Proceedings of the 1st International Conference on Advanced Information Science and System最新文献

筛选
英文 中文
Modulation spectrum augmentation for robust speech recognition 鲁棒语音识别的调制频谱增强
Bi-Cheng Yan, Shih-Hung Liu, Berlin Chen
{"title":"Modulation spectrum augmentation for robust speech recognition","authors":"Bi-Cheng Yan, Shih-Hung Liu, Berlin Chen","doi":"10.1145/3373477.3373695","DOIUrl":"https://doi.org/10.1145/3373477.3373695","url":null,"abstract":"Data augmentation is a crucial mechanism being employed to increase the diversity of training data in order to avoid overfitting and improve robustness of statistical models in various applications. In the context of automatic speech recognition (ASR), a recent trend has been to develop effective methods to augment training speech data by warping or masking utterances based on their waveforms or spectrograms. Extending this line of research, we make attempts to explore novel ways to generate augmented training speech data, in comparison to the existing state-of-the-art approaches. The main contribution of this paper is at least two-fold. First, we propose to warp the intermediate representation of the cepstral feature vector sequence of an utterance in a holistic manner. This intermediate representation can be embodied in different modulation domains by performing discrete Fourier transform (DFT) along the either the time- or the component-axis of a cepstral feature vector sequence. Second, we also develop a two-stage augmentation approach, which successively conduct perturbation in the waveform domain and warping in different modulation domains of cepstral speech feature vector sequences, to further enhance robustness. A series of experiments are carried out on the Aurora-4 database and task, in conjunction with a typical DNN-HMM based ASR system. The proposed augmentation method that conducts warping in the component-axis modulation domain of cepstral feature vector sequences can yield a word error rate reduction (WERR) of 17.6% and 0.69%, respectively, for the clean-and multi-condition training settings. In addition, the proposed two-stage augmentation method can at best achieve a WERR of 1.13% when using the multi-condition training setup.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"59 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132770043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rank-consistency-based multi-view learning with Universum Universum基于排名一致性的多视图学习
Changming Zhu, Panhong Wang, D. Miao, Rigui Zhou
{"title":"Rank-consistency-based multi-view learning with Universum","authors":"Changming Zhu, Panhong Wang, D. Miao, Rigui Zhou","doi":"10.1145/3373477.3373700","DOIUrl":"https://doi.org/10.1145/3373477.3373700","url":null,"abstract":"In multi-view learning field, preserving data privacy is an important topic and a good solution is rank-consistency-based multi-view learning (RANC). RANC exploits view relationship and preserves data privacy simultaneously and related experiments also validate that RANC improves the individual view-specific learners with the usage of information from other views and parts of features. While performance of RANC is still limited by the insufficient of prior knowledge. Thus we introduce Universum learning into RANC to create additional unlabeled instances which provide more useful prior knowledge. The developed RANC with Universum learning is abbreviated to RANCU. Related experiments on some multi-view data sets have validated the performance of our RANCU theoretically and empirically.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125970822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of database encryption system for cloud environment 云环境下数据库加密系统的设计与实现
Luwei Zhang, Tianyu Li, Huang Jun, Dongmin Li, Bei Zhu, Jing Li
{"title":"Design and implementation of database encryption system for cloud environment","authors":"Luwei Zhang, Tianyu Li, Huang Jun, Dongmin Li, Bei Zhu, Jing Li","doi":"10.1145/3373477.3373502","DOIUrl":"https://doi.org/10.1145/3373477.3373502","url":null,"abstract":"Cloud computing has many challenges while providing near-infinite storage capacity, powerful computing power and economic benefits. Security issues are considered to be the biggest challenges facing cloud computing today. Because the server in the cloud environment is considered to be untrustworthy and does not have the authority to obtain the key, the cloud server cannot parse the encrypted data and limit the processing capability of the cloud platform. In view of the above problems, we designed the database encryption system in the cloud environment, introduced the access control module and the encryption module based on the SQL statement, developed the database encryption system using the Java language, and deployed the system in the cloud environment.. Experiments show that the cloud data server can still guarantee higher query traffic after using the encryption system to meet the needs of the actual application environment.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128812051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An empirical investigation of information quality on Saudi Arabia's government services on smart device 沙特阿拉伯智能设备政府服务信息质量实证研究
I. Zamzami
{"title":"An empirical investigation of information quality on Saudi Arabia's government services on smart device","authors":"I. Zamzami","doi":"10.1145/3373477.3373488","DOIUrl":"https://doi.org/10.1145/3373477.3373488","url":null,"abstract":"This paper presents an in-depth working progress of mobile services towards information quality on interaction tasks. Due to the drawbacks of designed Mobile government (mGovernment) especially, Saudi Arabian mGovernment in terms of order of presentation of the user navigation tasks and the sequences of sub-interactions on mobile devices, this study work on Saudi Arabian mGovernment services and investigate the factors influencing their information quality. The study employs quantitative research methodological approaches, and obtained some samples from Saudi Arabian. The data analysis findings suggest that the mobile interface design elements (context design, content design, and customization design) constitute the crucial factors determining the information quality of the mGovernment services.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125386920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time dynamic data desensitization method based on data stream 基于数据流的实时动态数据脱敏方法
Bing Tian, Shuqi Lv, Qilin Yin, Ning Li, Yue Zhang, Ziyan Liu
{"title":"Real-time dynamic data desensitization method based on data stream","authors":"Bing Tian, Shuqi Lv, Qilin Yin, Ning Li, Yue Zhang, Ziyan Liu","doi":"10.1145/3373477.3373499","DOIUrl":"https://doi.org/10.1145/3373477.3373499","url":null,"abstract":"With the rapid development of the data mining industry, the value hidden in the massive data has been discovered, but at the same time it has also raised concerns about privacy leakage, leakage of sensitive data and other issues. These problems have also become numerous studies. Among the methods for solving these problems, data desensitization technology has been widely adopted for its outstanding performance. However, with the increasing scale of data and the increasing dimension of data, the traditional desensitization method for static data can no longer meet the requirements of various industries in today's environment to protect sensitive data. In the face of ever-changing data sets of scale and dimension, static desensitization technology relies on artificially designated desensitization rules to grasp the massive data, and it is difficult to control the loss of data connotation. In response to these problems, this paper proposes a real-time dynamic desensitization method based on data flow, and combines the data anonymization mechanism to optimize the data desensitization strategy. Experiments show that this method can efficiently and stably perform real-time desensitization of stream data, and can save more information to support data mining in the next steps.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126750601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NARX model identification for analysing Amazon vegetation under climate change 气候变化下亚马逊河流域植被分析的NARX模型辨识
Angesh Anupam
{"title":"NARX model identification for analysing Amazon vegetation under climate change","authors":"Angesh Anupam","doi":"10.1145/3373477.3373701","DOIUrl":"https://doi.org/10.1145/3373477.3373701","url":null,"abstract":"The Amazon rainforest is a critical landscape and harbours a wide range of biodiversity. This is considered to be one of the largest sink for anthropogenic carbon sequestration on the Earth. Undoubtably, any substantial variation in the vegetation of this basin have tremendous impact upon the carbon absorption. Nonetheless, the impact of changing climate on the Amazon rainforest further complicates the matter. This study, for the first time, utilises the system identification method, under a wider realm of machine learning, for modelling the nonlinear dynamical relationship among the Leaf Area Index (LAI) and surface temperature for an Amazon rainforest site. The chosen model structure is Nonlinear Autoregressive with Exogenous Inputs (NARX). The training and testing datasets involved in this study correspond to the NASA Earth Observations. On contrary to the existing modelling methods performed for the Amazon, this data driven method results into a parsimonious model structure consisting of autoregressive terms as well as time lagged surface temperature. It therefore gives a deeper insights about the effects of temperature variation on the Amazon vegetation, emboldening the potential management of this crucial rainforest. A temperature dependent model also facilitates the forecasting under the various scenarios of the Intergovernmental Panel on Climate Change (IPCC).","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114845600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Block-regressed face alignment algorithm based on supervised descent method 基于监督下降法的分块回归人脸对齐算法
Yuqi Shi
{"title":"Block-regressed face alignment algorithm based on supervised descent method","authors":"Yuqi Shi","doi":"10.1145/3373477.3373697","DOIUrl":"https://doi.org/10.1145/3373477.3373697","url":null,"abstract":"In recent years, the accuracy of face alignment has been improved a lot. However, the landmarks of each component in face are trained together in most algorithms, which ignore their dedicated characteristic and limit the further accuracy improvement. In this paper, we propose a new approach to improve the localization performance of facial landmarks by taking each component as independent task instead of the whole face. Namely, independent regressors are learned for each component using the gradient descent method. If only considering independent regressors for component, the inherent correlation between the components may be neglected. This paper proposed a strategy to effectively combine the results of the whole face regression and the independent components regressions. In this way, the effect of holistic and independent results are all taken into consideration, which can further enhance the alignment accuracy. A large number of experiments show that our method is better than the single loss function in both detection accuracy and reliability.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123630727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attitude of international tourist towards ICT and digital services in tourism industry of nepal 国际游客对尼泊尔旅游业中ICT和数字服务的态度
Wenan Tan, Deepanjal Shrestha, Deepmala Shrestha, S. Jeong
{"title":"Attitude of international tourist towards ICT and digital services in tourism industry of nepal","authors":"Wenan Tan, Deepanjal Shrestha, Deepmala Shrestha, S. Jeong","doi":"10.1145/3373477.3373487","DOIUrl":"https://doi.org/10.1145/3373477.3373487","url":null,"abstract":"Tourism is the second biggest industry of Nepal and it serves as the primary source of business and employment in the country. The ICT boom around the globe has a poor state in Nepal and the country lacks behind in digital service implementations. The global pressure has forced Nepalese tourism industry and Government organizations to implement ICT to overcome global competition and meet the rising demands. These implementations lack the study and empirical evidence of consumers (International Tourist) attitude and point of view, therefore, this work carries a great significance. The work explores the attitude of International tourist for perceived risk, perceived usefulness, and perceived case of use of ICT technologies for adoption in Nepalese context. We employ exploratory research methodology with descriptive statistics to investigate the subject under consideration. A sample size of 150 international tourists based on convenience sampling is taken as primary source of data, supplemented by secondary sources which consist of reports, projects, publications and closed group interview of tourism officials and business men. The study helps Small and Medium Size Enterprises (SMEs) and business houses of Nepal to devise plans and strategies for growth and implementations in ICT and Digital services. The study also fulfills the gap in the literature and serves as a knowledge base for tourism officials, business houses, policy makers, bankers, digital companies, tourism authorities and consumers.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and development of intelligent safe storage cabinet management system 智能保险箱柜体管理系统的研究与开发
Jian Zheng, Zhiyi Chen
{"title":"Research and development of intelligent safe storage cabinet management system","authors":"Jian Zheng, Zhiyi Chen","doi":"10.1145/3373477.3373482","DOIUrl":"https://doi.org/10.1145/3373477.3373482","url":null,"abstract":"This paper mainly takes the present safe storage cabinet as the research object, carries on the research and the development. Through communicating requirements with enterprises, a set of intelligent safe storage cabinet management system developed to realize centralized management of safe storage cabinet and solve the problem of integrated control of chemical management information and detection information of multiple safe storage cabinets. The system consists of hardware and software. The main functions of the software are various gas detection, temperature and humidity detection, personnel management, chemical use management, alarm and related equipment control. The hardware mainly consists of control center, access control identification, security storage cabinet control, air conditioning control, filtering, and exhaust control and alarm device. The intelligent safety storage cabinet management system solves the complexity of chemical management in large chemical enterprises and greatly improves the work efficiency. With high safety and reliability, the system can understand the status of each storage cabinet in the chemical warehouse in real time and deal with emergencies in time. In the realization of chemical role of information management. The intelligent management of safe storage cabinets in chemical warehouses can achieve real-time control and other aspects have certain innovation.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131122407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impacts of adversarial inputs in associative memory models and its iterative learning variants 对抗性输入对联想记忆模型及其迭代学习变体的影响
V. Venkoparao, Saurav Musunuru, R. Dubey
{"title":"Impacts of adversarial inputs in associative memory models and its iterative learning variants","authors":"V. Venkoparao, Saurav Musunuru, R. Dubey","doi":"10.1145/3373477.3373698","DOIUrl":"https://doi.org/10.1145/3373477.3373698","url":null,"abstract":"Adversarial attacks have always been a bane to neural networks. Most of the research focus is on adversarial networks and its defence for deep neural networks. Associative memory models are different class of neural models used in image recognition tasks. There are fundamental differences between Deep neural networks and Associative memory models in terms of the learning procedures. These fundamental differences in turn have different effects on adversarial attacks. In this paper we have attempted an empirical study on various flavors of an associative memory models viz.Hopfield model and two different forms of iterative learning rules and its resilience towards an adversarial attack.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114790395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信