{"title":"Modulation spectrum augmentation for robust speech recognition","authors":"Bi-Cheng Yan, Shih-Hung Liu, Berlin Chen","doi":"10.1145/3373477.3373695","DOIUrl":"https://doi.org/10.1145/3373477.3373695","url":null,"abstract":"Data augmentation is a crucial mechanism being employed to increase the diversity of training data in order to avoid overfitting and improve robustness of statistical models in various applications. In the context of automatic speech recognition (ASR), a recent trend has been to develop effective methods to augment training speech data by warping or masking utterances based on their waveforms or spectrograms. Extending this line of research, we make attempts to explore novel ways to generate augmented training speech data, in comparison to the existing state-of-the-art approaches. The main contribution of this paper is at least two-fold. First, we propose to warp the intermediate representation of the cepstral feature vector sequence of an utterance in a holistic manner. This intermediate representation can be embodied in different modulation domains by performing discrete Fourier transform (DFT) along the either the time- or the component-axis of a cepstral feature vector sequence. Second, we also develop a two-stage augmentation approach, which successively conduct perturbation in the waveform domain and warping in different modulation domains of cepstral speech feature vector sequences, to further enhance robustness. A series of experiments are carried out on the Aurora-4 database and task, in conjunction with a typical DNN-HMM based ASR system. The proposed augmentation method that conducts warping in the component-axis modulation domain of cepstral feature vector sequences can yield a word error rate reduction (WERR) of 17.6% and 0.69%, respectively, for the clean-and multi-condition training settings. In addition, the proposed two-stage augmentation method can at best achieve a WERR of 1.13% when using the multi-condition training setup.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"59 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132770043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rank-consistency-based multi-view learning with Universum","authors":"Changming Zhu, Panhong Wang, D. Miao, Rigui Zhou","doi":"10.1145/3373477.3373700","DOIUrl":"https://doi.org/10.1145/3373477.3373700","url":null,"abstract":"In multi-view learning field, preserving data privacy is an important topic and a good solution is rank-consistency-based multi-view learning (RANC). RANC exploits view relationship and preserves data privacy simultaneously and related experiments also validate that RANC improves the individual view-specific learners with the usage of information from other views and parts of features. While performance of RANC is still limited by the insufficient of prior knowledge. Thus we introduce Universum learning into RANC to create additional unlabeled instances which provide more useful prior knowledge. The developed RANC with Universum learning is abbreviated to RANCU. Related experiments on some multi-view data sets have validated the performance of our RANCU theoretically and empirically.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125970822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luwei Zhang, Tianyu Li, Huang Jun, Dongmin Li, Bei Zhu, Jing Li
{"title":"Design and implementation of database encryption system for cloud environment","authors":"Luwei Zhang, Tianyu Li, Huang Jun, Dongmin Li, Bei Zhu, Jing Li","doi":"10.1145/3373477.3373502","DOIUrl":"https://doi.org/10.1145/3373477.3373502","url":null,"abstract":"Cloud computing has many challenges while providing near-infinite storage capacity, powerful computing power and economic benefits. Security issues are considered to be the biggest challenges facing cloud computing today. Because the server in the cloud environment is considered to be untrustworthy and does not have the authority to obtain the key, the cloud server cannot parse the encrypted data and limit the processing capability of the cloud platform. In view of the above problems, we designed the database encryption system in the cloud environment, introduced the access control module and the encryption module based on the SQL statement, developed the database encryption system using the Java language, and deployed the system in the cloud environment.. Experiments show that the cloud data server can still guarantee higher query traffic after using the encryption system to meet the needs of the actual application environment.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128812051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An empirical investigation of information quality on Saudi Arabia's government services on smart device","authors":"I. Zamzami","doi":"10.1145/3373477.3373488","DOIUrl":"https://doi.org/10.1145/3373477.3373488","url":null,"abstract":"This paper presents an in-depth working progress of mobile services towards information quality on interaction tasks. Due to the drawbacks of designed Mobile government (mGovernment) especially, Saudi Arabian mGovernment in terms of order of presentation of the user navigation tasks and the sequences of sub-interactions on mobile devices, this study work on Saudi Arabian mGovernment services and investigate the factors influencing their information quality. The study employs quantitative research methodological approaches, and obtained some samples from Saudi Arabian. The data analysis findings suggest that the mobile interface design elements (context design, content design, and customization design) constitute the crucial factors determining the information quality of the mGovernment services.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125386920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bing Tian, Shuqi Lv, Qilin Yin, Ning Li, Yue Zhang, Ziyan Liu
{"title":"Real-time dynamic data desensitization method based on data stream","authors":"Bing Tian, Shuqi Lv, Qilin Yin, Ning Li, Yue Zhang, Ziyan Liu","doi":"10.1145/3373477.3373499","DOIUrl":"https://doi.org/10.1145/3373477.3373499","url":null,"abstract":"With the rapid development of the data mining industry, the value hidden in the massive data has been discovered, but at the same time it has also raised concerns about privacy leakage, leakage of sensitive data and other issues. These problems have also become numerous studies. Among the methods for solving these problems, data desensitization technology has been widely adopted for its outstanding performance. However, with the increasing scale of data and the increasing dimension of data, the traditional desensitization method for static data can no longer meet the requirements of various industries in today's environment to protect sensitive data. In the face of ever-changing data sets of scale and dimension, static desensitization technology relies on artificially designated desensitization rules to grasp the massive data, and it is difficult to control the loss of data connotation. In response to these problems, this paper proposes a real-time dynamic desensitization method based on data flow, and combines the data anonymization mechanism to optimize the data desensitization strategy. Experiments show that this method can efficiently and stably perform real-time desensitization of stream data, and can save more information to support data mining in the next steps.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126750601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NARX model identification for analysing Amazon vegetation under climate change","authors":"Angesh Anupam","doi":"10.1145/3373477.3373701","DOIUrl":"https://doi.org/10.1145/3373477.3373701","url":null,"abstract":"The Amazon rainforest is a critical landscape and harbours a wide range of biodiversity. This is considered to be one of the largest sink for anthropogenic carbon sequestration on the Earth. Undoubtably, any substantial variation in the vegetation of this basin have tremendous impact upon the carbon absorption. Nonetheless, the impact of changing climate on the Amazon rainforest further complicates the matter. This study, for the first time, utilises the system identification method, under a wider realm of machine learning, for modelling the nonlinear dynamical relationship among the Leaf Area Index (LAI) and surface temperature for an Amazon rainforest site. The chosen model structure is Nonlinear Autoregressive with Exogenous Inputs (NARX). The training and testing datasets involved in this study correspond to the NASA Earth Observations. On contrary to the existing modelling methods performed for the Amazon, this data driven method results into a parsimonious model structure consisting of autoregressive terms as well as time lagged surface temperature. It therefore gives a deeper insights about the effects of temperature variation on the Amazon vegetation, emboldening the potential management of this crucial rainforest. A temperature dependent model also facilitates the forecasting under the various scenarios of the Intergovernmental Panel on Climate Change (IPCC).","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114845600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Block-regressed face alignment algorithm based on supervised descent method","authors":"Yuqi Shi","doi":"10.1145/3373477.3373697","DOIUrl":"https://doi.org/10.1145/3373477.3373697","url":null,"abstract":"In recent years, the accuracy of face alignment has been improved a lot. However, the landmarks of each component in face are trained together in most algorithms, which ignore their dedicated characteristic and limit the further accuracy improvement. In this paper, we propose a new approach to improve the localization performance of facial landmarks by taking each component as independent task instead of the whole face. Namely, independent regressors are learned for each component using the gradient descent method. If only considering independent regressors for component, the inherent correlation between the components may be neglected. This paper proposed a strategy to effectively combine the results of the whole face regression and the independent components regressions. In this way, the effect of holistic and independent results are all taken into consideration, which can further enhance the alignment accuracy. A large number of experiments show that our method is better than the single loss function in both detection accuracy and reliability.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123630727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenan Tan, Deepanjal Shrestha, Deepmala Shrestha, S. Jeong
{"title":"Attitude of international tourist towards ICT and digital services in tourism industry of nepal","authors":"Wenan Tan, Deepanjal Shrestha, Deepmala Shrestha, S. Jeong","doi":"10.1145/3373477.3373487","DOIUrl":"https://doi.org/10.1145/3373477.3373487","url":null,"abstract":"Tourism is the second biggest industry of Nepal and it serves as the primary source of business and employment in the country. The ICT boom around the globe has a poor state in Nepal and the country lacks behind in digital service implementations. The global pressure has forced Nepalese tourism industry and Government organizations to implement ICT to overcome global competition and meet the rising demands. These implementations lack the study and empirical evidence of consumers (International Tourist) attitude and point of view, therefore, this work carries a great significance. The work explores the attitude of International tourist for perceived risk, perceived usefulness, and perceived case of use of ICT technologies for adoption in Nepalese context. We employ exploratory research methodology with descriptive statistics to investigate the subject under consideration. A sample size of 150 international tourists based on convenience sampling is taken as primary source of data, supplemented by secondary sources which consist of reports, projects, publications and closed group interview of tourism officials and business men. The study helps Small and Medium Size Enterprises (SMEs) and business houses of Nepal to devise plans and strategies for growth and implementations in ICT and Digital services. The study also fulfills the gap in the literature and serves as a knowledge base for tourism officials, business houses, policy makers, bankers, digital companies, tourism authorities and consumers.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and development of intelligent safe storage cabinet management system","authors":"Jian Zheng, Zhiyi Chen","doi":"10.1145/3373477.3373482","DOIUrl":"https://doi.org/10.1145/3373477.3373482","url":null,"abstract":"This paper mainly takes the present safe storage cabinet as the research object, carries on the research and the development. Through communicating requirements with enterprises, a set of intelligent safe storage cabinet management system developed to realize centralized management of safe storage cabinet and solve the problem of integrated control of chemical management information and detection information of multiple safe storage cabinets. The system consists of hardware and software. The main functions of the software are various gas detection, temperature and humidity detection, personnel management, chemical use management, alarm and related equipment control. The hardware mainly consists of control center, access control identification, security storage cabinet control, air conditioning control, filtering, and exhaust control and alarm device. The intelligent safety storage cabinet management system solves the complexity of chemical management in large chemical enterprises and greatly improves the work efficiency. With high safety and reliability, the system can understand the status of each storage cabinet in the chemical warehouse in real time and deal with emergencies in time. In the realization of chemical role of information management. The intelligent management of safe storage cabinets in chemical warehouses can achieve real-time control and other aspects have certain innovation.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131122407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impacts of adversarial inputs in associative memory models and its iterative learning variants","authors":"V. Venkoparao, Saurav Musunuru, R. Dubey","doi":"10.1145/3373477.3373698","DOIUrl":"https://doi.org/10.1145/3373477.3373698","url":null,"abstract":"Adversarial attacks have always been a bane to neural networks. Most of the research focus is on adversarial networks and its defence for deep neural networks. Associative memory models are different class of neural models used in image recognition tasks. There are fundamental differences between Deep neural networks and Associative memory models in terms of the learning procedures. These fundamental differences in turn have different effects on adversarial attacks. In this paper we have attempted an empirical study on various flavors of an associative memory models viz.Hopfield model and two different forms of iterative learning rules and its resilience towards an adversarial attack.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114790395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}