Sie sind auf Seite 1von 10

INDO GLOBAL COLLEGE OF

ENGINEERING
New Chandigarh, District Mohali Abhipur, Punjab

Assignment
Of
Mobile Application & Services

Submitted To: Submitted By:


Mrs. Vanita Mir Kaisar Bashir
(HOD) M.Tech CSE 3rd Semester
1807288
Text To Speech Technique

Speech synthesis is the artificial production of human speech. A computer system


used for this purpose is called a speech computer or speech synthesizer, and can be
implemented in software or hardware products. A text-to-speech (TTS) system converts
normal language text into speech; other systems render symbolic linguistic representations
like phonetic transcriptions into speech.

Synthesized speech can be created by concatenating pieces of recorded speech that are
stored in a database. Systems differ in the size of the stored speech units; a system that stores
phones or di-phones provides the largest output range, but may lack clarity. For specific
usage domains, the storage of entire words or sentences allows for high-quality output.
Alternatively, a synthesizer can incorporate a model of the vocal tract and other human voice
characteristics to create a completely "synthetic" voice output.

The quality of a speech synthesizer is judged by its similarity to the human voice and
by its ability to be understood clearly. An intelligible text-to-speech program allows people
with visual impairments or reading disabilities to listen to written words on a home computer.
Many computer operating systems have included speech synthesizers since the early 1990s.

A text-to-speech system (or "engine") is composed of two parts: a front-end and a


back-end. The front-end has two major tasks. First, it converts raw text containing symbols
like numbers and abbreviations into the equivalent of written-out words. This process is often
called text normalization, pre-processing, or tokenization. The front-end then assigns
phonetic transcriptions to each word, and divides and marks the text into prosodic units, like
phrases, clauses, and sentences. The process of assigning phonetic transcriptions to words is
called text-to-phoneme or grapheme-to-phoneme conversion. Phonetic transcriptions and
prosody information together make up the symbolic linguistic representation that is output by
the front-end. The back-end—often referred to as the synthesizer—then converts the
symbolic linguistic representation into sound. In certain systems, this part includes the
computation of the target prosody (pitch contour, phoneme durations), which is then imposed
on the output speech.
Mobile App Development Hurdles
The technological age is well and truly upon us; now more than ever, technology
oriented start-ups are popping up all over the world. Now that smartphones are so widely
used, more and more development companies are investing money into mobile app
development to take advantage of surging demand.

With the success of any number of mobile apps whether they be social media related,
games or lifestyle apps, more innovators and new companies are emerging to try to get a
piece of the pie, many of who may consider being successful in this industry to be
straightforward. In reality however this is not the case, as mobile app developers face any
number of challenges from developing and designing the app itself, to getting it released and
marketing it effectively.

1. Choosing The Right App to Develop


One of the initial biggest challenges is deciding which direction to take and to figure
out exactly what to develop. There is a great deal of competition in the already very crowded
mobile app industry and it is getting tougher for an app to stand out and get noticed. App
developers are under constant pressure to create innovative apps that people actually want
and get something out of.
Determining the quality of an idea means asking some of the following questions –
What purpose does the app serve and what is its function?
Is the idea original and will it stand out?
Is the app easy for other developers to emulate?
What is the target market or market size for the app?
What is the price of the app?
Coming up with an idea that is simple, productive and in demand can sound easy, but this is
rarely the case.
2. A Competitive, Overcrowded Market
As mentioned earlier, competition is fierce, with hundreds of thousands of mobile
apps trying to stand out from the crowd. Catering to users that have shorter attention spans
than ever before only makes things more tricky. App developers need to figure out what are
the triggers for their target market and what they want.
App developers must understand what appeals their highest lifetime value (CLV)
users – that is, those who are more likely to spend and spread the word about your product
with their friends and family. App developers need to delve deeper to figure out how they can
keep users more engaged for longer.
App developers have to undertake the challenging task of keeping the app’s
innovation quotient high, which will eventually ensure a higher number of users remain
engaged, and as will help to build a loyal customer base.
3. Clearly Defining The Target Market
From the business or monetization perspective of mobile app development, it is
imperative to outline a definitive target market. But it is easier said than done as only
defining the target market will not suffice; making sure that market is large enough to provide
a revenue stream is a significant prerequisite as well.
To do so, the company should monitor metrics such as installs and downloads, costs
to acquire customers (CAC), average session lengths, average revenue per user (ARPU), etc.
It means finding a pure analytics solution, and effectively managing this can be a real
challenge!
4. Managing Finances and Adequate Funds
You may have a killer app idea, but to turn that idea into something real and
marketable, significant capital is required. Developing an app is an expensive affair as the
cost of development can be anywhere from $3,000 to $150,000, depending on the nature of
the app. How to get the money and manage the finances can be a problem for some
developers.
If one cannot find the right investors to invest in an app idea, there are several other
ways to raise funds. Some of these include taking out a loan, angel investors from family or
friends, and joint venture companies, all of which can be effective.
Crowdfunding via platforms like Kickstarter and AppBackr or app contests can also
be a way to make a start. However, the main challenge lies in managing funds effectively to
get the most out of them and produce an app that provides a return on investment.
5. Development Technology
The obvious and core technical challenge of developing an app is choosing the best
suitable development technology for the app and deciding on whether to make a Native,
Hybrid or Cross platform mobile application.
A bit of research reveals that there are hundreds of articles online that compare the
three mobile app development technologies by pitting them against each other. One can
easily gain a good understanding of the respective advantages and disadvantages offered by
each of the platforms But choosing the one that make the most sense for a given project can
be difficult, as app developers often look for a one-size-fits-all solution.
An uninformed decision in choosing the development technology can result in over-
expenditure, poor app performance, and lacklustre user experience. So building the app on a
platform that is flexible enough to be adaptable and best suits the client’s target functionality
is recommended.
6. Different Devices & Screen Sizes compatibility
Another challenge for app developers is to deal with all the different screen sizes and
devices that the app will need to fit. Designing and developing an app for only a select few
devices and screen sizes is simply not an option. The principal challenge is to develop an app
that can run fluidly across as many devices with as many screen sizes as possible.
The solution here is Responsive Design for apps. Responsive App Design gives
screens more flexibility and thus can be adjusted to suit different screen sizes and various
formats.
Instagram’s or Facebook’s mobile apps are great examples.
7. Dealing with Different OS’s
However, it is not with just the devices and screen sizes that can cause issues.
Developers have to consider different Operating Systems as well. The three main systems –
iOS, Android and Windows – each of which has its respective set of UI objects and patterns.
App developers require to conduct bug fixing on a regular basis across all three.
Preparation with a marked testing phase is recommended to deal with technical OS
issues. Developers can also release a beta version of the app to develop on later with regular
updates.
8. Mobile App Promotion and Marketing
One thing is to design and develop an app, and another is the promotion of that app.
This is challenging and testing for many mobile developers on a totally different level and
usually requires some business and market savvy to be successful. App developers define the
following as the top challenges and goals for app marketing:
Organic App Discovery – How to make the app discoverable in app store
User Acquisition – How to make users install the app
Retention – How to keep users engaged in the app
Monetization – Whether to implement purchase-app-once or freemium model or in-app
purchase or in-app advertising
Someone may develop a quality app with great UI, graphics and functionality, but if
they can’t get the right users to find the app, they aren’t going to get the returns.
App developers often resort to ASO (app store optimization) or turn to ad networks to
drive app installs and traffic, all the while dealing with the concern of whether the
expenditure to acquire users is exceeding the money actually coming in.
9. Security
Security issues can be a nagging concern for mobile developers. Malware problems
may arise and software/hardware fragmentation only adds to the list of woes. There is a lot of
work required to address such app security issues, which consumes a great deal of time and
money.
Apple provides developers with strict guidelines for iOS app development, but
unfortunately no such instructions are officially available for Android apps. Unless proper
security measures are complied, the lapse in security can lead to information misuse and
manipulation, poor user experience, and scarce app adoption.
Despite Google’s various protections, just recently, a troubling new malware strain
that has been discovered in a handful of Google Play Store apps. Researchers from an US
based software technologies firm has discovered around 40 google play store apps and more
than 400 apps of third-party app stores to be infected with DressCode malware – which
generates ad clicks and false traffic to some website without users consent.
With so many operating systems and device variants being prevalent, ensuring
security around devices and applications can be a daunting task. The best approach can be
meeting the optimum security norms, creating a secure customer usage space and protecting
data, user credentials and financial transactions.
10. App Distribution Control
The software or app distribution to the device can be a problem for developers as
there is no direct or shared control of the distribution. 40 percent of app publishers use at least
one distribution platform other than Google Play or the Apple App Store, and 23 percent
don’t use either.

For pre-loaded distribution, carriers demand the distribution control, so that in order to get
software onto a device, multiple carriers’ approval is required. And even then, the developers
have to make sure that their apps seamlessly work on the many different software platforms
and hardware configurations.
Communication Protocols in IOT
We can divide the internet of things protocols into two basic types: IoT Network
Protocols and IoT Data Protocols. There are diverse options for the connectivity. This article
will explain you the major IoT Protocols that the developers offer you.
1. Bluetooth
One of the most broadly used wireless technologies of short-range is Bluetooth. You
can quickly get Bluetooth apps that offer you wearable technology for pairing up with the
smart gadgets. The recently introduced Bluetooth protocol among the IoT protocols is BLE or
Bluetooth Low-Energy protocol. It will afford the range of conventional Bluetooth in
combined with lower power consumption supremacy.
BluetoothYou have to remember that BLE is not designed for transferring large files
and will go perfectly with the small portions of data. This is the reason for Bluetooth leading
the internet of things protocols of this century. The newly invented Bluetooth Core
Specification 4.2 adds up one innovative Internet Protocol Support Profile. It permits
Bluetooth Smart Sensor to get access on the internet straight via 6LoAPAN.
2. WiFi
For IoT integration, WiFi is a favored choice according to many electronic designers.
It is because of the infrastructure it bears. It has quick data transfer rates along with the
aptitude to control a large quantity of data.
The widespread WiFi standard 802.11 presents you the ability to transfer hundreds of
megabits in only one second. The only own drawback of this IoT protocol is it can consume
excessive power for some of the IoT Application. It ranges approximately 50 m, and along
with working on internet protocol standards, it includes IoT Cloud infrastructure access. The
frequencies are 2.4GHz and 5GHz bands.
3. ZigBee
Just like Bluetooth, there is a vast user base of ZigBee. Among the internet of things
protocols, ZigBee is designed more for the industrials and less for the consumers. It usually
operates at a frequency of 2.4GHz. This is ideal for the industrial sites where data is generally
transferred over small rates amongst home or a building.
ZigBee and the popular ZigBee Remote Control are popular as famed IoT Security
Protocols for supplying secure, low-power, scalable solutions along with high node counts.
The ZigBee 3.0 has taken the protocol to a single standard. It made it handier.
4. MQTT IoT
MQTT IoT is a message protocol and full form is Message Queue Telemetry
Transport. It developed in 1999 by Arlen Nipper (Arcom) and Andy Stanford-Clark (IBM.)
This is mostly used for monitoring from a remote area in IoT. The principal task that MQTT
does is obtaining data from so many electrical devices.
It also conveys them to the IT communications or infrastructure. A hub-and-spoke
architecture is fundamentally ordinary for MQTT IoT Protocol. It works on top of the TCP
for supplying reliable yet simple streams of data.
This MQTT protocol is made of three core components or mechanisms: Subscriber,
Publisher, and Broker. The work of the publisher is generating data and transmitting the data
to the subscriber with the help of the broker. Ensuring security is the job of the broker. It does
it by checking and rechecking the authorization of the subscribers and the publishers.
This protocol is a preferred option for all devices that are IoT based, and these are
also capable of providing enough information-routing functions to the cheap, low-memory
power-consuming and small devices with the help of low and vulnerable bandwidth based
network.
5. CoAP
The CoAP or Constrained Application Protocol, an internet productivity and utility
protocol, is mainly developed for the restricted smart gadgets. The design of CoAP is for
using it among the devices that have an identical restricted community. It includes general
nodes and devices on the internet and different restrained networks and devices that are
joined on the internet.
IoT systems based on the HTTP protocols can go tremendously with CoAP IoT
Network Protocols. It uses the protocol-UDP for implementation of lightweight data. Just like
the HTTP, it also uses the restful architecture. It is also used inside the mobiles and the other
social communities that are basic programs. CoAP helps in getting rid of ambiguity through
HTTP get, put up, delete and placed strategies.
6. DDS
Amongst the internet of things protocols, the IoT Messaging Protocols – DDS or Data
Distribution Service is a standard for high-performance, expandable and real-time machine-
to-machine communication. The Data Distribution Service – DDA is developed and designed
by OMG or Object Management Group. With the help of DDS, you can transfer data both in
the low-footprint devices and with the Cloud platforms.
The Data Distribution Service includes two significant layers. Those are the DCPS
and the DLRL. The DCPS or Data-Centric Publish-Subscribe works by delivering
information to the subscribers. The DLRL or Data-Local Reconstruction Layer does its job
by providing an interface to the Data-Centric Public-Subscribe functionalities.
7. NFC
NFC from the IoT Protocols takes the benefit of safe two-way communication
linking. Recently, we saw that the NFC IoT Communication Protocols are applicable for the
smartphones.
The NFC or Near Field Communication allows the clients to connect to the electronic
devices, to use digital contents and to do the contactless payment transaction. The essential
work of NFC is to expand the “contactless” card technology. It works within 4cm (between
devices) by enabling the devices for sharing information.
8. Cellular
There are a lot of IoT applications that may call for operation over a longer
remoteness. These IoT applications can take the help of Cellular communication capabilities
like GSM/3G/4G. Cellular is one of the IoT Communication Protocols which can send or
transfer a high amount of data. Here, you have to remember is the cost.
The fee for sending a high quantity of data will be high too. Cellular does need not
only high cost but also to need high power consumption for several applications. This
Internet of Things Protocol is amazing for sensor-based data projects of low-bandwidth. This
is because they can send a very insignificant amount of data or information on the Internet.
It includes the low-cost development board of authentic tiny CELLv1.0. It also has a
range of shield that connects boards (so that you can use them with the Arduino and
Raspberry Pi platforms.) Here, the key product is SparqEE.
9. AMQP
Advanced Message Queuing Protocol or AMQP is an application layer protocol. It is
basically message oriented and designed for middleware environments. The AMQP IoT
messaging protocols got the approval as an international standard. The processing chain of
AMQP IoT Protocol consists of 3 necessary components, and those are Exchange, Message
Queue and Binding.
The Exchange part works by getting the message and putting them in the queues. The
job of the Message Queue is to store the message, and it stores the information until the
messages are developed by the client app safely. The work, the Binding Component, does is
stating the connection between the Exchange Component and the Message Queue
Component.
10. LoRaWAN
LoRaWAN or the Long Ranged Wide Area Network is one of the IoT Protocols for
the wide area networks. LoRaWAN IoT Network Protocols is specifically designed for
supporting the vast networks with the help of million low-power devices. Smart cities use this
kind of protocol.
Including the low-cost mobile communication, LoRaWAN is also famed in scores of
industries for protected bi-directional communication. The frequency of LoRaWAN may
vary from network to network. The data rates of this Internet of Things Protocols runs
between 0.3-50 kbps. In the urban areas, the range LoRaWAN varies from 2 km to 5 km. In
the suburban areas, the range of this IoT protocol is about 15 km.
11. RFID
The Radio Frequency Identification of RFID works with the help of wireless technology. It
uses the electromagnetic fields so that it can identify objects. The short ranged Radio
Frequency Identification is around 10 cm. But the long-range Radio Frequency can go up to
200 mm.
The ARAT or the Active Reader Active Tag system usually makes the use of the
active. These activity tags awake with any interrogator signal (signals from the active
reader.)The best part of RFID IoT Connectivity Protocols is they do not need any power.
12. Z-Wave
Z-Wave IoT Protocols affords you the low-power RF or Radio Frequency
communications. We typically use these in our home automation applications. The sensors,
lamp controllers, etc. are the low-power Radio Frequency. This technology of low-latency
also has more features of shielding from wireless technologies (such as the WiFi.) This works
with the help of functioning in the sub-1GHz band.
Designers are concerned with the simple and rapid development process of IoT
Protocols. They are working for the easy setup of Z-Wave IoT Protocols. The frequency of Z-
Wave Internet of Things Protocols is 900MHz, and the range is about 30-100m. It provides
you Cloud access and requires a bridge for it. Data rates of this protocol are 40-100kbit/s

Das könnte Ihnen auch gefallen