Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Assignment-03

Title: Aim: Use of above to identify the object, morphism, overloading in function (if
any), and functional relations and any other dependencies (as per requirements).
Use of divide and conquer strategies to exploit distributed/parallel/concurrent processing of
the above to identify objects, polymorphisms, overloading in functions (if any), and
functional relations and any other dependencies (as per requirements).
System S is defined as collection of following set:
S = {Ip, Op, Ss, Su, A}
Mapping Functions f(x) X Y
F2(Ip1) → Op1 Ip1 Op1
F3(Ip2) → Op2 Ip2 Op2
F4(Op2) → Op3 Op2 Op3
F6(Ip2) → Su Op2 Su

Objects:
1) Input1: Ip1 = {Username, Password}
2) Input2: Ip2= {Audio from user}
3) Input3: Ip3= {Convert speech to text and text to speech}

1) Output1: Op1 = {Login}


2) Output2: Op2 = {Authentication success}
3) Output3: Op3 = {speech to text and text to speech }

Functional Dependency Graph:

F1 F2 F3 DB

F5 F4

F6
1) Function 1 = F1 = Login
2) Function 2 = F2 =Input Data
3) Function 3 = F3 = Convert Speech to Text
4) Function 4 = F4 = NLP
5) Function 5 = F5 = Text to Speech
6) Function 6 = F6 = Show Results

You might also like