Speech Recognition Intelligence System for Desktop voice Assistant by using AI &IoT

Authors

  • Hariom Tyagi, Vinish Kumar, Mohammad Danish, Gunjan Agarwal, Prateek Mishra

Keywords:

SRIS, DVA, AI, IoT

Abstract

This paper deals the Speech Recognition Intelligence System for Desktop voice Assistant by using AI &IoT, with statistical testing of hypothesis. In the modern era of reckless technology, we are able to carry out tasks that we never could have imagined we would be able to prepare for. However, in order to carry out these daydreams, we need a method that makes it simple for us to automate the things we do every day. As a result, we created applications like Voice Assistant that can communicate with us solely through human interaction. A voice assistant can be used by a number of applications, including AI and IoT. It has the ability to alter how users and machines communicate. By using voice commands, the user can access all of the features of this application, which has been designed to work with mobile phones.The primary difficulties and drawbacks of various voice assistants will be discussed in this paper. In this paper, we talk about how to make a voice-based assistant that doesn't need cloud services, which would help these devices, grow in the future.

Downloads

Download data is not yet available.

Author Biography

Hariom Tyagi, Vinish Kumar, Mohammad Danish, Gunjan Agarwal, Prateek Mishra

Hariom Tyagi1, VinishKumar2, Mohammad Danish3Gunjan Agarwal4, Prateek Mishra5

1Galgotias College of Engineering & Technology, Greater Noida   hariom2678@gmail.com

2,4Rajkumar Goel Institute of Technology, Ghaziabadvinishk18@gmail.com,

gunjanagarwalcs@gmail.com

3Echelon Institute of Technology, Faridabad mohammaddanish@eitfaridabad.co.in

5Asia Pacific Institute of Information Technology SD India Panipat prateekmishra@apiit.edu.in

References

Jurafsky,D.,&Martin,J.H.(2009).Chapter13:Syntactic Parsing. Speech and Language Processing:AnIntroductiontoNaturalLanguageProcessing.ComputationalLinguistics,andSpeechRecognition(2nd ed.). Pearson–PrenticeHall.

Sen,S.,Dutta,A.,&Dey,N.(2019).SpeechProcessingandRecognitionSystem.InAudioProcessingandSpeechRecognition(pp.13-43).Springer,Singapore.

Tomokiyo,L.M.(2001).Recognizingnon-nativespeech:characterizingandadaptingtonon-nativeusage in LVCSR. Unpublished doctoral dissertation,CarnegieMellonUniversity,Pittsburgh,PA.

Khashabi,D.(2019).Reasoning-DrivenQuestion-Answering for Natural Language Understanding. arXivpreprintarXiv:1908.04926.

Santhanam,S.,&Shaikh,S.(2019).ASurveyofNatural Language Generation Techniques with a FocusonDialogueSystems-Past,PresentandFutureDirections. arXiv preprintarXiv:1906.00500.

DanielJurafsky andJamesH.Martin-Speechandlanguageprocessing,3rdeditiondraft, 2018.

Srivastava S., Prakash S. (2020) Security Enhancement of IoT Based Smart Home Using Hybrid Technique. In: Bhattacharjee A., Borgohain S., Soni B., Verma G., GaoXZ. (eds) Machine Learning, Image Processing, Network Security and Data Sciences. MIND 2020. Communications in Computer and Information Science, vol 1241. Springer, Singapore. https://doi.org/10.1007/978-981-15-6318-8_44

S. Srivastava and S. Prakash, "An Analysis of Various IoT Security Techniques: A Review," 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2020, pp. 355- 362, doi: 10.1109/ICRITO48877.2020.9198027

SaijshreeSrivastava, Surya Vikram Singh, RudrendraBahadur Singh, Himanshu Kumar Shukla,” Digital Transformation of Healthcare: A blockchain study” International Journal of Innovative Science, Engineering & Technology, Vol. 8 Issue 5, May 2021.

V.Radha and C. Vimala, “A review on speech recognition challenges and approaches,” doaj. org, vol. 2, no. 1, pp. 1–7, 2012.

M. Bapat, H. Gune, and P. Bhattacharyya, “A paradigm-based finite state morphological analyzer for marathi,” in Proceedings of the 1st Workshop on South and Southeast Asian Natural Language Processing (WSSANLP), pp. 26–34, 2010.

AdityaSinha, GargiGarg, GouravRajwani, ShimonaTayal, “Intelligent Personal Assistant”. International, Journal of Informative & Futuristic Research, Volune. 4, Issue 8, April 2017.

Emad S. Othman .”Voice Controlled Personal Assistant Using Raspberry Pi”. International Journal of Scientific and Engineering Research Volume 8, Issue 11, November-2017.

Kumar, V. and Kumar, R., 2015. An adaptive approach for detection of blackhole attack in mobile ad hoc network. Procedia Computer Science, 48, pp.472-479.

Kumar, V. and Kumar, R., 2015, April. Detection of phishing attack using visual cryptography in ad hoc network. In 2015 International Conference on Communications and Signal Processing (ICCSP) (pp. 1021-1025). IEEE.

Kumar, V. and Kumar, R., 2015. An optimal authentication protocol using certificateless ID-based signature in MANET. In Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings 3 (pp. 110-121). Springer International Publishing.

Kumar, Vimal, and Rakesh Kumar. "A cooperative black hole node detection and mitigation approach for MANETs." In Innovative Security Solutions for Information Technology and Communications: 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers 8, pp. 171-183. Springer International Publishing, 2015.

Kumar, V., Shankar, M., Tripathi, A.M., Yadav, V., Rai, A.K., Khan, U. and Rahul, M., 2022. Prevention of Blackhole Attack in MANET using Certificateless Signature Scheme. Journal of Scientific & Industrial Research, 81(10), pp.1061-1072.

Pentyala, S., Liu, M., & Dreyer, M. (2019). Multi-task networks with universe, group, and task feature learning. arXiv preprint arXiv:1907.01791.

Srivastava, Swapnita, and P. K. Singh. "Proof of Optimality based on Greedy Algorithm for Offline Cache Replacement Algorithm." International Journal of Next-Generation Computing 13.3 (2022).

Smiti, Puja, Swapnita Srivastava, and Nitin Rakesh. "Video and audio streaming issues in multimedia application." 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2018.

Srivastava, Swapnita, and P. K. Singh. "HCIP: Hybrid Short Long History Table-based Cache Instruction Prefetcher." International Journal of Next-Generation Computing 13.3 (2022).

Srivastava, Swapnita, and Shilpi Sharma. "Analysis of cyber related issues by implementing data mining Algorithm." 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2019.

P Mall and P. Singh, “Credence-Net: a semi-supervised deep learning approach for medical images,” Int. J. Nanotechnol., vol. 20, 2022.

Narayan, Vipul, et al. "Deep Learning Approaches for Human Gait Recognition: A Review." 2023 International Conference on Artificial Intelligence and Smart Communication (AISC). IEEE, 2023.

Narayan, Vipul, et al. "FuzzyNet: Medical Image Classification based on GLCM Texture Feature." 2023 International Conference on Artificial Intelligence and Smart Communication (AISC). IEEE, 2023.

"Keyboard invariant biometric authentication." 2018 4th International Conference on Computational Intelligence & Communication Technology (CICT). IEEE, 2018.

Mall, Pawan Kumar, et al. "Early Warning Signs Of Parkinson’s Disease Prediction Using Machine Learning Technique." Journal of Pharmaceutical Negative Results (2023): 2607-2615.

Pentyala, S., Liu, M., & Dreyer, M. (2019). Multi-task networks with universe, group, and task feature learning. arXiv preprint arXiv:1907.01791.

Choudhary, Shubham, et al. "Fuzzy approach-based stable energy-efficient AODV routing protocol in mobile ad hoc networks." Software Defined Networking for Ad Hoc Networks. Cham: Springer International Publishing, 2022. 125-139.

Voice Modification Module

Downloads

Published

16.04.2023

How to Cite

Hariom Tyagi, Vinish Kumar, Mohammad Danish, Gunjan Agarwal, Prateek Mishra. (2023). Speech Recognition Intelligence System for Desktop voice Assistant by using AI &IoT. International Journal of Intelligent Systems and Applications in Engineering, 11(5s), 266 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2774