Papers by Carmen Peláez-Moreno
arXiv (Cornell University), Nov 14, 2018
We introduce a variant of the Rényi entropy definition that aligns it with the well-known Hölder ... more We introduce a variant of the Rényi entropy definition that aligns it with the well-known Hölder mean: in the new formulation, the r-th order Rényi Entropy is the logarithm of the inverse of the r-th order Hölder mean. This brings about new insights into the relationship of the Rényi entropy to quantities close to it, like the information potential and the partition function of statistical mechanics. We also provide expressions that allow us to calculate the Rényi entropies from the Shannon cross-entropy and the escort probabilities. Finally, we discuss why shifting the Rényi entropy is fruitful in some applications.

arXiv (Cornell University), Mar 1, 2022
Among the seventeen Sustainable Development Goals (SDGs) proposed within the 2030 Agenda and adop... more Among the seventeen Sustainable Development Goals (SDGs) proposed within the 2030 Agenda and adopted by all the United Nations member states, the Fifth SDG is a call for action to turn Gender Equality into a fundamental human right and an essential foundation for a better world. It includes the eradication of all types of violence against women. Within this context, the UC3M4Safety research team aims to develop Bindi. This is a cyber-physical system which includes embedded Artificial Intelligence algorithms, for user real-time monitoring towards the detection of affective states, with the ultimate goal of achieving the early detection of risk situations for women. On this basis, we make use of wearable affective computing including smart sensors, data encryption for secure and accurate collection of presumed crime evidence, as well as the remote connection to protecting agents. Towards the development of such system, the recordings of different laboratory and in-the-wild datasets are in process. These are contained within the UC3M4Safety Database. Thus, this paper presents and details the first release of WEMAC, a novel multi-modal dataset, which comprises a laboratory-based experiment for 47 women volunteers that were exposed to validated audiovisual stimuli to induce real emotions by using a virtual reality headset while physiological, speech signals and self-reports were acquired and collected. We believe this dataset will serve and assist research on multi-modal affective computing using physiological and speech information.
International Conference on Formal Concept Analysis, May 2, 2011

A perceptually motivated feature extraction method based on mimicking the masking properties of t... more A perceptually motivated feature extraction method based on mimicking the masking properties of the cochlea has been recently found to provide enhanced performance when applied to conventional speech recognition back-ends. On the other hand, the introduction of Deep Neural Network (DNN) based acoustic models has produced dramatic improvements in performance. In particular, we found that Deep Maxout Networks, a modification of DNNs' feed-forward architecture that uses a max-out activation function, provides enhanced robustness to environmental noise. In this paper, we present preliminary experiments on the combination of these two elements that already show how the DMN-based back-end is capable of taking advantage of these auditorily inspired features making the whole system more robust and also suggesting that human-like representations of speech keep playing an important role in DNN-based automatic speech recognition systems.

IEEE Transactions on Multimedia, Jun 1, 2001
The Internet Protocol (IP) environment poses two relevant sources of distortion to the speech rec... more The Internet Protocol (IP) environment poses two relevant sources of distortion to the speech recognition problem: lossy speech coding and packet loss. In this paper, we propose a new front-end for speech recognition over IP networks. Specifically, we suggest extracting the recognition feature vectors directly from the encoded speech (i.e., the bit stream) instead of decoding it and subsequently extracting the feature vectors. This approach offers two significant benefits. First, the recognition system is only affected by the quantization distortion of the spectral envelope. Thus, we are avoiding the influence of other sources of distortion due the encoding-decoding process. Second, when packet loss occurs, our front-end becomes more effective since it is not constrained to the error handling mechanism of the codec. We have considered the ITU G.723.1 standard codec, which is one of the most preponderant coding algorithms in voice over IP (VoIP) and compared the proposed front-end with the conventional approach in two automatic speech recognition (ASR) tasks, namely, speaker-independent isolated digit recognition and speaker-independent continuous speech recognition. In general, our approach outperforms the conventional procedure, for a variety of simulated packet loss rates. Furthermore, the improvement is higher as network conditions worsen.

International Conference on Formal Concept Analysis, Feb 25, 2008
In [13] a generalisation of Formal Concept Analysis was introduced with data mining applications ... more In [13] a generalisation of Formal Concept Analysis was introduced with data mining applications in mind, K-Formal Concept Analysis, where incidences take values in certain kinds of semirings, instead of the standard Boolean carrier set. Subsequently, the structural lattice of such generalised contexts was introduced in [15], to provide a limited equivalent to the main theorem of K-Formal Concept Analysis, resting on a crucial parameter, the degree of existence of the objectattribute pairs ϕ. In this paper we introduce the spectral lattice of a concrete instance of K-Formal Concept Analysis, as a further means to clarify the structural and the K-Concept Lattices and the choice of ϕ. Specifically, we develop techniques to obtain the join-and meetirreducibles of a Rmax,+-Concept Lattice independently of ϕ and try to clarify its relation to the corresponding structural lattice.

IEEE Internet of Things Journal
The main research motivation of this article is the fight against gender-based violence and achie... more The main research motivation of this article is the fight against gender-based violence and achieving gender equality from a technological perspective. The solution proposed in this work goes beyond currently existing panic buttons, needing to be manually operated by the victims under difficult circumstances. Instead, Bindi, our end-to-end autonomous multimodal system, relies on artificial intelligence methods to automatically identify violent situations, based on detecting fear-related emotions, and trigger a protection protocol, if necessary. To this end, Bindi integrates modern state-of-the-art technologies, such as the Internet of Bodies, affective computing, and cyber-physical systems, leveraging: 1) affective Internet of Things (IoT) with auditory and physiological commercial off-the-shelf smart sensors embedded in wearable devices; 2) hierarchical multisensorial information fusion; and 3) the edge-fog-cloud IoT architecture. This solution is evaluated using our own data set named WEMAC, a very recently collected and freely available collection of data comprising the auditory and physiological responses of 47 women to several emotions elicited by using a virtual reality environment. On this basis, this work provides an analysis of multimodal late fusion strategies to combine the physiological and speech data processing pipelines to identify the best intelligence engine strategy for Bindi. In particular, the best data fusion strategy reports an overall fear classification accuracy of 63.61% for a subjectindependent approach. Both a power consumption study and an audio data processing pipeline to detect violent acoustic events complement this analysis. This research is intended as an initial multimodal baseline that facilitates further work with real-life elicited fear in women.
Print-out of the genomic information interfaced by WebGeneKFCA. A print-out of a sample informati... more Print-out of the genomic information interfaced by WebGeneKFCA. A print-out of a sample information that can be obtained by interfacing with GO through the lattices of the running example described in http://www.biomedcentral.com/content/supplementary/10.1186/s12859-016-1234-z-S1.pdfAdditional file 1. Please, note that the links in WebGeneKFCA are active and lead to the ontologies' on-line databases. This particular sample has been obtained by digging into the main cluster of the lattice of Fig. 4 and selecting the probeset 11742211_x_at. It can also be obtained at https://webgenekfca.com/webgenekfca/kfcaresultses/9 . (PDF 471 kb)
We introduce a new framework, Formal Context Analysis (FxA), for the exploratory analysis of data... more We introduce a new framework, Formal Context Analysis (FxA), for the exploratory analysis of data tasks cast in the guise of formal contexts. FxA gathers a number of results from Formal Concept Analysis, Formal Independence Analysis and Formal Equivalence Analysis to enhance the establishment and processing of hypothesis about data. We apply this framework to the study of the Multi-label Classification (MLC) task and obtain a number of results of technical nature about how the induction mechanism for MLC classifiers should proceed. The application is based on an analysis of multilabel classification from the standpoint of FxA.
In this paper we introduce extensions of Kleinberg’s Hubs & Authorities (HITS) algorithm to calcu... more In this paper we introduce extensions of Kleinberg’s Hubs & Authorities (HITS) algorithm to calculate the influence of nodes in a network whose adjacency matrix takes values over dioids, zerosumfree semirings with a natural order. We relate these extensions to both the Singular Value Problem and the Eigen Problem of matrices in these semirings. We show the original HITS algorithm to be a particular instance of the generic construction, but also the advantages of working in idempotent semifields. We also make some connections with extended K-Formal Concept Analysis, where the particular kind of dioid is an idempotent semifield, and conclude that the type of knowledge extracted from a matrix by one procedure and the other are different.

Interspeech 2014, 2014
In this paper we present advances in the modeling of the masking behavior of the Human Auditory S... more In this paper we present advances in the modeling of the masking behavior of the Human Auditory System to enhance the robustness of the feature extraction stage in Automatic Speech Recognition. The solution adopted is based on a non-linear filtering of a spectro-temporal representation applied simultaneously on both the frequency and time domains, by processing it using mathematical morphology operations as if it were an image. A particularly important component of this architecture is the so called structuring element: biologically-based considerations are addressed in the present contribution to design an element that closely resembles the masking phenomena taking place in the cochlea. The second feature of this contribution is the choice of underlying spectro-temporal representation. The best results were achieved by the representation introduced as part of the Power Normalized Cepstral Coefficients together with a spectral subtraction step. On the Aurora 2 noisy continuous digits task, we report relative error reductions of 18.7% compared to PNCC and 39.5% compared to MFCC.

ArXiv, 2017
In this paper we use information-theoretic measures to provide a theory and tools to analyze the ... more In this paper we use information-theoretic measures to provide a theory and tools to analyze the flow of information from a discrete, multivariate source of information $\overline X$ to a discrete, multivariate sink of information $\overline Y$ joined by a distribution $P_{\overline X \overline Y}$. The first contribution is a decomposition of the maximal potential entropy of $(\overline X, \overline Y)$ that we call a balance equation, that can also be split into decompositions for the entropies of $\overline X$ and $\overline Y$ respectively. Such balance equations accept normalizations that allow them to be represented in de Finetti entropy diagrams, our second contribution. The most important of these, the aggregate Channel Multivariate Entropy Triangle CMET is an exploratory tool to assess the efficiency of multivariate channels. We also present a practical contribution in the application of these balance equations and diagrams to the assessment of information transfer efficien...
Uploads
Papers by Carmen Peláez-Moreno