Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference papers

Discipline
Keyword
Publication Year

Articles 91 - 120 of 163

Full-Text Articles in Computer Engineering

Building A Database Of Political Speech Does Culture Matter In Charisma Annotations?, Andrew Hines, Ailbhe Cullen, Naomi Harte Jan 2014

Building A Database Of Political Speech Does Culture Matter In Charisma Annotations?, Andrew Hines, Ailbhe Cullen, Naomi Harte

Conference papers

For both individual politicians and political parties the in- ternet has become a vital tool for self-promotion and the distribution of ideas. The rise of streaming has enabled po- litical debates and speeches to reach global audiences. In this paper, we explore the nature of charisma in political speech, with a view to automatic detection. To this end, we have collected a new database of political speech from YouTube and other on-line resources. Annotation is per- formed both by native listeners, and Amazon Mechanical Turk (AMT) workers. Detailed analysis shows that both la- bel sets are equally reliable. The results …


Robustness And Prediction Accuracy Of Machine Learning For Objective Visual Quality Assessment, Andrew Hines, Paul Kendrick, Adriaan Barri, Manish Narwaria, Judith A. Redi Jan 2014

Robustness And Prediction Accuracy Of Machine Learning For Objective Visual Quality Assessment, Andrew Hines, Paul Kendrick, Adriaan Barri, Manish Narwaria, Judith A. Redi

Conference papers

Machine Learning (ML) is a powerful tool to support the development of objective visual quality assessment metrics, serving as a substitute model for the perceptual mechanisms acting in visual quality appreciation. Nevertheless, the reliability of ML-based techniques within objective quality assessment metrics is often questioned. In this study, the robustness of ML in supporting objective quality assessment is investigated, specifically when the feature set adopted for prediction is suboptimal. A Principal Component Regression based algorithm and a Feed Forward Neural Network are compared when pooling the Structural Similarity Index (SSIM) features perturbed with noise. The neural network adapts better with …


Perceived Audio Quality For Streaming Stereo Music, Andrew Hines, Eoin Gillen, Naomi Harte, Damien Kelly, Jan Skoglund, Anil Kokaram Jan 2014

Perceived Audio Quality For Streaming Stereo Music, Andrew Hines, Eoin Gillen, Naomi Harte, Damien Kelly, Jan Skoglund, Anil Kokaram

Conference papers

Users of audio-visual streaming services expect an ever increasing quality of experience. Channel bandwidth remains a bottleneck commonly addressed with lossy compression schemes for both the video and audio streams. Anecdotal evidence suggests a strongly perceived link between bit rate and quality. This paper presents three audio quality listening experiments using the ITU MUSHRA methodology to assess a number of audio codecs typically used by streaming services. They were assessed for a range of bit rates using three presentation modes: consumer and studio qual- ity headphones and loudspeakers. Our results indicate that with consumer quality headphones, listeners were not differentiating …


Clarification Dialogues For Perception-Based Errors In Situated Human-Computer Dialogues, Niels Schütte, John D. Kelleher, Brian Mac Namee Jan 2014

Clarification Dialogues For Perception-Based Errors In Situated Human-Computer Dialogues, Niels Schütte, John D. Kelleher, Brian Mac Namee

Conference papers

We present an experiment about situated human-computer interaction. Participants interacted with a simulated robot system to complete a series of tasks in a situated environment. Errors were introduced into the robot's perception to produce misunderstandings. We recorded the interactions and attempt to identify strategies the participants used to solve the arising problems.


Judging Emotion From Low-Pass Filtered Naturalistic Emotional Speech, John Snel, Charlie Cullen Sep 2013

Judging Emotion From Low-Pass Filtered Naturalistic Emotional Speech, John Snel, Charlie Cullen

Conference papers

In speech, low frequency regions play a significant role in paralinguistic communication such as the conveyance of emotion or mood. The extent to which lower frequencies signify or contribute to affective speech is still an area for investigation. To investigate paralinguistic cues, and remove interference from linguistic cues, researchers can low-pass filter the speech signal on the assumption that certain acoustic cues characterizing affect are still discernible. Low-pass filtering is a practical technique to investigate paralinguistic phenomena, and is used here to investigate the inference of naturalistic emotional speech. This paper investigates how listeners perceive the level of Activation, and …


Exploring Spatial Business Data: A Roa Based Ecampus Application, Thanh Thoa Pham Thi, Linh Truong- Hong, Junjun Yin, James Carswell Jan 2013

Exploring Spatial Business Data: A Roa Based Ecampus Application, Thanh Thoa Pham Thi, Linh Truong- Hong, Junjun Yin, James Carswell

Conference papers

In "Smart" environments development, providing users with search utilities for interacting efficiently with web and wireless devices is a key goal. At smaller scales, Google Maps and Google Earth with satellite and street views have helped users for querying general information at specific locations. However, at larger local scales, where detailed 3D geometries linked to business data are needed, there is a recognized lack of related information and functionality for in depth exploration of an area. Linking spatial data and business data helps to enrich the user experience by fulfilling more task specific user needs. This paper presents an eCampus …


Expecting The Unexpected : Measuring Uncertainties In Mobile Robot Path Planning In Dynamic Envionments, Yan Li, Brian Mac Namee, John D. Kelleher Jan 2013

Expecting The Unexpected : Measuring Uncertainties In Mobile Robot Path Planning In Dynamic Envionments, Yan Li, Brian Mac Namee, John D. Kelleher

Conference papers

Unexpected obstacles pose significant challenges to mobile robot navigation. In this paper we investigate how, based on the assumption that unexpected obstacles really follow patterns that can be exploited, a mobile robot can learn the locations within an environment that are likely to contain obstacles, and so plan optimal paths by avoiding these locations in subsequent navigation tasks. We propose the DUNC (Dynamically Updating Navigational Confidence) method to do this. We evaluate the performance of the DUNC method by comparing it with existing methods in a large number of randomly generated simulated test environments. our evaluations show that, by learning …


Detailed Comparative Analysis Of Pesq And Visqol Behaviour In The Context Of Playout Delay Adjustments Introduced By Voip Jitter Buffer Algorithms, Andrew Hines, Peter Pocta, Hugh Melvin Jan 2013

Detailed Comparative Analysis Of Pesq And Visqol Behaviour In The Context Of Playout Delay Adjustments Introduced By Voip Jitter Buffer Algorithms, Andrew Hines, Peter Pocta, Hugh Melvin

Conference papers

The default best-effort Internet presents significant challenges for delay-sensitive applications such as VoIP. To cope with non determinism, receiver playout strategies are utilised in VoIP applications that adapt to network condition. Such strategies can be divided into two different groups, namely per-talkspurt and per-packet. The former make use of silence periods within natural speech and adapt such silences to track network conditions, thus preserving the integrity of active speech talkspurts. Examples of this approach are described in [1, 2]. Per packet strategies are different in that adjustments are made both during silence periods and during talkspurts by time-scaling of packets, …


Robustness Of Speech Quality Metrics To Background Noise And Network Degradations: Comparing Visqol, Pesq And Polqa, Andrew Hines, Naomi Harte, Jan Skoglund, Anil Kokaram Jan 2013

Robustness Of Speech Quality Metrics To Background Noise And Network Degradations: Comparing Visqol, Pesq And Polqa, Andrew Hines, Naomi Harte, Jan Skoglund, Anil Kokaram

Conference papers

The Virtual Speech Quality Objective Listener (ViSQOL) is a new objective speech quality model. It is a signal based full reference metric that uses a spectro-temporal measure of similarity between a reference and a test speech signal. ViSQOL aims to predict the overall quality of experience for the end listener whether the cause of speech quality degradation is due to ambient noise, or transmission channel degradations. This paper describes the algorithm and tests the model using two speech corpora: NOIZEUS and E4. The NOIZEUS corpus contains speech under a variety of background noise types, speech enhancement methods, and SNR levels. …


Monitoring The Effects Of Temporal Clipping On Voip Speech Quality, Andrew Hines, Naomi Harte, Jan Skoglund, Anil Kokaram Jan 2013

Monitoring The Effects Of Temporal Clipping On Voip Speech Quality, Andrew Hines, Naomi Harte, Jan Skoglund, Anil Kokaram

Conference papers

This paper presents work on a real-time temporal clipping monitoring tool for VoIP. Temporal clipping can occur as a result of voice activity detection (VAD) or echo cancellation where comfort noise in used in place of clipped speech segments. The algorithm presented will form part of a no-reference objective model for quantifying perceived speech quality in VoIP. The overall approach uses a modular design that will help pinpoint the reason for degradations in addition to quantifying their impact on speech quality. The new algorithm was tested for VAD compared over a range of thresholds and varied speech frame sizes. The …


A Crowdsourcing Approach To Labelling A Mood Induced Speech Corpus, John Snel, Alexey Tarasov, Charlie Cullen, Sarah Jane Delany May 2012

A Crowdsourcing Approach To Labelling A Mood Induced Speech Corpus, John Snel, Alexey Tarasov, Charlie Cullen, Sarah Jane Delany

Conference papers

This paper demonstrates the use of crowdsourcing to accumulate ratings from na ̈ıve listeners as a means to provide labels for a naturalistic emotional speech dataset. In order to do so, listening tasks are performed with a rating tool, which is delivered via the web. The rating requirements are based on the classical dimensions, activation and evaluation, presented to the participant as two discretised 5-point scales. Great emphasis is placed on the participant’s overall understanding of the task, and on the ease-of-use of the tool so that labelling accuracy is reinforced. The accumulation process is ongoing with a goal to …


Distributed Formal Concept Analysis Algorithms Based On An Iterative Mapreduce Framework, Ruairí De Fréin, Biao Xu, Eric Robson, Mícheál Ó Fóghlú Jan 2012

Distributed Formal Concept Analysis Algorithms Based On An Iterative Mapreduce Framework, Ruairí De Fréin, Biao Xu, Eric Robson, Mícheál Ó Fóghlú

Conference papers

While many existing formal concept analysis algorithms are efficient, they are typically unsuitable for distributed implementation. Taking the MapReduce (MR) framework as our inspiration we introduce a distributed approach for performing formal concept mining. Our method has its novelty in that we use a light-weight MapReduce runtime called Twister which is better suited to iterative algorithms than recent distributed approaches. First, we describe the theoretical foundations underpinning our distributed formal concept analysis approach. Second, we provide a representative exemplar of how a classic centralized algorithm can be implemented in a distributed fashion using our methodology: we modify Ganter’s classic algorithm …


Stereoscopic Avatar Interfaces : A Study To Determine What Effect, If Any, 3d Technology Has At Increasing The Interpretability Of An Avatar's Gaze Into The Real-World, Mark Dunne, Brian Mac Namee, John D. Kelleher Jan 2012

Stereoscopic Avatar Interfaces : A Study To Determine What Effect, If Any, 3d Technology Has At Increasing The Interpretability Of An Avatar's Gaze Into The Real-World, Mark Dunne, Brian Mac Namee, John D. Kelleher

Conference papers

An approach to displaying avatar interfaces monoscopically such as the Turning, Stretching and Boxing (TSB) technique (a combination of three graphical processes) has been shown to improve the communication efficiency of avatars by increasing a user's ability to interpret an avatar's gaze direction through the delivery of a sustained 3D illusion of the avatar on a standard 2D display. A reasonable question to ask about this approach is whether or not the improvement in interpretability can be matched or surpassed by using a standard 3D display technology (stereoscopic) with or without the fore-mentioned approach? This paper presents an experiment that …


Improved Speech Intelligibility With A Chimaera Hearing Aid Algorithm, Andrew Hines, Naomi Harte Jan 2012

Improved Speech Intelligibility With A Chimaera Hearing Aid Algorithm, Andrew Hines, Naomi Harte

Conference papers

It is recognised that current hearing aid fitting algorithms can corrupt fine timing cues in speech. This paper presents a fitting algorithm that aims to improve speech intelligibility, while preserving the temporal fine structure. The algorithm combines the signal envelope amplification from a standard hearing aid fitting algorithm with the fine timing information available to unaided listeners. The proposed “chimaera aid” is evaluated with computer simulated listener tests to measure its speech intelligibility for 3 sample hearing losses. In addition, the experiment demonstrates the potential application of auditory nerve models in the development of new hearing aid algorithm designs using …


Visqol: The Virtual Speech Quality Objective Listener, Andrew Hines, Jan Skoglund, Anil Kokaram, Naomi Harte Jan 2012

Visqol: The Virtual Speech Quality Objective Listener, Andrew Hines, Jan Skoglund, Anil Kokaram, Naomi Harte

Conference papers

A model of human speech quality perception has been developed to provide an objective measure for predicting subjective quality assessments. The Virtual Speech Quality Objective Listener (ViSQOL) model is a signal based full reference metric that uses a spectro-temporal measure of similarity between a reference and a test speech signal. This paper describes the algorithm and compares the results with PESQ for common problems in VoIP: clock drift, associated time warping and jitter. The results indicate that ViSQOL is less prone to underestimation of speech quality in both scenarios than the ITU standard.


Measuring Design Metrics In Websites, Emilio Navarro, Ronan Fitzpatrick Jun 2011

Measuring Design Metrics In Websites, Emilio Navarro, Ronan Fitzpatrick

Conference papers

The current state of the World Wide Web demands website designs that engage consumers in order to allow them to consume services or generate leads to maximize revenue. This paper describes a software quality factor to measure the success of websites by analyzing web design structure and not relying only on websites traffic data. It is also documents the requirements and architecture to build a software tool that measures criteria for determining Engagibility. A new set of social criteria to be measured for current website philosophy is also proposed.


Obtaining Speech Assets For Judgement Analysis On Low-Pass Filtered Emotional Speech, John Snel, Charlie Cullen Jan 2011

Obtaining Speech Assets For Judgement Analysis On Low-Pass Filtered Emotional Speech, John Snel, Charlie Cullen

Conference papers

Investigating the emotional content in speech from acoustic characteristics requires separating the semantic con- tent from the acoustic channel. For natural emotional speech, a widely used method to separate the two channels is the use of cue masking. Our objective is to investigate the use of cue masking in non-acted emotional speech by analyzing the extent to which filtering impacts the perception of emotional content of the modified speech material. However, obtaining a corpus of emotional speech can be quite difficult whereby verifying the emotional content is an issue thoroughly discussed. Currently, speech research is showing a tendency toward constructing …


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn Jan 2011

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘placed’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of iterated function systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …


Accessible Rich Internet Applications: The Search Engine Challenge, Angela Kielthy Jan 2011

Accessible Rich Internet Applications: The Search Engine Challenge, Angela Kielthy

Conference papers

The perception that Rich Internet Applications (RIAs) and Accessible Rich Internet Applications (ARIAs) are inaccessible to search engines is perhaps one of the main factors that hinder their wider adoption by the web development community. Recent announcements that RIAs and ARIAs are becoming more search engine friendly is provoking web developers to look for further information and evidence that will support or refute these announcements.

This paper outlines research undertaken and tests performed to establish if RIAs and ARIAs developed using Adobe Flex are crawlable and indexable by the Google search engine by default.

The conclusion drawn from testing is …


Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte Jan 2011

Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte

Conference papers

Measuring speech intelligibility for different hearing aid fitting methods in a simulated environment would allow rapid prototyping and early design assessment. A simulated performance intensity function (SPIF) test methodology has been developed to allow experimentation using an auditory nerve model to predict listeners’ phoneme recognition. The test discriminates between normal hearing and progressively degrading levels of sensorineural hearing loss. Auditory nerve discharge patterns, presented as neurograms, can be subjectively ranked by visual inspection. Here, subjective inspection is substituted with an automated ranking using a new image quality metric that can quantify neurogram degradation in a consistent manner. This work reproduces …


Comparing Hearing Aid Algorithm Performance Using Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte Jan 2011

Comparing Hearing Aid Algorithm Performance Using Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte

Conference papers

Simulated performance intensity functions were used to quantitatively discriminate speech intelligibility through phoneme discrimination assessment. Listener test results for subjects with a wide range of sensorineural hearing losses were simulated using an auditory nerve model and compared to real listeners' unaided and aided performance. Simulations of NAL-RP and DSL 4.0 fitting algorithms were compared. Auditory nerve discharge patterns from the model were presented as neurograms. An automated ranking process was used to quantify neurogram degradation using a new measure, the Neurogram Similarity Index Measure (NSIM). The measure has previously been shown to correlate well in predictions of phoneme discrimination for …


Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle Jan 2010

Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle

Conference papers

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …


E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle Jan 2010

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle

Conference papers

We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn Jan 2010

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …


Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi Jan 2010

Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi

Conference papers

New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined in the context of file sharing as a network which operates on top of another network such as the Internet for the purpose …


Navigating The Corridors Of Power : Using Rfid And Compass Sensors For Robot Localisation And Navigation, Yan Lee, Brian Mac Namee, John D. Kelleher Jan 2010

Navigating The Corridors Of Power : Using Rfid And Compass Sensors For Robot Localisation And Navigation, Yan Lee, Brian Mac Namee, John D. Kelleher

Conference papers

Localisation and navigation are still of the most important issues in mobile robotics. In certain indoor application scenarios Radio frequency identification (RFID) based absolute localisation has been found to be especially successful in supporting navigation. In this paper we examine the feasibility of an RFID and compass based approach to robot localisation and navigation for indoor environments that are dominated by corridors. We present a proof of concept system and show how it can be used to localized within and navigate through an environment.


Evaluating Sensorineural Hearing Loss With An Auditory Nerve Model Using A Mean Structural Similarity Measure, Andrew Hines, Naomi Harte Jan 2010

Evaluating Sensorineural Hearing Loss With An Auditory Nerve Model Using A Mean Structural Similarity Measure, Andrew Hines, Naomi Harte

Conference papers

Hearing loss research has traditionally been based on perceptual criteria, speech intelligibility and threshold levels. The development of computational models of the auditory-periphery has allowed experimentation via simulation to provide quantitative, repeatable results at a more granular level than would be practical with clinical research on human subjects. This work seeks to create an objective measure to automate this inspection process and ranks hearing losses based on auditory-nerve discharge patterns. A systematic way of assessing phonemic degradation using the outputs of an auditory nerve model for a range of sensorineural hearing losses would aid in rapid prototyping development of speech-processing …


Helmsman, Set A Course : Using A Compass And Rfid Tags For Indoor Localisation And Navigation, Yan Li, Brian Mac Namee, John D. Kelleher Jan 2010

Helmsman, Set A Course : Using A Compass And Rfid Tags For Indoor Localisation And Navigation, Yan Li, Brian Mac Namee, John D. Kelleher

Conference papers

Localisation and navigation are still two of the most important issues in mobile robotics. In certain indoor application scenarios RFID (radio frequency identification)-based absolute localisation has been found to be especially successful in supporting navigation. In this paper we evaluate the feasibility of an RFID and compass based approach to robot localisation and navigation for indoor environments that are dominated by corridors. We describe our system and evaluate its performance in a small, but full-scale, test environment.


A Bandwidth Aware Modification To The Dsr Routing Protocol For Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis Dec 2009

A Bandwidth Aware Modification To The Dsr Routing Protocol For Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis

Conference papers

This work proposes a bandwidth aware cross-layer modification to the DSR routing protocol. We include the Access Efficiency Factor (AEF) parameter in addition to the hop-count in the routing discovery mechanism. AEF is a measure to the local availability of bandwidth at a node. Employing the AEF as a metric in the routing discovery mechanism attempts to avoid routing through a congested area in the network. In this modification, we impose a limit on the hop-count in order to control the delay time in the network. The path selection procedure operates by finding a path with the highest minimum AEF …


Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle Sep 2009

Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle

Conference papers

This paper discusses a new approach to ‘watermarking’ digital signals using linear frequency modulated or ‘chirp’ coding. The principles underlying this approach are based on the use of a matched filter to provide a reconstruction of a chirped code that is uniquely robust in the case of signals with very low signal-to-noise ratios. Chirp coding for authenticating data is generic in the sense that it can be used for a range of data types and applications (the authentication of speech and audio signals, for example). The theoretical and computational aspects of the matched filter and the properties of a chirp …