This paper is a research of interval-valued fuzzy and Muirhead Mean algorithms. We deduced new algorithms named as hesitant interval-valued fuzzy Muirhead Mean (HIVFMM) and hesitant interval-valued fuzzy Muirhead Mean (HIVFWMM) with Muirhead Mean algorithms based on Hesitant interval-valued fuzzy set (HIVFS). Firstly, we introduced some concepts and operation laws of HIVFS and the formula form of MM, then we combined them both and gave the proof process of properties and theorems, a mathematic model applying to MADM and a numerical example was given to illustrate the effectively and practically.
{"title":"Models for MADM with hesitant interval-valued fuzzy information under uncertain environment","authors":"Hongjun Wang","doi":"10.3233/kes-210074","DOIUrl":"https://doi.org/10.3233/kes-210074","url":null,"abstract":"This paper is a research of interval-valued fuzzy and Muirhead Mean algorithms. We deduced new algorithms named as hesitant interval-valued fuzzy Muirhead Mean (HIVFMM) and hesitant interval-valued fuzzy Muirhead Mean (HIVFWMM) with Muirhead Mean algorithms based on Hesitant interval-valued fuzzy set (HIVFS). Firstly, we introduced some concepts and operation laws of HIVFS and the formula form of MM, then we combined them both and gave the proof process of properties and theorems, a mathematic model applying to MADM and a numerical example was given to illustrate the effectively and practically.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127048178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The advancements in modern technologies permit the invention of various digital devices which are controlled and activated by people’s gestures, touch and even by one’s voice. Google Assistant, iPhone Siri, Amazon Alexa etc., are most popular voice enabled devices which have grabbed the attention of digital gadget users. Their usage definitely makes the life easier and comfortable. The other side of these smart enabled devices is incredible violation of the privacy. This happens due to their continuous listening to the user and data transmission over a public network to the third-party services. The work proposed in this paper attempts to overcome the existing privacy violation problem with the voice enabled devices. The main idea is to incorporate an intelligent privacy assistant that works based on the user preferences over their data.
{"title":"Personalized privacy assistant for digital voice assistants: Case study on Amazon Alexa","authors":"J. Hyma, M. Murty, A. Naveen","doi":"10.3233/kes-210071","DOIUrl":"https://doi.org/10.3233/kes-210071","url":null,"abstract":"The advancements in modern technologies permit the invention of various digital devices which are controlled and activated by people’s gestures, touch and even by one’s voice. Google Assistant, iPhone Siri, Amazon Alexa etc., are most popular voice enabled devices which have grabbed the attention of digital gadget users. Their usage definitely makes the life easier and comfortable. The other side of these smart enabled devices is incredible violation of the privacy. This happens due to their continuous listening to the user and data transmission over a public network to the third-party services. The work proposed in this paper attempts to overcome the existing privacy violation problem with the voice enabled devices. The main idea is to incorporate an intelligent privacy assistant that works based on the user preferences over their data.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133706167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sentiment analysis of scientific citations is a novel and remarkable research area. Most of the work on opinion or sentiment analysis has been suggested on social platforms such as Blogs, Twitter, and Facebook. Nevertheless, when it comes to recognizing sentiments from scientific citation papers, investigators used to face difficulties due to the implied and unseen natures of sentiments or opinions. As the citation references are reflected implicitly positive in opinion, famous ranking and indexing prototypes frequently disregard the sentiment existence while citing. Hence, in the proposed framework the paper emphasizes the issue of classifying positive and negative polarity of reference sentiments in scientific research papers. First, the paper scraps the PDF articles from arxiv.org under the computer science group consisting of articles that are comprised of ‘autism’ in their title, then the paper extracted cited references and assigns polarity scores to each cited reference. The paper uses a supervised classifier with a combination of significant feature sets and compared the performance of the models. Experimental results show that a combined CNN-LSTM deep neural network model results in 85% of accuracy while traditional models result in less accuracy.
{"title":"An approach for bibliographic citation sentiment analysis using deep learning","authors":"S. Muppidi, Satya Keerthi Gorripati, B. Kishore","doi":"10.3233/kes-200087","DOIUrl":"https://doi.org/10.3233/kes-200087","url":null,"abstract":"Sentiment analysis of scientific citations is a novel and remarkable research area. Most of the work on opinion or sentiment analysis has been suggested on social platforms such as Blogs, Twitter, and Facebook. Nevertheless, when it comes to recognizing sentiments from scientific citation papers, investigators used to face difficulties due to the implied and unseen natures of sentiments or opinions. As the citation references are reflected implicitly positive in opinion, famous ranking and indexing prototypes frequently disregard the sentiment existence while citing. Hence, in the proposed framework the paper emphasizes the issue of classifying positive and negative polarity of reference sentiments in scientific research papers. First, the paper scraps the PDF articles from arxiv.org under the computer science group consisting of articles that are comprised of ‘autism’ in their title, then the paper extracted cited references and assigns polarity scores to each cited reference. The paper uses a supervised classifier with a combination of significant feature sets and compared the performance of the models. Experimental results show that a combined CNN-LSTM deep neural network model results in 85% of accuracy while traditional models result in less accuracy.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114868737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Jagannadham, D. V. S. Narayana, P. Ganesh, D. Koteswar
Many heart diseases can be identified and cured at an early stage by studying the changes in the features of electrocardiogram (ECG) signal. Myocardial Infarction (MI) is the serious cause of death worldwide. If MI can be detected early, the death rate will reduce. In this paper, an algorithm to detect MI in an ECG signal using Daubechies wavelet transform technique is developed. The ECG signal-denoising is performed by removing the corresponding wavelet coefficients at higher scale. After denoising, an important step towards identifying an arrhythmia is the feature extraction from the ECG. Feature extraction is carried out to detect the R peaks of the ECG signal. Since as R peak is having the highest amplitude, and therefore it is detected in the first round, subsequently location of other peaks are determined. Having completed the preprocessing and the feature extraction the MI is detected from the ECG based on inverted T wave logic and ST segment elevation. The algorithm was evaluated using MIT-BIH database and European database satisfactorily.
{"title":"Identification of myocardial infarction from analysis of ECG signal","authors":"D. Jagannadham, D. V. S. Narayana, P. Ganesh, D. Koteswar","doi":"10.3233/KES-200043","DOIUrl":"https://doi.org/10.3233/KES-200043","url":null,"abstract":"Many heart diseases can be identified and cured at an early stage by studying the changes in the features of electrocardiogram (ECG) signal. Myocardial Infarction (MI) is the serious cause of death worldwide. If MI can be detected early, the death rate will reduce. In this paper, an algorithm to detect MI in an ECG signal using Daubechies wavelet transform technique is developed. The ECG signal-denoising is performed by removing the corresponding wavelet coefficients at higher scale. After denoising, an important step towards identifying an arrhythmia is the feature extraction from the ECG. Feature extraction is carried out to detect the R peaks of the ECG signal. Since as R peak is having the highest amplitude, and therefore it is detected in the first round, subsequently location of other peaks are determined. Having completed the preprocessing and the feature extraction the MI is detected from the ECG based on inverted T wave logic and ST segment elevation. The algorithm was evaluated using MIT-BIH database and European database satisfactorily.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116672649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent advancement in technologies such as Cloud, Internet of Things etc., leads to the increase usage of mobile computing. Present day mobile computing are too sophisticated and advancement are reaching great heights. Moreover, the present day mobile network suffers due to external and internal intrusions within and outside networks. The existing security systems to protect the mobile networks are incapable to detect the recent attacks. Further, the existing security system completely depends on the traditional signature and rule based approaches. Recent attacks have the property of not fluctuating its behaviour during attack. Hence, a robust Intrusion Detection System (IDS) is desirable. In order to address the above mentioned issue, this paper proposed a robust IDS using Machine Learning Techniques (MLT). The key of using MLT is to utilize the power of ensembles. The ensembles of classifier used in this paper are Random Forest (RF), KNN, Naïve Bayes (NB), etc. The proposed IDS is experimentally tested and validated using a secure test bed. The experimental results also confirms that the proposed IDS is robust enough to withstand and detect any form of intrusions and it is also noted that the proposed IDS outperforms the state of the art IDS with more than 95% accuracy.
{"title":"A robust intrusion detection system using machine learning techniques for MANET","authors":"N. Ravi, G. Ramachandran","doi":"10.3233/KES-200047","DOIUrl":"https://doi.org/10.3233/KES-200047","url":null,"abstract":"Recent advancement in technologies such as Cloud, Internet of Things etc., leads to the increase usage of mobile computing. Present day mobile computing are too sophisticated and advancement are reaching great heights. Moreover, the present day mobile network suffers due to external and internal intrusions within and outside networks. The existing security systems to protect the mobile networks are incapable to detect the recent attacks. Further, the existing security system completely depends on the traditional signature and rule based approaches. Recent attacks have the property of not fluctuating its behaviour during attack. Hence, a robust Intrusion Detection System (IDS) is desirable. In order to address the above mentioned issue, this paper proposed a robust IDS using Machine Learning Techniques (MLT). The key of using MLT is to utilize the power of ensembles. The ensembles of classifier used in this paper are Random Forest (RF), KNN, Naïve Bayes (NB), etc. The proposed IDS is experimentally tested and validated using a secure test bed. The experimental results also confirms that the proposed IDS is robust enough to withstand and detect any form of intrusions and it is also noted that the proposed IDS outperforms the state of the art IDS with more than 95% accuracy.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In new age scenario Prisons are meant not only to punish the convict but also correct the situation and habits of the convicts, who is responsible for inflicting harm on the victim. But family members of the convict are also the victim in the process and situation. Convicts family face the horrific situation during this process. Prisoner’s families are maltreated directly and indirectly by the society. They live in destitution. Imprisonment of family member not only diminishes the earnings of adult men but also reduces familial resources for the basic necessities of life. The family members have to sacrifice their children’s education, ancestor’s property, past savings, in some cases even necessary wants of their life. We always think about the victim on whom the harm has been directly inflicted and completely ignore the harm inflicted on the kin of the convict. The present study is an endeavour to bring to light the economic vulnerability of families of convicts in a prison in Bhubaneswar. After interviewing the family members of prisoners, statistical analysis is done through SPSS. The findings are elaborated in narrative manner so that the findings will be helpful for policy makers in future.
{"title":"Economic victimisation of convict's family: Statistical analysis through SPSS","authors":"Snigdha Sarkar, S. Samanta, A. Mitra","doi":"10.3233/KES-200048","DOIUrl":"https://doi.org/10.3233/KES-200048","url":null,"abstract":"In new age scenario Prisons are meant not only to punish the convict but also correct the situation and habits of the convicts, who is responsible for inflicting harm on the victim. But family members of the convict are also the victim in the process and situation. Convicts family face the horrific situation during this process. Prisoner’s families are maltreated directly and indirectly by the society. They live in destitution. Imprisonment of family member not only diminishes the earnings of adult men but also reduces familial resources for the basic necessities of life. The family members have to sacrifice their children’s education, ancestor’s property, past savings, in some cases even necessary wants of their life. We always think about the victim on whom the harm has been directly inflicted and completely ignore the harm inflicted on the kin of the convict. The present study is an endeavour to bring to light the economic vulnerability of families of convicts in a prison in Bhubaneswar. After interviewing the family members of prisoners, statistical analysis is done through SPSS. The findings are elaborated in narrative manner so that the findings will be helpful for policy makers in future.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133186607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rapid growth in technology and information lead the human to witness the improved growth in velocity, volume of data, and variety. The data in the business organizations demonstrate the development of big data applications. Because of the improving demand of applications, analysis of sophisticated streaming big data tends to become a significant area in data mining. One of the significant aspects of the research is employing deep learning approaches for effective extraction of complex data representations. Accordingly, this survey provides the detailed review of big data classification methodologies, like deep learning based techniques, Convolutional Neural Network (CNN) based techniques, K-Nearest Neighbor (KNN) based techniques, Neural Network (NN) based techniques, fuzzy based techniques, and Support vector based techniques, and so on. Moreover, a detailed study is made by concerning the parameters, like evaluation metrics, implementation tool, employed framework, datasets utilized, adopted classification methods, and accuracy range obtained by various techniques. Eventually, the research gaps and issues of various big data classification schemes are presented.
{"title":"Literature review and analysis on big data stream classification techniques","authors":"B. Srivani, N. Sandhya, B. Rani","doi":"10.3233/KES-200042","DOIUrl":"https://doi.org/10.3233/KES-200042","url":null,"abstract":"Rapid growth in technology and information lead the human to witness the improved growth in velocity, volume of data, and variety. The data in the business organizations demonstrate the development of big data applications. Because of the improving demand of applications, analysis of sophisticated streaming big data tends to become a significant area in data mining. One of the significant aspects of the research is employing deep learning approaches for effective extraction of complex data representations. Accordingly, this survey provides the detailed review of big data classification methodologies, like deep learning based techniques, Convolutional Neural Network (CNN) based techniques, K-Nearest Neighbor (KNN) based techniques, Neural Network (NN) based techniques, fuzzy based techniques, and Support vector based techniques, and so on. Moreover, a detailed study is made by concerning the parameters, like evaluation metrics, implementation tool, employed framework, datasets utilized, adopted classification methods, and accuracy range obtained by various techniques. Eventually, the research gaps and issues of various big data classification schemes are presented.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129057025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In image thresholding segmentation, gray level of pixels is the basic element to describe images. Besides, the gradient information of pixels is also a key feature to represent image space distribution. Therefore, the co-occurrence probability of gray and gradient of pixels is an effective information to describe image. In this paper, gray-gradient asymmetrical co-occurrence matrix is constructed, uniformity probability of image region is produced, and a minimum square distance criterion function based on gray-gradient co-occurrence matrix is proposed to measure the deviation between original and binary images. Comparing with gray-gray asymmetrical co-occurrence matrix and relative entropy-based symmetrical co-occurrence matrix method, the proposed method can obtain more complete segmentation results, especially for small-size object extraction. The peak signal to noise ratio probability also shows the better segmentation performance of our proposed method.
{"title":"Minimum square distance thresholding method applying gray-gradient co-occurrence matrix","authors":"Hong Zhang, Qiang Zhi, Fan Yang","doi":"10.3233/KES-200040","DOIUrl":"https://doi.org/10.3233/KES-200040","url":null,"abstract":"In image thresholding segmentation, gray level of pixels is the basic element to describe images. Besides, the gradient information of pixels is also a key feature to represent image space distribution. Therefore, the co-occurrence probability of gray and gradient of pixels is an effective information to describe image. In this paper, gray-gradient asymmetrical co-occurrence matrix is constructed, uniformity probability of image region is produced, and a minimum square distance criterion function based on gray-gradient co-occurrence matrix is proposed to measure the deviation between original and binary images. Comparing with gray-gray asymmetrical co-occurrence matrix and relative entropy-based symmetrical co-occurrence matrix method, the proposed method can obtain more complete segmentation results, especially for small-size object extraction. The peak signal to noise ratio probability also shows the better segmentation performance of our proposed method.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the shapes of breast cell are diverse and there is adherent between cells, fast and accurate segmentation for breast cell remains a challenging task. In this paper, an automatic segmentation algorithm for breast cell image is proposed, which focuses on the segmentation of adherent cells. First of all, breast cell image enhancement is carried out by the staining regularization. Then, the cells and background are separated by Multi-scale Convolutional Neural Network (CNN) to obtain the initial segmentation results. Finally, the Curvature Scale Space (CSS) corner detection is used to segment adherent cells. Experimental results show that the proposed algorithm can achieve 93.01% accuracy, 93.93% sensitivity and 95.69% specificity. Compared with other segmentation algorithms of breast cell, the proposed algorithm can not only solve the difficulty of segmenting adherent cells, but also improve the segmentation accuracy of adherent cells.
{"title":"Automatic segmentation algorithm for breast cell image based on multi-scale CNN and CSS corner detection","authors":"Hao-yang Tang, Cong Song, Meng Qian","doi":"10.3233/KES-200041","DOIUrl":"https://doi.org/10.3233/KES-200041","url":null,"abstract":"As the shapes of breast cell are diverse and there is adherent between cells, fast and accurate segmentation for breast cell remains a challenging task. In this paper, an automatic segmentation algorithm for breast cell image is proposed, which focuses on the segmentation of adherent cells. First of all, breast cell image enhancement is carried out by the staining regularization. Then, the cells and background are separated by Multi-scale Convolutional Neural Network (CNN) to obtain the initial segmentation results. Finally, the Curvature Scale Space (CSS) corner detection is used to segment adherent cells. Experimental results show that the proposed algorithm can achieve 93.01% accuracy, 93.93% sensitivity and 95.69% specificity. Compared with other segmentation algorithms of breast cell, the proposed algorithm can not only solve the difficulty of segmenting adherent cells, but also improve the segmentation accuracy of adherent cells.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115536125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For emotion recognition, here the features extracted from prevalent speech samples of Berlin emotional database are pitch, intensity, log energy, formant, mel-frequency ceptral coefficients (MFCC) as base features and power spectral density as an added function of frequency. In these work seven emotions namely anger, neutral, happy, Boredom, disgust, fear and sadness are considered in our study. Temporal and Spectral features are considered for building AER(Automatic Emotion Recognition) model. The extracted features are analyzed using Support Vector Machine (SVM) and with multilayer perceptron (MLP) a class of feed-forward ANN classifiers is/are used to classify different emotional states. We observed 91% accuracy for Angry and Boredom emotional classes by using SVM and more than 96% accuracy using ANN and with an overall accuracy of 87.17% using SVM, 94% for ANN.
{"title":"Recognition of human emotion with spectral features using multi layer-perceptron","authors":"A. Reddy, V. Vijayarajan","doi":"10.3233/KES-200044","DOIUrl":"https://doi.org/10.3233/KES-200044","url":null,"abstract":"For emotion recognition, here the features extracted from prevalent speech samples of Berlin emotional database are pitch, intensity, log energy, formant, mel-frequency ceptral coefficients (MFCC) as base features and power spectral density as an added function of frequency. In these work seven emotions namely anger, neutral, happy, Boredom, disgust, fear and sadness are considered in our study. Temporal and Spectral features are considered for building AER(Automatic Emotion Recognition) model. The extracted features are analyzed using Support Vector Machine (SVM) and with multilayer perceptron (MLP) a class of feed-forward ANN classifiers is/are used to classify different emotional states. We observed 91% accuracy for Angry and Boredom emotional classes by using SVM and more than 96% accuracy using ANN and with an overall accuracy of 87.17% using SVM, 94% for ANN.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}