4,445 research outputs found
Direction of Arrival with One Microphone, a few LEGOs, and Non-Negative Matrix Factorization
Conventional approaches to sound source localization require at least two
microphones. It is known, however, that people with unilateral hearing loss can
also localize sounds. Monaural localization is possible thanks to the
scattering by the head, though it hinges on learning the spectra of the various
sources. We take inspiration from this human ability to propose algorithms for
accurate sound source localization using a single microphone embedded in an
arbitrary scattering structure. The structure modifies the frequency response
of the microphone in a direction-dependent way giving each direction a
signature. While knowing those signatures is sufficient to localize sources of
white noise, localizing speech is much more challenging: it is an ill-posed
inverse problem which we regularize by prior knowledge in the form of learned
non-negative dictionaries. We demonstrate a monaural speech localization
algorithm based on non-negative matrix factorization that does not depend on
sophisticated, designed scatterers. In fact, we show experimental results with
ad hoc scatterers made of LEGO bricks. Even with these rudimentary structures
we can accurately localize arbitrary speakers; that is, we do not need to learn
the dictionary for the particular speaker to be localized. Finally, we discuss
multi-source localization and the related limitations of our approach.Comment: This article has been accepted for publication in IEEE/ACM
Transactions on Audio, Speech, and Language processing (TASLP
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
Copresence verification based on context can improve usability and strengthen
security of many authentication and access control systems. By sensing and
comparing their surroundings, two or more devices can tell whether they are
copresent and use this information to make access control decisions. To the
best of our knowledge, all context-based copresence verification mechanisms to
date are susceptible to context-manipulation attacks. In such attacks, a
distributed adversary replicates the same context at the (different) locations
of the victim devices, and induces them to believe that they are copresent. In
this paper we propose DoubleEcho, a context-based copresence verification
technique that leverages acoustic Room Impulse Response (RIR) to mitigate
context-manipulation attacks. In DoubleEcho, one device emits a wide-band
audible chirp and all participating devices record reflections of the chirp
from the surrounding environment. Since RIR is, by its very nature, dependent
on the physical surroundings, it constitutes a unique location signature that
is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR
data with various mobile devices and in a range of different locations. We show
that DoubleEcho mitigates context-manipulation attacks whereas all other
approaches to date are entirely vulnerable to such attacks. DoubleEcho detects
copresence (or lack thereof) in roughly 2 seconds and works on commodity
devices
Development of a fusion adaptive algorithm for marine debris detection within the post-Sandy restoration framework
Recognition of marine debris represent a difficult task due to the extreme variability of the marine environment, the possible targets, and the variable skill levels of human operators. The range of potential targets is much wider than similar fields of research such as mine hunting, localization of unexploded ordnance or pipeline detection. In order to address this additional complexity, an adaptive algorithm is being developing that appropriately responds to changes in the environment, and context.
The preliminary step is to properly geometrically and radiometrically correct the collected data. Then, the core engine manages the fusion of a set of statistically- and physically-based algorithms, working at different levels (swath, beam, snippet, and pixel) and using both predictive modeling (that is, a high-frequency acoustic backscatter model) and phenomenological (e.g., digital image processing techniques) approaches. The expected outcome is the reduction of inter-algorithmic cross-correlation and, thus, the probability of false alarm. At this early stage, we provide a proof of concept showing outcomes from algorithms that dynamically adapt themselves to the depth and average backscatter level met in the surveyed environment, targeting marine debris (modeled as objects of about 1-m size).
The project relies on a modular software library, called Matador (Marine Target Detection and Object Recognition)
The Special Case of Sea Mines
In this chapter, work carried out at the Royal Military Academy regarding sea mines and mine countermeasures is summarized. Three sensors used for the detection and identification of sea mines are studied here: sonar, gradiometer and infrared camera. These sensors can be applied to detect different types of sea mines. Some signal and image processing techniques developed to extract relevant information for the detection of underwater objects are presented in this chapter. These techniques are validated using data collected in the frame of different European and NATO projects
Sea glider guidance around a circle using distance measurements to a drifting acoustic source
International audienceThis paper describes a simple yet robust sea glider guidance method in a constellation of Lagrangian drifters under the polar ice cap. The glider has to perform oceanographic measurements, mainly conductivity, temperature and depth, in the area enclosed by the drifters and can not rely on GNSS (Global Navigation Satellite System) positionning data as the polar ice cap makes it impossible to surface. The originality of the presented method resides in 2 points. First, a very simple PID (Proportional, Integral and Derivative) controller based on a basic kinematic model is tuned. Second, the method does not use a localization algorithm to estimate state space model data but interval analysis methods are performed to bound the errors in range to the transponder and its derivative. Moreover, only one acoustic beacon is used. Validation is then performed through simulations
Likelihood Consensus and Its Application to Distributed Particle Filtering
We consider distributed state estimation in a wireless sensor network without
a fusion center. Each sensor performs a global estimation task---based on the
past and current measurements of all sensors---using only local processing and
local communications with its neighbors. In this estimation task, the joint
(all-sensors) likelihood function (JLF) plays a central role as it epitomizes
the measurements of all sensors. We propose a distributed method for computing,
at each sensor, an approximation of the JLF by means of consensus algorithms.
This "likelihood consensus" method is applicable if the local likelihood
functions of the various sensors (viewed as conditional probability density
functions of the local measurements) belong to the exponential family of
distributions. We then use the likelihood consensus method to implement a
distributed particle filter and a distributed Gaussian particle filter. Each
sensor runs a local particle filter, or a local Gaussian particle filter, that
computes a global state estimate. The weight update in each local (Gaussian)
particle filter employs the JLF, which is obtained through the likelihood
consensus scheme. For the distributed Gaussian particle filter, the number of
particles can be significantly reduced by means of an additional consensus
scheme. Simulation results are presented to assess the performance of the
proposed distributed particle filters for a multiple target tracking problem
- …