In recent years, many researches focus on sound source localization based on neural networks, which is an appealing but difficult problem. In this paper, a novel time-domain end-to-end method for sound source localiza...
In recent years, many researches focus on sound source localization based on neural networks, which is an appealing but difficult problem. In this paper, a novel time-domain end-to-end method for sound source localization is proposed, where the model is trained by two strategies with both cross entropy loss and mean square error loss. Based on the idea of multi-task learning, CNN is used as the shared hidden layers to extract features and DNN is used as the output layers for each task. Compared with SRP-PHAT, MUSIC and a DNN-based method, the proposed method has better performance.
In recent years, many researchers have done a lot of research on the qualitative diagnosis of autism spectrum disorder (ASD) based on magnetic resonance imaging (MRI). However, the quantitative prediction of ASD sever...
详细信息
ISBN:
(纸本)9781450376983
In recent years, many researchers have done a lot of research on the qualitative diagnosis of autism spectrum disorder (ASD) based on magnetic resonance imaging (MRI). However, the quantitative prediction of ASD severity is clinically more important, but there are few studies focused on the prediction of the ASD severity. In addition, since the heterogeneity between multi-center data for ASD is difficult to eliminate, most of studies are based on single-center and do not make full use of multi-center data. To this end, we propose a multi-modality multi-center regression (M3CR) method to apply multi-task learning to the severity prediction of ASD. Specifically, each center is treated as a task for joint learning. In addition, for each center, two types of modal information are extracted from magnetic resonance imaging for information complementation. More importantly, based on the task-task regularization term and modality-modality regularization term in the existing model, we add the feature-feature regularization term to further consider the relationship between the features. This regularization term enables the learning process to make full use of the data information shared by different centers. The experimental results on the ABIDE database demonstrate the effectiveness of the proposed method in ASD severity prediction.
Electrocardiogram (ECG) is the graphical portrayal of heart usefulness. The ECG signals holds its significance in the discovery of heart irregularities. These ECG signals are frequently tainted by antiques from variou...
详细信息
ISBN:
(数字)9781728198774
ISBN:
(纸本)9781728198781
Electrocardiogram (ECG) is the graphical portrayal of heart usefulness. The ECG signals holds its significance in the discovery of heart irregularities. These ECG signals are frequently tainted by antiques from various sources. It is basic to diminish these curios and improve the exactness just as dependability to show signs of improvement results identified with heart usefulness. The most commonly disturbed artifact in ECG signals is Motion Artifacts (MA). In this paper, we have proposed a new concept on how machinelearning algorithms can be used for de-noising the ECG signals. Towards the goal, a unique combination of Recurrent Neural Network (RNN) and Deep Neural Network (DNN) is used to efficiently remove MA. The proposed algorithm is validated using ECG records obtained from the MIT-BIH Arrhythmia Database. To eliminate MA using the proposed method, we have used Adam optimization algorithm to train and fit the contaminated ECG data in RNN and DNN models. Performance evaluation results in terms of SNR and RRMSE show that the proposed algorithm outperforms other existing MA removal methods without significantly distorting the morphologies of ECG signals.
This paper presents a speech enhancement system based on deep neural network (DNN) and covers the signalprocessing methods used in speech enhancement and the fundamentals of DNN. DNNs containing multiple hidden layer...
This paper presents a speech enhancement system based on deep neural network (DNN) and covers the signalprocessing methods used in speech enhancement and the fundamentals of DNN. DNNs containing multiple hidden layers have the capability to suppress noise by learning the relationship between noisy speech and target clean speech. A series of experiments were carried out using the Chinese corpus to evaluate the performance of the speech enhancement model. Meanwhile, the model was identified as a result of a good generalization capability in mismatched noise types. In addition, the model is compared with OMLSA in terms of the quality of speech signals.
Cyberbullying detection has become a pressing need in Internet usage governance due to its harmful consequences. Different approaches have been proposed to tackle this problem, including deep learning. In this paper, ...
详细信息
ISBN:
(纸本)9781450372596
Cyberbullying detection has become a pressing need in Internet usage governance due to its harmful consequences. Different approaches have been proposed to tackle this problem, including deep learning. In this paper, an empirical study is conducted to evaluate the effectiveness and efficiency of deep learning algorithms, coupled with word embeddings in detecting cyberbullying texts. Three deep learning algorithms were experimented, namely GRU, LSTM and BLSTM. Data pre-processing steps, including oversampling were performed on the selected social media datasets. For feature representations, four different word embeddings models were explored, including word2vec, GloVe, Reddit and ELMO models. Elmo cares of word context by capturing information from the word surroundings which eliminates some of the shortcomings of pre-trained word embeddings models. For more accurate results, 10-fold cross-validation technique was implemented. The experimental results show that BLSTM performs best with ELMO in detecting cyberbullying texts. The efficiency of each model is also measured by calculating the average time taken for training each model. GRU outperforms in terms of time efficiency. Based on the analysis done on false negative cases, three observations were made, which highlight the limitations of word embeddings models on top of GRU algorithm in cyberbullying detection.
In this paper, a cognitive jammer is developed which can adaptively and optimally jam the radar and protect the target from being detected. The interaction of the cognitive jammer and the environment is modeled as a f...
详细信息
In this paper, a cognitive jammer is developed which can adaptively and optimally jam the radar and protect the target from being detected. The interaction of the cognitive jammer and the environment is modeled as a finite Markov Decision Process based on the framework of reinforcement learning. Q-learning algorithm is used to solve the optimal jamming frequency selection problem. After several interactions, the jammer can learn the radar's strategy and optimize its jamming frequency to achieve a larger jamming-plus-noise to signal ratio (JNSR) during the whole process. Numerical results are given to illustrate the effectiveness of the proposed method. Compared with a random jamming frequency selection method, the JNSR of the proposed method is significantly larger.
The proceedings contain 71 papers. The special focus in this conference is on Data Engineering and Communication Technology. The topics include: S-LSTM-GAN: Shared Recurrent Neural Networks with Adversarial Training;h...
ISBN:
(纸本)9789811316098
The proceedings contain 71 papers. The special focus in this conference is on Data Engineering and Communication Technology. The topics include: S-LSTM-GAN: Shared Recurrent Neural Networks with Adversarial Training;hybrid Approach for Recommendation System;discussion on Problems and Solutions in Hardware Implementation of Algorithms for a Car-type Autonomous Vehicle;software Test Case Allocation;seamless Vertical Handover for Efficient Mobility Management in Cooperative Heterogeneous Networks;sentence Similarity Estimation for Text Summarization Using Deep learning;minimization of Clearance Variation of a Radial Selective Assembly Using Cohort Intelligence Algorithm;m-Wallet Technology Acceptance by Street Vendors in India;explore-Exploit-Explore in Ant Colony Optimization;application of Blowfish Algorithm for Secure Transactions in Decentralized Disruption-Tolerant Networks;an Attention-Based Approach to Text Summarization;enhancement of Security for Cloud Data Using Partition-Based Steganography;large Scale P2P Cloud of Underutilized Computing Resources for Providing MapReduce as a Service;topic Modelling for Aspect-Level Sentiment Analysis;an Image Deblocking Approach Based on Non-subsampled Shearlet Transform;an Effective Video Surveillance Framework for Ragging/Violence Recognition;DoT: A New Ultra-lightweight SP Network Encryption Design for Resource-Constrained Environment;a Distributed Application to Maximize the Rate of File Sharing in and Across Local Networks;obstacle Detection for Auto-Driving Using Convolutional Neural Network;Leakage Power Improvement in SRAM Cell with Clamping Diode Using Reverse Body Bias Technique;a Rig-Based Formulation and a League Championship Algorithm for Helicopter Routing in Offshore Transportation;an Investigation of Burr Formation and Cutting Parameter Optimization in Micro-drilling of Brass C-360 Using Image processing;emotion Recognition from Sensory and Bio-signals: A Survey.
The increasing number of terrorist acts and lone wolf attacks on places of public gathering such as Hotels and Cinemas has solidified the need for much denser Closed-circuit Television (CCTV) systems. The increasing n...
详细信息
An acronym is a textual form used to refer an entity and to stress the important concepts. Over the last two decades, many researchers worked for mining acronym expansion pairs from plain text and Web. This is mainly ...
详细信息
A major limitation of existing Semantic Web applications is the lack of automatic generation linked data for personal needs. Internet of Things (IoT) can provide automatic sensing data to improve this limitation. The ...
详细信息
ISBN:
(纸本)9781450364027
A major limitation of existing Semantic Web applications is the lack of automatic generation linked data for personal needs. Internet of Things (IoT) can provide automatic sensing data to improve this limitation. The study addresses this issue by defining a Semantic Internet of Things Framework (SIOTF), which is implemented on Hadoop-based cloud computing ecosystem to provide efficiency in dealing with a mass of sensing data. The SIOTF is composed of four modules: Internet of Things module, Naive Bayesian Classification module, Open Data Service module, and Semantic Web module. The proposed SIOTF is used to develop a Culture Sharing Cloud Platform (CSCP) that provides customized culture information for personnel needs. To demonstrate the feasibility of CSCP, the experimental results illustrate the efficiency and effectiveness of the proposed approach.
暂无评论