Enhancing Email Accessibility for Visually Impaired Individuals

A Voice-based Email System using Artificial Intelligence

Authors

  • Rohit Agnihotri Department of Computer science and Engineering. JSS Academy of Technical Education, Affiliated to AKTU, Noida, India 201301
  • Jaspreet Kaur Department of Computer science and Engineering. JSS Academy of Technical Education, Affiliated to AKTU, Noida, India 201301

DOI:

https://doi.org/10.57159/gadl.jcmm.2.4.23069

Keywords:

Artificial Intelligence, Speech Recognition, Email Accessibility, Visually Impaired, Voice-based Email System

Abstract

This paper presents an innovative, voice-based email system designed to improve email accessibility for visually impaired individuals. The proposed system leverages Artificial Intelligence and speech recognition technologies to convert speech to text and text to speech, enabling visually impaired individuals to send and receive emails using voice commands. The system offers an intuitive user interface, secure authentication measures, and robust database architecture to ensure seamless and secure user experience. Comparative analysis with traditional email systems reveals the superior functionality and inclusivity of the proposed system. Despite certain limitations, future enhancements promise to further refine the system, paving the way for a more inclusive digital communication environment.

References

M. Akour and M. Alenezi, “Higher education future in the era of digital transformation,” Education Sciences, vol. 12, no. 11,p. 784, 2022.

A. Pregowska, K. Masztalerz, M. Garlin´ska, and M. Osial, “A worldwide journey through distance education—from the post office to virtual, augmented and mixed realities, and education during the covid-19 pandemic,” Education Sciences, vol. 11, no. 3, p. 118, 2021.

T. J. Blank, Folklore and the Internet: Vernacular expression in a digital world. University Press of Colorado, 2009.

K. Manjari, M. Verma, and G. Singal, “A survey on assistive technology for visually impaired,” Internet of Things, vol. 11,p. 100188, 2020.

A. Webster and J. Roe, Children with visual impairments: Social interaction, language and learning. Psychology Press, 1998.

G. R. Hayes, S. Hirano, G. Marcu, M. Monibi, D. H. Nguyen, and M. Yeganyan, “Interactive visual supports for children with autism,” Personal and ubiquitous computing, vol. 14, pp. 663–680, 2010.

B. Shneiderman and C. Plaisant, Designing the user interface: Strategies for effective human-computer interaction. Pear- son Education India, 2010.

Y. Yu, S. Ashok, S. Kaushik, Y. Wang, and G. Wang, “Design and evaluation of inclusive email security indicators for people with visual impairments,” in 2023 IEEE Symposium on Security and Privacy (SP), pp. 2885–2902, IEEE, 2023.

F. A. Inan, A. S. Namin, R. L. Pogrund, and K. S. Jones, “Internet use and cybersecurity concerns of individuals with visual impairments,” Journal of Educational Technology & Society, vol. 19, no. 1, pp. 28–40, 2016.

A. M. Piper, R. Brewer, and R. Cornejo, “Technology learning and use among older adults with late-life vision impairments,”Universal Access in the Information Society, vol. 16, no. 3, pp. 699–711, 2017.

R. Brewer, R. C. Garcia, T. Schwaba, D. Gergle, and A. M. Piper, “Exploring traditional phones as an e-mail interface for older adults,” ACM Transactions on Accessible Computing (TACCESS), vol. 8, no. 2, pp. 1–20, 2016.

J. Hailpern, L. Guarino-Reid, R. Boardman, and S. Annam, “Web 2.0: blind to an accessible new world,” in Proceedings of the 18th international conference on World wide web, pp. 821–830, 2009.

C. A. Beverley, P. Bath, and A. Booth, “Health information needs of visually impaired people: a systematic review of the literature,” Health & Social Care in the Community, vol. 12, no. 1, pp. 1–24, 2004.

S. Kumar, U. Gupta, A. K. Singh, and A. K. Singh, “Artificial intelligence: Revolutionizing cyber security in the digital era,”Journal of Computers, Mechanical and Management, vol. 2, no. 3, pp. 31–42, 2023.

M. Kocaleva, D. Stojanov, I. Stojanovic, and Z. Zdravev, “Pattern recognition and natural language processing: State of the art,” Tem Journal, vol. 5, no. 2, pp. 236–240, 2016.

W. Nam and B. Jang, “A survey on multimodal bidirectional machine learning translation of image and natural language processing,” Expert Systems with Applications, p. 121168, 2023.

K. M. N. Win, Z. Z. Hnin, Y. M. K. K. Thaw, et al., “Review and perspectives of natural language processing for speech recognition,” International Journal Of All Research Writings, vol. 1, no. 10, pp. 112–115, 2020.

L. Rajput and S. Gupta, “Sentiment analysis using latent dirichlet allocation for aspect term extraction,” Journal of Com- puters, Mechanical and Management, vol. 1, no. 2, pp. 30–35, 2022.

J. Kaur, P. Verma, and S. Bajoria, “Sashakt: A job portal for women using text extraction and text summarization,” Journal of Computers, Mechanical and Management, vol. 1, no. 2, pp. 22–29, 2022.

S. S. Priya, P. Rachana, and D. Chellani, “Augmented reality and speech control from automobile showcasing,” in 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1703–1708, IEEE, 2022.

M. Yan, P. Castro, P. Cheng, and V. Ishakian, “Building a chatbot with serverless computing,” in Proceedings of the 1st International Workshop on Mashups of Things and APIs, pp. 1–4, 2016.

M. Javed and L. Xudong, “Sos intelligent emergency rescue system: Tap once to trigger voice input,” in Proceedings of the 2020 4th International Conference on Computer Science and Artificial Intelligence, pp. 187–193, 2020.

L. Qiu and I. Benbasat, “Online consumer trust and live help interfaces: The effects of text-to-speech voice and three- dimensional avatars,” International journal of human-computer interaction, vol. 19, no. 1, pp. 75–94, 2005.

C. K. Mishra, “Digital marketing: Scope opportunities and challenges,” Promotion and Marketing Communications, p. 115, 2020.

R. Khan, P. K. Sharma, S. Raj, S. K. Verma, and S. Katiyar, “Voice based e-mail system using artificial intelligence,”International Journal of Engineering and Advanced Technology (IJEAT), vol. 9, no. 3, 2020.

A. J. Cerminara, “Stranger danger: The perils of cold-contact emailing to market nonfiction books,” 2015.

P. Sivakumar, R. Vedachalam, V. Kannusamy, A. Odayappan, R. Venkatesh, P. Dhoble, F. Moutappa, and S. Narayana, “Barriers in utilisation of low vision assistive products,” Eye, vol. 34, no. 2, pp. 344–351, 2020.

Y. D. Sapkota, S. Marmamula, and T. Das, “Population-based eye disease studies,” in South-East Asia Eye Health: Systems, Practices, and Challenges, pp. 109–121, Springer, 2021.

H. Bhuiyan, A. Ashiquzzaman, T. I. Juthi, S. Biswas, and J. Ara, “A survey of existing e-mail spam filtering methods considering machine learning techniques,” Global Journal of Computer Science and Technology, vol. 18, no. 2, pp. 20– 29, 2018.

L. Manovich, Software takes command. Bloomsbury Academic, 2013.

H. Petrie, C. Harrison, and S. Dev, “Describing images on the web: a survey of current practice and prospects for the future,” Proceedings of Human Computer Interaction International (HCII), vol. 71, no. 2, 2005.

U. Sarwar and E. Eika, “Towards more efficient screen reader web access with automatic summary generation and text tagging,” in Computers Helping People with Special Needs: 17th International Conference, ICCHP 2020, Lecco, Italy, September 9–11, 2020, Proceedings, Part I 17, pp. 303–313, Springer, 2020.

V. Sorge, C. Chen, T. Raman, and D. Tseng, “Towards making mathematics a first class citizen in general screen readers,” in Proceedings of the 11th web for all conference, pp. 1–10, 2014.

S. Sandhya and K. S. Devi, “Accessibility evaluation of websites using screen reader,” in 2011 7th International Conference on Next Generation Web Services Practices, pp. 338–341, IEEE, 2011.

K. Williams, T. Clarke, S. Gardiner, J. Zimmerman, and A. Tomasic, “Find and seek: Assessing the impact of table navigation on information look-up with a screen reader,” ACM Transactions on Accessible Computing (TACCESS), vol. 12, no. 3, pp. 1–23, 2019.

S. C. Baker, “Making it work for everyone: Html5 and css level 3 for responsive, accessible design on your library’s web site,” Journal of Library & Information Services in Distance Learning, vol. 8, no. 3-4, pp. 118–136, 2014.

R. Larsen, Mastering SVG: Ace web animations, visualizations, and vector graphics with HTML, CSS, and JavaScript. Packt Publishing Ltd, 2018.

D. Freitas and G. Kouroupetroglou, “Speech technologies for blind and low vision persons,” Technology and Disability, vol. 20, no. 2, pp. 135–156, 2008.

M. C. Domingo, “An overview of the internet of things for people with disabilities,” journal of Network and Computer Applications, vol. 35, no. 2, pp. 584–596, 2012.

M. Klasson, C. Zhang, and H. Kjellström, “A hierarchical grocery store image dataset with visual and semantic labels,” in2019 IEEE winter conference on applications of computer vision (WACV), pp. 491–500, IEEE, 2019.

V. V. Riabov, “Smtp (simple mail transfer protocol),” River College, 2005.

J. Postel, “Simple mail transfer protocol,” tech. rep., 1982.

J. Rhoton, Programmer’s guide to internet mail: SMTP, POP, IMAP, and LDAP. Digital Press, 1999.

A. Mühle, A. Grüner, T. Gayvoronskaya, and C. Meinel, “A survey on essential components of a self-sovereign identity,”Computer Science Review, vol. 30, pp. 80–86, 2018.

A. Sadeghi-Nasab and V. Rafe, “A comprehensive review of the security flaws of hashing algorithms,” Journal of Computer Virology and Hacking Techniques, vol. 19, no. 2, pp. 287–302, 2023.

R. Biddle, S. Chiasson, and P. C. Van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Computing Surveys (CSUR), vol. 44, no. 4, pp. 1–41, 2012.

P. Gupta and S. Kumar, “A comparative analysis of sha and md5 algorithm,” architecture, vol. 1, no. 5, 2014

Downloads

Published

30-09-2023

How to Cite

[1]
R. Agnihotri and J. Kaur, “Enhancing Email Accessibility for Visually Impaired Individuals: A Voice-based Email System using Artificial Intelligence”, J. Comput. Mech. Manag, vol. 2, no. 4, pp. 01–08, Sep. 2023.

Issue

Section

Original Articles

Categories

Received 2023-07-12
Accepted 2023-07-20
Published 2023-09-30

Most read articles by the same author(s)