Smart Email System Aarthi Natarajan Suhaib A. Obeidat Ganesh Sridharan.

Slides:



Advertisements
Similar presentations
CGS 3763 Operating Systems Concepts Spring 2013 Dan C. Marinescu Office: HEC 304 Office hours: M-Wd 11: :30 AM.
Advertisements

COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Electronic Mail. Functionality First software allowed a user to send some text to another user connected to Internet; Current systems allow.
1 Location Based File Exchange Controlled By Speech (LBFE-S) Final Project (Master Thesis) By Mohammed Marouf Supervisors John A. Sørenson.
Interpret Application Specifications
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition Chapter 2: Operating-System Structures Modified from the text book.
Chapter 30 Electronic Mail Representation & Transfer
Broadcast service Core tools. Agenda 1.Introduction – tool and its main features 2.Setting up and sending a simple broadcast 3.Achieving.
Text-To-Speech System for Marathi Miss. Deepa V. Kadam Indian Institute of Technology, Bombay.
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Connecting LANs, Backbone Networks, and Virtual LANs
Natural Language Processing and Speech Enabled Applications by Pavlovic Nenad.
Computer Concepts 2014 Chapter 7 The Web and .
UNIT 14 Lecturer: Ghadah Aldehim 1 Websites. Introduction 2.
Higher Computing Computer Systems S. McCrossan 1 Higher Grade Computing Studies 4. Peripherals Input Devices Keyboard Mouse Scanners Microphone Digital.
Chapter 7: Using Windows Servers to Share Information.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Module 8: Managing Client Configuration and Connectivity.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Introductory Communications Objectives  To gain an overview of: Modems and digital telephone lines Analogue to digital conversion and digital to analogue.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
Input Devices.  Identify audio and video input devices  List the function of the respective devices.
and VOIP. Definitions Storage- the action or method of storing something for future use. Forward system- Address book- A book for recording the.
Chapter 7. BEAT: the Behavior Expression Animation Toolkit
Spoken dialog for e-learning supported by domain ontologies Dario Bianchi, Monica Mordonini and Agostino Poggi Dipartimento di Ingegneria dell’Informazione.
Network Services Networking for Home & Small Business.
CS101 Introduction to Computing Lecture 7 Internet Services.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
1 Distributed Systems: an Introduction G53ACC Chris Greenhalgh.
 Communication Tasks  Protocols  Protocol Architecture  Characteristics of a Protocol.
and its Protocols Hina Patel TCM
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Computer Networks. Data & Communication When we communicate we share information  Local Communication, if Face to Face  Remote, if through Telephone.
1. To start the process, Warehouse Stationery (WSL) will invite you to use The Warehouse Group Supplier Electronic Portal and will send you the link to.
Performix Business Services Converging to Unified Messaging With convergence of telephony, computer and multimedia communication becoming a realistic vision,
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
MULTIMEDIA INPUT / OUTPUT TECHNOLOGIES INTRODUCTION 6/1/ A.Aruna, Assistant Professor, Faculty of Information Technology.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Appendix A Implementing Unified Messaging. Appendix Overview Overview of Telephony Introducing Unified Messaging Configuring Unified Messaging.
Developing an Effective Wireless Middleware Strategy.
1 Location Based File Exchange Controlled By Speech(LBFE-S) IT University Of Copenhagen Thesis Presentation By: Muhammed Marouf
Silberschatz, Galvin and Gagne  Operating System Concepts UNIT II Operating System Services.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Networking Material taken mainly from HowStuffWorks.com.
Collaborator Revolutionizing the way you communicate and understand
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
March 20, 2006 © 2005 IBM Corporation Distributed Multimodal Synchronization Protocol (DMSP) Chris Cross IETF 65 March 21, 2006 With Contribution from.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
1 3 Computing System Fundamentals 3.3 Computer Systems.
Presentation Title 1 1/27/2016 Lucent Technologies - Proprietary Voice Interface On Wireless Applications Protocol A PDA Implementation Sherif Abdou Qiru.
Peer to peer networks. Peer to peer is when digital devices communicate wirelessly with each others without the need for a transmitter. Wi-Fi Direct 1-
Speech Processing 1 Introduction Waldemar Skoberla phone: fax: WWW:
THE EYESWEB PLATFORM - GDE The EyesWeb XMI multimodal platform GDE 5 March 2015.
Multimedia Retrieval Architecture Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia Retrieval Architecture.
Business-logic Layer Presentation Layer Network Layer Digital Signal Processing Layer SmartHome API SmartHome Software Architecture SH mobile application.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Link for App Inventor II:
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
XP Practical PC, 3e Chapter 14 1 Recording and Editing Sound.
Presented By Sharmin Sirajudeen S7 CS Reg No :
Chapter 2: System Structures
Dialog Design 4 Speech & Natural Language
Chapter 2: Operating-System Structures
Chapter 2: Operating-System Structures
Presentation transcript:

Smart System Aarthi Natarajan Suhaib A. Obeidat Ganesh Sridharan

Outline  Motivation  High-level Design  Functional Design  message and address book sorting/prioritizing  Device Control Using  Voice Interface  Implementation  Performance Metrics  Future work  Conclusions

Motivation  Reduce Human Distraction  Free hands, eyes  Less time to achieve tasks (user behavior, voice)  Least amount of attention  Provide more services and flexibility  Access over a phone  Remote control of devices  Ability to prioritize.

HLD User Interface (GUI + Voice-Enhanced) User Behavior Monitor (capturer) SMTPIMAP System Interface Message Sorting and Prioritizing Device Control Module Arrival Notification Module

Display Management 1. Sorting of s – based on the user access patterns 2. Sorting the address book – based on the frequency of correspondence. 3. Notifying the user of new message arrival: i. Access to the user’s calendar ii. frequency of correspondence iii. user-assigned trust iv. subject keywords

Store s Addresses and Priorities s addresses, user access pattern, frequency of correspondence and trust level are stored as an XML element in an XML file. Whenever the client is active, it is loaded into the memory from the file system as stored in a hash table. Periodically, the XML file is updated from the hash table.

Device Control Using  Reduces human distraction by eliminating the need for physical movement.  Ability to control different appliances/devices remotely:  Devices connected to serial or parallel port  Why not USB ? future work.  Auto-response to provide feedback.

Device Control Using -Cont An address is assigned for the purpose of hardware control (e.g., Sender address is checked A digital signature can be used for security purposes. Computer that has control of the h/w is on-line all time, with the e- mail client running. Upon message arrival, subject line is parsed: E.g. “A.C: Switch On” Create an message destined to the user, with the result of the operation (e.g., success, fail, device is not connected).

Voice Interface  Speech Synthesis:  Text-to-speech (TTS)  Notification, message text, etc.  Speech Recognition  Speech-to-text (STT)  Rule-based grammar (higher accuracy of recognition). As opposed to dictation free recognition.  Temporal-awareness.

Speech Synthesis Synthesizers provide the computer with the ability to speak. Users and applications provide text to a speech synthesizer, which is then converted to audio. Bad news: does not sound natural. Application Speech Synthesizer “Computers can speak” Computers can speak

Speech Recognition 1.Structure Analysis: start and end of paragraphs, sentences, and other structures 2.Text pre-processing: abbreviations, dates, numbers, currency amounts (etc.) 3.Text-to-phoneme conversion: times  t ay m s 4.Prosody analysis: determine appropriate prosody for the sentence 5.Waveform production: Concatenation of chunks of recorded human voice Formant synthesis: signal processing techniques based on knowledge of how phonemes sound and how prosody affects those phonemes

Why Voice  Allows access over a phone  User’s hands are occupied  User has physical disability (e.g., limited use of hands).  User’s eyes are looking at something other than the screen (e.g., driving, maintenance and repair, etc).  User has physical disability (e.g., visual impairment)

Challenges Involved Transience: “what did you say” ? Invisibility: what actions to perform ? Asymmetry: people can speak faster than they can type, but listen much more slowly than they can read. Synthesis quality: recorded or synthesized ? Recognition: flexibility vs. accuracy.

Design Issues in Speech Applications  Feedback and Latency:  People read meaning in pauses  Speech applications cause pauses in places where they do not naturally belong.  Prompts:  Assessing the tradeoff between flexibility and performance.  Explicit prompts: when user must be tightly constrained  Implicit prompts: when application is able to accept more flexible input  Handling errors: no repetition, more constrained grammar.

Protocols-IMAP  IMAP  I nternet M essage A ccess P rotocol  Incoming Mail Protocol  Provide support for different access modes:  Online:NSF-like (connection maintained throughout)  Offline: download and delete from server (periodic connections.  Disconnected (hybrid) :download, manipulate, upload.  Offline paradigm allows minimum connect time  Constructs to permit online performance optimization, especially over low-speed links.

Protocols-SMTP SMTP S imple M ail T ransfer P rotocol Sending messages between servers or from a client to a server Proved useful in the wireless domain (e.g., used in SMS). Drawback: not fast enough ( was not intended for wireless).

Protocols-MIME MIME M ulti-purpose I nternet M ail E xtensions. How messages must be formatted so that they can be exchanged between different systems. Compatible with WAP.

Implementation Java-based client.  IMAP, SMTP and MIME XML-based display manager JSAPI for speech synthesis and recognition FreeTTS speech synthesizer(written entirely in Java). ViaVoice speech recognizer (from IBM). JavaComm for hardware control.  Mapping device name to corresponding port.  Interfacing from the mail system to the particular device.

Performance Metrics Subjective Tests: User Distraction. Usability study (I.e., Flexibility of Use, UI convenience). Accuracy (e.g., of the voice interface, the remote control of the hardware).

Future Work Extending the hardware control capabilities of the system E.g., wireless access to the different devices Harmonic control of the overall system. Providing speech recognition allowing for user- machine dialogues. Web-based Implementation Access over a phone

Conclusions  Capabilities of a context-aware system can go way beyond the traditional functionality.  Implementing voice-enhanced systems introduces many issues.  Ubiquitous Computing is a revolutionary rather than evolutionary field.