1. This document provides a final project report for developing a Virtual Personal Assistant using AI technology. It includes sections on analyzing the business case, requirements modeling, system design and implementation.
2. The requirements modeling section defines functional requirements for both administrators and common users, such as the ability to configure features, arrange the application interface, add personal interests, and get location-based suggestions.
3. The system design covers topics such as use case diagrams, sequence diagrams, class diagrams and state diagrams to model the voice recognition system and how users and administrators will interact with the application. Implementation details like supported file formats are also described.
+971565801893>>Safe and original mtp kit for sale in Dubai>>+971565801893
Systems Analysis and Design course presentation
1. “Your Virtual Personal Assistant
using AI technology”
Systems Analysis and Design
Final Project Report
Baku Engineering University
Information Technology
IT3
Prepared by: 150106001 Murtuzova Aytakin
Lecturer: Khayyam Masiyev
2. Can You hear me?
What will be talked…
Introduction
Analyzing the Business Case
Preliminary Investigation (Report)
Requirements Modeling
Work Breakdown Structure (WBS)
Gantt Chart
System Design and Implementation
4. Introduction
AI is one of the newest fields in science and engineering.
Work started in earnest soon after World War II, and the
name itself was coined in 1956
AI currently encompasses a huge variety of subfields,
ranging from the general to the specific:
Playing chess
Proving mathematical theorems
Driving a car
Diagnosing diseases
7. Speech recognition is used in
command based applications such as
data entry control systems, in mobile
devices such as in mobile phones and
to help people with hearing
disabilities.
According to Professor Todd
Austin (2007) Speech recognition
is the task of translating an acoustic
waveform representing human
speech into its corresponding
textual representation.
11. Participants:
Department: Information Technology Department
Project submitter: Murtuzova Aytakin
Location: Baku Engineering University, Baku, Azerbaijan
The interviewing process involves a series of steps:
1. Determining the people to interview;
2. Establishing objectives for the interview;
3. Developing interview questions;
4. Preparing for the interview;
5. Conducting the interview;
6. Documenting the interview;
7. Evaluating the interview.
2.2 Memos(s)/Interviews
14. 2.3. Preliminary Investigation
Project scope and Constraints
The scope of project is to create Virtual Personal
Assistant application using AI technology that
guides user, knows user interests well and make a
friendlier environment between user and AI
application.
Also, creating safer part for storing personal
information and other security claimed details.
19. 3. Requirements Modeling
3.1. List of requirements
Project requirements
1. Smarter, safer virtual personal AI application will make
human life easier by knowing user interests well
2. Users will open applications and use them by giving voice
commands
3. Users can name the AI assistant and it will make a
friendlier environment between user and the AI application
4. Instead of saving credit or ID cards’ details, personal
photos in separate directories at phone, such as, Notes,
Pictures folder, users will save them at one application safely
5. AI assistant will give location-based suggestions due to
user interests
20. Administrator
Common User
3. Requirements Modeling
3.1. List of requirements
1. Can see the number of users
2. Can report errors
3. Can configure the application
4. Can arrange the main page of Application
5. Can activate virtual assistant with own voice
6. Can add own areas and places of interests
7. User can save credit or ID cards’ details
8. Can get location-based suggestions when user goes
somewhere that matches user’s interests
9. Can save her/his voice that personal files will be open
directly only with her/his voice.
21. 3. Requirements Modeling
3.2. User requirements
Administrator
3. Requirements Modeling
1. Can see the number of users
2. Can report errors
3. Can configure the application
1.1. Admin can arrange the features, add new features, delete
features
2.1. If some bugs, basic or development based errors
occur, admin must report them to developers in order to
be fixed
1.1. Can see the number of users that downloaded the
application
22. 3. Requirements Modeling
3.2. User requirements
Common
User
4. Can arrange the main page of Application
5. Can activate virtual assistant with own voice
6. Can add own areas and places of interests
7. User can save credit or ID cards’ details
8. Can get location-based suggestions
when user goes somewhere that matches
user’s interests
9. Can save own voice that personal files
will be open directly only with voice.
4.1. User can drag favorite and rapidly using sections
from “section palette” and drop them in main page
5.1. If user calls the assistant’s name, the AI
application will be opened.
6.1. In “About myself” section user can add own
areas of interests
7.1. In “My cards” section user can add and save credit
card images and details by filling gaps
7.2. User can add and save personal ID cards details by
filling gaps and images in “My cards” section
8.1. AI application will prefer places
as suggestions occasionally
9.1. User can save different types of
her/his own voices
23. 3. Requirements Modeling
3.3. System requirements
Administrator
1. Can see the number of users
2. Can report errors
3. Can configure the application
3.1.1. System must be able to use mouse, keyboard, screen
based events to move objects. While arranging the features,
developer is able to accept or deny the changes
2.1.1 System must be able to accept and send reports to
developers in order to fix some development based errors
1.1.1.System must be able to get the number of users’
data from Database and place them in admin user panel
24. 3. Requirements Modeling
3.3. System requirements
Common
User
4. Can arrange the main page of Application
5. Can activate virtual assistant with own voice
6. Can add own areas and places of interests
7. User can save credit or ID cards’ details
8. Can get location-based suggestions
when user goes somewhere that matches
user’s interests
9. Can save own voice that personal files
will be open directly only with voice.
4.1.1. System must be able to use mouse, keyboard,
screen based events to move, add, remove objects
5.1.1 System must be able to get voice
command, send it to Database, examine here,
respond back with certain action
6.1.1 System will be able to get written areas of
interest and others and store them in Database
7.1.1 System will be able to get card details and store them in
Database
8.1.1 AI application will suggest nearby
cafes and restaurants where coffee is
main drink, like Starbucks or etc.
9.1.1 While saying “Open”, “[Assistant’s
name]”, “Search”, “[Password]” and so on
25. 3. Requirements Modeling
3.4. Functional/Nonfunctional requirements
Administrator
1. Can see the number of users
2. Can report errors
3. Can configure the application
3.1.1.1 Admin can set user permissions to the features
3.1.1.1.1. If Age restriction permission set to certain feature,
users who are below the restricted age, can’t use these
features
2.1.1.1 System must send basic and development based error reports from admin to
developers
2.1.1.1.1 Error reports should be reached to developer with a latency of no greater
than 12 hours from admin sending.
1.1.1.1 Numbers must be collect and sum in Database
counter and the information must be placed in certain part of
admin user panel
1.1.1.1 No latency is accepted, exact number of users must
be shown correctly
26. 3. Requirements Modeling
Common
User
4. Can arrange the main page of Application
5. Can activate virtual assistant with own voice
6. Can add own areas and places of interests
7. User can save credit or ID cards’ details
8. Can get location-based suggestions
when user goes somewhere that matches
user’s interests
9. Can save own voice that personal files
will be open directly only with voice.
4.1.1.1 There will be used OpenGL library for
dragging one image and to place in another position
5.1.1.1 Voice commands will be examined in
Database. The voice will be converted to the text
string and will be checked with AI assistant’s
name
6.1.1.1 User location information must be securely
placed in Database. No any loss of any user data is
allowed
7.1.1.1 After filling all blank fields, query of card details will
be created in Database and verification alert will be appear as
a respond
8.1.1 AI application will suggest nearby
cafes and restaurants where coffee is
main drink, like Starbucks or etc.
9.1.1.1 Text-dependent algorithm prevents
unauthorized access with a covertly-
recorded user voice
9.1.1.1.1 To keep in safe the personal
information of user, the application will
require password while entering the
personal information section
3.4. Functional/Nonfunctional requirements
36. Implementation
6.3. Activity Diagrams
Activity diagram for Permission arrangement
Contains 10 activities:
After selecting existing permissions, the
system checks if these permissions are
available for deleting or not. If available, the
permissions will be deleted from the user
application. While changing name of new
permission, systems checks the if there any
duplicated name.
Admin
37. Implementation
6.3. Activity Diagrams
Activity diagram for Reporting errors & Fixing bugs
& Getting feedbacks
Contains 9 activities:
After checking existing features for bugs, if error
occurred, admin send notes as reports to developer
with reporting system. Developer will respond back
within certain amount of time to admin as notes to fix
the bugs by upgrading the application.
Admin
38. Implementation
6.3. Activity Diagrams
Activity diagram for Save cards
Contains 9 activities:
While changing name of new sections, systems
checks the if there any duplicated name. If yes,
name must be changed, otherwise click to
activate the new cards.
User
39. Implementation
6.3. Activity Diagrams
User
Activity diagram for Upload files
Contains 7 activities:
After uploading file, the system combines the format of
uploaded file and the formats that permitted. If the format is
capable, the file will be uploaded, otherwise the file must be
replaced with other file(s).
40. Implementation
6.3. Activity Diagrams
User
1. A noise analysis enables us isolate the human voice and
remove the background environment in the audio file.
2. Speech recognition comes in two flavors. They are
speaker independent and speaker dependent.
3. The system converts the speech in text format in order to
build the database.
42. Implementation
6.5. Sequence Diagrams
Admin Reporting and getting
Feedback
1. Error reports should be reached
to developer with a latency of
no greater than 12 hours from
admin sending
2. Results, reasons must be turn
back to admin or fixed &
introduced with a latency of 12
hours to 1month (based on
error)
Admin
43. Implementation
6.5. Sequence Diagrams
Sequence diagram for Admin Placing ads
1. 300x50 sized banner placeholder must
be set in order to place advertisement
at the application.
2. Supported image formats: *.gif, *.png,
*.jpg, *.jpeg.
3. Supported image sizes: 150KB or
smaller
4. Otherwise advertisement will not be
places
Admin
44. Implementation
6.5. Sequence Diagrams
Sequence diagram for Voice Recognition
1. Giving the certain voice commands to phone
microphone
2. Record will be in audio wave format
3. Record will be loaded in main interface
4. In main interface – in voice recognition system
record will be captured
5. Captured record will be load to be recognized
by using Hidden Markov Model
6. Probability will be respond back to main
interface of voice recognition system
User
45. Implementation
6.5. Sequence Diagrams
Sequence diagram for User Upload files
1. Supported image formats are JPG, GIF,
PNG, and TIFF.
2. The maximum supported file size is 20MB.
3. Video clip uploads are limited to 400MB
and must be at LEAST three seconds in
duration.
User
51. 7. Conclusion
1. To perform development methods, knowledge
workers and IT specialists meet to define and
review business requirements: joint application
development (JAD) and rapid application
development (RAD).
2. Meetings were arranged with IT department to
see what requirements are needed. At the end of
every meeting the meeting memorandums must
be clarified, checked to gather the requirements.
3. Feasibility analysis section of Preliminary
Investigation Report must be checked and all the
requirements should distribute among certain
requirement types.
52. References
1. S. Russell and P. Norvig Artificial Intelligence: A Modern Approach Prentice Hall, 2003, Second Edition, page 1.
2. http://cccp.eecs.umich.edu/research/speech.php [last click date: 16.05.2018 (dd/mm/yy)].
3. Fishbone diagram created at http://www.lucidchart.com/[last click date: 16.03.2018 (dd/mm/yy)].
4. Constraints chart created at http://www.lucidchart.com/[last click date: 16.03.2018 (dd/mm/yy)].
5. https://www.brighthubpm.com/project-planning/5599-six-feasibility-study-steps/ Six feasibility study steps [last click
date: 16.03.2018 (dd/mm/yy)].
6. https://help.surveymonkey.com/articles/en_US/kb/How-to-analyze-results How to analyze Survey Results [last click
date: 16.03.2018 (dd/mm/yy)].
7. https://www.iasaglobal.org/itabok/capability-descriptions/requirements-modeling Requirements Modeling capability
descriptions [last click date: 16.05.2018 (dd/mm/yy)].
8. Gantt Chart created at: https://www.teamgantt.com [last click date: 18.04.2018 (dd/mm/yy)].
9. https://www.tutorialspoint.com/uml/uml_activity_diagram.htm Activity diagrams in software engineering [last click date:
17.05.2018 (dd/mm/yy)].
10. http://www.agilemodeling.com/artifacts/stateMachineDiagram.htm Introduction to UML 2 State Machine Diagrams by Scott W.
Ambler [last click date: 17.05.2018 (dd/mm/yy)].
11. Gary B. Shelly Harry J. Rosenblatt: Systems Analysis and Design, Ninth Edition, 2012, page 143.