2,587 research outputs found

    Representation Selective Self-distillation and wav2vec 2.0 Feature Exploration for Spoof-aware Speaker Verification

    Full text link
    Text-to-speech and voice conversion studies are constantly improving to the extent where they can produce synthetic speech almost indistinguishable from bona fide human speech. In this regrad, the importance of countermeasures (CM) against synthetic voice attacks of the automatic speaker verification (ASV) systems emerges. Nonetheless, most end-to-end spoofing detection networks are black box systems, and the answer to what is an effective representation for finding artifacts still remains veiled. In this paper, we examine which feature space can effectively represent synthetic artifacts using wav2vec 2.0, and study which architecture can effectively utilize the space. Our study allows us to analyze which attribute of speech signals is advantageous for the CM systems. The proposed CM system achieved 0.31% equal error rate (EER) on ASVspoof 2019 LA evaluation set for the spoof detection task. We further propose a simple yet effective spoofing aware speaker verification (SASV) methodology, which takes advantage of the disentangled representations from our countermeasure system. Evaluation performed with the SASV Challenge 2022 database show 1.08% of SASV EER. Quantitative analysis shows that using the explored feature space of wav2vec 2.0 advantages both spoofing CM and SASV.Comment: Submitted to Interspeech 202

    Parameter Conditions for Global Stability of FAST TCP

    Get PDF
    In this letter, we study the global asymptotic stability of FAST TCP in the presence of network feedback delays. Based on a continuous-time dynamic model of FAST TCP and a static approximation of queuing delay at the link, we derive stability conditions for FAST TCP. The derived conditions are explicitly appeared as tuning parameter conditions of FAST TCP, and hence can be satisfied in a distributed way. The simulation results illustrate the validity of the conditions for the global asymptotic stability

    Atypical Development of Children from Multicultural Families in Korean Rural Areas

    Get PDF
    AbstractThe aim of this study was to explore overall developmental status of young children from multicultural families. 290 kindergarten children were involved (147 from multicultural families and 143 from typical Korean families). The result indicated significantly lower levels of performance on overall development of children from multicultural families than children from typical Korean families. It also suggested that delayed language development of children from multicultural families negatively affected their cognitive development, which then influenced higher aggression indirectly through their low self-respect and low self-control. These findings indicated latent atypical development of children from multicultural families

    Aspirin Has Antitumor Effects via Expression of Calpain Gene in Cervical Cancer Cells

    Get PDF
    Aspirin and other nonsteroidal anti-inflammatory drugs show efficacy in the prevention of cancers. It is known that they can inhibit cyclooxygenases, and some studies have shown that they can induce apoptosis. Our objective in this study was to investigate the mechanism by which aspirin exerts its apoptosis effects in human cervical cancer HeLa cells. The effect of aspirin on the gene expression was studied by differential mRNA display RT-PCR. Among the isolated genes, mu-type calpain gene was upregulated by aspirin treatment. To examine whether calpain mediates the antitumor effects, HeLa cells were stably transfected with the mammalian expression vector pCR3.1 containing mu-type calpain cDNA (pCRCAL/HeLa), and tumor formations were measured in nude mice. When tumor burden was measured by day 49, HeLa cells and pCR/HeLa cells (vector control) produced tumors of 2126 mm3 and 1638 mm3, respectively, while pCRCAL/HeLa cells produced markedly smaller tumor of 434 mm3 in volume. The caspase-3 activity was markedly elevated in pCRCAL/HeLa cells. The increased activity levels of caspase-3 in pCRCAL/HeLa cells, in parallel with the decreased tumor formation, suggest a correlation between caspase-3 activity and calpain protein. Therefore, we conclude that aspirin-induced calpain mediates an antitumor effect via caspase-3 in cervical cancer cells

    Lucas based el-gamal cryptosystem in the elliptic curve group over finite field under lenstras attack

    Get PDF
    This paper reports on a Lenstra’s attack against the Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field. Lenstra’s attack is an attack to recover the secret factor of the order of elliptic curve group from a faulty signature. Results show that the success of the Lenstra’s attack depend on cryptographic algorithm implementation practice rather than the weakness of the cryptosystem itsel

    Logistics Decision Model for Environmental Aspect using the Analytic Network Process

    Get PDF
    Green supply chain management has appeared as an essential strategy for enhancing environmental performance ofprocesses, structures, and products accordingly to address regulatory and competitive forces. Korean firms lag in greenlogistics activities relative to ‘green’ leading companies in advanced countries. Thus, few papers have identified andinvestigated green supply chain systems within South Korea. To further understand how some Korean firms may wish tofurther develop green logistics and supply chain practices, this paper explores a decision making framework of GreenLogistics by using ANP (analytic network process). We derived 5 clusters and 21 components forming the strategic greenlogistics, and then conducted surveys for pairwise comparison of experts on Green Logistics in Korean firms, and computedrelative weights of the clusters. Our findings indicate that Green Logistics would be very helpful for managers to adjust theirstrategic decisions for green supply chain management. The technique proposed in this paper may be generalized to othercountries with the framework developed not unique to just Korean industry

    Global Stability of FAST TCP in Single-Link Single-Source Network

    Get PDF
    We consider a single-link single-source network with FAST TCP source, and propose a static approximation of queuing delay dynamics at the link. The static approximation turns out to be a form with network feedback delay, which enables to analyze FAST TCP reflecting the effect of network feedback delay. Based on a continuous-time dynamic model of FAST TCP, we achieve the boundedness of window size and a sufficient condition for global asymptotic stability. The simulation results illustrate the validity of the sufficient condition for global asymptotic stability

    On the common modulus attack into the LUC4,6 cryptosystem

    Get PDF
    The LUC4,6 cryptosystem is a system analogy with RSA cryptosystem and extended from LUC and LUC3 cryptosystems. The process of encryption and decryption are derived from the fourth order linear recurrence sequence and based on Lucas function. This paper reports an investigation into the common modulus attack on the LUC4,6 cryptosystem. In general, the common modulus attack will be succeeded if the sender sends the plaintext to two users used same RSA-modulus and both of encryption keys of them are relatively prime to each other. However, based on the characteristics of high order Lucas sequence, the LUC4,6 cryptosystem is unattackable

    A method to decrease computation time for fourth order Lucas sequence

    Get PDF
    The fourth order Lucas sequence is a linear recurrence relation related to quartic polynomial and based on Lucas function. This sequence had been used to develop the LUC4,6 cryptosystem. As we know, the efficiency is one of the crucial parts of the cryptosystem and it is depended on computation time for Lucas sequence which is used to develop the process encryption and decryption in the LUC4.6 cryptosystem. In this paper, a method will be proposed to decrease the computation time for fourth order Lucas sequence. This method omits some terms of the sequence to decrease the computation time. Thus, if the LUC4,6 cryptosystem is using this method to compute the plaintexts and cipher texts, then the computation time had been decreased
    corecore