N. Sreevidya, Rekulapally Sushma Sai, Prathani Akshit,Bhavani Medi


As the use of artificial intelligence increases, this technology is more advanced than ever. Artificial intelligence is integrated into the components of life. What was unthinkable 10 years ago is now a casual act, with fluent conversations with computers. This was made possible by concepts of machine learning and speech recognition. That is, you can only run and complete user-designed quests. Plus, get started with audiobooks, SIM tracking, and Google Meet right away. Even if we combine voice technology with human-like conversations, There is no need to talk to our devices and have a conversation to complete our task of choice. The real focus should be on unspoken commands in completing the user’s task as quickly as possible. Voice UI is getting popular as it makes the work easy and when it is integrated with a device it will become a good user product. This is why we developed a personalized user-designated model that fulfills all the features and provides a good experience


Artificial intelligence, speaking, proceeding, LANGUAGE

Full Text:



J. S. Edu, J. M. Such, and G. Suarez-Tangil, “Smart Home Personal Assistants: A Security and Privacy Review,” arXiv preprint arXiv:1903.05593, 2019.

Citius Minds. The Evolution of Smart Homes. Available: Accessed on Sept. 10, 2020.

E. C. Paraiso and J.-P. Barthès, “A Voice-Enabled Assistant in Multi-Agent System for e-Government Service,”Proceedings of the Intl. Symposium and School on Advanced Distributed Systems, pp. 495–503, 2005. Available:

M. Jefferson, “Usability of Automatic Speech Recognition Systems for Individuals with Speech Disorders: Past, Present, Future, and a Proposed Model,” University of Minnesota Digital Conservancy, 2019. Available:

N. Friedman, A. Cuadra, R. Patel, S. Azenkot, J. Stein, and W. Ju, “Voice Assistant Strategies and Opportunities for People with Tetraplegia,” Proceedings of the 21st. Intl. ACM SIGACCESS Conf. on Computers and Accessibility, pp. 575–577, 2019. Available:

S. Perez, Smart Speakers Hit Critical Mass in 2018. Available: Accessed on Sept. 10, 2020.28

Google Trends 2020. Worldwide relative interest in the search term “voice assistant.” Available: Accessed on Sept. 10, 2020.

S. Perez, 41% of Voice Assistant Users Have Concerns About Trust and Privacy, Report Finds, 2019. Available: Accessed on Sept. 10, 2020.

T.Ammari, J. Kaye, J. Y. Tsai, and F. Bentley, “Music, Search, and IoT: How People (Really) Use Voice Assistants,” ACM Transactions on Computer-Human Interaction, vol. 26, no. 3, pp. 1–28, 2019. Available:[12]Microsoft, Inc. (2019). Voice Report. From Answers to Action: Customer Adoption of Voice Technology and Digital Assistants. White Paper. Available: on Sept. 10, 2020.

C. Fisher, Amazon Enlists 30 Companies to Improve How Voice Assistants Works Together. Web resource, 2019. Available: on Sept. 10, 2020.

S. Lafia, J. Xiao, T. Hervey, and W. Kuhn, “Talk of the Town: Discovering Open Public Data via Voice Assistants,” Proceedings of the 14th Intl. Conf on Spatial Information Theory, pp. 10:1–10:7, 2019.

Khairunisa Sharif, Bastian Tenbergen, “Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities”, University of New York at Oswego, Available: 10.7250/csimq.2020-24.02

A. Holmes, The FBI just issued a warning about the risks of owning a smart TV — here are its suggestions for protecting your privacy, 2019. Available: Accessed on Sept. 10, 2020.

M. Ford and W. Palmer, “Alexa, are you listening to me? An analysis of Alexa voice service network traffic,”Personal and Ubiquitous Computing, vol. 23, no. 1, pp. 67–79, 2019. Available:

L.Armasu, L. Alexa, Google Assistant, Siri Vulnerable to Laser Beam Hacking, 2019. Available: Accessed on Sept. 10, 2020.

W. Yan, K. Liu, Q. Zhou, H. Gui, and N. Zhang, “SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves,” Proceedings of the Network and Distributed Systems Security Symposium, 2020. Available:



  • There are currently no refbacks.

Copyright (c) 2022 International Journal of Advanced Research in Computer Science