RH

R. Heusdens

24 records found

Federated learning (FL) enables collaborative model training across multiple clients without sharing raw data, offering a promising solution for privacy-sensitive applications. However, as FL becomes more decentralised, balancing data privacy with resilience against adversarial a ...
Privacy concerns in federated learning have attracted considerable attention recently. In centralized networks, it has been observed that even without directly exchanging raw training data, the exchange of other so-called intermediate parameters such as weights/gradients can stil ...

Distributed Optimisation Using Stochastic PDMM

Convergence, transmission losses and privacy

In recent years, the large increase in connected devices and the data that is collected by these devices has caused a heightened interest in distributed processing. Many practical distributed networks are of heterogeneous nature. Because of this, algorithms operating within these ...
Acoustic room geometry estimation is often performed in ad hoc settings, i.e., using multiple microphones and sources distributed around the room, or assuming control over the excitation signals. To facilitate practical applications, we propose a fully convolutional network (FCN) ...
Environmental sound identification and recognition aim to detect sound events within an audio clip. This technology is useful in many real-world applications such as security systems, smart vehicle navigation and surveillance of noise pollution, etc. Research on this topic has re ...
Consensus problem has been a topic of interest for many research areas allowing multiple agents to reach an agreement through local information exchange. The explicit share of the state variables, however, may cause privacy issues due to the confidentiality of the initial values. ...
Biometrics authentication has been very useful and necessary nowadays due to the great developments in technology and the transaction of huge amounts of sensitive data on a daily basis. Traditionally, access to some data or service is achieved by means of some documents or a pass ...
The particle filter (PF) algorithm is appropriate to solve the problem of speaker tracking in a reverberant and noisy environment using distributed pairwise microphone networks. First, complete the tracking task based on PF algorithm in centralized manner, a processing center is ...

Inferring the location of reflecting surfaces from acoustic measurements

Using a compact microphone array collocated with a loudspeaker

The response of a sound system in a room primarily varies with the room itself, the position of the loudspeakers and the listening position. The room boundaries cause reflections of the sound that can lead to undesired effects such as echoes, resonances or reverberation. Knowledg ...

Distributed Convex Optimization

Based on Monotone Operator Theory

Following their conception in the mid twentieth century, the world of computers has evolved from a landscape of isolated entities into a sprawling web of interconnected machines. Yet, given this evolution, many of the methods we use for allowing computers to work together still r ...
The thesis project is aimed at designing an unobtrusive method to find the obstruction location and severity for patients who are not diagnosed with Obstructive sleep apnea, during their non-sedated sleep using simple recording devices within uncontrolled environment. Similar to ...
A phase estimation algorithm is presented to estimate the phase of a recurring pattern in a nonstationary signal. The signal is modelled by a template signal that represents one revolution of the recurring pattern, and that the frequency of this pattern can change at any time wit ...
Estimating a room geometry using multiple microphones rises an echoes labeling problem. Two recent methods called the graph-based and the subspace-greedy methods have shown their capability in solving this problem. The graph-based method attains a good accuracy but suffers in mai ...
Authentication is becoming an increasingly important application in the connected world and is driven by the growing use of mobile and IoT devices that use an increasing number of applications that require transactions of sensitive data. Security usually relies on passwords and/o ...
In this thesis report, the design of the estimation of internal delays within speakers and microphones will be covered. The estimation is done via an iterational algorithm which converges to the different delays. The design choice of the estimation of those delays follows from an ...
In this report, the design of a subsystem within a localization system for the Bosch DICENTIS wireless conference system will be presented. The localization system will function by means of using acoustic Time Difference Of Arrival (TDOA) measurements to determine the location of ...

Inexact distributed optimization schemes

A convergence analysis using monotone operator theory

Distributed optimization has been an
extensively studied field for years. Recent developments in the area of sensors makes it possible to create networks consisting of a large number of nodes. The focus of this thesis will be optimizing distributed problems over a decentrali ...
Physical activity recognition through wearables has enabled the development of novel applications in healthcare. Most of the existing studies focus on predicting activities using wearable sensors, either in a controlled or uncontrolled environment. However, there is not a clear d ...
Clock synchronization among the nodes of a wireless acoustic sensor network (WASN) is a significant issue that affects the performance of multi-channel noise reduction schemes. Since independent sensors are utilized, each accompanied by its internal clock, clock offsets are inevi ...
Human interaction with a smart speaker involves often distant automatic speech recognition (ASR). However, ASR is a rather cumbersome task at significantly high levels of noise. Most of commercial smart speakers in order to achieve high ASR accuracy they tend to reduce the playba ...