0% found this document useful (0 votes)
17 views4 pages

JETIR2003165

The document discusses building an intelligent virtual assistant using artificial intelligence and Python that can perform tasks through voice commands with high accuracy. It describes the features and functions of a virtual personal assistant including managing tasks, accessing the internet, and hardware and software requirements. The document compares existing virtual assistant systems to the proposed system which aims to have very minimal error in speech recognition.

Uploaded by

Swathi haveri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views4 pages

JETIR2003165

The document discusses building an intelligent virtual assistant using artificial intelligence and Python that can perform tasks through voice commands with high accuracy. It describes the features and functions of a virtual personal assistant including managing tasks, accessing the internet, and hardware and software requirements. The document compares existing virtual assistant systems to the proposed system which aims to have very minimal error in speech recognition.

Uploaded by

Swathi haveri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

© 2020 JETIR March 2020, Volume 7, Issue 3 www.jetir.

org (ISSN-2349-5162)

VIRTUAL ASSISTANT USING


ARTIFICIAL INTELLIGENCE AND
PYTHON
A. Sudhakar Reddy M, Vyshnavi, C. Raju Kumar, and Saumya

Abstract— An intelligent virtual assistant (IVA) or intelligent Another market driver for the electronic assistant is that the
personal assistant (IPA) may be a software agent which automobile has become a mobile office, making safety an
will perform tasks or services for a increasingly important issue. Using voice commands instead of
private supported commands or questions. Sometimes the term
"chatbot" is employed to ask virtual assistants generally or
touch-tones is not only a convenience, it is being perceived by
specifically accessed by online chat. In some cases, online chat consumers as a safety necessity. The global market for unified
programs are exclusively for entertainment purposes. Some messaging services is expected to be a considerable share of the
virtual assistants are ready to interpret human speech and telecomm applications. It is estimated that it will be worth
respond via synthesized voices. Users can ask their assistants several billions by 2007.
questions, control home automation devices and media
playback via voice, and manage other basic tasks like email, to-
do lists, and calendars with verbal commands.

Keywords- VPA, NLP, Speech to text, Text Analyzing,


Artificial Intelligence.

I. INTRODUCTION

G one are the days when humans depended on other humans


for help or services. The digitalization of the world made sure
that humans no need to contact anyone else to seek help, they
could depend on a far more efficient and reliable device which
can take care of their everyday needs. The computers, mobiles, While indirect revenues for the carriers will be several folds. A
laptops, etc., became a part of us and our daily life, It could few companies has started offering converging products in the
carry out simple calculations to complex programs to reduce VPA direction, e.g. Conita, WildFire, VoxSurf, VoiceGeneie,
monotonous work and waste of manpower. and VoiceTel, and Mitel Networks, though one or two provide
Virtual Personal Assistant has almost become a basic necessity solutions for mobile carrier environment.
in all electronic devices so as to execute the required problems
easily. More than just being a bot , VPA can make life easier
for the user in various ways. Speech recognition is one of the
relatively new integration into the VPA. But, though its
moderately efficient , it is not very helpful and are not used by
the user due to its high amount of error. Though the error
percentage of the upcoming VPAs is around 5 percent, it still is
not quite up to the mark to where it becomes a basic part of the
users life. Thus the projects aim is to build a VPA with speech
recognition which has a very minimal error percentage.

Voice recognition is a complex process using advanced


concepts like neural networks and machine learning. The
auditory input is processed and a neural network with vectors
for each letter and syllable is created. This is called the data set
. When a person speaks the device compares it to this vector and In summary, VPA promises to provide hands-free, eyes-free
the different syllables are pulled out with which it has the access to the web anywhere, any time, from any phone.
highest correspondence.

JETIR2003165 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 1116
© 2020 JETIR March 2020, Volume 7, Issue 3 www.jetir.org (ISSN-2349-5162)

II. FEATURES OF VPA


A. Tasks
A task is a personal or work-related assignment you want to
track through completion. A task can occur once or repeat (a
recurring task). A recurring task can repeat at regular intervals
or repeat based on the date you mark the task complete. For
example, you might want to send a status report to your
manager on the last Friday of every month, and get a haircut
when one month has passed since your last haircut. Recurring
tasks are added one at a time to the task list. When you mark
one occurrence of the task complete, the next occurrence
appears in the list.

Users can also create Task Requests. A task request enables the
user to assign tasks to the other people, and to receive task
requests from others. When someone assigns a task, that
person gives up ownership of the task (unless the task is IV. HARDWARE AND SOFTWARE REQUIREMENTS
declined). Anyone who assigns a task can keep an updated copy
Hardware:
in their task list and receive status reports for the task.
Associated with task requests is a task list. A list that includes  A phone with a touch screen interface.
the name of the person who originally sent the task request plus  Phone Ram should be of a minimum 512 MB.
the names of everyone who also received the task request,  Internet connectivity.
reassigned the task to someone else, and chose to keep an  The phone should have USB debugging mode for
updated copy of the task in their task lists. VPA provides VUI development and testing purposes.
to the MS Outlook task manager.

B. Internet Applications Software:


The VPA allows personnel to access, customize, and engage the  Operating system should be android 4.1/win 8.1/IOS 6
internet to help them source information ranging from weather, or higher.
directions and schedules, to stock performance,
 The kernel version should be 3.0.16 or higher.
competitive data and news. All using simple, conversational
voice commands, e.g. trip management, airline reservation and  Support of other basic applications like maps,
hotel reservations. calendar, camera, web connection etc.

The convergence of the richness of the internet and the V. EXISTING AND PROPOSED SYSTEM
accessibility and mobility of the phone is now forming a vast Existing Model
new network - a Voice Web - where Internet content can be
accessed from any phone, anywhere, using human voice. A Most of the existing projects have only used speech recognition
voice portal can be defined as "speech-enabled access to Web- using neural networks. Though their systems have a moderate
based information." In other words, a voice portal provides accuracy, they are not for practical usage nor efficient to be of
telephone users with a natural-language interface to access and any real use .There are a few rudimentary techniques used by
retrieve Web content. An Internet browser can provide Web them:
access from a computer but not from a telephone. A voice portal
is a way to do that.
1. Context-aware computing:
The emerging Voice Web (or voice portals) is all about
distributed voice-enabled content known as voice sites that can Context-aware computing is a class of systems that have the
be accessed from any telephone using a standard voice browser. ability to sense their physical environment and adapt
This emerging technology creates a new model for business themselves to it accordingly. These can be used for recognizing
applications known as V-Commerce. words spoken by people with varying accents. It can also
deduce words that may have been misspoken.

2. MFCC:

MFCC refers to the Mel-Frequency Cepstral Coefficients. MFC


(Mel-Frequency Cepstrum) is a collection of these coefficients.
III. SYSTEM ARCHITECTURE It amounts to the short-term power spectrum of a sound. These
The system architecture of this projects shows the flow of the can be used to sense variations in sound so as to recognize the
control through the system. It also shows the hardware and the various variables required for voice recognition.
software required for the execution of the program. The
architecture diagram is as follows :

JETIR2003165 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 1117
© 2020 JETIR March 2020, Volume 7, Issue 3 www.jetir.org (ISSN-2349-5162)

3. NLP:

Natural Language Programming is a branch of Artificial


Intelligence that deals with the interactions of computer and
human languages. It mainly focuses on how to program the
computers so that they can process the large lume of data on
natural languages. This concept is used to familiarize the
computer with the various words in a particular language and
also to recognize them when spoken.

Proposed Model
Speech to text:
 A Piece of software used that converts audio to text. It
doesn’t understand just anything you might say.

Text Analyzing:  Automatic Speech Recognition : To understand


 Converted text is just letters for computer. command according to user’s input.
 A piece of software converts text to something that is
understandable for computer.
 Computer understands the command, so Virtual
Assistant like siri convert this text to computer
command.
 VPAs maps the words to functions and parameters to
create a command that computer can understand.

The major milestone that this project tries to achieve is that it


tries it increase the accuracy of the speech to text software.
Meaning the software will theoretically be able to convert any
speech with slight modulations or different accents into text
with high level of accuracy and precision needed for day to day
usability of the VPA. The software essentially combines voice
recognition using neural networks and lip movement detection
using machine learning to increase the precision of the word
spoken.
For people with different accents, just voice recognition will
be useless because the words they speak will be vastly different
 Artificial Intelligence : To learn things from user and
from the actual word by the computer’s point of view because
the vectors or the values stored for that particular word would to store all information about behaviour and relations
have been gotten only based on the word being spoken in a of user.
particular accent. So here is where lip movement recognition The ability of a system to calculate, reason, perceive
comes into play. relationships and analogies, learn from experience,
For most words, though in a different accent, the movement of store and retrieve information from memory, solve
the lips remains similar enough to deduce the word. Thus, lip
problems, comprehend complex ideas, use natural
movement recognition helps cutting down the various other
words which would have had the same likeliness as per the language fluently, classify, generalize, and adapt new
voice recognition software. situations.

VI. WORKING PRINCIPLES


The working of Virtual Assistant uses following principles:
 Natural Language Processing : Natural Language
Processing (NLP) refers to AI method of
communicating with an intelligent systems using a
 Inter Process Communication : To get important
natural language such as English.
information from other software applications.
Processing of Natural Language is required when you
want an intelligent system like robot to perform as per .
your instructions, when you want to hear decision
from a dialogue based clinical expert system, etc. VII. CONCLUSION

Five Steps in Natural Language Processing are: The paper describes a new emerging service for mobile user.
The Virtual Personal Assistance provides an intelligent
JETIR2003165 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 1118
© 2020 JETIR March 2020, Volume 7, Issue 3 www.jetir.org (ISSN-2349-5162)

computer secretarial service for mobile professionals. The new [7] Nguyen, A. and Wobcke, W. (2005), “An Agent-Based Approach to
service is based on convergence of internet, speech recognition Dialogue Management in Personal Assistant”, Proceedings of the 2005
technology and mobile technologies. International Conference on Intelligent User Interfaces.
[8] Jurafsky & Martin. Speech and Language Processing – An Introduction
The VPA minimizes the interruption of the user, improves the
to Natural Language Processing, Computational Linguistics, and Speech
utilization of his time, and provides a single point of
Recognition. Prentice-Hall Inc., New Jersey,2000.
communication for all his messages, contacts, schedule, and [9] Wobcke, W., Ho. V., Nguyen, A. and Krzywicki, A. (2005), “ A BDI
source of information. The paper proposes as well a decision Agent Architecture for Dialogue Modeling and Coordination in a Smart
structure for call screening, as well as handling requests for Personal Assistant”, Proceedings of the 2005 IEEE/WIC /ACM
meetings and appointment. The system initially targets lawyers, International Conference on Intelligent Agent Technology.
doctors, sales personnel, small offices, maintenance crews, etc. [10] Knote, R., Janson, A., Eigenbrod, L. and Söllner, M., 2018. The What
However, it is expected to become a standard feature for and How of Smart Personal Assistants: Principles and Application
millions of other users. Domains for IS Research.
[11] Feng, H., Fawaz, K. and Shin, K.G., 2017, October. Continuous
It overcomes many of the drawbacks in the existing solutions. authentication for voice assistants. In Proceedings of the 23rd Annual
International Conference on Mobile Computing and Networking (pp. 343-
It is mainly built to make a much more efficient VPA o that they
355). ACM.
can be brought into much more practical day to day uses. But
[12] Canbek, N.G. and Mutlu, M.E., 2016. On the track of artificial
the system has its own limitation. Though the efficiency is high intelligence: Learning with intelligent personal assistants. Journal of
the time consumption for each task to complete maybe higher Human Sciences, 13(1), pp.592-601.
than the other VPAs and also the complexity of the algorithms [13] Hwang, I., Jung, J., Kim, J., Shin, Y. and Seol, J.S., 2017, March.
and the concepts would make it very tough to tweak it if needed Architecture for Automatic Generation of User Interaction Guides with
in the future. Intelligent Assistant. In Advanced Information Networking and
Applications Workshops (WAINA), 2017 31st International Conference
ACKNOWLEDGMENT on (pp. 352-355). IEEE.
[14] Buck, J.W., Perugini, S. and Nguyen, T.V., 2018, January. Natural
It is our proud privilege and duty to acknowledge the kind of Language, Mixed-initiative Personal Assistant Agents. In Proceedings of
help and guidance received from several people in preparation the 12th International Conference on Ubiquitous.
of this report. It would not have been possible to prepare this
project in this form without their valuable help, cooperation and
guidance. First and foremost, we thank our project coordinator
Mrs. Bhagya M,Assoc .Professor Department of Computer
Science and Engineering and our Project guideMr. Sudhakara
Reddy M,Asst.Professor Department of Computer Science
and Engineering, Nagarjuna College of Engineering and
Technology for their valuable guidance and all the
encouragement that lead towards completion of our project. We
would like to thank Dr . Anitha Patil, HOD, Department of
Computer Science and Engineering, Nagarjuna College of
Engineering and Technology for his valuable
suggestions and guidance throughout the period of this project.
We also wish to record our sincere gratitude Dr. Srikanta
Murthy K, Principal, Nagarjuna College of Engineering and
Technology for his constant support and encouragement in
preparation of this report and for providing making providing
Library and laboratory facilities needed to prepare this project
report.

Last but not least, we would like to thank our parents, friends,
teaching and non-teaching staff of NCET.

REFERENCES
[1] G. O. Young, “Synthetic structure of industrial plastics (Book style with
paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New
York: McGraw-Hill, 1964, pp. 15–64.
[2] W.-K. Chen, Linear Networks and Systems (Book styl\e). Belmont, CA:
Wadsworth, 1993, pp. 123–135.
[3] H. Poor, An Introduction to Signal Detection and Estimation. New York:
Springer-Verlag, 1985, ch. 4.
[4] B. Smith, “An approach to graphs of linear forms (Unpublished work
style),” unpublished.
[5] E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for
publication),” IEEE Trans. Antennas Propagat., to be published.
[6] Ardissono, L., Boella. And Lesmo, L. (2000) “A Plan-Based
AgentArchitecture for Interpreting Natural Language Dialogue”,
International Journal of Human-Computer Studies.

JETIR2003165 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 1119

You might also like