SlideShare a Scribd company logo
PRESENTED BY :-
RATNAKAR PASWAN
B.TECH – COMPUTER SCIENCE & ENGG.
VOICE RECOGNITION SECURITY
SYSTEM
INDEX
PROJECT TITLE:- Voice Recognition Security System
 Background
 Objectives
 Features
 Software & Hardware requirement
 Tool & Technology
 Data Flow Diagram
 Future Scope of the Project
 Conclusion
BACKGROUND
• This project based on security purpose for any human who
have the android phone . Sometimes in problems we cants able
to touch the phone because of many reason your hands are tie
with rope or any other things happen in that position if you
need the help of anyone you can not call for help but this
project help you out if you are in problem and you want to
control your phone then you have to only speech some
keywords witch you are know and active the microphone and
call for help
OBJECTIVES
• This project main objective to keep you safe its offer you to
recognize your voice and take action behalf of that .this project
is very useful for everyone whos' concern about his/her security
• It make you feel secure and this project(app) also have feature
to sends your live location on your chosen phone number when
you call a secret code and many features……
FEATURES
• Speech Recognition and calling
(Always mic is enable in background)
• Real time location sharing
• Pattern command
• Emergency calling
• Real time camera snapshot
• Uses low data(Internet)
SOFTWARE REQUIREMENT
• Python 2.7, or Python 3.5 or newer.
• OpenGL
• Jupiter notebook(anaconda3)
• PyCharm
Operating System :
Microsoft Windows 10, 8, 7 (for development)
Android (8 and newer)
HARDWARE REQUIREMENT
For developing :
• 4 GB RAM minimum, 8 GB RAM recommended.
• 1.5 GB hard disk space + at least 1 GB for caches.
For use:-
• 2 GB ram min
• 1 GB disk space
TOOL AND TECHNOLOGY
Tools :-
• PyCharm
• Jypiter
Technology :-
• Python
• Kivy framework
• OpenCV
• Pandas
• NumPy
• Speech Recognition
• PyAudio
Python is a general-purpose a high level, interpreted , object-
oriented, dynamically typed programming language that is often
applied in scripting roles.
So, python is programing language as well as scripting
language.
Python is also called as interpreted language .
Python useful for complex application development as it is for
scripting or "glue code" that connects components together.
Python is a universal language found in a variety of different
applications
WHAT IS KIVY
• Kivy is a free and open source Python framework for developing
mobile apps and other multitouch application software with a
natural user interface (NUI). It is distributed under the terms of
the MIT License, and can run on Android, iOS, GNU/Linux,
macOS, and Windows.
• Kivy was first released in early 2011. This cross-platform
Python framework can be deployed to Windows, Mac, Linux,
and Raspberry Pi. It supports multitouch events in addition to
regular keyboard and mouse inputs. Kivy even supports GPU
acceleration of its graphics, since they’re built using OpenGL
ES2. The project uses the MIT license, so you can use this
library for free and commercial software.
WORKING WITH KIVY WIDGETS
• A widget is an onscreen control that the user will interact with. All
graphical user interface toolkits come with a set of widgets. Some
common widgets that you may have used include buttons, combo
boxes, and tabs. Kivy has many widgets built into its framework
• When you create an application with Kivy, you’re creating a Natural
User Interface or NUI. The idea behind a Natural User Interface is that
the user can easily learn how to use your software with little to no
instruction.
• Kivy does not attempt to use native controls or widgets. All of its
widgets are custom-drawn. This means that Kivy applications will
look the same across all platforms. However, it also means that your
app’s look and feel will differ from your user’s native applications.
This could be a benefit or a drawback, depending on your audience.
Running a “Hello, Kivy!” Program
To see how Kivy works, take a look at the following “Hello, World!” application:
from kivy.app import App
from kivy.uix.label import Label
class MainApp(App):
def build(self):
label = Label(text='Hello from Kivy',
size_hint=(.5, .5),
pos_hint={'center_x': .5, 'center_y': .5})
return label
if __name__ == '__main__':
app = MainApp()
app.run()
SPEECH RECOGNITION WITH PYTHON
Most modern speech recognition systems rely on what is known as a Hidden
Markov Model (HMM).This approach works on the assumption that a speech
signal, when viewed on a short enough timescale (say, ten milliseconds), can
be reasonably approximated as a stationary process—that is, a process in
which statistical properties do not change over time.
Working With Microphones
• To access your microphone with Speech Recognizer, you’ll have to install
the PyAudio package.
PICKING A PYTHON SPEECH RECOGNITION
PACKAGE
A handful of packages for speech recognition exist on PyPI. A few of
them include:
• apiai
• assemblyai
• google-cloud-speech
• pocketsphinx
• SpeechRecognition
• watson-developer-cloud
• wit
0 LEVEL DFD
Security
system
user result
1 LEVEL DFD
User
User details
Details of
commands
Set the
voice
commands
Log
in/registe
r
Allow
permission
Home page
Set the
pattern
Security
system
FUTURE SCOPE OF THE PROJECT
• This project is going to be developed in future and in future we
can use a ai to understand the voice of a user and also the ai
can see the user with help of a user it will make the much safe
for a person and is AI can see the user or hear him it can guess
the what action his user do is user try to suicide then it send
the info to nearest person and save its user . These can be
become the future of this project
CONCLUSION
• The voice recognition system is the capacity of a device or
program to receive and understand dictation, or to understand
a spoken instruction. The main concept of this project is to
design a voice recognition security system. This project is
mainly used for security purpose to identify the voice spoken
from the authorized person and the system work according to
its instruction
• Personal security is a general condition that occurs after
adequate ef.forts are taken to deter, delay, and provide warning
before possible crime.
REFERENCE
• https://www.w3schools.com/ for python
• https://www.geeksforgeeks.org/ for voice modules
• https://kivy.org/ for kivy
• https://pypi.org/ for python package
THANK YOU

More Related Content

What's hot

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Voice browser
Voice browserVoice browser
Voice browser
Adarsh Kumar Yadav
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
Text to Speech PowerPoint
Text to Speech PowerPointText to Speech PowerPoint
Text to Speech PowerPointmatthewmahony
 
Speech Recognition in Artificail Inteligence
Speech Recognition in Artificail InteligenceSpeech Recognition in Artificail Inteligence
Speech Recognition in Artificail Inteligence
Ilhaan Marwat
 
Voice Browser
Voice BrowserVoice Browser
Voice Browser
Saila Sri
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentation
himanshubhatti
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
avinash raibole
 
Computer Vision
Computer VisionComputer Vision
Computer Vision
Ameer Mohamed Rajah
 
GLOBAL WIRELESS E-VOTING
GLOBAL WIRELESS E-VOTINGGLOBAL WIRELESS E-VOTING
GLOBAL WIRELESS E-VOTING
JSPM's JSCOE , Pune Maharashtra.
 
Eye gaze communication
Eye gaze communicationEye gaze communication
Eye gaze communication
PRADEEP Cheekatla
 
Hand Gesture Recognition
Hand Gesture RecognitionHand Gesture Recognition
Hand Gesture Recognition
Shounak Katyayan
 
ppt of gesture recognition
ppt of gesture recognitionppt of gesture recognition
ppt of gesture recognitionAayush Agrawal
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
sagar solanky
 
Speech to text conversion
Speech to text conversionSpeech to text conversion
Speech to text conversionankit_saluja
 
Sign language recognizer
Sign language recognizerSign language recognizer
Sign language recognizer
Bikash Chandra Karmokar
 
Virtual reality in hci
Virtual reality in hciVirtual reality in hci
Virtual reality in hcijeet patalia
 
Silverlight
SilverlightSilverlight
Silverlight
BiTWiSE
 

What's hot (20)

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Voice browser
Voice browserVoice browser
Voice browser
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
Text to Speech PowerPoint
Text to Speech PowerPointText to Speech PowerPoint
Text to Speech PowerPoint
 
Speech Recognition in Artificail Inteligence
Speech Recognition in Artificail InteligenceSpeech Recognition in Artificail Inteligence
Speech Recognition in Artificail Inteligence
 
Voice Browser
Voice BrowserVoice Browser
Voice Browser
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentation
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
 
Computer Vision
Computer VisionComputer Vision
Computer Vision
 
GLOBAL WIRELESS E-VOTING
GLOBAL WIRELESS E-VOTINGGLOBAL WIRELESS E-VOTING
GLOBAL WIRELESS E-VOTING
 
Eye gaze communication
Eye gaze communicationEye gaze communication
Eye gaze communication
 
Hand Gesture Recognition
Hand Gesture RecognitionHand Gesture Recognition
Hand Gesture Recognition
 
ppt of gesture recognition
ppt of gesture recognitionppt of gesture recognition
ppt of gesture recognition
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Speech to text conversion
Speech to text conversionSpeech to text conversion
Speech to text conversion
 
Sign language recognizer
Sign language recognizerSign language recognizer
Sign language recognizer
 
Voice browser
Voice browserVoice browser
Voice browser
 
Virtual reality in hci
Virtual reality in hciVirtual reality in hci
Virtual reality in hci
 
Silverlight
SilverlightSilverlight
Silverlight
 

Similar to voice recognition security system ppt

Android Application Development Training by NITIN GUPTA
Android Application Development Training by NITIN GUPTA Android Application Development Training by NITIN GUPTA
Android Application Development Training by NITIN GUPTA
NITIN GUPTA
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdf
NomanKhan869872
 
Android ppt
Android pptAndroid ppt
Android Applications
Android ApplicationsAndroid Applications
Android Applications
Nazeer Hussain University
 
Android Workshop Part 1
Android Workshop Part 1Android Workshop Part 1
Android Workshop Part 1
NAILBITER
 
Mobile Application Development powerpoint
Mobile Application Development powerpointMobile Application Development powerpoint
Mobile Application Development powerpoint
JohnLagman3
 
DT project.pdf
DT project.pdfDT project.pdf
DT project.pdf
AkshayKumar895051
 
Android
AndroidAndroid
Android
Tapan Khilar
 
Mobeers waterloo-2011
Mobeers waterloo-2011Mobeers waterloo-2011
Mobeers waterloo-2011Brian LeRoux
 
How to Build Cross-Platform Mobile Apps Using Python
How to Build Cross-Platform Mobile Apps Using PythonHow to Build Cross-Platform Mobile Apps Using Python
How to Build Cross-Platform Mobile Apps Using Python
Andolasoft Inc
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App Developement
Aayush Gupta
 
android development training in mumbai
android development training in mumbaiandroid development training in mumbai
android development training in mumbai
faizrashid1995
 
Android technology
Android technology Android technology
Android technology
vikas malviya
 
Native mobile app development pros, cons, alternatives, and cost optimization
Native mobile app development pros, cons, alternatives, and cost optimizationNative mobile app development pros, cons, alternatives, and cost optimization
Native mobile app development pros, cons, alternatives, and cost optimization
Cynoteck Technology Solutions
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
Marcel de Vries
 
Android Seminar || history || versions||application developement
Android Seminar || history || versions||application developement Android Seminar || history || versions||application developement
Android Seminar || history || versions||application developement
Shubham Pahune
 
Presentation
PresentationPresentation
Presentation
allanchristiancarlos
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1
Nikhil Kulkarni
 
Android
Android Android

Similar to voice recognition security system ppt (20)

Android Application Development Training by NITIN GUPTA
Android Application Development Training by NITIN GUPTA Android Application Development Training by NITIN GUPTA
Android Application Development Training by NITIN GUPTA
 
Android Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdfAndroid Seminar BY Suleman Khan.pdf
Android Seminar BY Suleman Khan.pdf
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
 
Android ppt
Android ppt Android ppt
Android ppt
 
Android Workshop Part 1
Android Workshop Part 1Android Workshop Part 1
Android Workshop Part 1
 
Mobile Application Development powerpoint
Mobile Application Development powerpointMobile Application Development powerpoint
Mobile Application Development powerpoint
 
DT project.pdf
DT project.pdfDT project.pdf
DT project.pdf
 
Android
AndroidAndroid
Android
 
Mobeers waterloo-2011
Mobeers waterloo-2011Mobeers waterloo-2011
Mobeers waterloo-2011
 
How to Build Cross-Platform Mobile Apps Using Python
How to Build Cross-Platform Mobile Apps Using PythonHow to Build Cross-Platform Mobile Apps Using Python
How to Build Cross-Platform Mobile Apps Using Python
 
Android App Developement
Android App DevelopementAndroid App Developement
Android App Developement
 
android development training in mumbai
android development training in mumbaiandroid development training in mumbai
android development training in mumbai
 
Android technology
Android technology Android technology
Android technology
 
Native mobile app development pros, cons, alternatives, and cost optimization
Native mobile app development pros, cons, alternatives, and cost optimizationNative mobile app development pros, cons, alternatives, and cost optimization
Native mobile app development pros, cons, alternatives, and cost optimization
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
 
Android Seminar || history || versions||application developement
Android Seminar || history || versions||application developement Android Seminar || history || versions||application developement
Android Seminar || history || versions||application developement
 
Presentation
PresentationPresentation
Presentation
 
Android Security Humla Part 1
Android Security Humla Part 1Android Security Humla Part 1
Android Security Humla Part 1
 
Android
Android Android
Android
 

More from Nitesh Dubey

HTML Presentation
HTML  PresentationHTML  Presentation
HTML Presentation
Nitesh Dubey
 
MLApproachToProgramming.ppt
MLApproachToProgramming.pptMLApproachToProgramming.ppt
MLApproachToProgramming.ppt
Nitesh Dubey
 
seminar topic of holography.ppt
seminar topic of holography.pptseminar topic of holography.ppt
seminar topic of holography.ppt
Nitesh Dubey
 
Compiler design.pdf
Compiler design.pdfCompiler design.pdf
Compiler design.pdf
Nitesh Dubey
 
Online shopping ppt
Online shopping pptOnline shopping ppt
Online shopping ppt
Nitesh Dubey
 
Python lab manual all the experiments are available
Python lab manual all the experiments are availablePython lab manual all the experiments are available
Python lab manual all the experiments are available
Nitesh Dubey
 
Web Technology Lab files with practical
Web Technology Lab  files with practicalWeb Technology Lab  files with practical
Web Technology Lab files with practical
Nitesh Dubey
 
Theory of automata and formal language lab manual
Theory of automata and formal language lab manualTheory of automata and formal language lab manual
Theory of automata and formal language lab manual
Nitesh Dubey
 
Software engineering practical
Software engineering practicalSoftware engineering practical
Software engineering practical
Nitesh Dubey
 
Principal of programming language lab files
Principal of programming language lab files Principal of programming language lab files
Principal of programming language lab files
Nitesh Dubey
 
database management system lab files
database management system lab filesdatabase management system lab files
database management system lab files
Nitesh Dubey
 
design and analysis of algorithm Lab files
design and analysis of algorithm Lab filesdesign and analysis of algorithm Lab files
design and analysis of algorithm Lab files
Nitesh Dubey
 
Computer Organization And Architecture lab manual
Computer Organization And Architecture lab manualComputer Organization And Architecture lab manual
Computer Organization And Architecture lab manual
Nitesh Dubey
 
industrial training report on Ethical hacking
industrial training report on Ethical hackingindustrial training report on Ethical hacking
industrial training report on Ethical hacking
Nitesh Dubey
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
Nitesh Dubey
 
Hrms industrial training report
Hrms industrial training reportHrms industrial training report
Hrms industrial training report
Nitesh Dubey
 
Industrial training report on core java
Industrial training report on core java Industrial training report on core java
Industrial training report on core java
Nitesh Dubey
 
SEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project reportSEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project report
Nitesh Dubey
 
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMsynopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
Nitesh Dubey
 
artificial intelligence ppt
artificial intelligence pptartificial intelligence ppt
artificial intelligence ppt
Nitesh Dubey
 

More from Nitesh Dubey (20)

HTML Presentation
HTML  PresentationHTML  Presentation
HTML Presentation
 
MLApproachToProgramming.ppt
MLApproachToProgramming.pptMLApproachToProgramming.ppt
MLApproachToProgramming.ppt
 
seminar topic of holography.ppt
seminar topic of holography.pptseminar topic of holography.ppt
seminar topic of holography.ppt
 
Compiler design.pdf
Compiler design.pdfCompiler design.pdf
Compiler design.pdf
 
Online shopping ppt
Online shopping pptOnline shopping ppt
Online shopping ppt
 
Python lab manual all the experiments are available
Python lab manual all the experiments are availablePython lab manual all the experiments are available
Python lab manual all the experiments are available
 
Web Technology Lab files with practical
Web Technology Lab  files with practicalWeb Technology Lab  files with practical
Web Technology Lab files with practical
 
Theory of automata and formal language lab manual
Theory of automata and formal language lab manualTheory of automata and formal language lab manual
Theory of automata and formal language lab manual
 
Software engineering practical
Software engineering practicalSoftware engineering practical
Software engineering practical
 
Principal of programming language lab files
Principal of programming language lab files Principal of programming language lab files
Principal of programming language lab files
 
database management system lab files
database management system lab filesdatabase management system lab files
database management system lab files
 
design and analysis of algorithm Lab files
design and analysis of algorithm Lab filesdesign and analysis of algorithm Lab files
design and analysis of algorithm Lab files
 
Computer Organization And Architecture lab manual
Computer Organization And Architecture lab manualComputer Organization And Architecture lab manual
Computer Organization And Architecture lab manual
 
industrial training report on Ethical hacking
industrial training report on Ethical hackingindustrial training report on Ethical hacking
industrial training report on Ethical hacking
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
Hrms industrial training report
Hrms industrial training reportHrms industrial training report
Hrms industrial training report
 
Industrial training report on core java
Industrial training report on core java Industrial training report on core java
Industrial training report on core java
 
SEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project reportSEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project report
 
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMsynopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
 
artificial intelligence ppt
artificial intelligence pptartificial intelligence ppt
artificial intelligence ppt
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 

voice recognition security system ppt

  • 1. PRESENTED BY :- RATNAKAR PASWAN B.TECH – COMPUTER SCIENCE & ENGG. VOICE RECOGNITION SECURITY SYSTEM
  • 2. INDEX PROJECT TITLE:- Voice Recognition Security System  Background  Objectives  Features  Software & Hardware requirement  Tool & Technology  Data Flow Diagram  Future Scope of the Project  Conclusion
  • 3. BACKGROUND • This project based on security purpose for any human who have the android phone . Sometimes in problems we cants able to touch the phone because of many reason your hands are tie with rope or any other things happen in that position if you need the help of anyone you can not call for help but this project help you out if you are in problem and you want to control your phone then you have to only speech some keywords witch you are know and active the microphone and call for help
  • 4. OBJECTIVES • This project main objective to keep you safe its offer you to recognize your voice and take action behalf of that .this project is very useful for everyone whos' concern about his/her security • It make you feel secure and this project(app) also have feature to sends your live location on your chosen phone number when you call a secret code and many features……
  • 5. FEATURES • Speech Recognition and calling (Always mic is enable in background) • Real time location sharing • Pattern command • Emergency calling • Real time camera snapshot • Uses low data(Internet)
  • 6. SOFTWARE REQUIREMENT • Python 2.7, or Python 3.5 or newer. • OpenGL • Jupiter notebook(anaconda3) • PyCharm Operating System : Microsoft Windows 10, 8, 7 (for development) Android (8 and newer)
  • 7. HARDWARE REQUIREMENT For developing : • 4 GB RAM minimum, 8 GB RAM recommended. • 1.5 GB hard disk space + at least 1 GB for caches. For use:- • 2 GB ram min • 1 GB disk space
  • 8. TOOL AND TECHNOLOGY Tools :- • PyCharm • Jypiter Technology :- • Python • Kivy framework • OpenCV • Pandas • NumPy • Speech Recognition • PyAudio
  • 9. Python is a general-purpose a high level, interpreted , object- oriented, dynamically typed programming language that is often applied in scripting roles. So, python is programing language as well as scripting language. Python is also called as interpreted language . Python useful for complex application development as it is for scripting or "glue code" that connects components together. Python is a universal language found in a variety of different applications
  • 10. WHAT IS KIVY • Kivy is a free and open source Python framework for developing mobile apps and other multitouch application software with a natural user interface (NUI). It is distributed under the terms of the MIT License, and can run on Android, iOS, GNU/Linux, macOS, and Windows. • Kivy was first released in early 2011. This cross-platform Python framework can be deployed to Windows, Mac, Linux, and Raspberry Pi. It supports multitouch events in addition to regular keyboard and mouse inputs. Kivy even supports GPU acceleration of its graphics, since they’re built using OpenGL ES2. The project uses the MIT license, so you can use this library for free and commercial software.
  • 11. WORKING WITH KIVY WIDGETS • A widget is an onscreen control that the user will interact with. All graphical user interface toolkits come with a set of widgets. Some common widgets that you may have used include buttons, combo boxes, and tabs. Kivy has many widgets built into its framework • When you create an application with Kivy, you’re creating a Natural User Interface or NUI. The idea behind a Natural User Interface is that the user can easily learn how to use your software with little to no instruction. • Kivy does not attempt to use native controls or widgets. All of its widgets are custom-drawn. This means that Kivy applications will look the same across all platforms. However, it also means that your app’s look and feel will differ from your user’s native applications. This could be a benefit or a drawback, depending on your audience.
  • 12. Running a “Hello, Kivy!” Program To see how Kivy works, take a look at the following “Hello, World!” application: from kivy.app import App from kivy.uix.label import Label class MainApp(App): def build(self): label = Label(text='Hello from Kivy', size_hint=(.5, .5), pos_hint={'center_x': .5, 'center_y': .5}) return label if __name__ == '__main__': app = MainApp() app.run()
  • 13. SPEECH RECOGNITION WITH PYTHON Most modern speech recognition systems rely on what is known as a Hidden Markov Model (HMM).This approach works on the assumption that a speech signal, when viewed on a short enough timescale (say, ten milliseconds), can be reasonably approximated as a stationary process—that is, a process in which statistical properties do not change over time. Working With Microphones • To access your microphone with Speech Recognizer, you’ll have to install the PyAudio package.
  • 14. PICKING A PYTHON SPEECH RECOGNITION PACKAGE A handful of packages for speech recognition exist on PyPI. A few of them include: • apiai • assemblyai • google-cloud-speech • pocketsphinx • SpeechRecognition • watson-developer-cloud • wit
  • 16. 1 LEVEL DFD User User details Details of commands Set the voice commands Log in/registe r Allow permission Home page Set the pattern Security system
  • 17. FUTURE SCOPE OF THE PROJECT • This project is going to be developed in future and in future we can use a ai to understand the voice of a user and also the ai can see the user with help of a user it will make the much safe for a person and is AI can see the user or hear him it can guess the what action his user do is user try to suicide then it send the info to nearest person and save its user . These can be become the future of this project
  • 18. CONCLUSION • The voice recognition system is the capacity of a device or program to receive and understand dictation, or to understand a spoken instruction. The main concept of this project is to design a voice recognition security system. This project is mainly used for security purpose to identify the voice spoken from the authorized person and the system work according to its instruction • Personal security is a general condition that occurs after adequate ef.forts are taken to deter, delay, and provide warning before possible crime.
  • 19. REFERENCE • https://www.w3schools.com/ for python • https://www.geeksforgeeks.org/ for voice modules • https://kivy.org/ for kivy • https://pypi.org/ for python package