Toward Automatic Recognition of Children's Affective State Using Physiological Parameters and Fuzzy Model of Emotions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach

abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...

15 صفحه اول

Detection and Classification of Emotions Using Physiological Signals and Pattern Recognition Methods

Introduction: Emotions play an important role in health, communication, and interaction between humans. The ability to recognize the emotional status of people is an important indicator of health and natural relationships. In DEAP database, electroencephalogram (EEG) signals as well as environmental physiological signals related to 32 volunteers are registered. The participants in each video we...

متن کامل

Detection and Classification of Emotions Using Physiological Signals and Pattern Recognition Methods

Introduction: Emotions play an important role in health, communication, and interaction between humans. The ability to recognize the emotional status of people is an important indicator of health and natural relationships. In DEAP database, electroencephalogram (EEG) signals as well as environmental physiological signals related to 32 volunteers are registered. The participants in each video we...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

some properties of fuzzy hilbert spaces and norm of operators

in this thesis, at first we investigate the bounded inverse theorem on fuzzy normed linear spaces and study the set of all compact operators on these spaces. then we introduce the notions of fuzzy boundedness and investigate a new norm operators and the relationship between continuity and boundedness. and, we show that the space of all fuzzy bounded operators is complete. finally, we define...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Electrical and Computer Engineering

سال: 2012

ISSN: 1582-7445,1844-7600

DOI: 10.4316/aece.2012.02008