2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications 2008
DOI: 10.1109/ictta.2008.4529996
|View full text |Cite
|
Sign up to set email alerts
|

The use of kernel methods for audio events detection

Abstract: This paper presents an approach for an automatic surveillance system in public transport by analyzing audio signals recorded in the vehicle in order to detect several abnormal behaviors. We try to visualize audio signals by projection methods like PCA and kernel PCA. We use also unsupervised classification (clustering) methods to separate the audio signals into their components precisely we are using Kmeans and kernel K-means.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…A logarithm transformation is applied to the filter bank outputs followed by Discrete Cosine Transform which consequently generates 12 cepstrum coefficients. To detect the spectrum relationships between neighboring frames, first and second derivatives of the 12 attributes plus three terms of energy are added to end up with 39 MFCC attributes [11,14].…”
Section: Mfcc Feature Extractionmentioning
confidence: 99%
“…A logarithm transformation is applied to the filter bank outputs followed by Discrete Cosine Transform which consequently generates 12 cepstrum coefficients. To detect the spectrum relationships between neighboring frames, first and second derivatives of the 12 attributes plus three terms of energy are added to end up with 39 MFCC attributes [11,14].…”
Section: Mfcc Feature Extractionmentioning
confidence: 99%
“…Kernel-based methods for multimedia retrieval have shown their robustness for many tasks, in shape recognition [37], image retrieval [14], or event detection [29] for instance. Most methods first build a kernel function, usually from supervised data [5], then train a classifier such as Support Vector Machines (SVM).…”
Section: Introductionmentioning
confidence: 99%