2,308 research outputs found
Effectiveness in the Realisation of Speaker Authentication
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.An important consideration for the deployment of speaker recognition in authentication applications is the approach to the formation of training and testing utterances . Whilst defining this for a specific scenario is influenced by the associated requirements and conditions, the process can be further guided through the establishment of the relative usefulness of alternative frameworks for composing the training and testing material. In this regard, the present paper provides an analysis of the effects, on the speaker recognition accuracy, of various bases for the formation of the training and testing data. The experimental investigations are conducted based on the use of digit utterances taken from the XM2VTS database. The paper presents a detailed description of the individual approaches considered and discusses the experimental results obtained in different cases
Privacy Protection Performance of De-identified Face Images with and without Background
Li Meng, 'Privacy Protection Performance of De-identified Face Images with and without Background', paper presented at the 39th International Information and Communication Technology (ICT) Convention. Grand Hotel Adriatic Congress Centre and Admiral Hotel, Opatija, Croatia, May 30 - June 3, 2016.This paper presents an approach to blending a de-identified face region with its original background, for the purpose of completing the process of face de-identification. The re-identification risk of the de-identified FERET face images has been evaluated for the k-Diff-furthest face de-identification method, using several face recognition benchmark methods including PCA, LBP, HOG and LPQ. The experimental results show that the k-Diff-furthest face de-identification delivers high privacy protection within the face region while blending the de-identified face region with its original background may significantly increases the re-identification risk, indicating that de-identification must also be applied to image areas beyond the face region
The Translation of Arabic Collocations into English: Dictionary-based vs. Dictionary-free Measured Knowledge
This paper compares the output of two translation tasks. In an attempt to find out the extent to which students of translation can translate Arabic contextualized collocations into English properly, two conflicting views about carrying out a translation task are tested. The first holds that avoiding the use of a dictionary in test sessions, though not in translation classes, would save time and yield better translation products, whereas the second contends that recourse to a dictionary is unavoidable at any translation task, including tests. The two opposing views have their corollary in a similar dispute which has already been settled in favour of the mental lexicon rather than the dictionary (cf. Rangelova/Echeandia 2001). The results of this study defeat the first claim and run counter to Rangelova/Echeandia's findings, though obtained from qualitatively a different test setting
A new splitting-based displacement prediction approach for location-based services
In location-based services (LBSs), the service is provided based on the users' locations through location determination and mobility realization. Several location prediction models have been proposed to enhance and increase the relevance of the information retrieved by users of mobile information systems, but none of them studied the relationship between accuracy rate of prediction and the performance of the model in terms of consuming resources and constraints of mobile devices. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shape cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. One such technique is the Prediction Location Model (PLM), which deals with inner cell structure. The PLM technique suffers from memory usage and poor accuracy. The main goal of this paper is to propose a new path prediction technique for Location-Based Services. The new approach is competitive and more efficient compared to PLM regarding measurements such as accuracy rate of location prediction and memory usage
TMEM97 and PGRMC1 do not mediate sigma-2 ligand-induced cell death
Abstract Sigma-2 receptors have been implicated in both tumor proliferation and neurodegenerative diseases. Recently the sigma-2 receptor was identified as transmembrane protein 97 (TMEM97). Progesterone receptor membrane component 1 (PGRMC1) was also recently reported to form a complex with TMEM97 and the low density lipoprotein (LDL) receptor, and this trimeric complex is responsible for the rapid internalization of LDL. Sigma-2 receptor ligands with various structures have been shown to induce cell death in cancer cells. In the current study, we examined the role of TMEM97 and PGRMC1 in mediating sigma-2 ligand-induced cell death. Cell viability and caspase-3 assays were performed in control, TMEM97 knockout (KO), PGRMC1 KO, and TMEM97/PGRMC1 double KO cell lines treated with several sigma-2 ligands. The data showed that knockout of TMEM97, PGRMC1, or both did not affect the concentrations of sigma-2 ligands that induced 50% of cell death (EC50), suggesting that cytotoxic effects of these compounds are not mediated by TMEM97 or PGRMC1. Sigma-1 receptor ligands, (+)-pentazocine and NE-100, did not block sigma-2 ligand cytotoxicity, suggesting that sigma-1 receptor was not responsible for sigma-2 ligand cytotoxicity. We also examined whether the alternative, residual binding site (RBS) of 1,3-Di-o-tolylguanidine (DTG) could be responsible for sigma-2 ligand cytotoxicity. Our data showed that the binding affinities (K i) of sigma-2 ligands on the DTG RBS did not correlate with the cytotoxicity potency (EC50) of these ligands, suggesting that the DTG RBS was not fully responsible for sigma-2 ligand cytotoxicity. In addition, we showed that knocking out TMEM97, PGRMC1, or both reduced the initial internalization rate of a sigma-2 fluorescent ligand, SW120. However, concentrations of internalized SW120 became identical later in the control and knockout cells. These data suggest that the initial internalization process of sigma-2 ligands does not appear to mediate the cell-killing effect of sigma-2 ligands. In summary, we have provided evidence that sigma-2 receptor/TMEM97 and PGRMC1 do not mediate sigma-2 ligand cytotoxicity. Our work will facilitate elucidating mechanisms of sigma-2 ligand cytotoxicity
Towards transnational interoperable PPDR communications: the European ISI cloud network
The European Council has been stressing the need for interoperability among technologies used for Public Protection and Disaster Relief (PPDR) communications across Europe for a long time. Nevertheless, while the introduction of TETRA and TETRAPOL technologies in the last two decades has increased the possibility to talk cross agency internally in a country, cross border communication for the public safety forces is not well solved as of today. This paper describes the communications interoperability solution that is being developed in the framework of the ISITEP project. This solution, referred to as the European Inter-System Interface (ISI) Cloud Network, aims to integrate the PPDR national/regional infrastructures to allow migration (i.e., roaming) and communication services between networks within a secure framework. The ISI Cloud Network involves, among other components, the specification of a new ISI interface to be deployed over IP transport networks and the development of a number of different gateways to cover the use of TETRA and TETRAPOL technologies as well as the use of legacy TETRA ISI by some networks.Peer ReviewedPostprint (author's final draft
- …
