The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The tracking ability and robustness of the Unscented Particle filter based on the minimum variance estimation principle are weakened when the actual data is abruptly changed. A fading factor unscented particle filter (FFUPF) algorithm is proposed in this paper, which can improve the accuracy of the unscented particle filtering and increase the tracking ability and robustness. The proposed fading factor...
Automated ECG signal processing can assist in diagnosing several heart diseases. Many R peak detection methods have been studied because the accuracy of R peak detection significantly affects the quality of subsequent ECG feature extraction. Two important steps in R peak detection algorithm that draw attention over researchers are the preprocessing and thresholding stages. Among several methods, wavelet...
This paper proposes a diffusion proportionate affine projection sign algorithm for distributed estimation of sparse vector over network. The algorithm is derived by minimizing l1-norm intermediate error vector subject to a weighted constraint on the filter coefficients, where the positive definite weighting matrix is designed to accelerate the convergence of the nonzero coefficients for sparse vector...
A new digital image multi-watermarking approach is proposed. Firstly watermark is synthesized by composing, conversion and scrambling of original multiple watermarks. Then watermark is embedded in middle frequency sub-bands of host image in wavelet domain, and the embedded intensity of watermark is determined adaptively by noise visibility function. Finally, extraction process adopts independent component...
Depth-image-based-rendering (DIBR) is a new 3D rendering method that has been taking an active role in the recent advancements of the 3D technology due to its numerous advantages. The DIBR takes from the content provider side a monoscopic center view and an associated per-pixel depth map, and renders virtual left-eye and right-eye views at the 3D content consumer side. As with other multimedia contents,...
Nowadays, video steganography has become important in many security applications. The performance of any steganographic method ultimately relies on the imperceptibility, hiding capacity, and robustness. In the past decade, many video steganography methods have been proposed; however, the literature lacks of sufficient survey articles that discuss all techniques. This paper presents a comprehensive...
A recently proposed non-Bayesian social learning rule by [1] finds an update rule that achieves the least Kullback-Leibler (LKL) divergence between a proxy of the true distribution generating agent's local observations and the agent's beliefs. In this paper, we investigate improvements to the LKL social learning algorithm by reusing the M most recent observations of each agent to perform updates of...
Traditional errors-in-variables (EIV) models are widely adopted in applied sciences. In practice, some of the columns of the coefficient matrix in EIV models may be known exactly. EIV models with exactly known columns are called mixed EIV (MEIV) models. Similar to EIV models, the MEIV models can be highly biased by gross error. This paper focuses on robust estimation in MEIV models. A new class of...
In this work, a new image watermarking algorithm on colour images is proposed. The proposed algorithm divides a cover image into three colour bands of red, green and blue. Then the following tasks are done on all three channels separately. First, Each colour band is divided into patches of small sizes then the entropy of each patch is calculated. At this step a threshold is found based on the average...
This paper examines means to achieve e-government documents security through the use of digital watermarking techniques. An effective algorithm is proposed such that a given e-government document is watermarked in the frequency domain by applying a second order Discrete Wavelet Transformation (DWT) followed by transformation of the document through matrix decomposition techniques such the Singular...
Electrical load disaggregation continues to attract new explorations due to its challenging nature as well as utility. When the loads to be separated are characterized by suitable features, there is a possibility to solve the problem by utilizing the techniques from the emerging area of Graph Signal Processing (GSP). In this paper, we propose a three-staged approach comprising of (i) Event Detection...
In this paper, we propose a methodology for the fusion of different modes of speaker verification (SV) operation (fixed-passphrase, text-dependent and text-independent mode), using regression fusion models. The experimental results with and without spoofing attack conditions and using different single mode speaker verification engines, GMM-UBM, HMM-UBM and i-vector, indicated improvement in all the...
Recently, a large scale air pollution problems, such as haze and fog bring challenges for target tracking in computer vision. However, most existing tracking algorithms are far from satisfactory in terms of adaptability to complex scenes and restoring the image's quality for hazy scenes. To address this issue, a particle filter based on context tracking algorithm is proposed for real-world hazy scenes...
Based on the tapped delay-lines (TDL) wideband model, the response variation (RV) constraint is applied to improve the frequency response consistency of the wideband beamforming. The optimization criterion of the proposed algorithm is minimizing the designed sidelobe level utmost and the constraints of the sidelobe level, interference suppression and the response variation while making the direction...
In this paper, we propose an adaptive framework for the variable step size of the fractional least mean square (FLMS) algorithm. The proposed algorithm named the robust variable step size-FLMS (RVSS-FLMS), dynamically updates the step size of the FLMS to achieve high convergence rate with low steady state error. For the evaluation purpose, the problem of system identification is considered. The experiments...
The audio watermarking systems are more challenge due to the lack of publicly available reference algorithms. It includes the robustness against acoustic path transmission is only evaluated. So this systems will gives the chance of digital watermarking to be used in many applications where such as e.g., second screen applications, audience measurement, and so on. In this paper introducing a simple...
Image authentication is always a key issue in this era of multimedia technology. As we are very much familiar with all numerous hacking techniques along with the availability of image editing tools such as Photoshop, Stir Mark etc., Image security becomes a major issue, so this provides us with a lot of Research scope in the field of Image Authentication. Our paper presents a model to authenticate...
Time-frequency (T-F) masking algorithms are focused at separating multiple sound sources from binaural reverberant speech mixtures. The statistical modelling of binaural cues i.e. interaural phase difference (IPD) and interaural level difference (ILD) is a significant aspect of such algorithms. In this paper, a Gaussian-Student's t distribution combined mixture model is exploited for robust binaural...
Large-scale networks of computing units, often characterised by the absence of central control, have become commonplace in many applications. To facilitate data processing in these large-scale networks, distributed signal processing is required. The iterative behaviour of distributed processing algorithms combined with energy, computational power, and bandwidth limitations imposed by such networks,...
In this paper, we consider using time-of-arrival (TOA) measurements from single moving receiver to locate a stationary source which emits periodical signal. First, we give the TOA measurements model and deduce the Cramér-Rao lower bounds (CRLB). Then, we formulated the maximum likelihood estimation (MLE) problem. We use the semidefinite programming (SDP) method to relax the nonconvex MLE problem into...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.