Directionally constrained minimization of power algorithm for speech signals
نویسندگان
چکیده
A novel algorithm of adaptive beamforming with a microphone array is presented. Beamforming is one of the simplest methods for discriminating between different signals based on the physical location of sources. The directionally constrained minimization of power (DCMP) algorithm is well-known as a reliable approach to extracting some signals incoming from specific directions. In the DCMP algorithm, the output power of the sensor array is minimized under the constraint of a constant response to the direction of arrival (DOA) of the target signal. Although the conventional DCMP is applied only to narrowband signals, our approach extends this algorithm so that the DCMP criterion is applicable to the broadband signals such as speech. The proposed method can be achieved by a relatively small hardware amount of the system.
منابع مشابه
A Novel Frequency Domain Linearly Constrained Minimum Variance Filter for Speech Enhancement
A reliable speech enhancement method is important for speech applications as a pre-processing step to improve their overall performance. In this paper, we propose a novel frequency domain method for single channel speech enhancement. Conventional frequency domain methods usually neglect the correlation between neighboring time-frequency components of the signals. In the proposed method, we take...
متن کاملRobust Adaptive Beamforming Based on a Gradient Projection Method
Recently, adaptive beamforming has been widely used in wireless communications, microphone array speech processing and so on. One of the adaptive beamforming methods is directionally constrained minimization of power. However, this method is known to degrade if some of underlying assumptions on the environment, sources, or sensor array become violated [5]. To resolve this disadvantage, some met...
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملA New Algorithm for Voice Activity Detection Based on Wavelet Packets (RESEARCH NOTE)
Speech constitutes much of the communicated information; most other perceived audio signals do not carry nearly as much information. Indeed, much of the non-speech signals maybe classified as ‘noise’ in human communication. The process of separating conversational speech and noise is termed voice activity detection (VAD). This paper describes a new approach to VAD which is based on the Wavelet ...
متن کاملDOA Estimation Using Adaptive Beamspace EM Algorithm
To understand radio propagation structures and consider signal recovering techniques in mobile communications, it is most effective to estimate DOAs (directions of arrival) of individual incoming waves with array antennas. Also, in radar systems, it is required to discriminate the desired signal from interference [1]. Recently, DOA estimation using EM (expectation-maximization) algorithm [2] ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005