Open Access Open Access  Restricted Access Subscription Access

Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms


Affiliations
1 School of Computer and Information Science, University of the Cumberlands, KY, United States
2 Department of Computer and Information Science, University of the Cumberlands, KY, United States
 

The normal method for analyzing technology is formulating many search queries to extract patent datasets and filter the data physically. The purpose of filtering the collected data is to remove noise to guarantee accurate information analysis. With the advancement in technology and machine learning, the work of physical analysis of the patent can be programmed so the system can remove noise depending on the results based on the previous data. Microsoft team generates a new artificial intelligence model that provides solutions on how individuals respond to speakers. Microsoft team, workplace, Facebook, and Google collected data from many active users hence developing artificial intelligence to minimize distracting background noise, barking and typing during the call.

Keywords

Artificial Intelligence, NLP, Microsoft Teams, Speech Identification, Video Call, Video Signal Data, Machine Learning.
User
Notifications
Font Size

  • Nassif, A.B., Shahin, I., Attili, I., Azzeh, M. and Shaalan, K., (2019). Speech recognition using deep neural networks: A systematic review. IEEE Access, 7, pp.19143-19165.
  • Duan, S., Zhang, J., Roe, P. and Towsey, M., (2014) A survey of tagging techniques for music, speech, and environmental sound. Artificial Intelligence Review, 42(4), pp.637-661.
  • Hubbard, M. and Bailey, M.J., (2018) Mastering Microsoft Teams. Mastering Microsoft Teams. https://doi. Org/10.1007/978-1-4842-3670-3.
  • Skelly, P., Hester, S., Ryan, T., Underwood, J., Bowden, E., Evans, T.K., Geurts, G., Lang, K., Liemohn, K., McCann, C. and Schubert Sr, M., (2014) The New Business Operating System: Combining Office 365 and the Microsoft Cloud Ecosystem to Create Business Value.
  • Ganesan, V. and Manoharan, S., (2015) Surround noise cancellation and speech enhancement using sub band filtering and spectral subtraction. Indian Journal of Science and Technology, 8(33), p.1.
  • Reddy, C.K., Gopal, V., Cutler, R., Beyrami, E., Cheng, R., Dubey, H., Matusevych, S., Aichner, R., Aazami, A., Braun, S. and Rana, P., (2020) The interspeech 2020 deep noise suppression challenge: Datasets, subjective testing framework, and challenge results. arXiv preprint arXiv:2005.13981.
  • Lin, S., Ryabtsev, A., Sengupta, S., Curless, B.L., Seitz, S.M. and Kemelmacher-Shlizerman, I., (2021) Real-time high-resolution background matting. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 8762-8771).
  • Amershi, S., Begel, A., Bird, C., DeLine, R., Gall, H., Kamar, E., Nagappan, N., Nushi, B. and Zimmermann, T., (2019) May. Software engineering for machine learning: A case study. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (pp. 291-300). IEEE.
  • Strake, M., Defraene, B., Fluyt, K., Tirry, W. and Fingscheidt, T., (2020) October. INTERSPEECH 2020 Deep Noise Suppression Challenge: A Fully Convolutional Recurrent Network (FCRN) for Joint Dereverberation and Denoising. In INTERSPEECH (pp. 2467-2471).
  • Panesar, A., (2019) Machine learning and AI for healthcare (pp. 1-73). Coventry, UK: Apress.
  • Hinton, G., Deng, L., Yu, D., Dahl, G.E., Mohamed, A.R., Jaitly, N., Senior, A., Vanhoucke, V., Nguyen, P., Sainath, T.N. and Kingsbury, B., (2012) Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal processing magazine, 29(6), pp.82-97.
  • Brynjolfsson, E. and Mcafee, A.N.D.R.E.W., (2017) Artificial intelligence, for real. Harvard Business Review.
  • Das, S., Dey, A., Pal, A. and Roy, N., (2015) Applications of artificial intelligence in machine learning: review and prospect. International Journal of Computer Applications, 115(9).
  • Jagadish, H.V., Gehrke, J., Labrinidis, A., Papakonstantinou, Y., Patel, J.M., Ramakrishnan, R. and Shahabi, C., (2014) Big data and its technical challenges. Communications of the ACM, 57(7), pp.86-94.
  • Crick, M. ed., (2016) Power, Surveillance, and Culture in YouTube's Digital Sphere. IGI Global.
  • Noda, K., Yamaguchi, Y., Nakadai, K., Okuno, H.G. and Ogata, T., (2015) Audio-visual speech recognition using deep learning. Applied Intelligence, 42(4), pp.722-737.
  • Rösler, P., (2018) On the End-to-End Security of Group Chats in In-stant Messaging Protocols.
  • Cutler, R., Hosseinkashi, Y., Pool, J., Filipi, S., Aichner, R., Tu, Y. and Gehrke, J., (2021) Meeting Effectiveness and Inclusiveness in Remote Collaboration. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW1), pp.1-29.
  • Boyes, H., Hallaq, B., Cunningham, J., and Watson, T., (2018) The industrial internet of things (IIoT): An analysis framework. Computers in industry, 101, pp.1-12.
  • Lane, N.D. and Georgiev, P., (2015) February. Can deep learning revolutionize mobile sensing? In Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications (pp. 117-122).
  • Dash, B., Sharma, P., & Ali, A. (2022). Federated Learning for Privacy-Preserving: A Review of PII Data Analysis in Fintech. International Journal of Software Engineering & Applications, 13(4), 1-13.
  • Wang, B., Qi, Z., Ma, R., Guan, H. and Vasilakos, A.V., (2015) A survey on data center networking for cloud computing. Computer Networks, 91, pp.528-547.
  • Choudhary, B. and Rakesh, S.K., (2016) February. An approach using agile method for software development. In 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) (pp. 155-158). IEEE.
  • Attaran, M., Attaran, S. and Kirkland, D., (2019) The need for digital workplace: increasing workforce productivity in the information age. International Journal of Enterprise Information Systems (IJEIS), 15(1), pp.1-23.
  • Géron, A., (2019) Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow: Concepts, tools, and techniques to build intelligent systems. O'Reilly Media.
  • Tidd, J. and Bessant, J.R., (2020) Managing innovation: integrating technological, market and organizational change. John Wiley & Sons.
  • Yang, P.R., and Meals, R.A., (2014) How to establish an interactive conference and Journal Club. The Journal of hand surgery, 39(1), pp.129-133.
  • Mutanen, T.P., Metsomaa, J., Liljander, S. and Ilmoniemi, R.J., (2018) Automatic and robust noise suppression in EEG and MEG: The SOUND algorithm. Neuroimage, 166, pp.135-151.
  • Jha, K., Doshi, A., Patel, P., and Shah, M., (2019) A comprehensive review on automation in agriculture using artificial intelligence. Artificial Intelligence in Agriculture, 2, pp.1-12.
  • Zhou, Z., Chen, X., Li, E., Zeng, L., Luo, K. and Zhang, J., (2019) Edge intelligence: Paving the last mile of artificial intelligence with edge computing. Proceedings of the IEEE, 107(8), pp.1738-1762.
  • Bender, E.M. and Friedman, B., (2018) Data statements for natural language processing: Toward mitigating system bias and enabling better science. Transactions of the Association for Computational Linguistics, 6, pp.587-604.
  • Zhang, Z., (2012) Microsoft Kinect sensor and its effect. IEEE Multimedia, 19(2), pp.4-10.
  • Garnett, R., Huegerich, T., Chui, C. and He, W., (2005) A universal noise removal algorithm with an impulse detector. IEEE Transactions on image processing, 14(11), pp.1747-1754.
  • Alshemali, B. and Kalita, J., (2020) Improving the reliability of deep neural networks in NLP: A review. Knowledge-Based Systems, 191, p.105210.
  • Dörk, M., Riche, N.H., Ramos, G. and Dumais, S., (2012) Pivotpaths: Strolling through faceted information spaces. IEEE transactions on visualization and computer graphics, 18(12), pp.2709-2718.
  • Mamoshina, P., Ojomoko, L., Yanovich, Y., Ostrovski, A., Botezatu, A., Prikhodko, P., Izumchenko, E., Aliper, A., Romantsov, K., Zhebrak, A. and Ogu, I.O., (2018) Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare. Oncotarget, 9(5), p.5665.
  • Fernández, A., del Río, S., López, V., Bawakid, A., del Jesus, M.J., Benítez, J.M. and Herrera, F., (2014) Big Data with Cloud Computing: an insight on the computing environment, MapReduce, and programming frameworks. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 4(5), pp.380-409.
  • Pan, Y., Yao, T., Li, Y., Wang, Y., Ngo, C.W. and Mei, T., (2019). Transferrable prototypical networks for unsupervised domain adaptation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 2239-2247).
  • Rodriguez, M., Piattini, M. and Ebert, C., (2019) Software verification and validation technologies and tools. IEEE Software, 36(2), pp.13-24.
  • Sharma, P., Dash, B., and Ansari, M. F., (2022) Anti-phishing techniques – a review of Cyber Defense Mechanisms, IJARCCE, vol. 11, no. 7, 2022.
  • Indu, I., Anand, P.R. and Bhaskar, V., (2018) Identity and access management in cloud environment: Mechanisms and challenges. Engineering science and technology, an international journal, 21(4), pp.574-588.
  • Barona, R. and Anita, E.M., (2017) April. A survey on data breach challenges in cloud computing security: Issues and threats. In 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-8). IEEE.
  • Elsayed, M.A.M.A., (2018) Advancing Security Services for Cloud Applications (Doctoral dissertation, SQueen's University (Canada)).
  • Ansari, M. F., Dash, B., Sharma P., and Yathiraju N., (2022) The impact and limitations of Artificial Intelligence in cybersecurity: A literature review, IJARCCE, vol. 11, no. 9, 2022.
  • Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O., Eranti, V., Moscicki, A. and Margolis, D., (2017, October) Data breaches, phishing, or malware? Understanding the risks of stolen credentials. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 1421-1434).
  • Attaran, M., Attaran, S. and Kirkland, D., (2019) The need for digital workplace: increasing workforce productivity in the information age. International Journal of Enterprise Information Systems (IJEIS), 15(1), pp.1-23.
  • Davenport, T.H., (2018). From analytics to artificial intelligence. Journal of Business Analytics, 1(2), pp.73-80.
  • Haenlein, M. and Kaplan, A., (2019) A brief history of artificial intelligence: On the past, present, and future of artificial intelligence. California management review, 61(4), pp.5-14.
  • Ferrell, J. and Kline, K., (2018) Facilitating trust and communication in virtual teams. People & Strategy, 41(2), pp.30-36.
  • Dash, B. (2022) REMOTE WORK AND INNOVATION DURING THIS COVID-19 PANDEMIC: AN EMPLOYERS’CHALLENGE.
  • Ferrario, A., Loi, M. and Viganò, E., (2020). In AI we trust Incrementally: a Multi-layer model of trust to analyze Human-Artificial intelligence interactions. Philosophy & Technology, 33(3), pp.523-539.
  • Dash, B., & Sharma, P. (2022). Role of Artificial Intelligence in Smart Cities for Information Gathering and Dissemination (A Review). Academic Journal of Research and Scientific Publishing, 4(39).

Abstract Views: 135

PDF Views: 72




  • Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms

Abstract Views: 135  |  PDF Views: 72

Authors

Pawankumar Sharma
School of Computer and Information Science, University of the Cumberlands, KY, United States
Bibhu Dash
Department of Computer and Information Science, University of the Cumberlands, KY, United States

Abstract


The normal method for analyzing technology is formulating many search queries to extract patent datasets and filter the data physically. The purpose of filtering the collected data is to remove noise to guarantee accurate information analysis. With the advancement in technology and machine learning, the work of physical analysis of the patent can be programmed so the system can remove noise depending on the results based on the previous data. Microsoft team generates a new artificial intelligence model that provides solutions on how individuals respond to speakers. Microsoft team, workplace, Facebook, and Google collected data from many active users hence developing artificial intelligence to minimize distracting background noise, barking and typing during the call.

Keywords


Artificial Intelligence, NLP, Microsoft Teams, Speech Identification, Video Call, Video Signal Data, Machine Learning.

References