Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jonathon A. Chambers is active.

Publication


Featured researches published by Jonathon A. Chambers.


Journal of Biomedical Optics | 2011

Motion-compensated noncontact imaging photoplethysmography to monitor cardiorespiratory status during exercise

Yu Sun; Sijung Hu; Vicente Azorin-Peris; Stephen E. Greenwald; Jonathon A. Chambers; Yisheng Zhu

With the advance of computer and photonics technology, imaging photoplethysmography [(PPG), iPPG] can provide comfortable and comprehensive assessment over a wide range of anatomical locations. However, motion artifact is a major drawback in current iPPG systems, particularly in the context of clinical assessment. To overcome this issue, a new artifact-reduction method consisting of planar motion compensation and blind source separation is introduced in this study. The performance of the iPPG system was evaluated through the measurement of cardiac pulse in the hand from 12 subjects before and after 5 min of cycling exercise. Also, a 12-min continuous recording protocol consisting of repeated exercises was taken from a single volunteer. The physiological parameters (i.e., heart rate, respiration rate), derived from the images captured by the iPPG system, exhibit functional characteristics comparable to conventional contact PPG sensors. Continuous recordings from the iPPG system reveal that heart and respiration rates can be successfully tracked with the artifact reduction method even in high-intensity physical exercise situations. The outcome from this study thereby leads to a new avenue for noncontact sensing of vital signs and remote physiological assessment, with clear applications in triage and sports training.


international conference of the ieee engineering in medicine and biology society | 2012

A Posture Recognition-Based Fall Detection System for Monitoring an Elderly Person in a Smart Home Environment

Miao Yu; Adel Rhuma; Syed Mohsen Naqvi; Liang Wang; Jonathon A. Chambers

We propose a novel computer vision-based fall detection system for monitoring an elderly person in a home care application. Background subtraction is applied to extract the foreground human body and the result is improved by using certain postprocessing. Information from ellipse fitting and a projection histogram along the axes of the ellipse is used as the features for distinguishing different postures of the human. These features are then fed into a directed acyclic graph support vector machine for posture classification, the result of which is then combined with derived floor information to detect a fall. From a dataset of 15 people, we show that our fall detection system can achieve a high fall detection rate (97.08%) and a very low false detection rate (0.8%) in a simulated home environment.


IEEE Transactions on Information Forensics and Security | 2015

Physical Layer Network Security in the Full-Duplex Relay System

Gaojie Chen; Yu Gong; Pei Xiao; Jonathon A. Chambers

This paper investigates the secrecy performance of full-duplex relay (FDR) networks. The resulting analysis shows that FDR networks have better secrecy performance than half duplex relay networks, if the self-interference can be well suppressed. We also propose a full duplex jamming relay network, in which the relay node transmits jamming signals while receiving the data from the source. While the full duplex jamming scheme has the same data rate as the half duplex scheme, the secrecy performance can be significantly improved, making it an attractive scheme when the network secrecy is a primary concern. A mathematic model is developed to analyze secrecy outage probabilities for the half duplex, the full duplex and full duplex jamming schemes, and the simulation results are also presented to verify the analysis.


IEEE Transactions on Affective Computing | 2013

Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis

Yogachandran Rahulamathavan; Raphael C.-W. Phan; Jonathon A. Chambers; David J. Parish

Facial expression recognition forms a critical capability desired by human-interacting systems that aim to be responsive to variations in the humans emotional state. Recent trends toward cloud computing and outsourcing has led to the requirement for facial expression recognition to be performed remotely by potentially untrusted servers. This paper presents a system that addresses the challenge of performing facial expression recognition when the test image is in the encrypted domain. More specifically, to the best of our knowledge, this is the first known result that performs facial expression recognition in the encrypted domain. Such a system solves the problem of needing to trust servers since the test image for facial expression recognition can remain in encrypted form at all times without needing any decryption, even during the expression recognition process. Our experimental results on popular JAFFE and MUG facial expression databases demonstrate that recognition rate of up to 95.24 percent can be achieved even in the encrypted domain.


IEEE Transactions on Signal Processing | 2010

Distributed Estimation Over an Adaptive Incremental Network Based on the Affine Projection Algorithm

Leilei Li; Jonathon A. Chambers; Cassio G. Lopes; Ali H. Sayed

We study the problem of distributed estimation based on the affine projection algorithm (APA), which is developed from Newtons method for minimizing a cost function. The proposed solution is formulated to ameliorate the limited convergence properties of least-mean-square (LMS) type distributed adaptive filters with colored inputs. The analysis of transient and steady-state performances at each individual node within the network is developed by using a weighted spatial-temporal energy conservation relation and confirmed by computer simulations. The simulation results also verify that the proposed algorithm provides not only a faster convergence rate but also an improved steady-state performance as compared to an LMS-based scheme. In addition, the new approach attains an acceptable misadjustment performance with lower computational and memory cost, provided the number of regressor vectors and filter length parameters are appropriately chosen, as compared to a distributed recursive-least-squares (RLS) based method.


IEEE Transactions on Biomedical Engineering | 2005

Fetal electrocardiogram extraction by sequential source separation in the wavelet domain

Maria G. Jafari; Jonathon A. Chambers

This work addresses the problem of fetal electrocardiogram extraction using blind source separation (BSS) in the wavelet domain. A new approach is proposed, which is particularly advantageous when the mixing environment is noisy and time-varying, and that is shown, analytically and in simulation, to improve the convergence rate of the natural gradient algorithm. The distribution of the wavelet coefficients of the source signals is then modeled by a generalized Gaussian probability density, whereby in the time-scale domain the problem of selecting appropriate nonlinearities when separating mixtures of both sub- and super-Gaussian signals is mitigated, as shown by experimental results.


IEEE Signal Processing Letters | 2005

Artifact removal from electroencephalograms using a hybrid BSS-SVM algorithm

Leor Shoker; Saeid Sanei; Jonathon A. Chambers

Artifacts such as eye blinks and heart rhythm (ECG) cause the main interfering signals within electroencephalogram (EEG) measurements. Therefore, we propose a method for artifact removal based on exploitation of certain carefully chosen statistical features of independent components extracted from the EEGs, by fusing support vector machines (SVMs) and blind source separation (BSS). We use the second-order blind identification (SOBI) algorithm to separate the EEG into statistically independent sources and SVMs to identify the artifact components and thereby to remove such signals. The remaining independent components are remixed to reproduce the artifact-free EEGs. Objective and subjective assessment of the simulation results shows that the algorithm is successful in mitigating the interference within EEGs.


IEEE Transactions on Signal Processing | 2005

Penalty function-based joint diagonalization approach for convolutive blind separation of nonstationary sources

Wenwu Wang; Saeid Sanei; Jonathon A. Chambers

A new approach for convolutive blind source separation (BSS) by explicitly exploiting the second-order nonstationarity of signals and operating in the frequency domain is proposed. The algorithm accommodates a penalty function within the cross-power spectrum-based cost function and thereby converts the separation problem into a joint diagonalization problem with unconstrained optimization. This leads to a new member of the family of joint diagonalization criteria and a modification of the search direction of the gradient-based descent algorithm. Using this approach, not only can the degenerate solution induced by a null unmixing matrix and the effect of large errors within the elements of covariance matrices at low-frequency bins be automatically removed, but in addition, a unifying view to joint diagonalization with unitary or nonunitary constraint is provided. Numerical experiments are presented to verify the performance of the new method, which show that a suitable penalty function may lead the algorithm to a faster convergence and a better performance for the separation of convolved speech signals, in particular, in terms of shape preservation and amplitude ambiguity reduction, as compared with the conventional second-order based algorithms for convolutive mixtures that exploit signal nonstationarity.


IEEE Transactions on Information Forensics and Security | 2014

Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks

Gaojie Chen; Zhao Tian; Yu Gong; Zhi Chen; Jonathon A. Chambers

This paper considers the security of transmission in buffer-aided decode-and-forward cooperative wireless networks. An eavesdropper which can intercept the data transmission from both the source and relay nodes is considered to threaten the security of transmission. Finite size data buffers are assumed to be available at every relay in order to avoid having to select concurrently the best source-to-relay and relay-to-destination links. A new max-ratio relay selection policy is proposed to optimize the secrecy transmission by considering all the possible source-to-relay and relay-to-destination links and selecting the relay having the link which maximizes the signal to eavesdropper channel gain ratio. Two cases are considered in terms of knowledge of the eavesdropper channel strengths: exact and average gains, respectively. Closed-form expressions for the secrecy outage probability for both cases are obtained, which are verified by simulations. The proposed max-ratio relay selection scheme is shown to outperform one based on a max-min-ratio relay scheme.


IEEE Transactions on Signal Processing | 2012

Steady-State Analysis of Diffusion LMS Adaptive Networks With Noisy Links

Azam Khalili; Mohammad Ali Tinati; Amir Rastegarnia; Jonathon A. Chambers

In this correspondence, we analyze the effects of noisy links on the steady-state performance of diffusion least-mean-square (LMS) adaptive networks. Using the established weighted spatial-temporal energy conservation argument, we derive a variance relation which contains moments that represent the effects of noisy links. We evaluate these moments and derive closed-form expressions for the mean-square deviation (MSD), excess mean-square error (EMSE) and mean-square error (MSE) to explain the steady-state performance at each individual node. The derived expressions, supported by simulations, reveal that unlike the ideal link case, the steady-state MSD, EMSE, and MSE curves are not monotonically increasing functions of the step-size parameter when links are noisy. Moreover, the diffusion LMS adaptive network does not diverge due to noisy links.

Collaboration


Dive into the Jonathon A. Chambers's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yonggang Zhang

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Miao Yu

Loughborough University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yu Gong

Loughborough University

View shared research outputs
Top Co-Authors

Avatar

Ning Li

Harbin Engineering University

View shared research outputs
Researchain Logo
Decentralizing Knowledge