Solved

Text to speach

Posted on 2000-02-20
8
165 Views
Last Modified: 2010-04-04
is there any FREE component available for text to speach (SAPI) conversion.
0
Comment
Question by:m_adil
8 Comments
 
LVL 1

Expert Comment

by:Fatman121898
ID: 2541566
You mean 'speech', aren't you?
If so, I'm listening...
0
 
LVL 6

Expert Comment

by:Jaymol
ID: 2541645
Listening...
0
 
LVL 10

Accepted Solution

by:
Lischke earned 30 total points
ID: 2541692
Yep, SAPI translation is available from www.delphi-jedi.org (see API Library).

Ciao, Mike
0
 
LVL 1

Author Comment

by:m_adil
ID: 2541986
YES I mean speech. Sorry for typing error
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 1

Author Comment

by:m_adil
ID: 2542175
Mike I'm getting following errors
I'm using Delphi 3

1. Error reading PitchTB.ThumbLength property.

2. Invalid compiler directive {$HPPEMIT '#include <speech.h>'}
0
 
LVL 10

Expert Comment

by:Lischke
ID: 2542528
Oops, didn't know you are still using D3. JEDI has confirmed to support only the latest two versions of Delphi to avoid increasing the already large work too much. Because you get the translation free of charge I'd say it is not expecting too much that you remove unnecessary stuff yourself. The HPPEMIT directive is included so that the unit can be used with BCB too. There are other directives like EXTERNALSYMBOL which you can also ignore.

Ciao, Mike
0
 

Expert Comment

by:PROGRAMMING030999
ID: 2545489
An nice tutorial:
http://www.undu.com/Articles/990120b.html

Mich el
0
 
LVL 1

Author Comment

by:m_adil
ID: 2549200
Thanks Mike!!
its working

Mich el Thanks for the link.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
Concerto provides fully managed cloud services and the expertise to provide an easy and reliable route to the cloud. Our best-in-class solutions help you address the toughest IT challenges, find new efficiencies and deliver the best application expe…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now