2023
DOI: 10.1016/j.eswa.2023.120947
|View full text |Cite
|
Sign up to set email alerts
|

Facial Micro Emotion Detection and Classification Using Swarm Intelligence based Modified Convolutional Network

A.N. Arun,
P. Maheswaravenkatesh,
T. Jayasankar
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 25 publications
0
1
0
Order By: Relevance
“…IV. LIMITATIONS First and foremost, the heart of these issues is the FER datasets containing emotion images which are unbalanced, causing problems to methods for detecting emotions and thus hampering progress on these issues [1], [14], [15]. Some investigations are too narrow by focusing only on particular muscles that are used for the expression; these neglect the important role played by other crucial facial movements [5].…”
Section: Techniques Usedmentioning
confidence: 99%
See 1 more Smart Citation
“…IV. LIMITATIONS First and foremost, the heart of these issues is the FER datasets containing emotion images which are unbalanced, causing problems to methods for detecting emotions and thus hampering progress on these issues [1], [14], [15]. Some investigations are too narrow by focusing only on particular muscles that are used for the expression; these neglect the important role played by other crucial facial movements [5].…”
Section: Techniques Usedmentioning
confidence: 99%
“…Therefore, a trained classifier is used to generate emotion labels for new, unseen facial expressions so that recognizing and categorizing emotions is possible. 1 Student, Information Technology Department, M.H. Saboo Siddik College of Engineering, Mumbai, India, husnas2933@gmail.com Human experiences are always accompanied by emotions that are complex and multifaceted.…”
Section: Introductionmentioning
confidence: 99%
“…IoT becomes a combination of cloud-linked embedding mechanisms utilized by the user for accessing IT-based services using the mixture of internet protocol and electronics-based objects (Dat-Thinh et al, 2022;Doriguzzi-Corin et al, 2020;Le et al, 2022;Ullah & Mahmoud, 2021). In IoT, protocols utilized might have security vulnerability that has an effect on the mechanism (Arun et al, 2023;Karthick, Dawood, et al, 2023;Shajin et al, 2023). IoT gadgets were susceptible targets for attackers and cybercriminals due to their lack of basic security protocols (Shafiq et al, 2020;Rajesh, Shajin, & Kannayeram, 2022).…”
Section: Introductionmentioning
confidence: 99%