<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Advanced Communication Model with the Voice Control and the Increased Security Level</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhii Kulibaba</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svitlana Popereshnyak</string-name>
          <email>spopereshnyak@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Shcheblanin</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Kurchenko</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Mazur</string-name>
          <email>n.mazur@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Telecommunication</institution>
          ,
          <addr-line>7 Solomyanska str., Kyiv, 03680</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska str., Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>64</fpage>
      <lpage>72</lpage>
      <abstract>
        <p>Technologies of voice assistants or assistants are actively used in modern solutions. They are implemented on the basis of software that can perform tasks or provide services based on given voice commands by processing and interpreting human speech. Most communication tools are easy to use, but have typical and limited functionality for commercial use, in particular the implementation of security services. The paper proposes a model of a communication tool with a voice assistant and an increased level of security, which uses an advanced encryption method and a face recognition algorithm to provide security services. To build this model, the internal logic of performing functions and placing objects in systems with the functions of voice assistants or assistants was considered. The proposed solution uses a client-server architecture. As an additional direction of commercial use, the possibility of expanding the capabilities of the communication tool through the integration of auxiliary functionality in the form of a currency exchange module and decentralization of the system is being considered.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Software</kwd>
        <kwd>encryption</kwd>
        <kwd>face recognition</kwd>
        <kwd>decentralization</kwd>
        <kwd>currency exchange</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Modern information technologies provide
users with a wide range of services. Means of
communication are actively used for their stable
functioning. They can be in the form of a service,
application, etc. [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1–3</xref>
        ].
      </p>
      <p>There is a significant number of similar tools
on the market, some of them differ in their
purpose, supported services and technological
solutions. Developers of communication tools are
trying to expand their capabilities in the direction
of providing commercial services. However,
existing implementations in this direction do not
allow to meet the needs of users.</p>
      <p>
        Users prefer means of communication with a
convenient, functional and understandable
interface, available visual effects, speed of
information exchange, reliability of stored
information, confidentiality, opportunities for
commercial use, etc. [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. Commercial products
and development companies try to implement a
number of these requirements, but they do not
always include a demonstration of the realized
capabilities.
      </p>
      <p>The relevance of the work lies in the high
interest of users in the use of communication tools
with a voice assistant, an inclusive interface, an
increased level of security and opportunities for
commercial use.</p>
      <p>The novelty of the work is the improvement of
existing approaches for recognizing named
entities of the program text by taking into account
contextual information, directions for increasing
the level of security of the communication tool by
improving the encryption method and the user's
face recognition algorithm, as well as expanding
the functional capabilities that are limited in most
commercial products are proposed.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of Publications,</title>
      <p>the Status of the Issue
and the Statement of the Problem</p>
    </sec>
    <sec id="sec-3">
      <title>2.1. Analysis of Research and Publications</title>
      <p>
        Recent research in the fields of machine
learning and natural language processing has
made it possible to create impressive things that
seemed impossible before [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Recognition of
images and voice commands, recommendation
systems, self-driving cars, exoplanet searches,
prediction of fraudulent bank transactions,
military technology are just a small list of what
has become possible thanks to the rapid growth of
available information and the development of the
aforementioned fields of science. One such
technology is voice assistants or assistants, which
are software that can perform tasks or provide
services for the user based on given voice
commands, that is, by processing and interpreting
human speech [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Voice control is an important emerging feature
that is changing the way people live. The voice
assistant is commonly used in smartphones and
laptops. AI-powered voice assistants are
operating systems that can recognize the human
voice and respond with integrated voices. In work
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], a voice assistant collects audio data using a
microphone, converts it into text, and sends it to
users.
      </p>
      <p>
        AI-powered voice assistants such as Alexa and
Siri are increasingly replacing search engines as
users actively use them to solve a variety of
everyday tasks. Technology providers, as well as
marketers, are increasingly working to attract
customers to use communication tools with voice
assistant functions. The work [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] analyzes the
possibilities and options of using communication
tools with voice assistants.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], a voice control system based on an
artificial intelligence (AI) assistant is proposed. A
system of AI assistants used by Google Assistant,
a representative artificial intelligence service with
an open API, and a conditional automatic launch
system were developed. The proposed technology
is expected to be applied to various control
systems based on voice recognition.
      </p>
      <p>
        In work [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], a means of communication with
a voice assistant for mobile phones, based on the
Android operating system, is considered. The tool
allows voice control. A native interface is
provided for a large continuous speech
recognition system based on the Kaldi open
source speech recognition toolkit.
      </p>
      <p>
        Thanks to advances in voice recognition, users
can easily control any device in a smart home by
simply speaking a voice command. Based on this
idea, a new group of smart devices called voice
assistants has been developed and released.
However, voice itself is not secure and can be
attacked in many ways. To protect against voice
attacks, you can use the voice detection system
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], which consists in the fact that movements
when opening the mouth change the size of the ear
canal space, which further changes the air
pressure in the ear canals. This approach allows
the user's air noise pressure data to be compared
and matched to voices to verify and identify the
source of the voice.
      </p>
    </sec>
    <sec id="sec-4">
      <title>2.2. Analysis of the State of the</title>
    </sec>
    <sec id="sec-5">
      <title>Issue in the Applied Field</title>
      <p>Currently, there are a significant number of
means of communication, but not all of them are
reliable and convenient. The proposed model of a
means of communication with an increased level
of security takes into account the shortcomings of
existing solutions and provides an opportunity to
realize the function of commercial use.</p>
      <p>
        The proposed model of the means of
communication combines a number of solutions
that are not available from competitors, and this is
what guarantees commercial success [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>2.3. Analysis of Existing Means of Communication</title>
      <p>
        A number of software communication tools
were able to gain success and take a confident
position in the market among users. Solutions
with a high level of success include the following
means of communication:
1. Viber: Viber Media company, Inc [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        Exchange of messages; calls; creating your
own bots; convenient to use.
2. WhatsApp: Facebook company [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>Exchange of messages, calls; convenient to
use.
3. Messenger: Facebook company [16].</p>
      <p>Exchange of messages; calls; convenient to
use.
4. Telegram: Telegram FZ-LLC company [17].</p>
      <p>Exchange of messages; calls; creating your
own bots; convenient to use.
5. Instagram: Facebook company [18]. Exchange
of messages; calls; display information about
yourself, if the profile is not closed;
information management; convenient to use.
2.4.</p>
    </sec>
    <sec id="sec-7">
      <title>Formulation of the Problem</title>
      <p>Many means of communication are easy to
use. But most of them lack the ability to expand
functionality. Not everyone can use their own
means without the help of others. Thanks to such
modifications as a voice assistant, an increased
level of security, the presence of an inclusive
interface and the provision of commercial
services, the percentage of users of these tools
may increase significantly.</p>
    </sec>
    <sec id="sec-8">
      <title>3. Study Purpose and Objectives</title>
      <p>The purpose of the research is to develop a
model of an improved means of communication
that provides an increased level of security and
commercial opportunities. Consider the feasibility
of integrating a voice assistant into similar tools
inclusive. Currently, this technology is added to
most commercial products. But this technology is
absent in means of communication. Therefore,
this modification is considered the newest among
other software available on the market.</p>
      <p>Adding to the means of communication the
possibility of tracking the exchange rate and
carrying out its exchange and transfer will expand
the possibilities of using this tool. There are
analogues of means of communication on the
market with the possibility of exchanging one's
own funds with other users, but the provision of
material assistance is carried out by a minority.
Not everyone has the opportunity to personally
exchange / transfer their own funds to others.
Therefore, a modification in the form of a voice
assistant in the communication system will be
useful.</p>
      <p>The integration of the cryptographic data
encryption module and the facial recognition
function into the communication medium
guarantees an increase in the level of security and
reliability.</p>
      <p>The set goal is achieved by solving the
following tasks:
1. Conducting an analysis of the
possibilities of the means of communication
present on the market.
2. Development of a model of a means of
communication.
3. Improvement of the method of encryption
and face recognition.
4. Integration of the commercial capabilities
module into a communication tool with
support for voice assistant functions.</p>
    </sec>
    <sec id="sec-9">
      <title>4. Development of a Model an</title>
    </sec>
    <sec id="sec-10">
      <title>Improved Means of</title>
    </sec>
    <sec id="sec-11">
      <title>Communication with a Voice</title>
    </sec>
    <sec id="sec-12">
      <title>Assistant</title>
    </sec>
    <sec id="sec-13">
      <title>4.1. Organization of the Process of</title>
    </sec>
    <sec id="sec-14">
      <title>Interaction with the System</title>
      <p>User interaction with the system is carried out
using certain visual means. Thanks to these tools,
you can work with the system and reveal its
potential. Visual tools in such systems are called
widgets [19].</p>
      <p>In order for any user to be able to interact with
the system, it is necessary to expand the
functionality of the system: add authorization,
registration, create a dialogue with other users,
etc. All or most of these functions should be built
into the voice assistant. In Fig. 1 is a use case
diagram that demonstrates the main functionality
of the system.
1. The original text, image or video is encrypted
that automatically implements the performance of
user functions. This feature will be added and will
be available to all users of this system.
4.2.</p>
    </sec>
    <sec id="sec-15">
      <title>Analysis of the Function of</title>
    </sec>
    <sec id="sec-16">
      <title>Means of Communication in Relation to Data Saving</title>
      <p>To save data and maintain communication
with
other
people
through
a
means
of
communication, equipment is used, which makes
it possible to store and display data in software
(Fig. 2). Data is stored through a database [20].</p>
    </sec>
    <sec id="sec-17">
      <title>Communication</title>
      <p>Cryptographic encryption is the replacement
of the data structure with symbols and the creation
of a certain key to replace the symbols with the
original structure [21]. Encryption is used for
three purposes:</p>
      <sec id="sec-17-1">
        <title>Confirmation of the source.</title>
        <sec id="sec-17-1-1">
          <title>Confidentiality.</title>
          <p>Thanks to
cryptographic
protection</p>
          <p>methods, information can be made
inaccessible to</p>
          <p>persons trying to steal this
information from the outside.</p>
          <p>Immutability. Encrypted information cannot
be tampered with during transmission or storage.</p>
        </sec>
        <sec id="sec-17-1-2">
          <title>Confirmation</title>
          <p>of
the
source.</p>
          <p>Encrypted
information has information about the sender.</p>
          <p>Data transfer from one user to another occurs
as follows:
using
an
encryption
algorithm, and the
recipient has a special key to decrypt this data.
2. The encrypted message is sent to the recipient.
3. The recipient decrypts the message using a
special key.
4.4.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-18">
      <title>Increase the Level of Data</title>
    </sec>
    <sec id="sec-19">
      <title>Protection</title>
      <p>In this work, the Pattern Reverse Subtraction
(PRS) encryption
method
will be used. This
method processes the input data by converting the
binary value of the current symbol to decimal,
where the key is then applied to form the
encrypted data.</p>
      <p>Encryption will occur as follows:
1. Creating a key.
2. Creating a reverse key.
3. Receiving bytes from input data.
4. Subtraction of the current byte until the
condition 0 ≤ L is met, where L is the length of
the key.
5. This number is taken as an index from the
reverse. The output number is taken as the
index of the value from the key reversal.
6. Adding a number after each operation on the
byte,
which
will reflect the
number of
differences before obtaining a valid value.
Decryption uses the following formula:

 =1
∑  +  ,
(1)
where n is the number saved in the encrypted file;</p>
      <sec id="sec-19-1">
        <title>K is symbol index of reverse key;</title>
      </sec>
      <sec id="sec-19-2">
        <title>L is decimal number.</title>
        <p>Compression. To achieve a lower amount of
equipment physical memory costs, the following
approach to data storage will be used (Fig. 3) [22].</p>
        <p>Data compression is divided into two types:
1. With losses.
2. Without losses.</p>
        <p>With losses. Removing unnecessary bits of
data where after decompressing the compressed
file you can get the raw data.</p>
        <p>Without losses. Compression of information
without replacing the symbols of the input data,
where after decompression the output data will be
obtained.</p>
        <p>When studying this encryption method, it was
decided to use a type of losses compression for a
large amount of data. The study showed that the
use of this type of compression did not lead to the
detection of errors and incorrectness of the
original data.</p>
      </sec>
    </sec>
    <sec id="sec-20">
      <title>4.5. Algorithm of Recognition of Characteristic Points on the Face</title>
      <p>One of the methods of maintaining
confidentiality and preserving the reliability of the
program is authentication using characteristic
points on the face-face recognition (Fig. 4).</p>
      <p>Face recognition is a means of recognizing
characteristic points of a person’s face and its
verification. Characteristic points are determined
on the face, and make it possible to recognize the
corresponding person [23].</p>
      <p>This technology is needed to increase the level
of data security of registered users.
4.6.</p>
    </sec>
    <sec id="sec-21">
      <title>Performance Criteria</title>
      <p>
        Functional completeness is performing the
main functions of effective management and
providing a convenient interface for the user [
        <xref ref-type="bibr" rid="ref16">24</xref>
        ].
      </p>
      <p>The functional completeness is as follows:
1. Authorization. Inclusive authorization.
2. Registration. Inclusive registration.
3. Creating a chat for interviews with the
possibility of using a voice assistant.
4. Creation of group chats for interviews with the
possibility of using a voice assistant.
5. Exchange of messages with the possibility of
using a voice assistant.
6. Sending photos and videos.
7. Viewing videos and photos using a voice
assistant.
8. Sending voice messages.
9. Converting voice messages into text.
10.Changing profile settings.</p>
      <p>
        Portability is a property that indicates how
easy it is to transfer / install the system to a certain
device. Currently, software development tools
have the ability to create an executable program
for various operating and mobile systems [
        <xref ref-type="bibr" rid="ref17">25</xref>
        ].
      </p>
      <p>
        Reliability and fault tolerance. For example,
the system will have a number of functional
capabilities, where in the future it will be possible
to make corrections in the processing of data and
clients, so reliability and fault tolerance are at a
sufficient level [
        <xref ref-type="bibr" rid="ref18">26</xref>
        ].
      </p>
      <p>
        Security. In any case, the data will be
transferred over the network between the server
devices. Therefore, the proposed PRS data
encryption method with E2E (end-to-end) data
transmission is used [
        <xref ref-type="bibr" rid="ref19">27</xref>
        ].
      </p>
      <p>For authorization in the system, it will be
possible to create additional authentication—
facial recognition.</p>
      <p>Extensions is the possibility of
adding/modifying the software product. The
following diagram (Fig. 5) shows the structure of
the future software product.</p>
      <p>
        Productivity. Thanks to well-written software,
you can achieve a high level of productivity. To
achieve high performance, you need to have
equipment that will ensure fast processing of input
and output data, in particular voice requests from
users [
        <xref ref-type="bibr" rid="ref20">28</xref>
        ].
      </p>
    </sec>
    <sec id="sec-22">
      <title>5. Improving the Means</title>
      <p>of Communication by Adding</p>
    </sec>
    <sec id="sec-23">
      <title>Commercial Opportunities</title>
    </sec>
    <sec id="sec-24">
      <title>5.1. Cryptocurrency and Other</title>
    </sec>
    <sec id="sec-25">
      <title>Currencies Exchange Module</title>
      <p>
        The expansion of the audience of users is
planned due to the addition of opportunities for
conducting financial transactions. This extension
will make the software product more successful.
Due to the minimal increase in the commission for
the transfer of currencies, there will be an
increased profit for the corresponding period of
time. Finance departments are interested in
cooperating with such tools, because their number
of users will be able to expand and increase the
level of profit. Cooperation will take place
through the API (Application Programming
Interface) of financial departments for the
interaction of their services with their own
developed software and system users [
        <xref ref-type="bibr" rid="ref21">29</xref>
        ].
      </p>
      <p>An account will be created for the financial
support of the relevant users, where funds will be
received for the percentage of the transfer of funds
from other users and sent to the relevant
rehabilitation institutions.
5.2.</p>
    </sec>
    <sec id="sec-26">
      <title>Decentralization</title>
      <p>
        Decentralization is the process of distributing
people, rules, performing calculations, data stored
from a single location or central governing body
[
        <xref ref-type="bibr" rid="ref22">30</xref>
        ]. The internal structure of the decentralized
system consists of blocks and chains of a single
profile, which are connected to each other and
have the name blockchain. The meaning of the
structure in the system is as follows: blocks are
general information, and a chain is a connection
between blocks. The content of the information
may depend on the conditions specified in the
system software: time of sending funds, message,
comment, etc.
      </p>
      <p>
        When applying the blockchain technology, it
is necessary to define and distribute rules between
users and computing devices, achieving
consensus, in particular, connecting other users
who must verify the authenticity of data due to
stored copies [
        <xref ref-type="bibr" rid="ref23 ref24">31, 32</xref>
        ].
      </p>
      <p>
        This improvement will be useful for people
who do not want to lose their personal information
and use the application without entering
information about themselves [
        <xref ref-type="bibr" rid="ref25">33</xref>
        ].
      </p>
    </sec>
    <sec id="sec-27">
      <title>5.3. Analysis of the Success of Improvements</title>
      <p>The implementation of points 5.1 and 5.2 will
make it possible to raise the level of commercial
attractiveness of the improved means of
communication. Currency exchange in a closed
system can be interesting for a large number of
users.</p>
      <p>The following formula can be used to obtain
the probability of success of improving the means
of communication:
 =  ×  ×  ,
(2)
where C is the probability that the changes will be
successful;
А is dissatisfaction with the existing situation;
В is a clear formulation of the goal of the changes;
D is specific first steps to achieve goals.</p>
    </sec>
    <sec id="sec-28">
      <title>6. Conclusion</title>
      <p>The paper examines the functioning scheme of
means of communication called “messengers.” To
build a model of an improved means of
communication with a voice assistant, the internal
logic of performing functions and placing objects
in similar means was considered. The work
proposed improved principles of increasing the
level of security of products of this type by
improving the encryption method and the face
recognition algorithm, as well as expanding the
functionality that is missing in most commercial
products. The tool is built using a client-server
architecture. This security model and method
provide an opportunity to protect data at a
sufficient level. To provide convenience to users,
a decision was considered to add a voice assistant
to the system. This modification will be useful for
all users of the system. The work proposed the
possibility of expanding the system with the help
of auxiliary functionality in the form of a currency
exchange module, which is intended for a certain
category of users interested in this system.</p>
      <p>The system is built on the basis of a micro
service approach, which ensures scalability and
low resource consumption when adding new
functionality or replacing existing
implementations. The created voice assistant for
integrated development environments allows to
increase the productivity of developers, and also
provides an opportunity to support the standards
of conventions of inclusive interfaces.</p>
      <p>Based on the results of the research, the logic
of the communication tools was determined.
Thanks to this, you can design a software product
that will be different from similar products on the
market.</p>
      <p>So, as the system operation scheme was
considered in detail, these systems can be
expanded not only externally, but also internally.
Several examples have been given of how the
functionality of the product can be extended.</p>
    </sec>
    <sec id="sec-29">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Nakamura</surname>
          </string-name>
          , et al.,
          <source>Design and Evaluation of In-Situ Resource Provisioning Method for Regional IoT Services</source>
          ,
          <source>2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          . doi:
          <volume>10</volume>
          .1109/IWQoS.
          <year>2018</year>
          .
          <volume>8624127</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O.</given-names>
            <surname>Iosifova</surname>
          </string-name>
          , et al.,
          <article-title>Techniques Comparison for Natural Language Processing</article-title>
          ,
          <source>in Proceedings of the Modern Machine Learning Technologies and Data Science Workshop</source>
          , vol.
          <volume>2631</volume>
          ,
          <year>2020</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>67</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I.</given-names>
            <surname>Iosifov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Iosifova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>Sentence Segmentation from Unformatted Text Using Language Modeling and Sequence Labeling Approaches</article-title>
          ,
          <source>in Proceedings of the 2020 IEEE International Scientific and Practical Conference Problems of Infocommunications. Science and Technology</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>335</fpage>
          -
          <lpage>337</lpage>
          . doi:
          <volume>10</volume>
          .1109/picst51311.
          <year>2020</year>
          .
          <volume>9468084</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Analysis of Demand Side Energy IoT Communication Channel Requirements of Integrated Stations, Equipment, and Users</article-title>
          ,
          <source>in 7th Asia Conference on Power and Electrical Engineering</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>793</fpage>
          -
          <lpage>797</lpage>
          . doi:
          <volume>10</volume>
          .1109/acpee53904.
          <year>2022</year>
          .
          <volume>9784018</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security Rating Metrics for Distributed Wireless Systems</article-title>
          ,
          <source>in Workshop of the 8th International Conference on “Mathematics. Information Technologies. Education:” Modern Machine Learning Technologies and Data Science (MoMLeT and DS)</source>
          , vol.
          <volume>2386</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Subramanian</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Far-Field Location Guided Target Speech Extraction Using Endto-End Speech Recognition Objectives</surname>
            ,
            <given-names>ICASSP</given-names>
          </string-name>
          <year>2020</year>
          - 2020
          <source>IEEE International</source>
          <year>2021</year>
          , pp.
          <fpage>91</fpage>
          -
          <lpage>96</lpage>
          . doi:
          <volume>10</volume>
          .1109/IWBIS53353. Conference on Acoustics,
          <source>Speech and Signal</source>
          <year>2021</year>
          .
          <volume>9631860</volume>
          .
          <string-name>
            <surname>Processing</surname>
          </string-name>
          (ICASSP),
          <year>2020</year>
          , pp.
          <fpage>7299</fpage>
          -
          <lpage>7303</lpage>
          . [16]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Mei</surname>
          </string-name>
          , et al.,
          <source>Turbine: Facebook's Service doi: 10.1109/ICASSP40776</source>
          .
          <year>2020</year>
          .
          <volume>9053692</volume>
          . Management Platform for Stream
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Fan</surname>
          </string-name>
          , et al.,
          <source>Gated Recurrent Fusion With Processing</source>
          ,
          <year>2020</year>
          IEEE 36th
          <article-title>International Joint Training Framework for Robust End- Conference on Data Engineering (ICDE), to-End Speech Recognition</article-title>
          , in: IEEE/ACM 2020, pp.
          <fpage>1591</fpage>
          -
          <lpage>1602</lpage>
          . doi:
          <volume>10</volume>
          .1109/ Transactions on Audio,
          <source>Speech, and ICDE48307</source>
          .
          <year>2020</year>
          .
          <volume>00141</volume>
          .
          <string-name>
            <surname>Language</surname>
            <given-names>Processing</given-names>
          </string-name>
          , vol.
          <volume>29</volume>
          ,
          <year>2021</year>
          , pp. [17]
          <string-name>
            <given-names>C.</given-names>
            <surname>Huda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Bachtiar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Supianto</surname>
          </string-name>
          ,
          <volume>198</volume>
          -
          <fpage>209</fpage>
          . doi:
          <volume>10</volume>
          .1109/TASLP.
          <year>2020</year>
          .
          <article-title>Reporting Sleepy Driver into Channel 3039600</article-title>
          . Telegram via Telegram Bot,
          <year>2019</year>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Subhash</surname>
          </string-name>
          , et al.,
          <source>Artificial Intelligence- International Conference on Sustainable based Voice Assistant</source>
          .
          <source>2020 Fourth World Information Engineering and Technology Conference on Smart Trends in Systems, (SIET)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>251</fpage>
          -
          <lpage>256</lpage>
          . doi: Security and
          <source>Sustainability (WorldS4)</source>
          .
          <year>2020</year>
          .
          <volume>10</volume>
          .1109/SIET48054.
          <year>2019</year>
          .
          <volume>8986000</volume>
          . pp.
          <fpage>593</fpage>
          -
          <lpage>596</lpage>
          . doi:
          <volume>10</volume>
          .1109/WorldS450073. [18]
          <string-name>
            <given-names>W.</given-names>
            <surname>Uriawan</surname>
          </string-name>
          , et al.,
          <source>Pearson Correlation</source>
          <year>2020</year>
          .
          <volume>9210344</volume>
          .
          <article-title>Method and Web Scraping for Analysis of</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Malodia</surname>
          </string-name>
          , et al.,
          <source>Why Do People Use Islamic Content on Instagram Videos</source>
          ,
          <source>2020 Artificial Intelligence (AI</source>
          )-
          <source>Enabled Voice 6th International Conference on Wireless and Assistants</source>
          ,
          <source>in IEEE Transactions on Telematics (ICWT)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi: Engineering Management,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1109/ICWT50448.
          <year>2020</year>
          .
          <volume>9243626</volume>
          . 10.1109/TEM.
          <year>2021</year>
          .
          <volume>3117884</volume>
          . [19]
          <string-name>
            <given-names>E.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , S. Peng,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhai</surname>
          </string-name>
          , Design and
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>T.-K. Kim</surname>
          </string-name>
          ,
          <source>Short Research on Voice Control Application Development of the Camps System Based on Artificial Intelligence Navigation System Based on ArcGIS Assistant</source>
          , 2020 International Conference on
          <article-title>Runtime SDK for Android: Taking the Electronics</article-title>
          , Information, and Yunnan Normal University as an Example,
          <source>Communication (ICEIC)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          . doi: 2019
          <source>IEEE 4th Advanced Information 10.1109/ICEIC49074</source>
          .
          <year>2020</year>
          .9051160.
          <string-name>
            <surname>Technology</surname>
          </string-name>
          , Electronic and Automation
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B.</given-names>
            <surname>Popović</surname>
          </string-name>
          , et al.,
          <source>Voice assistant application Control Conference (IAEAC)</source>
          ,
          <year>2019</year>
          , pp.
          <source>for the Serbian language</source>
          ,
          <year>2015</year>
          23rd
          <fpage>1262</fpage>
          -
          <lpage>1266</lpage>
          . doi:
          <volume>10</volume>
          .1109/IAEAC47372. Telecommunications Forum Telfor
          <year>2019</year>
          .
          <volume>8997730</volume>
          . (TELFOR),
          <year>2015</year>
          , pp.
          <fpage>858</fpage>
          -
          <lpage>861</lpage>
          . doi: [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Seda</surname>
          </string-name>
          , et al.,
          <source>Performance testing of 10.1109/TELFOR</source>
          .
          <year>2015</year>
          .7377600.
          <article-title>NoSQL and RDBMS for storing big data in</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Shang</surname>
          </string-name>
          , J. Wu, Voice Liveness Detection e-applications,
          <source>2018 3rd International for Voice Assistants using Ear Canal Conference on Intelligent Green Building Pressure</source>
          ,
          <source>2020 IEEE 17th International and Smart Grid (IGBSG)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi: Conference on Mobile
          <source>Ad Hoc and Sensor</source>
          <volume>10</volume>
          .1109/IGBSG.
          <year>2018</year>
          .
          <volume>8393559</volume>
          .
          <string-name>
            <surname>Systems</surname>
          </string-name>
          (MASS),
          <year>2020</year>
          , pp.
          <fpage>693</fpage>
          -
          <lpage>701</lpage>
          . doi: [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kulibaba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kurchenko</surname>
          </string-name>
          , Cryptographic
          <volume>10</volume>
          .1109/MASS50613.
          <year>2020</year>
          .
          <volume>00089</volume>
          . Method of Pattern Reverse Multiplication
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Asaul</surname>
          </string-name>
          , et al.,
          <source>The Latest Information Data Encryption</source>
          , Cyber Security:
          <article-title>Education, Systems in the Enterprise Management and Science</article-title>
          , Technology, vol.
          <volume>3</volume>
          , iss.
          <volume>15</volume>
          ,
          <year>2022</year>
          , Trends in their Development,
          <year>2019</year>
          9th pp.
          <fpage>216</fpage>
          -
          <lpage>223</lpage>
          . International Conference on Advanced [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yamagiwa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Morita</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Marumo</surname>
          </string-name>
          ,
          <article-title>Bank Computer Information Technologies Select Method for Reducing Symbol Search (ACIT</article-title>
          ),
          <year>2019</year>
          , pp.
          <fpage>409</fpage>
          -
          <lpage>412</lpage>
          . doi: Operations
          <source>on Stream-Based Lossless Data</source>
          <volume>10</volume>
          .1109/ACITT.
          <year>2019</year>
          .
          <volume>8779874</volume>
          .
          <string-name>
            <surname>Compression</surname>
          </string-name>
          , 2019 Data Compression
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vasilaras</surname>
          </string-name>
          , et al.,
          <source>Android Device Incident Conference (DCC)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>611</fpage>
          . doi: Response:
          <string-name>
            <given-names>Viber</given-names>
            <surname>Analysis</surname>
          </string-name>
          ,
          <source>2022 IEEE 10.1109/DCC</source>
          .
          <year>2019</year>
          .00123. International Conference on Cyber Security [23]
          <string-name>
            <given-names>R.</given-names>
            <surname>He</surname>
          </string-name>
          , et al.,
          <source>Adversarial Cross-Spectral Face and Resilience (CSR)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>138</fpage>
          -
          <lpage>142</lpage>
          .
          <article-title>Completion for NIR-VIS Face Recognition</article-title>
          , doi: 10.1109/CSR54599.
          <year>2022</year>
          .
          <volume>9850300</volume>
          . in: IEEE Transactions on Pattern Analysis
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>R.</given-names>
            <surname>Wahaz</surname>
          </string-name>
          , et al.,
          <source>Is WhatsApp Plus and Machine Intelligence</source>
          , vol.
          <volume>42</volume>
          , no.
          <issue>5</issue>
          ,
          <string-name>
            <surname>Malicious</surname>
            ?
            <given-names>A Review</given-names>
          </string-name>
          <string-name>
            <surname>Using Static Analysis</surname>
          </string-name>
          ,
          <year>2020</year>
          , pp.
          <fpage>1025</fpage>
          -
          <lpage>1037</lpage>
          . doi:
          <volume>10</volume>
          .1109/TPAMI. 2021
          <source>6th International Workshop on Big</source>
          <year>2019</year>
          .
          <volume>2961900</volume>
          .
          <article-title>Data and Information Security (IWBIS),</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kolodenkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Khalikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Vereshchagina</surname>
          </string-name>
          ,
          <source>Data Fusion and Industrial Equipment Diagnostics Based on Information Technology</source>
          ,
          <source>2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/FarEastCon.
          <year>2019</year>
          .
          <volume>8934322</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>T.</given-names>
            <surname>Deakin</surname>
          </string-name>
          , et al.,
          <source>Performance Portability across Diverse Computer Architectures</source>
          ,
          <year>2019</year>
          IEEE/ACM International Workshop on Performance,
          <source>Portability and Productivity in HPC (P3HPC)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          . doi:
          <volume>10</volume>
          .1109/P3HPC49587.
          <year>2019</year>
          .
          <volume>00006</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Talwani</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Chana</surname>
          </string-name>
          ,
          <article-title>Fault tolerance techniques for scientific applications in cloud</article-title>
          ,
          <source>2017 2nd International Conference on Telecommunication and Networks (TELNET)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/TELNET.
          <year>2017</year>
          .
          <volume>8343578</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Qiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yixuan</surname>
          </string-name>
          ,
          <article-title>Construction of Network Security Perception System Using Elman Neural Network, 2021 2nd International Conference on Computer Communication and Network Security (CCNS</article-title>
          ),
          <year>2021</year>
          , pp.
          <fpage>187</fpage>
          -
          <lpage>190</lpage>
          . doi:
          <volume>10</volume>
          .1109/CCNS53852.
          <year>2021</year>
          .
          <volume>00042</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>P. Y.</given-names>
            <surname>Tilak</surname>
          </string-name>
          , et al.,
          <article-title>A platform for enhancing application developer productivity using microservices and micro-frontends, 2020 IEEE-</article-title>
          HYDCON,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/HYDCON48903.
          <year>2020</year>
          .
          <volume>9242913</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [29]
          <article-title>IEEE Standard for Learning Technology - ECMAScript Application-Programming Interface for Content to Runtime Services Communication-Redline</article-title>
          ,
          <source>in IEEE Std. 1484.11</source>
          .
          <fpage>2</fpage>
          -
          <lpage>2020</lpage>
          ,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>60</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>E.</given-names>
            <surname>Işık</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Birim</surname>
          </string-name>
          , E. Karaarslan,
          <source>Chainex Decentralized Application Development &amp; Test Workbench</source>
          ,
          <year>2021</year>
          15th
          <string-name>
            <given-names>Turkish</given-names>
            <surname>National Software Engineering Symposium</surname>
          </string-name>
          (UYMS),
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/UYMS54260.
          <year>2021</year>
          .
          <volume>9659637</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>J.</given-names>
            <surname>Jayabalan</surname>
          </string-name>
          , et al.,
          <source>A Study on Distributed Consensus Protocols and Algorithms: The Backbone of Blockchain Networks</source>
          ,
          <source>2021 International Conference on Computer Communication and Informatics (ICCCI)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCCI50826.
          <year>2021</year>
          .
          <volume>9402318</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>T.</given-names>
            <surname>Salman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Reputation</given-names>
            <surname>Management</surname>
          </string-name>
          <article-title>Framework for KnowledgeBased and</article-title>
          Probabilistic Blockchains, 2019 IEEE International Conference on Blockchain,
          <year>2019</year>
          , pp.
          <fpage>520</fpage>
          -
          <lpage>527</lpage>
          . doi:
          <volume>10</volume>
          .1109/Blockchain.
          <year>2019</year>
          .
          <volume>00078</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. J.</given-names>
            <surname>Gu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Dynamic Authentication with Sensory Information for the Access Control Systems</article-title>
          ,
          <source>in IEEE Transactions on Parallel and Distributed Systems</source>
          , vol.
          <volume>25</volume>
          , no.
          <issue>2</issue>
          ,
          <issue>2014</issue>
          , pp.
          <fpage>427</fpage>
          -
          <lpage>436</lpage>
          . doi:
          <volume>10</volume>
          .1109/TPDS.
          <year>2013</year>
          .
          <volume>153</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>