Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673237
Jaspreet Singh, Deepinder Kaur, Guneet Kaur
The past few decades have witnessed a significant growth in the field of medical care and health facilities. People from around the globe raised their living standards in terms of sanitization skills and caring their physical system. However, the risk of chronic diseases is profound these days than the previous years. The automated IOT based monitoring systems for health of a chronic patient is the need of an hour. The advancements in the digital world has added few years in the lifespan of human. Having said that, technology is not a tool to keep human alive for centuries and it is not a solution to every medical problem. The only solution that can be possible with the technology is that, the healthcare monitoring can rectify the traditional way of dealing with the patient’s care. Moreover, the cost of patient keeping may be reduced by automating some of tasks of nursing staff and management. This paper presents a workable prototype for an automated health assistance based on IOT and machine learning. The proposed system is 81.4% accurate in terms of performance and it is validated against the existing benchmarks and is specially made to reduce the load of doctors and nurses.
{"title":"Automated Health Assistance based on IOT and Machine Learning","authors":"Jaspreet Singh, Deepinder Kaur, Guneet Kaur","doi":"10.1109/ICTAI53825.2021.9673237","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673237","url":null,"abstract":"The past few decades have witnessed a significant growth in the field of medical care and health facilities. People from around the globe raised their living standards in terms of sanitization skills and caring their physical system. However, the risk of chronic diseases is profound these days than the previous years. The automated IOT based monitoring systems for health of a chronic patient is the need of an hour. The advancements in the digital world has added few years in the lifespan of human. Having said that, technology is not a tool to keep human alive for centuries and it is not a solution to every medical problem. The only solution that can be possible with the technology is that, the healthcare monitoring can rectify the traditional way of dealing with the patient’s care. Moreover, the cost of patient keeping may be reduced by automating some of tasks of nursing staff and management. This paper presents a workable prototype for an automated health assistance based on IOT and machine learning. The proposed system is 81.4% accurate in terms of performance and it is validated against the existing benchmarks and is specially made to reduce the load of doctors and nurses.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114740561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673334
Meenu Lochan
Software Quality is an essential part of modern research, and up till now there are insufficient mechanisms in the intellectual environment to acknowledge, measure and to enhance quality parameters. In this paper, considering agile methodologies might produce software faster as well as boost software quality so that they complete quality necessities of the product. Choosing and adaptation of any methodology depends on the type and people involved in the project. Employee behavior, their mutual relations and enthusiasm is one of factors which can critically affect success of the method implementation. So, these factors also measured all through the version of agile methodology. There is no doubt that the foundation of agile techniques is people. The motive of this paper is to introduce a best method for implementation of the agile methodology. Finally In this paper, every issue affecting software quality assurance has been explored, and all fixes that are feasible have been provided. Practitioners may find the conclusions of this study useful in assessing specific measuring tools and application quality characteristics.
{"title":"Elevating Software Quality Role Using Angle Methodology","authors":"Meenu Lochan","doi":"10.1109/ICTAI53825.2021.9673334","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673334","url":null,"abstract":"Software Quality is an essential part of modern research, and up till now there are insufficient mechanisms in the intellectual environment to acknowledge, measure and to enhance quality parameters. In this paper, considering agile methodologies might produce software faster as well as boost software quality so that they complete quality necessities of the product. Choosing and adaptation of any methodology depends on the type and people involved in the project. Employee behavior, their mutual relations and enthusiasm is one of factors which can critically affect success of the method implementation. So, these factors also measured all through the version of agile methodology. There is no doubt that the foundation of agile techniques is people. The motive of this paper is to introduce a best method for implementation of the agile methodology. Finally In this paper, every issue affecting software quality assurance has been explored, and all fixes that are feasible have been provided. Practitioners may find the conclusions of this study useful in assessing specific measuring tools and application quality characteristics.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673166
Mohamed A M Iesa, Abhinandan P Shirahatt, Harsha Sharma, Mohit Kumar Goyal, Amit Shrivastava, Baba Vajrala
Now that diabetes is on the rise as a silent killer, it will have catastrophic consequences if preventative measures are not implemented soon enough. Given that diabetes cannot be cured after it has been diagnosed in a patient, early identification of the illness is critical in diabetes. Doctors are finding it more difficult to do manual detection as the number of patients grows on a daily basis. We can do some automobile detection using tools like Machine Learning. This issue of diabetes diagnosis has been the subject of much study up to this point. Using two ensemble machine learning algorithms like Random Forest and GBDT, this study does predictive analysis. Pima Indians Diabetes Dataset, which includes data of diabetes patients, was used in this study to conduct different experiments. The findings are presented in this article. This article also addresses the significance of output interpretability in the healthcare sector and explains how providing output interpretability together with the machine learning model’s output on the patient record would assist physicians in real-time (in the future).
{"title":"Novel Machine Learning Ensemble Models for Active Diabetes Diagnosis","authors":"Mohamed A M Iesa, Abhinandan P Shirahatt, Harsha Sharma, Mohit Kumar Goyal, Amit Shrivastava, Baba Vajrala","doi":"10.1109/ICTAI53825.2021.9673166","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673166","url":null,"abstract":"Now that diabetes is on the rise as a silent killer, it will have catastrophic consequences if preventative measures are not implemented soon enough. Given that diabetes cannot be cured after it has been diagnosed in a patient, early identification of the illness is critical in diabetes. Doctors are finding it more difficult to do manual detection as the number of patients grows on a daily basis. We can do some automobile detection using tools like Machine Learning. This issue of diabetes diagnosis has been the subject of much study up to this point. Using two ensemble machine learning algorithms like Random Forest and GBDT, this study does predictive analysis. Pima Indians Diabetes Dataset, which includes data of diabetes patients, was used in this study to conduct different experiments. The findings are presented in this article. This article also addresses the significance of output interpretability in the healthcare sector and explains how providing output interpretability together with the machine learning model’s output on the patient record would assist physicians in real-time (in the future).","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114938665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673384
Srishti Sabharwal, Jaspreet Kaur, Ashim Shahi
Wireless communication is evolving at a greater pace with the continuous introduction of new services and this hiking graph of technologies also requires update in Antenna systems. This paper overviews crucial advancements in the MIMO(Multiple- Input Multiple-output) systems and in context to this, key aspects of single user MIMO and multiuser MIMO are also discussed. Overview of Open loop and closed loop, SU (single user) MIMO is provided with analysis of Data Rate maximization in MIMO along with review of Uplink and downlink technologies of MU (Multi User)-MIMO. This paper also provides insight about convex optimization techniques in MIMO design.
{"title":"A Survey of Advances in MIMO Techniques for Mobile Communication","authors":"Srishti Sabharwal, Jaspreet Kaur, Ashim Shahi","doi":"10.1109/ICTAI53825.2021.9673384","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673384","url":null,"abstract":"Wireless communication is evolving at a greater pace with the continuous introduction of new services and this hiking graph of technologies also requires update in Antenna systems. This paper overviews crucial advancements in the MIMO(Multiple- Input Multiple-output) systems and in context to this, key aspects of single user MIMO and multiuser MIMO are also discussed. Overview of Open loop and closed loop, SU (single user) MIMO is provided with analysis of Data Rate maximization in MIMO along with review of Uplink and downlink technologies of MU (Multi User)-MIMO. This paper also provides insight about convex optimization techniques in MIMO design.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129648702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673424
Parinishtha Surya, P. Pachauri, Ansh Pachauri, Prateek Chaturvedi, S. Yadav, Divya Singh
Cloud computing is dynamically evolving with high end services that are available in low costs and are easily accessible on-demand. Virtualization has made it possible to access data and resources from anywhere on a pay-as-you-use basis. With the magnification of cloud applications, there arises a need to identify the risks associated with virtualization technology. One big issue is configuration management of such a heterogeneous network. There is a need to design a secure access mechanism to handle the multi-tenancy. Virtualization faces a big challenge in resource allocation and developing trust among its users. Handling the data migration among virtual machines is another big issue. The evaluation of service level agreement of the service provider is also very important. It must cover all the details of agreement defining all the services that the CSP is promising along with the associated charges in detail.
{"title":"Virtualization Risks and associated Issues in Cloud Environment","authors":"Parinishtha Surya, P. Pachauri, Ansh Pachauri, Prateek Chaturvedi, S. Yadav, Divya Singh","doi":"10.1109/ICTAI53825.2021.9673424","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673424","url":null,"abstract":"Cloud computing is dynamically evolving with high end services that are available in low costs and are easily accessible on-demand. Virtualization has made it possible to access data and resources from anywhere on a pay-as-you-use basis. With the magnification of cloud applications, there arises a need to identify the risks associated with virtualization technology. One big issue is configuration management of such a heterogeneous network. There is a need to design a secure access mechanism to handle the multi-tenancy. Virtualization faces a big challenge in resource allocation and developing trust among its users. Handling the data migration among virtual machines is another big issue. The evaluation of service level agreement of the service provider is also very important. It must cover all the details of agreement defining all the services that the CSP is promising along with the associated charges in detail.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131075548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673232
Neha Singh, Deepali Virmani
Remote Sensor Network (WSN) have gotten continuously one of the sultriest investigation regions in the field of software engineering. This is a result of their wide extent of employments, including location applications, transportation. To keep the security and dependability of WSN, a framework forestalling and distinguishing interruptions is the need of 60 minutes. Research zeroing in on these sorts of frameworks ought to follow the characteristics of WSNs and should fit for perceiving greatest security dangers. This paper proposes an original framework for forestalling and identifying interruptions in remote sensor organizations. The proposed model is a blend of two interruption forestalling and identifying strategy. For avoidance of assaults, the paper utilizes Fuzzified philosophy to deflect Intrusions in Wireless Sensor Network (FzMAI). For recognition of assaults, MBSCIH (Multi to twofold class size-based lopsidedness dealing with procedure) method is utilized. The defined framework acts in two stages: In avoidance stage, we keep an interruption from entering a remote sensor organization. As counteraction isn't penny percent, hardly any malevolent hubs enter the framework, prompting identification stage. In identification stage, the entered malignant hubs are distinguished utilizing MBSCIH. The confirmation of defined system is done on WSN-DS. Our framework yields a precision of 99.97%.
{"title":"FZMAI and MBSCIH Model for Preventing and Detecting Intrusions in Wireless Sensor Network","authors":"Neha Singh, Deepali Virmani","doi":"10.1109/ICTAI53825.2021.9673232","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673232","url":null,"abstract":"Remote Sensor Network (WSN) have gotten continuously one of the sultriest investigation regions in the field of software engineering. This is a result of their wide extent of employments, including location applications, transportation. To keep the security and dependability of WSN, a framework forestalling and distinguishing interruptions is the need of 60 minutes. Research zeroing in on these sorts of frameworks ought to follow the characteristics of WSNs and should fit for perceiving greatest security dangers. This paper proposes an original framework for forestalling and identifying interruptions in remote sensor organizations. The proposed model is a blend of two interruption forestalling and identifying strategy. For avoidance of assaults, the paper utilizes Fuzzified philosophy to deflect Intrusions in Wireless Sensor Network (FzMAI). For recognition of assaults, MBSCIH (Multi to twofold class size-based lopsidedness dealing with procedure) method is utilized. The defined framework acts in two stages: In avoidance stage, we keep an interruption from entering a remote sensor organization. As counteraction isn't penny percent, hardly any malevolent hubs enter the framework, prompting identification stage. In identification stage, the entered malignant hubs are distinguished utilizing MBSCIH. The confirmation of defined system is done on WSN-DS. Our framework yields a precision of 99.97%.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132853167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673361
Shubhi Gupta, Sanjeev Thakur, Ashutosh Gupta
In order to build a PC-assisted device for eye diseases, automatic optic disc (OD) detection plays a very important role. Face condition testing is a limiting factor. Optic Disk detection belongs to a supervised approach. The suggested approach uses the fundus image’s edge information to locate the Optic Disk and identify the presence of abnormality such as a cancer. The Sobel edge detector uses the watershed algorithm to collect edge information and segmentation. Then the Hough circle transformation is performed to approximate the Optic Disk boundary by a circle.
{"title":"An enhancive Watershed transformation approach to segment Optic Disk from Smartphone Fundus Images","authors":"Shubhi Gupta, Sanjeev Thakur, Ashutosh Gupta","doi":"10.1109/ICTAI53825.2021.9673361","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673361","url":null,"abstract":"In order to build a PC-assisted device for eye diseases, automatic optic disc (OD) detection plays a very important role. Face condition testing is a limiting factor. Optic Disk detection belongs to a supervised approach. The suggested approach uses the fundus image’s edge information to locate the Optic Disk and identify the presence of abnormality such as a cancer. The Sobel edge detector uses the watershed algorithm to collect edge information and segmentation. Then the Hough circle transformation is performed to approximate the Optic Disk boundary by a circle.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673157
Faozi A. Almaqtari, Najib H. S. Farhan, Monir Yahya Salmony, Waleed M. Al‐ahdal, Nandita Mishra
The present study highlights earning management optimization possibilities to constrain the events of earning management and financial fraud. Our study investigates the existing stock of knowledge and strand literature available on earning management and fraud detection. It aims to review systematically the methods and techniques used by prior research to determine earning management and fraud detection. The results indicate that prior research in earning management optimization is diverged among several techniques and none of these techniques has provided an ideal optimization for earning management. Further, the results reveal that earning management determinants are complex based on the type and size of business entities which complicate the optimization possibilities. The current research brings useful insights for predicting and optimization of earnings management and financial fraud. The present study has significant implications for policymakers, stock markets, auditors, investors, analysts, and professionals.
{"title":"Earning management estimation and prediction using machine learning: A systematic review of processing methods and synthesis for future research","authors":"Faozi A. Almaqtari, Najib H. S. Farhan, Monir Yahya Salmony, Waleed M. Al‐ahdal, Nandita Mishra","doi":"10.1109/ICTAI53825.2021.9673157","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673157","url":null,"abstract":"The present study highlights earning management optimization possibilities to constrain the events of earning management and financial fraud. Our study investigates the existing stock of knowledge and strand literature available on earning management and fraud detection. It aims to review systematically the methods and techniques used by prior research to determine earning management and fraud detection. The results indicate that prior research in earning management optimization is diverged among several techniques and none of these techniques has provided an ideal optimization for earning management. Further, the results reveal that earning management determinants are complex based on the type and size of business entities which complicate the optimization possibilities. The current research brings useful insights for predicting and optimization of earnings management and financial fraud. The present study has significant implications for policymakers, stock markets, auditors, investors, analysts, and professionals.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132312412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9672770
Susheel George Joseph, S. Jadhav, Smita Sharma, Amarjeet Poonia, Anurag Shrivastava, S. Hemavathi
Many service-related tasks can now be completed swiftly and efficiently thanks to advancements in mobile communications. Mobile banking is one such solution that has eliminated the requirement for many ordinary transactions to be completed at a branch. Mobile phones can supplement the reach in a country like India, where the last mile is reached through brick-and-mortar banking facilities. This paper explains how a mobile cloud framework can be used for banking and customer services to improve the customer’s banking experience while also assuring data security. This article focuses on cloud-based risk design for banking products to address challenges such as processing speed and storage capacity in mobile banking. The system is evaluated using an improved random forecast technique. This proposed system fulfils 99% of the accuracy.
{"title":"Analysis of the Secure Cloud Framework for Mobile Banking","authors":"Susheel George Joseph, S. Jadhav, Smita Sharma, Amarjeet Poonia, Anurag Shrivastava, S. Hemavathi","doi":"10.1109/ICTAI53825.2021.9672770","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9672770","url":null,"abstract":"Many service-related tasks can now be completed swiftly and efficiently thanks to advancements in mobile communications. Mobile banking is one such solution that has eliminated the requirement for many ordinary transactions to be completed at a branch. Mobile phones can supplement the reach in a country like India, where the last mile is reached through brick-and-mortar banking facilities. This paper explains how a mobile cloud framework can be used for banking and customer services to improve the customer’s banking experience while also assuring data security. This article focuses on cloud-based risk design for banking products to address challenges such as processing speed and storage capacity in mobile banking. The system is evaluated using an improved random forecast technique. This proposed system fulfils 99% of the accuracy.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132788231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673307
Silky Sharma, Gurinder Singh
To meet expectations of stakeholders in Education 4.0, the inclination towards acceptance, testing, and implementation of Voice Assistants has increased at a faster pace in western universities. This study has been done to understand the present level of performance and capability of voice assistants in answering the basic queries of users from Indian Higher education sector. Three voice assistants namely Amazon Alexa, Microsoft Cortana, and Google Assistant have been considered for a survey in which 100 students participated and tested the performance of these three voice assistants by asking basic questions related to admission and examination. A set of total 14 questions has been selected to be asked by user in both the categories. Category 1 related to Admissions contained 7 little complex questions while category 2 related to Examination had 7 direct and simpler questions. Responses of the users were noted down and after careful analysis, the explanations have been deduced about performance of these voice assistants in factors considered: understanding of voice and language of user, understanding of basic meaning of the question, request to repeat the question, whether the answer was given by voice assistants and quality of the answer received. As per the results, various observations have been noted that may further help Artificial Intelligence developers and programmers to understand the success and failure of voice assistants and accordingly bring improvements in their performance level. This study also helps in knowing about huge applications, contributions and benefits these voice assistants offer to the stakeholders. Once the improvements are incorporated by the developers, marketing professionals can boost the absorption and use of voice assistants in massive higher education sector of India by convincing the important stakeholders that also paves a way to tap into more undiscovered possibilities about use of Artificial Intelligence in higher education system at global level.
{"title":"Comparison of Voice Based Virtual Assistants fostering Indian Higher Education – A Technical Perspective","authors":"Silky Sharma, Gurinder Singh","doi":"10.1109/ICTAI53825.2021.9673307","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673307","url":null,"abstract":"To meet expectations of stakeholders in Education 4.0, the inclination towards acceptance, testing, and implementation of Voice Assistants has increased at a faster pace in western universities. This study has been done to understand the present level of performance and capability of voice assistants in answering the basic queries of users from Indian Higher education sector. Three voice assistants namely Amazon Alexa, Microsoft Cortana, and Google Assistant have been considered for a survey in which 100 students participated and tested the performance of these three voice assistants by asking basic questions related to admission and examination. A set of total 14 questions has been selected to be asked by user in both the categories. Category 1 related to Admissions contained 7 little complex questions while category 2 related to Examination had 7 direct and simpler questions. Responses of the users were noted down and after careful analysis, the explanations have been deduced about performance of these voice assistants in factors considered: understanding of voice and language of user, understanding of basic meaning of the question, request to repeat the question, whether the answer was given by voice assistants and quality of the answer received. As per the results, various observations have been noted that may further help Artificial Intelligence developers and programmers to understand the success and failure of voice assistants and accordingly bring improvements in their performance level. This study also helps in knowing about huge applications, contributions and benefits these voice assistants offer to the stakeholders. Once the improvements are incorporated by the developers, marketing professionals can boost the absorption and use of voice assistants in massive higher education sector of India by convincing the important stakeholders that also paves a way to tap into more undiscovered possibilities about use of Artificial Intelligence in higher education system at global level.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}