100 research outputs found

    Beyond Universal Transformer: block reusing with adaptor in Transformer for automatic speech recognition

    Full text link
    Transformer-based models have recently made significant achievements in the application of end-to-end (E2E) automatic speech recognition (ASR). It is possible to deploy the E2E ASR system on smart devices with the help of Transformer-based models. While these models still have the disadvantage of requiring a large number of model parameters. To overcome the drawback of universal Transformer models for the application of ASR on edge devices, we propose a solution that can reuse the block in Transformer models for the occasion of the small footprint ASR system, which meets the objective of accommodating resource limitations without compromising recognition accuracy. Specifically, we design a novel block-reusing strategy for speech Transformer (BRST) to enhance the effectiveness of parameters and propose an adapter module (ADM) that can produce a compact and adaptable model with only a few additional trainable parameters accompanying each reusing block. We conducted an experiment with the proposed method on the public AISHELL-1 corpus, and the results show that the proposed approach achieves the character error rate (CER) of 9.3%/6.63% with only 7.6M/8.3M parameters without and with the ADM, respectively. In addition, we also make a deeper analysis to show the effect of ADM in the general block-reusing method

    Analysis of Regional Differences and Influencing Factors on China’s Carbon Emission Efficiency in 2005–2015

    Get PDF
    With the challenge to reach targets of carbon emission reduction at the regional level, it is necessary to analyze the regional differences and influencing factors on China’s carbon emission efficiency. Based on statistics from 2005 to 2015, carbon emission efficiency and the differences in 30 provinces of China were rated by the Modified Undesirable Epsilon-based measure (EBM) Data Envelopment Analysis (DEA) Model. Additionally, we further analyzed the influencing factors of carbon emission efficiency’s differences in the Tobit model. We found that the overall carbon emission efficiency was relatively low in China. The level of carbon emission efficiency is the highest in the East region, followed by the Central and West regions. As for the influencing factors, industrial structure, external development, and science and technology level had a significant positive relationship with carbon emission efficiency, whereas government intervention and energy intensity demonstrated a negative correlation with carbon emission efficiency. The contributions of this paper include two aspects. First, we used the Modified Undesirable EBM DEA Model, which is more accurate than traditional methods. Secondly, based on the data’s unit root testing and cointegration, the paper verified the influencing factors of carbon emission efficiency by the Tobit model, which avoids the spurious regression. Based on the results, we also provide several policy implications for policymakers to improve carbon emission efficiency in different regions

    Mechanisms of Two Modulatory Actions of the Channel-binding Protein Slob on the Drosophila Slowpoke Calcium-dependent Potassium Channel

    Get PDF
    Slob57 is an ion channel auxiliary protein that binds to and modulates the Drosophila Slowpoke calcium-dependent potassium channel (dSlo). We reported recently that residues 1–39 of Slob57 comprise the key domain that both causes dSlo inactivation and shifts its voltage dependence of activation to more depolarized voltages. In the present study we show that removal of residues 2–6 from Slob57 abolishes the inactivation, but the ability of Slob57 to rightward shift the voltage dependence of activation of dSlo remains. A synthetic peptide corresponding in sequence to residues 1–6 of Slob57 blocks dSlo in a voltage- and dose-dependent manner. Two Phe residues and at least one Lys residue in this peptide are required for the blocking action. These data indicate that the amino terminus of Slob57 directly blocks dSlo, thereby leading to channel inactivation. Further truncation to residue Arg16 eliminates the modulation of voltage dependence of activation. Thus these two modulatory actions of Slob57 are independent. Mutation within the calcium bowl of dSlo greatly reduces its calcium sensitivity (Bian, S., I. Favre, and E. Moczydlowski. 2001. Proc. Natl. Acad. Sci. USA. 98:4776–4781). We found that Slob57 still causes inactivation of this mutant channel, but does not shift its voltage dependence of activation. This result confirms further the independence of the inactivation and the voltage shift produced by Slob57. It also suggests that the voltage shift requires high affinity Ca2+ binding to an intact calcium bowl. Furthermore, Slob57 inhibits the shift in the voltage dependence of activation of dSlo evoked by Ca2+, and this inhibition by Slob57 is greater at higher free Ca2+ concentrations. These results implicate distinct calcium-dependent and -independent mechanisms in the modulation of dSlo by Slob

    Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud

    Get PDF
    The redundant of multimedia data made an unnecessary waste in encrypted cloud storage, unlike text with completely consistent content, multimedia data allows a certain degree of similarity in deduplication, In this work, we focus on the multimedia data which takes a seriously proportion of storage in scenarios such as data outsourcing to propose secure fuzzy deduplication without the additional servers based on Convergent Encryption(CE), say the Single-server Fuzzy Deduplication (SSFD). Compared to the related fuzzy deduplication, SSFD is strong at resisting brute-force attacks caused by server-server collusion, moreover, we also put server-client collusion attacks into security solutions. Additionally, to enhance the security of data, the proposed scheme provides both protection against replay attacks and verification of label consistency and adds no extra communication such as Proof of Ownership(PoW) in interaction. We separately presented a formal security analysis and performed performance at last to prove security solutions and evaluate the experimental results, it shows SSFD provides both a reliable fuzzy images secure deduplication protocol and a computationally feasible solution

    Secure Batch Deduplication Without Dual Servers in Backup System

    Get PDF
    Cloud storage provides highly available and low cost resources to users. However, as massive amounts of outsourced data grow rapidly, an effective data deduplication scheme is necessary. This is a hot and challenging field, in which there are quite a few researches. However, most of previous works require dual-server fashion to be against brute-force attacks and do not support batch checking. It is not practicable for the massive data stored in the cloud. In this paper, we present a secure batch deduplication scheme for backup system. Besides, our scheme resists the brute-force attacks without the aid of other servers. The core idea of the batch deduplication is to separate users into different groups by using short hashes. Within each group, we leverage group key agreement and symmetric encryption to achieve secure batch checking and semantically secure storage. We also extensively evaluate its performance and overhead based on different datasets. We show that our scheme saves the data storage by up to 89.84%. These results show that our scheme is efficient and scalable for cloud backup system and can also ensure data confidentiality

    Long-term trends in the burden of edentulism in China over three decades: A Joinpoint regression and age-period-cohort analysis based on the global burden of disease study 2019

    Get PDF
    BackgroundTo investigate secular trends in edentulism incidence, prevalence, and years lived with disability (YLDs) rates in Chinese men and women from 1990 to 2019.MethodsData were obtained from the Global Burden of Disease Study 2019. The annual percentage change and average annual percentage change were calculated using Joinpoint regression analysis. The age-period-cohort (APC) analysis estimated the independent age, period, and cohort effects.ResultsFrom 1990 to 2019, the crude incidence, prevalence, and YLDs of edentulism in the Chinese population increased year by year, while the age-standardized incidence, prevalence, and YLDs decreased, and the latter was higher in women than in men. The APC analysis showed that the age effect increased in men and women from age 20 to 74 and decreased thereafter. The risk of tooth loss increased with age. However, the relationship was not linear. The temporal effect showed a gradual increase; the risk of missing teeth gradually increased with the changing modern living environment. The cohort effect showed a single decreasing trend, with the early birth cohort having a higher risk of tooth loss than the later birth cohort population. The age, period, and cohort effects were consistent for both sexes.ConclusionAlthough the standardized incidence, prevalence, and YLD rate and cohort effect of dentition loss in China are declining, they are still causing a severe burden to China due to the continued aging of the population and the rising period effect. Despite the decreasing trends of the standardized incidence and prevalence of dentition loss and the rate of YLDs, China should develop more effective oral disease prevention and control strategies to reduce the increasing burden of edentulism in the older adult, especially in older women

    Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency

    Get PDF
    Efficiently and securely removing encrypted redundant data with cross-user in the cloud is challenging. Convergent Encryption (CE) is difficult to resist dictionary attacks for its deterministic tag. Server-aided mechanism is against such attacks while it may exist collusion. Focus on multimedia data, this paper proposes an efficient and secure fuzzy deduplication system without any additional servers. We also propose a notion of preverification of label consistency to compensate for the irreparable post-verification loss. Compared with other fuzzy deduplication schemes, our work has apparent advantages in deduplication efficiency and security based on a natural data set
    • …
    corecore