Submit Search
Upload
IRJET - Threat Prediction using Speech Analysis
•
0 likes
•
13 views
IRJET Journal
Follow
https://irjet.net/archives/V7/i2/IRJET-V7I2271.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 2
Download now
Download to read offline
Recommended
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET Journal
Yolinda chiramba Survey Paper
Yolinda chiramba Survey Paper
Yolinda Chiramba
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
IJCI JOURNAL
IRJET- Comparative Analysis of Emotion Recognition System
IRJET- Comparative Analysis of Emotion Recognition System
IRJET Journal
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET Journal
IRJET- Study of Effect of PCA on Speech Emotion Recognition
IRJET- Study of Effect of PCA on Speech Emotion Recognition
IRJET Journal
Raichlin et al_Mobile application for Speech Rate
Raichlin et al_Mobile application for Speech Rate
Katia Raichlin-Levi
Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...
IOSR Journals
Recommended
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET Journal
Yolinda chiramba Survey Paper
Yolinda chiramba Survey Paper
Yolinda Chiramba
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
IJCI JOURNAL
IRJET- Comparative Analysis of Emotion Recognition System
IRJET- Comparative Analysis of Emotion Recognition System
IRJET Journal
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET Journal
IRJET- Study of Effect of PCA on Speech Emotion Recognition
IRJET- Study of Effect of PCA on Speech Emotion Recognition
IRJET Journal
Raichlin et al_Mobile application for Speech Rate
Raichlin et al_Mobile application for Speech Rate
Katia Raichlin-Levi
Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...
IOSR Journals
Ijetcas14 426
Ijetcas14 426
Iasir Journals
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
ijsrd.com
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
IJERA Editor
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
Mahdi Hosseini Moghaddam
Genetic algorithm based approach for
Genetic algorithm based approach for
IJCSES Journal
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
eSAT Journals
Dy36749754
Dy36749754
IJERA Editor
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
ijwmn
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
A45010107
A45010107
IJERA Editor
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET Journal
Ista presentation-android
Ista presentation-android
vinaykumar R
19 ijcse-01227
19 ijcse-01227
Shivlal Mewada
Using Brain Waves as New Biometric Feature for Authenticatinga Computer User...
Using Brain Waves as New Biometric Feature for Authenticatinga Computer User...
Buthainah Hamdy
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
eSAT Journals
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
eSAT Publishing House
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET Journal
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET Journal
A novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locations
iosrjce
IRJET- Factoid Question and Answering System
IRJET- Factoid Question and Answering System
IRJET Journal
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
IRJET Journal
IRJET - E-Assistant: An Interactive Bot for Banking Sector using NLP Process
IRJET - E-Assistant: An Interactive Bot for Banking Sector using NLP Process
IRJET Journal
More Related Content
What's hot
Ijetcas14 426
Ijetcas14 426
Iasir Journals
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
ijsrd.com
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
IJERA Editor
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
Mahdi Hosseini Moghaddam
Genetic algorithm based approach for
Genetic algorithm based approach for
IJCSES Journal
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
eSAT Journals
Dy36749754
Dy36749754
IJERA Editor
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
ijwmn
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
A45010107
A45010107
IJERA Editor
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET Journal
Ista presentation-android
Ista presentation-android
vinaykumar R
19 ijcse-01227
19 ijcse-01227
Shivlal Mewada
Using Brain Waves as New Biometric Feature for Authenticatinga Computer User...
Using Brain Waves as New Biometric Feature for Authenticatinga Computer User...
Buthainah Hamdy
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
eSAT Journals
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
eSAT Publishing House
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET Journal
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET Journal
A novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locations
iosrjce
What's hot
(19)
Ijetcas14 426
Ijetcas14 426
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Automatic Selection of Open Source Multimedia Softwares Using Error Back-Prop...
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
Genetic algorithm based approach for
Genetic algorithm based approach for
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
Dy36749754
Dy36749754
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
A45010107
A45010107
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
Ista presentation-android
Ista presentation-android
19 ijcse-01227
19 ijcse-01227
Using Brain Waves as New Biometric Feature for Authenticatinga Computer User...
Using Brain Waves as New Biometric Feature for Authenticatinga Computer User...
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
A novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locations
Similar to IRJET - Threat Prediction using Speech Analysis
IRJET- Factoid Question and Answering System
IRJET- Factoid Question and Answering System
IRJET Journal
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
IRJET Journal
IRJET - E-Assistant: An Interactive Bot for Banking Sector using NLP Process
IRJET - E-Assistant: An Interactive Bot for Banking Sector using NLP Process
IRJET Journal
IRJET - Audio Emotion Analysis
IRJET - Audio Emotion Analysis
IRJET Journal
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET Journal
A survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural Networks
IRJET Journal
IRJET - Mobile Chatbot for Information Search
IRJET - Mobile Chatbot for Information Search
IRJET Journal
Advancements in Hindi-English Neural Machine Translation: Leveraging LSTM wit...
Advancements in Hindi-English Neural Machine Translation: Leveraging LSTM wit...
IRJET Journal
IRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET Journal
Threat Detection System Using Data-science and NLP
Threat Detection System Using Data-science and NLP
IRJET Journal
MULTILINGUAL SPEECH TO TEXT CONVERSION USING HUGGING FACE FOR DEAF PEOPLE
MULTILINGUAL SPEECH TO TEXT CONVERSION USING HUGGING FACE FOR DEAF PEOPLE
IRJET Journal
Disease Prediction Using Machine Learning
Disease Prediction Using Machine Learning
BOHR International Journal of Computer Science (BIJCS)
IRJET - A Review on Text Recognition for Visually Blind People
IRJET - A Review on Text Recognition for Visually Blind People
IRJET Journal
IRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation System
IRJET Journal
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET Journal
Language and Offensive Word Detection
Language and Offensive Word Detection
IRJET Journal
Real Time Direct Speech-to-Speech Translation
Real Time Direct Speech-to-Speech Translation
IRJET Journal
IDE Code Compiler for the physically challenged (Deaf, Blind & Mute)
IDE Code Compiler for the physically challenged (Deaf, Blind & Mute)
IRJET Journal
IRJET- Survey on EEG Based Brainwave Controlled Home Automation
IRJET- Survey on EEG Based Brainwave Controlled Home Automation
IRJET Journal
IRJET- ASL Language Translation using ML
IRJET- ASL Language Translation using ML
IRJET Journal
Similar to IRJET - Threat Prediction using Speech Analysis
(20)
IRJET- Factoid Question and Answering System
IRJET- Factoid Question and Answering System
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
IRJET - E-Assistant: An Interactive Bot for Banking Sector using NLP Process
IRJET - E-Assistant: An Interactive Bot for Banking Sector using NLP Process
IRJET - Audio Emotion Analysis
IRJET - Audio Emotion Analysis
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
A survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural Networks
IRJET - Mobile Chatbot for Information Search
IRJET - Mobile Chatbot for Information Search
Advancements in Hindi-English Neural Machine Translation: Leveraging LSTM wit...
Advancements in Hindi-English Neural Machine Translation: Leveraging LSTM wit...
IRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural Network
Threat Detection System Using Data-science and NLP
Threat Detection System Using Data-science and NLP
MULTILINGUAL SPEECH TO TEXT CONVERSION USING HUGGING FACE FOR DEAF PEOPLE
MULTILINGUAL SPEECH TO TEXT CONVERSION USING HUGGING FACE FOR DEAF PEOPLE
Disease Prediction Using Machine Learning
Disease Prediction Using Machine Learning
IRJET - A Review on Text Recognition for Visually Blind People
IRJET - A Review on Text Recognition for Visually Blind People
IRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation System
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
Language and Offensive Word Detection
Language and Offensive Word Detection
Real Time Direct Speech-to-Speech Translation
Real Time Direct Speech-to-Speech Translation
IDE Code Compiler for the physically challenged (Deaf, Blind & Mute)
IDE Code Compiler for the physically challenged (Deaf, Blind & Mute)
IRJET- Survey on EEG Based Brainwave Controlled Home Automation
IRJET- Survey on EEG Based Brainwave Controlled Home Automation
IRJET- ASL Language Translation using ML
IRJET- ASL Language Translation using ML
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
result management system report for college project
result management system report for college project
Tonystark477637
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
Recently uploaded
(20)
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
result management system report for college project
result management system report for college project
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
IRJET - Threat Prediction using Speech Analysis
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1301 Threat Prediction using Speech Analysis Shreyas Kulkarni1, Nirantar Kulkarni2, Sushil Kukreja3, Kaustubh Kotkar4, Shambhavi Kulkarni5, Jayanti Kamalasekaran6 1,2,3,4B.E. Student, Dept. of Computer Engineering, Sinhgad College of Engineering, Vadgaon, Pune- 411041, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract -Speech recognition technology is one of the fast growing Engineering technologies. It has number of applications in different areas and provides potential benefits. Audio surveillance is getting more important and requires large amount of man hours to determine threats from audio. The aim of this system is to identify potential cases of threats, and provide an early warning or alert to such cases. This will be based on voice such as voice chat over telecommunication networks or social media. The intended result will be achieved in the three major steps. This system will utilize latest machine learning algorithms to identify phonetics from the audio and helps convert it to equivalent transcript form. Natural language processing will help in developing sentiment analysis model. Key Words: Recurrent Neural Network, Sentimental Analysis, Speech Recognition, Natural Language Processing. 1. INTRODUCTION There has been much advancement in the areas of education, healthcare, etc. However, crime is one of the major issues faced by societies all over the world. The crime investigation team follows a systematic procedure for solving a particular case. At first, there are multiple suspects. Hence, to reach to a conclusion, the police might have to listen to their call recordings. This procedure consumes a lot of time as a single person is required to listen to multiple recordings. This also has a scope for human errors. These errors and time can be minimized using our proposed system. In this system, the user needs to provide an audio as an input and the system displays a warning about threat present in the audio. There are 2 parts in this project. First part converts speech to text and the second part applies sentimental analysis to the text. The total percentage of threat is calculated and if it is above a certain threshold, warning is provided. This system can also be used separately, i.e. only the first part can be used by the user if he/she doesn’t want sentimental analysis on the text and the second part can be used be directly providing text to the system to analyze the sentiments in a particular text. Speech to text is converted using signal processing and sentimental analysis is carried out using Naïve Bayes algorithm and neural network. This system is advantageous as it provides the results of the recording directly without a person having to analyze it for hours. 1.1 Literature Survey 1. English Language Speech Recognition using MFCC and HMM: This model implements and exploits Mel Frequency Cepstral Coefficient and Hidden Markov Model Techniques to evaluate the competence of speech recognition. In this paper they have used data from Google audioSet and converted audio signal into a vector using MFCC. The research is done using Python Programming with the help of Librosa library to generate MFCC. 2. Speech Recognition with Deep Recurrent Neural Network: In this paper, they have implemented speech recognition technique using Recurrent Neural Network which will also take into consideration context of the sentence. They have taken TIMIT dataset to perform phoneme recognition. This model combines deep, bidirectional Long Short- term Memory RNNs with end-to-end training. 3. Speech Recognition using Deep Learning: In this paper, audio files are taken as input and Artificial Neural Network is used to predict speech as an output. This research uses Deep Learning for speech recognition using library from Google which has 66.22% accuracy. 4. Sentimental Analysis and Prediction using Neural Networks: This paper classifies sentences into positive, negative and neutral categories. It uses Artificial Neural Network for sentimental analysis by training and testing data. It also checks the accuracy of ANN for large datasets. 2. Project Overview Supervision and analysis of audio files manually takes a lot of time. This procedure is very tedious and leaves scope for a lot of human errors. These errors might manipulate the results on a large scale. We have proposed a system that eliminates the human work of supervising the audio files. In sectors like crime investigation, this system might prove to be advantageous as threat in a particular audio file will be analyzed automatically and a warning will be provided as output. This system can also be used separately by the user or actor. The developed model will help the will be of help to various organizations as they can either use it for speech to text conversion or
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1302 sentimental analysis or both. There is one user/actor that can use the system by providing an audio file as input. [A] Artificial Neural Network Artificial Neural Network is used for processing the information similar to how brain works. It has large number of small processing elements connected to each other, working together to solve a specific problem. In the above figure, inputs are basically independent variables which are multiplied by their weights and summed up to get the activation function. This function takes decision on whether neuron should be activated or not. For learning of neural network, it uses the cost function which is the difference between the actual output and expected output. This function is analyzed and proper changes are made to the inputs accordingly. Cost function is reduced to minimum value to get best learning results. We use back propagation on the network continuously till error becomes minimal. [B] System Architecture Diagram Large number of audio files are given as input to the system. These audio files are converted to the digital data using signal processing. Then feature extraction and feature selection is performed on digital data. We will get the text output by applying ANN algorithm on those selected features. Text is classified into positive, negative or neutral sentiment using Naïve Bayes classifier. The polarity of the text input is calculated by using ANN on the classified data. [C] Sentimental Analysis Sentiment analysis is used to detect threats and give the warning. It is used to analyse the tone of the text and classify it into positive or negative. This process is very useful to detect the threat before so that it can be eliminated or damage can be reduced. Textual data is analysed and the polarity of the text is calculated. All the data is scaled using the data mining methods like standard scalar. Then the data is given to ANN to train the model. This model is supervisedly trained to get the threat warning for the input text. [D] System Architecture Diagram 3. CONCLUSION The developed model will help revolutionize audio surveillance as time required to listen and then analyze the audio is highly reduced. Human errors such as skipping some part of audio will also be reduced. Available API’s such as Google API may become paid in future and hence our system provides a way to convert speech to text without using Google API. REFERENCES [1] Phoemporn Lakkhanawannakun, Chaluemwut Noyunsan, “Speech Recognition using Deep Learning,” Rajamangala University of Technology, Thiland. [2] Kanchan Naithani, V.M. Thakkar, Ashish Senwal, “English Language Speech Recognition using MFCC and HMM,” GBP Institute of Engineering Technology, Uttarakhand, India. [3] Sneh Paliwal, Sunil Khatri, Mayank Sharma, “Sentiment Analysis and Prediction using Neural Networks,” Amity University, Noida, Uttar Pradesh, India.
Download now