You are on page 1of 62

ABSTRACT

The only way speech and hearing-impaired people can communicate is by

using the sign language. The main problem with this kind of communication is that

the non-impaired people, who cannot understand the sign language, would not be able

to communicate with these people or vice versa. The project is intentionally designed

to allow deaf and dumb communities to convey messages and connect with the

society. It aims to bridge the gap between speech and hearing impaired people and the

non-impaired people. Speech impairment is a disability that affects an individual’s

ability to communicate effectively. Many existing studies have proposed methods for

sign language recognition The project uses a machine learning system to identify,

especially English alphabetic sign language, and convert it into text. The focus of this

work is to create a vision based application that offers American Sign Language

translation to text thus aiding communication between signers and non-signers. The

proposed model takes image sequences and extracts temporal and spatial features

from them.
CHAPTER 1

INTRODUCTION

1.1 BACKGROUND

The sign language is used widely by people who are deaf-dumb these are used as a
medium for communication. A sign language is nothing but composed of various
gestures formed by different shapes of hand, its movements, orientations as well as
the facial expressions. There are around 466 million people worldwide with hearing
loss and 34 million of these are children. `Deaf' people have very little or no hearing
ability .They use sign language for communication. People use different sign
languages in different parts of the world. Compared to spoken languages they are very
less in number. India has its own sign language by the name Indian Sign Language
(ISL). In developing countries there are only very few schools for deaf students.
Unemployment rate among adults with hearing loss are very high in developing
countries . Data from Ethnologue states that among deaf population in India, which is
about 1% of total population, literacy rate and number of children attending school is
very less. It goes on to state that official recognition of sign languages, increasing the
availability of interpreters and providing transcription in sign languages greatly
improve accessibility. Signs in sign languages are the equivalent of words in spoken
languages Signed languages appear to favor.
The associate editor coordinating the review of this manuscript and approving it for
publication was Weiyao Lin. Simultaneous sign internal modification, rather than the
concatenation of morphemes. But learners in the initial stages of SL learning use
iconicity as a mnemonic aid to remember new signs. Butthe lack of iconicity makes it
difficult to learn new signs for those who learn SL as a new language. Finger spelling
is the representation of the letters of a writing system and sometimes numeral
systems. Sign Language (ISL) can represent English alphabets A-Z using finger
spelling. It can be one handed or two handed andi ISL follows two handed style. It
issued to represent words that have no sign equivalent or used ito emphasize a word
Though finger spelling usage is less [7], [8] in casual signing, they are an important
component in sign i language learning. This project aims at identifying alphabets in
Indian Sign Language from the corresponding gestures. Gesture recognition and sign
language recognition has been a well researched topic for American Sign
Language(ASL), but few research works have been published regarding Indian Sign
Language(ISL). But instead of using high-end technology like gloves or kinect,
we aim to solve this problem using state of the art computer vision and machine
learning algorithms.

1.2 RELEVANCE

Communication is very crucial to human beings, as it enables us to express ourselves.


We communicate through speech, gestures, body language, reading, writing or
through visual aids, speech being one of the most commonly used among them.
However, unfortunately, for the speaking and hearing impaired minority, there is a
communication gap. Visual aids, or an interpreter, are used for communicating with
them. However, these methods are rather cumbersome and expensive, and can't be
used in an emergency. Sign Language chiefly uses manual communication to convey
meaning. This involves simultaneously combining hand shapes, orientations and
movement of the hands, arms or body to express the speaker's thoughts.
Sign Language consists of fingerspelling, which spells out words character by
character, and word level association which involves hand gestures that convey the
word meaning. Fingerspelling is a vital tool in sign language, as it enables the
communication of names, addresses and other words that do not carry a meaning in
word level association. In spite of this, fingerspelling is not widely used as it is
challenging to understand and difficult to use. Moreover, there is no universal sign
language and very few people know it, which makes it an inadequate alternative for
communication.
A system for sign language recognition that classifies finger spelling can solve this
problem. Various machine learning algorithms are used and their accuracies are
recorded and compared in this report.
1.3 PROJECT UNDERTAKEN

The main aim of this project is to recognize the Sign language Recognition Using
Machine Learning Algorithm

1.4 ORGANIZATION OF PROJECT REPORT

In chapter 1 first initial Stage is introduction which consists of Background of


system. Next part is Relevance of system which describes how efficient the outcome
of the project is expected to be with respect to a given goal. In chapter 2 literature
Survey enables you to find out what research has already been done and identify what
is unknown within your topic and makes you understand the topic clearly on which
you are willing to work on and makes the way clear to build new system with more
advanced and beneficial options with undergoing various papers established by
authors. chapter 3 describes about design and drawing which consists of block
diagram with detailed description of each block. Chapter 4 is all about implementation
of the system. Implementation is the phase where visions and plans become reality in
order to accomplish strategic objectives and goals. Chapter 5 consists of
Experimentation which means the phase wise plan executed from beginning to
develop the entire system and make it function accordingly which involves the
utilization of the methods and various functions. Chapter 6 is the last chapter which
conclusion restate the thesis, summarize the key supporting ideas that are discussed
throughout the work, and offer your final impression on the central idea.

1.5 SUMMARY

This chapters gives introduction about ISL and used different techniques, from
that techniques we have used one of technique for sign language.
CHAPTER 2

LITERATURE SURVEY
Paper [1] demonstrates, a hand free demonstration of Taiwanese data language which
uses the wireless system to process the data. To differentiate hand motion, they have
inner sensors put into gloves to show the parameters as given by, posture, orientation,
motion, defined of the hand in Taiwanese Sign Language could be recognize in no
error. The hand gesture is considered by flex inner sensor and the palm size
considered using the g sensor and the movement is considered using the gyroscope.
Input signals would have to be consider for testing for the sign to be legal or not
periodically. As the signal which was sampled can stay longer than the pre-set time,
the legal gesture sent using phone via connectivity like Bluetooth for differentiating
gestures and translates it. With the proposed architecture and algorithm, the accuracy
for gesture recognition is quite satisfactory. As demonstrated the result get the
accuracy of 94% with the concurrent architecture.

Having a real-time sign language detector increases the efficiency of the community
to able to in contact with people having disabilities like hearing and deaf society.
Authors [2] have using machine learning algorithms presented the idea of a translation
with skin colour tone to detect the ASL. They have made a skin colour segmentation
that automatically depicts the colour and give the tune to it for further detection. They
have used YCbCr spacing of colour as its vastly used in video template code and
gives the efficient results of colour tone for human skin. Further they have taken the
CbCr plane to distribute the skin tone colour. People from Different ethnicity have
their tones different which is crafted in a model. Deep Learning methods and several
machine learning algorithms are used to demonstrate translator to translate between
parties.

Authors of paper [3] applied a method of using a synthetic named animation making
approach they have converted Malayalam language to Indian sign language. The
intermediate representation in this method for sign language is being used by
HamNoSys. In this method the application accepts some sets of words, say, either one
or more and forms It in animated portion. Theres an interactive system which further
converts the portion of words in to HamNoSys designed structure. Its application pars
everything that has been designed as it used by Kerala government to teach about sign
language and subtle awareness.

Having to communicate between deaf people and normal public has become a
difficult task now days and to implement a such as the society lacks a good translator
for it and having an app for it in our mobile phones is like having a dream at day.
Authors [4] have proposed something great for the deaf community or hearing aid
community by providing an app for the communication. But making an app for it is
no simple task at it requires lot of efforts like memory utilization and a perfectly fined
design to implement a such. What their application does is that they take a pictureof a
sign gesture and later converts is to a meaningful word. At first, they have compared
the gesture using histogram that has been related to the sample test and moreover
samples that are obliged to BRIEF to basically reduce the weight on the CPU and its
time. They have explained a process on which on their app, its very easy to add up a
gesture and store it in their database for further and expand detection set. So lastly,
they came strong with having an app as a translator instead of several applications that
are being used lately by users.

This paper [5] is completely based on a Spanish speaking language which converts the
basic words into the Spanish language which is good for Spanish deaf people as it will
provide them a stance to understand the sign language at pace as itll be converted in a
Spanish language rather than in English which is popularly used as ASL. The device
or an application that they have made for this comprises of many terms such as visible
interface which is used by the deaf person to specify the sequence of sign data, a
translator, which simply converts those series in Spanish based language in a formed
series, and convertor to speech, which basically converts those entire bits into a
meaningful sentence in Spanish, of course. They mainly focus on the interface which
is designed visually for the impaired which has shown many ways to writing the sign
language in a real time.

The authors [6] have built a system which works in a continuous manner in which the
sign language gesture series is provided to make a automate training set and providing
the spots sign from the set from training. They have proposed a system with instance
learning as density matrix algorithm that supervises the sentence and figures out the
compound sign gesture related to it with a supervision of noisy texts. The set at first
that they had used to show the continuous data stream of words is further taken as a
training set for recognizing the gesture posture. They have experimented this set on a
confined set of automated data that is used for training of them, identification for them
and detection stored a subtle sign data to them. It has been stored around thirty sign
language data that was extracted from the designed proposal.

 Further the authors [7] explained, the lack of automated structure to translate
symptoms from LSM makes integration of listening to-impaired human beings to
society extra difficult. This painting affords a totally new technique for LSM
alphanumerical signs popularity based on 3D Haar- like features extracted from depth
pictures captured by means of the Microsoft Kinect sensor. Features are processed
with a boosting set of policies. To observe normal performance of our technique, we
Identified a tough and speedy sign from letters and numbers, and in comparison, the
results with the use of traditional 2D Haar-like capabilities. Our gadget is capable of
recognize static LSM signs and signs with a higher accuracy percentage than the one
obtained with extensively used 2D features.

As It has been preferred for a society that having a sign language for hearing impaired
and deaf people to communicate. As coming of several technologies in the

past, its been kind of easy to have a translator which converts the sign language to the
appropriate sentence and quite popular too. As they have shown this in their paper [8],
its firstly based on an Arabic sign language which automates the process of being
translated on to give a subtle way of communication and further they have shown that
the scope of their project apars the usage and defined set of measurements. The
application directly converts the Arabic sign language into a meaningful sentence by
applying an automated Machine learning algorithm as they concluded.

Authors of the paper [9][18] have presented multiple experiments to design a


statistical model for deaf people for the conversion to sign language from the speech
set. They have further made the system that automates the speech recognition by ASR
by the help of animated demonstration and translation statistical module for multiple
sets of signs. As they went ahead, they used the following approaches for the
translation process, i.e., state transducer and phrase defined system. As of evaluation
certain figures type have been followed: WER, BLEU after that comes the NIST. This
paper demonstrates the process that translates the speech by automation recognizer
having all three mentioned configurations. The paper came up with the result with
finite type state transducer having the word error rate among the range of 28.21% and
29.27% for the output of ASR.
Summary of Literature Survey
S Paper Year of Author Specificat
r publicat (s) ion
. ion
n
o
7 Conversio 2018 Victoria In this paper
. n of Sign Adebim the success
Language pe of this work
To Text Adewale can be
And Adejoke attributed to
Speech O the effective
Using Olamiti classificatio
Machine n that has
Learning improved
Technique the
s unsupervise
d feature
learning of
different
images.
8 Automated 2019 Ritika This paper
. Speech to Bharti is focused to
Sign Sarthak develop an
language Yadav automated
Conversio Sourav software
n using Gupta system to
Google Rajitha convert
API and B speech to
NLP sign
language so
that the
words of a
normal
person can
be conveyed
to a
deaf/dumb
person.
9 Sign 2020 Ankit The
. Language Ojha, proposed
to Text Ayush system
and Pandey, intends to
Speech Shubha understand
Translatio m some very
n in Real Maurya, fundamental
Time Abhishe elements of
Using k signal
Convoluti Thakur, language
onal Dr. and to
Neural Dayanan translate
Network da P them to text
and audio.

CHAPTER 3

DESIGN AND DRAWING

Browse Image Database with


multiple sign

Pre-processing
Pre-processing

Feature Machine
Feature
Extraction learning
Extraction
Module

Audio/Text
OUTPUT
Fig : Block Diagram of Indian Sign Language

Training on skin segmentation dataset


We used the skin segmentation dataset from UCI containing about 2,00,000 points for
training using learning algorithms like SVM and Random Forest. The trained models
are then used to segment out the non-skin classified pixels.

Feature Extraction
As describing our own features may not result in higher efficiency, we started with
features as it computes the key points in the image which is more apt than describing
features manually. So, after the skin segmented images were obtained using the
model, we used the following approaches for extracting feature vectors.

Image Preprocessing
Image preprocessing contains cropping, filtering, brightness &contrast adjustment &
many more. To do such process Image enhancement, Image cropping & Image
Segmentation methods are used. Captured Images are in the form of RGB. So the first
step is to convert RGB images to binary images then cropping of image is to be done
so that unwanted part of i images can be removed. And now enhancement can be done
in certain selected area. In Image segmentation, Edge detection method is used which
can detect the boundary of cropped images which is further used for feature extraction
method.

Machine Learning on Feature Vectors


But before we obtained those best results, we explored the following algorithms on
the obtained feature
vectors. Multiclass SVM with linear kernel was used with almost every feature vector.
Overall the following approaches were tried.
Table I. Comparison of features matching with database

The above table shows the number of points a gesture is matching with the features of
stored database. For example, the first colunm gesture which is showed is Indian Sign
language 'A', and it's clearly observed that there are 284 points matched with A
database. If any alphabet is given as input then the corresponding alphabet would
have highest number of matching point which enables us to display the equivalent text
result.

Support Vector Machines


Multiclass SVMs were tried on all the feature vectors. Results obtained with linear
kernel and four fold Cross Validated accuracies are reported for all feature vectors.
The confusion matrices shown in the results sections below correspond to the
different techniques tried using linear kernel Multi Class SVMs. The best accuracies
were observed for this algorithm. Our try with ’rbf’ kernel failed miserably on HOG
feature vectors as only 4.76% accuracy was observed.

Random Forest
Since this was a 26 class problem, we tried our luck at Random Forest with HOG
feature vectors on the compressed images. It fell a little short of the Multiclass SVM
with 46.45% 4 fold CV accuracy. Our interpretation is that implementation of
decision trees in python is monothetic which may have led to formation of rectangular
regions whereas the actual boundaries may not have been rectangular.

Hierarchical Classification
One of the major reasons for the comparatively lower accuracy is the large number of
classes(26). So one approach we tried was breaking the classification problem into
multiple levels or hierarchical classification . First we train a linear kernel SVM
model to classify alphabets as one handed or two handed. This model performed with
95% accuracy. Then we trained linear kernel Multiclass SVM models to classify the
one handed alphabets(56% accuracy) and two handed alphabets(60% accuracy) and
then put the system together. An alphabet is first classified as one handed or two
handed, and then depending on the classification, is put into the corresponding model
and given a label. Even though the individual models performed better than the direct
multiclass SVM on HOG features, overall the performance was nearly the same and
four fold CV accuracy of 53.23% was observed.
ALGORITHM:
SVM is a Support Vector Machine:
According to Wikipedia, SVM is a supervised machine learning model with
associated learning analysis data.
 In this given a set of training example, we divide data into two classes on the basis
of its labeling. If data is labeled it is put in category of supervised else in the category
of unsupervised.
 When data is labeled then supervised SVM can be used, else SVM is not possible.
In case of unsupervised data SVM clustering algorithm is used. Uses of SVM:
 They are used in text and hypertext classification.
 SVM is used in hand written characters Recognization.
 They are used in image classification.
Random Forest:

Random Forest is a popular machine learning algorithm that belongs to the supervised
learning technique. It can be used for both Classification and Regression problems in
ML. It is based on the concept of ensemble learning, which is a process of combining
multiple classifiers to solve a complex problem and to improve the performance of the
model.

As the name suggests, "Random Forest is a classifier that contains a number of


decision trees on various subsets of the given dataset and takes the average to improve
the predictive accuracy of that dataset." Instead of relying on one decision tree, the
random forest takes the prediction from each tree and based on the majority votes of
predictions, and it predicts the final output.

Since this was a 26 class problem, we tried our luck at Random Forest with HOG
feature vectors on the compressed images. It fell a little short of the Multiclass SVM
with46.45% 4 fold CV accuracy. Our in perpetration is that implementation of
decision trees in python is monothetic which may have led to formation of rectangular
regions whereas the actual boundaries may not have been rectangular.
Logistic Regression:
Logistic regression is very popular in machine learning and statistics. It can work
on both binary and multiclass classification very well. I wrote tutorials on both
binary and multiclass classification with logistic regression before. This article will be
focused on image classification with logistic regression.
o Logistic regression is one of the most popular Machine Learning algorithms,
which comes under the Supervised Learning technique. It is used for
predicting the categorical dependent variable using a given set of independent
variables.
o Logistic regression predicts the output of a categorical dependent variable.
Therefore the outcome must be a categorical or discrete value. It can be either
Yes or No, 0 or 1, true or False, etc. but instead of giving the exact value as 0
and 1, it gives the probabilistic values which lie between 0 and 1.
o Logistic Regression is much similar to the Linear Regression except that how
they are used. Linear Regression is used for solving Regression problems,
whereas Logistic regression is used for solving the classification problems.
o In Logistic regression, instead of fitting a regression line, we fit an "S" shaped
logistic function, which predicts two maximum values (0 or 1).
o The curve from the logistic function indicates the likelihood of something such
as whether the cells are cancerous or not, a mouse is obese or not based on its
weight, etc.
o Logistic Regression is a significant machine learning algorithm because it has
the ability to provide probabilities and classify new data using continuous and
discrete datasets.

store them in MATLAB’s memory for labeling. The


CHAPTER 4

IMPLEMENTATION

4.1 SOFTWARE SPECIFICATION

Image processing library: OpenCV 4.1.1

Open source Computer Vision (OpenCV) is an image processing and computer vision
library mainly developed for artificial vision. It has a BSD license (free for
commercial or research use). OpenCV was originaly written in C, but currently, it's a
whole C++ interface, and there's additionally an entire Python interface to the library.
Open-source computer Vision Library, also called OpenCV, is associated with a
freeware software package aimed toward computer vision. It is used in this project
because of its versatility and the fact that it has a C++ interface. OpenCV runs on
most major Operating Systems (OS), making it worthwhile to use another computer to
program or test.

4.1.1. SOFTWARE REQUIREMENT


The application will give the desired results only if the specified software
requirements are satisfied. The backend coding is done in Python and JavaScript. The
client or the web browser sends a POST request containing the data. The server
processes the request and sends response back to client.

4.1.2. Language: Python 3.8


Python is a high-level programming language extensively used for programming.
Python, an interpreted language, supports several programming scripts and a syntax
that allows you to use programs in most languages such as C ++ or Java. The
language provides constructions designed to permit clear programs at each scale.
Python is easy and simple to know, the python code is way easier than alternative
languages.
Installation
I. Click the download button and you will see Python 3.8. ...
II. Click Python 3.8. ...
III. Next, right click the mouse button you will see open button click to open.
IV. Enable to add Python 3.8 to path and click install now.
V. Wait a few minutes and display setup was successful.
CHAPTER 5

EXPERIMENTATION
CHAPTER 6

RESULTS AND DESCUSSION

The preprocessed data is passed through several classifiers (Random Forests, Support
Vector Machines, Logistic Regression, Multilayer Perceptron) to draw effective
results. The accuracy of the new models has been found significantly higher than the
existing model.
Various types of techniques can be used to implement the classification and
recognition of images using machine learning. Apart from recognizing static images,
work has been done in the field of depth-camera sensing and video processing. A
diversity of processes embedded in the system was developed using various other
programming languages to implement the procedural techniques for the final system's
maximum efficacy. The problem can be solved and systematically organized into
three similar approaches which are, firstly using static image recognition techniques
and preprocessing procedures.
Output:- Trained model will recognize which character is there and then it will
convert text to speech using this speaker will recognize which character is there.
CHAPTER 7

CONCLUSION

In this work, we have gone through an automatic sign language gesture recognition
system in real-time, using different tools. Although our proposed work expected to
recognized the sign language and convert it into the text, there’s still a lot of scope for
possible future work.
Thus system was developed to translate the double handed Indian Sign Language into
both text and speech This system helps and aid the hearing impaired and mute people
to live independently. It develops confidence and will power to share their emotions,
thoughts, ideas and difficulties with the nominal people in the society. This eliminates
the gaps among the people and achieve better society This system is also useful to all
the people in the society gets as through this speech translation is possible, system
output can be obtained in different languages.
CHAPTER 8

REFERENCES

[I] MJerin Jose V.Priyadharshni et.al, "Indian Sign Language (ISL) Translation
Systern For Sign Language Learning,"IJIRD, vol. 2, May,2013, pp. 358-365.

[2] KonduruSatheesh Kumar Raju Sunny ArokiaSwamy B Anil Kumar G S


KusumikaKrori Dutta, "Indian Sign Language to Speech," IJAER, vol.8 issue VI,
Decernber, 2014, pp. 6-12.

[3] Praveenkumar S HavalagiShruthiUrfNivedita, "The Amazing Data Gloves that


give voice to the voiceless," IJAET, vol. 6, issue I,March,2013,pp. 471-480.

[4] ArtiThorat, VarshaSatpute, AratiNehe, TejashriAtre, Yogesh R Ngargoje, "Indian


Sign Language Recognition Systern for Deaf People," IJARCCE, vol.3, issue
3,March,2014.

[5] Divya S, Kiruthika, S Nivin Anton A L and Padmavahi S, 'Segmentation,


Tracking And Feature Extraction For Indian SignLanguage Recognition," IJCSA,
vol.4, no.2, April,2014, pp. 57- 72.

[6] YeUapuMadhuri, Anitha G, Anburajan MI, "Vision-Based Sign language


Translation Device," International Conference on Infonnation Communication and
Embedded Systerns (ICICES), IEEE, 2013, pp. 565- 568.

[7] Shi, 1., and C. Tomasi, "Good Features to Track," Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, June 1994, pp. 593600

[8] Rajam P S, Balakrishnan G,"Real Time Indian Sign Language Recognition


Systern to aid deaf-dumb people", Communication Technology (ICCn, 2011 IEEE
13th International Conference, pp. 737- 742.
[9] M.W. Kadous, "Machine recognition of Australian signs using power gloves:
Toward large-lexicon recognition of sign language," Proc. Workshop Integration
Gesture Language Speech, pp. 165-174, 1996.
[10] Geetha M, Manjusha U. C, "A Vision Based Recognition of Indian Sign
Language Alphabets and Numerals Using B-Spline Approximation" International
Journal on Computer Science and Engineering (DCSE), March 2012.

[II] A Park, S. Yun, 1. Kim, S. Min, and K Jung. "Real time vision-based Korean
finger spelling recognition system". Proc. World Acaderny of SET, 34:293298, 2008.

[12] R. Rokade, D. Doye, and M. Kokare, "Hand Gesture Recognition by Thinning


Method" International Conference on Digital Image Processing (2009).

[13] Nadia R. Aibelwi, Yasser M. Aiginahi, "Real-Time Arabic Sign Language


(ArSL) Recognition" International Conference on Communications and Infonnation
Technology 2012.

[14] Rekha, K; Latha, B. "Mobile Translation System from Speech Language to Hand
Motion Language", Intelligent Computing Applications (ICICA), 2014 International
Conference on, On page(s): 411-415.

[15] Stolcke A. “SRILM – An Extensible Language Modelling Toolkit” Intl. Conf. on


Spoken Language Processing, 2002.

[16] Och J., Ney H. "Improved Statistical Alignment Models". Proc. of the 38th
Annual Meeting of the Association for Computational Linguistics, pp. 440-447,
Hongkong, China, Octubre 2000.

[17] http://www.statmt.org/moses

[18] Vidal E., Casacuberta F, García P. “Gramatical Inferrence and Automatic Speech
Recognition”. New Advances and Trends in Speech Recognition and Coding (volume
147 of NATO-ASI Series F: Casacuberta and Vidal
[19] Papineni, K., Roukos, S., Ward, T., and Zhu, W. J. "BLEU: a method for
automatic evaluation of machine translation" in ACL-2002: 40th Annual meeting of
the Association for Computational Linguistics pp. 311-318.

[20] http://www.nist.gov/speech/tests/mt/

Chapter 3

SOFTWARE REQUIREMENTS
SPECIFICATIONS

3.1 ASSUMPTIONS AND DEPENDENCIES

End User application will be developed in Windows OS.

Database will be in MySQL.

All paython code shall conform to the python 3.0.

All scripts shall be written in python.

Application design pattern shall be Singleton.

3.2 FUNCTIONAL REQUIREMENTS

The application is user friendly.


It provides an easy interface to user.

The accessibility or response time of the application should be fast.

Performance of the system is appropriate.

3.2.1 System Feature 1(Functional Requirement) User Classes

and Characteristics

3.3 EXTERNAL INTERFACE REQUIREMENTS

3.3.1 User Interface

Login

Open CV

View Result

3.3.2 Hardware Interface

System : Pentium IV 2.4 GHz.

Hard Disk : 40 GB.

Floppy Drive : 1.44 Mb.

Monitor : 15 VGA Colour.

Mouse : Logitech.

Ram : 512 Mb.

3.3.3 Database Requirements

MySQL :
MySQL, the most popular Open Source SQL database management system, is
developed, distributed, and supported by Oracle Corporation. The MySQL Web site
(http://www.mysql.com/) provides the latest information about MySQL software.
MySQL is database software which is used to store all database related activities
regarding to the project and it is easily stored and retrieve the data.

Technology Used:

PYTHON
Python is a high-level, interpreted, interactive and object-oriented scripting language.
Python is designed to be highly readable. It uses English keywords frequently where
as other languages use punctuation, and it has fewer syntactical constructions than
other languages.

 Python is Interpreted − Python is processed at runtime by the interpreter.


You do not need to compile your program before executing it. This is similar
to PERL and PHP.

 Python is Interactive − You can actually sit at a Python prompt and interact
with the interpreter directly to write your programs.

 Python is Object-Oriented − Python supports Object-Oriented style or


technique of programming that encapsulates code within objects.

 Python is a Beginner's Language − Python is a great language for the


beginner-level programmers and supports the development of a wide range of
applications from simple text processing to WWW browsers to games.

History of Python
Python was developed by Guido van Rossum in the late eighties and early nineties at
the National Research Institute for Mathematics and Computer Science in the
Netherlands.

Python is derived from many other languages, including ABC, Modula-3, C, C++,
Algol-68, SmallTalk, and Unix shell and other scripting languages.
Python is copyrighted. Like Perl, Python source code is now available under the
GNU General Public License (GPL).

Python is now maintained by a core development team at the institute, although


Guido van Rossum still holds a vital role in directing its progress.

Python Features
Python's features include −

 Easy-to-learn − Python has few keywords, simple structure, and a clearly


defined syntax. This allows the student to pick up the language quickly.

 Easy-to-read − Python code is more clearly defined and visible to the eyes.

 Easy-to-maintain − Python's source code is fairly easy-to-maintain.

 A broad standard library − Python's bulk of the library is very portable and
cross-platform compatible on UNIX, Windows, and Macintosh.

 Interactive Mode − Python has support for an interactive mode which allows
interactive testing and debugging of snippets of code.

 Portable − Python can run on a wide variety of hardware platforms and has
the same interface on all platforms.

 Extendable − You can add low-level modules to the Python interpreter. These
modules enable programmers to add to or customize their tools to be more
efficient.

 Databases − Python provides interfaces to all major commercial databases.

 GUI Programming − Python supports GUI applications that can be created


and ported to many system calls, libraries and windows systems, such as
Windows MFC, Macintosh, and the X Window system of Unix.

 Scalable − Python provides a better structure and support for large programs
than shell scripting.

Apart from the above-mentioned features, Python has a big list of good features, few
are listed below −

 It supports functional and structured programming methods as well as OOP.


 It can be used as a scripting language or can be compiled to byte-code for
building large applications.

 It provides very high-level dynamic data types and supports dynamic type
checking.

 It supports automatic garbage collection.

 It can be easily integrated with C, C++, COM, ActiveX, CORBA, and Java.

Python is available on a wide variety of platforms including Linux and Mac OS X.


Let's understand how to set up our Python environment.

Local Environment Setup


Open a terminal window and type "python" to find out if it is already installed and
which version is installed.

 Unix (Solaris, Linux, FreeBSD, AIX, HP/UX, SunOS, IRIX, etc.)

 Win 9x/NT/2000

 Macintosh (Intel, PPC, 68K)

 OS/2

 DOS (multiple versions)

 PalmOS

 Nokia mobile phones

 Windows CE

 Acorn/RISC OS

 BeOS

 Amiga

 VMS/OpenVMS

 QNX

 VxWorks

 Psion

 Python has also been ported to the Java and .NET virtual machines
Getting Python
The most up-to-date and current source code, binaries, documentation, news, etc., is
available on the official website of Python https://www.python.org/

You can download Python documentation from https://www.python.org/doc/. The


documentation is available in HTML, PDF, and PostScript formats.

Installing Python

The Python download requires about 25 Mb of disk space; keep it on your


machine, in case you need to re-install Python. When installed, Python
requires about an additional 90 Mb of disk space.

Downloading python

Click Python Download.

The following page will appear in your browser.


2. Click the Download Python 3.7.0 button.

The file named python-3.7.0.exe should start downloading into your


standard download folder. This file is about 30 Mb so it might take a while
to download fully if you are on a slow internet connection (it took me about
10 seconds over a cable modem).

The file should appear as

1. Move this file to a more permanent location, so that you can


install Python (and reinstall it easily later, if necessary).
2. Feel free to explore this webpage further; if you want to just
continue the installation, you can terminate the tab browsing
this webpage.
3. Start the Installing instructions directly below.

Installing
1. Double-click the icon labeling the file python-3.7.0.exe.

An Open File - Security Warning pop-up window will appear.

2. Click Run.

A Python 3.7.0 (32-bit) Setup pop-up window will appear.


Ensure that the Install launcher for all users (recommended) and
the Add Python 3.7 to PATH checkboxes at the bottom are checked.

If the Python Installer finds an earlier version of Python installed on


your computer, the Install Now message may instead appear
as Upgrade Now (and the checkboxes will not appear).

3. Highlight the Install Now (or Upgrade Now) message, and then


click it.

A User Account Conrol pop-up window will appear, posing the


question Do you want the allow the following program to make
changes to this computer?
4. Click the Yes button.

A new Python 3.7.0 (32-bit) Setup pop-up window will appear with


a Setup Progress message and a progress bar.

During installation, it will show the various components it is installing and


move the progress bar towards completion. Soon, a new Python 3.7.0 (32-
bit) Setup pop-up window will appear with a Setup was
successfuly message.
5. Click the Close button.

Python is installed successfully.

Setting up PATH
Programs and other executable files can be in many directories, so operating systems
provide a search path that lists the directories that the OS searches for executables.

The path is stored in an environment variable, which is a named string maintained by


the operating system. This variable contains information available to the command
shell and other programs.

The path variable is named as PATH in Unix or Path in Windows (Unix is case


sensitive; Windows is not).

In Mac OS, the installer handles the path details. To invoke the Python interpreter
from any particular directory, you must add the Python directory to your path.

Setting path at Windows


To add the Python directory to the path for a particular session in Windows −

At the command prompt − type path %path%;C:\Python and press Enter.


Note − C:\Python is the path of the Python directory

Python Environment Variables


Here are important environment variables, which can be recognized by Python −

Sr.No. Variable & Description

1 PYTHONPATH

It has a role similar to PATH. This variable tells the Python


interpreter where to locate the module files imported into a
program. It should include the Python source library directory and
the directories containing Python source code. PYTHONPATH is
sometimes preset by the Python installer.

2 PYTHONSTARTUP

It contains the path of an initialization file containing Python


source code. It is executed every time you start the interpreter. It is
named as .pythonrc.py in Unix and it contains commands that load
utilities or modify PYTHONPATH.

3 PYTHONCASEOK

It is used in Windows to instruct Python to find the first case-


insensitive match in an import statement. Set this variable to any
value to activate it.

4 PYTHONHOME

It is an alternative module search path. It is usually embedded in


the PYTHONSTARTUP or PYTHONPATH directories to make
switching module libraries easy.

Running Python
There are three different ways to start Python −
Interactive Interpreter
You can start Python from Unix, DOS, or any other system that provides you a
command-line interpreter or shell window.

Enter python the command line.

Start coding right away in the interactive interpreter.

$python # Unix/Linux
or
python% # Unix/Linux
or
C:> python # Windows/DOS

Here is the list of all the available command line options −

Sr.No. Option & Description

1 -d

It provides debug output.

2 -O

It generates optimized bytecode (resulting in .pyo files).

3 -S

Do not run import site to look for Python paths on startup.

4 -v

verbose output (detailed trace on import statements).

5 -X

disable class-based built-in exceptions (just use strings); obsolete


starting with version 1.6.
6 -c cmd

run Python script sent in as cmd string

7 file

run Python script from given file

Script from the Command-line


A Python script can be executed at command line by invoking the interpreter on your
application, as in the following −

$python script.py # Unix/Linux

or

python% script.py # Unix/Linux

or

C: >python script.py # Windows/DOS

Note − Be sure the file permission mode allows execution.

Integrated Development Environment


You can run Python from a Graphical User Interface (GUI) environment as well, if
you have a GUI application on your system that supports Python.

 Unix − IDLE is the very first Unix IDE for Python.

 Windows − PythonWin is the first Windows interface for Python and is an


IDE with a GUI.

 Macintosh − The Macintosh version of Python along with the IDLE IDE is
available from the main website, downloadable as either MacBinary or
BinHex'd files.

If you are not able to set up the environment properly, then you can take help from
your system admin. Make sure the Python environment is properly set up and
working perfectly fine.

CNN Algorithm
Notations:
 W: input volume size
 F: receptive field size of the Conv Layer
 S: stride
 P: amount of zero padding used
 W, H, D: width, height and depth
Algorithm:
The Convolutional Layer:
The Conv layer is the core building block of a Convolutional Network that does most
of the computational heavy lifting. To summarize, the Conv Layer:
 Accepts a volume of size W1×H1×D1

 Requires four hyperparameters:


o Number of filters K,
o their spatial extent F,
o the stride S,
o the amount of zero padding P.
 Produces a volume of size W2×H2×D2 where:
o W2=(W1−F+2P)/S+1
o H2=(H1−F+2P)/S+1 (i.e. width and height are computed equally by
symmetry)
o D2=K
 With parameter sharing, it introduces F⋅F⋅D1 weights per filter, for a total
of (F⋅F⋅D1)⋅K weights and K biases.
 In the output volume, the d-th depth slice (of size W2×H2) is the result of
performing a valid convolution of the dd-th filter over the input volume with a
stride of S, and then offset by dd-th bias.

Pooling Layer:
 Its function is to progressively reduce the spatial size of the representation to
reduce the number of parameters and computation in the network, and hence to
also control overfitting.
 More generally, the pooling layer:
 Accepts a volume of size W1×H1×D1

 Requires two hyperparameters:


o their spatial extent F,
o the stride S,
 Produces a volume of size W2×H2×D2 where:
o W2=(W1−F)/S+1
o H2=(H1−F)/S+1
o D2=D1
 Introduces zero parameters since it computes a fixed function of the input
 Note that it is not common to use zero-padding for Pooling layers
It is worth noting that there are only two commonly seen variations of the max
pooling layer found in practice: A pooling layer with F=3, S=2 (also called
overlapping pooling), and more commonly F=2, S=2. Pooling sizes with larger
receptive fields are too destructive.

Chapter 5 Project Plan

5.1 PROJECT ESTIMATE

5.1.1 Reconciled Estimates

5.1.1.1 Cost Estimate

Cost of project C=N*Cp C=3*8000 C=24,000


The Cost of the project is approximately up to 24000/-.

5.1.1.2 Time Estimates Line of Code (LoC):

Estimating LOC for this project is difficult at estimation stages this project is
of innovative type project. Average estimation of this project is 10000 to
12000 line of code.
LOC based Estimation:

Efforts in Person in months

E = 3:2 (KLOC)1:05
E = 3:2 9:01:05to11:0 4:21:05

Function Estimated KLOC

GUI design 1.1-1.3

Logical code 1.5-2.0

Location Based 1.1-1.3


code

Directory 1.0-1.3
matching code

Business logic 2.2-2.5

Testing 1.1-1.2

Re-correct Code 1.0-1.2

Total 9.0-10.11

5.1.1.3 Man Month Utilization:

Estimation of the man month is divide into following sub activities:


1- Technical training of the team member: This will take nearly 1 months.
This will include Advance java, mysql, serialization etc.
2- Research: Being an innovative project research for the project is an
important part currently it seems to have 1 to 1.5 months

5.1.2 Project Resources

Hardware Resources Required:


1. Processor: Intel i3

2. Hard Disk: Minimum 100GB

3. RAM: 4GB

Software Resources Required:


1. Platform: Windows7 and above.

2. Backend: Mysql 5.5.0

3. Front End: JAVA (J2EE).

5.2 RISK MANAGEMENT

In appropriate dataset -To overcome this risk we are trying to use well
orga- nized and complete dataset.

Security- To overcome and improving security we use multilevel


security like access permissions of user.

When solving problems we have to decide the difficulty level of our problem.
There are three types of classes provided for that. These are as follows:

P class

NP-Hard Class

NP Complete Class

P Class:-
In computational complexity theory, P, also known as PTIME or
DTIME(nO(1)), is a fundamental complexity class. It contains all decision
problems that can be solved by a deterministic Turing machine using a
polynomial amount of computation time, or polynomial time.P class problems
are deterministic problems i.e. P class prob- lems can be solve by
deterministic Turing Machine.
Np Class:-
In computational complexity theory Equivalently, the formal definition of NP
is the set of decision problems solvable in polynomial time by a theoretical non-
deterministic Turing machine. This second definition is the basis for the
abbreviation NP, which stands for ”nondeterministic, polynomial time.”
However, the verifier-based defini- tion tends to be more intuitive and
practical in common applications compared to the formal machine definition.
The two definitions are equivalent because the algorithm for the machine
definition consists of two phases, the first of which consists of a

guess about the solution, which is generated in a non-deterministic way, while


the second phase consists of a deterministic algorithm that verifies or rejects
the guess as a valid solution to the problem.

3. NP Hard Class:-

NP-hardness stands for Non-deterministic polynomial-time hard.

Informally, ”at least as hard as the hardest problems in NP” are called
as NP hard class problem.

5.2.1 Risk Identification

For risks identification, review of scope document, requirements


specifications and schedule is done.

1. Have top software and customer managers formally committed to


support the project?
Ans: All the required softwares are freely available and hence
development will be possible.

2. Are end-users enthusiastically committed to the project and the


system/product to be built?
ans: The end user will be developers itself.

3. Are requirements fully understood by the software engineering team


and its customers?
Ans: Yes. All the requirements are fully understood by our team.

4. Have customers been involved fully in the definition of requirements?


Ans: This is academic level project. So that whatever requirement be
specify it should be by our team members and our guide.

5. Do end-users have realistic expectations? Ans: Yes.

6. Does the software engineering team have the right mix of skills? Ans:
Yes, we have.

7. Are project requirements stable?


Ans: All the basic requirements for this project are stable, from though
some being variable but can be fulfilled.

8. Is the number of people on the project team adequate to do the job?


Ans: Yes.

9. Do all customer/user constituencies agree on the importance of the


project and on the requirements for the system/product to be built?
Ans: Yes.

5.2.2 Risk Analysis

The risks for the Project can be analyzed within the constraints of time and quality.
Impact
I Risk Description Prob
D abili Sc Q O
ty he u v
du al e
le it r
y a
ll
1 Deadline Risk me Lo H H
diu w ig i
m h g
h
2 Technical skill Risk me Lo H H
diu w ig i
m h g
h
3 Hardware Failure Risk hig hi m h
h gh e i
di g
u h
m
4 Accuracy Risk me me lo h
diu di w i
m u g
m h

Table 5.1: Risk Table

Prob Value Desc


abili riptio
ty n
High Probability of >
occurrence is 75%
Med Probability of 26
ium occurrence is 75%
Low Probability of <
occurrence is 25%

Table 5.2: Risk Probability definitions

5.2.3 Overview of Risk Mitigation, Monitoring, Management

Following are the details for each risk.


Im V Description
pac al
t u
e
Ver > Schedule impact or Unacceptable quality
y 1
hig 0
h %
Hig 5 Schedule impact or Some parts of the project
h 1 have low quality
0
%
Me < Schedule impact or Barely noticeable degradation
diu 5 in qual- ity Low Impact on schedule or Quality can
m % be incorporated

Table 5.3: Risk Impact definitions


Risk ID 1
Risk Development Deadline Risk
Descriptio
n
Category Development Environment.
Source Software requirement Specification document.
Probabilit Low
y
Impact High
Response Mitigate
Strategy Team Work distribution and Task plan.
Risk Occurred
Status

Risk ID 2
Risk Technical skill risk
Descriptio
n
Category Requirements
Source Software Design Specification documentation review.
Probabilit Low
y
Impact High
Response Mitigate
Strategy Self study and Internet will be best source for
technology knowledge
Risk Identified
Status

Risk ID 3
Risk Hardware Failure
Descriptio
n
Category Requirements
Source Software Design Specification documentation review.
Probabilit Low
y
Impact High
Response Mitigate
Strategy Check whether Hardware is accurately fit or not
according to knowledge
Risk Identified
Status

Table 5.4: Risk Impact definitions

5.3 PROJECT SCHEDULE

5.3.1 Project task set

Major Tasks in the Project stages are:

Task 1.1: Checking Feasibility of product

Task 1.2: Scope of Product

Task 1.3: Product Planing

Task 1.4: Technical Risk

Task 1.5: Proof of product

Task 1.6: Implementation

Task 1.7: Costumer Feedback

5.3.2 Task network

Project tasks and their dependencies are noted in this diagrammatic form.
Figure 5.1: Task Network

5.3.3 Timeline Chart

Figure 5.2: Time line Chart

5.4 TEAM ORGANIZATION

Team Member Details:-


5.4.1 Team structure

The team structure for the project is identified. Roles are defined. Our
team have three members. We select this topic after discussing with each
other. All the members performing all the task whatever tasks are assign to
the members.

Name Role

1 Schedule all plan of project. Manage the team.


Divide the work in team. The deadline are
assign. Consider the all requirements and as
per requirement gathering develop the module.

2 Arrange the developing tool i.e platform,


language, software, hardware and make the
system architecture. Write the code of every
module and apply the appro- priate use case to
test the plan.

3 Test the each module if result is correct then


combine all module and again test. After
deployment manages the feedback report and
correct some corrections.
5.4.2 Management reporting and communication

S Reportin Project Activity


R g Date
.
N
O

1 22 June Decide project group member


2021

2 29 June Submitted 3 Project Topic with IEEE Paper


2021
3 13 Jul Discuss 5 point analysis of selected IEEE
2021 Paper

4 20 Jul 3 Topics are presented and 1 topic selected


2021

5 27 Jul Created and Submitted synopsis of a selected


2021 project

6 3 Aug Literature Survey and info gathering of a


2021
selected project

7 10 Aug 30 percent project completion and


2021 presentation

8 31 Aug Draw UML diagram of a project


2021

9 31 Aug 50 percent project completion and


2021 presentation

1 7 Feb 100 percent project completion and


0 2022 presentation

1 3 March Show the paper published


1 2022

1 23 March Show the final report


2 2022

1 6 April Show the final PPT


3 2022

1 9 May Term 2nd Project overview


4 2022

3.3.4 Software Interface

Operating System : Windows

Coding Language : Java/J2EE.

Data Base : Mysql5.1

IDE : Eclipse Kepler.

3.3.5 Communication Interface


Connecting user at online with request and response form. For that
HTTP protocol we are going to use. That is provided by tomcat server
7/8.

HTTP protocol : The Hypertext Transfer Protocol is an application


protocol for distributed, hypermedia , and collaborative information
systems. Hypertext is structured text that uses logical links (hyperlinks)
between nodes containing text. HTTP is the foundation of data
communication for the World Wide Web.

3.4 NON-FUNCTIONAL REQUIREMENTS

3.4.1 Performance Requirement

System can produce results faster on 4GB of RAM.

It may take more time for peak loads at main node.

The system will be available 100% of the time. Once there is a fatal
error, the system will provide understandable feed back to the user.

3.4.2 Safety Requirements

Only administrators have access to the database of each individual user.

All data will be backed-up every day automatically and also the system
ad- ministrator can back-up the data as a function for him.

This makes it easier to install and updates new functionality whenever


re- quired.

For the safety purpose backup of the database must be required.

3.4.3 Security Requirements

The system is being developed in Java. Java is an object oriented


programming language and easy to maintain. The system is designed in
modules where errors can be detected and fixed easily.
For the security purposes and to avoid illegal use of the system, while
using this application user must do following things:

– At the time of deploying this software user have to register to


system.

– To use software user have to login and logout each time.

3.4.4 Software Quality Attributes

The system considers following non-functional requirements to provide


better functionalities and usage of system.

Availability : The system is available during 24 hours of a day.

Usability : The system is designed keeping in mind the usability issues


con- sidering the end-users who are developers/programmers. It
provides detailed help which would lead to better and faster learning.
Navigation of system is easy.

Consistency : Uniformity in layout, screens, Menus, colours scheme,


format.

Performance : The performance of the system is fast and as per user


require- ment. From this system gives expected outcome in less time
and less space since efficiency is higher. Speed is totally depending on
the response of the database and connection type.

Extendibility :Prevention in the system is done by the system only, in


which we make changes in the system later on.

Reusability : Files of any type can be used by the system for any
number of times during transformation.

Reliability : Protection of data from malicious attack or unauthorized


access.

Security : The system provides security to the randomly generated


private key by performing encryption to it for encrypting patient data
and thus protects from other nodes in the network. The network is free
from malicious node and misbehaving node attacks.

Reliability : The system is provide user an efficient search each time.


So the user can reliable on the system. Because system can guarantees
user to provide his/her interested data every time in least amount of
time.

CHAPTER 7

SOFTWARE TESTING

7.1 TYPE OF TESTING

Types of Testing:
Along with the type of testing also mention the approach to be followed for
the test- ing, that is, Manual Testing or Automated Testing. Use Automated
Testing Plan forplanning automation activities in details. The different types
of testing that may be carried out in the project are as follows:

Unit Testing:
Individual components are tested independently to ensure their quality.
The focus is to uncover errors in design and implementation, including

– Data structure in component

– Program logic and program structure in a component

– Component interface

– Functions and operations of a component


Integration Testing :
A group of dependent components are tested together to ensure their
quality of their integration unit. This approach is to do incremental
integration to avoid bigbang problem. That is when the entire program
is put together from all units and tested as a whole. The big-bang
approach usually results in chaos which incremental integration avoids.
Incremental integration testing can be done in two different way top
down and bottom up. Then there is also the possibility of regression
integration.
The top down integration is when modules are integrated by moving
down- wards through the control hierarchy, beginning with the main
control module. Modules subordinate to the main control module are
incorporated into main structure n either depth-first or breadth-first
manner. The top down integration verifies major controls or decision
points early in the test process. If major control problems do exist, early
recognition is essential. Bottom-up integration

testing begins construction and testing with the lowest levels in the
program structure. Because modules are integrated from the bottom-
up,processing re- quired for modules subordinate to a given level is
always available and the need for test stubs is eliminated.
The focus is to uncover errors in:

– Design and construction of software architecture

– Integrated functions or operations at sub-system level

– Interfaces and interaction and/or environment integration

System Testing :
The system software is tested as a whole. It verifies all elements mesh
properly to make sure that all system functions and performance are
achieved in the target environment. The focus areas are:

– System functions and performance


– System reliability and recoverability (recovery test)

– System behavior in the special conditions (stress and load test)

– System user operations (acceptance test/alpha test)

– Hardware and software integration collaboration

– Integration of external software and the system.

Validation Testing:
Validation can be defined in many ways, but a simple definition is that
suc- ceeds when software functions in a manner that can be reasonably
expected by the customer. Software validation is achieved through a
series of black- box tests that demonstrate conformity with
requirements. A test plan outlines the classes of tests to be conducted
and a test procedure defines specific test cases that will be used to
demonstrate conformity with requirements. Both the plan and procedure
are designed to ensure that all functional requirements are

satisfied, all behavioral characteristics are achieved, all performance


require- ments are attained, documentation is correct, and human
engineered and other requirements are met.

White Box Testing:


White-box test design allows one to peek inside the box, and it focuses
specifi- cally on using internal knowledge of the software to guide the
selection of test data. Synonyms for white-box include: structural,
glass-box and clear-box.
White box testing is much more expensive than black box testing. It
requires the source code to be produced before the tests can be planned
and is much more laborious in the determination of suitable input data
and the determina- tion if the software is or is not correct. This testing is
concerned only with testing the software product; it cannot guarantee
that the complete specifica- tion has been implemented.
Black Box Testing:
Black-box test design treats the system as a black-box, so it doesnt
explicitly use knowledge of the internal structure. Black-box test design
is usually de- scribed as focusing on testing functional requirements.
Synonyms for black box include: behavioral, functional, opaque-box,
and closed-box. Black box testing is concerned only with testing the
specification; it cannot guarantee that all parts of the implementation
have been tested. Thus black box testing is testing against the
specification and will discover faults of omission, indi- cating that part
of the specification has not been fulfilled.

GUI Testing:
Graphical User Interface (GUIs) present interesting challenges for
software engineers. Because of reusable components provided as part of
GUI devel- opment environments, the creation of the user interface has
become less time consuming and more precise. But, the same time, the
complexity of GUIs has

grown, leading to more difficulty in the design and execution of the test
cases. Because many modern GUIs have the same look and same feel, a
series of test cases can be derived.

7.2 TEST CASES TEST RESULTS Software to be tested:


After implementation of project software will be tested by tester.
Test Cases
Testing of project problem statement using generated test data (using
mathematical models, GUI, Function testing principles, if any) selection and
appropriate use of testing tools, testing of UML diagrams reliability.
Module-ID:-01
Modules to be tested:-Registration
1. Enter the case insensitive Username click on Submit button.
Expected: It should display error.
2. Enter the case sensitive Username click on Submit button. Expected:
It should accept.
3. Enter the case insensitive Password click on Submit button.
Expected: It should display error.
4. Enter the case sensitive Password click on Submit button. Expected:
It should accept.
5. Enter the case insensitive Mobile Number click on Submit button.
Expected: It should display error.
6. Enter the case sensitive Mobile Number click on Submit button.
Expected: It should accept.
7. Enter the wrong address and click on Submit button. Expected: It
should display error.
8. Enter the correct address and click on Submit button. Expected: It
should accept.
Module-ID:-2
Modules to be tested:- Login
1. Enter the correct username and wrong password click on Submit
button. Expected: It should display error.
2. Enter the wrong username and correct password and click on
Submit but- ton.
Expected: It should display error.
3. Enter the correct username and password and click on Login button.
Expected: It should display welcome page.
4. After login with valid credentials click on back button. Expected:
The page should be expired.
5. After login with valid credentials copy the URL and paste in
another browser.
Expected: It should not display the user’s welcome page.
Check the password with Lower case and upper case. Expected: Password
should be case sensitive

You might also like