AI Shopping Aid for Visually Impaired
AI Shopping Aid for Visually Impaired
INDEX
1 Synopsis 1
1.1 Project Title . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Project Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Internal Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Sponsorship and External Guide . . . . . . . . . . . . . . . . . . . 2
1.5 Technical Keywords (As per ACM Keywords) . . . . . . . . . . . . 2
1.6 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.7 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.8 Goals and Objectives . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.9 Relevant mathematics associated with the Project . . . . . . . . . . 4
1.10 Names of Conferences / Journals where papers can be published . . 5
1.11 Review of Conference/Journal Papers supporting Project idea . . . . 5
1.12 Plan of Project Execution . . . . . . . . . . . . . . . . . . . . . . . 6
2 Technical Keywords 7
2.1 Area of Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2 Categories and Subject Descriptors: . . . . . . . . . . . . . . . . . 8
3 Introduction 9
3.1 Project Idea...............................................................................................10
3.2 Motivation of the Project..........................................................................11
3.3 Literature Survey......................................................................................11
4 Problem Definition and Scope 15
4.1 Problem Statement...................................................................................16
4.1.1 Goals and objectives....................................................................16
4.1.2 Statement of Scope......................................................................16
4.2 Software context.......................................................................................16
4.3 Major Constraints.....................................................................................17
4.4 Methodologies of Problem solving and efficiency issues........................17
4.5 Outcome...................................................................................................18
4.6 Applications..............................................................................................18
4.7 System Requirements:..............................................................................18
4.7.1 Hardware Resources Required....................................................18
4.7.2 Software Resources Required......................................................18
5 Project Plan 19
5.1 Project Estimates......................................................................................20
5.1.1 Reconciled Estimates...................................................................21
5.1.2 Project Resources........................................................................22
5.2 Risk Management w.r.t. NP Complete analysis.......................................22
5.2.1 Risk Analysis...............................................................................22
5.2.2 Risk Probability definitions:........................................................22
5.2.3 Risk Impact definitions:...............................................................23
5.2.4 Overview of Risk Mitigation, Monitoring, Management............23
5.3 Project Schedule.......................................................................................24
5.3.1 Project task set.............................................................................24
5.3.2 Task network...............................................................................25
5.3.3 Timeline Chart.............................................................................25
5.4 Team Organization...................................................................................26
5.4.1 Team structure.............................................................................26
5.4.2 Management reporting and communication................................26
8 Project Details 40
8.1 Introduction..............................................................................................41
8.2 Tools and Technologies Used..................................................................41
8.2.1 Software Interface........................................................................41
8.3 Methodologies/Algorithm Details............................................................41
8.3.1 Algorithm 1/Pseudo Code...........................................................41
10 Refrences 46
List of Figures
SYNOPSIS
1.1 PROJECT TITLE
Internal Project
Prof. S. D. Jondhale
Nil
2. Distributed Systems
A. Security and reliability issues in distributed applications
People who are sighted have the luxury of looking at items and reading the labels
on clothing to make decisions about what to purchase. People who are visually
impaired can feel the items, but they cannot easily tell the color of the garment, the
type of clothing, or the care of the garment. In essence, the fashion industry is
criminates against visually impaired people by not making the standard
information available to them in a form that they can read. The fashion industry
should identify an acceptable way for visually impaired individuals to identify
specific characteristics of interest about the clothing they purchase.
1.7 ABSTRACT
is the state of a person in which one has to depend on others for their own
needs. Visual impairment is one of the disabilities of a human being. To date
numerous methods had been proposed to enhance the life style of visually
impaired and blind people. Still purchasing products in the e-shopping appli-
cation without others support is tricky one for them. The project describes
a system that provides the guidance for them to identify and purchase their
products in the supermarket application.
The audio instructions will assist them inside the supermarket application
based on the real time situations. To make the supermarket in a smarter way the
billing system is automated. Hence it eliminates the existing queuing system
in the supermarket. The ultimate aim of this system is to eliminate others
sup- port for visually impaired people in shopping and provide them a
convenient and sophisticated environment. On implementing this system, it
facilitates the blind people shopping, save the customer’s time and promotes
business sales.
1.8 GOALS AND OBJECTIVES
• This app useful for blind person shopping. The main objective of Ambient
As- sisted Living is to provide blind people the facility to shop themselves
without the help of anyone or detect household stuffs by themselves. The
scope is to provide the facility of text to speech conversion for impaired
person to shop independently by solving the navigation problem for blind
person with less number of hardware requirements.
System Description:
• System Description:
Input-
u=No. of user
u={u1, u2, u3,.,u nth}
p={p1, p2, p3,...,pn
Output:-
O=Generate the report every user with Shopping
Process :-
Process1 : Admin- Admin log in and add product.
Process 2 : User Registration and log in with voice detection and buy product.
• Success Conditions: If user giver give correct input that time produce correct
output.
1. Paper Name: Assistive Clothing Pattern Recognition for Visually Impaired Peo-
ple.
Author Name: Xiaodong Yang ,Shuai Yuan , YingLi Tian.
Description: Choosing garments with complicated patterns and colours is a diffi-
cult task for visually impaired individuals. Automatic article of clothing pattern
recognition is additionally a difficult analysis downside due to rotation, scaling,
illu- mination, and particularly massive infraclass pattern variations. Weve got
developed a camera-based image system that acknowledges article of clothing
patterns in four classs plaid, striped, pattern less, and irregular and identifies eleven
articles of cloth- ing colours. The system integrates a camera, a mike, a computer,
and a Bluetooth headphone for audio description of article of clothing patterns and
colours. A cam- era mounted upon a try of glasses is employed to capture article of
clothing pictures. The article of clothing patterns and colours are described to blind
users verbally. This method will be controlled by speech input through mike. to
acknowledge arti- cle of clothing patterns, we propose a completely unique Run
Signature descriptor and a schema to extract applied math properties from ripple
sub bands to capture
global options of article of clothing patterns.
TECHNICAL KEYWORDS
2.1 AREA OF PROJECT
Data mining.
INTRODUCTION
3.1 PROJECT IDEA
This project is developed to make the life of blind people easy. This is very
beneficial in case of finding out the description of packaged goods to the
blind people and thus helping them in deciding to purchase a product or not
espe- cially which are packaged. This is because it becomes very difficult for
the blind people to distinguish between the packaged goods. Thus this
applica- tion really benefits blind and visually impaired people and thus
making their work of identifying products easy. In this smart world, no one
can end up the day without using any kind of embedded system products. It
makes our hu- man life very smarter and to feel comfortable. In worldwide,
the great regret factor is visual impairment. Based on the statistics of World
Health Organiza- tion (WHO) in 2012, 285 million people are visually
challenged in the world. Among them 39 million people are blind and 246
million having low power vision. About 90% of them are living in
developing countries.
Shopping is a place where people get their daily necessities ranging from
food products, clothing, electrical appliances etc. Sometimes customers have
prob- lems regarding the incomplete information about the product on sale
and waste of unnecessary time at the billing counters. Continuous
improvement is re- quired in the traditional billing system to improve the
quality of shopping experience to the customers. Now days numbers of large
as well as small shopping applications has increased throughout the global
due to increasing public demand spending. At the time of festivals, special
discounts, holidays, etc. there is a huge rush in shopping mall. At present,
many supermarkets still adopt traditional shopping mode and bar code
scanning, which is a waste of manpower and material resources. Also, long
time waiting to pay and the tire of pushing shopping cart all make clients
suffer a lot and may cause passen- ger volume go down. Consequently, the
needs to help reduce queuing time for customers to check-out and to free
people from pushing the shopping carts hard have been an urgent issue to
tackle. So here the paper introduces a sys- tem to reduce and possibly
eliminate the total waiting time of customers and
can avoid manpower. Here the system helps to find the required products
from the shopping cart. Here it uses feature extraction and stop-word
filtering tech- nology to identify the product as per your wants and to
determine the exact product lists from available items as well as the person.
The rate and name of each product taken by the person is added to the bill in
addition it is displayed on the screen and is announced using speaker. The
billing can be done using announcement techniques.
Reduced traffic.
Increased Safety.
Real-Time Data and Trend Insight: Over time, a Blind person shopping solution
can produce data that uncovers correlations and trends of users and lots. These
trends can prove to be invaluable to lot owners as to how to make adjustments and
improvements to drivers.
2. Paper Name: From Smart Objects to Social Objects: The Next Evolutionary
Step of the Internet of Things.
Author Name: L. Atzori, A. Iera, and G. Morabito.
Description: Iris recognition verification is one amongst the foremost reliable
personal identification strategies in statistics. With the fast development of
iris recognition verification, variety of its applications are proposed as yet
together with time group action system etc. during this paper, a wireless iris
recognition attendance management system is meant and enforced
exploitation Dogmans algorithmic program (Dogman, 2003). This method
based mostly statistics and wireless technique solves the matter of spurious
group action and the has- sle of birth the corresponding network. It will
create the users attendances a lot of simply and effectively.
5. Paper Name: Accessible Shopping Systems for Blind and Visually Impaired
Individuals: Design Requirements and the State of the Art.
Author Name: Vladimir A. Kulyukin, Aliasgar Kutiyanawala.
Description: Independent grocery searching is one among the foremost func-
tionally difficult tasks for visually impaired and blind people. Several helpful
searching systems are developed to handle the matter of blind grocery
search- ing. During this article, we have a tendency to establish many style
necessi-
ties for helpful searching systems and analyze existing approaches to
envision however well they meet them. Our objective is to shed some
lightweight on po- tential analysis and development directions for the
accessible blind searching community and to supply designers of accessible
searching solutions analysis tools which will be used as initial points of
comparison.
CHAPTER 4
People who are sighted have the luxury of looking at items and reading the labels
on clothing to make decisions about what to purchase. People who are visually
impaired can feel the items, but they cannot easily tell the color of the garment, the
type of clothing, or the care of the garment. In essence, the fashion industry is
criminates against visually impaired people by not making the standard
information available to them in a form that they can read. The fashion industry
should identify an acceptable way for visually impaired individuals to identify
specific characteristics of interest about the clothing they purchase.
• The scope is to provide the facility of text to speech conversion for impaired
person to shop independently by solving the navigation problem for blind
per- son with less number of hardware requirements.
• JAVA JDK 1.7 and above and Eclipse IDE with Database MYSQL.
Some problems are small and can be resolved quickly. Other problems are large
and may require significant time and effort to solve. These larger problems are
often tackled by turning them into formal projects.
Whether the problem you are focusing on is small or large, using a systematic ap-
proach for solving it will help you be a more effective project manager.
User Section:
• User Registration
• System capture your voice cmd and filter it through stop word removing
tech- nique.
• Perform Transaction
• Logout
Admin Section:
• Admin Login
• Chek user
• Add products.
• About us form
4.5 OUTCOME
4.6 APPLICATIONS
• Blind People
• Normal People
• System : i3
• Mouse : Logitech.
• RAM : 4 GB.
4. Database : MYSQL
CHAPTER 5
PROJECT PLAN
5.1 PROJECT ESTIMATES
2. System Design:
In this system design phase we design the system which is easily understood for
end user i.e. user friendly. We design some UML diagrams and data flow diagram
to understand the system flow and system module and sequence of execution.
3. Implementation:
In implementation phase of our project we have implemented various module re-
quired of successfully getting expected outcome at the different module levels.
With inputs from system design, the system is first developed in small programs
called
units, which are integrated in the next phase. Each unit is developed and tested for
its functionality which is referred to as Unit Testing.
4. Testing:
The different test cases are performed to test whether the project module are giving
expected outcome in assumed time. All the units developed in the implementation
phase are integrated into a system after testing of each unit. Post integration the en-
tire system is tested for any faults and failures.
5. Deployment of System:
Once the functional and nonfunctional testing is done, the product is deployed in
the customer environment or released into the market.
6. Maintenance:
There are some issues which come up in the client environment. To fix those issues
patches are released. Also to enhance the product some better versions are
released. Maintenance is done to deliver these changes in the customer
environment.
All these phases are cascaded to each other in which progress is seen as flowing
steadily downwards like a waterfall through the phases. The next phase is started
only after the defined set of goals are achieved for previous phase and it is signed
off, so the name ”Waterfall Model”. In this model phases do not overlap.
Approximately 18000
Approximately 11
months.
5.1.2 Project Resources
Windows , eclipse IDE, 2.93 GHZ CPU speed, 8 GB RAM, High speed internet
connection.
ANALYSIS Np Complete:
Using PTTP algorithm it is possible to find out the optimized solution in
polynomial time by reducing the actual problem P
The risks for the Project can be analyzed within the constraints of time and quality.
Impact
ID Risk Description Probability
Schedule Quality Overall
1 Correctness Medium High High Medium
2 Availability High High High High
The project schedule starts from Aug 2017 and ends in March 2018. The Different
Phases identified are:
1. Requirement Analysis.
2. Requirement Specification.
3. System Design.
4. Detailed Design.
5. Coding.
6. Testing.
The Gantt chart as shown below represents the approximate schedule followed for
the completion of each phase:
• Task 1: Correctness.
• Task 2: Availability.
• Task 3: Integrity.
5.3.2 Task network
Project tasks and their dependencies are noted in this diagrammatic form.
A project timeline chart is presented. This may include a time line for the entire
project. Above points should be covered in Project Planner as Annex C and you
can mention here Please refer Annex C for the planner
Team consists of only one member and proper planning mechanism is used and
roles are defined.
The team structure for the project is identified. Roles are defined.
Well planning mechanisms are used for progress reporting and inter/intra team
com- munication are identified as per requirements of the project.
CHAPTER 6
SOFTWARE REQUIREMENT
SPECIFICATION
6.1 INTRODUCTION
Document Purpose:
Data mining represents a key factor in evaluating the trustworthiness of sensor
data. Privacy management for networks introduces several challenging requirements,
such as low energy and bandwidth consumption, efficient storage and secure
transmis- sion. In this project, we are proposing a blind people shopping by using
AI from Blind Communities to securely transmit the data.
Scope:
It provides the facility of text to speech conversion for independent shopping of
per- son. The areas of improvement are: Smart Phone can be replaced by any other
device if available and the information of items above and below the currently
detected item will be played in the users smart phone.
2. To know what are the hardware and software requirements of proposed system.
1. user registration
2. user login
3. voice recognition
4. product recomendation
5. transaction process
Result: Recommend usefull products.
6.2.1 Use-cases
Use cases can be employed during several stages of software development, such as
planning system requirements, validating design, testing software, and creating an
outline for online help and user manuals.
6.2.2 Use Case View
Data streams are given to framework which will classify that data and then this data is
given to server for processing an analysis purpose, so this is how these two
modules are connected.
Data streams will be processed and analyzed by framework and Apache. The real
time queue is used internally by apache. Processing items are internally generated
and processed by regretting two modules.
• The system will be available 100% of the time. Once there is a fatal error,
the system will provide understandable feed back to the user.
• All data will be backed-up every day automatically and also the system ad-
ministrator can back-up the data as a function for him.
• This makes it easier to install and updates new functionality if required.
The software interface to the outside world is very good and user friendly for ana-
lyzed Data The requirements for interfaces are Windows XP/7,8 GB RAM etc.
CHAPTER 7
This document specifies the design that is used to solve the problem of Product.
According to WHO, there are around 161 million people who are visually impaired
people and around 36 million are blind. These people are taking help from family
member or friends to each and every for their needs. It is a difficult for blind
people to choose clothes with different colors or they find difficult to online
shopping. A system is developed to assist blind people that automatically
recognizing clothing patterns and colors. Camera-based clothing pattern
recognition is a problematic due to many clothing pattern and corresponding large
intra class variations. Existing tex- ture analysis methods focus on textures with
variations in viewpoint and scaling. The level of accuracy in clothing pattern
recognition cannot achieve by texture analysis methods. Here, we introduce a
system to assist color blind people to select differ- ent clothing colors along with
different categories. The system contains three major components:
1) Database which contain clothing images, a microphone for speech command in-
put.
2) Speech converter that convert the input speech into text format.
3) Display of resulting items on the screen of desktop or wearable computer along
with speech.
The system process the voice input, captured voice input is acoustic sound waves
that are to be converted into the character string format for semantic interpretation.
The result of character string format obtained is then proceed for the global and
local feature identification, global feature such as the gender and category,
category such as pant, sari, dresses, shirt and so on while the local feature such as
red pant then the red is the local feature of the global feature pant .Conventional
speech recogni- tion systems use Gaussian mixture model (GMM) based hidden
Markov models to represent speech signals. HMMs based speech recognition
systems can be trained automatically and are simple and computationally feasible
to use. However, one of
the main drawbacks of Gaussian mixture models is that they are statistically ineffi-
cient for modeling data that lie on or near a non-linear manifold in the data space.
We are using Deep learning, sometimes referred as representation learning or
unsu- pervised feature learning is a new area of machine learning.
A description of all data structures including internal, global, and temporary data
structures, database design (tables), file formats.
Data Streams
Figure 7.2: Architecture diagram
Processing items
PROJECT
DETAILS
8.1 INTRODUCTION
Data mining supports many different techniques for knowledge discovery and pre-
diction such as classification, clustering, sequential pattern mining, association rule
mining and analysis. Data mining is extensively used in business analysis, strategic
decision making, financial forecasting, future sales prediction etc. machine
learning algorithms are proposed for effective prediction of chronic disease.
Paper introduces a smart shopping facilitator for blind. The system mainly meant
for blind can also be used for normal people. Automatic Billing is introduced in the
smart announcement techniques. And payment using cash on delivery or online
can be done within the system. So that waiting long for billing can be avoided. The
audio instructions will assist them inside the supermarket application based on the
real time situations. And these Audio instructions help the blind people purchase
product inside the supermarket application. The guidelines are given to select prod-
ucts. While reading product id and all the details about product are given through
the microphone (Auxout).
Given a training set of N data points fyk ; xkgN k=1 , where xk 2 Rn is the k-th
input pattern and yk 2 R is the k-th output pattern, the support vector method
approach
aims at constructing a classifier of the form:
where k are positive real constants and b is a real constant. For (; ) one
typically has the following choices: (x; xk ) = x T k x (linear SVM); (x; xk ) =
(x T k x + 1) d (polynomial SVM of degree d); (x; xk ) = expfkx xkk2 2 = 2g (RBF
SVM); (x; xk ) = tanh[x T k x + ] (two layer neural SVM), where , and are
constants.
The classifier is constructed as follows. One assumes the
which is equivalent
where () is a nonlinear function which maps the input space into a higher
dimensional space. However, this function is not explicitly constructed. In order
to have the possibility to violate (3), in case a separating hyperplane in this higher
dimensional space does not exist, variables k are introduced such
such
REFRENCES
(a) Xiaodong Yang, Shuai Yuan, andYingLiTian, Assistive Clothing
Pattern Recognition for Visually Impaired People, IEEE transactions on
human machine systems, vol. 44, NO. 2, APRIL 2014.
(b) L. Atzori, A. Iera, and G. Morabito, From Smart Objects to Social Ob-
jects: The Next Evolutionary Step of the Internet of Things, IEEE Comm.,
vol. 52, no. 1, 2014, pp. 97105.