首页 > 最新文献

2011 3rd International Conference on Awareness Science and Technology (iCAST)最新文献

英文 中文
Data model conversion for independent component analysis to extract brain signals 数据模型转换为独立成分分析提取脑信号
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163138
F. Cong, T. Ristaniemi
This study addresses an empirical study for data model conversion when using independent component analysis (ICA) to extract brain event-related potentials (ERPs). We firstly prove that in theory there is no difference to perform ICA on the concatenated EEG recordings of a number of single trials and the averaged EEG recordings over those single trials. The general assumption for such conclusion is that mixing models of linear transformations do not change along single trials. Furthermore, we explicitly illustrate that an optimal wavelet filter based on properties of an ERP can convert the underdetermined model of EEG to at least quasi-determined one, but the optimal digital filter based on that ERP cannot make it, through empirical studies. Hence, we suggest combining an optimal wavelet filter and ICA together to extract desired brain signal from the averaged EEG recordings in the ERP study.
本研究针对独立成分分析(ICA)提取脑事件相关电位(ERPs)时的数据模型转换进行了实证研究。我们首先证明了在理论上对多个单次试验的串联脑电图记录和这些单次试验的平均脑电图记录进行ICA是没有区别的。这种结论的一般假设是线性变换的混合模型不会随着单次试验而改变。此外,通过实证研究,我们明确地说明了基于ERP特性的最优小波滤波器可以将EEG的欠定模型转化为至少准定模型,而基于ERP的最优数字滤波器却不能。因此,我们建议将最优小波滤波器和ICA结合在一起,从ERP研究的平均EEG记录中提取所需的脑信号。
{"title":"Data model conversion for independent component analysis to extract brain signals","authors":"F. Cong, T. Ristaniemi","doi":"10.1109/ICAWST.2011.6163138","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163138","url":null,"abstract":"This study addresses an empirical study for data model conversion when using independent component analysis (ICA) to extract brain event-related potentials (ERPs). We firstly prove that in theory there is no difference to perform ICA on the concatenated EEG recordings of a number of single trials and the averaged EEG recordings over those single trials. The general assumption for such conclusion is that mixing models of linear transformations do not change along single trials. Furthermore, we explicitly illustrate that an optimal wavelet filter based on properties of an ERP can convert the underdetermined model of EEG to at least quasi-determined one, but the optimal digital filter based on that ERP cannot make it, through empirical studies. Hence, we suggest combining an optimal wavelet filter and ICA together to extract desired brain signal from the averaged EEG recordings in the ERP study.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131721672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast fixed-point algorithm for blind separation of nonlinear autocorrelation and non-Gaussian sources 非线性自相关和非高斯源盲分离的快速不动点算法
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163093
Zhenwei Shi, Xinya Zhai, Zhenyu An, Zhi-guo Jiang
Blind source separation (BSS) problem is often solved by using only one statistical property of original sources. In this work, a method combines non-Gaussianity and nonlinear autocorrelation for the BSS problem, which extends the previous BSS situation, is presented.We propose a fast fixed-point algorithm for BSS with nonlinear autocorrelation and non-Gaussianity in this paper. Our algorithm obtained here does not need choose any learning rate. We study its convergence property and show that its convergence speed is at least quadratic. Computer simulations for square temporal autocorrelation and non-Gaussian sources, including sub-Gaussian and super-Gaussian sources, illustrate the efficiency of the proposed approach.
盲源分离(BSS)问题通常只利用原始源的一个统计特性来解决。本文提出了一种结合非高斯性和非线性自相关的BSS问题的方法,扩展了之前的BSS问题。本文提出了一种具有非线性自相关和非高斯特性的BSS的快速不动点算法。我们得到的算法不需要选择任何学习率。研究了它的收敛性,证明了它的收敛速度至少是二次的。对二次时间自相关和非高斯源(包括亚高斯和超高斯源)的计算机仿真表明了该方法的有效性。
{"title":"Fast fixed-point algorithm for blind separation of nonlinear autocorrelation and non-Gaussian sources","authors":"Zhenwei Shi, Xinya Zhai, Zhenyu An, Zhi-guo Jiang","doi":"10.1109/ICAWST.2011.6163093","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163093","url":null,"abstract":"Blind source separation (BSS) problem is often solved by using only one statistical property of original sources. In this work, a method combines non-Gaussianity and nonlinear autocorrelation for the BSS problem, which extends the previous BSS situation, is presented.We propose a fast fixed-point algorithm for BSS with nonlinear autocorrelation and non-Gaussianity in this paper. Our algorithm obtained here does not need choose any learning rate. We study its convergence property and show that its convergence speed is at least quadratic. Computer simulations for square temporal autocorrelation and non-Gaussian sources, including sub-Gaussian and super-Gaussian sources, illustrate the efficiency of the proposed approach.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125181546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved secure communication based on random phase encoding technique 一种改进的基于随机相位编码技术的安全通信
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163094
X. Wu, Jing-jing Zhang, Xiao-xian Guo, T. Qiu
An improved mixed cryptosystem is presented by combining both random phase encoding technique based chaos and public key cryptography. The scheme provides not only good robustness of random phase encoding technique, but also a new solution of key distribution for symmetric cryptography algorithms. In additions, computer simulation is illustrated in detail. The tolerance to data loss of the encoded barcode is also studied particularly. The results show that the presented encoding method has advantage of robustness and high security, and very convenient to be popularized in practice.
将混沌随机相位编码技术与公钥密码技术相结合,提出了一种改进的混合密码系统。该方案不仅提供了随机相位编码技术良好的鲁棒性,而且为对称密码算法的密钥分配提供了一种新的解决方案。此外,还详细说明了计算机仿真。对编码后的条形码的数据丢失容忍度进行了详细的研究。结果表明,所提出的编码方法具有鲁棒性和高安全性,便于在实际应用中推广。
{"title":"An improved secure communication based on random phase encoding technique","authors":"X. Wu, Jing-jing Zhang, Xiao-xian Guo, T. Qiu","doi":"10.1109/ICAWST.2011.6163094","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163094","url":null,"abstract":"An improved mixed cryptosystem is presented by combining both random phase encoding technique based chaos and public key cryptography. The scheme provides not only good robustness of random phase encoding technique, but also a new solution of key distribution for symmetric cryptography algorithms. In additions, computer simulation is illustrated in detail. The tolerance to data loss of the encoded barcode is also studied particularly. The results show that the presented encoding method has advantage of robustness and high security, and very convenient to be popularized in practice.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134453694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of Photoacoustic imaging for monitoring of Wound Healing under a Layer of Blood with Different Coagulation 光声成像监测不同凝血层下伤口愈合的研究
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163166
Chulgyu Song, Keo-Sik Kim, Min-Ho Kim, S. Ryu
We have investigated Photoacoustic (PA) imaging for monitoring of wound healing under a blood layer with different degree of coagulation. We embedded simulated blood vessel structure in tissue phantoms made with gelatin. A thin layer of blood with different degree of coagulation was also embedded on top of the vessel structure. Using 532 nm pulse laser, we obtained PA images of the phantoms and analyzed the image quality depending on the degree of blood coagulation. Due to the high optical absorption of blood layer, PA image of simulated blood vessel under blood layer was limited but according to optical scattering, possibility of PA imaging to monitor wound healing was confirmed.
我们研究了光声成像(PA)用于监测不同凝血程度的血层下伤口愈合。我们将模拟血管结构嵌入到用明胶制作的组织模型中。血管结构的顶部还嵌有一层不同凝血程度的薄血。利用532 nm脉冲激光,获得了鬼怪的PA图像,并分析了图像质量与血液凝固程度的关系。由于血层的高光学吸收率,血层下模拟血管的PA图像受到限制,但根据光学散射,证实了PA成像监测伤口愈合的可能性。
{"title":"Investigation of Photoacoustic imaging for monitoring of Wound Healing under a Layer of Blood with Different Coagulation","authors":"Chulgyu Song, Keo-Sik Kim, Min-Ho Kim, S. Ryu","doi":"10.1109/ICAWST.2011.6163166","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163166","url":null,"abstract":"We have investigated Photoacoustic (PA) imaging for monitoring of wound healing under a blood layer with different degree of coagulation. We embedded simulated blood vessel structure in tissue phantoms made with gelatin. A thin layer of blood with different degree of coagulation was also embedded on top of the vessel structure. Using 532 nm pulse laser, we obtained PA images of the phantoms and analyzed the image quality depending on the degree of blood coagulation. Due to the high optical absorption of blood layer, PA image of simulated blood vessel under blood layer was limited but according to optical scattering, possibility of PA imaging to monitor wound healing was confirmed.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
BFSM: Finite state machine learned as name boundary definer for bio named entity recognition BFSM:有限状态机作为生物命名实体识别的名称边界定义器
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163168
Tsendsuren Munkhdalai, Meijing Li, Erdenetuya Namsrai, Oyun-Erdene Namsrai, K. Ryu
One essential task in automated information extraction for biomedical literature is bio named entity recognition process, which basically defines the boundaries between typical words and technical terms of biomedical domain in particular text data and, classifies them based on the domain knowledge. Due to nature of bio named entity, purely defining boundary of the named entities in text data is still challenging. This paper proposes using the part-of-speech tags of tokens as target observation of name boundary definer tool. We proposed an approach for modeling finite state machine as the boundary definer. Aided by machine learning methods including frequent pattern mining method and Bayesian network, the finite state machine learns on part-of-speech tag of tokens in bio-text data. The finite state machine based on Bayesian network is named BFSM. In addition, we report the influence of part-of-speech tagger tool for learning of BFSM. Experimental results show that the named entity recognition system using the BFSM gives us high accuracy as F-score 85.8.
生物命名实体识别是生物医学文献自动信息提取的一项重要任务,它主要是在特定的文本数据中定义生物医学领域的典型词和专业术语之间的边界,并基于该领域知识对其进行分类。由于生物命名实体的特性,单纯定义文本数据中命名实体的边界仍然是一个挑战。本文提出使用词性标记作为名称边界定义器工具的目标观察。提出了一种将有限状态机作为边界定义器的建模方法。有限状态机在频繁模式挖掘和贝叶斯网络等机器学习方法的辅助下,对生物文本数据中的词性标记进行学习。基于贝叶斯网络的有限状态机称为BFSM。此外,我们还报道了词性标注工具对BFSM学习的影响。实验结果表明,使用BFSM的命名实体识别系统具有较高的准确率,f值为85.8。
{"title":"BFSM: Finite state machine learned as name boundary definer for bio named entity recognition","authors":"Tsendsuren Munkhdalai, Meijing Li, Erdenetuya Namsrai, Oyun-Erdene Namsrai, K. Ryu","doi":"10.1109/ICAWST.2011.6163168","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163168","url":null,"abstract":"One essential task in automated information extraction for biomedical literature is bio named entity recognition process, which basically defines the boundaries between typical words and technical terms of biomedical domain in particular text data and, classifies them based on the domain knowledge. Due to nature of bio named entity, purely defining boundary of the named entities in text data is still challenging. This paper proposes using the part-of-speech tags of tokens as target observation of name boundary definer tool. We proposed an approach for modeling finite state machine as the boundary definer. Aided by machine learning methods including frequent pattern mining method and Bayesian network, the finite state machine learns on part-of-speech tag of tokens in bio-text data. The finite state machine based on Bayesian network is named BFSM. In addition, we report the influence of part-of-speech tagger tool for learning of BFSM. Experimental results show that the named entity recognition system using the BFSM gives us high accuracy as F-score 85.8.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124754947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Android programming techniques for improving performance 改进性能的Android编程技术
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163105
Jae Kyu Lee, Jong Yeol Lee
Android has been researched in various mobile device fields such as Smartphone and Tablet PC. In here, we should remember that mobile devices have limited storage and constrained battery life. Therefore, when developers develop applications, they should do efficient programming. In this paper, we have proposed programming guidelines for an effective way to improve performance in Android applications. We have programmed Android applications using Java and Native C, and compared the performance between the two languages. The applications are composed of five categories such as JNI delay, Integer, Floating-point, Memory access algorithm and String processing. By analyzing the results, we propose a more efficient way to program Android applications.
Android在智能手机和平板电脑等各种移动设备领域得到了广泛的研究。在这里,我们应该记住,移动设备的存储空间和电池寿命都是有限的。因此,当开发人员开发应用程序时,他们应该进行高效的编程。在本文中,我们提出了一种有效提高Android应用程序性能的编程指南。我们使用Java和Native C编写了Android应用程序,并比较了这两种语言的性能。这些应用程序由JNI延迟、整数、浮点、内存访问算法和字符串处理五类组成。通过分析结果,我们提出了一种更有效的Android应用程序编程方法。
{"title":"Android programming techniques for improving performance","authors":"Jae Kyu Lee, Jong Yeol Lee","doi":"10.1109/ICAWST.2011.6163105","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163105","url":null,"abstract":"Android has been researched in various mobile device fields such as Smartphone and Tablet PC. In here, we should remember that mobile devices have limited storage and constrained battery life. Therefore, when developers develop applications, they should do efficient programming. In this paper, we have proposed programming guidelines for an effective way to improve performance in Android applications. We have programmed Android applications using Java and Native C, and compared the performance between the two languages. The applications are composed of five categories such as JNI delay, Integer, Floating-point, Memory access algorithm and String processing. By analyzing the results, we propose a more efficient way to program Android applications.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124812124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A novel approach to mining access patterns 一种挖掘访问模式的新方法
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163169
Xiuming Yu, Meijing Li, Hyeongsoo Kim, Dong Gyu Lee, J. Park, K. Ryu
Web log mining is an important area of Web Usage Mining (WUM) for discovering useful information from web log files produced by web servers. According to the mining task, user access patterns can be extracted and the result can be applied to improve websites, business intelligence systems and other areas. In this paper, we propose a novel approach for exacting user access patterns by achieving a large event set and improving the BI-Directional Extension closure checking method (BIDE). The process of getting a large event set can filter out the more frequent events and discard the infrequent events to reduce the number of data. Compared with other methods, the BIDE method with the constraint of gap can achieve a more efficient mining process and generate more accurate results. In our experiment, the effect of the mining task is discussed and the applications of this approach are presented.
Web日志挖掘是从Web服务器生成的Web日志文件中发现有用信息的Web Usage mining (WUM)的一个重要领域。根据挖掘任务,可以提取用户访问模式,并将结果应用于改进网站、商业智能系统等领域。在本文中,我们提出了一种新的方法,通过实现一个大事件集和改进双向扩展关闭检查方法(biide)来精确用户访问模式。获取大事件集的过程可以过滤掉频繁的事件,丢弃不频繁的事件,从而减少数据的数量。与其他方法相比,具有间隙约束的BIDE方法可以实现更高效的开采过程,得到更准确的结果。在我们的实验中,讨论了挖掘任务的效果,并介绍了该方法的应用。
{"title":"A novel approach to mining access patterns","authors":"Xiuming Yu, Meijing Li, Hyeongsoo Kim, Dong Gyu Lee, J. Park, K. Ryu","doi":"10.1109/ICAWST.2011.6163169","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163169","url":null,"abstract":"Web log mining is an important area of Web Usage Mining (WUM) for discovering useful information from web log files produced by web servers. According to the mining task, user access patterns can be extracted and the result can be applied to improve websites, business intelligence systems and other areas. In this paper, we propose a novel approach for exacting user access patterns by achieving a large event set and improving the BI-Directional Extension closure checking method (BIDE). The process of getting a large event set can filter out the more frequent events and discard the infrequent events to reduce the number of data. Compared with other methods, the BIDE method with the constraint of gap can achieve a more efficient mining process and generate more accurate results. In our experiment, the effect of the mining task is discussed and the applications of this approach are presented.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115897328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Blind source separation and visual voice activity detection for target speech extraction 盲源分离和视觉语音活动检测用于目标语音提取
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163194
Qingju Liu, Wenwu Wang
Despite being studied extensively, the performance of blind source separation (BSS) is still limited especially for the sensor data collected in adverse environments. Recent studies show that such an issue can be mitigated by incorporating multimodal information into the BSS process. In this paper, we propose a method for the enhancement of the target speech separated by a BSS algorithm from sound mixtures, using visual voice activity detection (VAD) and spectral subtraction. First, a classifier for visual VAD is formed in the off-line training stage, using labelled features extracted from the visual stimuli. Then we use this visual VAD classifier to detect the voice activity of the target speech. Finally we apply a multi-band spectral subtraction algorithm to enhance the BSS-separated speech signal based on the detected voice activity. We have tested our algorithm on the mixtures generated artificially by the mixing filters with different reverberation times, and the results show that our algorithm improves the quality of the separated target signal.
尽管盲源分离(BSS)技术得到了广泛的研究,但其性能仍然有限,特别是在恶劣环境下采集的传感器数据。最近的研究表明,可以通过将多模式信息纳入BSS过程来缓解这一问题。在本文中,我们提出了一种利用视觉语音活动检测(VAD)和频谱减法对由BSS算法从混合声音中分离出来的目标语音进行增强的方法。首先,在离线训练阶段,使用从视觉刺激中提取的标记特征形成视觉VAD分类器。然后我们使用这个视觉VAD分类器来检测目标语音的语音活动。最后,基于检测到的语音活动,采用多波段频谱减法对bss分离的语音信号进行增强。在混响时间不同的混响滤波器人工合成的混响信号上进行了测试,结果表明,该算法提高了分离目标信号的质量。
{"title":"Blind source separation and visual voice activity detection for target speech extraction","authors":"Qingju Liu, Wenwu Wang","doi":"10.1109/ICAWST.2011.6163194","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163194","url":null,"abstract":"Despite being studied extensively, the performance of blind source separation (BSS) is still limited especially for the sensor data collected in adverse environments. Recent studies show that such an issue can be mitigated by incorporating multimodal information into the BSS process. In this paper, we propose a method for the enhancement of the target speech separated by a BSS algorithm from sound mixtures, using visual voice activity detection (VAD) and spectral subtraction. First, a classifier for visual VAD is formed in the off-line training stage, using labelled features extracted from the visual stimuli. Then we use this visual VAD classifier to detect the voice activity of the target speech. Finally we apply a multi-band spectral subtraction algorithm to enhance the BSS-separated speech signal based on the detected voice activity. We have tested our algorithm on the mixtures generated artificially by the mixing filters with different reverberation times, and the results show that our algorithm improves the quality of the separated target signal.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128099859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Environmental sound recognition using time-frequency intersection patterns 使用时频交叉模式的环境声音识别
Xuan Guo, Y. Toyoda, Huan Li, Jie Huang, Shuxue Ding, Yong Liu
Environmental sound recognition is an important function of robots and intelligent computer systems. In this research, we tried to use a multi-stage perceptron type neural network system for environmental sound recognition. The input data is the one-dimensional combination of instantaneous spectrum at power peak and the power pattern in time domain. Since for almost environmental sounds, their spectrum changes are not remarkable compared with speech or voice, the combination of power and frequency pattern will preserve the major features of environmental sounds but with drastically reduced data. Two experiments were conducted using an original database and a database created by the RWCP. The recognition rate for about 45 data kinds of environmental sound was about 92%. The merit of this method is the use of a one-dimensional input which combines the power pattern and the instantaneous spectrum of sound data. Comparing with the method using only instantaneous spectrum, the new method are sufficient for larger sound database and the recognition rate was increased about 12%. The results are also comparable with the methods of HMM, while those methods require 2-dimensional spectrum time series data and more complicated computation.
环境声音识别是机器人和智能计算机系统的一项重要功能。在本研究中,我们尝试使用多阶段感知器型神经网络系统进行环境声音识别。输入数据是功率峰值瞬时谱和时域功率图的一维组合。因为对于几乎环境声音来说,它们的频谱变化与语音或声音相比并不显着,所以功率和频率模式的组合将保留环境声音的主要特征,但会大大减少数据。使用原始数据库和RWCP创建的数据库进行了两个实验。对约45种数据类型的环境声音的识别率约为92%。该方法的优点是使用了一维输入,结合了功率模式和声音数据的瞬时频谱。与仅使用瞬时谱的方法相比,该方法可以满足较大的声音库,识别率提高了12%左右。结果与隐马尔可夫方法具有可比性,但隐马尔可夫方法需要二维谱时间序列数据,计算更复杂。
{"title":"Environmental sound recognition using time-frequency intersection patterns","authors":"Xuan Guo, Y. Toyoda, Huan Li, Jie Huang, Shuxue Ding, Yong Liu","doi":"10.1155/2012/650818","DOIUrl":"https://doi.org/10.1155/2012/650818","url":null,"abstract":"Environmental sound recognition is an important function of robots and intelligent computer systems. In this research, we tried to use a multi-stage perceptron type neural network system for environmental sound recognition. The input data is the one-dimensional combination of instantaneous spectrum at power peak and the power pattern in time domain. Since for almost environmental sounds, their spectrum changes are not remarkable compared with speech or voice, the combination of power and frequency pattern will preserve the major features of environmental sounds but with drastically reduced data. Two experiments were conducted using an original database and a database created by the RWCP. The recognition rate for about 45 data kinds of environmental sound was about 92%. The merit of this method is the use of a one-dimensional input which combines the power pattern and the instantaneous spectrum of sound data. Comparing with the method using only instantaneous spectrum, the new method are sufficient for larger sound database and the recognition rate was increased about 12%. The results are also comparable with the methods of HMM, while those methods require 2-dimensional spectrum time series data and more complicated computation.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132053340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Security-aware VLSI design for speaker identification based on efficient SMO architecture 基于高效SMO架构的安全感知说话人识别VLSI设计
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163100
Jhing-Fa Wang, Jr-Shiang Peng, Po-Chuan Lin, Bo-Wei Chen, Nai-Sheng Shih
Speaker identification is a popular investigation that is greatly applied in many applications such as human-machine interfaced, security systems, etc. In real life, low cost and fast response are both necessary features for speaker identification in stand-alone embedded device. However, most of the responding time occupies in training phase, and the cost of general solution by employing digital signal processors is too high. In this work, security-aware VLSI design with the efficient Sequential Minimal Optimization (SMO) architecture is proposed for solving the problems in text-independent speaker identification. Our contributions are attributed to the optimal VLSI design form algorithm to architecture level. At algorithm level, the proposed Improved SMO (ISMO) algorithm is adopted for efficient data selection and it can reduce 30% computation. At architecture level, a distributed and reconfigurable computing architecture which combines parallel and pipeline designing styles is implemented, and it provides the high flexible and high performance benefits. Finally, the experimental results show that the proposed design can save 50% of memory usage, and the hardware resources can be reduced by 31% than our previous work. Furthermore, the responding time can decrease 85%.
说话人识别是一项热门的研究,在人机界面、安全系统等领域有着广泛的应用。在现实生活中,低成本和快速响应都是单机嵌入式设备中说话人识别的必要特征。然而,大部分的响应时间占据在训练阶段,采用数字信号处理器的通用解决方案成本太高。在这项工作中,提出了具有安全意识的VLSI设计,采用高效的顺序最小优化(SMO)架构来解决与文本无关的说话人识别问题。我们的贡献归功于从算法到架构级的最佳VLSI设计。在算法层面,采用改进的SMO (ISMO)算法进行高效的数据选择,可减少30%的计算量。在体系结构层面,实现了一种结合并行和流水线设计风格的分布式可重构计算体系结构,具有较高的灵活性和较高的性能优势。最后,实验结果表明,所提出的设计可以节省50%的内存使用,硬件资源比以前的设计减少31%。此外,响应时间可减少85%。
{"title":"Security-aware VLSI design for speaker identification based on efficient SMO architecture","authors":"Jhing-Fa Wang, Jr-Shiang Peng, Po-Chuan Lin, Bo-Wei Chen, Nai-Sheng Shih","doi":"10.1109/ICAWST.2011.6163100","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163100","url":null,"abstract":"Speaker identification is a popular investigation that is greatly applied in many applications such as human-machine interfaced, security systems, etc. In real life, low cost and fast response are both necessary features for speaker identification in stand-alone embedded device. However, most of the responding time occupies in training phase, and the cost of general solution by employing digital signal processors is too high. In this work, security-aware VLSI design with the efficient Sequential Minimal Optimization (SMO) architecture is proposed for solving the problems in text-independent speaker identification. Our contributions are attributed to the optimal VLSI design form algorithm to architecture level. At algorithm level, the proposed Improved SMO (ISMO) algorithm is adopted for efficient data selection and it can reduce 30% computation. At architecture level, a distributed and reconfigurable computing architecture which combines parallel and pipeline designing styles is implemented, and it provides the high flexible and high performance benefits. Finally, the experimental results show that the proposed design can save 50% of memory usage, and the hardware resources can be reduced by 31% than our previous work. Furthermore, the responding time can decrease 85%.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121350834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 3rd International Conference on Awareness Science and Technology (iCAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1