1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.
The seven papers in this special issue cover various far-field speech processing techniques including speech enhancement, separation and recognition, and their integration. In most of the methods, multichannel speech processing is an essential component to achieve state-of-the-art performance.
In this paper, we propose a coding tree unit (CTU)-level rate control scheme from the perspective of SSIM-based rate-distortion optimization to improve the coding efficiency. First, we establish the SSIM-based rate-distortion model based on the divisive normalization scheme, which characterizes the relationship between the local visual quality and the coding bits.
With the rapid popularization of mobile intelligent terminals, mobile video and cloud services applications are widely used in people's lives. However, the resource-constrained characteristic of the terminals and the enormous amount of video information make the efficient terminal-to-cloud data upload a challenge.
Multimedia streams consume a significant chunk of the consumer Internet traffic exchanged and will continue to do so due to the ever-increasing connection among people, businesses, and industries. To cope with the deviation of the Internet's intended use, unreliable underlying infrastructure, and best effort protocols while leveraging existing technologies...
Online Applications only: http://emea3.mrted.ly/28n6x
The University of Luxembourg is a multilingual, international research university.
Online Application Only:http://emea3.mrted.ly/28f97
The University of Luxembourg is a multilingual, international research university.
The Interdisciplinary Centre for Security, Reliability and Trust (SnT) invites applications from PhD holders for conducting research in design and optimization methods for performance enhancement of next generation radar networks
In many communication channels, secrecy constraints usually incur a penalty in capacity, as well as generalized degrees-of-freedom (GDoF). In this paper, we show an interesting observation that adding a helper can totally remove the penalty in sum GDoF for a two-user symmetric Gaussian interference channel.
The Internet of Things (IoT) is increasingly empowering people with an interconnected world of physical objects ranging from smart buildings to portable smart devices, such as wearables. With recent advances in mobile sensing, wearables have become a rich collection of portable sensors and are able to provide various types of services...
The use of mobile phones in public places opens up the possibilities of remote side channel attacks on these devices. We present a video-based side channel attack to decipher passwords on mobile devices. Our method uses short video clips ranging from 5 to 10 s each, which can be taken unobtrusively from a distance and do not require the keyboard or the screen of the phone to be visible.
The discrete Mumford-Shah formalism has been introduced for the image denoising problem, allowing to capture both smooth behavior inside an object and sharp transitions on the boundary. In this letter, we propose first to extend this formalism to graphs and to the problem of mixing matrix estimation.
Zero-shot learning (ZSL) has enjoyed great popularity in recent years due to its ability to recognize novel objects, where semantic information is exploited to build up relations among different categories. Traditional ZSL approaches usually focus on learning more robust visual-semantic embeddings among seen classes and directly apply them to the unseen classes without considering whether they are suitable.
This letter proposes a new approach to nonnegative Tucker decomposition, which assumes recursive updates of latent factors with any nonnegative matrix factorization algorithm. The proposed strategy is extended to the nonnegatively constrained hierarchical Tucker decomposition model.
This paper presents an intelligent system named Magic-wall, which enables visualization of the effect of room decoration automatically. Concretely, given an image of the indoor scene and a preferred color, the Magic-wall can automatically locate the wall regions in the image and smoothly replace the existing wall with the required one.
In this paper, we present a multichannel cross-modal fusion algorithm to combine two complementary modalities in electron tomography: X-ray spectroscopy and scanning transmission electron microscopy (STEM). The former reveals compositions with high elemental specificity but low signal-to-noise ratio (SNR), while the latter characterizes the structure with high SNR but little chemical information.
In this paper, we present a spatial-temporal attention-aware learning (STAL) method for video-based person re-identification. Most existing person re-identification methods aggregate image features identically to represent persons, which are extracted from the same receptive field across video frames.
Lecture Date: September 11, 2019
Chapter: Italy
Chapter Chair: Mauro Barni
Topic: Distributed Learning and Signal Processing Algorithms
Online Applications Only: http://emea3.mrted.ly/28n6x
The University of Luxembourg is a multilingual, international research university.
Several funded research opportunities are available in the Biomedical Image Computing Group at the University of New South Wales, Sydney, Australia. The group is based jointly in the School of Computer Science and Engineering and the Graduate School of Biomedical Engineering within the Faculty of Engineering.