Traditional side-looking synthetic aperture radar (SAR) and Doppler beam-sharpening (DBS) technologies cannot generate images of the areas in flight direction with high azimuth resolution. To alleviate this problem, a...
详细信息
Traditional side-looking synthetic aperture radar (SAR) and Doppler beam-sharpening (DBS) technologies cannot generate images of the areas in flight direction with high azimuth resolution. To alleviate this problem, an innovative approach based on real-beam scanning is presented. Moreover, both the feasibility and the applicable conditions of azimuth super-resolution are discussed. According to the model of echoes in which receiver power is modulated by beam gain, a modified Capon algorithm is employed to calculate the spatial spectrum. Numerical simulation indicates that it can achieve forward-looking imaging for an airborne single-channel radar, and its performance is better than that of Capon when strong signals and weak signals are in co-existence.
We address, in this work, a new feature generation method for two different approaches of off-line handwritten signature verification (HSV), writer-dependent and writer-independent HSV. The proposed method uses conjoi...
详细信息
We address, in this work, a new feature generation method for two different approaches of off-line handwritten signature verification (HSV), writer-dependent and writer-independent HSV. The proposed method uses conjointly the contourlet transform and the co-occurence matrix. The contourlet transform allows capturing contour segment directions of the handwritten signature, while the co-occurrence matrix allows describing the number of directions. Experiments are conducted on the well known CEDAR dataset and the classification through the support vector machines (SVM). The obtained results show the effective use of the Contourlet transform for handwritten signature verification comparatively to the state of the art.
We propose in this work a signature verification system based on decision combination of off-line signatures for managing conflict provided by the SVM classifiers. The system is basically divided into three modules: i...
详细信息
We propose in this work a signature verification system based on decision combination of off-line signatures for managing conflict provided by the SVM classifiers. The system is basically divided into three modules: i) Radon Transform-SVM, ii) Ridgelet Transform-SVM and iii) PCR5 combination rule based on the generalized belief functions of Dezert-Smarandache theory. The proposed framework allows combining the normalized SVM outputs and uses an estimation technique based on the dissonant model of Appriou to compute the belief assignments. Decision making is performed through likelihood ratio. Experiments are conducted on the well known CEDAR database using false rejection and false acceptance criteria. The obtained results show that the proposed combination framework improves the verification accuracy compared to individual SVM classifiers.
We propose in this work a new handwritten digit recognition system based on parallel combination of SVM classifiers for managing conflict provided between their outputs. Firstly, we evaluate different methods of gener...
详细信息
We propose in this work a new handwritten digit recognition system based on parallel combination of SVM classifiers for managing conflict provided between their outputs. Firstly, we evaluate different methods of generating features to train the SVM classifiers that operate independently of each other. To improve the performance of the system, the outputs of SVM classifiers are combined through the Dezert-Smarandache theory. The proposed framework allows combining the calibrated SVM outputs issued from a sigmoid transformation and uses an estimation technique based on a supervised model to compute the belief assignments. Decision making is performed by maximizing the new Dezert-Smarandache probability. The performance evaluation of the proposed system is conducted on the well known US Postal Service database. Experimental results show that the proposed combination framework improves the recognition rate even when individual SVM classifiers provide conflicting outputs.
Support vector machines (SVMs) have become an alternative tool for pattern recognitions, and more specifically for Handwritten Signature Verification Systems (HSVS). Usually, the bi-class SVMs (B-SVM) are used for sep...
详细信息
Support vector machines (SVMs) have become an alternative tool for pattern recognitions, and more specifically for Handwritten Signature Verification Systems (HSVS). Usually, the bi-class SVMs (B-SVM) are used for separating between genuine and forged signatures. However, in practice, only genuine signatures are available. In this paper, we investigate the use of one-class SVM (OC-SVM) for handwritten signature verifications. Experimental results conducted on the standard CEDAR database show the effective use of the one-class SVM compared to the bi-class SVM.
We address the problem of localized error detection in Automatic Speech Recognition (ASR) output. Localized error detection seeks to identify which particular words in a user's utterance have been misrecognized. I...
详细信息
We address the problem of localized error detection in Automatic Speech Recognition (ASR) output. Localized error detection seeks to identify which particular words in a user's utterance have been misrecognized. Identifying misrecognized words permits one to create targeted clarification strategies for spoken dialogue systems, allowing the system to ask clarification questions targeting the particular type of misrecognition, in contrast to the “please repeat/rephrase” strategies used in most current dialogue systems. We present results of machine learning experiments using ASR confidence scores together with prosodic and syntactic features to predict whether 1) an utterance contains an error, and 2) whether a word in a misrecognized utterance is misrecognized. We show that by adding syntactic features to the ASR features when predicting misrecognized utterances the F-measure improves by 13.3% compared to using ASR features alone. By adding syntactic and prosodic features when predicting misrecognized words F-measure improves by 40%.
This article develops a speaker-dependent Arabic phonemes recognition system using MFCC analysis and the VQ-LBG algorithm. The system is examined with and without vector quantization in order to analyze the effect of ...
详细信息
This article develops a speaker-dependent Arabic phonemes recognition system using MFCC analysis and the VQ-LBG algorithm. The system is examined with and without vector quantization in order to analyze the effect of compression in an acoustic parameterization phase. Our experimental results show that vector quantization using a codebook of size 16 achieves good results compared to the system without quantization for a majority of the phonemes studied.
Whispered speech can be effectively used for quiet and private communications over mobile phones and is also the communication means for ENT patients under a regime of voice rest. However,little progress has been made...
详细信息
Whispered speech can be effectively used for quiet and private communications over mobile phones and is also the communication means for ENT patients under a regime of voice rest. However,little progress has been made on the denoising of whispered speech in noisy environment because of its special acoustic *** this paper, we propose a whisper denoising algorithm in joint time-frequency domain based on real-valued discrete Gabor transform(RDGT). Noisy whisper is first transformed into the joint time-frequency domain by fast real-valued discrete Gabor transform. The MMSE based log-amplitude estimator is derived under speech presence uncertainty hypothesis. Clean whisper spectral is then estimated by inverse transform of RDGT. Experimental results show that the proposed algorithm is very effective in avoiding the musical residual noise and retaining weak speech components.
In this paper, we propose a novel method named Contracting Community Approach (CCA) to get the maximum flow of flow network. Firstly, we contract communities in the original network. Then, we apply classic algorithms ...
详细信息
In this paper, we propose a novel method named Contracting Community Approach (CCA) to get the maximum flow of flow network. Firstly, we contract communities in the original network. Then, we apply classic algorithms on the contracted network to approximately solve the maximum flow problem. Experimental results show that the efficiency of the proposed algorithm. For sparse networks, the size of network is reduced to 58.38% averagely and the correctness of maximum flow is over 95%. For middle dense networks, the size of network is reduced to 65.77% averagely. For dense networks, the size of network is reduced to 64.84% averagely. And the correctness of maximum flow even reach 100% both in many middle dense and dense cases in our experiments.
In this paper, we propose a system to recognize handwritten digit strings, which constitutes a difficult task because of overlapping and/or joining of adjacent digits. To resolve this problem, we use a segmentation-re...
详细信息
In this paper, we propose a system to recognize handwritten digit strings, which constitutes a difficult task because of overlapping and/or joining of adjacent digits. To resolve this problem, we use a segmentation-recognition of handwritten connected digits based on the oriented sliding window. The proposed approach allows separating adjacent digits according the connection configuration by finding at the same time the interconnection points between adjacent digits and the cutting path. The segmentation-recognition using the global decision module allows the rejection or acceptance of the processed image. Experimental results conducted on the handwritten digit database NIST SD19 show the effective use of the sliding window for segmentation-recognition.
暂无评论