2020
DOI: 10.2139/ssrn.3601803
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Emotion Detection and Classification using Speech

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…Numerous Algorithms for Speech Emotion Recognition have been developed [5][6][7]. We compared our method to other best-in-class strategies in Table1.…”
Section: Results Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Numerous Algorithms for Speech Emotion Recognition have been developed [5][6][7]. We compared our method to other best-in-class strategies in Table1.…”
Section: Results Discussionmentioning
confidence: 99%
“…However, this research does not address them. A few weeks ago, Anjali et al [6] published a review that summarised speech emotion recognition techniques. Speech emotion detection features and approaches from 2009 to 2018 were briefly described and reviewed as part of the inquiry.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, the research is not addressing the accessible approaches to overcome weaknesses. Very recently, Anjali et al [51] published a review as a summary of speech emotion detection methods. A brief discussion of various features used in speech emotion recognition and review of methods used for this purpose from 2009 to 2018 has been provided in the re-search.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the data leakage, security hacks and attacks happens during the process of data transfer by taking advantage of the security discrepencies or vulnerabilities of computing, storage, and networking devices within the cloud datacentre [84][85][86][87][88][89][90][91]. Moreover, the co-residency of virtual machines of multiple users on a common physical server often leads to malicious activities like, data hampering and leakage of cloud user's confidential data [10,[92][93][94][95][96][97][98][99][100][101][102]. The malicious user or hacker launches one or multiple of virtual machines and exploits multiple network routes by achieving co-residency with the target virtual machine [29,[103][104][105][106][107][108][109][110][111][112].…”
Section: Introductionmentioning
confidence: 99%