Efficient Voice Integrated Browser Using Naïve Approach
2013-06-03 16:16:44 来源: 评论:0 点击:
Abstract— The World Wide Web contains huge information from all over world. It has information about simple things as well as very complex things. This makes it very useful for everyone. Nevertheless this enormous useful information is always accessible through browser which requires use of mouse and keyboard. Hence, it does always remain unreachable to specific community of people, especially to the people with visual impairment. The concept of voice browser is not new, however in this paper we have used naïve approach to make this efficient Voice Integrated Browser (VIB). All existing voice browsers need VoiceXML page. The conversion of existing web pages to VoiceXML pages is very tedious task and it requires extra effort. In this paper we have explained that how VIB doesn’t need VoiceXML pages. We elucidate this naïve approach and challenges faced while evolving it and eventually discussed about the future work.
Index Terms— Voice Browser, VoiceEnable, VIB
Cite: Karunakar Batta and Vinay Krishna , "Efficient Voice Integrated Browser Using Naïve Approach," Lecture Notes on Information Theory, Vol.1, No.3, pp. 124-127, Sept. 2013. doi: 10.12720/lnit.1.3.124-127
Index Terms— Voice Browser, VoiceEnable, VIB
Cite: Karunakar Batta and Vinay Krishna , "Efficient Voice Integrated Browser Using Naïve Approach," Lecture Notes on Information Theory, Vol.1, No.3, pp. 124-127, Sept. 2013. doi: 10.12720/lnit.1.3.124-127
Array
相关热词搜索:
上一篇:Information Security Requirement: The Relationship between Information Asset Integrity and Availability for ICT Outsourcing
下一篇:A Model-checking Algorithm for Formal-verification of Peer-to-peer Fault-tolerant Networks
分享到:
收藏
评论排行
频道总排行
频道本月排行
- 366Efficient Voice Integrated Browser Using Naïve Approach
- 2A Proactive Complex Event Proc...
- 14 Bit Comparator Design Based on Reversible Logic Gates
- 1Design Consideration for Config...
- 1A Comparative Analysis for WLM...
- 1A Hybrid Mutation-based Artific...
- 1A Device Management and Credit...
- 1Design and Development of a H...
- 1Information Security Requirement...
- 1A Model-checking Algorithm for...