CMAC for speech emotion profiling
Cultural differences have been one of the many factors that can cause failures in speech emotion analysis. If this cultural parameter could be regarded as noise artifacts in detecting emotion in speech, we could then extract pure emotion speech signal from the raw emotional speech. In this paper we...
| Main Authors: | Kamaruddin, Norhaslinda, Abdul Rahman, Abdul Wahab |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/10075/ http://irep.iium.edu.my/10075/4/AWahab_Interspeech_2009_IS090602.pdf |
Similar Items
Universality and diversity of cultural-influenced speech emotion recognition system
by: Kamaruddin, Norhaslinda, et al.
Published: (2016)
by: Kamaruddin, Norhaslinda, et al.
Published: (2016)
Deep learning for emotional speech recognition
by: Alhamada, M. I., et al.
Published: (2020)
by: Alhamada, M. I., et al.
Published: (2020)
Visualization of job availability based on text analytics localization approach
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
Statistical modeling for speech recognition
by: Khalifa, Othman Omran, et al.
Published: (2013)
by: Khalifa, Othman Omran, et al.
Published: (2013)
The design of a speech delay screening mobile application for Malaysian parents
by: Mohammed, Siti Asma, et al.
Published: (2019)
by: Mohammed, Siti Asma, et al.
Published: (2019)
Thermal imaging-based human emotion detection: GLCM feature extraction approach
by: Md Yusof, Hazlina
Published: (2015)
by: Md Yusof, Hazlina
Published: (2015)
STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Arabic Speaker-Independent Continuous
Automatic Speech Recognition Based on a
Phonetically Rich and Balanced Speech Corpus
by: Abushariah, Mohammad Abd-Alrahman Mahmoud, et al.
Published: (2012)
by: Abushariah, Mohammad Abd-Alrahman Mahmoud, et al.
Published: (2012)
Correlation between speaker gender and perceptual quality of mobile speech signal
by: Al-Othmani, Abdulaleem Z., et al.
Published: (2020)
by: Al-Othmani, Abdulaleem Z., et al.
Published: (2020)
Transitional approaches for PERN migration to SDN
by: Abdul Rahman, Abdul Malik, et al.
Published: (2016)
by: Abdul Rahman, Abdul Malik, et al.
Published: (2016)
Factors affecting instructors' adoption of learning management systems: a theoretical framework
by: Abdallah, Nahel A. O., et al.
Published: (2016)
by: Abdallah, Nahel A. O., et al.
Published: (2016)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Development of communication module for semi-autonomos UAV and robots
by: Abdul Aziz, Normaziah, et al.
Published: (2012)
by: Abdul Aziz, Normaziah, et al.
Published: (2012)
Resolving ethical dilemma in technology enhanced education through smart mobile devices
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
Ethical perspective of students in Global Learning Environment
by: Muhammad, AbdulHafeez, et al.
Published: (2013)
by: Muhammad, AbdulHafeez, et al.
Published: (2013)
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
by: Fayaz, Muhammad, et al.
Published: (2018)
by: Fayaz, Muhammad, et al.
Published: (2018)
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
An applications development for record keeping of police stations in Pakistan
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Risk management policies of telecommunication and engineering laboratories
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Robotic exoskeleton control for lower limb rehabilitation
of knee joint
by: Ahmed, Syed Faiz, et al.
Published: (2018)
by: Ahmed, Syed Faiz, et al.
Published: (2018)
A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
The intention to cyberbully and cyberbullying behaviour among undergraduate students
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
A Review on energy consumption optimization techniques in IoT based smart building environments
by: Shah, Abdul Salam, et al.
Published: (2019)
by: Shah, Abdul Salam, et al.
Published: (2019)
A comparative review of ISMS implementation based on ISO 27000 Series in organizations of different business sectors
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
by: Hamdi, Zaidatulnajla, et al.
Published: (2019)
Unstructured source artifacts ontology for requirement validation in GDSD
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
Visualization representation benefits of pre-requirement specification tractability
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
The performance evaluation of a 3D torus network using partial link-sharing method in NoC router buffer
by: Fukase, Naohisa, et al.
Published: (2017)
by: Fukase, Naohisa, et al.
Published: (2017)
Transaction Management techniques and practices in current cloud computing environment: a survey
by: Waqas, Ahmad, et al.
Published: (2015)
by: Waqas, Ahmad, et al.
Published: (2015)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
WSN based sensing model for smart crowed movement with identification: an extended study
by: Nawaz, Naeem A., et al.
Published: (2017)
by: Nawaz, Naeem A., et al.
Published: (2017)
Log visualization of intrusion and prevention reverse proxy server against web attacks
by: Mantoro, Teddy, et al.
Published: (2013)
by: Mantoro, Teddy, et al.
Published: (2013)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Similar Items
-
Universality and diversity of cultural-influenced speech emotion recognition system
by: Kamaruddin, Norhaslinda, et al.
Published: (2016) -
Deep learning for emotional speech recognition
by: Alhamada, M. I., et al.
Published: (2020) -
Visualization of job availability based on text analytics localization approach
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019) -
Statistical modeling for speech recognition
by: Khalifa, Othman Omran, et al.
Published: (2013) -
The design of a speech delay screening mobile application for Malaysian parents
by: Mohammed, Siti Asma, et al.
Published: (2019)