Facial emotion recognition using geometrical features based deep learning techniques
DOI:
https://doi.org/10.15837/ijccc.2023.4.4644Keywords:
VGG-19s, Emotion Recognition, Facial Analysis, Facial Landmarks, feature extraction, Geometrical features, Hyper parametersAbstract
In recent years, intelligent emotion recognition is active research in computer vision to understand the dynamic communication between machines and humans. As a result, automatic emotion recognition allows the machine to assess and acquire the human emotional state to predict the intents based on the facial expression. Researchers mainly focus on speech features and body motions; identifying affect from facial expressions remains a less explored topic. Hence, this paper proposes a novel approach for intelligent facial emotion recognition using optimal geometrical features from facial landmarks using VGG-19s (FCNN). Here, we utilize Haarcascade to detect the subject face and determine the distance and angle measurements. The entire process is to classify the facial expressions based on extracting relevant features with the normalized angle and distance measures. The experimental analysis shows high accuracy on the MUG dataset of 94.22% and 86.45% on GEMEP datasets, respectively.References
Pérez, Ramses Fuentes, et al. "Prototype of MANET Network with Ring Topology for Mobile Devices." (2021).
Rajathi L.V. and RubaSoundar K. -. "A Survey on Various MANET Protocols." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences (2022): n. pag.
Malik, Kamal, and AnshuBhasin. "A survey of mitigation techniques of packet drop attacks in MANET." SSRN Electronic Journal (2022):
https://doi.org/10.2139/ssrn.4031965
Korir, FridahChepkemoi, and Wilson Cheruiyot. "A survey on security challenges in the current MANET routing protocols." Global Journal of Engineering and Technology Advances (2022):
https://doi.org/10.30574/gjeta.2022.12.1.0114
Mohamed, Hossam El-Din, et al. "Using MANET in IoT Healthcare Applications: A Survey." (2021).
Al-Shakarchi, Sanaa J. H. and RaaidAlubady. "A Survey of Selfish Nodes Detection in MANET: Solutions and Opportunities of Research." 2021 1st Babylon International Conference on Information Technology and Science (BICITS) (2021): 178-184.
https://doi.org/10.1109/BICITS51482.2021.9509889
Alam, Tanweer and Mohamed Benaida. "The Role of Cloud-MANET Framework in the Internet of Things (IoT)." Computational Materials Science eJournal (2018): n. pag.
https://doi.org/10.3991/ijoe.v14i12.8338
Lakshmi, G. Vidhya and P. Vaishnavi. "An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution." Wireless Personal Communications 124 (2022): 333 - 348.
https://doi.org/10.1007/s11277-021-09359-2
Jabbar, Waheb A. et al. "MEQSA-OLSRv2: A Multicriteria-Based Hybrid Multipath Protocol for Energy- Efficient and QoS-Aware Data Routing in MANET-WSN Convergence Scenarios of IoT." IEEE Access 6 (2018): 76546-76572.
https://doi.org/10.1109/ACCESS.2018.2882853
Serhani, Abdellatif, et al. "AQ-Routing: mobility-, a stability-aware adaptive routing protocol for data routing in MANET-IoT systems." Cluster Computing 23 (2019): 13-27.
https://doi.org/10.1007/s10586-019-02937-x
Gomathi, K. and B. Parvathavarthini. "A Secure Clustering in MANET through Direct Trust Evaluation Technique." 2015 International Conference on Cloud Computing (ICCC) (2015): 1-6.
https://doi.org/10.1109/CLOUDCOMP.2015.7149624
Piyalikar et al. "ForecastWeighted Clustering in MANET." Procedia Computer Science 89 (2016): 253-260.
https://doi.org/10.1016/j.procs.2016.06.054
Suma, R., and Suma. "Integration of particle swarm optimization with an adaptive K-Nearest Neighbor for energy-efficient clustering in MANET." (2020).
"A HYBRID APPROACH FOR NODE CO-OPERATION BASED CLUSTERING IN MANET." (2018). Krishnan, Rahul. "A Survey on Game Theory Approaches for Improving Security in MANET." (2018).
Gupta, Alok and Nikhil Ranjan. "A Survey of Attacker Identification and Security Schemes in MANET." (2020).
Muruganandam, S. et al. "A Survey: Comparative study of security methods and trust manage solutions in MANET." 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) 1 (2019): 125-131.
https://doi.org/10.1109/ICONSTEM.2019.8918697
Usha, G. et al. "Survey of Single and Cross Layer Security in MANET." Indian journal of science and technology 9 (2016):
https://doi.org/10.17485/ijst/2016/v9i41/86053
Sumra, Dr.Irshad Ahmed, et al. "Security issues and Challenges in MANET-VANET-FANET: A Survey." EAI Endorsed Transactions on Energy Web 5 (2018): 155884.
https://doi.org/10.4108/eai.10-4-2018.155884
Rao, A. Arjuna et al. "Survey of Routing Protocols and Routing Attacks in MANET with Different Security Technique in Cryptography for Network Security." (2018).
Poongodi, M. et al. "5G based Blockchain network for authentic and ethical keyword search engine." IET Commun. 16 (2021): 442-448.
https://doi.org/10.1049/cmu2.12251
Zhang, Lei et al. "How Much Communication Resource is Needed to Run a Wireless Blockchain Network?" IEEE Network 36 (2021): 128-135
https://doi.org/10.1109/MNET.101.2100208
Nikhade, Jitendra R. and Vilas M. Thakare. "BlockChain Based Security Enhancement in MANET with the Improvisation of QoS Elicited from Network Integrity and Reliance Management." Ad Hoc Sens. Wirel. Networks 52 (2022): 123-171.
Suma, R. and Suma.. "Integration of particle swarm optimization with an adaptive K-Nearest Neighbor for energy-efficient clustering in MANET." (2020).
J, Martin Sahayaraj et al. "IEEHR: Improved Energy Efficient Honeycomb based Routing in MANET for Improving Network Performance and Longevity." International Journal on Recent and Innovation Trends in Computing and Communication (2022): n. pag.
https://doi.org/10.17762/ijritcc.v10i7.5575
Alappatt, Valanto and Joe Prathap P. M.. "Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E." International Journal of Computer Networks and Applications (2021): n. pag.
https://doi.org/10.22247/ijcna/2021/209706
DrishyaS., R. et al. "A Stable Clustering Scheme with Node Prediction in MANET." Int. J. Commun. Networks Inf. Secur. 13 (2021): n. pag.
https://doi.org/10.17762/ijcnis.v13i1.4746
Ponguwala, Maitreyi and Sreenivasa Rao. "E2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT." IET Commun. 13 (2019): 3207-3216.
https://doi.org/10.1049/iet-com.2019.0039
Kondaiah, Ramireddy and BachalaSathyanarayana. "Trust Factor and Fuzzy Firefly Integrated Particle Swarm Optimization Based Intrusion Detection and Prevention System for Secure Routing of MANET." International Journal of Computer Networks & Communications 10 (2018): 13-33.
https://doi.org/10.5121/ijcnc.2018.10102
Khan, Md. Sameeruddin and Md. Yusuf Mulge. "Efficient and Secure Data Transmission in MANETs against Malicious AttackUsing AODV Routing and PSO Clustering with AES Cryptography." (2017).
Nagendranth, M. V. S. S. et al. "Type II fuzzy-based clustering with improved ant colony optimizationbased routing (t2fcatr) protocol for secured data transmission in manet." The Journal of Supercomputing 78 (2022): 9102 - 9120.
https://doi.org/10.1007/s11227-021-04262-w
A.Karthik, Dr. J.L Mazher Iqbal. (2020). Performance estimation based recurrent-convolutional encoder decoder for speech enhancement. International Journal of Advanced Science and Technology, 29(05), 772 - 777. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/9611
Sakkarapani, Krishnaveni and C. Chandra Prabha. "Secure Multi-Path Routing Using Splitting and Merging Based Clustering for Reducing Power Usage in MANET." (2021).
https://doi.org/10.22247/ijcna/2021/208889
Mohindra, AnubhutiRoda and Charu Gandhi. "A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET." (2021).
https://doi.org/10.48048/wjst.2021.8987
Veeraiah, N. and B. Tirumala Krishna. "An approach for optimal-secure multi-path routing and intrusion detection in MANET." Evolutionary Intelligence 15 (2020): 1313-1327.
https://doi.org/10.1007/s12065-020-00388-7
Rani, Simpel. "A Hybrid and Secure Clustering Technique for Isolation of Black hole Attack in MANET." (2018).
B, Revathi and Arulanandam K. "Design And Development of Robust And Secure Cluster Routing Algorithm For Manet Based IOT." International Journal of Computer Trends and Technology (2021): n. pag.
https://doi.org/10.14445/22312803/IJCTT-V69I8P104
Sajyth, RB and G. Sujatha. "Design of Data Confidential and Reliable Bee Clustering Routing Protocol in MANET." 2018 International Conference on Computer Communication and Informatics (ICCCI) (2018): 1-7.
https://doi.org/10.1109/ICCCI.2018.8441217
Rajaram, A., & Baskar, A. (2023).Hybrid Optimization-Based Multi-Path Routing for Dynamic Cluster- Based MANET. CYBERNETICS AND SYSTEMS.
Karthik, A., MazherIqbal, J.L. Efficient Speech Enhancement Using Recurrent Convolution Encoder and Decoder. Wireless Pers Commun 119, 1959-1973 (2021). https://doi.org/10.1007/s11277-021-08313-6
https://doi.org/10.1007/s11277-021-08313-6
Anand, R. P., & Rajaram, A. (2020, December). Effective timer count scheduling with spectator routing using stifle restriction algorithm in manet. In IOP Conference series: materials science and engineering
https://doi.org/10.1088/1757-899X/994/1/012031
(Vol. 994, No. 1, p. 012031).IOP Publishing.
Rathish, C. R., & Rajaram, A. (2018). Sweeping inclusive connectivity based routing in wireless sensor networks. ARPN Journal of Engineering and Applied Sciences, 3(5), 1752-1760.
M. S. Gharajeh, "FSB-System: A Detection System for Fire, Suffocation, and Burn Based on Fuzzy Decision Making, MCDM, and RGB Model in Wireless Sensor Networks," Wireless Personal Communications, vol. 105, no. 4, pp. 1171-1213, Mar. 2019.
https://doi.org/10.1007/s11277-019-06141-3
M. S. Gharajeh, "A Neural-MCDM-Based Routing Protocol for Packet Transmission in Mobile Ad Hoc Networks," International Journal of Communication Networks and Distributed Systems, vol. 21, no. 4, pp. 496-527, Sept. 2018.
Additional Files
Published
Issue
Section
License
Copyright (c) 2023 vaijayanthi s
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.