Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise...
详细信息
Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise and interference is a crucial factor. An investigation of the impact of interference on ASI system performance is presented in this paper, which introduces algorithms for achieving high ASI system performance. The objective is to resist the interference of various forms. This paper presents two models for the ASI task in the presence of interference. The first one depends on Normalized Pitch Frequency (NPF) and Mel-Frequency Cepstral Coefficients (MFCCs) as extracted features and Multi-Layer Perceptron (MLP) as a classifier. In this model, we investigate the utilization of a Discrete Transform (DT), such as Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Discrete Sine Transform (DST), to increase the robustness of extracted features against different types of degradation through exploiting the sub-band decomposition characteristics of DWT and the energy compaction property of DCT and DST. This is achieved by extracting features directly from contaminated speech signals in addition to features extracted from discrete transformed signals to create hybrid feature vectors. The enhancement techniques, such as Spectral Subtraction (SS), Winer Filter, and adaptive Wiener filter, are used in a preprocessing stage to eliminate the effect of the interference on the ASI system. In the second model, we investigate the utilization of Deep Learning (DL) based on a Convolutional Neural Network (CNN) with speech signal spectrograms and their Radon transforms to increase the robustness of the ASI system against interference effects. One of this paper goals is to introduce a comparison between the two models and build a more robust ASI system against severe interference. The experimental results indicate that the two proposed models lead to satisfa
Anomaly detection from medical images is badly needed for automated diagnosis. For example, medical images obtained with several modalities, such as magnetic resonance (MR) and confocal microscopy, need to be classifi...
详细信息
Surrogate models, which have become an effective and popular method to close loop reservoir management problems, use a data-driven approach to predict dynamic injection and production wells parameters and optimize wat...
详细信息
Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and *** learning provides a high performance for several medical image analysis *** paper pr...
详细信息
Medical image fusion is considered the best method for obtaining one image with rich details for efficient medical diagnosis and *** learning provides a high performance for several medical image analysis *** paper proposes a deep learning model for the medical image fusion *** model depends on Convolutional Neural Network(CNN).The basic idea of the proposed model is to extract features from both CT and MR ***,an additional process is executed on the extracted *** that,the fused feature map is reconstructed to obtain the resulting fused ***,the quality of the resulting fused image is enhanced by various enhancement techniques such as Histogram Matching(HM),Histogram Equalization(HE),fuzzy technique,fuzzy type,and Contrast Limited Histogram Equalization(CLAHE).The performance of the proposed fusion-based CNN model is measured by various metrics of the fusion and enhancement *** realistic datasets of different modalities and diseases are tested and ***,real datasets are tested in the simulation analysis.
Inspired by box jellyfish that has distributed and complementary perceptive system,we seek to equip manipulator with a camera and an Inertial Measurement Unit(IMU)to perceive ego motion and surrounding unstructured **...
详细信息
Inspired by box jellyfish that has distributed and complementary perceptive system,we seek to equip manipulator with a camera and an Inertial Measurement Unit(IMU)to perceive ego motion and surrounding unstructured *** robot perception,a reliable and high-precision calibration between camera,IMU and manipulator is a critical *** paper introduces a novel calibration ***,we seek to correlate the spatial relationship between the sensing units and manipulator in a joint ***,the manipulator moving trajectory is elaborately designed in a spiral pattern that enables full excitations on yaw-pitch-roll rotations and x-y-z translations in a repeatable and consistent *** calibration has been evaluated on our collected visual inertial-manipulator *** systematic comparisons and analysis indicate the consistency,precision and effectiveness of our proposed calibration method.
Prediction of subsurface oil reservoir pressure are critical to hydrocarbon production. However, the accurate pressure estimation faces great challenges due to the complexity and uncertainty of reservoir. The undergro...
详细信息
Modern map-dependent algorithms for mobile robot navigation typically overload a CPU and memory with a gradually increasing amount of environmental data. In contrast, Bug family local path planning algorithms operate ...
详细信息
ISBN:
(数字)9798331517564
ISBN:
(纸本)9798331517571
Modern map-dependent algorithms for mobile robot navigation typically overload a CPU and memory with a gradually increasing amount of environmental data. In contrast, Bug family local path planning algorithms operate without mapping and have significantly lower hardware requirements. Bug algorithms use real-time measurements from visual and touch sensors to make immediate decisions on direction of the robot’s motion. This paper presents an implementation of Rev1 and Rev2 Bug algorithms for the Robot Operating System (ROS) Noetic framework with a virtual model of the TurtleBot3 Burger robot. Given algorithms are validated in Gazebo simulation using various convex and maze environments. The results demonstrate superiority of Rev1 method over Rev2 in trajectory length in convex maps. However, Rev2 finds shorter paths in maze type environments.
In this paper, we present an implementation of the CautiousBug algorithm within the Noetic distribution of the Robot Operating System (ROS). Bug algorithms address a challenge of robot navigation in unknown environmen...
详细信息
ISBN:
(数字)9798331517564
ISBN:
(纸本)9798331517571
In this paper, we present an implementation of the CautiousBug algorithm within the Noetic distribution of the Robot Operating System (ROS). Bug algorithms address a challenge of robot navigation in unknown environments without relying on pre-existing maps or constructing new ones. These algorithms utilize odometry data, operate without a map, require minimal computational resources, and can be implemented on relatively simple hardware. A C++ software application was created to simulate a behavior of the CautiousBug algorithm in various environments within the Gazebo simulator. This application allows for an analysis of key metrics, including accumulated yaw, distance traversed and algorithm's runtime. We conducted a set of virtual experiments in the Gazebo to evaluate the CautiousBug performance.
This paper presents a novel aerial robotics application of instance segmentation-based floating litter collection with a multi-rotor aerial vehicle (MRAV). In the scope of the paper, we present a review of the availab...
详细信息
ISBN:
(数字)9798350357882
ISBN:
(纸本)9798350357899
This paper presents a novel aerial robotics application of instance segmentation-based floating litter collection with a multi-rotor aerial vehicle (MRAV). In the scope of the paper, we present a review of the available datasets for litter detection and segmentation. The reviewed datasets are used to train a Mask-RCNN neural network for instance segmentation. The neural network is off-board deployed on an edge computing device and used for litter position estimation. Based on the estimated litter position, we plan a path based on a quadratic Bezier curve for the litter pickup. We compare different trajectory generation methods for the object pickup. The system is verified in a laboratory environment. Eventually, we present practical considerations and improvements necessary to enable autonomous litter collection with MRAV.
Domestic service robots have the promising potential of bringing significant services to the general population, and more importantly, successful applications of universal domestic service robots can potentially help ...
详细信息
Domestic service robots have the promising potential of bringing significant services to the general population, and more importantly, successful applications of universal domestic service robots can potentially help mitigate critical societal issues such as senior care. In order to do so, domestic service robots need to integrate seamlessly into home environments. However, home environments are dynamic, complex and filled with personal items. Therefore, ambiguity can quickly arise for robots operating in such rich environments. In this paper, we propose an object ambiguity determination system that can determine the level of ambiguity in robot object selection tasks with fuzzy logic data integration. Additionally, we propose a functional human attention assessment system with fuzzy logic that enables the robot to determine user attention before committing to general disambiguation processes. Our preliminary results show that the proposed fuzzy logic inference systems can reliably estimate the robot object selection task ambiguity from object confidence level and the number of potential target objects that satisfy the user's command. Furthermore, fuzzy inference is applied to decide human eye gaze direction robustly. These subsystems can be utilized in the context of human-robot interaction to guide the robot when to seek feedback from a human partner in order to disambiguate reference in domestic service tasks. The source code of all proposed systems is available publicly on GitHub. 1
暂无评论