GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Multimedia systems-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (369 pages)
    Edition: 1st ed.
    ISBN: 9783030037482
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.110
    DDC: 006.7
    Language: English
    Note: Intro -- Preface -- Conference Organization -- Conference Founders -- Honorary Chairs -- Advisory Committee -- General Chairs -- Program Chairs -- Invited Session Chairs -- Publication Chairs -- Electronic Media Chairs -- Finance Chair -- Program Committee Members -- Contents -- Health Informatics, Intelligent Data Hiding, and Deep Learning for Information Hiding -- An Improved High-Capacity ECG Steganography with Smart Offset Coefficients -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Bit Embedding -- 3.2 Bit Extraction -- 3.3 Alterative High-Perceived Quality Approach -- 4 Experimental Results -- 5 Conclusion -- References -- Preview-Versioned Essential Secret Image Sharing -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 3 Experimental Results and Comparisons -- 4 Conclusions -- References -- Visual Cryptography with QR-Code Transparencies -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 3 Experimental Results -- 4 Conclusions -- References -- Solving the Multiple Charging Vehicles Scheduling Problem for Wireless Rechargeable Sensor Networks Using Cuckoo Search Approach -- Abstract -- 1 Introduction -- 2 Related Works -- 3 The Proposed Method -- 3.1 Objective Function -- 3.2 Nest Representation -- 3.3 K-center Grouping -- 4 Experimental Results and Comparisons -- 5 Conclusions -- References -- An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function -- Abstract -- 1 Introduction -- 2 A Steganography Algorithm Based on PBVD -- 3 Analysis and Discussion of Algorithm Examples -- 4 Experiments and Analysis -- 4.1 Algorithm Embedded Capacity -- 4.2 Secret Digital Image Quality -- 5 Conclusion -- Acknowledgements -- References -- Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log -- Abstract -- 1 Introduction. , 2 Attack Pattern Mining Algorithm Based on Fuzzy Clustering -- 2.1 Generating Security Log Sequence Set -- 2.2 Frequent Sequence Mining from Sequence Set -- 3 Experiment and Analysis -- 3.1 Experiment Result -- 3.2 Result Analysis -- 4 Conclusion -- Acknowledgements -- References -- Recent Advances in Information Hiding and Signal Processing for Audio and Speech Signals -- An Interrogation Speech Manipulation Detection Method Using Speech Fingerprinting and Watermarking -- Abstract -- 1 Introduction -- 2 An Interrogation Speech Manipulation Detection Method Using Speech Fingerprinting -- 3 Manipulation Detection Accuracy Evaluations -- 4 Simulation of Noise and Reverberation -- 5 Conclusion -- Acknowledgments -- References -- Digital Audio Watermarking Method Based on Singular Spectrum Analysis with Automatic Parameter Estimation Using a Convolutional Neural Network -- 1 Introduction -- 2 Previously Proposed Framework -- 2.1 Embedding Process and Extraction Process -- 2.2 Differential Evolution -- 3 Proposed Framework -- 3.1 CNN-Based Parameter Estimation -- 3.2 Extraction Process -- 4 Evaluations -- 4.1 Parameter Estimation Accuracy -- 4.2 Robustness Evaluation -- 4.3 Sound Quality Evaluation -- 5 Discussion -- 6 Conclusion -- References -- Muting Machine Speech Using Audio Watermarking -- 1 Introduction -- 2 Proposed Method -- 2.1 Overview -- 2.2 Embedding the Watermark -- 3 Experiment -- 3.1 Experimental Setup -- 3.2 Results -- 4 Conclusion -- References -- Leveraging a Small Corpus by Different Frame Shifts for Training of a Speech Recognizer -- 1 Introduction -- 2 Frame-Based Speech Analysis and Recognition -- 3 Compensation of Contingency of Window Position -- 3.1 Effect of Window Position Difference -- 3.2 Compensation of the Window Position Mismatch -- 3.3 Experiment -- 4 Longer Window and Frame Shift -- 4.1 The Merit of Longer Frame Shift. , 4.2 Experimental Conditions -- 4.3 Results -- 5 Conclusion -- References -- Advances in Speech and Language Processing -- Evaluation of English Speech Recognition for Japanese Learners Using DNN-Based Acoustic Models -- Abstract -- 1 Introduction -- 2 CALL Systems and Recognition of Non-native Speech -- 3 DNN-Based Acoustic Modeling of Non-native Speech -- 4 Experiments with ERJ Database -- 4.1 Data Preparation in ERJ Database -- 4.2 Language Modeling -- 4.3 Results of Monophone and Triphone Training -- 4.4 Results of DNN Training -- 4.5 Relationship Between Proficiency and WER -- 5 Conclusions -- Acknowledgements -- References -- A Study on a Spoken Dialogue System with Cooperative Emotional Speech Synthesis Using Acoustic and Linguistic Information -- 1 Introduction -- 2 Dialogue System with the Cooperative Emotion Labeling -- 2.1 Overview of the Proposed Dialogue System -- 2.2 Emotion Labeling Based on the Linguistic Information -- 2.3 Emotion Labeling Based on the Acoustic Information -- 3 Dialog Experiment Based on the Scenarios for the Subjective Evaluation -- 3.1 Scenarios Prepared for the Experiment -- 3.2 Experimental Procedure and Conditions -- 3.3 Experimental Result and Discussion -- 4 Conclusion -- References -- Comparison of Speech Recognition Performance Between Kaldi and Google Cloud Speech API -- 1 Introduction -- 2 Speech Recognition Systems -- 2.1 Kaldi -- 2.2 Google Cloud Speech API -- 3 Experimental Conditions -- 3.1 Speech Recognition Model of Kaldi -- 3.2 Evaluation Data -- 4 Preprocessing of Recognition Results -- 5 Results -- 5.1 WER -- 5.2 RTF -- 6 Conclusion -- References -- Melody Completion Based on Convolutional Neural Networks and Generative Adversarial Learning -- 1 Introduction -- 2 Representation of Melody and Chord -- 2.1 Melody Representation -- 2.2 Chord -- 2.3 Dataset -- 3 Melody Completion Network. , 3.1 Architecture -- 3.2 Training -- 4 Experiment -- 4.1 Experimental Condition -- 4.2 Results -- 5 Conclusion -- References -- Segmental Pitch Control Using Speech Input Based on Differential Contexts and Features for Customizable Neural Speech Synthesis -- 1 Introduction -- 1.1 F0 Modeling with Differential F0 Contexts and Features in Neural Speech Synthesis -- 2 Segmental Pitch Control of Synthetic Speech Using User Input -- 3 Experiments -- 3.1 Experimental Conditions -- 3.2 Pitch Control Under Ideal Condition -- 3.3 Pitch Control Using User Speech Input -- 4 Conclusions -- References -- Two-Stage Sequence-to-Sequence Neural Voice Conversion with Low-to-High Definition Spectrogram Mapping -- 1 Introduction -- 2 Two-Stage Voice Conversion with U-Net and Pix2pix -- 2.1 Framework Overview -- 2.2 First-Stage: Segmental Feature Conversion with U-Net -- 2.3 Second-Stage: Low-to-High Spectrogram Mapping with Pix2pix -- 3 Experiments -- 3.1 Experimental Conditions -- 3.2 Objective Evaluation -- 3.3 Subjective Evaluation -- 4 Conclusions -- References -- Improvement of Accent Sandhi Rules Based on Japanese Accent Dictionaries -- Abstract -- 1 Introduction -- 2 Japanese Accent Sandhi Rules -- 2.1 Japanese Accent and Accent Sandhi -- 2.2 Conventional Accent Sandhi Rules -- 3 Improvement of Rules Based on Japanese Accent Dictionaries -- 3.1 Modifications of Conventional Rules -- 3.2 Addition of New Rules -- 4 Accent Estimation Experiment -- 5 Conclusion -- References -- Data Collection and Analysis for Automatically Generating Record of Human Behaviors by Environmental Sound Recognition -- Abstract -- 1 Introduction -- 2 Collection of the Environmental Sound -- 3 Classification of Behavioral Classes Based on Environmental Sound Around Wearer -- 3.1 Conditions of Recognition Experiment -- 3.2 Training of the Classifier. , 3.3 Influence of Window Size of Acoustic Feature -- 4 Analysis of Acoustic Similarity Between the Target Classes -- 4.1 Conditions of Analysis -- 4.2 Result of Analysis -- 5 Conclusion -- References -- DNN-Based Talking Movie Generation with Face Direction Consideration -- 1 Introduction -- 2 Parametric Face Animation Synthesis Based on DNN -- 2.1 Analysis and Synthesis of a Face Image Using AAM -- 2.2 Modeling and Generation of the AAM Parameters Using DNN -- 2.3 Generation of a Face Image Considering the Face Direction -- 3 Experiments -- 3.1 Experimental Conditions -- 3.2 Result -- 4 Conclusion -- References -- Emerging Trends in Multimedia Systems and Multimedia System with Intelligent Computing -- A P2P Multimedia Service System Based on Mesh-Chords -- Abstract -- 1 Introduction -- 2 System Design and Implementation -- 2.1 Architecture of P2P Multimedia Service System -- 2.2 Identical Hash Mapping -- 2.3 Mesh-Chords -- 2.4 Initialization of Mesh-Chords -- 3 Mesh-Chords Routing Algorithm -- 4 Experiment and Evaluation -- 5 Conclusions -- References -- Denoising of ECG Signal with Power Line and EMG Interference Based on Ensemble Empirical Mode Decomposition -- Abstract -- 1 Introduction -- 2 Method -- 2.1 ECG Signal -- 2.2 EMD Algorithm -- 2.3 EEMD Algorithm -- 2.4 Grey System Noise Estimation Method -- 2.5 ECG Noise Cancellation Process -- 2.6 Performance Indicator -- 3 Results -- 4 Conclusions -- Acknowledgment -- References -- Using the Photoplethysmography Technique to Improve the Accuracy of LVET Measurement in the ICG Technique -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Hardware Architecture -- 2.2 Signal Capture -- 2.3 ICG Calculation Formula -- 2.4 Experimental Steps -- 3 Results and Discussions -- 4 Conclusions -- Acknowledgment -- References -- Network Anomaly Detection Based on Artificial Intelligence -- Abstract. , 1 Introduction.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Multimedia systems-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (354 pages)
    Edition: 1st ed.
    ISBN: 9783030037451
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.109
    DDC: 006.7
    Language: English
    Note: Intro -- Preface -- Conference Organization -- Conference Founders -- Honorary Chairs -- Advisory Committee -- General Chairs -- Program Chairs -- Invited Session Chairs -- Publication Chairs -- Electronic Media Chairs -- Finance Chair -- Program Committee Members -- Contents -- Emerging Techniques and Its Applications in Computer Science -- A Hybrid NSGA-II for Matching Biomedical Ontology -- 1 Introduction -- 2 Preliminaries -- 2.1 Ontology Matching Problem -- 2.2 Biomedical Concept Similarity Measure -- 3 Local Search in NSGA-II -- 4 Experimental Results -- 4.1 Results and Analysis -- 5 Conclusion -- References -- Multi-attributes Graph Algorithm for Association Rules Mining Over Energy Internet -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Attributes Definitions -- 4 Power Attribute Graph -- 4.1 Graph Definitions -- 4.2 Mapm Algorithm -- 5 Experimental Results -- 6 Conclusion -- Acknowledgments -- References -- Real-Time Electricity Pricing Trend Forecasting Based on Multi-density Clustering and Sequence Pattern Mining -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Self-adaptive Multi-density Prediction Algorithm -- 3.1 Motivation -- 3.2 Multi-density Clustering -- 3.3 Dynamic Prediction -- 4 Experiments -- 5 Clustering Results -- 5.1 Clustering Efficiency -- 5.2 Prediction Accuracy -- 6 Conclusion -- Acknowledgments -- References -- TDT_CC: A Hot Topic Detection and Tracking Algorithm Based on Chain of Causes -- Abstract -- 1 Introduction -- 2 TDT_CC Algorithm for Trend Detection -- 2.1 Symbols and Definitions -- 2.2 TDT_CC Algorithm Detail -- 2.3 Pseudocode -- 3 Experiment -- 4 Conclusion -- Acknowledgments -- References -- A New Approximation Algorithm for the d-dimensional Knapsack Problem Based on Hopfield Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Hopfield Neural Network -- 2.2 Multi-dimensional Knapsack Problems. , 3 Our Main Approximation Algorithm for d-KP -- 4 Experiments -- 5 Conclusion -- References -- A Method of Cancellation Interference in CCFD System -- Abstract -- 1 Introduction -- 2 Digital Self-interference Cancellation Overall Scheme -- 3 SI Channel Estimation -- 4 Adaptive Filter Cancellation -- 5 Simulation Results and Analysis -- 6 Conclusion -- References -- Power Optimization Method of Magnetic Coupling Resonant Wireless Energy Transmission System -- Abstract -- 1 Introduction -- 2 The Magnetic Coupling Resonant Wireless Power Transmission System with the Relay Coil -- 3 Theoretical Analysis and Design of Power Optimization Method for Wireless Energy Transmission System -- 3.1 Construction of ICPT System Under Critical Coupling State -- 3.2 Study on the Method of Suppressing Frequency Splitting -- 4 Theoretical Analysis and Design of Power Optimization Method for Wireless Energy Transmission System -- 5 Conclusion -- Acknowledgments -- References -- PSO-AFSA Global Maximum Power Point Tracking Algorithm with Adaptive Evolutionary Strategy for PV System -- Abstract -- 1 Introduction -- 2 Modeling of PV Array -- 3 GMPPT Algorithm Based on PSO-AFSA -- 4 PSO-AFSA Based on Adaptive Evolutionary Strategy and Its Application in GMPPT of PV System -- 4.1 Adaptive Evolutionary Strategy -- 4.2 PSO-AFSA Based on Adaptive Evolutionary Strategy and Its Application to GMPPT -- 5 Simulation Result of AESPSO-AFSA GMPPT Algorithm -- 6 Conclusion -- Acknowledgments -- References -- The Design of RFID Localization System for Library Books -- Abstract -- 1 Introduction -- 2 The Principle of RFID Technology -- 3 Hardware Design for Book Localization System -- 3.1 CC2530 Module -- 3.2 GPRS Wireless Communication Module -- 3.3 Power Supply Module -- 3.4 USB Module -- 4 System Software Design -- 4.1 Work Flow of Sensor Node. , 4.2 Design of Software for Master Control Center -- 5 Conclusion -- Acknowledgments -- References -- The Design and Implementation of Automatic Detection and Control Equipment with Unattended Truck Scales -- Abstract -- 1 Introduction -- 2 The Hardware Structure Diagram of the Circuit -- 2.1 MCU C8051F020 Peripheral Circuit -- 2.2 Ground Sense Coil Detection Circuit -- 2.3 Infrared Correlation Detection Circuit -- 2.4 The Traffic Lights and Brake Control Circuit -- 2.5 Alarm Output Circuit -- 2.6 Weighing Sensor and the RFID Card Reader Interface Circuit -- 3 The Equipment Working Process -- 4 Conclusion -- References -- An Interactive Appliances' Intelligent Control Method Based on Time-Sharing Electricity Price -- Abstract -- 1 Introduction -- 2 Forecast the Users' Load in Each Period -- 2.1 Classification of Users' Home Appliances -- 2.2 Determine the Characteristics of Users' Home Appliances Habits -- 2.3 To Predict User-Base Load Requirements for the Corresponding Period -- 3 Determine the Model of the Running Status of Each Home Appliance -- 4 Electrical Appliances Intelligent Control Method -- 5 Conclusions -- References -- Modification Algorithm to Node Localization Error for Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Three-Dimensional RSSI Localization Algorithm -- 3 Modification Approach to Node Localization for Wireless Sensor Networks Based on RSSI -- 3.1 The Parameters Correction Process of Signal Path Model -- 3.2 A Modified Differential Correction Algorithm -- 3.3 MRSSI-3D Algorithm -- 4 Experimental Simulation Analysis -- 5 Conclusion -- Acknowledgments -- References -- A Real-Time Missing Data Recovery Method Using Recurrent Neural Network for Multiple Transmissions -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Raw Data -- 2.2 Motion Information -- 2.3 Architecture of the Real-Time Data Recovery Method. , 2.4 Predictive Model -- 2.5 Predictive Model Evaluation -- 3 Results and Discussion -- 3.1 LSTM and GRU -- 3.2 Activation Function -- 3.3 Hidden Layers and Hidden Units -- 3.4 Data Set -- 3.5 Size of Data Gap -- 4 Conclusion -- References -- The Extraction and Application of the Color Texture Feature Based on Quaternion Gabor -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Quaternion -- 3 Quaternion Gabor Filter -- 3.1 Quaternion Gabor Convolution Algorithm -- 3.2 The Method of Feature Extraction -- 4 Analysis of Results -- 4.1 Extracting Texture Features in Different Types of Texture -- 4.2 Image Enhancement by Self-Adaptive Enhancement Transform -- 5 Conclusions -- References -- Analysis and Detection of Android App Privilege Escalation Vulnerability Based on Machine Learning -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Feature Selection -- 3.1 Android Privilege Escalation Model -- 3.2 Feature Selection -- 4 Machine Learning System -- 4.1 Feature Extraction Module -- 4.2 Feature Preprocessing Module -- 4.3 Training Module -- 5 Experiment and Evaluation -- 5.1 Experiment Setup -- 5.2 Experiment Result -- 6 Summary -- Acknowledgements -- References -- A Watermarking Method for Printed QR Code Based on Module Expansion -- 1 Introduction -- 2 The Proposed Method -- 2.1 Embedding -- 2.2 Extraction -- 3 Experiments and Results -- 3.1 Capacity -- 3.2 Efficiency -- 3.3 Robustness -- 4 Conclusion and Future Works -- References -- Research on Optimal Combination of Secondary Hybrid Encryption Algorithm Based on K-Means Clustering Algorithm -- Abstract -- 1 Introduction -- 2 A Brief Introduction of Hybrid Encryption Algorithm -- 2.1 Symmetrical Encryption Algorithm and Asymmetrical Encryption Algorithm -- 2.2 Key Hybrid Encryption Algorithm -- 2.3 Secondary Hybrid Encryption -- 3 Selection of Algorithm Combinations. , 3.1 The Judgment of Sensitivity of the Plaintext and the Security Level -- 3.2 Selection of Algorithm Combinations -- 4 Conclusion -- References -- Construct Left Ventricular Hypertrophy Prediction Model Based on Random Forest -- 1 Introduction -- 2 Related Works -- 2.1 The Random Forest Algorithm -- 2.2 The Definition of the Electrocardiogram and Left Ventricular Hypertrophy -- 2.3 Related Application in ECG and Cardiovascular Disease -- 3 Methods -- 3.1 Experimental Material -- 3.2 Data-Preprocessing -- 3.3 Model Performance Evaluation -- 4 Results and Discussion -- 4.1 The Result of Random Forest Models -- 5 Conclusion -- References -- The Bayesian Causal Inference in Multisensory Information Processing: A Narrative Review -- Abstract -- 1 Introduction -- 2 Bayesian Causal Inference in Multisensory Information Processing -- 3 Multisensory Information Processing Process Based on Bayesian Causal Inference -- 3.1 Probability Calculation -- 3.2 Results Evaluation -- 3.3 Decision Making -- 3.3.1 Model Averaging -- 3.3.2 Model Selection -- 3.3.3 Probability Matching -- 4 The Factors Affecting the Bayesian Causal Inference -- 4.1 Time and Space Relationship -- 4.2 Information Reliability -- 4.3 Prior Knowledge -- 5 Summary -- References -- The Neural Mechanism of Audiovisual Integration Modulated by Attention: A DCM Study -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 2.1 Participants -- 2.2 Experimental Design -- 2.3 Acquisition of fMRI Data -- 2.4 fMRI Data Analysis -- 3 Effective Brain Networks -- 3.1 Dynamic Causal Modeling -- 3.2 Bayesian Model Comparison -- 4 Results -- 5 Discussion -- 5.1 The Audiovisual Interaction Between Primary Sensory Cortices -- 5.2 The Audiovisual Interaction Between Primary Sensory Cortex and Multisensory Integration Area -- 6 Conclusion -- References. , On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    facet.materialart.
    Unknown
    In:  EPIC3npj Climate and Atmospheric Science, 4(1), ISSN: 2397-3722
    Publication Date: 2021-06-25
    Repository Name: EPIC Alfred Wegener Institut
    Type: Article , peerRev
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2020-01-20
    Repository Name: EPIC Alfred Wegener Institut
    Type: Article , isiRev
    Format: application/pdf
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2020-07-07
    Repository Name: EPIC Alfred Wegener Institut
    Type: Article , isiRev
    Format: application/pdf
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2017-08-04
    Description: Thyroid carcinoma is the most common endocrine malignancy and its prevalence has recently been increasing worldwide. We previously reported that the level of sorting nexin 5 (Snx5), an endosomal translocator, is preferentially decreased during the progression of well-differentiated thyroid carcinoma into poorly differentiated carcinoma. To address the functional role of Snx5 in the development and progression of thyroid carcinoma, we established Snx5-deficient ( Snx5 -/- ) mice. In comparison to wild-type ( Snx5 +/+ ) mice, Snx5 -/- mice exhibited enlarged thyroid glands that consisted of thyrocytes with large irregular-shaped vacuoles. Snx5 -/- thyrocytes exhibited a higher growth potential and higher sensitivity to thyroid-stimulating hormone (TSH). A high content of early endosomes enriched with TSH receptors was found in Snx5 -/- thyrocytes, suggesting that loss of Snx5 caused retention of the TSH receptor (TSHR) in response to TSH. Similar data were found for internalized EGF in primary thyrocytes. The increased TSH sensitivities in Snx5 -/- thyrocytes were also confirmed by results showing that Snx5 -/- mice steadily developed thyroid tumors with high metastatic potential under high TSH. Furthermore, a thyroid cancer model using carcinogen and an anti-thyroidal agent revealed that Snx5 -/- mice developed metastasizing thyroid tumors with activation of MAP kinase and AKT pathways, which are postulated to be major pathways of malignant progression of human thyroid carcinoma. Our results suggest that thyrocytes require Snx5 to lessen tumorigenic signaling driven by TSH, which is a major risk factor for thyroid carcinoma.
    Print ISSN: 0022-3417
    Electronic ISSN: 1096-9896
    Topics: Medicine
    Published by Wiley-Blackwell
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...