KEMBAR78
AI Shopping Aid for Visually Impaired | PDF | Use Case | Databases
0% found this document useful (0 votes)
78 views53 pages

AI Shopping Aid for Visually Impaired

The document describes a project to develop a smart shopping facilitator for visually impaired people using artificial intelligence. It discusses the motivation, objectives, methodology, requirements and design of the proposed system to help visually impaired users shop independently.

Uploaded by

Priya Mali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views53 pages

AI Shopping Aid for Visually Impaired

The document describes a project to develop a smart shopping facilitator for visually impaired people using artificial intelligence. It discusses the motivation, objectives, methodology, requirements and design of the proposed system to help visually impaired users shop independently.

Uploaded by

Priya Mali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 53

A PROJECT REPORT ON

“Smart Shopping Facilitator for Visually Impaired using Artificial


Intelligence”

INDEX

1 Synopsis 1
1.1 Project Title . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Project Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Internal Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Sponsorship and External Guide . . . . . . . . . . . . . . . . . . . 2
1.5 Technical Keywords (As per ACM Keywords) . . . . . . . . . . . . 2
1.6 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.7 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.8 Goals and Objectives . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.9 Relevant mathematics associated with the Project . . . . . . . . . . 4
1.10 Names of Conferences / Journals where papers can be published . . 5
1.11 Review of Conference/Journal Papers supporting Project idea . . . . 5
1.12 Plan of Project Execution . . . . . . . . . . . . . . . . . . . . . . . 6

2 Technical Keywords 7
2.1 Area of Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2 Categories and Subject Descriptors: . . . . . . . . . . . . . . . . . 8

3 Introduction 9
3.1 Project Idea...............................................................................................10
3.2 Motivation of the Project..........................................................................11
3.3 Literature Survey......................................................................................11
4 Problem Definition and Scope 15
4.1 Problem Statement...................................................................................16
4.1.1 Goals and objectives....................................................................16
4.1.2 Statement of Scope......................................................................16
4.2 Software context.......................................................................................16
4.3 Major Constraints.....................................................................................17
4.4 Methodologies of Problem solving and efficiency issues........................17
4.5 Outcome...................................................................................................18
4.6 Applications..............................................................................................18
4.7 System Requirements:..............................................................................18
4.7.1 Hardware Resources Required....................................................18
4.7.2 Software Resources Required......................................................18

5 Project Plan 19
5.1 Project Estimates......................................................................................20
5.1.1 Reconciled Estimates...................................................................21
5.1.2 Project Resources........................................................................22
5.2 Risk Management w.r.t. NP Complete analysis.......................................22
5.2.1 Risk Analysis...............................................................................22
5.2.2 Risk Probability definitions:........................................................22
5.2.3 Risk Impact definitions:...............................................................23
5.2.4 Overview of Risk Mitigation, Monitoring, Management............23
5.3 Project Schedule.......................................................................................24
5.3.1 Project task set.............................................................................24
5.3.2 Task network...............................................................................25
5.3.3 Timeline Chart.............................................................................25
5.4 Team Organization...................................................................................26
5.4.1 Team structure.............................................................................26
5.4.2 Management reporting and communication................................26

6 Software Requirement Specification 27


6.1 Introduction..............................................................................................28
6.1.1 Purpose and Scope of Document.................................................28
6.1.2 Overview of responsibilities of Developer..................................28
6.2 Usage Scenario.........................................................................................29
6.2.1 Use-cases.....................................................................................29
6.2.2 Use Case View.............................................................................30
6.3 Data Model and Description.....................................................................30
6.3.1 Data Description..........................................................................30
6.3.2 Data objects and Relationships....................................................31
6.4 Functional Model and Description...........................................................31
6.4.1 Non-functional Requirement.......................................................31
6.4.2 Performance Requirement :........................................................31
6.4.3 Safety and Security Requirement :..............................................31
6.5 UML Diagrams:.......................................................................................32
6.5.1 Data Flow Diagram.....................................................................32
6.5.2 Activity Diagram:........................................................................33
6.5.3 Component Diagram:..................................................................34
6.5.4 Design Constraints.......................................................................34
6.5.5 Software Interface Description....................................................34

7 Detailed Design Document 35


7.1 Introduction..............................................................................................36
7.2 Architectural Design.................................................................................36
7.3 Data design...............................................................................................37
7.3.1 Internal software data structure...................................................37
7.3.2 Global data structure....................................................................37
7.3.3 Temporary data structure.............................................................38
7.3.4 Database description....................................................................38
7.4 Component Design...................................................................................38
7.4.1 Class Diagram..............................................................................39

8 Project Details 40
8.1 Introduction..............................................................................................41
8.2 Tools and Technologies Used..................................................................41
8.2.1 Software Interface........................................................................41
8.3 Methodologies/Algorithm Details............................................................41
8.3.1 Algorithm 1/Pseudo Code...........................................................41

9 Summary and Conclusion 44

10 Refrences 46
List of Figures

5.1 Waterfall Model.......................................................................................20


5.2 Project Schedule.......................................................................................24
5.3 Task network............................................................................................25
5.4 Timeline Chart..........................................................................................25

6.1 Use case diagram......................................................................................30


6.2 DFD Level 0.............................................................................................32
6.3 DFD Level 1.............................................................................................32
6.4 Activity diagram.......................................................................................33
6.5 Component diagram.................................................................................34

7.1 Architecture diagram................................................................................37


7.2 Architecture diagram................................................................................38
7.3 Class Diagram..........................................................................................39
List of Tables

5.1 Risk Table.................................................................................................22


5.2 Risk Probability definitions......................................................................22
5.3 Risk Impact definitions............................................................................23
CHAPTER 1

SYNOPSIS
1.1 PROJECT TITLE

Smart Shopping Facilitator for Visually Impaired using Artificial Intelligence.

1.2 PROJECT OPTION

Internal Project

1.3 INTERNAL GUIDE

Prof. S. D. Jondhale

1.4 SPONSORSHIP AND EXTERNAL GUIDE

Nil

1.5 TECHNICAL KEYWORDS (AS PER ACM KEYWORDS)

1. Computer Systems Organization


(a) COMPUTER-COMMUNICATION NETWORKS
A. Client/server
B. Distributed applications
C. Distributed databases
D. Network operating systems

2. Distributed Systems
A. Security and reliability issues in distributed applications

3. Information Interfaces and Presentation: User and Admin


(A) Interfaces: Input devices and strategies, user-centered design.
(B) General Terms: Design, Human Factors.
(C) Keywords: Data analytics; Machine Learning; Visually impaired people,
Smart Shopping, Embedded/E-Commerce product.

1.6 PROBLEM STATEMENT

People who are sighted have the luxury of looking at items and reading the labels
on clothing to make decisions about what to purchase. People who are visually
impaired can feel the items, but they cannot easily tell the color of the garment, the
type of clothing, or the care of the garment. In essence, the fashion industry is
criminates against visually impaired people by not making the standard
information available to them in a form that they can read. The fashion industry
should identify an acceptable way for visually impaired individuals to identify
specific characteristics of interest about the clothing they purchase.

1.7 ABSTRACT

is the state of a person in which one has to depend on others for their own
needs. Visual impairment is one of the disabilities of a human being. To date
numerous methods had been proposed to enhance the life style of visually
impaired and blind people. Still purchasing products in the e-shopping appli-
cation without others support is tricky one for them. The project describes
a system that provides the guidance for them to identify and purchase their
products in the supermarket application.
The audio instructions will assist them inside the supermarket application
based on the real time situations. To make the supermarket in a smarter way the
billing system is automated. Hence it eliminates the existing queuing system
in the supermarket. The ultimate aim of this system is to eliminate others
sup- port for visually impaired people in shopping and provide them a
convenient and sophisticated environment. On implementing this system, it
facilitates the blind people shopping, save the customer’s time and promotes
business sales.
1.8 GOALS AND OBJECTIVES

• This app useful for blind person shopping. The main objective of Ambient
As- sisted Living is to provide blind people the facility to shop themselves
without the help of anyone or detect household stuffs by themselves. The
scope is to provide the facility of text to speech conversion for impaired
person to shop independently by solving the navigation problem for blind
person with less number of hardware requirements.

1.9 RELEVANT MATHEMATICS ASSOCIATED WITH THE PROJECT

System Description:

• Input: Blind person voice command.

• Output: Recommend products as per input.

• Functions : Identify Objects, Morphisms, Overloading in functions, Func-


tional relations

• System Description:
Input-
u=No. of user
u={u1, u2, u3,.,u nth}
p={p1, p2, p3,...,pn
Output:-
O=Generate the report every user with Shopping
Process :-
Process1 : Admin- Admin log in and add product.
Process 2 : User Registration and log in with voice detection and buy product.

• Success Conditions: If user giver give correct input that time produce correct
output.

• Failure Conditions: Otherwise error occured.


1.10 NAMES OF CONFERENCES / JOURNALS WHERE PAPERS CAN
BE PUBLISHED

• International Journal of Research and Analytical Reviews (IJRAR)

• Journal of Emerging Technologies and Innovative Research (JETIR)

• International Journal of Advance Engineering and Research Development (IJAERD)

• International Journal of Advance Research in Engineering, Science Technol-


ogy (IJAREST)

• International Journal of Advanced Research in Computer and


Communication Engineering (IJARCCE)

1.11 REVIEW OF CONFERENCE/JOURNAL PAPERS SUPPORTING PROJECT


IDEA

1. Paper Name: Assistive Clothing Pattern Recognition for Visually Impaired Peo-
ple.
Author Name: Xiaodong Yang ,Shuai Yuan , YingLi Tian.
Description: Choosing garments with complicated patterns and colours is a diffi-
cult task for visually impaired individuals. Automatic article of clothing pattern
recognition is additionally a difficult analysis downside due to rotation, scaling,
illu- mination, and particularly massive infraclass pattern variations. Weve got
developed a camera-based image system that acknowledges article of clothing
patterns in four classs plaid, striped, pattern less, and irregular and identifies eleven
articles of cloth- ing colours. The system integrates a camera, a mike, a computer,
and a Bluetooth headphone for audio description of article of clothing patterns and
colours. A cam- era mounted upon a try of glasses is employed to capture article of
clothing pictures. The article of clothing patterns and colours are described to blind
users verbally. This method will be controlled by speech input through mike. to
acknowledge arti- cle of clothing patterns, we propose a completely unique Run
Signature descriptor and a schema to extract applied math properties from ripple
sub bands to capture
global options of article of clothing patterns.

1.12 PLAN OF PROJECT EXECUTION

NO TASK DURATION START END


(Days) DATE DATE
1 Group Formation 4 21 Jun 26 Jun
2 Decide Area 4 26 Jun 28 Jun
of Interest
3 Search Topic 5 28 Jun 6 Jul
4 Topic Selection 5 6 Jul 16 Jul
5 Topic Selection 5 16 Jul 22 Jul
6 Search Related 12 22 Jul 12 Aug
Information
7 Understanding 7 12 Aug 20 Aug
Concept
8 Search Essential 6 20 Aug 31 Aug
Document(IEEE and
White Paper,)
Software)
9 Problem Definition 2 31 Aug 8 Sep
10 Literature Survey 5 8 Sep 18 Sep
11 SRS 14 18 Sep 20 Sep
12 Project Planning 2 20 Sep 30 Sep
13 Modeling and design 10 30 Sep 2 Oct
14 Technical Specification 2 30 Sep 2 Oct
15 PPT 6 2 Oct 5 Oct
CHAPTER 2

TECHNICAL KEYWORDS
2.1 AREA OF PROJECT

Data mining.

2.2 CATEGORIES AND SUBJECT DESCRIPTORS:

1. C. Computer Systems Organization


(a) C.2 COMPUTER-COMMUNICATION NETWORKS
A. Client/server
B. Distributed applications
C. Distributed databases
D. Network operating systems

2. C.2.4 Distributed Systems


A. Security and reliability issues in distributed applications

(b) Categories and Subject Descriptors

3. H.5.2 [Information Interfaces and Presentation]: User and Admin


(c) Interfaces: Input devices and strategies, user-centered design.
(d) General Terms: Design, Human Factors.
(e) Keywords: Data analytics; Machine Learning; Visually impaired people,
Smart Shopping, Embedded/E-Commerce product.
CHAPTER 3

INTRODUCTION
3.1 PROJECT IDEA

This project is developed to make the life of blind people easy. This is very
beneficial in case of finding out the description of packaged goods to the
blind people and thus helping them in deciding to purchase a product or not
espe- cially which are packaged. This is because it becomes very difficult for
the blind people to distinguish between the packaged goods. Thus this
applica- tion really benefits blind and visually impaired people and thus
making their work of identifying products easy. In this smart world, no one
can end up the day without using any kind of embedded system products. It
makes our hu- man life very smarter and to feel comfortable. In worldwide,
the great regret factor is visual impairment. Based on the statistics of World
Health Organiza- tion (WHO) in 2012, 285 million people are visually
challenged in the world. Among them 39 million people are blind and 246
million having low power vision. About 90% of them are living in
developing countries.
Shopping is a place where people get their daily necessities ranging from
food products, clothing, electrical appliances etc. Sometimes customers have
prob- lems regarding the incomplete information about the product on sale
and waste of unnecessary time at the billing counters. Continuous
improvement is re- quired in the traditional billing system to improve the
quality of shopping experience to the customers. Now days numbers of large
as well as small shopping applications has increased throughout the global
due to increasing public demand spending. At the time of festivals, special
discounts, holidays, etc. there is a huge rush in shopping mall. At present,
many supermarkets still adopt traditional shopping mode and bar code
scanning, which is a waste of manpower and material resources. Also, long
time waiting to pay and the tire of pushing shopping cart all make clients
suffer a lot and may cause passen- ger volume go down. Consequently, the
needs to help reduce queuing time for customers to check-out and to free
people from pushing the shopping carts hard have been an urgent issue to
tackle. So here the paper introduces a sys- tem to reduce and possibly
eliminate the total waiting time of customers and
can avoid manpower. Here the system helps to find the required products
from the shopping cart. Here it uses feature extraction and stop-word
filtering tech- nology to identify the product as per your wants and to
determine the exact product lists from available items as well as the person.
The rate and name of each product taken by the person is added to the bill in
addition it is displayed on the screen and is announced using speaker. The
billing can be done using announcement techniques.

3.2 MOTIVATION OF THE PROJECT

Shopping for Blind people.

Reduced traffic.

Increased Safety.

Real-Time Data and Trend Insight: Over time, a Blind person shopping solution
can produce data that uncovers correlations and trends of users and lots. These
trends can prove to be invaluable to lot owners as to how to make adjustments and
improvements to drivers.

3.3 LITERATURE SURVEY

1. Paper Name: Assistive Clothing Pattern Recognition for Visually Impaired


People.
Author Name: Xiaodong Yang ,Shuai Yuan , YingLi Tian.
Description: Choosing garments with complicated patterns and colours is a
difficult task for visually impaired individuals. Automatic article of clothing
pattern recognition is additionally a difficult analysis downside due to rota-
tion, scaling, illumination, and particularly massive infraclass pattern varia-
tions. Weve got developed a camera-based image system that acknowledges
article of clothing patterns in four classs plaid, striped, pattern less, and irreg-
ular and identifies eleven articles of clothing colours. The system integrates a
camera, a mike, a computer, and a Bluetooth headphone for audio
description of article of clothing patterns and colours. A camera mounted
upon a try of
glasses is employed to capture article of clothing pictures. The article of
cloth- ing patterns and colours are described to blind users verbally. This
method will be controlled by speech input through mike. to acknowledge
article of cloth- ing patterns, we propose a completely unique Run
Signature descriptor and a schema to extract applied math properties from
ripple sub bands to capture global options of article of clothing patterns.

2. Paper Name: From Smart Objects to Social Objects: The Next Evolutionary
Step of the Internet of Things.
Author Name: L. Atzori, A. Iera, and G. Morabito.
Description: Iris recognition verification is one amongst the foremost reliable
personal identification strategies in statistics. With the fast development of
iris recognition verification, variety of its applications are proposed as yet
together with time group action system etc. during this paper, a wireless iris
recognition attendance management system is meant and enforced
exploitation Dogmans algorithmic program (Dogman, 2003). This method
based mostly statistics and wireless technique solves the matter of spurious
group action and the has- sle of birth the corresponding network. It will
create the users attendances a lot of simply and effectively.

3. Paper Name: Review on Speech Recognition with Deep Learning


Methods. Author Name: Rubi, Chhavi Rana.
Description: The most common mode of communication between humans is
speech. As this is often this can be often the foremost most well liked
manner, humans would like to use speech to act with machines together.
Thats why, speech recognition has gained numerous recognition. Many
approaches for speech recognition exist like Dynamic Time warp (DTW),
Hidden mathemati- cian Model (HMM). The main objective of this paper is
printed a three stage neural integrated model speech signal sweetening and
use the decomposition integrated HMM model for speech feature
transformation. For the feature extraction of speech distinct wavelength work
on (DWT) has been used that provides a set of feature vectors of speech
wave kind. The work has been done
on MATLAB and experimental results show that system is during a position
to acknowledge words at sufficiently high accuracy.

4. Paper Name: Assistive Clothing Pattern Recognition for Visually Impaired


People.
Author Name: Xiaodong Yang, Shuai Yuan, and YingLi Tian.
Description: Choosing garments with advanced patterns and colours is a dif-
ficult task for visually impaired folks. Automatic article of clothing pattern
recognition is additionally a difficult analysis downside due to rotation, scal-
ing, illumination, and particularly massive infraclass pattern variations. Weve
got developed a camera-based model system that acknowledges article of cloth-
ing patterns in four classs plaid, striped, pattern less, and irregular and iden-
tifies eleven articles of clothing colours. The system integrates a camera, a
electro-acoustic transducer, a computer, and a Bluetooth earphone for audio
description of article of clothing patterns and colours. A camera mounted
upon a combine of glasses is employed to capture article of clothing pictures.
The article of clothing patterns and colours area unit described to blind users
verbally. This method may be controlled by speech input through electroa-
coustic transducer. to acknowledge article of clothing patterns, we propose a
novel Radon Signature descriptor and a schema to extract applied math prop-
erties from wave sub bands to capture global options of article of clothing
patterns. Theyre combined with native features to acknowledge advanced ar-
ticle of clothing patterns. To gauge the effectiveness of the planned approach,
we have a tendency to use the CCNY article of clothing Pattern dataset. Our
approach achieves ninety two.

5. Paper Name: Accessible Shopping Systems for Blind and Visually Impaired
Individuals: Design Requirements and the State of the Art.
Author Name: Vladimir A. Kulyukin, Aliasgar Kutiyanawala.
Description: Independent grocery searching is one among the foremost func-
tionally difficult tasks for visually impaired and blind people. Several helpful
searching systems are developed to handle the matter of blind grocery
search- ing. During this article, we have a tendency to establish many style
necessi-
ties for helpful searching systems and analyze existing approaches to
envision however well they meet them. Our objective is to shed some
lightweight on po- tential analysis and development directions for the
accessible blind searching community and to supply designers of accessible
searching solutions analysis tools which will be used as initial points of
comparison.
CHAPTER 4

PROBLEM DEFINITION AND SCOPE


4.1 PROBLEM STATEMENT

People who are sighted have the luxury of looking at items and reading the labels
on clothing to make decisions about what to purchase. People who are visually
impaired can feel the items, but they cannot easily tell the color of the garment, the
type of clothing, or the care of the garment. In essence, the fashion industry is
criminates against visually impaired people by not making the standard
information available to them in a form that they can read. The fashion industry
should identify an acceptable way for visually impaired individuals to identify
specific characteristics of interest about the clothing they purchase.

4.1.1 Goals and objectives

This app useful for blind person shopping.

• The main objective of Ambient Assisted Living is to provide blind people


the facility to shop themselves without the help of anyone or detect
household stuffs by themselves.

• The scope is to provide the facility of text to speech conversion for impaired
person to shop independently by solving the navigation problem for blind
per- son with less number of hardware requirements.

• To design this app useful for blind person shopping.

4.1.2 Statement of Scope

• It provides the facility of text to speech conversion for independent shopping


of person. The areas of improvement are: Smart Phone can be replaced by
any other device if available and the information of items above and below
the currently detected item will be played in the users smart phone.

4.2 SOFTWARE CONTEXT

• We are using Operating system like Windows XP Professional, Java Version


JDK 1.7 & above, Coding Language JAVA/J2EE Back-End(DB) MYSQL
5.5,Web Server Apache Tomcat/XAMPP.

4.3 MAJOR CONSTRAINTS

• JAVA JDK 1.7 and above and Eclipse IDE with Database MYSQL.

4.4 METHODOLOGIES OF PROBLEM SOLVING AND EFFICIENCY


IS- SUES

Some problems are small and can be resolved quickly. Other problems are large
and may require significant time and effort to solve. These larger problems are
often tackled by turning them into formal projects.
Whether the problem you are focusing on is small or large, using a systematic ap-
proach for solving it will help you be a more effective project manager.
User Section:

• User Registration

• User Login Form

• Enable Voice Asistance.

• Speak which product you want.

• System capture your voice cmd and filter it through stop word removing
tech- nique.

• With voice assistance Show respected products.

• Selcet product and perform payment method.

• Perform Transaction

• Logout

Admin Section:

• Admin Login
• Chek user

• Add products.

• About us form

4.5 OUTCOME

• It is convenient for the blind people to do the online shopping performance.

4.6 APPLICATIONS

• Blind People

• Normal People

• Online Shopping center

4.7 SYSTEM REQUIREMENTS:

4.7.1 Hardware Resources Required

• System : i3

• Hard Disk : 1 TB.

• Monitor : 15 VGA Colour.

• Mouse : Logitech.

• RAM : 4 GB.

4.7.2 Software Resources Required

1. Operating system : Windows XP/7.

2. Coding Language : JAVA/J2EE

3. IDE : Eclipse Kepler

4. Database : MYSQL
CHAPTER 5

PROJECT PLAN
5.1 PROJECT ESTIMATES

We are using waterfall model for our project estimation.

Figure 5.1: Waterfall Model

1. Requirement gathering and analysis:


In this step of waterfall we identify what are various requirements are need for our
project such are software and hardware required, database, and interfaces.

2. System Design:
In this system design phase we design the system which is easily understood for
end user i.e. user friendly. We design some UML diagrams and data flow diagram
to understand the system flow and system module and sequence of execution.

3. Implementation:
In implementation phase of our project we have implemented various module re-
quired of successfully getting expected outcome at the different module levels.
With inputs from system design, the system is first developed in small programs
called
units, which are integrated in the next phase. Each unit is developed and tested for
its functionality which is referred to as Unit Testing.

4. Testing:
The different test cases are performed to test whether the project module are giving
expected outcome in assumed time. All the units developed in the implementation
phase are integrated into a system after testing of each unit. Post integration the en-
tire system is tested for any faults and failures.

5. Deployment of System:
Once the functional and nonfunctional testing is done, the product is deployed in
the customer environment or released into the market.

6. Maintenance:
There are some issues which come up in the client environment. To fix those issues
patches are released. Also to enhance the product some better versions are
released. Maintenance is done to deliver these changes in the customer
environment.
All these phases are cascaded to each other in which progress is seen as flowing
steadily downwards like a waterfall through the phases. The next phase is started
only after the defined set of goals are achieved for previous phase and it is signed
off, so the name ”Waterfall Model”. In this model phases do not overlap.

5.1.1 Reconciled Estimates

5.1.1.1 Cost Estimate

Approximately 18000

5.1.1.2 Time Estimates

Approximately 11

months.
5.1.2 Project Resources

Windows , eclipse IDE, 2.93 GHZ CPU speed, 8 GB RAM, High speed internet
connection.

5.2 RISK MANAGEMENT W.R.T. NP COMPLETE

ANALYSIS Np Complete:
Using PTTP algorithm it is possible to find out the optimized solution in
polynomial time by reducing the actual problem P

5.2.1 Risk Analysis

The risks for the Project can be analyzed within the constraints of time and quality.
Impact
ID Risk Description Probability
Schedule Quality Overall
1 Correctness Medium High High Medium
2 Availability High High High High

Table 5.1: Risk Table

5.2.2 Risk Probability definitions:

Probability Value Description


High Probability of occurrence is > 75%
Medium Probability of occurrence is 26 − 75%
Low Probability of occurrence is < 25%

Table 5.2: Risk Probability definitions


5.2.3 Risk Impact definitions:

Impact Value Description


Very high > 10% Schedule impact or Unacceptable quality
High 5− Schedule impact or Some parts of the project have low
10% quality
Medium < 5% Schedule impact or Barely noticeable degradation in
qual- ity Low Impact on schedule or Quality can be
incorporated

Table 5.3: Risk Impact definitions

5.2.4 Overview of Risk Mitigation, Monitoring, Management

Following are the details for each risk.


Risk ID 1
Risk Description Time extend
Category Environment
Source Time Predicition
Probability Medium
Impact High
Response Mitigate
Strategy Break schedule
Risk Status Occurred
5.3 PROJECT SCHEDULE

The project schedule starts from Aug 2017 and ends in March 2018. The Different
Phases identified are:
1. Requirement Analysis.
2. Requirement Specification.
3. System Design.
4. Detailed Design.
5. Coding.
6. Testing.
The Gantt chart as shown below represents the approximate schedule followed for
the completion of each phase:

Figure 5.2: Project Schedule

5.3.1 Project task set

Major Tasks in the Project stages are:

• Task 1: Correctness.

• Task 2: Availability.

• Task 3: Integrity.
5.3.2 Task network

Project tasks and their dependencies are noted in this diagrammatic form.

Figure 5.3: Task network

5.3.3 Timeline Chart

A project timeline chart is presented. This may include a time line for the entire
project. Above points should be covered in Project Planner as Annex C and you
can mention here Please refer Annex C for the planner

Figure 5.4: Timeline Chart


5.4 TEAM ORGANIZATION

Team consists of only one member and proper planning mechanism is used and
roles are defined.

5.4.1 Team structure

The team structure for the project is identified. Roles are defined.

Sr. No. Member Responsibilities


1 Member 1 Requirement Gathering, Project analysis, Developer
2 Member 2 Requirement Gathering, Project analysis, Developer
3 Member 3 Requirement Gathering, Project analysis, Developer
4 Member 4 Requirement Gathering, Project analysis, Developer

5.4.2 Management reporting and communication

Well planning mechanisms are used for progress reporting and inter/intra team
com- munication are identified as per requirements of the project.
CHAPTER 6

SOFTWARE REQUIREMENT
SPECIFICATION
6.1 INTRODUCTION

The introduction of the Software Requirements Specification (SRS) provides an


overview of the entire SRS with purpose, scope, definitions, acronyms, abbrevia-
tions, references and overview of the SRS. The aim of this document is to gather
and analyze and give an in-depth insight of the complete Disease Prediction by
Machine Learning from Healthcare Communities system with minimized time
consumption by defining the problem statement in detail.

6.1.1 Purpose and Scope of

Document Purpose:
Data mining represents a key factor in evaluating the trustworthiness of sensor
data. Privacy management for networks introduces several challenging requirements,
such as low energy and bandwidth consumption, efficient storage and secure
transmis- sion. In this project, we are proposing a blind people shopping by using
AI from Blind Communities to securely transmit the data.

Scope:
It provides the facility of text to speech conversion for independent shopping of
per- son. The areas of improvement are: Smart Phone can be replaced by any other
device if available and the information of items above and below the currently
detected item will be played in the users smart phone.

6.1.2 Overview of responsibilities of Developer

developer should be able :

1. To have understanding of the problem statement.

2. To know what are the hardware and software requirements of proposed system.

3. To have understanding of proposed system.

4. To do planning various activates with the help of planner.Designing, program-


ming, testing etc.
6.2 USAGE SCENARIO

Scenario Name: Predict disease and waiting time for hospital

1. user registration

2. user login

3. voice recognition

4. product recomendation

5. transaction process
Result: Recommend usefull products.

6.2.1 Use-cases

Use cases can be employed during several stages of software development, such as
planning system requirements, validating design, testing software, and creating an
outline for online help and user manuals.
6.2.2 Use Case View

Use Case Diagram. Example is given below

Figure 6.1: Use case diagram

6.3 DATA MODEL AND DESCRIPTION

6.3.1 Data Description

Data modeling is the formalization and documentation of existing procedures and


events that occur during application software design and development. Data mod-
eling techniques and tools capture and translate complex system designs into easily
understood representations of the data flows and processes, creating a blueprint for
construction and/or re-engineering. Data modelers often use multiple models to view
the same data and ensure that all processes, entities, relationships and data flows have
been identified. There are several different approaches to data modeling, including:
1. Conceptual Data Modeling In this dissertation higher relationship is between user
and Queuing System.
2. Enterprise Data Modeling - Similar to conceptual data modeling, but addresses
the unique requirements of a specific business.
3. Logical Data Modeling In this dissertation developer, graphical user interface
de- sign and database are most important entities. Metadata has attributes like
name, id, and password, address etc. also various attributes used for business logic.

6.3.2 Data objects and Relationships

Data streams are given to framework which will classify that data and then this data is
given to server for processing an analysis purpose, so this is how these two
modules are connected.

6.4 FUNCTIONAL MODEL AND DESCRIPTION

Data streams will be processed and analyzed by framework and Apache. The real
time queue is used internally by apache. Processing items are internally generated
and processed by regretting two modules.

6.4.1 Non-functional Requirement

6.4.2 Performance Requirement :

• System can produce results faster on 4GB of RAM.

• It may take more time for peak loads at main node.

• The system will be available 100% of the time. Once there is a fatal error,
the system will provide understandable feed back to the user.

6.4.3 Safety and Security Requirement :

• Only administrators have access to the database of each individual user.

• All data will be backed-up every day automatically and also the system ad-
ministrator can back-up the data as a function for him.
• This makes it easier to install and updates new functionality if required.

• For the safety purpose backup of the database must be required.

6.5 UML DIAGRAMS:

6.5.1 Data Flow Diagram

6.5.1.1 Level 0 Data Flow Diagram

Figure 6.2: DFD Level 0

6.5.1.2 Level 1 Data Flow Diagram

Figure 6.3: DFD Level 1


6.5.2 Activity Diagram:

• The Activity diagram represents the steps taken.

Figure 6.4: Activity diagram


6.5.3 Component Diagram:

Figure 6.5: Component diagram

6.5.4 Design Constraints

Apache tomcat and database connectivity.

6.5.5 Software Interface Description

The software interface to the outside world is very good and user friendly for ana-
lyzed Data The requirements for interfaces are Windows XP/7,8 GB RAM etc.
CHAPTER 7

DETAILED DESIGN DOCUMENT


7.1 INTRODUCTION

This document specifies the design that is used to solve the problem of Product.

7.2 ARCHITECTURAL DESIGN

According to WHO, there are around 161 million people who are visually impaired
people and around 36 million are blind. These people are taking help from family
member or friends to each and every for their needs. It is a difficult for blind
people to choose clothes with different colors or they find difficult to online
shopping. A system is developed to assist blind people that automatically
recognizing clothing patterns and colors. Camera-based clothing pattern
recognition is a problematic due to many clothing pattern and corresponding large
intra class variations. Existing tex- ture analysis methods focus on textures with
variations in viewpoint and scaling. The level of accuracy in clothing pattern
recognition cannot achieve by texture analysis methods. Here, we introduce a
system to assist color blind people to select differ- ent clothing colors along with
different categories. The system contains three major components:
1) Database which contain clothing images, a microphone for speech command in-
put.
2) Speech converter that convert the input speech into text format.
3) Display of resulting items on the screen of desktop or wearable computer along
with speech.
The system process the voice input, captured voice input is acoustic sound waves
that are to be converted into the character string format for semantic interpretation.
The result of character string format obtained is then proceed for the global and
local feature identification, global feature such as the gender and category,
category such as pant, sari, dresses, shirt and so on while the local feature such as
red pant then the red is the local feature of the global feature pant .Conventional
speech recogni- tion systems use Gaussian mixture model (GMM) based hidden
Markov models to represent speech signals. HMMs based speech recognition
systems can be trained automatically and are simple and computationally feasible
to use. However, one of
the main drawbacks of Gaussian mixture models is that they are statistically ineffi-
cient for modeling data that lie on or near a non-linear manifold in the data space.
We are using Deep learning, sometimes referred as representation learning or
unsu- pervised feature learning is a new area of machine learning.

Figure 7.1: Architecture diagram

7.3 DATA DESIGN

A description of all data structures including internal, global, and temporary data
structures, database design (tables), file formats.

7.3.1 Internal software data structure

Real time queue

7.3.2 Global data structure

Data Streams
Figure 7.2: Architecture diagram

7.3.3 Temporary data structure

Processing items

7.3.4 Database description

Processed and analyzed data.

7.4 COMPONENT DESIGN

Class diagrams, Interaction Diagrams, Algorithms. Description of each component


description required.
7.4.1 Class Diagram

Figure 7.3: Class Diagram


CHAPTER 8

PROJECT

DETAILS
8.1 INTRODUCTION

Data mining supports many different techniques for knowledge discovery and pre-
diction such as classification, clustering, sequential pattern mining, association rule
mining and analysis. Data mining is extensively used in business analysis, strategic
decision making, financial forecasting, future sales prediction etc. machine
learning algorithms are proposed for effective prediction of chronic disease.

8.2 TOOLS AND TECHNOLOGIES USED

8.2.1 Software Interface

• Operating System : Windows XP/7/Vista.

• Coding Language : Java/J2EE.

• Data Base : Mysql5.1

• IDE : Eclipse Kepler.

8.3 METHODOLOGIES/ALGORITHM DETAILS

Paper introduces a smart shopping facilitator for blind. The system mainly meant
for blind can also be used for normal people. Automatic Billing is introduced in the
smart announcement techniques. And payment using cash on delivery or online
can be done within the system. So that waiting long for billing can be avoided. The
audio instructions will assist them inside the supermarket application based on the
real time situations. And these Audio instructions help the blind people purchase
product inside the supermarket application. The guidelines are given to select prod-
ucts. While reading product id and all the details about product are given through
the microphone (Auxout).

8.3.1 Algorithm 1/Pseudo Code

Given a training set of N data points fyk ; xkgN k=1 , where xk 2 Rn is the k-th
input pattern and yk 2 R is the k-th output pattern, the support vector method
approach
aims at constructing a classifier of the form:

where k are positive real constants and b is a real constant. For (; ) one
typically has the following choices: (x; xk ) = x T k x (linear SVM); (x; xk ) =
(x T k x + 1) d (polynomial SVM of degree d); (x; xk ) = expfkx xkk2 2 = 2g (RBF
SVM); (x; xk ) = tanh[x T k x + ] (two layer neural SVM), where , and are
constants.
The classifier is constructed as follows. One assumes the

which is equivalent

where () is a nonlinear function which maps the input space into a higher
dimensional space. However, this function is not explicitly constructed. In order
to have the possibility to violate (3), in case a separating hyperplane in this higher
dimensional space does not exist, variables k are introduced such

According to the structural risk minimization principle, the risk bound is


min- imized by formulating the optimization problem:

subject to (4). Therefore one constructs the Lagrangian

by introducing Lagrange multipliers k 0, k 0 (k = 1; :::; N ). The solution is


given by the saddle point of the Lagrangian by computing
One obtains

which leads to the solution of the following quadratic programming problem

such

The function (xk ) in (9) is related then to (x; xk ) by imported,

Based on (10), Q2 can also be expressed in terms of (xk ; xl ). Finally, one


selects a support vector machine with minimal VC dimension by solving 10.
CHAPTER 9

SUMMARY AND CONCLUSION


The Assistant close Living system permits the visually impaired folks to buy prob-
lem free. It eliminates the dependence on others and therefore takes care of persons
comfort. It conjointly helps them to navigate within the looking complicated and
find things with none issue. It provides the power of text to speech conversion for
freelance looking of person. The areas of improvement are: sensible Phone may
be replaced by the other device if obtainable and therefore the data of things on top
of and below the presently detected item are contend within the users sensible
phone.
CHAPTER 10

REFRENCES
(a) Xiaodong Yang, Shuai Yuan, andYingLiTian, Assistive Clothing
Pattern Recognition for Visually Impaired People, IEEE transactions on
human machine systems, vol. 44, NO. 2, APRIL 2014.

(b) L. Atzori, A. Iera, and G. Morabito, From Smart Objects to Social Ob-
jects: The Next Evolutionary Step of the Internet of Things, IEEE Comm.,
vol. 52, no. 1, 2014, pp. 97105.

(c) Rubi, Chhavi Rana, A Review: Speech Recognition with Deep


Learning Methods International Journal of Computer Science and
Mobile Com- puting. Vol. 4, Issue. 5, May.

(d) Xiaodong Yang, Shuai Yuan, andYingLiTian, Assistive Clothing


Pattern Recognition for Visually Impaired People, IEEE transactions on
human machine systems, vol. 44, NO. 2, APRIL 2014.

(e) Kulyukin, V., Kutiyanawala, A. Accessible Shopping Systems for


Blind and Visually Im- paired Individuals Design Requirements and the
State of the Art The Open Rehabilitation Journal.

(f) Nicholson, J., Kulyukin, ShopTalk: Independent blind shopping verbal


route directions barcode scans In: Proceedings of the 30th Rehabilita-
tion Engineering and Assistive Technology Society of North America
(RESNA), Phoenix, Arizona (2007)

You might also like