRAPATI SHIVAJI INSTITUTE OF TECHNOLOGY,
SHIVAJI NAGAR, BALOD ROAD, DURG (C.G.) -491001, INDIA

SESSION 2019-2020
DECLARATION

We the undersigned solemnly declare that the report work entitled “Voice Mail”, is based on
our own work carried out during the course of our study under the supervision of Mrs.
Shweta Mishra (Assistant Professor), Department of INFORMATION TECHNOLOGY,
Chhatrapati Shivaji Institute of Technology, Durg, Chhattisgarh.

We assert that the statements made and conclusions drawn are an outcome of the
project work. We further declare that to the best of our knowledge and belief that the report
does not contain any part of any work which has been submitted for the award of any other
degree in this University or any other University.

-------------------------------- ----------------------------------
(Signature of the Candidate) (Signature of the Candidate)
Apurva Nirmalkar Maumita Das
Roll No: -300303316005 Roll No: -300303316021

-------------------------------- --------------------------------
(Signature of the Candidate) (Signature of the Candidate)
Monika Rawte Purnima Sahu
Roll No: -300303316022 Roll No: -300303316025
CERTIFICATE BY THE SUPERVISOR

This to certify that the report on the Project submitted is an outcome of the Project Work
entitled “Voice Mail” carried out by

Name of student Roll no. Enrollment no.

Apurva Nirmalkar 300303316005 BA1403


Maumita Das 300303316021 BA5955
Monika Rawte 300303316022 BA6288
Purnima Sahu 300303316025 BA8006

carried out under my guidance and supervision for the award of Degree in Bachelor of
Engineering in Information Technology from Chhattisgarh Swami Vivekananda Technical
University, Bhilai (C.G.).

To the best of my knowledge the report


1. Embodies the work of the candidate himself.
2. Has duly been completed.
3. Fulfills the requirement of the Ordinance relating to the BE degree of the
University.
4. Is up to the desired standard for the purpose of which is submitted.

------------------------------
Mrs. Shweta Mishra
Assistant Professor
Department of Information &
Technology Engg.
CSIT, DURG

The Project Work as mentioned above is hereby being recommended and forwarded for
examination and evaluation.

Signature of
Head of Department
with seal
CERTIFICATE BY THE EXAMINERS

This is certifying that the project work entitled “Voice Mail”.


Submitted by

Name of student Roll no. Enrollment no.

Apurva Nirmalkar 300303316005 BA1403


Maumita Das 300303316021 BA5955
Monika Rawte 300303316022 BA6288
Purnima Sahu 300303316025 BA8006

has been examined by the undersigned as a part of the examination for the award of the
Bachelor of Engineering Degree in Information Technology Engineering of Chhattisgarh
Swami Vivekanand Technical University, Bhilai, (C.G.).

Internal Examiner External Examiner

Date: Date:
ACKNOWLEDGEMENT
With deep regards and profound respect, I avail this opportunity to express my deep sense of
gratitude and indebtedness to Mrs. Shweta Mishra, Department of Information Technology,
CSIT, Durg for his valuable guidance and support. I am deeply indebted for the valuable
discussions at each phase of the project. I consider it my good fortune to have got an
opportunity to work with such a wonderful person.

I whole heartedly extend my gratitude to Mr. Prabhas Gupta, Head & Professor,
Department of Information Technology Engineering, CSIT, Durg providing motivation and
valuable guidance for the development of entire project.

I express my sincere gratitude to Mr. Ajay Prakash Verma, Chairman, Chhatrapati Shivaji
Institute of Technology, Durg, for providing adequate infrastructure to carry out present
investigations and also motivating for research work, which has been a constant source of
inspiration in completing this work.

I take immense pleasure to thank Dr. Santosh Sharma, Principal, CSIT Durg for motivating
to work in research direction and providing opportunities to connect with global research.
Lastly, I feel immensely moved in expressing my indebtedness to my revered parents whose
sacrifice, guidance and blessings helped me to complete my work.

----------------------------------- ----------------------------------
(Signature of the Candidate) (Signature of the Candidate)
Apurva Nirmalkar Maumita Das
Roll No: -300303316005 Roll No: -300303316021

----------------------------------- -----------------------------------
(Signature of the Candidate) (Signature of the Candidate)
Monika Rawte Purnima Sahu
Roll No: -300303316022 Roll No: - 300303316025
TABLE OF CONTENTS

List of figure i
Abstract ii
Chapter No. Title Page No.
I INTRODUCTION 1-2
1.1 What is Voice Mail 1
1.2 Purpose Of The Project 2
1.3 Requirement Specifications 2
II LITERATURE REVIEW 3

III PROBLEM IDENTIFICATION 4


3.1 Problem Definition 4
3.2 Solutions Of The Problem 4
IV METHODOLOGY 5-17
4.1. Software Development Life Cycle 5

4.1.1 Planning 5

4.1.2 System analysis 5

4.1.3 Design 5

4.1.4. Implementation 5

4.1.5 Testing 7

4.1.6. Maintenance 8
4.2 Process Model With Justification: 9
4.3 Designing 12-17
4.3.1 Data Flow Diagram 13
4.3.2 ER Diagram 15
16
4.3.3 Use Case Diagram

V 18
RESULTS & CONCLUSION

VI CONCLUSION & SCOPE OF FUTURE 19-20


ENHANCEMENT
6.1. Conclusion 19

6.2 Future Enhancement 20

BIBLIOGRAPHY 21
List of Figures

S. No. Figure No. Figures

1 Figure-01 Registration Page

2 Figure-02 Login Page

3 Figure-03 A Data flow diagram levels(DFD)

4 Figure-04 Level-0 DFD

5 Figure-05 Level-1 DFD

6 Figure-06 ER diagram

7 Figure-07 Use Case Diagram

i
ABSTRACT

To develop a voice primarily based email system that will facilitate visually impaired
individuals to access email in a problem free manner. Together with providing usage of mail
services simply and with efficiency, the system also will cut back the psychological feature
work that must be unremarkably taken by the visually impaired to recollect and sort
characters using the normal Braille keyboards, which are accessible to them. The graphical
user interface of this method has been evaluated against the interface of the traditionally
accessible mail system. Not only for visually impaired, but also for people who are illiterate
might have the benefit of this technique. The foremost crucial facet which will be thought of
developing this technique is that the users of this technique does not have any basic
information regarding the keyboard shortcuts used or wherever the keys are used for.

All functions to be utilized in this technique are supposed to be easy mouse click
operations creating the system very user friendly. This application proposes an android
application, designed specifically for visually impaired individuals. This application provides
a voice primarily based mailing service which provides them to browse and send mail on
their own, without any guidance. The users ought to use certain keywords which can perform
certain actions for e.g. Read, Send, Compose Mail, Address Book etc. This EMAIL system is
utilized by a visually handicapped person to access mails easily and with efficiency.
Therefore, reliance of visually impaired on others for his or her own activities associated with
mail are often reduced.

ii
Chapter- I
Introduction
INTRODUCTION

1.1. What is voice mail?

Voicemail is a method of storing voice messages electronically for later retrieval by intended
recipients. Callers leave short messages that are stored on digital media (or, in some older
systems, on analog recording tape). Originally, voicemail was developed for telephony as a
means to prevent missed calls, and also to facilitate call screening. In recent years, voicemail
has become integrated with the internet, allowing users to receive incoming messages on
traditional computers as well as on tablets and mobile phones. Microsoft exchange is a
popular platform for voicemail with desktop and notebook computers. Users can play their
voicemail messages either as audio (Mp3) or as text. In order to play a voicemail or read it as
text, the user simply clicks on an inbox item, just as would be done with an ordinary e-mail
message.

Voice messaging is a computerized method of storing and manipulating spoken recorded


messages that is accessible to users from any touch-tone phone twenty-four hours a day. A
voice-messaging system can be easily accessed by local, remote, or mobile users via land-
lines or cellular phones. Messages may be created in a user's voice mailbox and then
transported to another voice mailbox in a manner similar to the e-mail process.

Voice-messaging systems include such services as voice messages, voice-mail distribution


lists, fax-in and fax-on demand in the mailbox, interactive voice response, and voice forms
that any user can access anywhere in the world. Voicemail is a computerized system that
enables support for answering, storing and relaying telephone call messages. Also spelled as
voice mail, voicemail records and stores incoming messages, enabling playback of the
messages from the same phone number or from another telephone. When recording this
message, you should speak clearly, and your message should be concise. Be sure to spell out
your name or email address if you’re asking the caller to follow up with written
correspondence.

1
1.2. PURPOSE OF THE PROJECT

A voicemail system (also known as voice message or voice bank) is a computer-based system
that allows users and subscribers to exchange personal voice messages; to select and deliver
voice information; and to process transactions relating to individuals, organizations, products,
and services, using an ordinary phone.

1.3. REQUIREMENT SPECIFICATION


1.5.1Software Requirement System

 Front End – HTML5, CSS 3, JavaScript, JQuery


 Back End: MySQL
 Server Side Programming: PHP
 Operating System: Windows Server 2003/XP/7/8 or any Linux server etc…
 Server: Apache

1.5.2 Hardware Requirement System

The recommended hardware specified by the respective software would suffice the needs.
The memory and processing power needed would increase as the number of user’s increase.
The estimated hardware requirements are as specified.

 Min. Pentium Processor


 Min. 128 MB RAM
 Min. 20 MB Free Hard Disk Space
 GSM Modem / Handset with caller ID support

2
Chapter- II
Literature Review
Literature Review

Background The main aim of our application is to help visually impaired people to enjoy the
benefits of email and should be self-sufficient in sending and receiving them independently.
There is a working module of the application which is working on instructions given
specifically in English. For the future scope it can also design the Voice Based Email
Application (VMAIL) working with other languages. The basic function of the application is
to provide user with a simple way to perform email operations on his phone without
compromising his security.

Tirthankar Dasgupta, “Voice Mail Architecture in Desktop and Mobile Devices for the
Blind People”, 2012. The advancement in computer based accessible systems has opened up
many avenues for the visually impaired across a wide majority of the globe. Audio feedback
based virtual environment like, the screen readers have helped Blind people to access internet
applications immensely. However, a large section of visually impaired people in different
countries in particular, the Indian sub-continent could not benefit much from such systems. In
this paper, we describe the Voice Mail system architecture that can be used by a Blind person
to access e-Mails easily and efficiently.

Ummuhanysifa U., “Voice Based Search Engine and Web Page Reader”, 2013. This paper
aims to develop a search engine which supports Man-Machine interaction purely in the form
of voice. A novel Voice based Search Engine and Web-page Reader which allows the users
to command and control the web browser through their voice, is introduced. The existing
Search Engines get request from the user in the form of text and respond by retrieving the
relevant documents from the server and displays in the form of text.

Tharani K. K., “Voice Based Mail Attachment for Visually Challenged People”, 2017.
Internet has become one of the basic amenities for day-to-day living. Every human being is
widely accessing the knowledge and information through internet. However, blind people
face difficulties in accessing these text materials, also in using any service provided through
internet. The advancement in computer based accessible systems has opened up many
avenues for the visually impaired across the globe in a wide way.

D. Kiran Kumar, “User Interface for Visually Impaired People” The research work deals
with the design and implementation of Speech recognition device using Raspberry Pi for
essential usage to visually impaired people. Now a day’s blind people are increasing
enormously so, the main objective of the research is to provide a simple, cheap, friendly user,
and compact device for visually impaired people to use multimedia applications of operating
system like text, music player and dialing system by interfacing GSM module. All the above
are implemented in a low cost Raspberry Pi board. Thus a goal of producing a compact
device has been designed at low cost using offline speech recognition. “Voice Based System
in Desktop and Mobile Devices for Blind People”, 2014

3
Chapter- III
Problem Identification
3.1. PROBLEM DEFINITION:

1.Messages are too long.

Listening to a mailbox full of voicemail recordings can take valuable time out of your day.
But hearing each one all the way to the end is necessary in order to get the information from
it.

2.Difficulty retrieving voicemails.

Anyone who’s struggled to recall the correct password for their voicemail system in order to
retrieve new messages probably has thought there has to be a better way.

3.2. SOLUTIONS OF THE PROBLEM

1.Solution: Have voicemails transcribed into text format so they can be quickly read as
well as stored on a computer like any text file. “Then you can search voicemails for keywords
like ‘I need a quote’ or ‘price is too high,’” says Dan Baldwin, an information and
communications technology consultant for business owners with ICTLA in Lake Elsinore,
California. Spectrum business voice offers customers more than 30 calling features, including
the ability to have voicemails transcribed and then viewed online.

2.Solution: Have all voicemails automatically emailed to you as sound files. This also
ensures you are notified quickly when any new voicemails are left. Spectrum Business Voice
offers this as a free service to its customers. Voice messages are attached to the emails as
mp3 sound files, and recipients simply click on the email attachment to start listening.

4
Chapter- IV
Methodology
4.1 SOFTWARE DEVELOPMENT LIFE CYCLE

4.1.1 Planning
Voicemail Office’s plans and pricing help subscribers streamline their personal and/or
business calls at an affordable cost. Our full suite of telecommunication services offers many
solutions for business and organizations, as well as for personal use.
4.1.2 System analysis: -

Here the analysis of the system is made with respect to relevance of platform,
programming languages.

4.1.3 Design: -

1. User Interface Design: -The user interface is designed using Adobe Dreamweaver CS3.
The complete website focuses more on efficiency in understanding the IVR rather than the
look and feel of the system as the system is primarily developed for the blind people to whom
the look and feel won’t be of that primary importance as the efficiency of understanding the
prompting would be.

2. Database Design :-Our system maintains a database for user validation and storing mails
of the user. There are a total of five tables. The Inbox, Sent-Mail schemas will store all mails
of the respective service that belongs to that particular user.

3. System Design: - Our System is voice oriented. When user is over every legal space in
website, it will receive voice messages where user is right now. If normal people don’t want
this feature they can turn it off. The system work flow is defined in DFD diagrams

4.1.4. Implementation: -

The system developed by us includes following modules as follows:


1. Registration: - This is the first module of system. Any of the users who want to
use the system should first register himself to obtain his/her own username and
password. Registration module will obtain all the details about user by voice
commands given by the system that where to fill which information. The user should
speak the details as the system requires. If the information is incorrect then the system
will be telling about re-enter the information again.

5
Figure - 01 Registration page

2. Login: -This is the second module of system. Once the registration is done the user can
login to the system. Login module will ask user to provide username and password. Here the
process goes in speech to text conversation of user. User is told to validate whether he/she
entered details are correct or not. If the details are correct then the user is authorized and will
enter to the main page.

6
Figure - 02 Login Page

4.1.5 Testing: -

 Dial the phone number using the voice mail with another phone. Press the call button
on the phone.
 Wait until the number being called goes to the voice mail. ...
 Listen to the voice mail recording, and then record a short message. ...
 Dial the voice mail box with the phone it is assigned to.

7
4.1.6. Maintenance: -

 The voicemail system will be unavailable during the maintenance window. Callers
will be unable to leave voicemail messages or access their own voicemail box.

 There will be no impact to the phone system. Internal and external calling will
continue uninterrupted.

METHODOLOGY

The complete system is based on voice prompts and click events. When using this
system, the computer will be prompting the user to perform specific operations to avail
respective services and if the user needs to access the respective services then he/she needs
to perform that operation. One of the major advantages of this system is that, in most of the
part user won’t require to use the keyboard. All operations will be based on mouse click
events. . Now the question that arises is that how will the blind users find location of the
mouse pointer. As particular location cannot be tracked by the blind user, therefore the user
has to traverse the mouse throughout the screen from top to bottom and then left to right.
This system will be perfectly accessible to all types of users as it is just based on simple
mouse clicks and there is no need to remember keyboard shortcuts. Also because of this
facility those who cannot read need not worry as they can listen to the prompting done by
the system and perform respective actions.
Voicemail systems are designed to convey a caller's recorded audio message to a recipient.
To do so they contain a user interface to select, play, and manage messages; a
delivery method to either play or otherwise deliver the message; and a notification ability to
inform the user of a waiting message. The working of the system:
.
1. Registration module: - This is the first module of the system. In this user has to fill up
the registration from to create an account. When user fills up the field them system will start
to prompt that field to check whether the filled field is correct or not.

2. Login module: - This is the second module of the system. When user made that
registration successfully he/she can login to the system. This module asks the user to
provide the username & password. This is accepted in speech format & represented on
screen in text format. Then while authorization, users voice frequency is checked in
database. On successful authorization user is directed to the respective account.

8
3. Forget password module: - This module is helping the user, when user forget respective
password. In this module user is first told to user name. According to user name the security
question is searched in database. The question is spoken out by the system. Then user
should specify the answer that was provided by him/her registration. Finally, if both get
matched, user is given option to change password.

4. Account module: -

 Inbox: - This module collects received mails. These mails are sorted in time manner.
System is prompt recently arrived mail first, and then if user wants to open mail then
user has to command the system in voice format. If user wants to open mails on
particular date, user is given option to change password.

 Compose: - We can write the mails in this model. User adds recipient subject and
body to the model. Users can write the mail in voice format and it converts into the
text format. If the user wants to send some attachments, then user has to speak the
location where that particular attachment resides.

 Sent mails: - This module holds the mail after sending the mail. Also user can
forward and delete the mails from this module.

 Draft: - Due to any Internet error or any other error if mail not send then this module
save these mails, which are then later send or delete.

 Trash: - This module holds the deleted mails from inbox, draft and sent mails. User
can also restore the mail from trash and it will restore at particular location. If user
delete the mail from trash, then it will permanently delete from system.

4.2 PROCESS MODEL WITH JUSTIFICATION:

Proposed System defeats advantages of previously email system which is either based
on screen reader that uses keyboard shortcuts for interacting with the system or just simple
mailing system to send and receive mails. My aim is to provide basic services such as
reading, composing, accessing and sending emails with the help of voice based facilities
present on many different modules. All over the world there the several mails system present
9
which provides various facilities from sending to receiving mail some of the system even use
voice to text converter that makes task much simpler. But those system does not provide text
to voice facilities which in return creates difficulties to visually challenged individual as they
cannot see what is written on the screen. So, in order to overcome this disadvantages, I have
built the system which gives both the services such as voice to text and vice versa to helps
blind and illiterate people in day to day purpose.

JUSTIFICATION

Voice Mail System (also known as voice mail, voice message or voice bank) is a
computer based system that allows users and subscribers to exchange personal voice
messages; to select and deliver voice information; and to process transactions relating to
individuals, organizations, products and services, using an ordinary telephone. The term is
also used more broadly to denote any system of conveying a stored telecommunications voice
messages, including using an answering machine. Most cell phone services offer voice-mail
as a basic feature, many corporate PBXs include versatile internal voice-messaging services
and vertical service code subscription is available to most individual and small business
landlines subscribers. Voicemail systems are designed to convey a caller's recorded audio
message to a recipient. To do so they contain a user interface to select, play, and manage
messages; a delivery method to either play or otherwise deliver the message; and a
notification ability to inform the user of a waiting message. Most systems use phone-
networks, either cellular or land-line based, as the conduit for all of these functions. Some
systems may use multiple telecommunications methods, permitting recipients and callers to
retrieve or leave messages through multiple methods such as PCs, PDA, Cell phones or Smart
phones. Simple voicemail systems function as a remote answering machine. using touch
tones as the user interface. More complicated systems may use other input devices such as
voice or a computer interface. Simpler voice-mail systems may play the audio message
through the phone, while more advanced systems may have alternative delivery methods,
including email or text message delivery, message transfer and forwarding options, and
multiple mailboxes. The voice mailing system was built both for the desktop computers as
well as for mobile devices

10
 A central processor (CPU) which runs the operating system and a program (software) that
gives the system the look-and-feel of a voicemail system. This software includes thousands of
pre-recorded prompts that "speak" to the users as they interact with the system;
 Disk controller and multiple disk drives for message storage;
 System disks which not only include the software above, but also contain a complete
directory of all users with pertinent data about each (name, extension number, voice-mail
preferences, and pointers to each of the messages stored on the message disk that belong to
them);
 Telephone interface system that enables many phone lines to be connected to it.
 There is a long silence between the time a voice broadcast call is answered and the time the
message begins playing.

Background:

• In another article, we discuss how to determine whether a call is answered by a human or by


a voicemail system by analyzing the initial greeting of the recipient.

• Voice mail system tied to PBX or phone company (if CFB)


• Integration of video, fax, whiteboard?
• How to integrate with Internet telephony?
• How to integrate with email, web and other user applications?
• The analysis of the initial greeting (discussed above)
• NO initial greeting is given. For example, when testing a broadcast, you might not say
“Hello” since you expect a recording. This throws off the analyzer, which assumes a
voicemail system answered and waits longer.
• Silence in the message itself.
• Background noise on the recipient’s end may be the biggest cause. If the analyzer thinks that
background noise is part of the recipient’s greeting, it will continue analyzing until there is
silence. It will not start playing the voice message until it believes the initial greeting is
complete.
• Particularly in messages left on voicemail, there is more delay in the analysis of the greeting
due to the wide variety of voicemail systems. To make matters worse, since the systems may
wait up to 3 seconds after the mailbox greeting to play the tone, we must analyze for much
longer to verify the end of the voice activity prior to playing our voice message. It is also
worth noting here that some voicemail systems listen for too much silence at the beginning of
voicemail messages and may discard the voicemail messages if it contains too much initial
11
silence. This may explain why a voicemail message may not be deposited at all. Php is a web
base language so we can create a voice mail system in PHP.

Voice Mail System Modules: -

1. Home – Home page of Voice Mail site.


2. Login – User can login to start mail.
3. Register – From this page new user can register.
4. Inbox Page – Previously saved mail results can be viewed here and other links like
Logout.
5. Loginchk– checked register user.
6. Compose page.
7. Logout – User logged out from this site.

Functional or Specific Requirements

Required software is for conducting voice response mail system in which text convert
into speech &vice versa. The system should satisfy the following requirements:

Administrator Aspect

1. Taking backup of the database.


2. Editing/Deleting/Creating the database.
3. Adding or expelling user.
4. Changing the super password.

User Aspect

1. Logging into the system


2. Sending invitations to specific user by mail
3. Accepting registrations on mail system.
4. Adding the username to a group
5. Create/Edit/Delete username groups
6. Creating a mail.
7. Got proper output.

12
4.3 DESIGNING

In this system user interface is layout using Php (Html, CSS and JavaScript). My
system focuses more on efficiency in integrating API and IVR rather than the complete
perfect design of the system this because visually challenged individual does not bother
about the design as they cannot see what was there on the screen they give importance to
working.

Designing consists three parts: -

 Data flow diagram.


 ER diagram
 Use case diagram

4.3.1 Data flow diagram: -

There are two types of DFDs, both of which support a top-down approach to systems
analysis, whereby analysts begin by developing a general understanding of the system and
gradually break components out into greater detail:
 Logical data flow diagrams - are implementation-independent and describe the
system, rather than how activities are accomplished.

 Physical data flow diagrams - are implementation-dependent and describe the actual
entities (devices, department, people, etc.) involved in the current system. DFDs can
also be grouped together to represent a sub-system of the system being analyze

13
Figure - 03. A Data flow diagram levels(DFD)

Database design:

Database is recorded for storing mails which has been receive and is used to send to
respective individual with the help of interactive voice command. System database also
contain the records of the user for validation purpose such as individual name or email and
password.

Fig – 04. Level-0 DFD

14
System Design:

DFD-It is the level-1data flow diagram which gives detailed flow of activity in the system.

Fig - 05 – Level-1 DFD

4.3.2 ER Diagram

In software engineering, an entity–relationship model (ER model) is a data model for


describing the data or information aspects of a business domain or its process
requirements, in an abstract way that lends itself to ultimately being implemented in
a database such as a relational database. The main components of ER models are entities
(things) and the relationships that can exist among them.

15
Fig - 06 ER diagram

4.3.3 Use Case Diagram


In software and system engineering, a use case is a list of steps, typically defining
interactions between a role and a system, to achieve a goal. The actor can be a human, an external
system, or time.

Use Cases are an important requirement technique that has been widely used in modern
software engineering since their formal introduction by Ivar Jacobson in 1992. Use case driven
development is a key characteristic of process models and frameworks such as the unified
process (UP), rational unified process(RUP), and oracle unified method (OUM). With its
iterative and evolutionary nature, the use case is also a good fit for agile development. A use case is
a methodology used in system analysis to identify, clarify, and organize system requirements. The use
case is made up of a set of possible sequences of interactions between systems and users in a
particular environment and related to a particular goal. It consists of a group of elements (for example,
classes and interfaces) that can be used together in a way that will have an effect larger than the sum
of the separate elements combined. The use case should contain all system activities that have
significance to the users. A use case can be thought of as a collection of possible scenarios related to a
particular goal, indeed, the use case and goal are sometimes considered to be synonymous.

16
Fig – 07 Use case diagram

17
Chapter- V
Results & Discussion
RESULT AND DISCUSSION

To have a cryptographically protected email technology and make email security


more appealing to users, biometrics can be used. Humans have used body characteristics such
as face, voice, and gait for thousands of years to identify each other but only currently humans
started developing and utilize biometric based systems to authenticate individuals. Biometrics
is the science of deciding an identity based on the physical or behavioral characteristics of an
individual such as fingerprints, face, iris, hand vein, voice, keystroke, palm print, retina etc.
Biometric systems are essentially pattern recognition systems that take input as biometric
data, obtain a feature set from such data, and finally differentiate it with a template set stored
in a database. If the obtained feature set from the given input is proximate to a template set
stored in the database, then the user is permitted access. This approach uses fingerprint
recognition to authenticate users and provide them with a transparent process of signing and
verifying email messages. The idea is to enroll a user fingerprint, associate the fingerprint
with a record that is unique to that user, and finally use the users fingerprint and unique record
to authenticate the user, sign the users email message, and verify other users email messages.

To send emails from our email client, the use gmails SMTP server: smtp.gmail.com which is
listening on port 465 and to download emails to our email client, use gmails IMAP server:
imap.gmail.com which is listening on port 993. Furthermore, gmails mail servers make it
mandatory for email clients to set up a secure tunnel via SSL before making an effort to
communicate with them. Trusted Execution Environment (TEE) is a secure area of the Smart
phones main processor. It guarantees confidentiality and integrity of the code and data loaded
inside. This separation enables security and protection from hacks, malware and root access.
All fingerprint data manipulation is performed within TEE. All fingerprint data must be
secured within sensor hardware or trusted memory so that images of your fingerprint are
inaccessible. The fingerprint data can be stored on the file system only in encrypted form,
regardless of whether the file system itself is encrypted or not. The removal of the user must
result in removal of the user’s existing fingerprint data and the root access must not
compromise fingerprint data. Advantages of project are accessibility-ease of use, simple
layout, password protection, collaborative, personal safety, less interference, enlarge
messaged size.

18
Chapter- VI
Conclusion & Scope of
Future Enhancement
6.1. CONCLUSION
This project proposes an android application, designed specifically for visually
challenged people. This application provides a voice based mailing service where they could
read and send mail on their own, without any guidance. Here the users have to use certain
keywords which will perform certain actions for e.g. Received mails, send mails, Compose
Mail. VMAIL can be used by a blind person to access mails easily and efficiently. Thus
reliance of visually impaired on other people for their activities related to mail can be
reduced.

This paper is an attempt to bridge the gap between the Blind populations to
access essential electronic communication modes like e- Mail. We present both desktop as
well as mobile based architecture for the same. The system allows a Blind person to send
voice based e-Mails messages. This will reduce the extensive cognitive load taken by a Blind
to remember and type characters using a keyboard or a mobile keypad. Further, as messages
are sent via voice, it eliminates the lack of English language proficiency of a Blind person.

6.2 FUTURE ENHENCEMENT


For the further development of the application, the attachments like images,
word documents, audio and video files can be incorporated. Encryption and decryption
algorithm can use to protect the username and password that is passed during login. More
commands can be used to for different operations like search, mark important, delete,
archive, go back, report spam, forward. Automated replying to received mails can be also
integrated. The application can be adapted to different languages such that a variety of users
can use the application.

Speech recognition technology entered the public consciousness rather recently,

with the glossy launch events from the tech giants making worldwide headlines. The appeal is

instinctive; we are fascinated by machines that can understand us. From an anthropological

standpoint, we developed the spoken word long in advance of its written counterpart and we

can speak 150 words per minute, compared with the paltry 40 words the average person can

19
type in 60 seconds. In fact, communicating with technological devices via voice has become

so popular and natural that we may be justified in wondering why the world’s richest

companies are only bringing these services to us now. The history of the technology

reveals that speech recognition is far from a new preoccupation, even if the pace of

development has not always matched the level of interest in the topic. As we can see below,

major breakthroughs dating back to the 18th century have provided the platform for the digital

assistants we all know today.

20
BIBLIOGRAPHY

1. Abdel-Hamid, A. T., et al. (2004). A tool converting finite state machine to VHDL.
Electrical and Computer Engineering, 2004. Canadian Conference on, IEEE.

2. Lee, D. and M. Yannakakis (1994). "Testing finite-state machines: State identification


and verification." Computers, IEEE Transactions on 43(3): 306-320.

3. Zhang.W, Betz.V et al. (2012). Portable and Scalable FPGABased Acceleration of a


Direct Linear System Solver. ACM Transactions on Reconfigurable Technology and
Systems, Vol. 5, No. 1, Article 6, Publication date: March 2012.

4. Vol. 5, No. 1, Article 6, Publication date: March 2012 Lee, D. and M. Yannakakis
(1994). "Testing finite-state machines: State identification and verification."
Computers, IEEE Transactions on 43(3): 306-320.

5. Ling, A. P. A., et al. (2012). "Enhancing smart grid system processes via philosophy
of Security-case study based on information security systems." Journal of Wireless
Mobile Networks, Ubiquitous Computing, and Dependable Applications 3(3): 94-112

6. UmmuhanysifaU.,NizarBanu P K , “Voice Based Search Engine and Web page


Reader”. In Internationa Journal of Computational Engineering Research (IJCER).

21

You might also like