Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CTM

2012

Speaker identification using phonetic segmentation and normalized relative delays of source harmonics

Autores
Mendes, D; Ferreira, A;

Publicação
Proceedings of the AES International Conference

Abstract
Current state-of-The-Art speaker identification systems achieve high performances in reasonably well controlled conditions. However, some scenarios still elicit significant challenges, particularly in audio forensics when voice records are typically just a few seconds long and are severely affected by distortion, interferences, and abnormal speaking attitudes. In this paper we are inspired by the concept of minutiae in the context of fingerprinting, and try to extract localized, phase-related singularities from the speech signal denoting glottal source idiosyncratic information. First, we perform MFCC+GMM experiments in order to find the most effective phonetic segmentation of the speech signal for speaker modelling and discrimination. Secondly, we rely on effective phonetic segmentation and, in addition to MFCC features, we extract Normalized Relative Delays (NRDs) obtained from the phase of spectral harmonics. We use a Nearest Neighbour generalized classifier for speaker modelling and identification. Our results indicate that combining a careful phonetic segmentation and the inclusion of phase-related information, performance in speaker identification may increase significantly. Copyright © 2012 Audio Engineering Society, Inc.

2012

Multi-technology RF fingerprinting with leaky-feeder in underground tunnels

Autores
Pereira, F; Theis, C; Moreira, A; Ricardo, M;

Publicação
2012 INTERNATIONAL CONFERENCE ON INDOOR POSITIONING AND INDOOR NAVIGATION (IPIN)

Abstract
Techniques using RSS fingerprinting for localization have been studied over a number of different technologies in many different scenarios. In the case of underground tunnels localization can be quite challenging, yet it is extremely important for safety reasons. In the specific case of the CERN tunnels, accurate and automatized localization methods would additionally allow the workflow of some activities to become substantially faster. In a radiation area this would also have the added benefit of reducing the exposure time of personnel conducting so called radiation surveys which have to be carried out before access can be granted. In this paper Fingerprinting techniques for GSM and Wireless LAN are studied and enhanced to take advantage of both network technologies simultaneously as well as the channels RSS differential and an observed effect in the radiated power in the leaky-feeder cables. Besides the higher accuracy achieved for a single technology, this methodology looks promising for scenarios where several types of wireless networks are available or expected to be installed at a later stage.

2012

Impact of data collecting techniques on the performance of a Wireless Sensor Network

Autores
Abdellatif, MM; Oliveira, JM; Ricardo, M; Steenkiste, P;

Publicação
2012 International Symposium on Wireless Communication Systems (ISWCS), Paris, France, August 28-31, 2012

Abstract
Wireless Sensor Networks (WSNs) consist of small devices with processing, communication and sensing capabilities. These devices interact together to carryout monitoring tasks. An example of such network is a photo-voltaic (PV) power plant where each solar panel has a sensor. The number of interconnected solar panels can become very large, and spread over a large area. Each sensor will sense the output of the panel and send this value to a central node for processing. In this paper we evaluate the performance of a wireless sensor network employing three different data collecting techniques. The study considers different networks, each with a different number of nodes and with different values for the offered load, estimating for each network size and offered load, network throughput, packet loss and end-to-end packet delay. Results show that as the size of the network grows and for higher values of the offered load, the best performance is achieved by using a polling based data collecting technique. © 2012 IEEE.

2012

Performance and limits of KNN-based positioning methods for GSM networks over leaky feeder in underground tunnels

Autores
Pereira, F; Theis, C; Moreira, AJC; Ricardo, M;

Publicação
J. Location Based Services

Abstract
Localisation techniques have long been of major importance for safety systems and a lot of research has been conducted in the distributed computing field regarding its functionality and reliability. In the specific scenario of long yet narrow tunnels existing at CERN, localisation methods will enable a number of applications and processes to substantially reduce human intervention. In this article, we evaluate the use of fingerprinting techniques with GSM signal available throughout the LHC tunnel via a radiating cable and compare some methods to estimate the location. In the tests, 16 variants of the K-Nearest Neighbour algorithm, employing different distance weighting methods and fingerprint grouping functions, are taken into consideration and their performance is assessed with a specific rating algorithm. The existing GSM infrastructure and tunnel conditions seem to be favourable to the adoption of these fingerprinting methods. Nevertheless, significant variations in the signal have been observed which might be traced back to the presence of bulky equipment and different operational states of the accelerator. The performance limits of these fingerprinting methods are discussed for the current scenario and, based on that, an outlook for future research is given aiming at improving the system's accuracy under such challenging conditions. © 2012 Copyright Taylor and Francis Group, LLC.

2012

Using data mining to study the impact of topology characteristics on the performance of wireless mesh networks

Autores
Calcada, T; Cortez, P; Ricardo, M;

Publicação
2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)

Abstract
This paper quantifies the impact of topological characteristics on the performance of single radio multichannel IEEE 802.11 mesh networks. Topological characteristics are the number of nodes per subnetwork, the hop count, the neighbor node density, the hidden nodes, the number of nodes in the neighborhood of the gateway, and the hidden nodes in the neighborhood of the gateway. Network performance metrics are throughput, fairness and delay. The data mining Support Vector Machine (SVM) model was used to extract the relationships between the network topology metrics and the network performance metrics based on data results obtained through ns-2 simulation of random networks. The results obtained can be used as a basis to design channel assignment algorithms or to aid the deployment and management of single radio wireless mesh networks.

2012

Transparent and scalable terminal mobility for vehicular networks

Autores
Carneiro, G; Fortuna, P; Dias, J; Ricardo, M;

Publicação
COMPUTER NETWORKS

Abstract
Future public transportation systems will provide broadband access to passengers, carrying legacy terminals with 802.11 connectivity. Passengers will be able to communicate with the Internet and with each other, while connected to 802.11 Access Points deployed in vehicles and bus stops/metro stations, and without requiring special mobility or routing protocols to run in their terminals. Existing solutions, such as 802.11s and OLSR, are not efficient and do not scale to large networks, thereby requiring the network to be segmented in many small areas, causing the terminals to change IP address when moving between areas. This paper presents WiMetroNet, a large mesh network of mobile routers (Rbridges) operating at layer 2.5 over heterogeneous wireless technologies. This architecture contains an efficient user plane that optimizes the transport of DHCP and ARP traffic, and provides a transparent terminal mobility solution using techniques that minimize the routing overhead for large networks. We offer two techniques to reduce routing overhead associated with terminal mobility. One approach is based on TTL-limited flooding of a routing message and on the concept of forwarding packets only to the vicinity of the last known location of the terminal, and then forward the packets to a new location of the terminal. The other technique lets the network remain unaware for a very long time that the terminal has moved; only when packets arrive at the old PoA does the PoA send back a "binding update" message to the correspondent node, to correct the route for future packets for the same terminal. Simulation and analytical results are presented, and the routing protocol is shown to scale to large networks with good user plane results, namely packet delivery rate, delay, and handover interruption time.

  • 219
  • 324