Android Application on Examination Using Speech Technology for Blind People
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
A number of developing countries continue to provide educational services to students with disabilities in "segregated" schools. Trends in provisions in India reflect that the leading policy predisposition before the 1970s has been that of segregation. The government initiatives to establish separate workshops, model schools, central Braille presses and employment exchanges for the disabled population of the country. Also all students, regardless of their personal circumstances, have a right of access to and participation in the education system, according to their potential and ability. However, with the rapidly growing population and increasing number of people with blindness along with other disabilities, need for use of technology in the field of education has become imminent. With existing system of competitive examination, students face problems while interacting with the system, misunderstandings arising due to human mediator and also an ability to cope up with the other students. Our project, through the use of speech technology, attempts to provide solutions for some of these issues by creating an interactive system. Thus, the application will help in creating an environment that provides equal opportunities for all the students in taking up competitive exams.
Authors and Affiliations
Sinora Ghosalkar , Saurabh Pandey, Shailesh Padhra, Tanvi Apte
Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
Reservation-based (as opposed to contention-based) channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless and embedded real-ti...
A Review On Data Mining Process In Healthcare Department To Identify The Frequently Occurring Diseases
Data mining is a process of analyzing large volumes of data to extract the useful knowledge from it. Data mining techniques is applied on medical data to improve the service in healthcare department. Availability of...
An algorithm for normal profile generation and for attack detection in terms of detection accuracy
We present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for precise network traffic description by take out the geometrical correlations between network traffic features. Our MCA-ba...
Integrated Data Mining Approach for Security Alert System
The need for automatic detection of deceptive Emails is increasing due to the rapid usage of Email communication in the Internet world. The proposed “Security Alert System” provides a way to identify the future terro...
Double Compression Of JPEG Image Using DWT Over RDWT
Reconstruction of the history of an image is a difficult process with visual document analysis. Suppose, if an image undergo double compression, then the compressed image is not the exact bit stream generated by the...