Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to l...
详细信息
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to locate endpoint intervals of a speech signal embedded in noise. With the EMD, the noise signals can be decomposed into different numbers of sub-signals called intrinsic mode functions (IMFs), which is a zero-mean AM-FM component. Then TEO can be used to extract the desired feature of the modulation energy for IMF components. In order to show the effectiveness of the proposed method, examples are presented to show that the new measure is more effective than traditional measures. The present experimental results show that the measure can be used to improve the performance of endpoint detection algorithms and the accuracy of this algorithm is quite satisfactory and acceptable.
Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is...
详细信息
Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is used to realize normalizing of the face image. Secondly, a determination criterion of eye location is established by the priori knowledge of geometrical facial features. Thirdly, a range of threshold values that would separate eye blocks from others in a segmented face image is estimated. With the progressive increase of the threshold by an appropriate step in that range, once two eye blocks appear from the segmented image, they will be detected by the determination criterion of eye location. Finally, the 2-D correlation coefficient is used as a symmetry similarity measure to check the factuality of the two detected eyes. The experimental results demonstrate the high efficiency of the algorithm in runtime and correct localization rate.
Self-organizing networks (SON) for cellular systems are emerging as an important technology to reduce the cost of network deployment and maintenances. Mobility robustness optimization (MRO) is one of the main use case...
详细信息
Self-organizing networks (SON) for cellular systems are emerging as an important technology to reduce the cost of network deployment and maintenances. Mobility robustness optimization (MRO) is one of the main use cases of SON and has been intensively studied in 3GPP working groups. In this paper, we take the user equipment (UE) speed into account to solve the MRO problem. We propose a US-MRO algorithm, which assigns different Hysteresis parameters to UEs with different speed. The simulation results show that the success rate of Handover (HO) is improved and user experience is enhanced by the US-MRO algorithm.
In many areas of pattern recognition and machine learning, subspace selection is an essential step. Fisher's linear discriminant analysis (LDA) is one of the most well-known linear subspace selection methods. Howe...
详细信息
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to locat...
详细信息
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to locate endpoint intervals of a speech signal embedded in noise. With the EMD, the noise signals can be decomposed into different numbers of sub-signals called intrinsic mode functions (IMFs), which is a zero-mean AM-FM component. Then TEO can be used to extract the desired feature of the modulation energy for IMF components. In order to show the effectiveness of the proposed method, examples are presented to show that the new measure is more effective than traditional measures. The present experimental results show that the measure can be used to improve the performance of endpoint detection algorithms and the accuracy of this algorithm is quite satisfactory and acceptable.
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an ...
详细信息
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an issue which is a special SMC problem. Based on Scalar Product Protocol, Monte Carlo Method and Oblivious Transfer, we give two solutions to the problem about how to decide the areas. That is, a polygon is divided into two parts by a line: S 1 and S 2 . Furthermore, we analyze the security and computational complexity, as well as the comparison of these two protocols. The results of analysis show that the proposed protocols are secure and efficient. We believe the two protocols will be useful in other geometric and combinatorial problems.
A variety of wavelet transform methods have been introduced to remove noise from images. However, many of these algorithms remove the fine details and smooth the structures of the image when removing noise. The wavele...
详细信息
Recently, double-negative meta-materials are widely studied in scientific research. The double-negative (DNG) mediums are characterized by simultaneous negative permittivity and permeability. In order to make the FDTD...
详细信息
Recently, double-negative meta-materials are widely studied in scientific research. The double-negative (DNG) mediums are characterized by simultaneous negative permittivity and permeability. In order to make the FDTD method analyze the electromagnetic scattering and propagation for double-negative (DNG) medium, z-transform is applied to the FDTD method in the double-negative (DNG) medium. For the simulations, extremely large computer memory space and a long computational time b required. A parallel algorithm for the FDTD method on the state of the art graphics hardware is presented. The parallel computing techniques can be used to reduce the computation time significantly and have been widely applied in various complex FDTD applications. In this paper, we simulate the interaction between electromagnetic wave and DNG medium, and describe an impact of new GPU features on development process of an efficient Finite Difference Time Domain (FDTD) implementation.
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b...
详细信息
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced by all nodes when network is formed. The nodes’ public keys are derived from their identities. In order to get the private key, each node needs to prove their identity to distributed CAs using a zeroknowledge proof protocol to get the share of private key. Compared with former schemes, our scheme doesn’t need any local registration authority(LRA), which is easy to be compromised by adversary. When a node leaves the network, shares of the master private key would be renewed. In the end, we prove our scheme is correct and secure.
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of mo...
详细信息
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of moments (MOM). The asymptotic waveform evaluation (AWE) technique for dispersive dielectric medium is deduced and apllied to electromagnetic scattering analysis of double-negative medium within a given frequency band.
暂无评论