Voice Driven Emotion Recognizer Mobile Phone

Author(s):  
Abdul Razak Aishah ◽  
Izani Zainal Abidin Mohamad ◽  
Ryoichi Komiya

This article proposes an application of emotion recognizer system in telecommunications entitled voice driven emotion recognizer mobile phone (VDERM). The design implements a voice-to-image conversion scheme through a voice-to-image converter that extracts emotion features in the voice, recognizes them, and selects the corresponding facial expression images from image bank. Since it only requires audio transmission, it can support video communication at a much lower bit rate than the conventional videophone. The first prototype of VDERM system has been implemented into a personal computer. The coder, voice-to-image converter, image database, and system interface are preinstalled in the personal computer. In this article, we present and discuss some evaluations that have been conducted in supporting this proposed prototype. The results have shown that both voice and image are important for people to correctly recognize emotion in telecommunications and the proposed solution can provide an alternative to videophone systems. The future works list some modifications that can be done to the proposed prototype in order to make it more practical for mobile applications.

2009 ◽  
pp. 3511-3528
Author(s):  
Aishah Abdul Razak ◽  
Mohamad Izani Zainal Abidin ◽  
Ryoichi Komiya

This article proposes an application of emotion recognizer system in telecommunications entitled voice driven emotion recognizer mobile phone (VDERM). The design implements a voice-to-image conversion scheme through a voice-to-image converter that extracts emotion features in the voice; recognizes them; and selects the corresponding facial expression images from image bank. Since it only requires audio transmission; it can support video communication at a much lower bit rate than the conventional videophone. The first prototype of VDERM system has been implemented into a personal computer. The coder; voice-to-image converter; image database; and system interface are preinstalled in the personal computer. In this article; we present and discuss some evaluations that have been conducted in supporting this proposed prototype. The results have shown that both voice and image are important for people to correctly recognize emotion in telecommunications and the proposed solution can provide an alternative to videophone systems. The future works list some modifications that can be done to the proposed prototype in order to make it more practical for mobile applications.


1995 ◽  
Vol 32 (4) ◽  
pp. 677
Author(s):  
M J Shin ◽  
G W Kim ◽  
T J Chun ◽  
W H Ahn ◽  
S K Balk ◽  
...  

2020 ◽  
Vol 52 (4) ◽  
pp. 726-732
Author(s):  
Claire Beaugrand

In a tweet posted on 29 March 2018, a bidūn activist—who was later jailed from July 2019 to January 2020 for peacefully protesting against the inhumane conditions under which the bidūn are living—shared a video. The brief video zooms in closely on an ID card, recognizable as one of those issued to the bidūn, or long-term residents of Kuwait who are in contention with the state regarding their legal status. More precisely, the mobile phone camera focuses on the back of the ID card, on one line with a special mention added by the Central System (al-jihāz al-markazī), the administration in charge of bidūn affairs. Other magnetic strip cards hide the personal data written above and below it. A male voice can be heard saying that he will read this additional remark, but before even doing so he bursts into laughter. The faceless voice goes on to read out the label in an unrestrained laugh: “ladayh qarīb … ladayh qarīna … dālla ʿalā al-jinsiyya al-ʿIrāqiyya” (he has a relative … who has presumptive evidence … suggesting an Iraqi nationality). The video shakes as the result of a contagious laugh that grows in intensity. In the Kuwaiti dialect, the voice continues commenting: “Uqsim bil-Allāh, gaʿadt sāʿa ufakkir shinū maʿanāt hal-ḥatchī” (I swear by God, it took me an hour to figure out the meaning of this nonsense), before reading the sentence again, stopping and guffawing, and asking if he should “repeat it a third time,” expressing amazement at its absurdity. The tweet, addressed to the head of the Central System (mentioned in the hashtag #faḍīḥat Sāliḥ al-Faḍāla, or #scandal Salih al-Fadala), reads: In lam tastaḥī fa-'ktub mā shaʾt (Don't bother, write what you want).


Author(s):  
Tetiana Lysiuk ◽  
Anastasiia Arendarchuk ◽  
Oksana Tereshchuk

The article presents the results of a study of the use of technological innovations in hotel enterprises in conditions of increased competition and an unfavorable period for the hotel business. The largest and most popular world hotel chains are analyzed. The innovations introduced at hotel enterprises are studied. It has been found that all the innovations that have been introduced in recent years are related to Internet technologies. The definition of innovation by the Law of Ukraine on Innovation was provided. The directions of basic innovative activity in the tourist and hotel business were listed. The most popular innovative technologies that have started to be used by hotel enterprises in the conditions of the coronavirus pandemic are singled out and analyzed. Among the technological innovations were studied: chatbots, mobile applications for hotel chains and small boutique hotels. The introduction of digital keys instead of the use of card keys was also investigated. The novelty of the voice assistant technology, which is planned to be used by hotel rooms, was investigated. The scientific novelty of the obtained research results is the updating and generalization of information on the use of technological innovations by foreign hotel enterprises, including world-class hotel chains. The uniqueness of the article also lies in the fact that examples of hotel enterprises that actively apply this or that technological innovation in their activities were given. Thus, this information allows you to see which hotel companies are the most innovative and, consequently, competitive in the hotel market. Further research may be aimed at determining the readiness of the domestic hotel market to introduce the latest technologies, such as chatbots, digital keys, mobile applications for small and chain hotels and voice assistants in rooms. It is necessary to study especially expediently expediency of introduction of service of the voice assistant in domestic hotels, in particular in business hotels of big cities. No less carefully you need to explore the feasibility of creating your own mobile applications for small hotels.


Author(s):  
Thaísa C. Lacerda ◽  
Juliane V. Nunes ◽  
Christiane Gresse von Wangenheim

In this chapter, we discuss the importance of evaluating the usability of mobile applications using tools and technics that consider their specific characteristics. One common way to evaluate usability is using heuristics. However, since many assumptions regarding usability of computer applications are not true for mobile applications, a question arises: does there exist usability heuristics specific for this type of device? To answer this question, we conducted a systematic literature review. We mapped the encountered sets of heuristics to Nielsen's ten heuristics and identified additional ones specifically proposed for this kind of device. Our review indicates that research with respect to usability heuristics for mobile phones are still sparse. Nevertheless, this chapter provides an overview on the state of the art that can guide the design and evaluation of interfaces for mobile applications as well as provide a starting point for the evolution of such customized heuristics.


Author(s):  
Thangavel M. ◽  
Divyaprabha M. ◽  
Abinaya C.

Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.


Author(s):  
George M. Giaglis

The term “mobile era” as a characterization of the 21st century can hardly be considered an exaggeration (Kalakota & Robinson, 2001). Mobile phones are the fastest penetrating technology in the history of mankind, and global mobile phone ownership has surpassed even the ownership of fixed phones. Mobile applications, despite potentially being very different in nature from each other, all share a common characteristic that distinguishes them from their wire-line counterparts: they allow their users to move around while remaining capable of accessing the network and its services. In the mobility era, location identification has naturally become a critical attribute, as it opens the door to a world of applications and services that were unthinkable only a few years ago (May, 2001).


2017 ◽  
Vol 7 (1.1) ◽  
pp. 655
Author(s):  
Mrs M. Kavitha ◽  
Y Manideep ◽  
M Vamsi Krishna ◽  
P Prabhuram

This task displays the development Speech Controlled Home Mechanization Framework Using Android Gadgets of home apparatuses in light-weight of voice order utilizing humanoid. This technique has been meant to help and provides the help to senior and unfit individual’s reception. Recent voice based applications provide acknowledges the voice contribution from the advanced transportable. During this venture, the voice input has been caught by the ports and might be sent to the Arduino Uno. HC 05 module in Arduino Uno got the flag and handled the information flag to manage the two power sockets and fan. The proposed framework expected to manage electrical devices with general user friendly interface and easy transnational. In this project we have a tendency to gift associate humanoid OS based mostly application for smartphone that speaks with the fan through mobile phone persistently to manage the FAN speed. The humanoid stage assumes a key half to holds a most extreme range of users once contrasted with all different stage. We have got exhibited up to twenty meter of vary to manage the house apparatuses by suggests that of Bluetooth.  


2014 ◽  
Vol 643 ◽  
pp. 159-165
Author(s):  
Shu Wei Liu ◽  
Yan Wen Wu ◽  
Yu Chong Tian ◽  
Kai Jin

In this paper, we connect the pedometer to the mobile phone or personal computer using the platform of IOT. This reduces the defect of pedometer as a single node. The pedometer part integrates ADXL345 acceleration transducer and MSP430 MCU to get the data of steps, energy consumption and speed of a walker with low latency, then uploads this digital information to mobile phone or personal computer using Bluetooth technology. The data information can be uploaded into the pedometer server to realize online query of walkers' exercise records, exercise guidance and other function.


Sign in / Sign up

Export Citation Format

Share Document