1,580 research outputs found

    Effects of Convolutional Autoencoder Bottleneck Width on StarGAN-based Singing Technique Conversion

    Full text link
    Singing technique conversion (STC) refers to the task of converting from one voice technique to another while leaving the original singer identity, melody, and linguistic components intact. Previous STC studies, as well as singing voice conversion research in general, have utilized convolutional autoencoders (CAEs) for conversion, but how the bottleneck width of the CAE affects the synthesis quality has not been thoroughly evaluated. To this end, we constructed a GAN-based multi-domain STC system which took advantage of the WORLD vocoder representation and the CAE architecture. We varied the bottleneck width of the CAE, and evaluated the conversion results subjectively. The model was trained on a Mandarin dataset which features four singers and four singing techniques: the chest voice, the falsetto, the raspy voice, and the whistle voice. The results show that a wider bottleneck corresponds to better articulation clarity but does not necessarily lead to higher likeness to the target technique. Among the four techniques, we also found that the whistle voice is the easiest target for conversion, while the other three techniques as a source produce more convincing conversion results than the whistle.Comment: The original edition of this paper will be published in the CMMR 2023 Proceedings. This ArXiv publication is a cop

    An Image Retrieval System Based on the Color Complexity of Images

    Get PDF
    The fuzzy color histogram (FCH) spreads each pixel's total membership value to all histogram bins based on their color similarity. The FCH is insensitive to quantization errors. However, the FCH can state only the global properties of an image rather than the local properties. For example, it cannot depict the color complexity of an image. To characterize the color complexity of an image, this paper presents two image features -- the color variances among adjacent segments (CVAAS) and the color variances of the pixels within an identical segment (CVPWIS). Both features can explain not only the color complexity but also the principal pixel colors of an image. Experimental results show that the CVAAS and CVPWIS based image retrieval systems can provide a high accuracy rate for finding out the database images that satisfy the users' requirement. Moreover, both systems can also resist the scale variances of images as well as the shift and rotation variances of segments in images

    Alcohol Use, Abuse, and Dependency in Shanghai

    Get PDF
    The use of alcohol for social and ceremonial occasions was recorded in Chinese history as early as 1760 B.C. during the Yin Dynasty (Ci-Hai Encyclopedia, 1979:936). The cultural tradition of ancient China placed alcoholic beverages at the center of social occasions, which presumably was the origin of the adage: Without wine, there is no li (or etiquette). Thus, the use of alcoholic beverages has always been accompanied by the concept of propriety and the discharging of one\u27s role obligations m social functions, rather than that of personal indulgence

    Domain-Generalized Face Anti-Spoofing with Unknown Attacks

    Full text link
    Although face anti-spoofing (FAS) methods have achieved remarkable performance on specific domains or attack types, few studies have focused on the simultaneous presence of domain changes and unknown attacks, which is closer to real application scenarios. To handle domain-generalized unknown attacks, we introduce a new method, DGUA-FAS, which consists of a Transformer-based feature extractor and a synthetic unknown attack sample generator (SUASG). The SUASG network simulates unknown attack samples to assist the training of the feature extractor. Experimental results show that our method achieves superior performance on domain generalization FAS with known or unknown attacks.Comment: IEEE International Conference on Image Processing (ICIP 2023

    Activation of Sp1-mediated transcription by Rta of Epstein–Barr virus via an interaction with MCAF1

    Get PDF
    Rta is a transcription factor encoded by BRLF1 of the Epstein–Barr virus (EBV). This factor is expressed during the immediate-early stage of the lytic cycle to activate the genes required for EBV lytic development. Although transcription activation by Rta is frequently associated with the binding of Rta to the Rta-response element (RRE) in promoters, Rta sometimes activates promoters without an RRE. Here we show that Rta interacts with an Sp1-interacting protein, MBD1-containing chromatin-associated factor 1 (MCAF1). This interaction is critical to the formation of an Sp1–MCAF1–Rta complex at Sp1 sites. Therefore, following lytic induction and the expression of Rta, Rta increases Sp1-mediated transcription. The genes that are thus activated include p16, p21, SNRPN and BRLF1. However, the binding of Rta to RRE prevents the interaction between Rta and MCAF1; therefore, transcription activation by RRE depends only on Rta, and not on MCAF1 or Sp1. Furthermore, this study finds that MCAF1 promotes the expression of Rta and Zta from EBV, indicating that MCAF1 participates EBV lytic activation. Our study documents the critical role of Rta in regulating the transcription of the genes that are mediated by Sp1

    Square Key Matrix Management Scheme in Wireless Sensor Networks

    Get PDF
    In this paper we propose a symmetric cryptographic approach named Square Key Matrix Management Scheme (SKMaS) in which a sensor node named Key Distribution Server (KDS) is responsible for the security of key management. When the system starts up, the KDS sends its individual key and two sets of keys to sensor nodes. With the IDs, any two valid sensor nodes, e.g. i and j, can individually identify the corresponding communication keys (CKs) to derive a dynamic shared key (DSK) for encrypting/decrypting messages transmitted between them. When i leaves the underlying network, the CKs and the individually keys currently utilized by i can be reused by a newly joining sensor, e.g. h. However, when h joins the network, if no such previously-used IDs are available, h will be given a new ID, CKs and the individually key by the KDS. The KDS encrypts the CKs, with which an existing node q can communicate with h, with individual key so that only q rather than h can correctly decrypt the CKs. The lemmas and security analyses provided in this paper prove that the proposed system can protect at least three common attacks

    Clinical Study The Clinical Investigation of Disparity of Utility Values Associated with Gallstone Disease: A Pilot Study

    Get PDF
    . Purpose. The utility evaluation was an effective method to incorporate all of the contributing variables for multiple diseases into one outcome measure. A cross-sectional study was conducted to assess the utility values associated with varying states of gallstone disease among outpatient clinics participants at a teaching hospital in Taipei, Taiwan. Methods. The utility values were measured by using time trade-off method. A total of 120 outpatient clinics participants (30 subjects with no gallstone disease, 30 subjects with single stone, 30 subjects with multiple stones, and 30 subjects with cholecystectomy) evaluated utility values from January 1, 2006 to December 31, 2006. The diagnosis of gallstone disease was performed by a panel of specialists using ultrasound sonography. Results. The overall mean utility value was 0.89 ± 0.13 (95% CI: 0.87-0.91) indicating that study participants were willing to trade about 11% (95% CI: 9-13%) of their remaining life in return for being free of gallstone disease perpetually. The significant associated factors of utility values based on the multiple linear regression analysis were older age and different degrees of gallstone disease. Conclusion. Our results found that in addition to older age, multiple stones and cholecystectomy could influence utility values from the patient's preference-based viewpoint

    The Clinical Investigation of Disparity of Utility Values Associated with Gallstone Disease: A Pilot Study

    Get PDF
    Purpose. The utility evaluation was an effective method to incorporate all of the contributing variables for multiple diseases into one outcome measure. A cross-sectional study was conducted to assess the utility values associated with varying states of gallstone disease among outpatient clinics participants at a teaching hospital in Taipei, Taiwan. Methods. The utility values were measured by using time trade-off method. A total of 120 outpatient clinics participants (30 subjects with no gallstone disease, 30 subjects with single stone, 30 subjects with multiple stones, and 30 subjects with cholecystectomy) evaluated utility values from January 1, 2006 to December 31, 2006. The diagnosis of gallstone disease was performed by a panel of specialists using ultrasound sonography. Results. The overall mean utility value was 0.89±0.13 (95% CI: 0.87–0.91) indicating that study participants were willing to trade about 11% (95% CI: 9–13%) of their remaining life in return for being free of gallstone disease perpetually. The significant associated factors of utility values based on the multiple linear regression analysis were older age and different degrees of gallstone disease. Conclusion. Our results found that in addition to older age, multiple stones and cholecystectomy could influence utility values from the patient’s preference-based viewpoint
    • …
    corecore