Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
4 views

Sign_Language_Detection_System__1___1___1___Copy_ - Copy

This document outlines a project proposing a fingerprint-based ATM system that replaces traditional PINs with biometric identification to enhance banking security and user convenience. The system enrolls users' fingerprints into a secure database for authentication, allowing them to perform transactions securely. Acknowledgments are given to mentors and colleagues who contributed to the project's success.

Uploaded by

siddhijain522
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Sign_Language_Detection_System__1___1___1___Copy_ - Copy

This document outlines a project proposing a fingerprint-based ATM system that replaces traditional PINs with biometric identification to enhance banking security and user convenience. The system enrolls users' fingerprints into a secure database for authentication, allowing them to perform transactions securely. Acknowledgments are given to mentors and colleagues who contributed to the project's success.

Uploaded by

siddhijain522
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 60

Abstract

The integration of biometric technology into banking systems has significantly enhanced
security and user convenience. This project proposes a fingerprint-based ATM machine
system designed to replace traditional ATM PINs with biometric identification. The
system aims to improve the security and ease of access to banking services by utilizing
a fingerprint scanner to authenticate users, ensuring that only authorized individuals
can perform financial transactions.
The system works by first enrolling the user’s fingerprint into a secure database.
When the user attempts to access the ATM, the system scans their fingerprint and
matches it against the stored data. Once authenticated, the user can proceed with
various banking functions, such as withdrawing money, checking account balances, and
transferring funds. The system leverages advanced fingerprint recognition algorithms
to ensure quick and accurate identification, reducing the risk of fraud and

Keywords: ATM Security,UseAuthentication Replacement,Secure Banking Algorithm


Acknowledgement

First and foremost, I would like to extend my heartfelt thanks to my project guide
and mentor for their constant support, guidance, and encouragement throughout the
course of this project. Their valuable insights and expertise were crucial in shaping the
direction of this research. ”.

I express my gratitude towards our internal guide, Ms.Y.R.Thakre project


coordinator Ms.S.S.Shinde Head of Computer Department, Mr.P.R.Sali. of Shri
Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad, Nashik who guided
and encouraged us in completing project work in scheduled time. I would like to thank
our Principal Dr. V. A. Wankhede. Principal of our college for allowing us to pursue
my project in this institute.

We are thankful to our family members for supporting and encouraging us and
for providing their guidance for Our Project. In the end we thank to all friends’ col-
leagues for providing their useful suggestions, which contributed greatly in making our
project successful.

Miss.Ahire Tulsi Nivrutti


Miss.Tanvi Ravindra Shirsath
Miss.Aher Saloni Nitin
Miss.Chordiya Siddhi Rajesh

i
Contents

1 Introduction 1
1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Project Scope and Limitation . . . . . . . . . . . . . . . . . . . . . . . 2
1.4.1 Project Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4.2 Limitation of Existing System . . . . . . . . . . . . . . . . . . . 3

2 Literature Survey 4
2.1 Types of Machine Learning Algorithm . . . . . . . . . . . . . . . . . . 5
2.1.1 Convolutional Neural Networks . . . . . . . . . . . . . . . . . . 5
2.1.2 Support Vector Machine . . . . . . . . . . . . . . . . . . . . . . 6
2.1.3 Random Forest Algorithm . . . . . . . . . . . . . . . . . . . . . 7
2.2 American Sign Language . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.2 Sign Language and Orientation . . . . . . . . . . . . . . . . . . 9
2.3 System Working Principles . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.3.1 Proposed Methodology . . . . . . . . . . . . . . . . . . . . . . . 9

3 Software Requirement Specification 12


3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.1.1 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.1.2 Project scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

ii
3.1.3 Assumptions And Dependenciese . . . . . . . . . . . . . . . . . 13
3.1.4 User Classes and Characteristics . . . . . . . . . . . . . . . . . . 13
3.2 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2.1 Business Requirements . . . . . . . . . . . . . . . . . . . . . . . 14
3.2.2 User Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2.3 Software Requirements . . . . . . . . . . . . . . . . . . . . . . . 15
3.2.4 Hardware Requirement . . . . . . . . . . . . . . . . . . . . . . 15
3.3 System Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3.1 System feature 1: . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3.2 System feature 2: . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.4 External Interface Requirements . . . . . . . . . . . . . . . . . . . . . 16
3.4.1 User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.4.2 Hardware Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.4.3 Software Interface . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.5 Non-functional Requirements . . . . . . . . . . . . . . . . . . . . . . . 16
3.5.1 Performance Requirement . . . . . . . . . . . . . . . . . . . . . 17
3.5.2 Safety Requirement . . . . . . . . . . . . . . . . . . . . . . . . 17
3.5.3 Security Requirement . . . . . . . . . . . . . . . . . . . . . . . 17
3.6 Software Quality Attributes . . . . . . . . . . . . . . . . . . . . . . . . 17
3.7 Analysis Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

4 System Design 20
4.1 Model Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.2 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.3 DFD Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.4 Use-case Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.5 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.6 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.7 Collaboration Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

5 Technical Specification 28
5.1 Python . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

iii
5.2 Designed Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5.3 Python Libraries used . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

6 Software Implementation 31
6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.2 Modules and Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . 32
6.2.1 Image frame acquisition . . . . . . . . . . . . . . . . . . . . . . 32
6.2.2 Hand segmentation . . . . . . . . . . . . . . . . . . . . . . . . . 32
6.2.3 Hand Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
6.2.4 Output Gestures . . . . . . . . . . . . . . . . . . . . . . . . . . 32
6.2.5 Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
6.2.6 Feature Extraction . . . . . . . . . . . . . . . . . . . . . . . . . 33
6.2.7 Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
6.3 Selection Criteria of algorithm . . . . . . . . . . . . . . . . . . . . . . . 34
6.4 About The Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
6.5 How Model Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
6.5.1 Dataset preparation . . . . . . . . . . . . . . . . . . . . . . . . 36
6.5.2 Ensemble construction . . . . . . . . . . . . . . . . . . . . . . . 37
6.5.3 Random sampling . . . . . . . . . . . . . . . . . . . . . . . . . . 37
6.5.4 Random feature selection . . . . . . . . . . . . . . . . . . . . . . 37
6.5.5 Decision Tree Construction . . . . . . . . . . . . . . . . . . . . . 37
6.5.6 Voting and prediction . . . . . . . . . . . . . . . . . . . . . . . . 37
6.5.7 Handling New Instances . . . . . . . . . . . . . . . . . . . . . . 38
6.5.8 Model Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . 38
6.6 Key Components of the Random Forest
Algorithm: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

7 Software Testing Validations 40


7.1 Testing Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
7.1.1 White-Box Testing . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.1.2 Black-Box Testing . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.1.3 Unit Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

iv
7.1.4 Integration Testing . . . . . . . . . . . . . . . . . . . . . . . . . 43
7.2 Testing Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
7.2.1 Manual Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

8 Result and Analysis 45


8.1 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.2 Character Accuracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

9 Conclusion 49
9.1 Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9.2 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
9.2.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
9.2.2 Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

v
List of Figures

2.1 Convolutional Neural Networks . . . . . . . . . . . . . . . . . . . . . . 5


2.2 Support Vector Machine . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.3 Random Forest Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.4 American Sign Language . . . . . . . . . . . . . . . . . . . . . . . . . . 8

3.1 Waterfall Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

4.1 Model Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20


4.2 System architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.3 DFD 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.4 DFD 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.5 DFD 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.6 Usecase Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.7 Component diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.8 Sequence diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.9 Collaboration diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

6.1 Random Forest Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 35


6.2 Random Forest Example . . . . . . . . . . . . . . . . . . . . . . . . . . 38

8.1 Output:Letter A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.2 Output:Letter B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
8.3 Output:Letter C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

vi
List of Tables

6.1 Algorithm Accuracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

7.1 Test Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

8.1 Character Accuracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

vii
Chapter 1
Introduction

1.1 Overview
Automated Teller Machines (ATMs) have become a staple in modern banking, providing
convenient and instant access to financial services. However, traditional ATM systems
rely on Personal Identification Numbers (PINs) for authentication, a method that can be
vulnerable to theft, hacking, or human error. With the increasing demand for higher
security and better user convenience, biometric technologies, particularly fingerprint
recognition, have emerged as a solution to enhance ATM security. A fingerprint-based
ATM machine offers a more secure and efficient method for user authentication by
utilizing an individual’s unique fingerprint for identity verification. Unlike PINs, which
can be forgotten or stolen, fingerprints are unique to each person and are extremely
difficult to replicate or forge. This makes fingerprint recognition an ideal biometric
authentication method for ATMs, as it ensures that only authorized individuals can
access their accounts.
The system works by enrolling a user’s fingerprint during the initial setup process,
storing it in a secure database. Each time the user accesses the ATM, their fingerprint
is scanned, and the system matches it to the stored data for authentication. Once
verified, the user can proceed with banking transactions such as withdrawing money,
checking balances, and transferring funds, all without the need for a PIN.
The introduction of fingerprint-based ATM machines aims to address concerns re-
lated to security, fraud, and user convenience. With the increasing threat of identity

1
Sign Language Detection System Using Machine Learning

theft and data breaches, replacing PIN-based systems with fingerprint-based systems
represents a significant advancement in ensuring the safety and integrity of financial
transactions. Additionally, it streamlines the user experience by eliminating the need
to remember PINs or worry about them being compromised.

1.2 Motivation
The most significant concern with PIN-based ATM systems is their susceptibility to
theft, fraud, and misuse. PINs can be easily forgotten, stolen, or exposed through
practices such as shoulder surfing or keylogging. Fraudulent activities such as ATM
card skimming and PIN code theft have become major issues in the banking sector,
leading to financial losses and a decrease in customer trust. As a result, there is a
growing need for a more secure, reliable, and user-friendly authentication method to
safeguard user the widespread use of Automated Teller Machines (ATMs) have rev-
olutionized the way we access and manage financial services. However, with these
advancements, security concerns have also grown. Traditional ATM systems rely on
Personal Identification Numbers (PINs) for user authentication. This technology holds
the potential to significantly reduce the risk of identity theft and fraud while improving
the overall user experience at ATMs.

1.3 Problem Statement


Improve user experience by eliminating the need to remember PINs.

1.4 Project Scope and Limitation

1.4.1 Project Scope

The Fingerprint-Based ATM Machine project aims to replace traditional PIN-based


authentication systems with biometric fingerprint recognition for enhanced security,
improved user experience, and streamlined transaction processes. The detailed scope
of this project includes the following key componentsOnce the fingerprint is scanned, it

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
2
Sign Language Detection System Using Machine Learning

will be cross-verified with the stored fingerprint data.Access to the ATM system will be
granted only if the fingerprint matches an existing user in the database.Each transaction
will require confirmation by the user before execution, ensuring accuracy and security.

1.4.2 Limitation of Existing System

1. Limited Vocabulary PINs are susceptible to theft or exposure through various


means, such as shoulder surfing, skimming devices, or keylogging malware. Hackers can
also gain access by stealing ATM cards and accessing PINs through unauthorized.

2. Real-time Performance Skimming devices can be installed on ATM machines to


capture card details, including the PIN when entered. This allows criminals to create
duplicate cards and access accounts without the victim’s knowledge

3. Dependency on Hardware PIN-based authentication relies on something the


user knows, making it vulnerable to various forms of attack. If a PIN is stolen, the
entire account is at risk.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
3
Chapter 2
Literature Survey

literature survey on fingerprint-based ATM systems delves into the research, techno-
logical advancements, and real-world implementations of biometric authentication, par-
ticularly fingerprint recognition, in the banking sector. The literature highlights the
advantages, challenges, and existing applications of fingerprint technology for securing
ATM systems and improving user experience.

Overview: Biometric systems, such as fingerprint recognition, iris scanning, and facial
recognition, have been adopted by various industries, including banking, for enhanced
security. Fingerprint recognition, due to its uniqueness, ease of use, and maturity in
technology, has become a preferred choice for secure authentication.

Fingerprint recognition algorithms have seen significant improvements in terms of ac-


curacy, speed, and robustness. Early methods relied on simple ridge pattern matching,
but modern algorithms utilize minutiae-based, ridge-based, or even deep learning-based
approaches for enhanced accuracy and fraud preventiondiscussed the use of Aadhaar,
India’s national identity program, to integrate biometric authentication in banking and
ATMs, offering a more secure and convenient alternative to PIN-based systems.

4
Sign Language Detection System Using Machine Learning

2.1 Types of Machine Learning Algorithm

2.1.1 Convolutional Neural Networks

In the context of a fingerprint-based ATM machine, Convolutional Neural Networks


(CNNs) can play a significant role in enhancing the fingerprint recognition process,
making the system more efficient, accurate, and resistant to external factors that could
affect fingerprint quality. CNNs, a type of deep learning algorithm, have demonstrated
impressive performance in image processing tasks, including fingerprint recognition,
which is a crucial component of biometric authentication.Fingerprint recognition in-
volves several steps, including fingerprint image acquisition, preprocessing, feature ex-
traction, and matching. CNNs can be used at different stages of the process, particu-
larly for feature extraction and classification. Here’s how CNNs can be integrated into
a fingerprint-based ATM system A CNN-based approach can improve the fingerprint
matching process by learning the most discriminative features in the dataset, allowing
the system to more effectively match fingerprints despite small differences (e.g., par-
tial fingerprints, changes in skin texture, or distortionfingerprints can lead to a higher
recognition rate and reduce false rejections

Figure 2.1: Convolutional Neural Networks

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
5
A Support Vector Machine (SVM) can be used as part of the process to classify and
Sign Language Detection System Using Machine Learning
authenticate fingerprints in a fingerprint-based ATM machine. Here’s how SVM can be
integrated into fingerprint recognition for such ATM systems: An SVM is a supervised
machine learning algorithm primarily used for classification tasks. In the context of
fingerprint recognition, the SVM helps classify whether a given fingerprint matches a
stored one.
The key idea behind SVM is to find a hyperplane (decision boundary) that best sepa-
rates different classes in the feature space. In a fingerprint recognition system, it sepa-
rates genuine matches (the user’s fingerprint) from impostor matches (a non-matching
fingerprint).
When the fingerprint features are linearly separable, a linear SVM can be used. This
means that the features of genuine and impostor fingerprints can be separated with a
straight hyperplane.In cases where the features are not linearly separable, a kernel
trick is used to map the input features into a higher-dimensional space, where a linear
decision boundary can be found. In cases where the features are not linearly
separable, a kernel trick is used to map the input features into a higher-dimensional
space, where a linear decision boundary can be found. Common kernels include the
Radial Basis Function (RBF) and Polynomial kernel.

Figure 2.2: Support Vector Machine

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
6
Sign Language Detection System Using Machine Learning

2.1.3 Random Forest Algorithm

The Random Forest Algorithm is another machine learning technique that can be effec-
tively used for fingerprint-based ATM authentication. Random Forest is an ensemble
learning method that combines multiple decision trees to classify or predict outcomes.
When applied to fingerprint recognition in an ATM system, it can help classify whether
a fingerprint is genuine (belongs to the user) or impostor (does not belong to the userThe
training process involves training a Random Forest model on a labeled dataset of fin-
gerprint feature vectors. Each feature vector represents the unique characteristics of
a fingerprint, and the corresponding label indicates whether the fingerprint is genuine
(from a specific user) or impostor (from another user).Random Forest is less prone to
overfitting compared to individual decision trees because it averages out the predic-
tions from multiple trees. This generally leads to improved accuracy and robustness in
fingerprint classification.

Figure 2.3: Random Forest Algorithm

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
7
Sign Language Detection System Using Machine Learning

2.2 American Sign Language

Figure 2.4: American Sign Language

2.2.1 Introduction

Fingerprint-based ATM machines are an advanced form of biometric authentication that


offer a high level of security and convenience for users. By using unique characteristics
of a person’s fingerprint, these machines can verify identity without requiring PINs
or cards. This system is based on the idea that each person has a unique fingerprint
pattern, which makes it highly difficult to replicate or steal.
In parallel with advancements in biometric authentication, sign language integration
into ATM machines could be an important step towards ensuring accessibility for people
with hearing impairments. Incorporating sign language would make ATM transactions
more inclusive, allowing users who rely on sign language as their primary mode of
communication to navigate the ATM system effectively. Users can also choose a text-
based option where instructions are displayed on the screen in written form. These
instructions could be simple, clear, and easy to understand for those who might have
limited knowledge of sign language. The ATM could feature a video screen with a
sign language interpreter. This interpreter would translate text instructions into sign
language to guide the user through the transaction process.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
8
Sign Language Detection System Using Machine Learning

2.2.2 Sign Language and Orientation

Interactive Buttons: The ATM interface could also incorporate touch buttons with sign
language icons, helping to guide users visually through the various steps of a transaction:

• The ATM scans the user’s fingerprint and extracts.

• If the SVM classifies the fingerprint as genuine.

The ATM scans the user’s fingerprint and extracts unique features like ridges and
minutiae points:

• Cash Dispenser

• Banking

• Smart Card Reacder

• Visual output to guide the user through the authentication process.

In the future, as machine learning, computer vision, and natural language processing
technologies continue to evolve, it may become easier to create more intuitive and accu-
rate systems for integrating sign language into ATM interactions. Sign language-based
systems could potentially become a standard accessibility feature for ATMs.

2.3 System Working Principles

2.3.1 Proposed Methodology

A fingerprint-based ATM machine involves replacing traditional PIN-based authen-


tication with biometric identification via fingerprint scanning. Below is a proposed
methodology for implementing a fingerprint-based ATM system, focusing on the entire
process, including user enrollment, fingerprint capture, feature extraction, classifica-
tion, and authentication.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
9
Sign Language Detection System Using Machine Learning

The proposed methodology for a fingerprint-based ATM authentication system inte-


grates biometric fingerprint recognition and machine learning algorithms to improve
the security and convenience of ATM transactions. This system replaces traditional
PIN-based authentication with biometric authentication, making the process faster,
more secure, and easier for users while minimizing fraud risks such as card theft and
PIN guessing.

A fingerprint-based ATM machine using biometric authentication represents a signifi-


cant shift in how users authenticate themselves for financial transactions, offering higher
security and convenience compared to traditional PIN-based systems. Here’s a proposed
methodology for implementing a fingerprint-based ATM system.Training: A deep learn-
ing approach that uses convolutional layers to automatically learn the features from raw
fingerprint images, without manual feature extraction. Classification: After training,
the CNN can classify whether the fingerprint matches a stored template based on the
learned patterns. Training: A deep learning approach that uses convolutional layers to
automatically learn the features from raw fingerprint images, without manual feature
extraction.Classification: After training, the CNN can classify whether the fingerprint
matches a stored template based on the learned patterns.

OverallIncorporating fingerprint-based biometric authentication into ATMs enhances


security, reduces fraud, and improves user convenience. The proposed methodology
outlines the process from enrollment, authentication, to transaction execution, with a
focus on security, efficiency, and the use of machine learning algorithms such as SVM
for fingerprint classification.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
10
Sign Language Detection System Using Machine Learning

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
11
Chapter 3
Software Requirement Specification

A Software Requirements Specification (SRS) document for Sign Language Detection


System outlines the functional and non-functional requirements of the software.

3.1 Introduction

3.1.1 Purpose

A sign language detection system serves to bridge communication gaps between individ-
uals who use sign language and those who do not. By translating sign language gestures
into spoken or written language, it enables real-time communication accessibility for
the deaf and hard of hearing community. This technology promotes inclusivity in vari-
ous domains such as education, public services, and customer interactions, empowering
individuals with deafness to engage more fully in social and professional contexts.

3.1.2 Project scope

The project scope of a sign language detection system involves developing software or
hardware capable of accurately recognizing and interpreting sign language gestures in
real time. This encompasses the design, development, and testing phases of the sys-
tem, including the creation of algorithms for gesture recognition, integration of sensors
or cameras for capturing gestures, and implementation of user interfaces for interac-
tion. The scope also includes considering the diversity of sign languages and gestures,

12
Sign Language Detection System Using Machine Learning

ensuring the system’s adaptability to different linguistic and cultural contexts.

3.1.3 Assumptions And Dependenciese

The development and implementation of a sign language detection system rely on sev-
eral assumptions and dependencies. Firstly, there is an assumption of access to diverse
and comprehensive datasets containing sign language gestures for training accurate
models. The system’s effectiveness is heavily contingent upon the quality and quantity
of available data. Additionally, the system depends on suitable hardware components
such as cameras or sensors capable of capturing gestures accurately in various environ-
ments.

3.1.4 User Classes and Characteristics

User Classes

The main user of this project are the specially abeled people which use this system
to Detect the Sign Language which would be easy to the other person communicating
with the other person.This can also be useful in sectors like

• Education

• Public Places

• Work Places

Characteristics

• Technological Development

• Upbringing the change in society’s common issues

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
13
Sign Language Detection System Using Machine Learning

3.2 Functional Requirements


A sign language detection system employing the Random Forest algorithm must meet
several functional requirements. Firstly, it should accurately recognize and classify
various sign language gestures, ensuring high precision and recall rates. Secondly, the
system should be capable of real-time detection, allowing for swift and seamless commu-
nication. Additionally, it should support a diverse range of sign languages and gestures
to accommodate users worldwide. Furthermore, the system must be adaptable to dif-
ferent environments and lighting conditions to ensure robust performance. Lastly, it
should provide user-friendly interfaces for both input (gesture recognition) and output
(communication), enabling intuitive interaction for users. Overall, the system should
prioritize accuracy, speed, versatility, and usability to effectively facilitate communica-
tion for individuals using sign language.

3.2.1 Business Requirements

• A sign language detection system utilizing the Random Forest algorithm must ful-
fill several business requirements. Firstly, it should accurately recognize and inter-
pret sign language gestures to facilitate communication for the hearing-impaired
community. The system must be efficient and responsive, providing real-time
interpretation to ensure seamless interaction.

• It should be scalable to accommodate a wide range of gestures and support mul-


tiple languages or dialects. Accessibility and user-friendliness are paramount,
necessitating intuitive interfaces for both users and developers. Moreover, the
system should prioritize privacy and security measures to safeguard user data.
Overall, the success of the system hinges on its ability to bridge communication
gaps effectively while maintaining reliability and accessibility for all users.

3.2.2 User Requirements

• A sign language detection system utilizing the Random Forest algorithm aims
to accurately interpret hand gestures for improved communication accessibility.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
14
Sign Language Detection System Using Machine Learning

User requirements include real-time processing for seamless interaction, high ac-
curacy in recognizing diverse signs, adaptability to varying lighting conditions,
and compatibility with different sign languages.

• The system should offer intuitive user interfaces, supporting both learners and
proficient signers. Additionally, it should be capable of detecting subtle nuances
and variations in hand movements to ensure precise interpretation. Incorporating
feedback mechanisms for continuous learning and refinement is essential, ensuring
the system evolves to meet the needs of its users effectively.

3.2.3 Software Requirements

Operating System: Windows 10 (64 Bit)


Software language: Python
Web Framework: Flask

3.2.4 Hardware Requirement

Processor : Above 1.5GHZ


Hard Disk : 100 MB
RAM : 8 GB

3.3 System Features

3.3.1 System feature 1:

• The application is user friendly.

• It provides an easy interface to user.

• The accessibility or response time of the application should be fast.

3.3.2 System feature 2:

• End User application will be developed in Windows OS.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
15
Sign Language Detection System Using Machine Learning

• All scripts shall be written in Python.

• Application design pattern shall be Singleton.

3.4 External Interface Requirements

3.4.1 User Interface

The system shall provide a simple interface to the user, where he or she can just put
the sign language as input, which will be processed by the back-end and the detected
sign will be given as output to the user interface, which is the Web interface.

3.4.2 Hardware Interfaces

1. Server side
The web application will be hosted on a web server which is listening on the web
standard port.

2. Client side
Monitor screen : the software shall display information to the user via the monitor
screen.

3.4.3 Software Interface

1. Server side
A web server will accept all requests from the client and forward them accordingly.

2. Client side
An OS that is capable of running a modern web browser that supports JavaScript
and HTML5.

3.5 Non-functional Requirements


Non-functional requirements are requirements that specify criteria that can be used to
judge the operation of a system rather than specific behaviors.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
16
Sign Language Detection System Using Machine Learning

3.5.1 Performance Requirement

The performance of the functions and every module must be good. The overall perfor-
mance of the software will enable the users to work recently. The performance of the
encryption of data should be fast. The performance of the virtual environment should
be fast.

3.5.2 Safety Requirement

The application is designed in modules where errors can be detected and fixed easily.
This makes it easier to install and update new functionality if required

3.5.3 Security Requirement

All data will be encrypted using strong encryption algorithm and according to location
encryption is done.

3.6 Software Quality Attributes


Our software has many quality attribute that are given below:-

• Accuracy:
The accuracy of sign prediction is crucial. The system should provide precise and
reliable predictions based on input sign language. High accuracy is essential for
specially abeled people who are eagerly willing for this system

• Reliability:
The system should consistently provide accurate predictions under different con-
ditions and with diverse sets of input signs. It needs to be dependable and trust-
worthy for users who rely on its language detection capabilities.

• Maintainability:
The application should be easy to maintain and update. This includes the ability
to update the dataset, retrain machine learning models, and fix bugs or security
vulnerabilities promptly.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
17
Sign Language Detection System Using Machine Learning

• Adaptability:
The system should be adaptable to changes in the dataset and evolving language
patterns. Regular updates to the machine learning models and the ability to
incorporate new data contribute to the adaptability of the system.

• Usability:
The user interface should be intuitive and user-friendly, allowing users to easily
input the signs, interpret results, and navigate the application. Usability is es-
sential for specially abeled people and individuals who may not have a technical
background.

• Security:
Given that the system deals with user-uploaded signs, it must prioritize the secu-
rity and privacy of the system data. Implement secure data transmission, storage,
and access controls to protect sensitive information.

• Testability:
The system should be designed with testability in mind, allowing for the creation
and execution of effective testing procedures. This ensures that any changes or
updates to the system can be thoroughly tested.

• Performance: Performance attributes, including response time and computa-


tional efficiency, are crucial for the applications. The system should be capable
of delivering timely results, especially in dynamic situations.

• Interoperability: The software should be able to integrate with other relevant


systems or data sources, facilitating data exchange and collaboration. This at-
tribute is particularly important in the context of public sectors, where diverse
technologies and data sources may be involved.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
18
Sign Language Detection System Using Machine Learning

Figure 3.1: Waterfall Model

3.7 Analysis Models


The sequential phases in Waterfall model are Requirement Gathering and analysis Our
System required the standard tomato disease dataset which having 10 classes in which
9 having disease classes and one class having healthy leaf. System Design In this phase
we design a system which helps in specifying hardware and system requirements.In this
design phase we design the software design pattern(Iterator and Singleton) which help
us in defining the overall system architecture. Implementation With inputs from the
system design, we firstly split our dataset into train,test and validation units, which are
integrated in the next phase. Each unit is developed and tested for its functionality,
which is referred to as Unit Testing. Integration and Testing All the units developed
in the implementation phase are integrated into a system after testing of each unit.
Post integration the entire system is tested for any faults and failures. Deployment of
system Once the functional and non-functional testing is done; the product is deployed
to the end user means farmer or released into the modern agriculture systems market.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
19
Chapter 4
System Design

4.1 Model Architecture

Figure 4.1: Model Architecture

20
Sign Language Detection System Using Machine Learning

4.2 System Architecture

Figure 4.2: System architecture

4.3 DFD Diagrams


A data flow diagram is a traditional visual representation of the information flows
within a system. It shows how data enters and leaves the system. what changes the
information and where to give the output.

DFD 0 : Context Diagram is another name for DFD Level 0. It’s a high-level
overview of the entire system or process that’s being studied or modelled. It’s meant
to provide a quick peek of the system, portraying it as a single high-level process with
relationships to external entities.

Figure 4.3: DFD 0

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
21
Sign Language Detection System Using Machine Learning

DFD 1 : In 1stlevel of DFD, the diagram is decomposed into multiple processes. In


this level,we highlight the main functions of the system and breakdown the high-level
process of 0-level DFD into subprocesses.Just like in bellow diagram we demonstrate
the functionality of System. The single process node from the context diagram is broken
down into sub-processes. As these processes are added, the diagram will need additional
data flows and data stores to link them together.

Figure 4.4: DFD 1

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
22
Sign Language Detection System Using Machine Learning

DFD 2: This level provides an even more detailed view of the system by breaking
down the sub-processes identified in the level 1 DFD into further sub-processes. Each
sub-process is depicted as a separate process on the level 2 DFD. The data flows and
data stores associated with each sub-process are also shown.

Figure 4.5: DFD 2

4.4 Use-case Diagrams


A use case diagram is a visual representation of the interactions between actors (users)
and a system. It illustrates the various ways in which users interact with a system to
achieve specific goals.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
23
Sign Language Detection System Using Machine Learning

In a use case diagram, actors are represented as stick figures, and use cases are
depicted as ovals. Lines connecting actors and use cases show the relationships and
interactions between them.
Use case diagrams are useful for understanding the functional requirements of a
system from a user’s perspective and for communicating those requirements to stake-
holders. They help in identifying different user roles, their goals, and the actions they
perform within the system. By outlining these interactions, use case diagrams aid in
the design and development of the system, ensuring that it meets the needs and expec-
tations of its users. Additionally, they serve as a foundation for more detailed system
specifications and test cases during the software development process.

Figure 4.6: Usecase Diagram

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
24
Sign Language Detection System Using Machine Learning

4.5 Component Diagram


A component diagram depicts how components are wired together to form larger com-
ponents or software systems. They are used to illustrate the structure of arbitrarily
complex systems.

Figure 4.7: Component diagram

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
25
Sign Language Detection System Using Machine Learning

4.6 Sequence Diagram


A sequence diagram is a type of interaction diagram because it describes how—and in
what order—a group of objects works together. These diagrams are used by software
developers and business professionals to understand requirements for a new system or
to document an existing process.

Figure 4.8: Sequence diagram

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
26
Sign Language Detection System Using Machine Learning

4.7 Collaboration Diagram


A collaboration diagram, also known as a communication diagram, is a type of inter-
action diagram in Unified Modeling Language (UML). It depicts the interactions and
relationships among objects or components within a system. Collaboration diagrams
focus on how objects collaborate to achieve a specific functionality or behavior.

Figure 4.9: Collaboration diagram

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
27
Chapter 5
Technical Specification

Tools Technology used

5.1 Python
Python is an interpreted high-level programming language for general-purpose program-
ming. Created by Guido van Rossum and first released in 1991, Python has a design
philosophy that emphasizes code readability, notably using significant whitespace.

Features:

• Python works on different platforms (Windows, Mac, Linux, Raspberry Pi, etc).

• Python has a simple syntax similar to the English language.

• Python has syntax that allows developers to write programs with fewer lines than
some other programming languages.

• Python runs on an interpreter system, meaning that code can be executed as soon
as it is written. This means that prototyping can be very quick.

• Python can be treated in a procedural way, an object-oriented way or a functional


way.

28
Sign Language Detection System Using Machine Learning

5.2 Designed Framework


Here are the steps on how to build a framework for sign language detection using
Python:

1. Create a dataset:
This is the most important step, as the quality and size of your dataset will directly
impact the performance of your model. Your dataset should contain images or
videos of people signing different gestures. You can collect this data yourself or
find a public dataset online.

2. Choose a machine learning algorithm:


There are many different machine learning algorithms that can be used for sign
language detection. Some popular choices include support vector machines (SVMs),
random forests, and convolutional neural networks (CNNs).

3. Train your model:


Once you have chosen a machine learning algorithm, you need to train your model
on your dataset. This process can take some time, depending on the size and
complexity of your dataset.

4. Evaluate your model:


Once your model is trained, you need to evaluate its performance on a held-out
test set. This will give you an idea of how well your model will generalize to new
data.

5. Deploy your model:


Once you are satisfied with the performance of your model, you can deploy it to
production. This could involve making it available as a web service or mobile
app.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
29
Sign Language Detection System Using Machine Learning

5.3 Python Libraries used


Here are some of the Python libraries that you can use for sign language detection:

• OpenCV: This library provides a variety of functions for image processing and
computer vision.

• Scikit-learn: This library provides a variety of machine learning algorithms.

• TensorFlow: This library is used for building and training neural networks.

• PyTorch: This library is also used for building and training neural networks.

The need for real-time performance:


Sign language detection systems often need to operate in real time. This can be chal-
lenging, as machine learning algorithms can be computationally expensive. Despite
these challenges, there has been significant progress in the field of sign language detec-
tion in recent years. With the continued development of machine learning algorithms
and the availability of more data, sign language detection systems are becoming more
and more accurate and reliable.

Specifications:
• Python (3.9)

• IDE (pycharm)

• Numpy (version 1.16)

• cv2 (openCV) (version 3.4)

• Keras (version 2.3)

• Tensorflow (as keras uses tensorflow in backend and for image preprocessing)(version
2.0.)

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
30
Chapter 6
Software Implementation

6.1 Introduction
The proposed methodology in this project, to perform the analysis for sign generated
extracts using following steps:

1. Image frame acquisition

2. Hand segmentation

3. Hand tracking

4. Output gestures

5. Classification

6. Feature extraction

7. Output

31
Sign Language Detection System Using Machine Learning

6.2 Modules and Algorithms

6.2.1 Image frame acquisition

This phase involves the process of opening a frame to capture the gestures from users.
In the context of sign language detection, these images would likely be of hand gestures
which make sensible meaning.

6.2.2 Hand segmentation

• Ensures that the hand gestures shown by the user are clear and visible to take
the input

• Implement user-friendly interfaces for seamless runtime gestures detected.

6.2.3 Hand Tracking

This phase involves the hand tracking by the system which is shown by the user to the
system .It plots the coordinates on the and and join all the plotted points by the inbuilt
libraries given to the system preset.By this phase the hand gesture is tracked by the
system

6.2.4 Output Gestures

When the user gives the input in the previous phase the system captures the data and
using the random forest algorithm features the system links the data from various files
to give the accurate output to the user on the basis of the input

6.2.5 Classification

Data Classification:

• The classification phase involves using machine learning algorithms to categorize


signs and gestures based on the extracted features.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
32
Sign Language Detection System Using Machine Learning

• Common algorithms for classification include decision trees, Image processing,Random


Forest Algorithm

Training the Model:

• Train the classification model using a labeled dataset, where images are associated
with their respective signs.

• Evaluation metrics such as accuracy,and precision help assess the model’s perfor-
mance.

6.2.6 Feature Extraction

The images taken input by the user are matched with the datasets in the file and the
features are extracted from it .When the features of a specific dataset are matching to
the input the label of the dataset is given to the image and the output is shown to the
user.

6.2.7 Output

When the above mentioned steps are completely fulfilled by the system the user gets
the required output as the labelling of the gestures given by the user .

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
33
Sign Language Detection System Using Machine Learning

6.3 Selection Criteria of algorithm

Sr.no Algorithm names Dataset Collection Accuracy(in %)


1 Convolutional Neural Network Less than RFA 85%
2 Support Vector Machine Less than CNN and RFA 80%
3 Random Forest Algorithm More than CNN 90%

Table 6.1: Algorithm Accuracy

6.4 About The Model


The Random Forest algorithm is a notable supervised machine learning technique that
operates by aggregating multiple decision tree models. This methodology entails the
creation of a set of decision trees, each generated from randomly selected subsets of the
training data. By combining predictions from each tree through a voting mechanism,
the algorithm produces a final solution based on the aggregated results from these in-
dividual trees.
Renowned for its exceptional accuracy, the Random Forest algorithm stands as a promi-
nent player in the field of machine learning. Its effectiveness lies in the construction of
multiple decision trees, which helps mitigate concerns related to overfitting—a common
issue in machine learning models. Unlike some algorithms prone to bias, the random
forest considers outputs from various decision trees, ensuring a more robust and unbi-
ased outcome.
One of the key advantages of the random forest algorithm is its versatility in handling
both classification and regression tasks. This adaptability proves invaluable in scenar-
ios where precise predictions are necessary, making it a highly sought-after tool across
diverse applications.
Additionally, the random forest algorithm is relatively straightforward to implement
and tune, making it accessible to both novice and experienced practitioners. Its intu-
itive nature and flexibility in parameter settings allow users to customize the algorithm
to suit specific modelling requirements and data characteristics.
Overall, the Random Forest algorithm’s combination of accuracy, versatility, and ro-

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
34
Sign Language Detection System Using Machine Learning

Figure 6.1: Random Forest Algorithm

bustness positions it as a powerful and reliable tool in the realm of supervised machine
learning. Its ability to effectively handle diverse tasks, including classification, regres-
sion, and feature selection, makes it an indispensable asset in various domains, from
finance and healthcare to marketing and beyond.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
35
Sign Language Detection System Using Machine Learning

6.5 How Model Work


Random forest is a supervised learning algorithm. The “forest” it builds is an ensemble
of decision trees, usually trained with the bagging method. The general idea of the
bagging method is that a combination of learning models increases the overall result.
Random forest has nearly the same hyperparameters as a decision tree or a bagging
classifier. Fortunately, there’s no need to combine a decision tree with a bagging clas-
sifier because you can easily use the classifier-class of random forest. With random
forest, you can also deal with regression tasks by using the algorithm’s regressor. Ran-
dom forest adds additional randomness to the model, while growing the trees. Instead
of searching for the most important feature while splitting a node, it searches for the
best feature among a random subset of features. This results in a wide diversity that
generally results in a better model. Therefore, in a random forest classifier, only a
random subset of the features is taken into consideration by the algorithm for splitting
a node.

• Dataset preparation

• Ensemble Construction

• Random Sampling

• Decision Tree Construction

• Voting and Prediction

• Handling new Instance

• Model evalution

6.5.1 Dataset preparation

The algorithm requires a labeled dataset with input features (independent variables)
and corresponding labels (dependent variables). The dataset is divided into a training
set and, optionally, a separate validation or test set.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
36
Sign Language Detection System Using Machine Learning

6.5.2 Ensemble construction

The Random Forest algorithm constructs an ensemble of decision trees. The number
of trees in the ensemble called the ”number of estimators,” is a hyperparameter that
needs to be specified.

6.5.3 Random sampling

For each decision tree in the ensemble, a random subset of the training data is selected.
This sampling is performed with replacement, which means that each data point in the
training set can be selected multiple times, and some data points may not be selected
at all.

6.5.4 Random feature selection

At each split point of a decision tree, a random subset of features is considered. The
number of features to consider at each split is usually controlled by a hyperparameter,
often the square root of the total number of features. This random feature selection
helps to introduce diversity among the trees.

6.5.5 Decision Tree Construction

Using subset of training data and the randomly selected features, each decision tree is
constructed independently. The tree-building process follows a standard decision tree
algorithm (e.g., ID3, CART) and involves recursively partitioning the data based on
the selected features. The splitting criterion may be based on information gain, Gini
impurity, or other measures of impurity or diversity.

6.5.6 Voting and prediction

Once all the decision trees are constructed, predictions are made by aggregating the
outputs of each tree. The aggregation process depends on the task type:

• Classification: For classification tasks, each decision tree predicts the class label
of an input sample. The class with the majority of votes among all the trees is

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
37
Sign Language Detection System Using Machine Learning

Figure 6.2: Random Forest Example

selected as the final predicted class.

• Regression: For regression tasks, each decision tree predicts a continuous value.
The final prediction is typically the average (or median) of the predicted values
from all the trees.

6.5.7 Handling New Instances

When a new instance needs to be classified or predicted, it is passed through each deci-
sion tree in the Random Forest. The instance follows the decision rules at each internal
node and traverses down the tree until it reaches a leaf node. The final prediction is
then made based on the aggregation scheme discussed earlier.

6.5.8 Model Evaluation

The performance of the Random Forest model is assessed using appropriate evaluation
metrics such as accuracy, precision, recall, F1 score (for classification tasks), or mean
squared error (MSE) (for regression tasks).

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
38
Sign Language Detection System Using Machine Learning

6.6 Key Components of the Random Forest


Algorithm:
• Random Sampling: Random Forest randomly selects subsets of the training data
to train each decision tree. This process is known as bootstrapping. Randomly
sampling the data helps to introduce diversity among the trees, making the algo-
rithm less prone to overfitting.

• Random Feature Selection: In addition to sampling the data, Random Forest also
randomly selects a subset of features at each split point in the decision tree. This
technique, known as feature bagging, further enhances the diversity among the
trees and improves their robustness.

• Decision Tree Ensemble: The strength of the Random Forest lies in its ensemble
of decision trees. By combining the predictions of multiple trees, the algorithm
leverages the wisdom of the crowd, reducing the bias and variance of individual
trees and improving the overall prediction accuracy.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
39
Chapter 7
Software Testing Validations

7.1 Testing Types


Software testing is an examination that is carried out to offer information to stakeholders
regarding the quality of the product or service being tested. Software testing can also
give a corporation with an objective, unbiased picture of the software, allowing them to
grasp and comprehend the risks associated with software implementation. The process
of executing a program or application with the purpose of detecting software faults is
one example of a test technique. Software testing is defined as the process of validating
and confirming that a computer programme, application, or product meets the following
criteria:

• Meets the requirements that guided its design and development.

• Can be implemented with the same characteristics

• Works as expected

• Satisfies the needs of stakeholder

Software testing can be done at any point during the development process, depending
on the testing approach used. Traditionally, the majority of testing occurs after the
requirements have been determined and the coding process has been done, however in
Agile techniques, the majority of testing occurs throughout the process. As a result,
the test technique is dictated by the software development methodology used. Various

40
Sign Language Detection System Using Machine Learning

software development models will concentrate testing efforts at various stages of the
development process. Test-driven development is commonly used in newer development
methods, such as Agile, and places an increased percentage of the testing in the hands
of the developer before it reaches a formal team of testers. In a more traditional model,
most of the test execution occurs after the requirements have been defined and the
coding process has been completed.

7.1.1 White-Box Testing

White-Box testing, also known as clear box testing, glass box testing, transparent box
testing, and structural testing, examines a program’s internal structures and workings
rather than the functionality that is visible to the end user. White box testing for a sign
language detection system utilizing the Random Forest algorithm involves scrutinizing
the internal logic and structure of the model to ensure its reliability and accuracy. In
this approach, testers delve into the intricate workings of the Random Forest classifier,
examining its decision-making process and feature importance. This entails scrutiniz-
ing the individual decision trees within the ensemble, assessing how they contribute to
the final classification outcome. Testers verify that the input features are appropriately
encoded and processed, ensuring consistency and relevance in sign language recogni-
tion. Additionally, they validate the training data quality, verifying that it adequately
represents the diversity of sign language gestures and scenarios. Furthermore, testers
assess the robustness of the model against various edge cases and potential biases, such
as variations in lighting conditions, hand orientation, and background clutter. By thor-
oughly analyzing the inner workings of the Random Forest model, testers can identify
potential weaknesses, vulnerabilities, or areas for improvement, enabling them to re-
fine the system’s performance and enhance its effectiveness in real-world sign language
recognition tasks

7.1.2 Black-Box Testing

Black box testing for a sign language detection system employing the Random Forest
algorithm involves evaluating the system’s performance without needing to understand
its internal workings. In this approach, the focus is on examining the system’s inputs

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
41
Sign Language Detection System Using Machine Learning

and outputs to ensure it behaves as expected, regardless of the intricacies of its under-
lying algorithms. Test cases are designed to cover various scenarios, such as different
sign gestures, variations in lighting conditions, and diverse backgrounds. Inputs rep-
resenting sign gestures are fed into the system, and the outputs, which should ideally
correspond to the correct interpretation of the signs, are analyzed. Metrics like accu-
racy, precision, recall, and F1 score are computed to gauge the system’s performance.
Additionally, boundary and stress tests are conducted to assess the system’s robustness
against outliers and extreme conditions. The goal is to ensure that the sign language
detection system delivers reliable results across a wide range of real-world situations.
Through meticulous black box testing, potential issues such as misclassifications, bi-
ases, or overfitting can be identified and addressed, ultimately enhancing the system’s
usability and effectiveness for its intended users.

7.1.3 Unit Testing

Unit testing, commonly referred to as component testing, is a type of test that verifies
the functionality of a specific section of code, usually at the function level.Unit testing
for a sign language detection system utilizing machine learning, particularly the Ran-
dom Forest algorithm, is crucial for ensuring its reliability and accuracy. The process
involves breaking down the system into individual components or units and subjecting
each unit to various test cases. These tests verify that each unit functions correctly and
produces the expected output. In the context of a Random Forest-based sign language
detection system, unit testing may include evaluating the preprocessing steps such as
image normalization and feature extraction to ensure they properly prepare the data
for input into the classifier. Additionally, testing the training phase of the Random For-
est algorithm involves verifying that it learns from the data effectively and produces a
model capable of accurately classifying sign language gestures. Furthermore, unit tests
should validate the prediction process, ensuring that the system can correctly classify
unseen sign language gestures with a high degree of accuracy. Through comprehensive
unit testing, developers can identify and rectify any issues or bugs in the system early
in the development cycle, leading to a more robust and reliable sign language detection
system.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
42
Sign Language Detection System Using Machine Learning

7.1.4 Integration Testing

Any sort of software testing that aims to check the interfaces between components
against a programme design is known as integration testing. Software components might
be implemented in stages or all at once. Integration testing for a sign language detection
system utilizing the Random Forest algorithm involves comprehensive validation of its
functionality within the broader application environment. This process ensures seamless
interaction between various system components, including data pre-processing, feature
extraction, model training, and real-time inference. Initially, integration testing verifies
the system’s ability to ingest input data streams effectively, accommodating diverse sign
language gestures. Next, it examines the pre-processing pipeline’s capability to cleanse
and standardize input data, ensuring uniformity for downstream analysis. Feature
extraction modules are then evaluated to confirm their capacity in capturing salient
characteristics from sign language images or videos. Subsequently, integration testing
focuses on training the Random Forest model using extracted features, assessing its
learning capability and generalization across different sign language gestures. Once
the model is trained, integration tests validate its integration with the overall inference
pipeline, ensuring efficient classification of new sign language inputs. Finally, real-world
scenarios are simulated to assess the system’s robustness, scalability, and responsiveness
in diverse environments. Through systematic integration testing, the sign language
detection system employing Random Forest algorithm can be thoroughly validated,
instilling confidence in its reliability and effectiveness for real-world applications.

7.2 Testing Tool

7.2.1 Manual Testing

Manual Testing is a sort of software testing in which test cases are manually conducted
by a tester without the use of automated tools like Selenium IDE, Junit,TestNG, and so
on. The goal of manual testing is to find faults and problems inthe software application.
Manual software testing is the most basic of all testingmethods, and it aids in the
detection of important flaws. Before automating testing, any new application should

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
43
Sign Language Detection System Using Machine Learning

Sr. No. Test Cases Results Status


1. Opening of the camera Camera opens when we run Success
the module
2. Camera lets the gestures cap- System captures the ges- Success
ture tures
3. Plots the coordinates on the Plots the points as well Success
hand segments as connect them with each
other
4. Matches withe the datasets The system matches the Success
images with datasets
5. Label the gestures shows appropriate label to Success
the gestures
6. Result Display Result Success

Table 7.1: Test Cases

be manually tested. Manual software testing takes more time and effort, but it is
required to determinewhether automation is possible. Manual testing concepts do not
necessitate familiarity with any testing tool. ”100% Automation is not achievable,”
says one of the Software Testing Fundamentals. This improves the efficiency of manual
testing.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
44
Chapter 8
Result and Analysis

8.1 Snapshots

Figure 8.1: Output:Letter A

45
Sign Language Detection System Using Machine Learning

Figure 8.2: Output:Letter B

Figure 8.3: Output:Letter C

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
46
Sign Language Detection System Using Machine Learning

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
47
Sign Language Detection System Using Machine Learning

8.2 Character Accuracy

Sr.No Character Attempt Pass Fail Accuracy


1 A 10 10 0 100%
2 B 10 09 01 90%
3 C 10 10 0 100%
4 D 10 10 0 100%
5 E 10 9 01 90%
6 D 10 10 0 100%
7 E 10 10 0 100%
8 F 10 08 02 80%
9 G 10 10 0 100%
10 H 10 10 0 100%
11 I 10 09 01 90%
12 K 10 10 0 100%
13 L 10 10 0 100%
14 M 10 10 0 100%
15 N 10 10 0 100%
16 O 10 10 0 100%
17 P 10 10 0 100%
18 Q 10 09 01 90%
19 R 10 10 0 100%
20 S 10 10 0 100%
21 T 10 10 0 100%
22 U 10 10 0 100%
23 V 10 10 0 100%
24 W 10 10 0 100%
25 X 10 10 0 100%
26 Y 10 10 0 100%
Total Accuracy 95.00 %

Table 8.1: Character Accuracy


Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
48
Chapter 9
Conclusion

9.1 Benefits
1. Improvement in communication: This software can be used by people of any
age group to communicate with each other in day to day lives .Also this system
will not create a problem to normal people to communicate withe these specially
abeled people.

2. Education:

Since the system has provided an ease in communication we can also provide a
betterment in the education of these people so that the can also have the education
that each normal individual has taken.

3. Independence:

Deaf or hearing-impaired individuals can use this system to communicate inde-


pendently in various situations, such as ordering food at a restaurant, asking for
directions, or seeking help in emergencies, without relying on an interpreter.

4. Technological Integration:

Sign language detection system can be integrated into various devices and plat-
forms, such as smartphones, tablets, and smart glasses, making it convenient for
deaf individuals to communicate in different contexts.

49
Sign Language Detection System Using Machine Learning

5. Accessibility:

Sign language detection systems make information more accessible to people with
hearing impairments or communication disabilities. They can access various ser-
vices and participate in conversations, education, and employment opportunities
that might otherwise be challenging to engage with.

6. Employment Opportunities:

Access to effective communication through sign language detection systems can


open up employment opportunities for individuals with disabilities, enabling them
to fully participate in the workforce and contribute their skills and talents.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
50
Sign Language Detection System Using Machine Learning

9.2 Conclusion

9.2.1 Conclusion

Sign languages use hand, body, and facial movements to communicate visually. They’re
crucial for people with disabilities as they provide a way to express themselves and con-
nect with others.To help overcome communication barriers, automated Sign Language
Recognition systems are invaluable. These systems can translate sign language gestures
into spoken language, making it easier for those who don’t understand sign language
to comprehend and interact with individuals who use it by using the Random Forest
Algorithm of Machine Learning .By bridging this communication gap, these systems
empower people with disabilities to communicate more effectively, enhancing their abil-
ity to express emotions, thoughts, and ideas. This advancement fosters inclusivity and
ensures that everyone has the opportunity to participate fully in society, regardless of
their communication abilities.

9.2.2 Future Scope

We can include letters from different languages such as Marathi and Hindi because
everyone’s mother tongue is different. By doing this, we can form words using these
letters, and then combine those words to create a meaningful conversation. This process
allows us to build a paragraph with words that make sense and convey ideas effectively.
It’s a way to ensure that people from various linguistic backgrounds can understand
and participate in the conversation.

Shri Hiralal Hastimal (Jain Brothers) Polytechnic College Chandwad Computer Technology:2023-24
51
Bibliography

1. PADMAVATHI. S, SAIPREETHY.M.S, V.” Indian sign language character recog-


nition using neural Networks”. IJCA Special Issue on Recent Trends in Pattern
Recognition and Image Analysis, RTPRIA(2013).

2. SAKSHI GOYAL, ISHITA SHARMA, S. S. “Sign language recognition system for


deaf and dumb people.” International Journal of Engineering Research Technology
2, 4, Volume:02(April 2013).

3. Ashok K Sahoo, Gouri Sankar Mishra and Kiran Kumar Ravulakollu “Sign Lan-
guage Recognition: State Of The Art” Volume:09 (2014)

4. Prof. Radha S. Shirbhate1, Mr. Vedant D. Shinde2, Ms. Sanam A. Metkari3,


Ms. Pooja U. Borkar4, Ms. Mayuri A. Khandge5 “Sign language Recognition
Using Machine Learning Algorithm” Volume:07(2020)

5. 1 Professor, Department of Computer Science and Engineering, Karpagam College


of Engineering, Coimbatore.2Student, Department of Computer Science and En-
gineering, Karpagam College of Engineering, Coimbatore.“Sign language Recog-
nition using machine Learning Algorithm” Volume:119 (2018)

52

You might also like