2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)最新文献

筛选
英文 中文
Distinction between healthy individuals and patients with confident abnormal respiration 健康个体与自信呼吸异常患者的区别
Masara Yamashita, Tasuku Miura, S. Matsunaga
{"title":"Distinction between healthy individuals and patients with confident abnormal respiration","authors":"Masara Yamashita, Tasuku Miura, S. Matsunaga","doi":"10.1109/APSIPA.2017.8282199","DOIUrl":"https://doi.org/10.1109/APSIPA.2017.8282199","url":null,"abstract":"To adequately distinguish between healthy individuals and patients with respiratory disorders, we propose a new classification method combining two conventional methods. The first method entails determining the presence of a \"confident abnormal respiration\" period (used to describe individuals for whom the likelihood of an abnormal respiratory candidate was much higher than for that of a normal candidate, and for which patients could be determined with high accuracy). The second method entails comparing the two total likelihoods (through a series of inspiration and expiration periods) of normal and abnormal candidates of each respiratory period in a test sample. In our new method, if one or more confident abnormal respiration phases are detected in a test respiration sample, the first method is used; otherwise, the second method is used for the classification. Our proposed method achieved significantly higher performance (88.6%) at the 5% level (p=0.027) than does each conventional classification method alone (80.6% and 84.9%). This validates our newly proposed classification method.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134032254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoE-estimation models for video streaming services 视频流服务的qos估计模型
Kazuhisa Yamagishi
{"title":"QoE-estimation models for video streaming services","authors":"Kazuhisa Yamagishi","doi":"10.1109/APSIPA.2017.8282058","DOIUrl":"https://doi.org/10.1109/APSIPA.2017.8282058","url":null,"abstract":"As encoders and decoders (codecs), networks, and displays have become more technologically advanced, network and video-streaming-service providers have been able to provide video-streaming services over a network (e.g., fiber-to-the home and long-term evolution); therefore, the use of these services has been increasing drastically in the past decade. To maintain the high quality of experience (QoE) of these services, network and service providers need to invest in equipment (e.g., network devices, codecs, and servers). To increase return on investment, the QoE of these services needs to be appropriately designed with as little investment as possible, and its normality needs to be monitored while services are provided. In general, the QoE of these services degrades due to compression and network conditions (e.g., packet loss and delay). Therefore, it is necessary to develop a QoE-estimation model by taking into account the impact of compression and network on quality. This paper introduces subjective-quality-assessment methods and QoE-estimation models that assess user QoE in video-streaming services and standardization activities.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131580428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion 基于指纹和语音特征级融合的二维赢者通吃的模板保护算法
K. Chee, Zhe Jin, W. Yap, B. Goi
{"title":"Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion","authors":"K. Chee, Zhe Jin, W. Yap, B. Goi","doi":"10.1109/APSIPA.2017.8282253","DOIUrl":"https://doi.org/10.1109/APSIPA.2017.8282253","url":null,"abstract":"Biometrics has been explosively deployed for identity verification and/or identification over the last decade. Lately, multi-biometric systems are gaining attention due to its universality and higher accuracy in biometric recognition. However, the compromise of templates stored in database as separate entities in multi-biometric systems undoubtedly poses the major security and privacy threats due to the strong binding between identity and biometric data. In this paper, we propose to fuse fingerprint and voice modalities at feature level to obtain an integrated template. Subsequently, we propose two-dimensional Winner-Takes-All hashing method to protect the fused template. The proposed hashing method is inspired from Winner-Takes-All hashing and further altered for this unique multi-biometric system. Specifically, the proposed hashing method transforms the continuous fused biometric feature into discrete value. Such transformation enjoys strong non-linearity and thus resilient to the feature variation in certain degree. We show that the resultant hashed code can withstand the major attacks (e.g. template invertibility attack, attack via multiplicity etc.) while yielding reasonable recognition performance. A low equal error rate of 0.94% is obtained using the proposed hashing method on fingerprint images from FVC2002 DB1 and FVC2002 DB2 datasets and voice features from NIST Speaker Recognition Evaluation (SRE) 2004 ∼ 2010. More importantly, the proposed two-dimensional Winner-Takes-All hashing method can be extended and applied to other biometric modalities with real value representation.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"10 47","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113954626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Topic embedding of sentences for story segmentation 面向故事分割的句子主题嵌入
J. Yu, Xiong Xiao, Lei Xie, Chng Eng Siong
{"title":"Topic embedding of sentences for story segmentation","authors":"J. Yu, Xiong Xiao, Lei Xie, Chng Eng Siong","doi":"10.1109/APSIPA.2017.8282280","DOIUrl":"https://doi.org/10.1109/APSIPA.2017.8282280","url":null,"abstract":"In this paper, we propose to embed sentences into fixed-dimensional vectors that carry the topic information for story segmentation. As a sentence comprises of a sequence of words and may have different lengths, we use long short-term memory recurrent neural network (LSTM-RNN) to summarize the information of the whole sentence and only predict the topic class at the last word in the sentence. The output of the network at the last word can be used as an embedding of the sentence in the topic space. We used the obtained sentence embeddings in the HMM-based story segmentation framework and obtained promising results. On the TDT2 corpus, the F1 measure is improved to 0.789 from 0.765 which is obtained by a competitive system using DNN and bag-of-words features.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122412532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital computation of fractional Fourier and linear canonical transforms and sparse image representation 分数傅里叶和线性正则变换的数字计算和稀疏图像表示
Aykut Koç, Haldun M. Özaktas, Burak Bartan, Erhan Gundogdu, T. Çukur
{"title":"Digital computation of fractional Fourier and linear canonical transforms and sparse image representation","authors":"Aykut Koç, Haldun M. Özaktas, Burak Bartan, Erhan Gundogdu, T. Çukur","doi":"10.1109/APSIPA.2017.8282011","DOIUrl":"https://doi.org/10.1109/APSIPA.2017.8282011","url":null,"abstract":"Fast and accurate digital computation of the fractional Fourier transform (FRT) and linear canonical transforms (LCT) are of utmost importance in order to deploy them in real world applications and systems. The algorithms in O(NlogN) to obtain the samples of the transform from the samples of the input function are presented for several different types of FRTs and LCTs, both in 1D and 2D forms. To apply them in image processing we consider the problem of obtaining sparse transform domains for images. Sparse recovery tries to reconstruct images that are sparse in a linear transform domain, from an underdeter- mined measurement set. The success of sparse recovery relies on the knowledge of domains in which compressible representations of the image can be obtained. In this work, we consider two- and three-dimensional images, and investigate the effects of the fractional Fourier (FRT) and linear canonical transforms (LCT) in obtaining sparser transform domains. For 2D images, we investigate direct transforming versus several patching strategies. For the 3D case, we consider biomedical images, and compare several different strategies such as taking 2D slices and optimizing for each slice and direct 3D transforming.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124437732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compressed sensing reconstruction of MR phase-varied images using multi-scale complex sparsifying transform 基于多尺度复稀疏化变换的MR相变图像压缩感知重构
S. Ito
{"title":"Compressed sensing reconstruction of MR phase-varied images using multi-scale complex sparsifying transform","authors":"S. Ito","doi":"10.1109/APSIPA.2017.8282198","DOIUrl":"https://doi.org/10.1109/APSIPA.2017.8282198","url":null,"abstract":"The use of compressive sensing (CS) in applications with rapid spatial phase variations is difficult, since not only the magnitude but also phase regularization is required in the CS framework. In this article, we propose a novel image reconstruction scheme for MR phase varied images in which phase regularizer is not required in the rather simple CS reconstruction scheme. In our work, to improve the incoherence between the sampling matrix and the basis of the sparsifying transform, multi-scale eFREBAS transform domain thresholding was used. Reconstruction experiments showed that CS reconstruction using 8-scale eFREBAS transform can restore the magnitude and phase of images much better than the conventional method, especially at the region where phase changes rapidly","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127893490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistical-mechanical analysis of the FXLMS algorithm for multiple-channel active noise control 多通道主动噪声控制中FXLMS算法的统计力学分析
Tomoki Murata, Y. Kajikawa, S. Miyoshi
{"title":"Statistical-mechanical analysis of the FXLMS algorithm for multiple-channel active noise control","authors":"Tomoki Murata, Y. Kajikawa, S. Miyoshi","doi":"10.1109/APSIPA.2017.8282015","DOIUrl":"https://doi.org/10.1109/APSIPA.2017.8282015","url":null,"abstract":"We analyze the behaviors of the Filtered-X LMS (FXLMS) algorithm for active noise control (ANC). Correlations between the impulse response of an adaptive filter and a primary path are treated as macroscopic variables. To obtain the correlations, we analytically solve the equations and finally compute the MSE. In particular, we analyze the behaviors of multiple-channel ANC. We theoretically show that the MSE is affected by the secondary paths that are not directly connected.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127895281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure data management system with traceability against internal leakage 具有可追溯性的安全数据管理系统,防止内部泄漏
M. Kuribayashi, Takahiro Ueda, N. Funabiki
{"title":"Secure data management system with traceability against internal leakage","authors":"M. Kuribayashi, Takahiro Ueda, N. Funabiki","doi":"10.1109/APSIPA.2017.8282268","DOIUrl":"https://doi.org/10.1109/APSIPA.2017.8282268","url":null,"abstract":"The management of sensitive data in an organization is not limited to use authentication and encrytion systems. Actually, malicious users inside of an organization will leak sensitive data to adversaries if the users are privileged to access to the data. In this study, we enable a manager to identify the traitor(s) inside of an organization from the leaked data. The essential technique is the fingerprinting for encrypted data. When a user decrypts a ciphertext using the secret key assigned to the user, the decrypted data involves the information associated with the user. We propose such an access control system by combining an attribute-based encryption scheme and fingerprinting scheme. The proposed method prevents a dishonest manager from framing innocent users by realizing the asymmetric protocol using the fingerprinting scheme based on a key management.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of adaptively scaled belief in large MIMO detection for higher-order modulation 高阶调制下大MIMO检测的自适应尺度信度设计
Takumi Takahashi, S. Ibi, S. Sampei
{"title":"Design of adaptively scaled belief in large MIMO detection for higher-order modulation","authors":"Takumi Takahashi, S. Ibi, S. Sampei","doi":"10.1109/APSIPA.2017.8282325","DOIUrl":"https://doi.org/10.1109/APSIPA.2017.8282325","url":null,"abstract":"This paper proposes a new design criterion of adaptively scaled belief (ASB) in Gaussian belief propagation (GaBP), especially for large multi-user multi-input multi-output (MU-MIMO) detection with higher-order modulation. The most vital issue with regard to improving the convergence property of GaBP iterative detection is how to deal with the soft symbol outliers, which are induced by modeling errors of prior beliefs due to a lack of channel hardening effects. Unfortunately, the modeling errors become more severe in the presence of higher correlation among typical bit-wise prior beliefs while utilizing higher-order quadrature amplitude modulation (QAM) schemes. To avoid impairments of the inter-bit correlation, symbol-wise beliefs are defined for GaBP self-iterative detection. Moreover, as a simplest way to mitigate the harmful impacts of soft symbol outliers, a novel adaptive belief scaling is proposed while stabilizing dynamics of random MIMO channels. Finally, the validity of ASB for symbol-wise iterative detection is confirmed regarding suppression of the bit error rate (BER) floor level.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhanced F0 generation for GPR-based speech synthesis considering syllable-based prosodic features 考虑基于音节韵律特征的基于gpr的语音合成增强F0生成
Decha Moungsri, Tomoki Koriyama, Takao Kobayashi
{"title":"Enhanced F0 generation for GPR-based speech synthesis considering syllable-based prosodic features","authors":"Decha Moungsri, Tomoki Koriyama, Takao Kobayashi","doi":"10.1109/APSIPA.2017.8282285","DOIUrl":"https://doi.org/10.1109/APSIPA.2017.8282285","url":null,"abstract":"The conventional frame-level Gaussian process regression (GPR)-based F0 generation can produce natural sounding pitch contours. However, a frame-level model is insufficient to represent pitch patterns in longer unit, especially for syllable- level tone contours in tonal languages. This paper proposes a multi-level modeling technique for improving GPR-based F0 generation, in which syllable-level model is considered as well as the frame-level model. In the syllable-level model, we use the discrete cosine transform (DCT) coefficients extracted from log F0 contour in syllable unit as the output variables of Gaussian process. F0 contours are generated by jointly maximizing predictive distribution of frame- and syllable-level models. Experimental results of objective evaluation show improvement in F0 generation when using a small amount of training data around 30 minutes.","PeriodicalId":142091,"journal":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128535263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书