Showing 841 - 864 of 23823
In this paper, we propose a multi-channel speech source separation method with a deep neural network (DNN) which is trained under the condition that no clean signal is available. As an alternative to…
We present a simple variational approach for reconstructing color light fields (LFs) in the compressed sensing (CS) framework with very low sampling ratio, using both coded masks and color filter…
In this paper, we present a new detector for the detection of sparse stochastic signals using 1-bit data in two-level two-degree tree-structured sensor networks (2L-2D TSNs). Related prior work…
1 views
Exploring the entity-level (i.e., objects in an image, words in a text) spatial relationship contributes to understanding multimedia content precisely. The ignorance of spatial information in…
We present an efficient and realistic geometric acoustic simulation approach for generating and augmenting training data in speech-related machine learning tasks. Our physically-based acoustic…
1 views
With the help of a power-domain non-orthogonal multiple access (NOMA) scheme, satellite networks can simultaneously serve multiple users within limited time/spectrum resource block. However, the…
2 views
Traditional video quality assessment (VQA) methods evaluate localized picture quality and video score is predicted by temporally aggregating frame scores. However, video quality exhibits different…
In 5G mmWave, simultaneous localization and mapping (SLAM) allows devices to exploit map information to improve their position estimate. Even the most basic SLAM filter based on a Rao-Blackwellized…
Kernel regression problem with autocorrelation prior is discussed in this paper. We revealed the optimal model of the kernel ridge regression in terms of the expected generalization error under the…
Versatile Video Coding (VVC) is the next generation video coding standard expected by the end of 2020. Compared to its predecessor, VVC introduces new coding tools and techniques to make compression…
This paper carries out a large dimensional analysis of a variation of kernel ridge regression that we call centered kernel ridge regression (CKRR), also known in the literature as kernel ridge…
Speech signals captured by a microphone mounted to a smart soundbar or speaker are inherently contaminated by echos. Modern smart devices are usually characterized by low computational capabilities…
3 views
In recent years, the rapid development of depth cameras and wide application scenarios. The depth image information becomes more influential in face identification. In the proposed architecture, we…
We propose a computational framework for ranking images (group photos) taken at the same event within a short time span. The ranking is expected to correspond with human perception of overall appeal…
This paper proposes a general post-processing method for improving speaker-attribute estimation. Estimating speaker-specific attributes such as age and gender is an important task with a wide range…
Monaural intrusive speech intelligibility prediction (SIP) methods aim to predict the speech intelligibility (SI) of a single-microphone noisy and/or processed speech signal using the underlying…

Join us for a Special tribute Session honoring Prof. John R. Tucker at IMS 2015

Presented by Bob Dickman

626 views
The quality of speech codecs deteriorates at low bitrates due to high quantization noise. A post-filter is generally employed to enhance the quality of the coded speech. In this paper, a data-driven…
Vehicle re-identification (re-id) is challenging due to the small inter-class distance. The differences between similar vehicles can be extremely subtle and only captured at particular scales and…

Join us for a Special tribute Session honoring Prof. John R. Tucker at IMS 2015

Presented by Jonas Zmuidzinas

886 views
This work defines a new framework for performance evaluation of polyphonic sound event detection (SED) systems, which overcomes the limitations of the conventional collar-based event decisions, event…
Constant Envelope (CE) precoding is an efficient technique for systems based on massive antenna arrays since the constant amplitude of the transmit signal facilitates the use of power efficient non-…
In many applications of wireless sensor networks, it is important that the privacy of the nodes of the network be protected. Therefore, privacy-preserving algorithms have received quite some…

Join us for a Special tribute Session honoring Prof. John R. Tucker at IMS 2015

Presented by Eugene Lauria

 

735 views