103,351 research outputs found

    Convexity in source separation: Models, geometry, and algorithms

    Get PDF
    Source separation or demixing is the process of extracting multiple components entangled within a signal. Contemporary signal processing presents a host of difficult source separation problems, from interference cancellation to background subtraction, blind deconvolution, and even dictionary learning. Despite the recent progress in each of these applications, advances in high-throughput sensor technology place demixing algorithms under pressure to accommodate extremely high-dimensional signals, separate an ever larger number of sources, and cope with more sophisticated signal and mixing models. These difficulties are exacerbated by the need for real-time action in automated decision-making systems. Recent advances in convex optimization provide a simple framework for efficiently solving numerous difficult demixing problems. This article provides an overview of the emerging field, explains the theory that governs the underlying procedures, and surveys algorithms that solve them efficiently. We aim to equip practitioners with a toolkit for constructing their own demixing algorithms that work, as well as concrete intuition for why they work

    Techniques for noise and nonlinear impairments compensation in CO-OFDM transmission

    Get PDF
    In this paper, we discuss recent advances in digital signal processing techniques for compensation of the laser phase noise and fiber nonlinearity impairments in coherent optical orthogonal frequency division multiplexing (CO-OFDM) transmission. For laser phase noise compensation, we focus on quasi-pilot-aided (QPA) and decision-directed-free blind (DDF-blind) phase noise compensation techniques. For fiber nonlinearity compensation, we discuss in details the principle and performance of the phase-conjugated pilots (PCP) scheme

    Distributed and adaptive location identification system for mobile devices

    Full text link
    Indoor location identification and navigation need to be as simple, seamless, and ubiquitous as its outdoor GPS-based counterpart is. It would be of great convenience to the mobile user to be able to continue navigating seamlessly as he or she moves from a GPS-clear outdoor environment into an indoor environment or a GPS-obstructed outdoor environment such as a tunnel or forest. Existing infrastructure-based indoor localization systems lack such capability, on top of potentially facing several critical technical challenges such as increased cost of installation, centralization, lack of reliability, poor localization accuracy, poor adaptation to the dynamics of the surrounding environment, latency, system-level and computational complexities, repetitive labor-intensive parameter tuning, and user privacy. To this end, this paper presents a novel mechanism with the potential to overcome most (if not all) of the abovementioned challenges. The proposed mechanism is simple, distributed, adaptive, collaborative, and cost-effective. Based on the proposed algorithm, a mobile blind device can potentially utilize, as GPS-like reference nodes, either in-range location-aware compatible mobile devices or preinstalled low-cost infrastructure-less location-aware beacon nodes. The proposed approach is model-based and calibration-free that uses the received signal strength to periodically and collaboratively measure and update the radio frequency characteristics of the operating environment to estimate the distances to the reference nodes. Trilateration is then used by the blind device to identify its own location, similar to that used in the GPS-based system. Simulation and empirical testing ascertained that the proposed approach can potentially be the core of future indoor and GPS-obstructed environments

    A Generalized Algorithm for Blind Channel Identification with Linear Redundant Precoders

    Get PDF
    It is well known that redundant filter bank precoders can be used for blind identification as well as equalization of FIR channels. Several algorithms have been proposed in the literature exploiting trailing zeros in the transmitter. In this paper we propose a generalized algorithm of which the previous algorithms are special cases. By carefully choosing system parameters, we can jointly optimize the system performance and computational complexity. Both time domain and frequency domain approaches of channel identification algorithms are proposed. Simulation results show that the proposed algorithm outperforms the previous ones when the parameters are optimally chosen, especially in time-varying channel environments. A new concept of generalized signal richness for vector signals is introduced of which several properties are studied

    Probabilistic Modeling Paradigms for Audio Source Separation

    Get PDF
    This is the author's final version of the article, first published as E. Vincent, M. G. Jafari, S. A. Abdallah, M. D. Plumbley, M. E. Davies. Probabilistic Modeling Paradigms for Audio Source Separation. In W. Wang (Ed), Machine Audition: Principles, Algorithms and Systems. Chapter 7, pp. 162-185. IGI Global, 2011. ISBN 978-1-61520-919-4. DOI: 10.4018/978-1-61520-919-4.ch007file: VincentJafariAbdallahPD11-probabilistic.pdf:v\VincentJafariAbdallahPD11-probabilistic.pdf:PDF owner: markp timestamp: 2011.02.04file: VincentJafariAbdallahPD11-probabilistic.pdf:v\VincentJafariAbdallahPD11-probabilistic.pdf:PDF owner: markp timestamp: 2011.02.04Most sound scenes result from the superposition of several sources, which can be separately perceived and analyzed by human listeners. Source separation aims to provide machine listeners with similar skills by extracting the sounds of individual sources from a given scene. Existing separation systems operate either by emulating the human auditory system or by inferring the parameters of probabilistic sound models. In this chapter, the authors focus on the latter approach and provide a joint overview of established and recent models, including independent component analysis, local time-frequency models and spectral template-based models. They show that most models are instances of one of the following two general paradigms: linear modeling or variance modeling. They compare the merits of either paradigm and report objective performance figures. They also,conclude by discussing promising combinations of probabilistic priors and inference algorithms that could form the basis of future state-of-the-art systems

    Application of independent component analysis for evaluation of ashlar masonry walls

    Full text link
    [EN] This paper presents a novel application of Independent Component Analysis (ICA) to the evaluation of ashlar masonry walls inspected with Ground Penetrating Radar (GPR). ICA is used as preprocessor to eliminate the background from the backscattered signals. Thus, signal-to-noise ratio of the GPR signals is enhanced. Several experiments were made on scale models of historic ashlar masonry walls. These models were loaded with different weights, and the corresponding B-Scans were obtained. ICA shows the best performance to enhance the quality of the B-Scans compared with classical methods used in GPR signal processing.This work has been supported by the Generalitat Valenciana under grant PROMETEO/2010/040, and the Spanish Administration and the FEDER Programme of the European Union under grant TEC 2008-02975/TEC.Salazar Afanador, A.; Safont Armero, G.; Vergara Domínguez, L. (2011). Application of independent component analysis for evaluation of ashlar masonry walls. Lecture Notes in Computer Science. 6691(1):469-476. https://doi.org/10.1007/978-3-642-21498-1_59S46947666911Salazar, A., Unió, J.M., Serrano, A., Gosalbez, J.: Neural networks for defect detection in non-destructive evaluation by sonic signals. In: Sandoval, F., Prieto, A.G., Cabestany, J., Graña, M. (eds.) IWANN 2007. LNCS, vol. 4507, pp. 638–645. Springer, Heidelberg (2007)Salazar, A., Vergara, L., Llinares, R.: Learning material defect patterns by separating mixtures of independent component analyzers from NDT sonic signals. Mechanical Systems and Signal processing 24(6), 1870–1886 (2010)Zhao, A., Jiang, Y., Wang, W.: Exploring Independent Component Analysis for GPR Signal Processing. In: Progress In Electromagnetics Research Symposium 2005, pp. 750–753. The Electromagnetics Academy, Cambridge (2005)Abujarad, F., Omar, A.: Comparison of Independent-Component Analysis (ICA) Algorithms for GPR Detection of Non-Metallic Land Mines. In: Bruzzone, L. (ed.) Proceedings of SPIE Image and Signal Processing for Remote Sensing XII, vol. 6365, pp. 636516.1–636516.12. SPIE, Bellingham (2006)Liu, J.X., Zhang, B., Wu, R.B.: GPR Ground Bounce Removal Methods Based on Blind Source Separation. In: Progress In Electromagnetics Research Symposium 2006, pp. 256–259. The Electromagnetics Academy, Cambridge (2006)Verma, P.K., Gaikwad, A.N., Sigh, D., Nigam, M.J.: Analysis of Clutter Reduction Techniques for Through Wall Imaging in UWB Range. In: Progres. Electromagnetics Research B 2009, vol. 17, pp. 29–48. The Electromagnetics Academy, Cambridge (2009)Salazar, A., Vergara, L., Serrano, A., Igual, J.: A General Procedure for Learning Mixtures of Independent Component Analyzers. Pattern Recognition 43(1), 69–85 (2010)Cardoso, J.F., Souloumiac, A.: Blind beamforming for non Gaussian signals. IEE Proceedings-F 140(6), 362–370 (1993)Ziehe, A., Muller, K.R.: TDSEP - An Efficient Algorithm for Blind Separation Using Time Structure. In: Proceedings of the Eighth International Conference on Artificial Neural Networks ICANN 1998, Perspectives in Neural Computing, pp. 675–680 (1998)Reynolds, J.M.: An Introduction to Applied and Environmental Geophysics. Wiley, Chichester (1997)Igual, J., Camacho, A., Vergara, L.: A blind source separation technique for extracting sinusoidal interferences in ultrasonic non-destructive testing. Journal of VLSI Signal Processing 38, 25–34 (2004)Salazar, A., Gosálbez, J., Igual, J., Llinares, R., Vergara, L.: Two applications of independent component analysis for non-destructive evaluation by ultrasounds. In: Rosca, J.P., Erdogmus, D., Príncipe, J.C., Haykin, S. (eds.) ICA 2006. LNCS, vol. 3889, pp. 406–413. Springer, Heidelberg (2006)Raghavan, R.S.: A Model for Spatially Correlated Radar Clutter. IEEE Trans. on Aerospace and Electronic Systems 27, 268–275 (1991)Salazar, A., Vergara, L.: ICA mixtures applied to ultrasonic nondestructive classification of archaeological ceramics. EURASIP Journal on Advances in Signal Processing, Article ID 125201, 11 (2010), doi:10.1155/2010/125201Salazar, A., Vergara, L., Miralles, R.: On including sequential dependence in ICA mixture models. Signal Processing 90(7), 2314–2318 (2010

    Blind Source Separation with Optimal Transport Non-negative Matrix Factorization

    Full text link
    Optimal transport as a loss for machine learning optimization problems has recently gained a lot of attention. Building upon recent advances in computational optimal transport, we develop an optimal transport non-negative matrix factorization (NMF) algorithm for supervised speech blind source separation (BSS). Optimal transport allows us to design and leverage a cost between short-time Fourier transform (STFT) spectrogram frequencies, which takes into account how humans perceive sound. We give empirical evidence that using our proposed optimal transport NMF leads to perceptually better results than Euclidean NMF, for both isolated voice reconstruction and BSS tasks. Finally, we demonstrate how to use optimal transport for cross domain sound processing tasks, where frequencies represented in the input spectrograms may be different from one spectrogram to another.Comment: 22 pages, 7 figures, 2 additional file

    Secure and Robust Image Watermarking Scheme Using Homomorphic Transform, SVD and Arnold Transform in RDWT Domain

    Get PDF
    The main objective for a watermarking technique is to attain imperceptibility, robustness and security against various malicious attacks applied by illicit users. To fulfil these basic requirements for a scheme is a big issue of concern. So, in this paper, a new image watermarking method is proposed which utilizes properties of homomorphic transform, Redundant Discrete Wavelet Transform (RDWT), Arnold Transform (AT) along with Singular Value Decomposition (SVD) to attain these required properties. RDWT is performed on host image to achieve LL subband. This LL subband image is further decomposed into illumination and reflectance components by homomorphic transform. In order to strengthen security of proposed scheme, AT is used to scramble watermark. This scrambled watermark is embedded with Singular Values (SVs) of reflectance component which are obtained by applying SVD to it. Since reflectance component contains important features of image, therefore, embedding of watermark in this part provides excellent imperceptibility. Proposed scheme is comprehensively examined against different attacks like scaling, shearing etc. for its robustness. Comparative study with other prevailing algorithms clearly reveals superiority of proposed scheme in terms of robustness and imperceptibility
    corecore