Large-scale Music Identification Algorithms and Applications

Size: px
Start display at page:

Download "Large-scale Music Identification Algorithms and Applications"

Transcription

1 Large-scale Music Identification Algorithms and Applications Eugene Weinstein, PhD Candidate New York University, Courant Institute Department of Computer Science Depth Qualifying Exam June 20th, 2007

2 Talk Outline Introduction, motivation Algorithms for music identification Acoustic modeling using Gaussian Mixture Models Song set representation using Finite-State Transducers Experiments on clean, noisy, and distorted data Theoretical results New bounds on the size of a factor automaton Conclusion 2

3 Introduction Music identification scenario: Match a few seconds of audio to large song database Many potential applications: music search, content monitoring, song analysis Algorithmic, theoretical, and practical challenges, e.g., Recording can be distorted due to noise, transmission over limited channels Might only get short audio snippet from any point in song 3

4 Past Work Most past work based on hashing, e.g., [Haitsma et al. 01] Exact match required between training and test features HMM system over music sound events: [Batlle et al. 02] Similar to speech recognition with unknown phone set Hypothesize phones in iterative process: 1. Run decoding on training corpus, obtain labels 2. Estimate phones based on decoding output 4

5 Overview Start with database of 15,000+ songs Compute MFCC features over audio Cluster song segments to get initial music phone set Learn phone set and train acoustic model for each phone Generate compact recognition transducer Identify songs using Viterbi decoding Waveform Cepstra Phone Set/ Acoustic Model Transcription Recognition Transducer

6 Acoustic Model Training Segment training audio based on spectral change Initialize model using k-means clustering over segments Iterative training, repeat: 1. Run decoder with current model, get transcriptions 2. Use transcription counts to train GMM for each phone Edit distance measures convergence 6 Edit Distance [ICASSP 07] Training Iteration Phone Set/ Acoustic Model Transcription

7 Finite-state Transducers Finite automata with input and output labels on transitions, possibly weighted Widely used in speech and text processing, computational biology, etc. We view each song transcription as a string (music phones are the symbols) and construct a FST to Map substrings (factors) to songs Phone Set/ Acoustic Model 7 Transcription Recognition Transducer

8 Full-song Recognition Want transducer mapping complete music phone sequences to corresponding songs (no snippets for now) Idea: one state chain per song Transition to final state has song identifier as output label (all other output labels are ε s) Using generic automata operations, we construct deterministic minimal transducer for efficient search mp_72:! 1 mp_240:! 2 mp_2: Beatles--Let_It_Be 0 mp_736:! mp_736:! 6 3 mp_28:! mp_736 :! 7 4 mp_240:! mp_349:! 8 mp_448:! 9 5 mp_20:madonna--ray_of_light mp_889:van_halen--right_now 10 8

9 Snippet (Factor) Acceptor Need to recognize song parts, or snippets Make all states initial & final Drop output labels Determinize, minimize Recognizes all snippets But doesn t identify songs! mp_72:! 1 mp_240:! 2 mp_2: Beatles--Let_It_Be 0 mp_736:! mp_736:! 6 3 mp_28:! mp_736 :! 7 4 mp_240:! mp_349:! 8 mp_448:! 9 5 mp_20:madonna--ray_of_light mp_889:van_halen--right_now 10 9

10 Snippet (Factor) Acceptor Need to recognize song parts, or snippets Make all states initial & final Drop output labels Determinize, minimize Recognizes all snippets ε:ε 0 But doesn t identify songs! mp_72:! mp_736:! mp_736:! 1 6 mp_240:! 3 mp_28:! mp_736 :! 7 ε:ε 2 4 mp_240:! mp_2: Beatles--Let_It_Be mp_349:! 8 mp_448:! 9 5 mp_20:madonna--ray_of_light mp_889:van_halen--right_now 10 9

11 Snippet (Factor) Acceptor Need to recognize song parts, or snippets Make all states initial & final Drop output labels Determinize, minimize Recognizes all snippets ε:ε 0 But doesn t identify songs! mp_72:! mp_736:! mp_736:! 1 6 mp_240:! 3 mp_28:! mp_736 :! 7 ε:ε 2 4 mp_240:! mp_2: Beatles--Let_It_Be mp_349:! 8 mp_448:! 9 5 mp_20:madonna--ray_of_light mp_889:van_halen--right_now 10 9

12 Snippet (Factor) Acceptor Need to recognize song parts, or snippets Make all states initial & final mp_2 mp_20 ε:ε 0 Drop output labels Determinize, minimize Recognizes all snippets But doesn t identify songs! mp_72:! mp_736:! mp_736:! 1 6 mp_240:! 3 mp_28:! mp_736 :! 7 ε:ε 2 4 mp_240:! mp_2: Beatles--Let_It_Be mp_349:! 8 mp_448:! mp_72 mp_736 4 mp_20:madonna--ray_of_light 2 mp_240 mp_736 mp_240 mp_240 7 mp_889:van_halen--right_now 5 mp_240 mp_2 3 6 mp_2 mp_20 mp_

13 Weighted Factor Acceptor [ICASSP 07] Use numerical song id s as weights on transitions Automata operations preserve total weight along a given path [Mohri 97] 0 mp_72/0 mp_736/1 4/0 2/0 mp_240/0 mp_736/0 mp_2/0 mp_20/1 mp_240/0 mp_240/0 7/0 5/0 mp_240/0 mp_2/0 3/0 6/0 mp_2/0 mp_20/1 mp_20/0 1/0 mp_72:! 1 mp_240:! 2 mp_2: Beatles--Let_It_Be 0 mp_736:! mp_736:! 6 3 mp_28:! mp_736 :! 7 4 mp_240:! mp_349:! 8 mp_448:! 9 5 mp_20:madonna--ray_of_light mp_889:van_halen--right_now 10 10

14 Final Transducer To construct transducer, turn weights into output labels After decoding, sum decoder outputs, get numeric song id Full-song transducer: 27.5M states, 27.6M transitions Final factor transducer: 32.7M states, 59.6M transitions Automaton recognizing any factor of song transcriptions only ~2x bigger than that of entire songs This is unexpected, considering there are 15,000 songs, 1,700 average phones per song: # possible factors = 15,000 1,

15 Experiments Database: 15,455 songs in MP3 format Average song duration: 3.9 minutes > 1,000 hours of audio Big test set: one 10-second snippet per song Test identification on clean in-set data Small test set: 1,762 in-set and 1,856 out-of-set snippets Test noise robustness and rejection of out-of-set songs 12

16 Results: Identification FS: Full song (best possible performance): 99.7% PS: Partial songs, 10-second snippets: 99.5% Test on a range of beam sizes in Viterbi search All tests faster than real-time (0.48 real-time for beam=12) Accuracy [ICASSP 07] Beam Size FS PS 13

17 Experiments: Detection Detection: distinguish in-set from out-of-set songs Test detection capability using SVM s Construct universal background model by clustering GMM components across all phones SVM features: log-likelihood of best path with in-set acoustic model, background model, and their difference Radial basis function kernel with a sweep over the parameter space ( C and γ ) 14

18 Noise, Distortions [ISMIR 07] Noise condition: additive white noise (harsh environment) Add noise at different mixing levels Speed-up and slow-down of audio (no pitch shifting) Different rate multipliers MP3 encode/decode Different bitrates 15

19 Results: Noise, Distortions [ICASSP 07, ISMIR 07] Condition Identification Accuracy Detection Accuracy Clean 99.4% 96.9% White SNR 98.5% 96.8% White SNR 85.5% 94.5% White SNR 39.0% 93.2% White SNR 11.1% 93.5% Speed up by 2% 96.0% 96.0% Slow down by 2% 96.4% 96.4% Speed up by 10% 43.2% 87.7% Slow down by 10% 45.7% 85.8% MP3 re-encode 64kbps 98.1% 96.6% MP3 re-encode 32kbps 95.5% 95.3% 16

20 Summary So Far Phone set for music ID can be learned automatically Match audio without relying on direct match between feature values -- should be robust to signal variation Acoustic modeling techniques applicable to speech, etc. We formulate music ID as a search problem Use well-established techniques from speech and text processing (FSTs, GMMs) to make effective system FST framework allows efficient matching of song snippets Compact factor transducer can be constructed 17

21 String Matching in Music ID [CIAA 07] Automata allow us to solve string matching problem But will our approach generalize to larger data sets? We thus address a theoretical question What is the size of the smallest deterministic automaton accepting the factors of a set of strings U? For efficiency, Ucan be represented with an automaton A Or, set of strings may be given directly as an automaton More general question: What is the size of the factor automaton of A? 18

22 Past Work Factor automaton of a string x has at most 2 x 2 states, and 3 x 4 transitions [Crochemore 85; Blumer et al. 86] Can be constructed by a linear-time online algorithm Size bounds for a set of strings U has also previously been studied [Blumer et al. 87] If U is the sum of the lengths of all the strings in U Factor automaton of U has at most 2 U 1 states and 3 U 3 transitions We prove a substantially better bound here 19

23 Suffix Automaton We start out with an automaton A recognizing strings in Let S(A) and F (A) be the deterministic minimal automata recognizing the suffixes and factors of A, respectively To construct S(A) make each state of A initial (by adding epsilons), determinize, minimize To construct F (A) make each state of S(A) final, minimize Consequence: F (A) S(A) a 0 1 c 2 a b 3 4 b a 5 20 U

24 Suffix Automaton We start out with an automaton A recognizing strings in Let S(A) and F (A) be the deterministic minimal automata recognizing the suffixes and factors of A, respectively To construct S(A) make each state of A initial (by adding epsilons), determinize, minimize To construct F (A) make each state of S(A) final, minimize Consequence: F (A) S(A) ε ε ε a 3 b a c b a 5 4 ε U ε 20

25 Suffix Automaton We start out with an automaton A recognizing strings in Let S(A) and F (A) be the deterministic minimal automata recognizing the suffixes and factors of A, respectively To construct S(A) make each state of A initial (by adding epsilons), determinize, minimize To construct F (A) make each state of S(A) final, minimize b Consequence: F (A) S(A) ε ε ε a 3 a c b 4 ε ε 1 a b c a 5 0 b 20 c b 3 a a 2 6 a b 4 5 U

26 Suffix Automaton We start out with an automaton A recognizing strings in Let S(A) and F (A) be the deterministic minimal automata recognizing the suffixes and factors of A, respectively To construct S(A) make each state of A initial (by adding epsilons), determinize, minimize To construct F (A) make each state of S(A) final, minimize b Consequence: F (A) S(A) ε ε ε a 3 a c b 4 ε ε 1 a b c a 5 0 b 20 c b 3 a a 2 6 a b 4 5 U

27 Size Bound: Strategy Goal: a bound on F (A) in terms of A Work on bounding S(A) consider suffixes only for now Idea: each state in S(A) accepts a distinct set of suffixes, so count the number of possible sets of suffixes The suffix sets can be arranged in a hierarchy, which is directly related in size to A Motivated by similar arguments for single-string case in [Blumer et al. 86]; string sets in [Blumer et al. 87] 21

28 Suffix Sets Automaton A is k-suffix unique if no two strings accepted by Ashare the same k-length suffix. Suffix-unique if k = 1 Define end-set(x) : set of states in A reachable after reading e.g., end-set(ac) = {2, 3, 4, 5} x y denotes end-set(x) = end-set(y) This is a right-invariant equivalence relation [x] is the equivalence class of x a 0 1 c 2 22 a b 3 4 b a 5 x

29 Notation N str is number of strings accepted bya If q is a state of S(A), suff(q) is set of suffixes accepted from e.g., suff(3) = {ab, ba} N(q) is the set of states in Afrom which a non-empty string in suff(q) can be read to reach a final state A e.g., a 0 1 N(3) = {2, 1} c 2 b a b 3 4 b a 5 23 b a 0 1 c b 2 S(A) c a b 6 4 b 3 a 5 a q

30 Suffix Set Inclusion

31 ć Suffix Set Inclusion Lemma: Let Abe a suffix-unique A automaton be a suffix-unique and let be two states of S(A) such that N(q) N(q ),, then suff(q) suff(q ) and N(q) N(q ) ć suff(q ) suff(q) and N(q ) N(q) ć or and q q

32 ć Suffix Set Inclusion Lemma: Let Abe a suffix-unique A automaton be a suffix-unique and let be two states of S(A) such that N(q) N(q ),, then suff(q) suff(q ) and N(q) N(q ) ć suff(q ) suff(q) and N(q ) N(q) ć and q q Proof: Let paths in S(A) to q and q be labeled with u and u. or u q S(A) u q

33 ć ą ć Suffix Set Inclusion Lemma: Let Abe a suffix-unique A automaton be a suffix-unique and let be two states of S(A) such that N(q) N(q ),, then suff(q) suff(q ) and N(q) N(q ) ć suff(q ) suff(q) and N(q ) N(q) ć and q q Proof: Let paths in S(A) to q and q be labeled with u and u. Thus A must have a state or p N(q) N(q ) ( ) such that bot A u u p u u q q S(A)

34 ć ą ć Suffix Set Inclusion Lemma: Let Abe a suffix-unique A automaton be a suffix-unique and let be two states of S(A) such that N(q) N(q ),, then suff(q) suff(q ) and N(q) N(q ) ć suff(q ) suff(q) and N(q ) N(q) ć and q q Proof: Let paths in S(A) to q and q be labeled with u and u. Thus A must have a state p N(q) N(q ) ( ) such that bot Thus, exist paths v suff(q) and v suff(q ) from p to final A u p or S(A) v u q v u v u q v

35 A Suffix Set Inclusion u u p v v Since A is suffix-unique, any string accepted by A and ending in v, must also end in uv Thus, any path from initial to p must end in By same reasoning, it must also end in u Hence, uis a suffix of u, or vice versa Assume the former, then suff(q ) suff(q), thus ain similarly QED. u the ot 25 u u u q q v v u v S(A) string, if N(q ) N(q) statement of t x

36 Suffix-unique Bound Theorem: If A is a suffix-unique deterministic and minimal automaton, then the number of states of S(A) is bounded as S(A) Q 2 A Q 3. [CIAA 07] Proof (sketch): Lemma: For any two states of the suffix automaton, either suffix sets are disjoint, or one includes the other We can show that each state q of S(A) corresponds to a distinct equivalence class [x], count these to get bound The equivalence sets induce a suffix sets hierarchy which we will analyze 26

37 Suffix Sets: Non-branching Suffix sets either disjoint or inclusive: hierarchy Count branching, non-branching nodes separately Exclude super-final state F with no outgoing transitions Let q be a state in S(A) with equivalence class [x], x longest The only way to have a branching node is if there exist factors ax, bx(a b) (since is a right-equivalence relation) So q is only non-branching when x is a prefix or suffix Empty prefix ɛ not included in non-degenerate cases s accepted by, then, Total non-branching nodes N nb A Q 2 + N str

38 Suffix Sets: Branching i r [ɛ] roo [a 1 ] [a 2 ]... [a Nstr ]... [a Nstr +k] If are the distinct final symbols of each i string r accepted by then each is a child of the root [ɛ] a 1,..., a Nstr A [a i ] Let tree rooted at [a i ] have n ai leaves( n ai 1branching nodes) Total number of leaves is A Q 2 (not initial and super-final) Total branching Total size of tree Add super-final state, get roo N b N str +k i=1 (n ai 1) + 1 A Q 2 N str N nb + N b 2 A Q 4 S(A) Q 2 A Q 3. QED.

39 Final Size Result If A is a deterministic minimal automaton representing a set of strings U then S(U) Q 2 A Q 2. F (U) Q 2 A Q 2 S(U) E 3 A E 4 F (U) E 3 A E 4 S(U) Q 2 U 1 F (U) E 3 U 3 Substantial improvement over previous: When A is k-suffix unique accepting n strings and A k is the part of A after removing all suffixes of length k S(A) Q 2 A k Q + 2kn 3, F (A) Q 2 A k Q + 2kn 3. he S(A) automaton E 2 Aof k E + obtained 3kn 3k b 1 F (A) E 2 A k E + 3kn 3k 1 Proof idea: add terminal symbols to make string set suffixunique, construct suffix automaton, remove symbols 29

40 Music ID Experiments [CIAA 07, ISMIR 07] In our music ID application, we have Factor automaton size scales linearly with # of songs F (A) E 2.1 A E 6e+07 5e+07 # States factor # Arcs factor # States/Arcs Non-factor 4e+07 Size 3e+07 2e+07 1e # Songs

41 Music ID Experiments For 15,000+ songs, transcription set is 45-suffix unique Number of collisions among song suffixes/factors drops off rapidly with increasing length Non-unique songs k (suffix length) Non-unique Factors Factor Length 31

42 Automata Summary We have addressed the size of a factor automaton of a set of strings, or more generally of another automaton We have proven substantially better size bounds This suggests factor automata are useful for indexing potentially very large sets of strings Our conclusions are verified experimentally in our music identification system 32

43 Future/Ongoing Work More experiments: test accuracy in presence of different kinds of noise, distortions Analyze song structure Find repeated phone sequences: chorus detection, etc. Find common sequences between songs Work on an on-line linear time algorithm for suffix/factor automaton construction Do a finer theoretical analysis Get rid of the kn term in the k-suffix unique bound 33

44 References E. Weinstein and P. Moreno. Music Identification with Weighted Finite-State Transducers. In International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Honolulu, Hawaii, M. Mohri, P. Moreno, and E. Weinstein. Factor Automata of Automata and Applications. To appear at the International Conference on Implementation and Application of Automata (CIAA), July 2007, Prague, Czech Republic. M. Mohri, P. Moreno, and E. Weinstein. Music identification, detection, and analysis in adverse conditions. To appear at the International Conference on Music Information Retrieval (ISMIR), September 2007, Vienna, Austria. M. Bacchiani and M. Ostendorf. Joint lexicon, acoustic unit inventory and model design. Speech Communication, 29:99 114, November E. Batlle, J. Masip, and E. Guaus. Automatic song identification in noisy broadcast audio. In IASTED International Conference on Signal and Image Processing, Kauai, Hawaii, A. Blumer, J. Blumer, A. Ehrenfeucht, D. Haussler, and R. McConnell. Complete inverted files for efficient text retrieval and analysis. Journal of the ACM, 34: , A. Blumer, J. Blumer, D. Haussler, A. Ehrenfeucht, M.T. Chen, and J. Seiferas. The smallest automaton recognizing the subwords of a text. Theoretical Computer Science, 40:31 55, M. Crochemore. Transducers and repetitions. Theoretical Computer Science, 45(1):63 86, M. Fink, M. Covell, and S. Baluja. Social and interactive television application based on real time ambient audio identification. EuroITV 2006, May J. Haitsma, T. Kalker, and J. Oostveen. Robust audio hashing for content identification. In Content-Based Multimedia Indexing (CBMI), Brescia, Italy, September M. Mohri. Finite-state transducers in language and speech processing. Computational Linguistics, 23(2): , M. Mohri. Statistical Natural Language Processing. In M. Lothaire, editor, Applied Combinatorics on Words. Cambridge University Press, M. Mohri, F. C. N. Pereira, and M. Riley. Weighted Finite-State Transducers in Speech Recognition. Computer Speech and Language, 16(1): 69 88,

45 The End Thank You! 35

AUTOMATIC identification of music has been the subject. Efficient and Robust Music Identification with Weighted Finite-State Transducers

AUTOMATIC identification of music has been the subject. Efficient and Robust Music Identification with Weighted Finite-State Transducers IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. X, NO. Y, JANUARY 28 1 Efficient and Robust Music Identification with Weighted Finite-State Transducers Mehryar Mohri, Pedro Moreno, and

More information

SONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS

SONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS SONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS AKSHAY CHANDRASHEKARAN ANOOP RAMAKRISHNA akshayc@cmu.edu anoopr@andrew.cmu.edu ABHISHEK JAIN GE YANG ajain2@andrew.cmu.edu younger@cmu.edu NIDHI KOHLI R

More information

A SCALABLE AUDIO FINGERPRINT METHOD WITH ROBUSTNESS TO PITCH-SHIFTING

A SCALABLE AUDIO FINGERPRINT METHOD WITH ROBUSTNESS TO PITCH-SHIFTING 12th International Society for Music Information Retrieval Conference (ISMIR 2011) A SCALABLE AUDIO FINGERPRINT METHOD WITH ROBUSTNESS TO PITCH-SHIFTING Sébastien Fenet, Gaël Richard, Yves Grenier Institut

More information

Audio Fingerprinting using Fractional Fourier Transform

Audio Fingerprinting using Fractional Fourier Transform Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,

More information

Audio Imputation Using the Non-negative Hidden Markov Model

Audio Imputation Using the Non-negative Hidden Markov Model Audio Imputation Using the Non-negative Hidden Markov Model Jinyu Han 1,, Gautham J. Mysore 2, and Bryan Pardo 1 1 EECS Department, Northwestern University 2 Advanced Technology Labs, Adobe Systems Inc.

More information

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG

More information

A Correlation-Maximization Denoising Filter Used as An Enhancement Frontend for Noise Robust Bird Call Classification

A Correlation-Maximization Denoising Filter Used as An Enhancement Frontend for Noise Robust Bird Call Classification A Correlation-Maximization Denoising Filter Used as An Enhancement Frontend for Noise Robust Bird Call Classification Wei Chu and Abeer Alwan Speech Processing and Auditory Perception Laboratory Department

More information

Some algorithmic and combinatorial problems on permutation classes

Some algorithmic and combinatorial problems on permutation classes Some algorithmic and combinatorial problems on permutation classes The point of view of decomposition trees PhD Defense, 2009 December the 4th Outline 1 Objects studied : Permutations, Patterns and Classes

More information

Forward and backward DAWG matching. Slobodan Petrović

Forward and backward DAWG matching. Slobodan Petrović Forward and backward DAWG matching Slobodan Petrović 08.10.2013 Contents Introduction Forward DAWG matching (FDM) Backward DAWG matching (BDM) 2/29 Introduction A DAWG (Directed Acyclic Word Graph) representation

More information

Mikko Myllymäki and Tuomas Virtanen

Mikko Myllymäki and Tuomas Virtanen NON-STATIONARY NOISE MODEL COMPENSATION IN VOICE ACTIVITY DETECTION Mikko Myllymäki and Tuomas Virtanen Department of Signal Processing, Tampere University of Technology Korkeakoulunkatu 1, 3370, Tampere,

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

From Wireless Network Coding to Matroids. Rico Zenklusen

From Wireless Network Coding to Matroids. Rico Zenklusen From Wireless Network Coding to Matroids Rico Zenklusen A sketch of my research areas/interests Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications

More information

Outline. Communications Engineering 1

Outline. Communications Engineering 1 Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal

More information

Module 3 Greedy Strategy

Module 3 Greedy Strategy Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main

More information

of the hypothesis, but it would not lead to a proof. P 1

of the hypothesis, but it would not lead to a proof. P 1 Church-Turing thesis The intuitive notion of an effective procedure or algorithm has been mentioned several times. Today the Turing machine has become the accepted formalization of an algorithm. Clearly

More information

Calibration of Microphone Arrays for Improved Speech Recognition

Calibration of Microphone Arrays for Improved Speech Recognition MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Calibration of Microphone Arrays for Improved Speech Recognition Michael L. Seltzer, Bhiksha Raj TR-2001-43 December 2001 Abstract We present

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Sound Recognition. ~ CSE 352 Team 3 ~ Jason Park Evan Glover. Kevin Lui Aman Rawat. Prof. Anita Wasilewska

Sound Recognition. ~ CSE 352 Team 3 ~ Jason Park Evan Glover. Kevin Lui Aman Rawat. Prof. Anita Wasilewska Sound Recognition ~ CSE 352 Team 3 ~ Jason Park Evan Glover Kevin Lui Aman Rawat Prof. Anita Wasilewska What is Sound? Sound is a vibration that propagates as a typically audible mechanical wave of pressure

More information

Topics to be covered

Topics to be covered Basic Counting 1 Topics to be covered Sum rule, product rule, generalized product rule Permutations, combinations Binomial coefficients, combinatorial proof Inclusion-exclusion principle Pigeon Hole Principle

More information

DVA325 Formal Languages, Automata and Models of Computation (FABER)

DVA325 Formal Languages, Automata and Models of Computation (FABER) DVA325 Formal Languages, Automata and Models of Computation (FABER) Lecture 1 - Introduction School of Innovation, Design and Engineering Mälardalen University 11 November 2014 Abu Naser Masud FABER November

More information

Applications of Music Processing

Applications of Music Processing Lecture Music Processing Applications of Music Processing Christian Dittmar International Audio Laboratories Erlangen christian.dittmar@audiolabs-erlangen.de Singing Voice Detection Important pre-requisite

More information

Combinatorics and Intuitive Probability

Combinatorics and Intuitive Probability Chapter Combinatorics and Intuitive Probability The simplest probabilistic scenario is perhaps one where the set of possible outcomes is finite and these outcomes are all equally likely. A subset of the

More information

(i) Understanding the basic concepts of signal modeling, correlation, maximum likelihood estimation, least squares and iterative numerical methods

(i) Understanding the basic concepts of signal modeling, correlation, maximum likelihood estimation, least squares and iterative numerical methods Tools and Applications Chapter Intended Learning Outcomes: (i) Understanding the basic concepts of signal modeling, correlation, maximum likelihood estimation, least squares and iterative numerical methods

More information

The tenure game. The tenure game. Winning strategies for the tenure game. Winning condition for the tenure game

The tenure game. The tenure game. Winning strategies for the tenure game. Winning condition for the tenure game The tenure game The tenure game is played by two players Alice and Bob. Initially, finitely many tokens are placed at positions that are nonzero natural numbers. Then Alice and Bob alternate in their moves

More information

PROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif

PROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif PROJECT 5: DESIGNING A VOICE MODEM Instructor: Amir Asif CSE4214: Digital Communications (Fall 2012) Computer Science and Engineering, York University 1. PURPOSE In this laboratory project, you will design

More information

Patterns and random permutations II

Patterns and random permutations II Patterns and random permutations II Valentin Féray (joint work with F. Bassino, M. Bouvel, L. Gerin, M. Maazoun and A. Pierrot) Institut für Mathematik, Universität Zürich Summer school in Villa Volpi,

More information

Pin-Permutations and Structure in Permutation Classes

Pin-Permutations and Structure in Permutation Classes and Structure in Permutation Classes Frédérique Bassino Dominique Rossin Journées de Combinatoire de Bordeaux, feb. 2009 liafa Main result of the talk Conjecture[Brignall, Ruškuc, Vatter]: The pin-permutation

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 11

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 11 EECS 70 Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 11 Counting As we saw in our discussion for uniform discrete probability, being able to count the number of elements of

More information

Using RASTA in task independent TANDEM feature extraction

Using RASTA in task independent TANDEM feature extraction R E S E A R C H R E P O R T I D I A P Using RASTA in task independent TANDEM feature extraction Guillermo Aradilla a John Dines a Sunil Sivadas a b IDIAP RR 04-22 April 2004 D a l l e M o l l e I n s t

More information

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Available online at www.interscience.in Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Sishir Kalita, Parismita Gogoi & Kandarpa Kumar Sarma Department of Electronics

More information

Audio Similarity. Mark Zadel MUMT 611 March 8, Audio Similarity p.1/23

Audio Similarity. Mark Zadel MUMT 611 March 8, Audio Similarity p.1/23 Audio Similarity Mark Zadel MUMT 611 March 8, 2004 Audio Similarity p.1/23 Overview MFCCs Foote Content-Based Retrieval of Music and Audio (1997) Logan, Salomon A Music Similarity Function Based On Signal

More information

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro

More information

Discrete Mathematics and Probability Theory Spring 2018 Ayazifar and Rao Midterm 2 Solutions

Discrete Mathematics and Probability Theory Spring 2018 Ayazifar and Rao Midterm 2 Solutions CS 70 Discrete Mathematics and Probability Theory Spring 2018 Ayazifar and Rao Midterm 2 Solutions PRINT Your Name: Oski Bear SIGN Your Name: OS K I PRINT Your Student ID: CIRCLE your exam room: Pimentel

More information

Nonuniform multi level crossing for signal reconstruction

Nonuniform multi level crossing for signal reconstruction 6 Nonuniform multi level crossing for signal reconstruction 6.1 Introduction In recent years, there has been considerable interest in level crossing algorithms for sampling continuous time signals. Driven

More information

Universiteit Leiden Opleiding Informatica

Universiteit Leiden Opleiding Informatica Universiteit Leiden Opleiding Informatica An Analysis of Dominion Name: Roelof van der Heijden Date: 29/08/2014 Supervisors: Dr. W.A. Kosters (LIACS), Dr. F.M. Spieksma (MI) BACHELOR THESIS Leiden Institute

More information

Lossy Compression of Permutations

Lossy Compression of Permutations 204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin

More information

High-speed Noise Cancellation with Microphone Array

High-speed Noise Cancellation with Microphone Array Noise Cancellation a Posteriori Probability, Maximum Criteria Independent Component Analysis High-speed Noise Cancellation with Microphone Array We propose the use of a microphone array based on independent

More information

DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS

DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS John Yong Jia Chen (Department of Electrical Engineering, San José State University, San José, California,

More information

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization. 3798 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels Yue Zhao, Member, IEEE, Chee Wei Tan, Member,

More information

Blind Source Separation for a Robust Audio Recognition Scheme in Multiple Sound-Sources Environment

Blind Source Separation for a Robust Audio Recognition Scheme in Multiple Sound-Sources Environment International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 25) Blind Source Separation for a Robust Audio Recognition in Multiple Sound-Sources Environment Wei Han,2,3,

More information

Search then involves moving from state-to-state in the problem space to find a goal (or to terminate without finding a goal).

Search then involves moving from state-to-state in the problem space to find a goal (or to terminate without finding a goal). Search Can often solve a problem using search. Two requirements to use search: Goal Formulation. Need goals to limit search and allow termination. Problem formulation. Compact representation of problem

More information

Physical Layer: Outline

Physical Layer: Outline 18-345: Introduction to Telecommunication Networks Lectures 3: Physical Layer Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Physical Layer: Outline Digital networking Modulation Characterization

More information

Lecture 2. 1 Nondeterministic Communication Complexity

Lecture 2. 1 Nondeterministic Communication Complexity Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols

More information

An Energy-Division Multiple Access Scheme

An Energy-Division Multiple Access Scheme An Energy-Division Multiple Access Scheme P Salvo Rossi DIS, Università di Napoli Federico II Napoli, Italy salvoros@uninait D Mattera DIET, Università di Napoli Federico II Napoli, Italy mattera@uninait

More information

Notes for Recitation 3

Notes for Recitation 3 6.042/18.062J Mathematics for Computer Science September 17, 2010 Tom Leighton, Marten van Dijk Notes for Recitation 3 1 State Machines Recall from Lecture 3 (9/16) that an invariant is a property of a

More information

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Parallel to AIMA 8., 8., 8.6.3, 8.9 The Automatic Classification Problem Assign object/event or sequence of objects/events

More information

6.450: Principles of Digital Communication 1

6.450: Principles of Digital Communication 1 6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of

More information

Electric Guitar Pickups Recognition

Electric Guitar Pickups Recognition Electric Guitar Pickups Recognition Warren Jonhow Lee warrenjo@stanford.edu Yi-Chun Chen yichunc@stanford.edu Abstract Electric guitar pickups convert vibration of strings to eletric signals and thus direcly

More information

CITS2211 Discrete Structures Turing Machines

CITS2211 Discrete Structures Turing Machines CITS2211 Discrete Structures Turing Machines October 23, 2017 Highlights We have seen that FSMs and PDAs are surprisingly powerful But there are some languages they can not recognise We will study a new

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Design of Parallel Algorithms. Communication Algorithms

Design of Parallel Algorithms. Communication Algorithms + Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter

More information

PUZZLES ON GRAPHS: THE TOWERS OF HANOI, THE SPIN-OUT PUZZLE, AND THE COMBINATION PUZZLE

PUZZLES ON GRAPHS: THE TOWERS OF HANOI, THE SPIN-OUT PUZZLE, AND THE COMBINATION PUZZLE PUZZLES ON GRAPHS: THE TOWERS OF HANOI, THE SPIN-OUT PUZZLE, AND THE COMBINATION PUZZLE LINDSAY BAUN AND SONIA CHAUHAN ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. The Towers of Hanoi is a well

More information

Midterm for Name: Good luck! Midterm page 1 of 9

Midterm for Name: Good luck! Midterm page 1 of 9 Midterm for 6.864 Name: 40 30 30 30 Good luck! 6.864 Midterm page 1 of 9 Part #1 10% We define a PCFG where the non-terminals are {S, NP, V P, V t, NN, P P, IN}, the terminal symbols are {Mary,ran,home,with,John},

More information

Communications Theory and Engineering

Communications Theory and Engineering Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 Channel Coding The channel encoder Source bits Channel encoder Coded bits Pulse

More information

Acknowledged Broadcasting and Gossiping in ad hoc radio networks

Acknowledged Broadcasting and Gossiping in ad hoc radio networks Acknowledged Broadcasting and Gossiping in ad hoc radio networks Jiro Uchida 1, Wei Chen 2, and Koichi Wada 3 1,3 Nagoya Institute of Technology Gokiso-cho, Syowa-ku, Nagoya, 466-8555, Japan, 1 jiro@phaser.elcom.nitech.ac.jp,

More information

Asymptotic behaviour of permutations avoiding generalized patterns

Asymptotic behaviour of permutations avoiding generalized patterns Asymptotic behaviour of permutations avoiding generalized patterns Ashok Rajaraman 311176 arajaram@sfu.ca February 19, 1 Abstract Visualizing permutations as labelled trees allows us to to specify restricted

More information

Mel Spectrum Analysis of Speech Recognition using Single Microphone

Mel Spectrum Analysis of Speech Recognition using Single Microphone International Journal of Engineering Research in Electronics and Communication Mel Spectrum Analysis of Speech Recognition using Single Microphone [1] Lakshmi S.A, [2] Cholavendan M [1] PG Scholar, Sree

More information

Improving Meetings with Microphone Array Algorithms. Ivan Tashev Microsoft Research

Improving Meetings with Microphone Array Algorithms. Ivan Tashev Microsoft Research Improving Meetings with Microphone Array Algorithms Ivan Tashev Microsoft Research Why microphone arrays? They ensure better sound quality: less noises and reverberation Provide speaker position using

More information

A Cryptosystem Based on the Composition of Reversible Cellular Automata

A Cryptosystem Based on the Composition of Reversible Cellular Automata A Cryptosystem Based on the Composition of Reversible Cellular Automata Adam Clarridge and Kai Salomaa Technical Report No. 2008-549 Queen s University, Kingston, Canada {adam, ksalomaa}@cs.queensu.ca

More information

6. FUNDAMENTALS OF CHANNEL CODER

6. FUNDAMENTALS OF CHANNEL CODER 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on

More information

Princeton ELE 201, Spring 2014 Laboratory No. 2 Shazam

Princeton ELE 201, Spring 2014 Laboratory No. 2 Shazam Princeton ELE 201, Spring 2014 Laboratory No. 2 Shazam 1 Background In this lab we will begin to code a Shazam-like program to identify a short clip of music using a database of songs. The basic procedure

More information

Permutation Tableaux and the Dashed Permutation Pattern 32 1

Permutation Tableaux and the Dashed Permutation Pattern 32 1 Permutation Tableaux and the Dashed Permutation Pattern William Y.C. Chen, Lewis H. Liu, Center for Combinatorics, LPMC-TJKLC Nankai University, Tianjin 7, P.R. China chen@nankai.edu.cn, lewis@cfc.nankai.edu.cn

More information

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees.

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees. 7 Symmetries 7 Permutations A permutation of a set is a reordering of its elements Another way to look at it is as a function Φ that takes as its argument a set of natural numbers of the form {, 2,, n}

More information

Microphone Array Design and Beamforming

Microphone Array Design and Beamforming Microphone Array Design and Beamforming Heinrich Löllmann Multimedia Communications and Signal Processing heinrich.loellmann@fau.de with contributions from Vladi Tourbabin and Hendrik Barfuss EUSIPCO Tutorial

More information

Tiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane

Tiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane Tiling Problems This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane The undecidable problems we saw at the start of our unit

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

Multiplayer Pushdown Games. Anil Seth IIT Kanpur

Multiplayer Pushdown Games. Anil Seth IIT Kanpur Multiplayer Pushdown Games Anil Seth IIT Kanpur Multiplayer Games we Consider These games are played on graphs (finite or infinite) Generalize two player infinite games. Any number of players are allowed.

More information

Voice Activity Detection

Voice Activity Detection Voice Activity Detection Speech Processing Tom Bäckström Aalto University October 2015 Introduction Voice activity detection (VAD) (or speech activity detection, or speech detection) refers to a class

More information

COUNTING AND PROBABILITY

COUNTING AND PROBABILITY CHAPTER 9 COUNTING AND PROBABILITY Copyright Cengage Learning. All rights reserved. SECTION 9.2 Possibility Trees and the Multiplication Rule Copyright Cengage Learning. All rights reserved. Possibility

More information

An Approach to Very Low Bit Rate Speech Coding

An Approach to Very Low Bit Rate Speech Coding Computing For Nation Development, February 26 27, 2009 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi An Approach to Very Low Bit Rate Speech Coding Hari Kumar Singh

More information

Avoiding consecutive patterns in permutations

Avoiding consecutive patterns in permutations Avoiding consecutive patterns in permutations R. E. L. Aldred M. D. Atkinson D. J. McCaughan January 3, 2009 Abstract The number of permutations that do not contain, as a factor (subword), a given set

More information

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow

More information

COMBINED TRELLIS CODED QUANTIZATION/CONTINUOUS PHASE MODULATION (TCQ/TCCPM)

COMBINED TRELLIS CODED QUANTIZATION/CONTINUOUS PHASE MODULATION (TCQ/TCCPM) COMBINED TRELLIS CODED QUANTIZATION/CONTINUOUS PHASE MODULATION (TCQ/TCCPM) Niyazi ODABASIOGLU 1, OnurOSMAN 2, Osman Nuri UCAN 3 Abstract In this paper, we applied Continuous Phase Frequency Shift Keying

More information

Automatic Transcription of Monophonic Audio to MIDI

Automatic Transcription of Monophonic Audio to MIDI Automatic Transcription of Monophonic Audio to MIDI Jiří Vass 1 and Hadas Ofir 2 1 Czech Technical University in Prague, Faculty of Electrical Engineering Department of Measurement vassj@fel.cvut.cz 2

More information

On uniquely k-determined permutations

On uniquely k-determined permutations On uniquely k-determined permutations Sergey Avgustinovich and Sergey Kitaev 16th March 2007 Abstract Motivated by a new point of view to study occurrences of consecutive patterns in permutations, we introduce

More information

Chapter 3 Convolutional Codes and Trellis Coded Modulation

Chapter 3 Convolutional Codes and Trellis Coded Modulation Chapter 3 Convolutional Codes and Trellis Coded Modulation 3. Encoder Structure and Trellis Representation 3. Systematic Convolutional Codes 3.3 Viterbi Decoding Algorithm 3.4 BCJR Decoding Algorithm 3.5

More information

NOTICE WARNING CONCERNING COPYRIGHT RESTRICTIONS: The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or

NOTICE WARNING CONCERNING COPYRIGHT RESTRICTIONS: The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or NOTICE WARNING CONCERNING COPYRIGHT RESTRICTIONS: The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. Any copying

More information

Automatic Morse Code Recognition Under Low SNR

Automatic Morse Code Recognition Under Low SNR 2nd International Conference on Mechanical, Electronic, Control and Automation Engineering (MECAE 2018) Automatic Morse Code Recognition Under Low SNR Xianyu Wanga, Qi Zhaob, Cheng Mac, * and Jianping

More information

Blind Blur Estimation Using Low Rank Approximation of Cepstrum

Blind Blur Estimation Using Low Rank Approximation of Cepstrum Blind Blur Estimation Using Low Rank Approximation of Cepstrum Adeel A. Bhutta and Hassan Foroosh School of Electrical Engineering and Computer Science, University of Central Florida, 4 Central Florida

More information

Department of Electronic Engineering FINAL YEAR PROJECT REPORT

Department of Electronic Engineering FINAL YEAR PROJECT REPORT Department of Electronic Engineering FINAL YEAR PROJECT REPORT BEngECE-2009/10-- Student Name: CHEUNG Yik Juen Student ID: Supervisor: Prof.

More information

Permutation Groups. Definition and Notation

Permutation Groups. Definition and Notation 5 Permutation Groups Wigner s discovery about the electron permutation group was just the beginning. He and others found many similar applications and nowadays group theoretical methods especially those

More information

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010 Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)

More information

Game Theory and Algorithms Lecture 19: Nim & Impartial Combinatorial Games

Game Theory and Algorithms Lecture 19: Nim & Impartial Combinatorial Games Game Theory and Algorithms Lecture 19: Nim & Impartial Combinatorial Games May 17, 2011 Summary: We give a winning strategy for the counter-taking game called Nim; surprisingly, it involves computations

More information

Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing

Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing 16.548 Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing Outline! Introduction " Pushing the Bounds on Channel Capacity " Theory of Iterative Decoding " Recursive Convolutional Coding

More information

Automatic Text-Independent. Speaker. Recognition Approaches Using Binaural Inputs

Automatic Text-Independent. Speaker. Recognition Approaches Using Binaural Inputs Automatic Text-Independent Speaker Recognition Approaches Using Binaural Inputs Karim Youssef, Sylvain Argentieri and Jean-Luc Zarader 1 Outline Automatic speaker recognition: introduction Designed systems

More information

Advanced Automata Theory 4 Games

Advanced Automata Theory 4 Games Advanced Automata Theory 4 Games Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory 4 Games p. 1 Repetition

More information

An Optimization of Audio Classification and Segmentation using GASOM Algorithm

An Optimization of Audio Classification and Segmentation using GASOM Algorithm An Optimization of Audio Classification and Segmentation using GASOM Algorithm Dabbabi Karim, Cherif Adnen Research Unity of Processing and Analysis of Electrical and Energetic Systems Faculty of Sciences

More information

Chapter 2 Channel Equalization

Chapter 2 Channel Equalization Chapter 2 Channel Equalization 2.1 Introduction In wireless communication systems signal experiences distortion due to fading [17]. As signal propagates, it follows multiple paths between transmitter and

More information

II Year (04 Semester) EE6403 Discrete Time Systems and Signal Processing

II Year (04 Semester) EE6403 Discrete Time Systems and Signal Processing Class Subject Code Subject II Year (04 Semester) EE6403 Discrete Time Systems and Signal Processing 1.CONTENT LIST: Introduction to Unit I - Signals and Systems 2. SKILLS ADDRESSED: Listening 3. OBJECTIVE

More information

UNEQUAL POWER ALLOCATION FOR JPEG TRANSMISSION OVER MIMO SYSTEMS. Muhammad F. Sabir, Robert W. Heath Jr. and Alan C. Bovik

UNEQUAL POWER ALLOCATION FOR JPEG TRANSMISSION OVER MIMO SYSTEMS. Muhammad F. Sabir, Robert W. Heath Jr. and Alan C. Bovik UNEQUAL POWER ALLOCATION FOR JPEG TRANSMISSION OVER MIMO SYSTEMS Muhammad F. Sabir, Robert W. Heath Jr. and Alan C. Bovik Department of Electrical and Computer Engineering, The University of Texas at Austin,

More information

Empirical Rate-Distortion Study of Compressive Sensing-based Joint Source-Channel Coding

Empirical Rate-Distortion Study of Compressive Sensing-based Joint Source-Channel Coding Empirical -Distortion Study of Compressive Sensing-based Joint Source-Channel Coding Muriel L. Rambeloarison, Soheil Feizi, Georgios Angelopoulos, and Muriel Médard Research Laboratory of Electronics Massachusetts

More information

ROBUST F0 ESTIMATION IN NOISY SPEECH SIGNALS USING SHIFT AUTOCORRELATION. Frank Kurth, Alessia Cornaggia-Urrigshardt and Sebastian Urrigshardt

ROBUST F0 ESTIMATION IN NOISY SPEECH SIGNALS USING SHIFT AUTOCORRELATION. Frank Kurth, Alessia Cornaggia-Urrigshardt and Sebastian Urrigshardt 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) ROBUST F0 ESTIMATION IN NOISY SPEECH SIGNALS USING SHIFT AUTOCORRELATION Frank Kurth, Alessia Cornaggia-Urrigshardt

More information

Environmental Sound Recognition using MP-based Features

Environmental Sound Recognition using MP-based Features Environmental Sound Recognition using MP-based Features Selina Chu, Shri Narayanan *, and C.-C. Jay Kuo * Speech Analysis and Interpretation Lab Signal & Image Processing Institute Department of Computer

More information

EELE 6333: Wireless Commuications

EELE 6333: Wireless Commuications EELE 6333: Wireless Commuications Chapter # 4 : Capacity of Wireless Channels Spring, 2012/2013 EELE 6333: Wireless Commuications - Ch.4 Dr. Musbah Shaat 1 / 18 Outline 1 Capacity in AWGN 2 Capacity of

More information

A CONSTRUCTION OF COMPACT MFCC-TYPE FEATURES USING SHORT-TIME STATISTICS FOR APPLICATIONS IN AUDIO SEGMENTATION

A CONSTRUCTION OF COMPACT MFCC-TYPE FEATURES USING SHORT-TIME STATISTICS FOR APPLICATIONS IN AUDIO SEGMENTATION 17th European Signal Processing Conference (EUSIPCO 2009) Glasgow, Scotland, August 24-28, 2009 A CONSTRUCTION OF COMPACT MFCC-TYPE FEATURES USING SHORT-TIME STATISTICS FOR APPLICATIONS IN AUDIO SEGMENTATION

More information

Chapter 3: Alarm correlation

Chapter 3: Alarm correlation Chapter 3: Alarm correlation Algorithmic Methods of Data Mining, Fall 2005, Chapter 3: Alarm correlation 1 Part II. Episodes in sequences Chapter 3: Alarm correlation Chapter 4: Frequent episodes Chapter

More information

Constructions of Coverings of the Integers: Exploring an Erdős Problem

Constructions of Coverings of the Integers: Exploring an Erdős Problem Constructions of Coverings of the Integers: Exploring an Erdős Problem Kelly Bickel, Michael Firrisa, Juan Ortiz, and Kristen Pueschel August 20, 2008 Abstract In this paper, we study necessary conditions

More information

An Hybrid MLP-SVM Handwritten Digit Recognizer

An Hybrid MLP-SVM Handwritten Digit Recognizer An Hybrid MLP-SVM Handwritten Digit Recognizer A. Bellili ½ ¾ M. Gilloux ¾ P. Gallinari ½ ½ LIP6, Université Pierre et Marie Curie ¾ La Poste 4, Place Jussieu 10, rue de l Ile Mabon, BP 86334 75252 Paris

More information

Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm

Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm Presented to Dr. Tareq Al-Naffouri By Mohamed Samir Mazloum Omar Diaa Shawky Abstract Signaling schemes with memory

More information

Multiple Input Multiple Output (MIMO) Operation Principles

Multiple Input Multiple Output (MIMO) Operation Principles Afriyie Abraham Kwabena Multiple Input Multiple Output (MIMO) Operation Principles Helsinki Metropolia University of Applied Sciences Bachlor of Engineering Information Technology Thesis June 0 Abstract

More information