In RFID systems, one of the problems that we must solve is the collision between tags which lowers their efficiency. Two main approaches to tag collision are generally adopted: ALOHA and Tree algorithms. This paper re...
详细信息
The aim of our work is to investigate the use of two powerful feature descriptor known as Zernike moments and histogram of oriented gradient (HOG) for facial images extracted from a video sequence uttered ten times by...
详细信息
Automatic personal identification is becoming an increasingly important requirement in a variety of applications like access control, surveillance systems and physical buildings. In recent years, biometric systems are...
详细信息
ISBN:
(纸本)9781479982134
Automatic personal identification is becoming an increasingly important requirement in a variety of applications like access control, surveillance systems and physical buildings. In recent years, biometric systems are used in these fields, offering greater convenience and several advantages over traditional security. In this paper, we propose an efficient online personal identification system based on Finger-Knuckle-Print (FKP) images. In this study, the finger image is characterized by the two dimensional Bloc based Discrete Cosine Transform (2D-BDCT) coefficients. Then, we use the Hidden Markov Model (HMM) for modeling the observation vector. In addition, the same finger is transformed by the two dimensional Discrete Fourier Transform (2D-DFT). The response of this transformation is directly used to create another observation vector. Subsequently, the two sub-systems are integrated in order to construct an efficient multi-modal identification system based on matching score level fusion. The results on a medium-size database, 150 users, show good identification performance based on individual modalities as well as after fusing multiple finger types.
In this paper, a new structure for acoustic echo cancellation is presented. The role of acoustic echo canceller (AEC) is to remove undesirable acoustic echoes in communication systems. However, in double-talk case the...
详细信息
In this paper, a new structure for acoustic echo cancellation is presented. The role of acoustic echo canceller (AEC) is to remove undesirable acoustic echoes in communication systems. However, in double-talk case the performance of the AEC is degraded, thus, a double-talk detector (DTD) must be used for controlling the AEC. A new structure for AEC using an auxiliary adaptive filter is proposed in this paper. Experimental results using speechsignals obtained from the TIMIT database show an improvement in acoustic echo cancellation by the proposed structure compared to the standard structure of adaptive filter controlling by the DTD.
This paper is concerned with the class imbalance problem in activity recognition field which has been known to hinder the learning performance of classification algorithms. To deal this problem, we propose a new versi...
详细信息
This paper is concerned with the class imbalance problem in activity recognition field which has been known to hinder the learning performance of classification algorithms. To deal this problem, we propose a new version of the multi-class Weighted Support Vector Machines(WSVM) method to perform automatic recognition of activities in a smart home environment. Then, we compare this approach with CRF, k-NN and SVM considered as the reference methods. Our experimental results carried out on various real world imbalanced datasets show that the new WSVM is capable of solving the class imbalance problem by improving the class accuracy of activity classification compared to other methods.
We used locus equations for characterizing the two berber consonants “lip-vélarized” /gw/ and /kw/. The aim is to show that these two phonemes are consonants distinct from their homologous velar /g/ and /k/. Th...
详细信息
ISBN:
(纸本)9781479938254
We used locus equations for characterizing the two berber consonants “lip-vélarized” /gw/ and /kw/. The aim is to show that these two phonemes are consonants distinct from their homologous velar /g/ and /k/. The second and third order of locus equations have produced appreciable results.
In this work, we use DCT transform and eigenfaces method to describe our facial dataset and to build a face recognition system using Kohonen self organizing map neural network classifier. Ascendant hierarchical classi...
详细信息
ISBN:
(纸本)9781467366748
In this work, we use DCT transform and eigenfaces method to describe our facial dataset and to build a face recognition system using Kohonen self organizing map neural network classifier. Ascendant hierarchical classification is used to describe the efficiency of DCT transform. A Kohonen SOM neural network classifier is used to classify an individual from three face databases: The ORL, computer vision and Caltech databases. These data sets are used to illustrate the effect of variation of illumination, background and facial rotation. Our study demonstrates the efficiency of DCT without PCA reduction especially in controlled environment.
作者:
Mahfoud HamidiaAbderrahmane AmroucheUSTHB
Faculty of Electronics and Computer Science Speech Communication and Signal Processing Laboratory (LCPTS) Bab Ezzouar Algiers Algeria
This paper presents a new method of the Double Talk Detection (DTD) for acoustic echo cancellation. The main goal is to remove the undesirable acoustic echoes produced by the coupling between the loudspeaker and the m...
详细信息
This paper presents a new method of the Double Talk Detection (DTD) for acoustic echo cancellation. The main goal is to remove the undesirable acoustic echoes produced by the coupling between the loudspeaker and the microphone of the mobile station. Acoustic Echo Canceller (AEC) based on adaptive filtering is an attractive solution. In this work, DTD using discriminative speech feature extraction from the near-end and the microphone speechsignals was performed. The main purpose is to discriminate between these signals for sensing Double Talk (DT) periods. To evaluate the performance we use the NLMS algorithm to update the filter coefficients. Results obtained from the TIMIT database show that the performances of the proposed method are significantly improved, compared to the Normalized Cross Correlation (NCC) and Geigel methods.
The limited number of writers and the lack of forgeries as counterexample to construct the systems is the main difficulty task for designing a robust off-line Handwritten Signature Verification System (HSVS). In this ...
详细信息
The limited number of writers and the lack of forgeries as counterexample to construct the systems is the main difficulty task for designing a robust off-line Handwritten Signature Verification System (HSVS). In this paper, we propose to study the influence of writer's number using conjointly the curvelet transform and the One-Class Support Vector Machine (OC-SVM), which takes in consideration only genuine signatures. The design of the HSVS is based on the writer-independent approach. Experimental results conducted on the standard CEDAR and GPDS datasets demonstrate that the proposed method allows achieving the lowest Average Error Rate with a limited number of writers.
暂无评论