The normal method for analyzing technology is formulating many search queries to extract patent
datasets and filter the data physically. The purpose of filtering the collected data is to remove noise to
guarantee accurate information analysis. With the advancement in technology and machine learning, the
work of physical analysis of the patent can be programmed so the system can remove noise depending on
the results based on the previous data. Microsoft team generates a new artificial intelligence model that
provides solutions on how individuals respond to speakers. Microsoft team, workplace, Facebook, and
Google collected data from many active users hence developing artificial intelligence to minimize
distracting background noise, barking and typing during the call.
“SKYE : Voice Based AI Desktop Assistant”IRJET Journal
The document describes the development of a Python-based desktop voice assistant named SKYE that uses speech recognition and text-to-speech to allow users to control their computer using voice commands. The assistant can perform tasks like opening applications, searching the internet, playing music, and more. The goal is to create an accessible assistant that can help users complete common tasks without requiring keyboard or mouse input.
A Voice Based Assistant Using Google Dialogflow And Machine LearningEmily Smith
This document describes the development of a voice-based virtual personal assistant using Google Dialogflow and machine learning. The authors developed an assistant called ERAA using Dialogflow's natural language understanding capabilities. Dialogflow agents contain intents that match user queries to trigger responses. The authors designed a user interface for ERAA using the Flutter platform and integrated it with Dialogflow to handle conversations. They compared Dialogflow to IBM Watson and determined Dialogflow was better for this project due to its ease of maintenance, ability to handle structured data, integration, pricing, and language support. The authors aim to implement ERAA as a smartphone app initially and potentially as a desktop application in the future.
A Deep Learning Model For Crime Surveillance In Phone Calls.vivatechijri
Public surveillance Systems are creating ground-breaking impact to secure lives, ensuring public safety with the interventions that will curb crime and improve well-being of communities, law enforcement agencies are employing and deploying tools like CCTV for video surveillance in banks, residential societies shopping malls,markets,roads almost everywhere to detect where and who was responsible for events like robbery, rough driving, insolence, murder etc. Other surveillance system tools like phone tapping is used to plot an event to catch a suspected person who is threatening an innocent or conspiring a violent activity over a phone call which is being done voluntarily by authorities . Now analyzing both the scenarios in the case of CCTV the crime(robbery,murder) has already occured and in the case of phone tapping there must be information in advance about the suspected person who is going to commit a crime, Now to overcome this issue a system is proposed to know in advance who is suspected and what conspiracy is being done over phone calls as well to detect it automatically and report it to law enforcemet authorities.
A survey on Enhancements in Speech RecognitionIRJET Journal
This document discusses enhancements in speech recognition and provides an overview of the history and basic model of speech recognition. It summarizes key enhancements researchers have made to improve speech recognition, especially in noisy environments. The basic model of speech recognition involves speech input, preprocessing using techniques like MFCCs, classification models like RNNs and HMMs, and output of a transcript. Researchers are working to develop robust speech recognition that can understand speech in any environment.
With the vigorous development of emerging information technology, artificial intelligence application scenarios are everywhere. When it comes to AI, the first thing we think of is machine learning and deep learning. However, they are only part of the field of artificial intelligence research. The scope of artificial intelligence is extremely wide. This presentation describes the hot topics in artificial intelligence research and ten major technical categories.
This document describes a voice assistant created using Python. It discusses the system's architecture, features, design and implementation. The key points are:
1. The voice assistant allows users to perform tasks like sending emails, searching the web, playing music etc. using voice commands on a desktop computer.
2. It uses speech recognition, natural language processing and artificial intelligence techniques to understand voice inputs and carry out tasks.
3. The proposed system aims to improve accuracy over existing assistants by combining voice recognition with neural networks. It analyzes text using natural language processing principles before executing commands.
IBM Watson & Cognitive Computing - Tech In Asia 2016Nugroho Gito
1. The document provides an overview of cognitive computing, including a brief history of artificial intelligence and significant events that have shaped the evolution of cognitive computing.
2. It discusses what cognitive computing is, how it differs from traditional analytics by addressing ambiguous problems and interacting with humans in a natural way.
3. The document outlines how cognitive computing adoption has increased, providing examples of IBM Watson's applications in various industries and technologies like the Watson Developer Cloud that allow developers to access cognitive capabilities through APIs and tools.
“SKYE : Voice Based AI Desktop Assistant”IRJET Journal
The document describes the development of a Python-based desktop voice assistant named SKYE that uses speech recognition and text-to-speech to allow users to control their computer using voice commands. The assistant can perform tasks like opening applications, searching the internet, playing music, and more. The goal is to create an accessible assistant that can help users complete common tasks without requiring keyboard or mouse input.
A Voice Based Assistant Using Google Dialogflow And Machine LearningEmily Smith
This document describes the development of a voice-based virtual personal assistant using Google Dialogflow and machine learning. The authors developed an assistant called ERAA using Dialogflow's natural language understanding capabilities. Dialogflow agents contain intents that match user queries to trigger responses. The authors designed a user interface for ERAA using the Flutter platform and integrated it with Dialogflow to handle conversations. They compared Dialogflow to IBM Watson and determined Dialogflow was better for this project due to its ease of maintenance, ability to handle structured data, integration, pricing, and language support. The authors aim to implement ERAA as a smartphone app initially and potentially as a desktop application in the future.
A Deep Learning Model For Crime Surveillance In Phone Calls.vivatechijri
Public surveillance Systems are creating ground-breaking impact to secure lives, ensuring public safety with the interventions that will curb crime and improve well-being of communities, law enforcement agencies are employing and deploying tools like CCTV for video surveillance in banks, residential societies shopping malls,markets,roads almost everywhere to detect where and who was responsible for events like robbery, rough driving, insolence, murder etc. Other surveillance system tools like phone tapping is used to plot an event to catch a suspected person who is threatening an innocent or conspiring a violent activity over a phone call which is being done voluntarily by authorities . Now analyzing both the scenarios in the case of CCTV the crime(robbery,murder) has already occured and in the case of phone tapping there must be information in advance about the suspected person who is going to commit a crime, Now to overcome this issue a system is proposed to know in advance who is suspected and what conspiracy is being done over phone calls as well to detect it automatically and report it to law enforcemet authorities.
A survey on Enhancements in Speech RecognitionIRJET Journal
This document discusses enhancements in speech recognition and provides an overview of the history and basic model of speech recognition. It summarizes key enhancements researchers have made to improve speech recognition, especially in noisy environments. The basic model of speech recognition involves speech input, preprocessing using techniques like MFCCs, classification models like RNNs and HMMs, and output of a transcript. Researchers are working to develop robust speech recognition that can understand speech in any environment.
With the vigorous development of emerging information technology, artificial intelligence application scenarios are everywhere. When it comes to AI, the first thing we think of is machine learning and deep learning. However, they are only part of the field of artificial intelligence research. The scope of artificial intelligence is extremely wide. This presentation describes the hot topics in artificial intelligence research and ten major technical categories.
This document describes a voice assistant created using Python. It discusses the system's architecture, features, design and implementation. The key points are:
1. The voice assistant allows users to perform tasks like sending emails, searching the web, playing music etc. using voice commands on a desktop computer.
2. It uses speech recognition, natural language processing and artificial intelligence techniques to understand voice inputs and carry out tasks.
3. The proposed system aims to improve accuracy over existing assistants by combining voice recognition with neural networks. It analyzes text using natural language processing principles before executing commands.
IBM Watson & Cognitive Computing - Tech In Asia 2016Nugroho Gito
1. The document provides an overview of cognitive computing, including a brief history of artificial intelligence and significant events that have shaped the evolution of cognitive computing.
2. It discusses what cognitive computing is, how it differs from traditional analytics by addressing ambiguous problems and interacting with humans in a natural way.
3. The document outlines how cognitive computing adoption has increased, providing examples of IBM Watson's applications in various industries and technologies like the Watson Developer Cloud that allow developers to access cognitive capabilities through APIs and tools.
Artificial intelligence (AI) is the study of computer systems that can mimic human intelligence. It involves simulating human behavior in computers through machine learning algorithms. Some examples of AI include digital assistants like Siri, Cortana, and Google Assistant, which can answer questions using voice commands. The history of AI began in the 1950s with pioneers like Alan Turing exploring whether machines can think. More recently, AI has taken many forms like mobile phone assistants, video game characters, GPS, robotics, and facial recognition technology. A major area of focus is deep learning, which allows machines to think like humans. AI will continue to progress technologies like self-driving cars, data ingestion, chatbots, and cloud computing.
Artificial intelligence in practice- part-1GMR Group
Summary is made in 5 parts-
This is Part -1
Cyber-solutions to real-world business problems Artificial Intelligence in Practice is a fascinating look into how companies use AI and machine learning to solve problems. Presenting 50 case studies of actual situations, this book demonstrates practical applications to issues faced by businesses around the globe.
• The rapidly evolving field of artificial intelligence has expanded beyond research labs and computer science departments and made its way into the mainstream business environment.
• Artificial intelligence and machine learning are cited as the most important modern business trends to drive success.
• It is used in areas ranging from banking and finance to social media and marketing.
• This technology continues to provide innovative solutions to businesses of all sizes, sectors and industries.
• This engaging and topical book explores a wide range of cases illustrating how businesses use AI to boost performance, drive efficiency, analyse market preferences and many others.
• This detailed examination provides an overview of each company, describes the specific problem and explains how AI facilitates resolution.
• Each case study provides a comprehensive overview, including some technical details as well as key learning summaries:
o Understand how specific business problems are addressed by innovative machine learning methods Explore how current artificial intelligence applications improve performance and increase efficiency in various situations
o Expand your knowledge of recent AI advancements in technology
o Gain insight on the future of AI and its increasing role in business and industry
o Artificial Intelligence in Practice: How 50 Successful Companies Used Artificial Intelligence to Solve Problems is an insightful and informative exploration of the trans-formative power of technology in 21st century commerce
IRJET - E-Assistant: An Interactive Bot for Banking Sector using NLP ProcessIRJET Journal
This document describes a proposed chatbot called E-Assistant that would be used in the banking sector to help customers complete tasks like opening accounts or applying for loans. It would use natural language processing to understand user queries and respond in text, speech, or visual form. The chatbot's architecture includes modules for context recognition, preprocessing text, intent classification, entity extraction, and context reset. The goal is to provide a helpful and user-friendly assistant to guide customers through banking processes.
Artificial Intelligence And The Legal ProfessionShannon Green
This document summarizes the key developments and implications of artificial intelligence (AI) for the legal profession. It discusses how:
1) AI is being used in legal document analysis, generating legal documents, and advising lawyers by answering questions and monitoring new case law.
2) These applications could impact the number and nature of legal jobs by reducing roles for lower-skilled work and changing the skills required of lawyers, with implications for legal education.
3) Firms may see changes to their structures and business models to adapt to lower costs from AI and changing fee structures. Overall, the document outlines both opportunities and challenges that AI poses for the legal field.
Artificial intelligence markup language: a Brief tutorialijcses
The document describes an introduction to the Artificial Intelligence Markup Language (AIML) and how it can be used to develop chatterbots. It provides an overview of chatterbots and pattern recognition techniques. It then describes the basic structure and tags of the AIML language such as <aiml>, <category>, <pattern>, and <template>. Examples are given to illustrate how dialogue patterns can be modeled using these tags. The document aims to serve as a reference guide for developing chatterbots using the AIML language.
The document presents a new SHAN algorithm for developing AI chatbots. The SHAN algorithm combines natural language processing (NLP), recurrent neural networks (RNNs), and long short-term memory (LSTM) to interpret user inputs and generate responses. It works by using NLP to understand language, RNNs to analyze sequential data like text, and LSTMs to maintain context over long periods of time. The authors believe this combination will improve chatbot responses compared to existing algorithms that rely on only NLP, RNN, or LSTM individually.
A Research Paper on HUMAN MACHINE CONVERSATION USING CHATBOTIRJET Journal
The document describes a research paper on developing a human-machine conversation chatbot. It discusses using artificial intelligence, natural language processing, and machine learning techniques to create an intelligent tutoring chatbot. The proposed methodology involves two stages: knowledge modeling and representation, and conversation flow design. It defines the chatbot architecture and training process that uses Python libraries, intent data files, trained models, and a GUI interface. The goal is to demonstrate building a basic social media and command line chatbot to showcase chatbot and AI concepts.
Industrial Applications of Automatic Speech Recognition SystemsIJERA Editor
Current trends in developing technologies form important bridges to the future, fortified by the early and
productive use of technology for enriching the human life. Speech signal processing, which includes automatic
speech recognition, synthetic speech, and natural language processing, is beginning to have a significant impact
on business, industry and ease of operation of personal computers. Apart from this, it facilitates the deeper
understanding of complex mechanism of functioning of human brain. Advances in speech recognition
technology, over the past five decades, have enabled a wide range of industrial applications. Yet today's
applications provide a small preview of a rich future for speech and voice interface technology that will
eventually replace keyboards with microphones for designing human machine interface for providing easy
access to increasingly intelligent machines. It also shows how the capabilities of speech recognition systems in
industrial applications are evolving over time to usher in the next generation of voice-enabled services. This
paper aims to present an effective survey of the speech recognition technology described in the available
literature and integrate the insights gained during the process of study of individual research and developments.
The current applications of speech recognition for real world and industry have also been outlined with special
reference to applications in the areas of medical, industrial robotics, forensic, defence and aviation
emerging technologies 3.0
Emerging Technologies such as artificial intelligence (AI), machine learning (ML), augmented reality (AR), the Internet of Things (IoT) and quantum computing can help organizations scale on demand, improve resiliency, minimize infrastructure investments and deploy solutions rapidly and securely.
A Literature Survey On Voice AssistanceWendy Hager
This document provides a literature review on voice assistance technologies. It discusses several papers on developing voice assistants using technologies like Python, artificial intelligence, text-to-speech, speech recognition and voice recognition to help users perform tasks with only voice. The review covers applications of voice assistants for personal use, the blind, home automation, programming and more. Overall, the literature aims to explore how voice assistants can provide hands-free experiences and automate tasks for users.
The document discusses machine learning and its applications in cyber security. It provides an introduction to machine learning and how it is used to analyze large amounts of data and make decisions without being explicitly programmed. Examples of machine learning applications discussed include recommendation systems, activity recognition, weather forecasting, and image processing. The document also discusses how machine learning is being applied in cyber security to help detect sophisticated cyber attacks.
Bringing Machine Learning to Mobile Apps with TensorFlowMarianne Harness
Use TensorFlow an open-source platform for machine learning and provide a seamless customer experience through intelligent mobile apps to your customer.
One kind of artificial intelligence, known as generative AI, strives to simulate human ingenuity by generating original works of art like photographs, music, and even videos. Generative AI has the potential to disrupt a wide range of fields by combining deep learning methods with large datasets, from the creative arts to medicine to industry.
TJBOT is an interactive Open Source robot which is designed to encourage All individuals to build TJBOT in fun way with cognitive services. Where TJBOT can be 3D printed and which comes with set of recipes from which we can build TJBOT. We can program the TJBOT to speak, listen, Shine Led, see, recognize, Understand the emotions, wave arms, play games Play Rock Paper Scissors in Node RED. Basically TJBOT was designed for two communities makers, who enjoy the DIY aspects of building and programming novel devices, and students, who can learn about programming cognitive systems. Haleema Khatoon | Prof. Praveen Kumar Pandey "TJBOT - An Open Source Cardboard Robot" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30701.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30701/tjbot--an-open-source-cardboard-robot/haleema-khatoon
This paper proposes a neural network-based text-to-speech synthesis system that can generate audio for different speakers, including those not in the training data. The system uses an encoder-decoder model along with a vocoder to convert text to audio for voice cloning. An auto-tuner is also introduced to alter pitch and tone. The paper shows the system can synthesize and translate text-to-speech across multiple languages using a small amount of training data through deep learning. Evaluation shows the model learns high-quality speaker representations and can generate natural-sounding speech for new voices not seen during training.
Filip Maertens - AI, Machine Learning and Chatbots: Think AI-first Patrick Van Renterghem
Filip Maertens presented this "AI, Machine Learning and Chatbots" at the "Future of IT" seminar on 20th of September 2017 in Brussels. Twitter: @fmaertens Email: filip@faction.xyz
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...ITCamp
Tim Huckaby gave a keynote presentation on natural user interfaces and emerging technologies. He discussed the four main types of natural user interfaces: multi-touch, gesture, voice, and neural interfaces. Huckaby also demonstrated several applications that utilize these interface types, including interactive digital signage, physical therapy tools, and 3D modeling software. Emerging technologies discussed included neural interfaces and Emotiv's low-cost brain-computer interface device.
IRJET- A Survey to Chatbot System with Knowledge Base Database by using Artif...IRJET Journal
The document discusses chatbots and artificial intelligence. It provides background on chatbots, including how they have advanced from early rule-based models to more advanced intelligent systems capable of natural conversations. Chatbots analyze user input to formulate relevant responses and are gaining popularity for automating customer service. The document also discusses using knowledge bases and databases to improve chatbot responses and abilities. It reviews different techniques used in building chatbots and their components like classifiers, responders, and knowledge management systems.
Bringing Machine Learning to Mobile Apps with TensorFlowAlaina Carter
Machine learning has seen a significant rise and has changed the way we use our mobile devices. It improves productivity and offers an edge over the competition. Read more to know how machine learning with Tensor flow adds extraordinary power to intelligent mobile apps.
A Review Comparative Analysis On Various Chatbots DesignCourtney Esco
The document discusses various techniques used to design chatbots. It presents a survey of chatbot design techniques from nine research papers and compares the main methods used. The document categorizes chatbots into four types - goal-based, knowledge-based, service-based, and response-based. It also describes existing chatbots like Elizabeth bot, Microsoft LUIS, and Alicebot and discusses their approaches to natural language processing and response generation. The document aims to help researchers identify gaps for future chatbot development.
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
More Related Content
Similar to Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms
Artificial intelligence (AI) is the study of computer systems that can mimic human intelligence. It involves simulating human behavior in computers through machine learning algorithms. Some examples of AI include digital assistants like Siri, Cortana, and Google Assistant, which can answer questions using voice commands. The history of AI began in the 1950s with pioneers like Alan Turing exploring whether machines can think. More recently, AI has taken many forms like mobile phone assistants, video game characters, GPS, robotics, and facial recognition technology. A major area of focus is deep learning, which allows machines to think like humans. AI will continue to progress technologies like self-driving cars, data ingestion, chatbots, and cloud computing.
Artificial intelligence in practice- part-1GMR Group
Summary is made in 5 parts-
This is Part -1
Cyber-solutions to real-world business problems Artificial Intelligence in Practice is a fascinating look into how companies use AI and machine learning to solve problems. Presenting 50 case studies of actual situations, this book demonstrates practical applications to issues faced by businesses around the globe.
• The rapidly evolving field of artificial intelligence has expanded beyond research labs and computer science departments and made its way into the mainstream business environment.
• Artificial intelligence and machine learning are cited as the most important modern business trends to drive success.
• It is used in areas ranging from banking and finance to social media and marketing.
• This technology continues to provide innovative solutions to businesses of all sizes, sectors and industries.
• This engaging and topical book explores a wide range of cases illustrating how businesses use AI to boost performance, drive efficiency, analyse market preferences and many others.
• This detailed examination provides an overview of each company, describes the specific problem and explains how AI facilitates resolution.
• Each case study provides a comprehensive overview, including some technical details as well as key learning summaries:
o Understand how specific business problems are addressed by innovative machine learning methods Explore how current artificial intelligence applications improve performance and increase efficiency in various situations
o Expand your knowledge of recent AI advancements in technology
o Gain insight on the future of AI and its increasing role in business and industry
o Artificial Intelligence in Practice: How 50 Successful Companies Used Artificial Intelligence to Solve Problems is an insightful and informative exploration of the trans-formative power of technology in 21st century commerce
IRJET - E-Assistant: An Interactive Bot for Banking Sector using NLP ProcessIRJET Journal
This document describes a proposed chatbot called E-Assistant that would be used in the banking sector to help customers complete tasks like opening accounts or applying for loans. It would use natural language processing to understand user queries and respond in text, speech, or visual form. The chatbot's architecture includes modules for context recognition, preprocessing text, intent classification, entity extraction, and context reset. The goal is to provide a helpful and user-friendly assistant to guide customers through banking processes.
Artificial Intelligence And The Legal ProfessionShannon Green
This document summarizes the key developments and implications of artificial intelligence (AI) for the legal profession. It discusses how:
1) AI is being used in legal document analysis, generating legal documents, and advising lawyers by answering questions and monitoring new case law.
2) These applications could impact the number and nature of legal jobs by reducing roles for lower-skilled work and changing the skills required of lawyers, with implications for legal education.
3) Firms may see changes to their structures and business models to adapt to lower costs from AI and changing fee structures. Overall, the document outlines both opportunities and challenges that AI poses for the legal field.
Artificial intelligence markup language: a Brief tutorialijcses
The document describes an introduction to the Artificial Intelligence Markup Language (AIML) and how it can be used to develop chatterbots. It provides an overview of chatterbots and pattern recognition techniques. It then describes the basic structure and tags of the AIML language such as <aiml>, <category>, <pattern>, and <template>. Examples are given to illustrate how dialogue patterns can be modeled using these tags. The document aims to serve as a reference guide for developing chatterbots using the AIML language.
The document presents a new SHAN algorithm for developing AI chatbots. The SHAN algorithm combines natural language processing (NLP), recurrent neural networks (RNNs), and long short-term memory (LSTM) to interpret user inputs and generate responses. It works by using NLP to understand language, RNNs to analyze sequential data like text, and LSTMs to maintain context over long periods of time. The authors believe this combination will improve chatbot responses compared to existing algorithms that rely on only NLP, RNN, or LSTM individually.
A Research Paper on HUMAN MACHINE CONVERSATION USING CHATBOTIRJET Journal
The document describes a research paper on developing a human-machine conversation chatbot. It discusses using artificial intelligence, natural language processing, and machine learning techniques to create an intelligent tutoring chatbot. The proposed methodology involves two stages: knowledge modeling and representation, and conversation flow design. It defines the chatbot architecture and training process that uses Python libraries, intent data files, trained models, and a GUI interface. The goal is to demonstrate building a basic social media and command line chatbot to showcase chatbot and AI concepts.
Industrial Applications of Automatic Speech Recognition SystemsIJERA Editor
Current trends in developing technologies form important bridges to the future, fortified by the early and
productive use of technology for enriching the human life. Speech signal processing, which includes automatic
speech recognition, synthetic speech, and natural language processing, is beginning to have a significant impact
on business, industry and ease of operation of personal computers. Apart from this, it facilitates the deeper
understanding of complex mechanism of functioning of human brain. Advances in speech recognition
technology, over the past five decades, have enabled a wide range of industrial applications. Yet today's
applications provide a small preview of a rich future for speech and voice interface technology that will
eventually replace keyboards with microphones for designing human machine interface for providing easy
access to increasingly intelligent machines. It also shows how the capabilities of speech recognition systems in
industrial applications are evolving over time to usher in the next generation of voice-enabled services. This
paper aims to present an effective survey of the speech recognition technology described in the available
literature and integrate the insights gained during the process of study of individual research and developments.
The current applications of speech recognition for real world and industry have also been outlined with special
reference to applications in the areas of medical, industrial robotics, forensic, defence and aviation
emerging technologies 3.0
Emerging Technologies such as artificial intelligence (AI), machine learning (ML), augmented reality (AR), the Internet of Things (IoT) and quantum computing can help organizations scale on demand, improve resiliency, minimize infrastructure investments and deploy solutions rapidly and securely.
A Literature Survey On Voice AssistanceWendy Hager
This document provides a literature review on voice assistance technologies. It discusses several papers on developing voice assistants using technologies like Python, artificial intelligence, text-to-speech, speech recognition and voice recognition to help users perform tasks with only voice. The review covers applications of voice assistants for personal use, the blind, home automation, programming and more. Overall, the literature aims to explore how voice assistants can provide hands-free experiences and automate tasks for users.
The document discusses machine learning and its applications in cyber security. It provides an introduction to machine learning and how it is used to analyze large amounts of data and make decisions without being explicitly programmed. Examples of machine learning applications discussed include recommendation systems, activity recognition, weather forecasting, and image processing. The document also discusses how machine learning is being applied in cyber security to help detect sophisticated cyber attacks.
Bringing Machine Learning to Mobile Apps with TensorFlowMarianne Harness
Use TensorFlow an open-source platform for machine learning and provide a seamless customer experience through intelligent mobile apps to your customer.
One kind of artificial intelligence, known as generative AI, strives to simulate human ingenuity by generating original works of art like photographs, music, and even videos. Generative AI has the potential to disrupt a wide range of fields by combining deep learning methods with large datasets, from the creative arts to medicine to industry.
TJBOT is an interactive Open Source robot which is designed to encourage All individuals to build TJBOT in fun way with cognitive services. Where TJBOT can be 3D printed and which comes with set of recipes from which we can build TJBOT. We can program the TJBOT to speak, listen, Shine Led, see, recognize, Understand the emotions, wave arms, play games Play Rock Paper Scissors in Node RED. Basically TJBOT was designed for two communities makers, who enjoy the DIY aspects of building and programming novel devices, and students, who can learn about programming cognitive systems. Haleema Khatoon | Prof. Praveen Kumar Pandey "TJBOT - An Open Source Cardboard Robot" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30701.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30701/tjbot--an-open-source-cardboard-robot/haleema-khatoon
This paper proposes a neural network-based text-to-speech synthesis system that can generate audio for different speakers, including those not in the training data. The system uses an encoder-decoder model along with a vocoder to convert text to audio for voice cloning. An auto-tuner is also introduced to alter pitch and tone. The paper shows the system can synthesize and translate text-to-speech across multiple languages using a small amount of training data through deep learning. Evaluation shows the model learns high-quality speaker representations and can generate natural-sounding speech for new voices not seen during training.
Filip Maertens - AI, Machine Learning and Chatbots: Think AI-first Patrick Van Renterghem
Filip Maertens presented this "AI, Machine Learning and Chatbots" at the "Future of IT" seminar on 20th of September 2017 in Brussels. Twitter: @fmaertens Email: filip@faction.xyz
ITCamp 2013 - Tim Huckaby - The Engaging User Experience & Natural User Inter...ITCamp
Tim Huckaby gave a keynote presentation on natural user interfaces and emerging technologies. He discussed the four main types of natural user interfaces: multi-touch, gesture, voice, and neural interfaces. Huckaby also demonstrated several applications that utilize these interface types, including interactive digital signage, physical therapy tools, and 3D modeling software. Emerging technologies discussed included neural interfaces and Emotiv's low-cost brain-computer interface device.
IRJET- A Survey to Chatbot System with Knowledge Base Database by using Artif...IRJET Journal
The document discusses chatbots and artificial intelligence. It provides background on chatbots, including how they have advanced from early rule-based models to more advanced intelligent systems capable of natural conversations. Chatbots analyze user input to formulate relevant responses and are gaining popularity for automating customer service. The document also discusses using knowledge bases and databases to improve chatbot responses and abilities. It reviews different techniques used in building chatbots and their components like classifiers, responders, and knowledge management systems.
Bringing Machine Learning to Mobile Apps with TensorFlowAlaina Carter
Machine learning has seen a significant rise and has changed the way we use our mobile devices. It improves productivity and offers an edge over the competition. Read more to know how machine learning with Tensor flow adds extraordinary power to intelligent mobile apps.
A Review Comparative Analysis On Various Chatbots DesignCourtney Esco
The document discusses various techniques used to design chatbots. It presents a survey of chatbot design techniques from nine research papers and compares the main methods used. The document categorizes chatbots into four types - goal-based, knowledge-based, service-based, and response-based. It also describes existing chatbots like Elizabeth bot, Microsoft LUIS, and Alicebot and discusses their approaches to natural language processing and response generation. The document aims to help researchers identify gaps for future chatbot development.
Similar to Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms (20)
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
- The document presents 6 different models for defining foot size in Tunisia: 2 statistical models, 2 neural network models using unsupervised learning, and 2 models combining neural networks and fuzzy logic.
- The statistical models (SM and SHM) are based on applying statistical equations to morphological foot data.
- The neural network models (MSK and MHSK) use self-organizing Kohonen maps to cluster foot data and model full and half sizes.
- The fuzzy neural network models (MSFK and MHSFK) incorporate fuzzy logic into the neural network learning process to better account for uncertainty in foot sizes.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
DOI:10.5121/ijcsit.2023.15103 31
ACTIVE NOISE CANCELLATION IN
MICROSOFT TEAMS USING AI & NLP
POWERED ALGORITHMS
Pawankumar Sharma1
, Bibhu Dash2
1
School of Computer and Information Science, University of the Cumberlands, KY USA
2
Department of Computer and Information Science, University of the Cumberlands, KY USA
ABSTRACT
The normal method for analyzing technology is formulating many search queries to extract patent
datasets and filter the data physically. The purpose of filtering the collected data is to remove noise to
guarantee accurate information analysis. With the advancement in technology and machine learning, the
work of physical analysis of the patent can be programmed so the system can remove noise depending on
the results based on the previous data. Microsoft team generates a new artificial intelligence model that
provides solutions on how individuals respond to speakers. Microsoft team, workplace, Facebook, and
Google collected data from many active users hence developing artificial intelligence to minimize
distracting background noise, barking and typing during the call.
KEYWORDS
Artificial intelligence, NLP, Microsoft teams, speech identification, video call, video signal data,
machine learning
1. INTRODUCTION
Technology is evolving at a very high speed to make human life better. Microsoft is among the
technologies implemented to make communication efficient and effective. Due to the high
competition level in the industry, Microsoft has to identify strategies to help them remain
competitive in the modern world. Microsoft developed new features after Google's Hangout
Chats, and Facebook's Workplace exceeded 44 million daily active users. Such features
included raising a hand to indicate an individual has something to mention, offline and minimal
bandwidth help to read chat texts and write replies even if the network is poor or unavailable.
Additionally, the team developed a feature where chats would pop up at a different window.
After all the improvements, a unique aspect still stood out, real-time noise suppression. Thus,
Microsoft Team had to identify strategies through artificial intelligence to minimize the
disturbing background noise when calling.
Almost every individual has experienced distractive background noise when communicating via
a call. In most cases, individuals ask the other person to mute or move to a calm place for
communication to be effective [1]. Such noise is called real-time noise. The real-time noise
dominance can filter out an individual typing on their keyboard when a meeting is in progress.
Thus, filtering out individuals making noise or in a noisy environment will enhance effective
communication for individuals who are serious about the meeting [2]. With the help of artificial
intelligence, Microsoft Team will eliminate background noise in real-time so that individuals
will listen to the voice only on the call.
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
32
According to Hubbard and Bailey (2018), the application of cooperation and video conferencing
instruments has risen significantly since the coronavirus pandemic [3]. Microsoft is directing
Teams as the remedies for businesses and consumers, a section of the Microsoft 365
subscription suite [4]. The Microsoft organization depends on machine-learning proficiency to
ensure that artificial intelligence is among the significant differentiators. When attained, real-
time noise suppression in homesteads and organizations will be a thing of the past, and
communication will be more efficient and effective (see Figure 1).
Figure 1. Collection of data and training framework
2. STATIONERY NOISES VS NON- STATIONERY NOISES
Communication technologies such as Skype, Microsoft Teams, and Skype Business have
experienced noise distraction for a long time. Various communication instruments and video
conferencing applications still experience noise suppression issues [5]. However, noise
suppression only deals with stationery noises, such as the noise produced by a computer fan or
an air conditioner in the background. Traditionally, noise suppression could be addressed by
determining speech pauses, approximating the baseline noise, supposing that the progressive
background noise remains constant, and filtering it out [6]. Microsoft Teams are working
towards suppressing non-stationary noises, such as opening the door or a dog barking. This step
will be achieved using machine learning, where a training set will be developed with multiple
representative noises.
Microsoft Teams have recently developed a training program to conduct further research on
avoiding real-time noise when video calling. The training sets to be developed will have unique
features because they will have special data sets to ensure specific noises are not filtered out [7].
The Noises to be left unfiltered include sound from musical instruments, real-time noise
cancellation, singing, and laughing. The noises will be unfiltered because the Microsoft Team
can't separate sounds from human voices. Thus, only distractive noises will be eliminated.
Moreover, it is impossible to filter out some noises because undesirable noises appear in the
gaps between the speech and overlay with the speech [8]. When an individual's noise and
speech overlap, it isn't easy to distinguish between them. Thus, Microsoft Teams will train a
neural network to differentiate between noise and speech using artificial intelligence.
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
33
3. SPEECH IDENTIFICATION VS. NOISE CANCELATION
Aichner, a communications official in Microsoft Teams, tried to relate machine-learning
approaches for noise cancellation with machine-learning methods for speech recognition.
Aichner found that a massive corpus of consumers talking into the microphone for voice
recognition should be recorded [9]. After recording, human beings should be requested to mark
the voice information by recording what has been stated. Rather than mapping the microphone
input into written words, individuals will attempt to change from noise to clear speech in noise
cancellation. With such strategies, Microsoft Teams will train the model to comprehend the
variation between speech and noise, and the model will learn to maintain the speech. In
developing the training datasets, Microsoft Teams took thousands of dissimilar speakers with
more than 100 forms of noise [10]. The team then integrated the noiseless clear speech with
noise to feign a microphone signal. The training model is then fed with clear speech as the
foundation of truth. The team enquires from the training model to abstract a pure signal and its
features from noisy data. Therefore, the neural network is trained in supervised learning to
identify the basic truth.
According to Hinton et al. [11], the primary truth is the speech in the microphone when
recognizing speech [11]. In real-time cancellation, the primary truth speech should be free from
noise. The Microsoft Team can effectively train its model by providing massive data sets for
hundreds of hours of data. The model will learn to generalize and minimize noise using a clear
speech even if the speech was not part of the training data (see Figure 2).
Figure 2. Real-time noise cancellation with AI
Thanks to improved noise reduction techniques, Microsoft Teams can discriminate between
stationary noises (like machine noise) and non-stationary noises (e.g., animal sounds).
Background sounds like dog barks, laptop clicks, and paper rustling are instantaneously muted.
The noise reduction feature is currently turned on by default and cannot be turned off in the
current version of Teams. Microsoft trains AI-NLP models to differentiate between noise and
speech, and then the model attempts to keep just the speech. For example, in model data,
Microsoft employed thousands of different speakers and over 100 types of noise. Pure speech
without noise is then combined with the noise. As a result, a microphone signal is replicated.
The clean speech is then supplied to the model as the ground truth. 'Please extract this clean
signal from this noisy data, and this is how it should appear,' says the model when asked. This is
how AI models using neural networks work if there is some ground truth in supervised learning.
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
34
4. METHODOLOGY
The Microsoft team used digital library web science, Scopus, and Google scholar to compile all
the facts you need to know about how artificial intelligence is used to filter out background
noise when video calling. The study used a search engine to find relevant results across various
topics, matched keywords to maximize relevance in this database, and offered thorough, up-to-
date research.
Furthermore, the information gathered was filtered, and the team was determined to obtain
results from only the published papers in the last four years. The research also ensured that the
paper's findings are relevant to modern technology using artificial intelligence to filter out
barking, typing, and other noise from video calls in the Microsoft team [12]. During the
research, the team ensured they examined the conclusion and the abstracts to filter the pertinent
information to brief and make authors more confident with the research paper. The research is
designed for a data project as part of the intelligence application in the Microsoft team in
suppressing the noise [13]. The application of the machine learning model is used for predictive
analyses, machine learning services, databases, and cloud systems for storing datasets and big
data clusters. Tools allow members to share the resources and create a consistent computing
environment, not to validate and replicate the experiments.
4.1. Challenges
There are some challenges experienced by Microsoft Teams when relating the functionality with
speech identification. Some challenges are that when matching speech recognition with
functionality, some canceling sound noise becomes easily attainable, even if it takes place in
real-time [14]. When developing noise suppression, it becomes difficult to get representative
data groups to develop, minimize the model, and leverage machine learning proficiency.
5. REPRESENTATIVE OF DATA
Microsoft team spent a lot of their time understanding how to produce quality audio files that
explain what happens throughout a typical call. The Microsoft team has a unique way of
representation. For instance, male and female voices are represented using audiobooks. This
enables the team because male and female voices differ in speech characteristics. Microsoft
taped the information from YouTube, which clearly labeled and required the recording, for
instance, music and typing [15]. The Microsoft team must combine the noise data and the
speech using the synthesizer scripts, which consist of, unlike signal-to-noise ratios. The team
will amplify the noise, producing or mimicking various accurate situations developed during the
call. Conference calls and audiobooks are different depending on the outcomes. Artificial
intelligence noise destruction mostly depends on machine learning, enabling the system to
differentiate between noise and clean speech. The main idea is to train the machine learning
model to work in all situations; therefore, it requires the diversification of the data, where the
team must create a large dataset to ensure they achieve the diversity of the dataset [16]. The
Microsoft team used the available data to collect specific information; this is done to ensure that
the customers' privacy is maintained.
6. CONFIDENTIALITY RESTRICTIONS
Some researchers blame it on Aichner’s team as they have no authority to access customers'
data; this is achieved because Microsoft has strict rules and guidelines that protect internal
privacy [17]. Aichner cannot use Microsoft team calls. A smaller-scale effort is created to
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
35
ensure that accurate recording with various speakers and devices. All these devices must be
tested to ensure they work before the recording starts. This is done using a convinced training
set to the test set to provide the intended results [18]. The participants can only see and follow
the conversation when they join the meeting. When individuals are dismissed from the ongoing
meeting, they will instantly stop receiving chat massagers; therefore, no need to remove the
participant from the group. Also, no evidence was left; for instance, there was no history of the
meeting.
7. CLOUD AND EDGE TECHNOLOGY
Cloud and edge are figuring out to establish the neural network. By bringing in more devices
and systems, the intelligent edge can collect more data, process it, and make it accessible to end
users. The information is delivered by responsive and contextually updated apps [19].
Combining the huge computing power of the cloud with gradually connected technologies leads
to possibilities, which are multi-device virtually limitless data and the growing number of multi-
sensory.
Table 1. Collaborative cloud-edge computing framework
Cloud Edge Side
Edge Node Configuration Optimal Task Scheme
Collaborative Cloud-edge Learning Cloud Dormancy Mechanism
Most machine learning activities are done in the cloud; for instance, in voice recognition, when
an individual uses a microphone, that voice is sent to the cloud [20]. The cloud contains large
calculations that can run this voice and recognize the speech in real-time communication. We
use the machine learning model to narrow the voices to fit clients.
8. PUSH TREATMENT TO THE EDGE
Push treatment to edge prefers the machine learning model to be live on edge and not in the
cloud since the Microsoft team is trying to limit the number of users on the server. The server
plays a crucial role in video signal packets sent straight between the two members [21].
Microsoft is responsible for keeping their servers from becoming overcrowded, determining the
cost of each connection, and supplying extra network on the delay by creating a more efficient
edge from the latency perspective when the image is set up for group calls through their service.
The transfer of documents is costless since it only requires a cellphone, personal computer, or
laptop to deliver the message to the endpoint; this is achieved when the central processing unit
is not overloaded [22]. All this processing equipment should be taken care of; for instance, the
battery life should be checked to ensure no fault is committed and progress continues without
interference.
9. DOWNLOAD SIZE AND SUSTAINABILITY
The Microsoft team considers future progression in this section since machine learning work
continues daily. The Microsoft team is developing a flexible system for future adjustment [23].
Since the industry is trying to invest in noise cancellation after figuring out the first release as
much as possible, the team will be looking for a new and better model system; the team should
develop a model that affects the client's size. The Microsoft team is needed to develop an app
that can be accommodated on a phone, laptop, or desktop [24]. The app should occupy less
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
36
space and can be transferred quickly among users. This provides future modifications for the
app and system into different models.
10. MACHINE LEARNING EXPERT SYSTEMS
All the processes cannot go on if the machine learning expertise is equipped; thus, the expertise
should understand the purpose of the data collected and the sure models to use. The world
consists of numerous model centers with much audio expertise [25]. Data should be open source
to allow improvements. Technology allows employees to think outside the box in developing
various solutions to tackle challenges facing the current models [26]. Machine learning
expertise seeks knowledge from people, not from the collected data alone.
According to Yang and Meals (2014), noise suppression exists in the skype Microsoft team
[27]. Skype for the business app, communication tools, and video conferencing app contains
noise suppression. These are categorized under stationary noise, for example, the air conditioner
and computer fan [28]. The old noise suppression method considers the baseline estimate of the
noise and the speech pause and assumes that the continuous background for the noise does not
change, enabling filtering it out.
Using artificial intelligence, the Microsoft team indicated that speech pauses could never be
estimated. Therefore, using machine learning techniques to train the algorithms to detect various
issues effectively, the bark is built in different forms of concepts [29]. Technology has led to the
Creation of awareness that most people should be ready to copy. Connected devices have
communicated more easily since the use of mobile phones. The introduction of real-time
background artificial intelligence noise suppression to the Microsoft team has boosted
communication because the new system can suppress unwanted noise like slamming doors,
shuffling papers, and barking dogs [30]. Artificial intelligence base noise suppression has a
unique way of working.
The Creation of a large dataset ensures the achievement of data diversity. To achieve a clean
speech, balancing female and male speech should prioritize collecting data from more than ten
languages [31]. The languages include tonal languages to endure the model does not change the
statement's meaning through distortion of the tone of words. Machine learning is also trained to
differentiate the suppressed emotions in clean speech, such as crying and laughing [32]. The
environment in which an individual joins the meeting is very important for the speech signal.
For the model to capture the diversity, it is being trained several times in different room
environments.
The deep learning models should have a strong, powerful training infrastructure and Microsoft
Azure to give the team a wider view to developing a more improved version of the machine
learning model. Extraction of information from the noise needs to be done so that the human ear
will perceive it as its original form [33]. The artificial intelligence noise can eliminate unwanted
noise automatically during the meeting. Artificial intelligence-based noise suppression can
update the existing model to control the noise they want. New high-setting users are available in
the Microsoft team that can suppress more background noise. Artificial intelligence noise
clampdown is recorded as in development on Microsoft. The artificial intelligence-based noise
suppressor is modified by analyzing a specific audio feed in the Microsoft teams and using a
train deep neural network that can filter the collected noise and keep the only speech signal. The
system will be rolled out to the desktop, iOS, and Android. Suppressing background noise is an
option inside Zoom's noise cancellation function, which is used in modern video conferences.
The user can set the volume to very loud or very low. IOS and Android users may use Google's
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
37
noise cancellation feature to block out distracting ambient noises, including door slamming,
typing, pen clicking, dog barking, and more [34]. Using artificial intelligence, the presenters can
now customize how the content shows up for meeting the members. Microsoft provides more
active viewing content knowledge.
Dork et al. (2012) state that the presenters can overlay their content and videos; this can happen
by allowing the presenters to move the content or video to the corner of the screen videos [35].
Artificial intelligence enables users to be monitored wherever they are, for instance, to notify
other members that a particular user is unavailable in the office [36]. The feature unavailability
status can display anytime it reaches out via chat.
Data mining combines various methods, database management, statistics, data visualization, and
machine learning. Complex issues can be handled with these methods [37]. For a transaction
including various data conditions, types of data, and mining tasks, software or schemes for data
mining may employ one or more of these methods. Classification attempts to anticipate the
target class for each data example correctly. The prediction model using the regression method
and numerical targets is not a classified algorithm. Data mining is a large data search process for
searching patterns that cannot be found using simple analysis techniques [38]. Data mining has
several types: illustrating, text, social media, web, audio, and video.
A summary of the most critical findings from each pattern model has started to be included by
researchers due to changes in the cyber threat landscape. This model aimed to account for social
attacks as they occurred and adapt to the new genesis norms because social attacks like social
engineering are on the rise due to outside factors. The paradigm for spotting security flaws and
social engineering in modern web apps has been rethought, and it involves launching a
fundamental attack on an online application. System intrusions provide evidence of
sophisticated attacks, spurring an investigation into the best way to allocate resources to counter
future attempts [40]. Various technological and human errors can cause unintentional changes to
sensitive data.In contrast, exploitation of additional benefits resulted in a lower rate of security
breaches, and misuse of privilege results in the illegal or malicious use of legitimate privileges.
Data loss is plausible when an asset is lost, stolen, or both [41]. However, people are losing their
electronic equipment more frequently now than they were previously. The company should
create a probability-based contingency plan due to the difficulties in identifying and forecasting
denial of service assaults. Everything else, which includes all occurrences that nicely fit into
other patterns, is included in addition to the environmental breach (see Figure 3).
Figure 3. A simplified diagram shows how batching can be used to process multiple audio frames
concurrently using AI
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
38
Compromise data, which refers to information hacked recently, is one of the most common
categories. Stealing user credentials gives hackers access to the system and private information
[42]. Cybercriminals are also interested in finding out personally identifying information about
people. Credentials, individual and business data, money and medical information, and financial
and financial information are frequently exposed in security breaches and afterward used by
other fraudsters. They draw fraudsters due to the potential value of the information they hold.
This location necessitates close monitoring and security [43, Emphasis added]. Data breaches
may result from several factors, including lax access control, the use of shared credentials,
improperly configured cloud storage, unsecured apps, excessive access privileges, and a lack of
technical knowledge.
Any industry, regardless of specialty, is susceptible to cyberattacks. Understanding how these
activities typically play out is crucial for effective defense because the hospitality and food
services industries are particularly vulnerable to hacking, social engineering, and malware
attacks. The main threat to this company is from outsiders with financial interests. This market
relies heavily on the creative sectors, including ransomware, phishing, and password theft.
Compared to the highest event level, threat actors motivated by financial gain are responsible
for the lowest rate of data breaches [44]. A potential threat to educational institutions is social
engineering, which may take the form of pretexting. System faults and intrusions, both natural
and created, are covered by the study of external agents [45]. Credential stuffing and
ransomware assaults are two often used strategies by outside parties to influence the financial
and insurance industries. Data breaches in this sector are most frequently caused by insiders
using methods like social engineering and straightforward online application attacks.
The Microsoft teams contribute to the empowerment of the enterprises such as engineering,
marketing, and finance. Microsoft team streamlines common communication, empowering the
users with an automated provision that can provide a clear step to resolve the problem without
needing the experts [46]. Artificial intelligence provides the Microsoft team with a common and
familiar interface to easily contact and consume the power of cognitive services. Microsoft
services include facial and image recognition to develop artificial intelligence tools [47]. The
tools enable users to learn the process by themselves, unlike the previous where the companies
used to develop cognitive services could be developed from anywhere by developing a business
vision, involving the information technology experts, and getting approval for the budget. The
process took more time which delayed the innovation.
Artificial intelligence technologies help the user find the right information presented in the right
place to solve a specific task [48]. The technology's use helps reduce frustration by enabling the
team to access the right information document. During the assembly, the artificial intelligence
tool could automatically present and identify the relevant additional information and their
sources, such as videos, documents, and links, depending on the keyword and topic presented.
Artificial intelligence models can make specific notes and assign tasks [49, 50]. After the
meeting, artificial intelligence can monitor the assigned task, summarize the content, and
monitor the deadlines, making it more important for people to access the information depending
on the topics [51]. Digital associated with informal interface enhances unified team
collaboration and communication capabilities enabling workers to use voice control to send
instant messages and make calls. The tool is productive since it enables team workers to create
better business outcomes and reduces frustration.
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
39
11. RESULTS
This research shows that artificial intelligence can filter out barking, typing, and other noise
from video calls in Microsoft Teams. The use of machine learning can help in noise cancellation
as it can differentiate between speech and noise, as well as identify and filter out undesirable
noises. Additionally, a training program can help create a training set with multiple
representative noises. The deep learning models require a powerful training infrastructure and
Microsoft Azure to give the team a wider view to developing a more improved version of the
machine learning model. AI technologies can help users find the right information presented in
the right place to solve a specific task. Additionally, AI can make specific notes and assign tasks
after the meeting, monitor the assigned task, summarize the content, and monitor the deadlines.
AI has the potential to make video calls more efficient and productive and reduce frustration.
12. APPLICABILITY
In today's busy and stressful environment, silence and reduced noise are essential for everybody.
Per a survey, increased noise levels during a patient's hospital stay might negatively affect their
experience [37]. This may be due to the fact that excessive noise can cause patients' heart and
respiratory rates to increase, blood pressure to rise, and stress levels to rise; unexpected or
unrelated noises can cause pharmacists and surgeons to become distracted from dispensing
medications or performing surgery, which can lead to medical errors and near misses. The
sound of medical alarms frequently exhausts people, and they cannot get enough sleep. Also, as
now more than 40% of the workforce is working from home during or after COVID-19
pandemic, there is another necessity to attend meetings with concentration, and noise
cancellation can boost team communication and productivity [50].
13. RECOMMENDATIONS
Noise-free audio and video quality are essential for sustainable smart cities, healthcare, and
future MedTech innovations. This report recommends identifying the representative set that
computers and people in various applications can use. The representative set consists of
selective models from the subset of the original dataset whose function is to capture more
important information more efficiently from the data sets. Being innovative with the office
layout is an appropriate way to filter barking, typing, and noise; for example, desks and systems
in groups help compartmentalize barking and noise and use sound-friendly furniture. This report
finds the use of acoustic wall panels essential for noise filtering. In any building, they should
use sound-absorbing walls, which effectively combat noise. Improve insulation by using
materials that are effective in sound reduction. Unforgiving floor surfaces such as porcelain,
ceramic, and concrete contribute to massive noise, while the carpet is the best solution for noise
reduction. Also, LVT flooring is the alternative for easy maintenance and selection of design
options that boost sound absorption.
14. CONCLUSIONS
Separating the signal from the noise is important to the dataset because it improves
performance; for instance, overfitting affects machine learning. The algorithm can consume
noise as a pattern and then generalize it; hence it is important to cancel noisy data from the
signal. The occurrences of noisy data in the Microsoft team can impact meaningful information.
Noisy data can lead to a decrease in classification accuracy or poor results. Many identification
techniques can be assembled, but only one can work efficiently. Polishing techniques improve
classification accuracy compared to robust and filtering techniques, although they contribute to
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
40
some datasets and Microsoft errors. The Microsoft team offers solution support services and
verifies the computer system, facilitating the cloud-based solution and sharing the information
using the computing resources. Using artificial intelligence enables solving noise, barking, and
typing problems due to its efficiency and the cab's mode to detect some signals.
ACKNOWLEDGMENTS
We appreciate the assistance and suggestions provided by the University of the Cumberlands'
Dr. Azad Ali, our computer science professor, and the rest of the faculty while we worked on
this piece. We greatly value Dr. Ali's time and effort in reading this work and providing
insightful comments.
REFERENCES
[1] Nassif, A.B., Shahin, I., Attili, I., Azzeh, M. and Shaalan, K., (2019). Speech recognition using deep
neural networks: A systematic review. IEEE Access, 7, pp.19143-19165.
[2] Duan, S., Zhang, J., Roe, P. and Towsey, M., (2014) A survey of tagging techniques for music,
speech, and environmental sound. Artificial Intelligence Review, 42(4), pp.637-661.
[3] Hubbard, M. and Bailey, M.J., (2018) Mastering Microsoft Teams. Mastering Microsoft Teams.
https://doi. Org/10.1007/978-1-4842-3670-3.
[4] Skelly, P., Hester, S., Ryan, T., Underwood, J., Bowden, E., Evans, T.K., Geurts, G., Lang, K.,
Liemohn, K., McCann, C. and Schubert Sr, M., (2014) The New Business Operating System:
Combining Office 365 and the Microsoft Cloud Ecosystem to Create Business Value.
[5] Ganesan, V. and Manoharan, S., (2015) Surround noise cancellation and speech enhancement using
sub band filtering and spectral subtraction. Indian Journal of Science and Technology, 8(33), p.1.
[6] Reddy, C.K., Gopal, V., Cutler, R., Beyrami, E., Cheng, R., Dubey, H., Matusevych, S., Aichner, R.,
Aazami, A., Braun, S. and Rana, P., (2020) The interspeech 2020 deep noise suppression challenge:
Datasets, subjective testing framework, and challenge results. arXiv preprint arXiv:2005.13981.
[7] Lin, S., Ryabtsev, A., Sengupta, S., Curless, B.L., Seitz, S.M. and Kemelmacher-Shlizerman, I.,
(2021) Real-time high-resolution background matting. In Proceedings of the IEEE/CVF Conference
on Computer Vision and Pattern Recognition (pp. 8762-8771).
[8] Amershi, S., Begel, A., Bird, C., DeLine, R., Gall, H., Kamar, E., Nagappan, N., Nushi, B. and
Zimmermann, T., (2019) May. Software engineering for machine learning: A case study. In 2019
IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in
Practice (ICSE-SEIP) (pp. 291-300). IEEE.
[9] Strake, M., Defraene, B., Fluyt, K., Tirry, W. and Fingscheidt, T., (2020) October. INTERSPEECH
2020 Deep Noise Suppression Challenge: A Fully Convolutional Recurrent Network (FCRN) for
Joint Dereverberation and Denoising. In INTERSPEECH (pp. 2467-2471).
[10]Panesar, A., (2019) Machine learning and AI for healthcare (pp. 1-73). Coventry, UK: Apress.
[11]Hinton, G., Deng, L., Yu, D., Dahl, G.E., Mohamed, A.R., Jaitly, N., Senior, A., Vanhoucke, V.,
Nguyen, P., Sainath, T.N. and Kingsbury, B., (2012) Deep neural networks for acoustic modeling in
speech recognition: The shared views of four research groups. IEEE Signal processing
magazine, 29(6), pp.82-97.
[12]Brynjolfsson, E. and Mcafee, A.N.D.R.E.W., (2017) Artificial intelligence, for real. Harvard
Business Review.
[13]Das, S., Dey, A., Pal, A. and Roy, N., (2015) Applications of artificial intelligence in machine
learning: review and prospect. International Journal of Computer Applications, 115(9).
[14]Jagadish, H.V., Gehrke, J., Labrinidis, A., Papakonstantinou, Y., Patel, J.M., Ramakrishnan, R. and
Shahabi, C., (2014) Big data and its technical challenges. Communications of the ACM, 57(7),
pp.86-94.
[15]Crick, M. ed., (2016) Power, Surveillance, and Culture in YouTube's Digital Sphere. IGI Global.
[16]Noda, K., Yamaguchi, Y., Nakadai, K., Okuno, H.G. and Ogata, T., (2015) Audio-visual speech
recognition using deep learning. Applied Intelligence, 42(4), pp.722-737.
[17]Rösler, P., (2018) On the End-to-End Security of Group Chats in In-stant Messaging Protocols.
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
41
[18]Cutler, R., Hosseinkashi, Y., Pool, J., Filipi, S., Aichner, R., Tu, Y. and Gehrke, J., (2021) Meeting
Effectiveness and Inclusiveness in Remote Collaboration. Proceedings of the ACM on Human-
Computer Interaction, 5(CSCW1), pp.1-29.
[19]Boyes, H., Hallaq, B., Cunningham, J., and Watson, T., (2018) The industrial internet of things
(IIoT): An analysis framework. Computers in industry, 101, pp.1-12.
[20]Lane, N.D. and Georgiev, P., (2015) February. Can deep learning revolutionize mobile sensing?
In Proceedings of the 16th International Workshop on Mobile Computing Systems and
Applications (pp. 117-122).
[21]Dash, B., Sharma, P., & Ali, A. (2022). Federated Learning for Privacy-Preserving: A Review of PII
Data Analysis in Fintech. International Journal of Software Engineering & Applications, 13(4), 1-13.
[22]Wang, B., Qi, Z., Ma, R., Guan, H. and Vasilakos, A.V., (2015) A survey on data center networking
for cloud computing. Computer Networks, 91, pp.528-547.
[23]Choudhary, B. and Rakesh, S.K., (2016) February. An approach using agile method for software
development. In 2016 International Conference on Innovation and Challenges in Cyber Security
(ICICCS-INBUSH) (pp. 155-158). IEEE.
[24]Attaran, M., Attaran, S. and Kirkland, D., (2019) The need for digital workplace: increasing
workforce productivity in the information age. International Journal of Enterprise Information
Systems (IJEIS), 15(1), pp.1-23.
[25]Géron, A., (2019) Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow: Concepts,
tools, and techniques to build intelligent systems. O'Reilly Media.
[26]Tidd, J. and Bessant, J.R., (2020) Managing innovation: integrating technological, market and
organizational change. John Wiley & Sons.
[27]Yang, P.R., and Meals, R.A., (2014) How to establish an interactive conference and Journal
Club. The Journal of hand surgery, 39(1), pp.129-133.
[28]Mutanen, T.P., Metsomaa, J., Liljander, S. and Ilmoniemi, R.J., (2018) Automatic and robust noise
suppression in EEG and MEG: The SOUND algorithm. Neuroimage, 166, pp.135-151.
[29]Jha, K., Doshi, A., Patel, P., and Shah, M., (2019) A comprehensive review on automation in
agriculture using artificial intelligence. Artificial Intelligence in Agriculture, 2, pp.1-12.
[30]Zhou, Z., Chen, X., Li, E., Zeng, L., Luo, K. and Zhang, J., (2019) Edge intelligence: Paving the last
mile of artificial intelligence with edge computing. Proceedings of the IEEE, 107(8), pp.1738-1762.
[31]Bender, E.M. and Friedman, B., (2018) Data statements for natural language processing: Toward
mitigating system bias and enabling better science. Transactions of the Association for
Computational Linguistics, 6, pp.587-604.
[32]Zhang, Z., (2012) Microsoft Kinect sensor and its effect. IEEE Multimedia, 19(2), pp.4-10.
[33]Garnett, R., Huegerich, T., Chui, C. and He, W., (2005) A universal noise removal algorithm with an
impulse detector. IEEE Transactions on image processing, 14(11), pp.1747-1754.
[34]Alshemali, B. and Kalita, J., (2020) Improving the reliability of deep neural networks in NLP: A
review. Knowledge-Based Systems, 191, p.105210.
[35]Dörk, M., Riche, N.H., Ramos, G. and Dumais, S., (2012) Pivotpaths: Strolling through faceted
information spaces. IEEE transactions on visualization and computer graphics, 18(12), pp.2709-
2718.
[36]Mamoshina, P., Ojomoko, L., Yanovich, Y., Ostrovski, A., Botezatu, A., Prikhodko, P., Izumchenko,
E., Aliper, A., Romantsov, K., Zhebrak, A. and Ogu, I.O., (2018) Converging blockchain and next-
generation artificial intelligence technologies to decentralize and accelerate biomedical research and
healthcare. Oncotarget, 9(5), p.5665.
[37]Fernández, A., del Río, S., López, V., Bawakid, A., del Jesus, M.J., Benítez, J.M. and Herrera, F.,
(2014) Big Data with Cloud Computing: an insight on the computing environment, MapReduce, and
programming frameworks. Wiley Interdisciplinary Reviews: Data Mining and Knowledge
Discovery, 4(5), pp.380-409.
[38]Pan, Y., Yao, T., Li, Y., Wang, Y., Ngo, C.W. and Mei, T., (2019). Transferrable prototypical
networks for unsupervised domain adaptation. In Proceedings of the IEEE/CVF Conference on
Computer Vision and Pattern Recognition (pp. 2239-2247).
[39]Rodriguez, M., Piattini, M. and Ebert, C., (2019) Software verification and validation technologies
and tools. IEEE Software, 36(2), pp.13-24.
[40]Sharma, P., Dash, B., and Ansari, M. F., (2022) Anti-phishing techniques – a review of Cyber
Defense Mechanisms, IJARCCE, vol. 11, no. 7, 2022.
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 15, No 1, February 2023
42
[41]Indu, I., Anand, P.R. and Bhaskar, V., (2018) Identity and access management in cloud environment:
Mechanisms and challenges. Engineering science and technology, an international journal, 21(4),
pp.574-588.
[42]Barona, R. and Anita, E.M., (2017) April. A survey on data breach challenges in cloud computing
security: Issues and threats. In 2017 International Conference on Circuit, Power and Computing
Technologies (ICCPCT) (pp. 1-8). IEEE.
[43]Elsayed, M.A.M.A., (2018) Advancing Security Services for Cloud Applications (Doctoral
dissertation, SQueen's University (Canada)).
[44]Ansari, M. F., Dash, B., Sharma P., and Yathiraju N., (2022) The impact and limitations of Artificial
Intelligence in cybersecurity: A literature review, IJARCCE, vol. 11, no. 9, 2022.
[45]Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O.,
Eranti, V., Moscicki, A. and Margolis, D., (2017, October) Data breaches, phishing, or malware?
Understanding the risks of stolen credentials. In Proceedings of the 2017 ACM SIGSAC conference
on computer and communications security (pp. 1421-1434).
[46]Attaran, M., Attaran, S. and Kirkland, D., (2019) The need for digital workplace: increasing
workforce productivity in the information age. International Journal of Enterprise Information
Systems (IJEIS), 15(1), pp.1-23.
[47]Davenport, T.H., (2018). From analytics to artificial intelligence. Journal of Business Analytics, 1(2),
pp.73-80.
[48]Haenlein, M. and Kaplan, A., (2019) A brief history of artificial intelligence: On the past, present,
and future of artificial intelligence. California management review, 61(4), pp.5-14.
[49]Ferrell, J. and Kline, K., (2018) Facilitating trust and communication in virtual teams. People &
Strategy, 41(2), pp.30-36.
[50]Dash, B. (2022) REMOTE WORK AND INNOVATION DURING THIS COVID-19 PANDEMIC:
AN EMPLOYERS’CHALLENGE.
[51]Ferrario, A., Loi, M. and Viganò, E., (2020). In AI we trust Incrementally: a Multi-layer model of
trust to analyze Human-Artificial intelligence interactions. Philosophy & Technology, 33(3), pp.523-
539.
[52]Dash, B., & Sharma, P. (2022). Role of Artificial Intelligence in Smart Cities for Information
Gathering and Dissemination (A Review). Academic Journal of Research and Scientific
Publishing, 4(39).
AUTHORS
Pawankumar Sharma is a Senior Product Manager for Walmart in San Bruno,
California. He is currently on his Ph.D. in Information Technology at the University
of the Cumberlands, Kentucky. Pawankumar completed his Master of Science in
Management Information Systems from the University of Nebraska at Omaha in
2015. He also holds another Master of Science in Information Systems Security from
the University of the Cumberlands, Kentucky, and graduated in 2020. His research
interests are in the areas of Cybersecurity, Artificial Intelligence, Cloud Computing,
Neural Networks, Information Systems, Big Data Analytics, Intrusion Detection, and Prevention.
Dr. Bibhu Dash is an Architect-Data Analytics and Analytics in a Fortune 100
financial organization in Madison, WI. He is a Ph.D. in Information Technology
from the University of the Cumberlands, Kentucky. Bibhu has completed his
Master of Engineering in Electronics and Communication Engineering and MBA
from Illinois State University, Normal, IL. Bibhu's research interests are in AI,
Cloud Computing, Big Data and Blockchain technologies.