0% found this document useful (0 votes)
56 views5 pages

JETIR2003165

Uploaded by

Swathi haveri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views5 pages

JETIR2003165

Uploaded by

Swathi haveri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

© 2020 JETIR March 2020, Volume 7, Issue 3 www.jetir.

org (ISSN-2349-5162)

VIRTUAL ASSISTANT USING


ARTIFICIAL INTELLIGENCE AND

A. Sudhakar Reddy M, Vyshnavi, C. Raju Kumar, and Saumya

Abstract— An intelligent virtual assistant (IVA) or intelligent


personal assistant (IPA) may be a software agent which Another market driver for the electronic assistant is that the
will perform tasks or services for a automobile has become a mobile office, making safety an
private supported commands or questions. Sometimes the term increasingly important issue. Using voice commands instead
"chatbot" is employed to ask virtual assistants generally or of touch-tones is not only a convenience, it is being perceived
specifically accessed by online chat. In some cases, online chat by consumers as a safety necessity. The global market for
programs are exclusively for entertainment purposes. Some unified messaging services is expected to be a considerable
virtual assistants are ready to interpret human speech and share of the telecomm applications. It is estimated that it will
respond via synthesized voices. Users can ask their assistants
be worth several billions by 2007.
questions, control home automation devices and media
playback via voice, and manage other basic tasks like email, to-
do lists, and calendars with verbal commands.

Keywords- VPA, NLP, Speech to text, Text Analyzing,


Artificial Intelligence.

I. INTRODUCTION

G one are the days when humans depended on other


humans for help or services. The digitalization of the world
made sure that humans no need to contact anyone else to seek
help, they could depend on a far more efficient and reliable
device which can take care of their everyday needs. The While indirect revenues for the carriers will be several folds.
computers, mobiles, laptops, etc., became a part of us and our A few companies has started offering converging products in
daily life, It could carry out simple calculations to complex the VPA direction, e.g. Conita, WildFire, VoxSurf,
programs to reduce monotonous work and waste of VoiceGeneie, and VoiceTel, and Mitel Networks, though one
manpower. or two provide solutions for mobile carrier environment.
Virtual Personal Assistant has almost become a basic
necessity in all electronic devices so as to execute the required
problems easily. More than just being a bot , VPA can make
life easier for the user in various ways. Speech recognition is
one of the relatively new integration into the VPA. But,
though its moderately efficient , it is not very helpful and are
not used by the user due to its high amount of error. Though
the error percentage of the upcoming VPAs is around 5
percent, it still is not quite up to the mark to where it becomes
a basic part of the users life. Thus the projects aim is to build a
VPA with speech recognition which has a very minimal error
percentage.

Voice recognition is a complex process using advanced


concepts like neural networks and machine learning. The
auditory input is processed and a neural network with vectors
for each letter and syllable is created. This is called the data In summary, VPA promises to provide hands-free, eyes-free
access to the web anywhere, any time, from any phone.
set
. When a person speaks the device compares it to this vector
and the different syllables are pulled out with which it has the
highest correspondence.

JETIR2003165 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 1


© 2020 JETIR March 2020, Volume 7, Issue 3 www.jetir.org (ISSN-2349-5162)

II. FEATURES OF VPA


A. Tasks
A task is a personal or work-related assignment you want to
track through completion. A task can occur once or repeat (a
recurring task). A recurring task can repeat at regular intervals
or repeat based on the date you mark the task complete. For
example, you might want to send a status report to your
manager on the last Friday of every month, and get a haircut
when one month has passed since your last haircut. Recurring
tasks are added one at a time to the task list. When you mark
one occurrence of the task complete, the next occurrence
appears in the list.

Users can also create Task Requests. A task request enables


the user to assign tasks to the other people, and to receive
task requests from others. When someone assigns a task, that
person gives up ownership of the task (unless the task is
IV. HARDWARE AND SOFTWARE REQUIREMENTS
declined). Anyone who assigns a task can keep an updated
copy in their task list and receive status reports for the task. Hardware:
Associated with task requests is a task list. A list that includes  A phone with a touch screen interface.
the name of the person who originally sent the task request  Phone Ram should be of a minimum 512 MB.
plus the names of everyone who also received the task request,  Internet connectivity.
reassigned the task to someone else, and chose to keep an
updated copy of the task in their task lists. VPA provides VUI  The phone should have USB debugging mode for
to the MS Outlook task manager. development and testing purposes.

B. Internet Applications Software:


The VPA allows personnel to access, customize, and engage  Operating system should be android 4.1/win 8.1/IOS
the internet to help them source information ranging from
6 or higher.
weather, directions and schedules, to stock performance,
competitive data and news. All using simple, conversational  The kernel version should be 3.0.16 or higher.
voice commands, e.g. trip management, airline reservation and  Support of other basic applications like maps,
hotel reservations. calendar, camera, web connection etc.

The convergence of the richness of the internet and the V. EXISTING AND PROPOSED SYSTEM
accessibility and mobility of the phone is now forming a vast
new network - a Voice Web - where Internet content can be Existing Model
accessed from any phone, anywhere, using human voice. A
voice portal can be defined as "speech-enabled access to Web- Most of the existing projects have only used speech
based information." In other words, a voice portal provides recognition using neural networks. Though their systems have
telephone users with a natural-language interface to access and a moderate accuracy, they are not for practical usage nor
retrieve Web content. An Internet browser can provide Web efficient to be of any real use .There are a few rudimentary
access from a computer but not from a telephone. A voice techniques used by them:
portal is a way to do that.

The emerging Voice Web (or voice portals) is all about 1. Context-aware computing:
distributed voice-enabled content known as voice sites that
can be accessed from any telephone using a standard voice Context-aware computing is a class of systems that have the
browser. This emerging technology creates a new model for ability to sense their physical environment and adapt
business applications known as V-Commerce. themselves to it accordingly. These can be used for
recognizing words spoken by people with varying accents. It
can also deduce words that may have been misspoken.

2. MFCC:

MFCC refers to the Mel-Frequency Cepstral Coefficients.


MFC (Mel-Frequency Cepstrum) is a collection of these
III. SYSTEM ARCHITECTURE coefficients. It amounts to the short-term power spectrum of a
The system architecture of this projects shows the flow of the sound. These can be used to sense variations in sound so as to
control through the system. It also shows the hardware and the recognize the various variables required for voice recognition.
software required for the execution of the program. The
architecture diagram is as follows :

JETIR2003165 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 2


© 2020 JETIR March 2020, Volume 7, Issue 3 www.jetir.org (ISSN-2349-5162)

3. NLP:

Natural Language Programming is a branch of Artificial


Intelligence that deals with the interactions of computer and
human languages. It mainly focuses on how to program the
computers so that they can process the large lume of data on
natural languages. This concept is used to familiarize the
computer with the various words in a particular language and
also to recognize them when spoken.

Proposed Model
Speech to text:
 A Piece of software used that converts audio to text. Five Steps in Natural Language Processing are:
It doesn’t understand just anything you might say.

Text Analyzing:
 Converted text is just letters for computer.
 A piece of software converts text to something that is
understandable for computer.
 Computer understands the command, so Virtual
Assistant like siri convert this text to computer
command.
 VPAs maps the words to functions and parameters to
create a command that computer can understand.

The major milestone that this project tries to achieve is that it


tries it increase the accuracy of the speech to text software.
Meaning the software will theoretically be able to convert any
speech with slight modulations or different accents into text
with high level of accuracy and precision needed for day to
day usability of the VPA. The software essentially combines
voice recognition using neural networks and lip movement
detection using machine learning to increase the precision of
the word spoken.
For people with different accents, just voice recognition will
be useless because the words they speak will be vastly
different from the actual word by the computer’s point of view
because the vectors or the values stored for that particular
word would have been gotten only based on the word being
spoken in a particular accent. So here is where lip movement
recognition comes into play.
For most words, though in a different accent, the movement of
the lips remains similar enough to deduce the word. Thus, lip
movement recognition helps cutting down the various other
words which would have had the same likeliness as per the
voice recognition software.

VI. WORKING PRINCIPLES


The working of Virtual Assistant uses following principles:
 Natural Language Processing : Natural Language
Processing (NLP) refers to AI method of
communicating with an intelligent systems using a
natural language such as English.
Processing of Natural Language is required when
you want an intelligent system like robot to perform
as per your instructions, when you want to hear
decision from a dialogue based clinical expert
system, etc.

JETIR2003165 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 3


© 2020 JETIR March 2020, Volume 7, Issue 3 www.jetir.org (ISSN-2349-5162)

 Automatic Speech Recognition : To understand


command according to user’s input.

 Artificial Intelligence : To learn things from user


and to store all information about behaviour and
relations of user.
The ability of a system to calculate, reason, perceive
relationships and analogies, learn from experience,
store and retrieve information from memory, solve
problems, comprehend complex ideas, use natural
language fluently, classify, generalize, and adapt
new situations.

 Inter Process Communication : To get important


information from other software applications.

VII. CONCLUSION
The paper describes a new emerging service for mobile user.
The Virtual Personal Assistance provides an intelligent

JETIR2003165 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 4


© 2020 JETIR March 2020, Volume 7, Issue 3 www.jetir.org (ISSN-2349-5162)

computer secretarial service for mobile professionals. The new [7] Nguyen, A. and Wobcke, W. (2005), “An Agent-Based Approach to
service is based on convergence of internet, speech Dialogue Management in Personal Assistant”, Proceedings of the 2005
recognition technology and mobile technologies. International Conference on Intelligent User Interfaces.
The VPA minimizes the interruption of the user, improves the [8] Jurafsky & Martin. Speech and Language Processing – An Introduction
utilization of his time, and provides a single point of to Natural Language Processing, Computational Linguistics, and Speech
communication for all his messages, contacts, schedule, and Recognition. Prentice-Hall Inc., New Jersey,2000.
source of information. The paper proposes as well a decision [9] Wobcke, W., Ho. V., Nguyen, A. and Krzywicki, A. (2005), “ A BDI
Agent Architecture for Dialogue Modeling and Coordination in a Smart
structure for call screening, as well as handling requests for
Personal Assistant”, Proceedings of the 2005 IEEE/WIC /ACM
meetings and appointment. The system initially targets International Conference on Intelligent Agent Technology.
lawyers, doctors, sales personnel, small offices, maintenance [10] Knote, R., Janson, A., Eigenbrod, L. and Söllner, M., 2018. The What
crews, etc. However, it is expected to become a standard and How of Smart Personal Assistants: Principles and Application
feature for millions of other users. Domains for IS Research.
[11] Feng, H., Fawaz, K. and Shin, K.G., 2017, October. Continuous
It overcomes many of the drawbacks in the existing solutions. authentication for voice assistants. In Proceedings of the 23rd Annual
It is mainly built to make a much more efficient VPA o that International Conference on Mobile Computing and Networking (pp. 343-
they can be brought into much more practical day to day uses. 355). ACM.
But the system has its own limitation. Though the efficiency is [12] Canbek, N.G. and Mutlu, M.E., 2016. On the track of artificial
intelligence: Learning with intelligent personal assistants. Journal of
high the time consumption for each task to complete maybe
Human Sciences, 13(1), pp.592-601.
higher than the other VPAs and also the complexity of the
[13] Hwang, I., Jung, J., Kim, J., Shin, Y. and Seol, J.S., 2017, March.
algorithms and the concepts would make it very tough to Architecture for Automatic Generation of User Interaction Guides with
tweak it if needed in the future. Intelligent Assistant. In Advanced Information Networking and
Applications Workshops (WAINA), 2017 31st International Conference
ACKNOWLEDGMENT on (pp. 352-355). IEEE.
[14] Buck, J.W., Perugini, S. and Nguyen, T.V., 2018, January. Natural
It is our proud privilege and duty to acknowledge the kind of
Language, Mixed-initiative Personal Assistant Agents. In Proceedings of
help and guidance received from several people in preparation
the 12th International Conference on Ubiquitous.
of this report. It would not have been possible to prepare this
project in this form without their valuable help, cooperation
and guidance. First and foremost, we thank our project
coordinator Mrs. Bhagya M,Assoc .Professor Department of
Computer Science and Engineering and our Project guideMr.
Sudhakara Reddy M,Asst.Professor Department of
Computer Science and Engineering, Nagarjuna College of
Engineering and Technology for their valuable guidance and
all the encouragement that lead towards completion of our
project. We would like to thank Dr . Anitha Patil, HOD,
Department of Computer Science and Engineering, Nagarjuna
College of Engineering and Technology for his valuable
suggestions and guidance throughout the period of this project.
We also wish to record our sincere gratitude Dr. Srikanta
Murthy K, Principal, Nagarjuna College of Engineering and
Technology for his constant support and encouragement in
preparation of this report and for providing making providing
Library and laboratory facilities needed to prepare this project
report.

Last but not least, we would like to thank our parents, friends,
teaching and non-teaching staff of NCET.

REFERENCES
[1] G. O. Young, “Synthetic structure of industrial plastics (Book style with
paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New
York: McGraw-Hill, 1964, pp. 15–64.
[2] W.-K. Chen, Linear Networks and Systems (Book styl\e).Belmont, CA:
Wadsworth, 1993, pp. 123–135.
[3] H. Poor, An Introduction to Signal Detection and Estimation. New
York: Springer-Verlag, 1985, ch. 4.
[4] B. Smith, “An approach to graphs of linear forms (Unpublished work
style),” unpublished.
[5] E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for
publication),” IEEE Trans. Antennas Propagat., to be published.
[6] Ardissono, L., Boella. And Lesmo, L. (2000) “A Plan-Based
AgentArchitecture for Interpreting Natural Language Dialogue”,
International Journal of Human-Computer Studies.

JETIR2003165 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 5

You might also like