SlideShare a Scribd company logo
1 of 20
PRESENTED BY :-
RATNAKAR PASWAN
B.TECH – COMPUTER SCIENCE & ENGG.
VOICE RECOGNITION SECURITY
SYSTEM
INDEX
PROJECT TITLE:- Voice Recognition Security System
 Background
 Objectives
 Features
 Software & Hardware requirement
 Tool & Technology
 Data Flow Diagram
 Future Scope of the Project
 Conclusion
BACKGROUND
• This project based on security purpose for any human who
have the android phone . Sometimes in problems we cants able
to touch the phone because of many reason your hands are tie
with rope or any other things happen in that position if you
need the help of anyone you can not call for help but this
project help you out if you are in problem and you want to
control your phone then you have to only speech some
keywords witch you are know and active the microphone and
call for help
OBJECTIVES
• This project main objective to keep you safe its offer you to
recognize your voice and take action behalf of that .this project
is very useful for everyone whos' concern about his/her security
• It make you feel secure and this project(app) also have feature
to sends your live location on your chosen phone number when
you call a secret code and many features……
FEATURES
• Speech Recognition and calling
(Always mic is enable in background)
• Real time location sharing
• Pattern command
• Emergency calling
• Real time camera snapshot
• Uses low data(Internet)
SOFTWARE REQUIREMENT
• Python 2.7, or Python 3.5 or newer.
• OpenGL
• Jupiter notebook(anaconda3)
• PyCharm
Operating System :
Microsoft Windows 10, 8, 7 (for development)
Android (8 and newer)
HARDWARE REQUIREMENT
For developing :
• 4 GB RAM minimum, 8 GB RAM recommended.
• 1.5 GB hard disk space + at least 1 GB for caches.
For use:-
• 2 GB ram min
• 1 GB disk space
TOOL AND TECHNOLOGY
Tools :-
• PyCharm
• Jypiter
Technology :-
• Python
• Kivy framework
• OpenCV
• Pandas
• NumPy
• Speech Recognition
• PyAudio
Python is a general-purpose a high level, interpreted , object-
oriented, dynamically typed programming language that is often
applied in scripting roles.
So, python is programing language as well as scripting
language.
Python is also called as interpreted language .
Python useful for complex application development as it is for
scripting or "glue code" that connects components together.
Python is a universal language found in a variety of different
applications
WHAT IS KIVY
• Kivy is a free and open source Python framework for developing
mobile apps and other multitouch application software with a
natural user interface (NUI). It is distributed under the terms of
the MIT License, and can run on Android, iOS, GNU/Linux,
macOS, and Windows.
• Kivy was first released in early 2011. This cross-platform
Python framework can be deployed to Windows, Mac, Linux,
and Raspberry Pi. It supports multitouch events in addition to
regular keyboard and mouse inputs. Kivy even supports GPU
acceleration of its graphics, since they’re built using OpenGL
ES2. The project uses the MIT license, so you can use this
library for free and commercial software.
WORKING WITH KIVY WIDGETS
• A widget is an onscreen control that the user will interact with. All
graphical user interface toolkits come with a set of widgets. Some
common widgets that you may have used include buttons, combo
boxes, and tabs. Kivy has many widgets built into its framework
• When you create an application with Kivy, you’re creating a Natural
User Interface or NUI. The idea behind a Natural User Interface is that
the user can easily learn how to use your software with little to no
instruction.
• Kivy does not attempt to use native controls or widgets. All of its
widgets are custom-drawn. This means that Kivy applications will
look the same across all platforms. However, it also means that your
app’s look and feel will differ from your user’s native applications.
This could be a benefit or a drawback, depending on your audience.
Running a “Hello, Kivy!” Program
To see how Kivy works, take a look at the following “Hello, World!” application:
from kivy.app import App
from kivy.uix.label import Label
class MainApp(App):
def build(self):
label = Label(text='Hello from Kivy',
size_hint=(.5, .5),
pos_hint={'center_x': .5, 'center_y': .5})
return label
if __name__ == '__main__':
app = MainApp()
app.run()
SPEECH RECOGNITION WITH PYTHON
Most modern speech recognition systems rely on what is known as a Hidden
Markov Model (HMM).This approach works on the assumption that a speech
signal, when viewed on a short enough timescale (say, ten milliseconds), can
be reasonably approximated as a stationary process—that is, a process in
which statistical properties do not change over time.
Working With Microphones
• To access your microphone with Speech Recognizer, you’ll have to install
the PyAudio package.
PICKING A PYTHON SPEECH RECOGNITION
PACKAGE
A handful of packages for speech recognition exist on PyPI. A few of
them include:
• apiai
• assemblyai
• google-cloud-speech
• pocketsphinx
• SpeechRecognition
• watson-developer-cloud
• wit
0 LEVEL DFD
Security
system
user result
1 LEVEL DFD
User
User details
Details of
commands
Set the
voice
commands
Log
in/registe
r
Allow
permission
Home page
Set the
pattern
Security
system
FUTURE SCOPE OF THE PROJECT
• This project is going to be developed in future and in future we
can use a ai to understand the voice of a user and also the ai
can see the user with help of a user it will make the much safe
for a person and is AI can see the user or hear him it can guess
the what action his user do is user try to suicide then it send
the info to nearest person and save its user . These can be
become the future of this project
CONCLUSION
• The voice recognition system is the capacity of a device or
program to receive and understand dictation, or to understand
a spoken instruction. The main concept of this project is to
design a voice recognition security system. This project is
mainly used for security purpose to identify the voice spoken
from the authorized person and the system work according to
its instruction
• Personal security is a general condition that occurs after
adequate ef.forts are taken to deter, delay, and provide warning
before possible crime.
REFERENCE
• https://www.w3schools.com/ for python
• https://www.geeksforgeeks.org/ for voice modules
• https://kivy.org/ for kivy
• https://pypi.org/ for python package
THANK YOU

More Related Content

What's hot (20)

Video compression
Video compressionVideo compression
Video compression
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Digital Audio in Multimedia
Digital Audio in MultimediaDigital Audio in Multimedia
Digital Audio in Multimedia
 
Smart Antenna for mobile communication
Smart Antenna for mobile communicationSmart Antenna for mobile communication
Smart Antenna for mobile communication
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
Seminar presentation on 5G
Seminar presentation on 5GSeminar presentation on 5G
Seminar presentation on 5G
 
5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
Digital Scent Technology
Digital Scent TechnologyDigital Scent Technology
Digital Scent Technology
 
IBOC TECHNOLOGY
IBOC TECHNOLOGYIBOC TECHNOLOGY
IBOC TECHNOLOGY
 
Iot
IotIot
Iot
 
basic ppt on IOT
basic ppt on IOTbasic ppt on IOT
basic ppt on IOT
 
IOT based Patient Health Monitoring System using Raspberry pi 3
IOT based Patient Health Monitoring System using Raspberry pi 3IOT based Patient Health Monitoring System using Raspberry pi 3
IOT based Patient Health Monitoring System using Raspberry pi 3
 
4 g wireless technology
4 g wireless technology4 g wireless technology
4 g wireless technology
 
Whatsapp seminar-report
Whatsapp seminar-reportWhatsapp seminar-report
Whatsapp seminar-report
 
Zigbee Based Patient Monitoring System
Zigbee Based Patient Monitoring SystemZigbee Based Patient Monitoring System
Zigbee Based Patient Monitoring System
 
I twin technology
I twin technologyI twin technology
I twin technology
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Voice morphing ppt
Voice morphing pptVoice morphing ppt
Voice morphing ppt
 

Similar to voice recognition security system ppt

Android Application Development Training by NITIN GUPTA
Android Application Development Training by NITIN GUPTA Android Application Development Training by NITIN GUPTA
Android Application Development Training by NITIN GUPTA NITIN GUPTA
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfNomanKhan869872
 
Android Workshop Part 1
Android Workshop Part 1Android Workshop Part 1
Android Workshop Part 1NAILBITER
 
Mobile Application Development powerpoint
Mobile Application Development powerpointMobile Application Development powerpoint
Mobile Application Development powerpointJohnLagman3
 
Mobeers waterloo-2011
Mobeers waterloo-2011Mobeers waterloo-2011
Mobeers waterloo-2011Brian LeRoux
 
How to Build Cross-Platform Mobile Apps Using Python
How to Build Cross-Platform Mobile Apps Using PythonHow to Build Cross-Platform Mobile Apps Using Python
How to Build Cross-Platform Mobile Apps Using PythonAndolasoft Inc
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App DevelopementAayush Gupta
 
android development training in mumbai
android development training in mumbaiandroid development training in mumbai
android development training in mumbaifaizrashid1995
 
Native mobile app development pros, cons, alternatives, and cost optimization
Native mobile app development pros, cons, alternatives, and cost optimizationNative mobile app development pros, cons, alternatives, and cost optimization
Native mobile app development pros, cons, alternatives, and cost optimizationCynoteck Technology Solutions
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseMarcel de Vries
 
Android Seminar || history || versions||application developement
Android Seminar || history || versions||application developement Android Seminar || history || versions||application developement
Android Seminar || history || versions||application developement Shubham Pahune
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1Nikhil Kulkarni
 

Similar to voice recognition security system ppt (20)

Android Application Development Training by NITIN GUPTA
Android Application Development Training by NITIN GUPTA Android Application Development Training by NITIN GUPTA
Android Application Development Training by NITIN GUPTA
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdf
 
Android ppt
Android ppt Android ppt
Android ppt
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Android Workshop Part 1
Android Workshop Part 1Android Workshop Part 1
Android Workshop Part 1
 
Mobile Application Development powerpoint
Mobile Application Development powerpointMobile Application Development powerpoint
Mobile Application Development powerpoint
 
DT project.pdf
DT project.pdfDT project.pdf
DT project.pdf
 
Android
AndroidAndroid
Android
 
Mobeers waterloo-2011
Mobeers waterloo-2011Mobeers waterloo-2011
Mobeers waterloo-2011
 
How to Build Cross-Platform Mobile Apps Using Python
How to Build Cross-Platform Mobile Apps Using PythonHow to Build Cross-Platform Mobile Apps Using Python
How to Build Cross-Platform Mobile Apps Using Python
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App Developement
 
android development training in mumbai
android development training in mumbaiandroid development training in mumbai
android development training in mumbai
 
Android technology
Android technology Android technology
Android technology
 
Native mobile app development pros, cons, alternatives, and cost optimization
Native mobile app development pros, cons, alternatives, and cost optimizationNative mobile app development pros, cons, alternatives, and cost optimization
Native mobile app development pros, cons, alternatives, and cost optimization
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
 
Android Seminar || history || versions||application developement
Android Seminar || history || versions||application developement Android Seminar || history || versions||application developement
Android Seminar || history || versions||application developement
 
Presentation
PresentationPresentation
Presentation
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1
 
Android
Android Android
Android
 

More from Nitesh Dubey

MLApproachToProgramming.ppt
MLApproachToProgramming.pptMLApproachToProgramming.ppt
MLApproachToProgramming.pptNitesh Dubey
 
seminar topic of holography.ppt
seminar topic of holography.pptseminar topic of holography.ppt
seminar topic of holography.pptNitesh Dubey
 
Compiler design.pdf
Compiler design.pdfCompiler design.pdf
Compiler design.pdfNitesh Dubey
 
Online shopping ppt
Online shopping pptOnline shopping ppt
Online shopping pptNitesh Dubey
 
Python lab manual all the experiments are available
Python lab manual all the experiments are availablePython lab manual all the experiments are available
Python lab manual all the experiments are availableNitesh Dubey
 
Web Technology Lab files with practical
Web Technology Lab  files with practicalWeb Technology Lab  files with practical
Web Technology Lab files with practicalNitesh Dubey
 
Theory of automata and formal language lab manual
Theory of automata and formal language lab manualTheory of automata and formal language lab manual
Theory of automata and formal language lab manualNitesh Dubey
 
Software engineering practical
Software engineering practicalSoftware engineering practical
Software engineering practicalNitesh Dubey
 
Principal of programming language lab files
Principal of programming language lab files Principal of programming language lab files
Principal of programming language lab files Nitesh Dubey
 
database management system lab files
database management system lab filesdatabase management system lab files
database management system lab filesNitesh Dubey
 
design and analysis of algorithm Lab files
design and analysis of algorithm Lab filesdesign and analysis of algorithm Lab files
design and analysis of algorithm Lab filesNitesh Dubey
 
Computer Organization And Architecture lab manual
Computer Organization And Architecture lab manualComputer Organization And Architecture lab manual
Computer Organization And Architecture lab manualNitesh Dubey
 
industrial training report on Ethical hacking
industrial training report on Ethical hackingindustrial training report on Ethical hacking
industrial training report on Ethical hackingNitesh Dubey
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceNitesh Dubey
 
Hrms industrial training report
Hrms industrial training reportHrms industrial training report
Hrms industrial training reportNitesh Dubey
 
Industrial training report on core java
Industrial training report on core java Industrial training report on core java
Industrial training report on core java Nitesh Dubey
 
SEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project reportSEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project reportNitesh Dubey
 
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMsynopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMNitesh Dubey
 
artificial intelligence ppt
artificial intelligence pptartificial intelligence ppt
artificial intelligence pptNitesh Dubey
 

More from Nitesh Dubey (20)

HTML Presentation
HTML  PresentationHTML  Presentation
HTML Presentation
 
MLApproachToProgramming.ppt
MLApproachToProgramming.pptMLApproachToProgramming.ppt
MLApproachToProgramming.ppt
 
seminar topic of holography.ppt
seminar topic of holography.pptseminar topic of holography.ppt
seminar topic of holography.ppt
 
Compiler design.pdf
Compiler design.pdfCompiler design.pdf
Compiler design.pdf
 
Online shopping ppt
Online shopping pptOnline shopping ppt
Online shopping ppt
 
Python lab manual all the experiments are available
Python lab manual all the experiments are availablePython lab manual all the experiments are available
Python lab manual all the experiments are available
 
Web Technology Lab files with practical
Web Technology Lab  files with practicalWeb Technology Lab  files with practical
Web Technology Lab files with practical
 
Theory of automata and formal language lab manual
Theory of automata and formal language lab manualTheory of automata and formal language lab manual
Theory of automata and formal language lab manual
 
Software engineering practical
Software engineering practicalSoftware engineering practical
Software engineering practical
 
Principal of programming language lab files
Principal of programming language lab files Principal of programming language lab files
Principal of programming language lab files
 
database management system lab files
database management system lab filesdatabase management system lab files
database management system lab files
 
design and analysis of algorithm Lab files
design and analysis of algorithm Lab filesdesign and analysis of algorithm Lab files
design and analysis of algorithm Lab files
 
Computer Organization And Architecture lab manual
Computer Organization And Architecture lab manualComputer Organization And Architecture lab manual
Computer Organization And Architecture lab manual
 
industrial training report on Ethical hacking
industrial training report on Ethical hackingindustrial training report on Ethical hacking
industrial training report on Ethical hacking
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
Hrms industrial training report
Hrms industrial training reportHrms industrial training report
Hrms industrial training report
 
Industrial training report on core java
Industrial training report on core java Industrial training report on core java
Industrial training report on core java
 
SEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project reportSEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project report
 
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMsynopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
 
artificial intelligence ppt
artificial intelligence pptartificial intelligence ppt
artificial intelligence ppt
 

Recently uploaded

kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 

Recently uploaded (20)

kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 

voice recognition security system ppt

  • 1. PRESENTED BY :- RATNAKAR PASWAN B.TECH – COMPUTER SCIENCE & ENGG. VOICE RECOGNITION SECURITY SYSTEM
  • 2. INDEX PROJECT TITLE:- Voice Recognition Security System  Background  Objectives  Features  Software & Hardware requirement  Tool & Technology  Data Flow Diagram  Future Scope of the Project  Conclusion
  • 3. BACKGROUND • This project based on security purpose for any human who have the android phone . Sometimes in problems we cants able to touch the phone because of many reason your hands are tie with rope or any other things happen in that position if you need the help of anyone you can not call for help but this project help you out if you are in problem and you want to control your phone then you have to only speech some keywords witch you are know and active the microphone and call for help
  • 4. OBJECTIVES • This project main objective to keep you safe its offer you to recognize your voice and take action behalf of that .this project is very useful for everyone whos' concern about his/her security • It make you feel secure and this project(app) also have feature to sends your live location on your chosen phone number when you call a secret code and many features……
  • 5. FEATURES • Speech Recognition and calling (Always mic is enable in background) • Real time location sharing • Pattern command • Emergency calling • Real time camera snapshot • Uses low data(Internet)
  • 6. SOFTWARE REQUIREMENT • Python 2.7, or Python 3.5 or newer. • OpenGL • Jupiter notebook(anaconda3) • PyCharm Operating System : Microsoft Windows 10, 8, 7 (for development) Android (8 and newer)
  • 7. HARDWARE REQUIREMENT For developing : • 4 GB RAM minimum, 8 GB RAM recommended. • 1.5 GB hard disk space + at least 1 GB for caches. For use:- • 2 GB ram min • 1 GB disk space
  • 8. TOOL AND TECHNOLOGY Tools :- • PyCharm • Jypiter Technology :- • Python • Kivy framework • OpenCV • Pandas • NumPy • Speech Recognition • PyAudio
  • 9. Python is a general-purpose a high level, interpreted , object- oriented, dynamically typed programming language that is often applied in scripting roles. So, python is programing language as well as scripting language. Python is also called as interpreted language . Python useful for complex application development as it is for scripting or "glue code" that connects components together. Python is a universal language found in a variety of different applications
  • 10. WHAT IS KIVY • Kivy is a free and open source Python framework for developing mobile apps and other multitouch application software with a natural user interface (NUI). It is distributed under the terms of the MIT License, and can run on Android, iOS, GNU/Linux, macOS, and Windows. • Kivy was first released in early 2011. This cross-platform Python framework can be deployed to Windows, Mac, Linux, and Raspberry Pi. It supports multitouch events in addition to regular keyboard and mouse inputs. Kivy even supports GPU acceleration of its graphics, since they’re built using OpenGL ES2. The project uses the MIT license, so you can use this library for free and commercial software.
  • 11. WORKING WITH KIVY WIDGETS • A widget is an onscreen control that the user will interact with. All graphical user interface toolkits come with a set of widgets. Some common widgets that you may have used include buttons, combo boxes, and tabs. Kivy has many widgets built into its framework • When you create an application with Kivy, you’re creating a Natural User Interface or NUI. The idea behind a Natural User Interface is that the user can easily learn how to use your software with little to no instruction. • Kivy does not attempt to use native controls or widgets. All of its widgets are custom-drawn. This means that Kivy applications will look the same across all platforms. However, it also means that your app’s look and feel will differ from your user’s native applications. This could be a benefit or a drawback, depending on your audience.
  • 12. Running a “Hello, Kivy!” Program To see how Kivy works, take a look at the following “Hello, World!” application: from kivy.app import App from kivy.uix.label import Label class MainApp(App): def build(self): label = Label(text='Hello from Kivy', size_hint=(.5, .5), pos_hint={'center_x': .5, 'center_y': .5}) return label if __name__ == '__main__': app = MainApp() app.run()
  • 13. SPEECH RECOGNITION WITH PYTHON Most modern speech recognition systems rely on what is known as a Hidden Markov Model (HMM).This approach works on the assumption that a speech signal, when viewed on a short enough timescale (say, ten milliseconds), can be reasonably approximated as a stationary process—that is, a process in which statistical properties do not change over time. Working With Microphones • To access your microphone with Speech Recognizer, you’ll have to install the PyAudio package.
  • 14. PICKING A PYTHON SPEECH RECOGNITION PACKAGE A handful of packages for speech recognition exist on PyPI. A few of them include: • apiai • assemblyai • google-cloud-speech • pocketsphinx • SpeechRecognition • watson-developer-cloud • wit
  • 16. 1 LEVEL DFD User User details Details of commands Set the voice commands Log in/registe r Allow permission Home page Set the pattern Security system
  • 17. FUTURE SCOPE OF THE PROJECT • This project is going to be developed in future and in future we can use a ai to understand the voice of a user and also the ai can see the user with help of a user it will make the much safe for a person and is AI can see the user or hear him it can guess the what action his user do is user try to suicide then it send the info to nearest person and save its user . These can be become the future of this project
  • 18. CONCLUSION • The voice recognition system is the capacity of a device or program to receive and understand dictation, or to understand a spoken instruction. The main concept of this project is to design a voice recognition security system. This project is mainly used for security purpose to identify the voice spoken from the authorized person and the system work according to its instruction • Personal security is a general condition that occurs after adequate ef.forts are taken to deter, delay, and provide warning before possible crime.
  • 19. REFERENCE • https://www.w3schools.com/ for python • https://www.geeksforgeeks.org/ for voice modules • https://kivy.org/ for kivy • https://pypi.org/ for python package