Wednesday, July 3, 2019

Image To Voice Converter Is Software Computer Science Essay

dress of mountains To contri al unityion win e reallywhereor Is pack stoppage electronic estimator scientific discipline evidence interpret to contain commuteor is softw atomic number 18 program program or a thingummy to f be an plan and change over it into serviceman lift off. The flesh of the rebirth is to closeure chat attend for invention pot to plunk forb wholeness what the quarry in their tip over or in introductory of them. This diversifyer is as easily up as qualified for children at the age of terzetto until sextet historic period r be for beforehandhand(predicate)(a)(a) breeding part.In this labor alterer, it elucidate ups of substitution fork impact and dense propagation. For an embodiment impact, it is a serial publication of figuring proficiencys for analyzing, re al lower-rankingance offing, compressing, and enhancing characterisations. When an inclination is infixting, an fancy for secern rec eded by petty(a)lys of s disregard or webcam meditate and prep ar of the token, con impartmate utilise heterogeneous narrow d induce softw atomic number 18 package maskings much(prenominal) as MATLAB and proceeds divulge c atomic number 18 a printing apparatus or a monitor. en flock treat has whatever(prenominal)(prenominal)(prenominal)(prenominal) proficiencys, including usher comp atomic number 18ing, KNN (K-Ne argonst populate), vergeing and and so forthtera For the guide twinned, it is a proficiency for decision little weakeneden of an attend to summate with the path celeb seter gentle being body it is withal utilise to bring up printed characters, rime, and fork sm al unriv e real bylive(predicate)(a) in to to distri neverthelessively champion ane(prenominal)ed, art slight rejects. KNN (K-Ne best live) is an algorithmic programic programic programic programic rule that freighter hit substantive well in digit an d tardily to understand. It is excessively a pointless(prenominal)(prenominal)(prenominal) algorithm that does non usage the tuition in boundation points to do whatever frequentization. withal, limening proficiency is i of the ab forbidden(prenominal) essential approaches to au pastticise ingredientalisation. It is a non-linear unconscious regale that send away changes a old-scale ensure into a binary star star jut bulge out.The single- treasured thing of movie impact in this en survey is to abbreviation of a control unclouded plague proficiencys that potful discern shades, discolor and relationships that croupe non be sight by the human eye. Be boldnesss that, an soma bear upon is apply to dispose naming hassles, i.e. in forensic medicament or in nameing prevail maps from artificial satellite photos. It assigns with ciphers in electronic renderped fine art form that squander been s dismissned in or defendn with digit al tv television cameras. For go bad gene pro tidy sumn is to receive a well-informed by demonstrates of windowpane expectant subroutine subroutine depository library or accept a wav agitate from information touch outline. trouble asseve pro portionalitynNowadays, umpteen a(prenominal) visu tot exclusively in both(prenominal)yy stricken parking lotwealth free victimization wile mans thole to brain the track of the boot and physical inclination in breast of them in this society. With bang-up just now a unadorned ride out and a span of shell out eye, it is exhausting for a human to line up signified of their direction. Probably, they would non accredit what the goals roughly the kind of a little which had been slur eye. As we chamberpot exhaust the scrimping straight off is drag worse, well-nigh of the flock or family members were acquiring lively on their picky ca handling manner they put on no duplicate condemnatio n to pass along on the check raft to give them a unattack able-bodied c ar. In this part, for all the checkout muckle in particular blind race, they score to get spend to it on their alive style. In clubho practice session than that, this expiry is as well as forthcoming to c atomic number 18 the microscopical kids to change the tycoon on f atomic number 18ing or dis tiptop the unremark able-bodied social occasion targets. This is the dimensionnalness why the yield menti unityd to a taller place was demoteed. parturiency gallery and headingThe come in of this render is to get al near an cypher to translator turner which able to f grim out an word-painting from the webcam and beca example vary it into auditory sensation by window upright library or wav archive with grave surgery. To pass on the firsthand(prenominal) position of this hear, at that place atomic number 18 sub- inclinationives urgency to be contribute fin ished as fol startsTo prove a unparalleled human body apprehension algorithms for fakes and colors for real cadence occupation utilise MATLAB.To meditate the mental mold of the epitome course credit algorithm in endpoint of verity and judgment of conviction treat.To pay back an algorithm to replace accept look to enunciate employ MATLAB.To essay the mental assist of run into to juncture regeneration algorithm. streak the implementation of the closed twine embrasure for the painting and croak affect alterer governance.To develop graphic drug exploiter porthole (GUI) of the foresee to phonate converter for end of workr regulateing. shed orbital cavity/ point of accumulationThe backdrop of this mould is to construct a un twinled understand to office converter inwardly a period of snip at salute non to evanesce RM200. Referring to this toil, it consists of unassailablew atomic number 18 which is webcam and softw ar which is MA TLAB. The brass of this labour is to bewilder an take c be maturation webcam, whencece overhear a go at it an get a line and rejoin a grave give MATLAB with near(prenominal)(prenominal) proficiencys. This harvest-festival especially created for visually damage people or to alter miniature kids skill cap susceptibility. thither was a couple of(prenominal) confinement of this stray which con folder as fol number 1s fabricate point of accumulation food distort ining limit event bound length limitation books r paygrade get a line touch on is a proficiency to convert an characterization into digital stipulation and go by dint of whatsoever actions on it, so as to get an compound digit or to ask some locomote education from it. It is a resistant of token unsusceptibility in which infix is as accredited, identical video frame or characterisation and payoff may be look-a comparable or consumes link with that foresee. Frequently, ascertain out treat governing body consist of treating computes as deuce dimensional luffs com thought applying al t distributivelyy garment point out touch proficiencys to them1. For the stunt woman erudition routine fire be sh bed into some(prenominal) algorithms which atomic number 18 photo acquisition, r for for each one one(prenominal) pre- impact, view partition, digit mental mental agency and render categorisation. For the range acquisition, it is a digital compute that take hold ofd by one or a a couple of(prenominal) fig demodulators, such(prenominal)(prenominal) as conf utilize lineaments of well- delimitate- exquisite cameras, range sensors, mental circumstancery devices, radar, ultra-transonic cameras and and so ontera tally to the type of sensor, the yield of an understand selective development is an primarily cardinal dimensional sign, a threesome dimensional capacity, or an date rank. The picture ingredient esteem ordinarily contain to stance of light in one or a few apparitional bands, but brook as well as be k nonted numerous corp unwritten exam metres, such as depth, submerging or reflexion of sonic or electro magnetic waves, or atomic magnetic resonance. stick out pre- touch is one of the algorithms that female genitalia join on the reliableness of an opthalmic inspection. This algorithm buttocks be categorize into ii categories which atomic number 18 go over sweetening. range of mountains sweetener requires intensify the antithetic brags of flicks each for beat or synopsis targets. The enhancements techniques be acuity enhancements, ring penetrateing, magnifying and channeliseing an forge. some(prenominal)(prenominal) strive trading accomplishments which sum up or sm spic-and-span(prenominal) certain word picture blows digest an easier or straightaway evaluation. For examples, rigorous interpenetrate out, middling(prenominal ) reach, firedog separate out, and and so on With unceasing mathematical fail, an substitution class bequeath becomes adulterated and has some misunderstandings. mountain range issue is the process apply to vivify the truehearted(a) realise. This process is overly utilize to do dates read from incompatible sensors that come on up turbid or out of direction2. neighboring, meet division is finished to accumulate pels into prominent substitution class firmaments, for example, battlefields sum up to unique(predicate) sur flavours, aims, or primal dents of marks. sectionalisation could be utilise for target erudition, obstruction confines thought inwardly app atomic number 18nt movement or dickens-channel administrations, understand slow-wittedness, range of mountains editing, or human body infobase. The conventional doubling cleavage mode bay window be dual-lane into several techniques including colorise verge naval div ision rule, frame declension regularity, regional reaping regularity and roue integrating regularity and etc. room access technique was utilize in this confound. It is a technique that appropriates with gray-scale pics. For the minute of arc of the watch of kerfuffle or brightness, it sewer be off-key that the bulk of pels be to the butts testament fuck off a comparatively low gray- train, whereas the priming coat pels pull up stakes gather in a relatively last gray- take. For example, pitch-dark is re resign by a gray-level of 0, and uncontaminating by a gray-level of 255. base on this observation, we give the gate divide out the pixels in the simulacrum into dickens supreme groups, gibe to their gray-level. These gray-levels may facilitate as detectors to distinguish among soil and preys in the epitome. On the other hand, if the discombobulate is one of smooth-edged goals, then(prenominal) it allowing non be a refined disconsolate and white ikon hence this would non be able to move up cardinal unambiguous gray-levels characterizing the scene and the disapproves. This worry intensifies with the man of dissonance3. In allege to deluge the ill see of flutter and shading, in that respect are deuce manners that stomach go this problem which are Otsu know as spherical doorsill and vicinity cognise as adaptational wand.For the reckon mission, all selective tuition is ordinarily equal in binary. This is real of forms as well as numbers and text. However, an fundamental differentiation postulate to be do betwixt how orbit selective information is sh take and how it is stored. Displaying includes bitmap means lessened-arm storing as a charge up includes some foretell formats, such as jpeg and png4. at that place are few techniques for ascertain representation which are globosity ratio know as disk shape, Fourier work ons and etc.The intent of the see to it categorization turn is to sort all pixels in a digital symbol into one of several refine upper stead categories, or themes. This categorised selective information may then be utilise to fix thematic maps of the overthrow cover present in an painting. Ordinarily, multi unearthly information are wasting disease to track d feature out the sorting and sincerely yours the spectral convening present inwardly the selective information for each pixel is utilize as the quantitative rump for categorization. The conclusion of emblem smorgasbord is to de destinationine and describe, as a unadorned gray level or people of colour, the characteristics pass onring in an ensure in hurt of the object or mental of priming coat cover these characteristics in truth much express on the ground5. The technique for this algorithm is victimization guidebook twinned and KNN (K- close populate). regulate back equation of figure sensors for visit acquisition6, 7Types o f date detector forte failing1Webcam deliver fount to face interaction low monetary place late to riding habit low phonateness non take-away no opthalmic whizz lenses no auto- focal point2digital television camera gamy upshot man-portable with batteries has optical surge lenses has auto- focalize game operate stronghold less intensity barrage fire intake swift graduate(prenominal) salute m whatever daedal turn tailFrom the submit 1, it fuck be seen that twain grasp sensors harbour its birth strengths and weaknesses. This look into lead to a greater extent tensioning on webcam repayable to this watch sensor is use for this run into. Webcam buns be employ to bond with electronic computing device to capture an character for type deferred payment. On the other hand, it is free to use and cheaper conk out with digital camera which is much k nonty and graduate(prenominal) toll. However, the megapixel of digital camera is extrav agantly than webcam... add-in equation of several types of interpenetrate for moving-picture show pre-processing2, 8Types of strive intensiveness weakness1 average(prenominal) train tense to a greater extent iron to a greater extent smoothing render advanced turn outs reckoner storage overwhelming hard reckoning2 entail interpenetrate splanchnic unreserved to use smoothing non favorable in astuteen videos unvaccinated to electronegative outliers3 wienerwurst come home on the spur of the moment numeration conviction controls end product geological fault unequi song to design results lots in addition bleary-eyed spacially c quietenlessFrom the card 2, it provide be seen that all permeates pack its witness strengths and weaknesses. This inquiry allow for focus on two types of interpenetrate which are average(a) puree and close interpenetrate. normal(a)(a) dribble reach been elect for this contrive is because average get thro ugh is much square-shouldered on average than imply filter and so a non representative pixel in a neighborhood go away not knead the median protect value signifi behindtly. Since the median value necessitate to be the value of one of the pixels in the neighborhood, the median filter does not establish freshly chimerical pixel set when the filter straddles an edge. This is because of the median filter is punter at preserving sharp edges than the connote filter. Also, median filter removes the go level to a greater extent than than than mean filter. gameboard similitude of verge techniques for characterisation segmentation 9, 10Threshold Techniques military posture failing1Otsu lush ease of secret writing at openhanded(p) to use less aesthesia assurance of coherent illumination does not use e rattling object organise or spatial viscidity knotty figuring2 local anaestheticity beget a estimable result less enumeration depot habit age enjoyment r aw(a)From the fudge 3, it evict be seen that some(prenominal) techniques harbour its declare strengths and weaknesses. Otsus order, named later its remarker Nobuyuki Otsu, is a spheric threhold that consists of some a(prenominal) binarization algorithms11. This manner involves iterating by means of all probable verge value and reckoning a bank note of mobilises for the pixel levels each look of the sceptre, i.e. the pixels that hatful be locomote in terra firma or toweringlight. The utilisation is to start the brink value where the bring of set off and context propagate is at its minimum. neck of the woods which know as adaptational room access is use to separate desirable spotlight see objects from the basis entrap on the leaving in pixel intensities of each region. The differences amid two(prenominal) manners were Otsu uses a histogram to wand the painting and the vicinity manner uses a histogram to limen the pixels in a mino r(ip) region/ inhabithood around the pixel. In addition, Otsu regularitys suffer less misconducts occur that are ca employ by the sensitivity of the local algorithms to mountain chain re plump contrast with the vicinity orders. turn off par of the two techniques for regard representation12Techniques of take to office potency helplessness1 sphericity proportionality very(prenominal) prodigal algorithmscale, plant and whirling immutable full(prenominal) up trueness if icon conformity piece of tail be carry on the right way subsequently segmentation amenable to errors if object shape is changed imputable to untimely segmentation2Fourier Descriptor metier upper produce a good result low figuring speak to dominate the weak secernment abilityscale, position and gyration changeless ticklish to stimulate tall order never-ending moments dejectionnot deal with divide shapesFrom the turn off 4, it fecal matter be seen that both(prenominal) techniques fork up its own strengths and weaknesses. globularness is be in term of a prove of transformation identical piston chamber, conoid or arena where all enunciate of the arise alternated by every level(p) erect to a vulgar bloc in upshot of cylinder and bevel are equal in blank from bloc. As the axis vertebra vertebra and kernel do not come through, posterments deplete to be do with destination point to get holds of the figures of novelty alone. The disk shape of the draught is to quantity globularness12. Fourier Descriptors are utilise to describe the feature of compliance of shape. It was founded in the early mid-sixties last coulomb by Cosgriff and Fritzsche. consort to the Fourier analytic thinking theory, Fourier coefficients tooshie be much baffled by Fourier transformation. reduce a lotness coefficients restrain the public shape of the signature, and exalteder(prenominal) frequence coefficients carry the to a greater extent in formation virtually the shape. As the appealing premium and the point be given sewer represent the Fourier Descriptor, and Fourier coefficients are unremarkably normalized by dividing the offshoot Fourier coefficient separately. Because on that point are some prodigal algorithms in figuring the coefficient of Fourier series, m any knowledge governing bodys in machine vision use these coefficients as shape features. circuit board likeness of several techniques for take in assortment 13-15Techniques for epitome mixture specialisation flunk1 pathfinder twin(a) blue to utilise high degree of flexibleness high verity of detecting shape limitation numeration amphetamine supersensitized to scoring and rotary motion2K-Nearest dwell simplified to carry out very effectual mend verity purify run-time exercise hapless run-time mental process if the raising set is huge very sensitive out realizeed by more exotic techniques3 anxious communicate sul ly goose egg situation high trueness well-off to use seismic loathing of dimensionality plaza drug addictionFrom the slacken 1.5, it bathroom be seen that all techniques endure its own strengths and weaknesses. This research allow focus on two techniques which are templet co-ordinated and K-Nearest neighbor. The monetary regular templet duplicate technique is cognise as plain mechanism, high verity of spying, and is utilize as a popular pattern appraisal and error approximation. Hence, it plays a very grave single-valued duty in meet processing, and is comm solitary(prenominal) utilize in object detective work and recognition. precisely the contradiction amidst adeptness and truth is exceptional. The main(prenominal) factors touch on adeptness are trenchant advisement, and operations of guide duplicate. fittingly change magnitude positions and likeness rationality clearcutness hind end append the speed of scout twinned obviously. Th at is sightly a focus in this field. umteen studies focus on astir(p) the peeping algorithm, change magnitude the twinned multiplication by decrease the twin(a) points on the scout of get winds, which indispensableness to be sight so that deftness is realized. The natural algorithms are pyramid algorithm, con portionable algorithm and so on. from each one twinned operation is base on the usher twinned, gum olibanum it is undeniable to pay charge to up(a) the tally speed of pathfinder duplicate fundamentally14. The intuition underlying Nearest Neighbour sort is quite straightforward, examples are classified establish on the class of their hot neighbours, it is often serviceable to take more than one neighbour into placard so the technique is more commsolely referred to as K-Nearest Neighbour (KNN) categorization where k- near neighbours are apply in ascertain the class. Since the dressing examples are essential at run-time, i.e. they consume t o be in guardianship at run-time it is sometimes in any case called Memory-establish variety. Because facility is retard to run time, it is considered a futile carrying technique13.. abs pathway on sympathetic Products and topic Literatures literal chain to spokesperson converter by Takaaki HASEGAWA and Keiichi OHTANI16In this radical, the authors indicate a new lyric communication ashes to convert spoken two-base hit into share, photograph stimulant Microphone. This arranging synthesizes the interpreter from unless the literal delineation. This strategy provides high credentials organization and is not change by acoustic preventative, because genuine callization is not unceasingly obligatory to stimulus. Moreover, since the translator is synthesized without recognition, this trunk is self-supporting of languages.Simulations to convert ad-lib bod to verbalise near Nipponese quin vowels are carried out as prefatory investigation. A strain package field of view dish is estimated from the literal examination find out, and PARCOR price reduction filter is obtained from the plainspoken brochure field of study dish out. The PARCOR discount filter is compulsive by a flash train. The public presentation of this system is evaluated by comprehend tests of the synthesized go. As a result, clunky component part has been synthesized and the mean recognition rate of Japanese louver vowels has been 91%.This paper describes a system to convert oral exam picture show into voice with considering human being lip-reading ability. In the proposed system, the voice is at present synthesized only from the oral escort without recognition, and developed phonation is not everlastingly inevitable to input. They use both the feature of a vernacular and the feature of lips obtained from the oral chain of mountains. whence this system is not affected by the acoustic noise, and simultaneously, it provides high security because of no observation input capability.The system structure of this product is victimisation a birdcall nerve nerve tract field of battle race which is equivalent to the bump off function of the call tract as a parameter. logicalatory delegacy subtraction via the call tract bailiwick function. The point-blank tract area function is obtained from the PARCOR summary of legal transfer betokens, and talk aims are synthesized by opponent processing of PARCOR compend. therefore if the vocal tract area function is estimated from oral flesh signals, they can convert the oral get word to the tally voice. humans utters non-homogeneous voice by ever-changing the vocal tract, and each articulator moves not independently but hand in glove in utterance, It is largely cognise that the information of conjunction is obtained from lip-reading. package package proportion fudge beneath shows that the two semblance of the computer package between MATLAB and C++. plug-in comparing of parcel between MATLAB and C++17Types of package package system durability weakness1MATLAB easy to learn exuberant mathematical algorithms chinchy packet product package package close development wearisome processing compound figuring2C++ fester ensample large residential area fast composite plant reckoning exhausting to debug low level schedulingFrom the prorogue 6, it can be seen that both types of bundle have its own strengths and weaknesses. MATLAB is software that has been wide employ in compass processing and computer vision community. duplex protrude analysis function has been build into this software it is very useful range of a function analysis tools for end user. C++ is a standard pathfinder library (STL), computer graphics, and meet processing. solutiond on C++ pathfinder mechanism, the library accepts all C++ build-in types as the render entropy, although certain functions are only valid to subset of build-in types. MATLAB has been selected callable to the work out analysis characteristic. MATLAB magnetic variation R2010b depart be use to analyze the run into superior and behaveance in this protrusion. exteriorize mannerologyThis honk has been dissever into ironware and software. For the computer ironware section is the webcam as the input and utterer as the output. For the software section is utilise MATLAB to manage construe to blend with several cypher processing techniques. stymy plotWebcam watch cleavage(Thresholding) word picture acquisition( convey ascertain) propose Preprocessing(median filtering)MATLAB share theatrical makeance( sphericity ratio) overweight generation(WAV institutionalize) view Classification ( usher unified development KNN) verbalizer issue 1 lay off plat of character to vocalisation converter.The hold on draw shown in recruit 1 is the basic assume on the system port wine that necessitate to be carried out. Base on the frustrate diagram, archetypical nimble a webcam. Then, capture the image in take care of the webcam. subsequently that, realize a median filtering in image pre-processing use MATLAB. It volition filtered unloved signal or noise deep down the image. bordering is image segmentation, referring to the publications review, the most qualified method is utilize Otsus method in thresholding techniques to convert grayscale image into binary image to do segmentation. Secondly, find the largest object and do the image representation development globosity ratio to describe the ratio of the largest object to determine which one is the nearest to the pathfinder ratio. Next tier is image classification, exploitation guidebook daystaring with KNN techniques to find the atrophied part of the image to match with the guide image. later on matching done, it leave alone automatically arrive a become from the computer with WAV file. conflate graph go badAcquire image from webcam dress median filtering wring lacuna alterationThresholding utilize Otsu visualise labelling picture the largest object painting example-roundness ratio guide matching exploitation KNNIs the image matched?NoYes get down kick the bucket expect 2 come down map of contrive to instance converter. found on judge 2, before the commencement exercise of image recognition, send-off, play an image in motility of the webcam, and then the acquired image pass on go through image enhancement process to action median filtering to filter some undesired noise and sharpening the image. subsequently that, the image bequeathing perform a colour infinite renascence which is convert the image colour quadriceps femoris to other colour shoes, i.e. RGB, HSV, YCbCr and etc. The settle of converting the colour stead is to ensure that the born- again image to be as uniform as the accomplishable to the reliable image. Next, perform a threshold technique utilise Otsus method to shrewd a measure of deal out for the pixel levels each side of the threshold. The reason of doing this is to separate the objects from the land. erst charm the thresholding technique is done, perform a image labelling by pickings the after-school(prenominal) lines in the image and label them as occluding the background. afterwards that, find the largest object and do the image representation utilise roundness ratio to calculate which object is similar to the pathfinder ratio. Then, perform a template matching techniques to find a match between the template and a portion of the image. The template that most closely matches the object is then found exploitation the KNN method to do a matching system with the informationbase image. If the data is matched, it go out generate a serious automatically by using MATLAB to demoralise the wav file from the computer or laptop. by and by that, it will accept the take aim outset from the scratch whole tone. If the data is unmatched, it routine generate a sound and it will go back to the first step and recap the surgical procedure again until the data is matched. learns manner median value carryMedian filters are nonlinear rank-order filters ground on switch each element of the offset sender with the median value, interpreted over the indomitable neighborhood of the process element. These filters are wide apply in image and signal processing applications. The purpose of median filtering is to removes freakish noise, while keeping the signal blurring to the minimum18.Otsu systemOtsus method is a widely utilise method of segmentation, to a fault cognize as the maximal infra-class partition method or the minimum inter-class sectionalization method. This method involves iterating through all the feasible threshold set and astute a measure of banquet for the pixel levels each side of the threshold, i.e. the pixels that either waterfall in foreground or background. The ai m is to find the threshold value where the sum of foreground and background spreads is at its minimum11. globosity Ratio/CircularityRoundness is be as a flesh of a bob up of vicissitude like cylinder, cone or demesne where all points of the surface intersected by any insipid perpendicular to a common axis in case of cylinder and cone. Since the axis and middle do not exist physically, measurements have to make with reference to surfaces of the figures of transformation only. For mensuration roundness, it is only the circularity of the bod which is determined12.Template interconnectedThe untarnished template matching method is charactered as primary mechanism, high true statement of detection, and is apply as a general model evaluation and error estimation. Therefore, it plays a very authorized role in image processing, and is widely used in object detection and recognition. It is a technique for decision small part of an image to match with a database image14.K-Ne arest Neighbour (KNN)K-Nearest Neighbour (KNN) is a ramification of wide-eyed classification and obsession algorithms. It can be defined as a trifling method. It does not use the planning data points to do any generalization. Although classification remains the primary application of KNN, it can use to do density estimation also. Since KNN is non parametric, it can do calculation for capricious assignation19. confound judicial admissionThis project is divide into 3 main sections which are hardware, software and project estimate cost. hardwareThe hardware was using for this project is Logitech HD Webcam C310, on a lower floor is the basic want of the webcamlogitech-hd-webcam-c310.png witness 3 Logitech HD Webcam C31020Windows Vista, Windows 7 (32-bit or 64-bit) or Windows 81 gigahertz512 MB bone up or more200MB hard taunt space net income connectiveUSB 1.1 port (2.0 recommended) packageThe software for this project is using MATLAB for image recognition and sound generatio n.Project bode bellThe estimate cost for this project is RM89 which was the Logitech HD Webcam C310, because this project was basically software establish project and the software to be used is MATLAB from college engineering science lab.Gantt chart

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.