首页 > 最新文献

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)最新文献

英文 中文
Reversible Data Embedding Using Reduced Difference Expansion 利用简化差分展开的可逆数据嵌入
Chiang-Lung Liu, D. Lou, Chien-Chung Lee
The general difference expansion method uses reversible integer transform to embed information into a digital image and perfectly restores the original image after removing the hidden data. In multilayer embedding applications, the operation of difference expansion may seriously degrade the visual quality of the embedded image. In this paper, we propose a reduced difference expansion method to solve this problem. Theoretically, in the worst case, the proposed method gains 6-dB improvement in visual quality of the embedded image compared with the general difference expansion method. Therefore, the proposed method is suitable for multilayer data embedding.
一般差分展开法采用可逆整数变换将信息嵌入到数字图像中,去除隐藏数据后完美还原原始图像。在多层嵌入应用中,差分展开操作会严重降低嵌入图像的视觉质量。本文提出了一种简化差分展开方法来解决这一问题。从理论上讲,在最坏的情况下,该方法与一般差分展开方法相比,嵌入图像的视觉质量提高了6 db。因此,该方法适用于多层数据嵌入。
{"title":"Reversible Data Embedding Using Reduced Difference Expansion","authors":"Chiang-Lung Liu, D. Lou, Chien-Chung Lee","doi":"10.1109/IIH-MSP.2007.267","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.267","url":null,"abstract":"The general difference expansion method uses reversible integer transform to embed information into a digital image and perfectly restores the original image after removing the hidden data. In multilayer embedding applications, the operation of difference expansion may seriously degrade the visual quality of the embedded image. In this paper, we propose a reduced difference expansion method to solve this problem. Theoretically, in the worst case, the proposed method gains 6-dB improvement in visual quality of the embedded image compared with the general difference expansion method. Therefore, the proposed method is suitable for multilayer data embedding.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130910513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch 基于标签不匹配的网页标签隐藏信息检测
Huajun Huang, Xingming Sun, Guang Sun, Junwei Huang
Secret messages can be embedded in a webpage by switching the uppercase-lowercase states of letters in tags. In this paper, a novel steganalytic approach called Tag-Mismatch analysis for detection of hidden information embedded in tags is presented. In order to guarantee reasonable false positive and false negative, the approach is firstly trained on a set of 4,100 webpages to determine the decision threshold. It is shown that the length of embedded secret messages can be estimated with relatively high precision and the resulting detection algorithm is simple and fast. The experimental results show that the detection rate is larger than 85%, as the embedded rate is larger than 0.3%.
秘密消息可以通过切换标签中字母的大小写状态嵌入到网页中。本文提出了一种新的隐写分析方法——标签不匹配分析,用于检测嵌入在标签中的隐藏信息。为了保证合理的假阳性和假阴性,首先在一组4100个网页上对该方法进行训练,确定决策阈值。结果表明,该算法能够以较高的精度估计出嵌入的秘密信息长度,检测算法简单、快速。实验结果表明,由于嵌入率大于0.3%,检测率大于85%。
{"title":"Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch","authors":"Huajun Huang, Xingming Sun, Guang Sun, Junwei Huang","doi":"10.1109/IIH-MSP.2007.382","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.382","url":null,"abstract":"Secret messages can be embedded in a webpage by switching the uppercase-lowercase states of letters in tags. In this paper, a novel steganalytic approach called Tag-Mismatch analysis for detection of hidden information embedded in tags is presented. In order to guarantee reasonable false positive and false negative, the approach is firstly trained on a set of 4,100 webpages to determine the decision threshold. It is shown that the length of embedded secret messages can be estimated with relatively high precision and the resulting detection algorithm is simple and fast. The experimental results show that the detection rate is larger than 85%, as the embedded rate is larger than 0.3%.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130487151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Study on the Division Tactics of Top Swimming Athletes Home and Abroad in the 400m Freestyle Swimming Race 国内外优秀游泳运动员在400米自由泳比赛中的分组战术研究
Weitao Zheng, Zihua Zhang, Ting Liao, Tuanjie Zhao, Yong Ma
In swimming competition, a rational disposition of physical strength is seen as a major factor in deciding the final outcome. Among various items in swimming competition, the issue of physical distribution over the 400 m race has aroused the most extensive controversy. In this paper, concerning the achievements of elite athletes home and abroad in 400 m freestyle swimming race, the principle of variation coefficient in statistics has been adopted and calculation is conducted in regard to the newly-defined speed coefficient. The features and disciplines in the tactics application of those top athletes are analyzed from a new angle about the adoption of phase speed pattern. It is hopeful that this paper could provide some valuable suggestions about the puzzle of physical distribution over the swimming competitions for swimming coaches in the process of their instruction.
在游泳比赛中,合理配置体力是决定比赛结果的重要因素。在游泳比赛的各个项目中,400米的体能分配问题引起了最广泛的争议。本文针对国内外优秀运动员在400米自由泳比赛中的成绩,采用统计学中的变异系数原理,对新定义的速度系数进行了计算。从采用相速度模式的新角度分析了我国优秀运动员战术运用的特点和规律。希望本文能对游泳教练员在教学过程中解决游泳比赛中的身体分布难题提供一些有价值的建议。
{"title":"Study on the Division Tactics of Top Swimming Athletes Home and Abroad in the 400m Freestyle Swimming Race","authors":"Weitao Zheng, Zihua Zhang, Ting Liao, Tuanjie Zhao, Yong Ma","doi":"10.1109/IIH-MSP.2007.285","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.285","url":null,"abstract":"In swimming competition, a rational disposition of physical strength is seen as a major factor in deciding the final outcome. Among various items in swimming competition, the issue of physical distribution over the 400 m race has aroused the most extensive controversy. In this paper, concerning the achievements of elite athletes home and abroad in 400 m freestyle swimming race, the principle of variation coefficient in statistics has been adopted and calculation is conducted in regard to the newly-defined speed coefficient. The features and disciplines in the tactics application of those top athletes are analyzed from a new angle about the adoption of phase speed pattern. It is hopeful that this paper could provide some valuable suggestions about the puzzle of physical distribution over the swimming competitions for swimming coaches in the process of their instruction.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125344804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Find Recent Frequent Items with Sliding Windows in Data Streams 在数据流中使用滑动窗口查找最近经常使用的项目
Jiadong Ren, Ke Li
Frequent pattern mining is fundamental to many important data mining tasks. Many researchers had presented many mining methods in static database. Due to many special characters of data stream, those methods fail to be used in dynamic environment. We develop a novel method mining frequent items from data stream based on sliding window model. We use some compact data structures which make uses of the limited space efficiently. The proposed method is an approximate algorithm, it can eliminate the influence of old data to mined result. And the mined results are kept in a heap. This data structure is seldom used in other methods, and the mined results can be inquired by top-k.
频繁的模式挖掘是许多重要数据挖掘任务的基础。许多研究者提出了许多静态数据库的挖掘方法。由于数据流具有许多特殊的特性,这些方法无法在动态环境中应用。提出了一种基于滑动窗口模型的数据流频繁项挖掘方法。我们使用了一些紧凑的数据结构,有效地利用了有限的空间。该方法是一种近似算法,可以消除旧数据对挖掘结果的影响。挖掘结果保存在一个堆中。这种数据结构在其他方法中很少使用,并且可以通过top-k查询挖掘结果。
{"title":"Find Recent Frequent Items with Sliding Windows in Data Streams","authors":"Jiadong Ren, Ke Li","doi":"10.1109/IIH-MSP.2007.411","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.411","url":null,"abstract":"Frequent pattern mining is fundamental to many important data mining tasks. Many researchers had presented many mining methods in static database. Due to many special characters of data stream, those methods fail to be used in dynamic environment. We develop a novel method mining frequent items from data stream based on sliding window model. We use some compact data structures which make uses of the limited space efficiently. The proposed method is an approximate algorithm, it can eliminate the influence of old data to mined result. And the mined results are kept in a heap. This data structure is seldom used in other methods, and the mined results can be inquired by top-k.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125481715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Content Integrity Verification for G.729 Coded Speech G.729编码语音的内容完整性验证
Yuhua Jiao, Yubo Tian, Qiong Li, X. Niu
This paper proposes a method to extract speech features for content integrity verification of G. 729 coded speech, which could minimize the computation cost and reduce the sizes of the features. Experiments results show that the method is robust to common operations in speech transmission such as recompression, volume changing, re-sampling and transcoding, and also does well in tamper detection for its ability to distinguish content preserving operations from malicious modifications.
本文提出了一种提取语音特征用于G. 729编码语音内容完整性验证的方法,该方法可以最大限度地降低计算成本并减小特征的大小。实验结果表明,该方法对语音传输中常见的再压缩、音量变化、重采样和转码等操作具有较强的鲁棒性,并且能够区分内容保留操作和恶意修改操作,在篡改检测方面表现良好。
{"title":"Content Integrity Verification for G.729 Coded Speech","authors":"Yuhua Jiao, Yubo Tian, Qiong Li, X. Niu","doi":"10.1109/IIH-MSP.2007.371","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.371","url":null,"abstract":"This paper proposes a method to extract speech features for content integrity verification of G. 729 coded speech, which could minimize the computation cost and reduce the sizes of the features. Experiments results show that the method is robust to common operations in speech transmission such as recompression, volume changing, re-sampling and transcoding, and also does well in tamper detection for its ability to distinguish content preserving operations from malicious modifications.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126683793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of Several Classifiers for Emotion Recognition from Noisy Mandarin Speech 几种分类器在嘈杂普通话语音情感识别中的比较
T. Pao, Wen-Yuan Liao, Yu-Te Chen, Jun-Heng Yeh, Yun-Maw Cheng, Charles S. Chien
Automatic recognition of emotions in speech aims at building classifiers for classifying emotions in test emotional speech. This paper presents an emotion recognition system to compare several classifiers from clean and noisy speech. Five emotions, including anger, happiness, sadness, neutral and boredom, from Mandarin emotional speech are investigated. The classifiers studied include KNN WCAP GMM HMM and W-DKNN. Feature selection with KNN was also included to compress acoustic features before classifying the emotional states of clean and noisy speech. Experimental results show that the proposed W-DKNN outperformed at every SNR speech among the three KNN-based classifiers and achieved highest accuracy from clean speech to 20dB noisy speech when compared with all the classifiers.
语音情绪自动识别的目的是建立对测试情绪语音中的情绪进行分类的分类器。本文提出了一种情感识别系统,用于比较几种分类器对干净语音和有噪声语音的识别效果。研究了汉语情感言语中的五种情绪,包括愤怒、快乐、悲伤、中性和无聊。研究的分类器包括KNN、WCAP、GMM、HMM和W-DKNN。利用KNN进行特征选择,在对干净语音和嘈杂语音的情绪状态进行分类之前对声学特征进行压缩。实验结果表明,在三种基于knn的分类器中,所提出的W-DKNN在每个信噪比的语音上都表现优异,并且在从干净语音到20dB噪声语音的分类器中,与所有分类器相比,具有最高的准确率。
{"title":"Comparison of Several Classifiers for Emotion Recognition from Noisy Mandarin Speech","authors":"T. Pao, Wen-Yuan Liao, Yu-Te Chen, Jun-Heng Yeh, Yun-Maw Cheng, Charles S. Chien","doi":"10.1109/IIH-MSP.2007.368","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.368","url":null,"abstract":"Automatic recognition of emotions in speech aims at building classifiers for classifying emotions in test emotional speech. This paper presents an emotion recognition system to compare several classifiers from clean and noisy speech. Five emotions, including anger, happiness, sadness, neutral and boredom, from Mandarin emotional speech are investigated. The classifiers studied include KNN WCAP GMM HMM and W-DKNN. Feature selection with KNN was also included to compress acoustic features before classifying the emotional states of clean and noisy speech. Experimental results show that the proposed W-DKNN outperformed at every SNR speech among the three KNN-based classifiers and achieved highest accuracy from clean speech to 20dB noisy speech when compared with all the classifiers.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121404353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Rule-based Chinese Question Answering System for Reading Comprehension Tests 基于规则的汉语阅读理解问答系统
Xiaoyan Hao, Xiaoming Chang, Kaiying Liu
We have developed a rule-based system, which is called Chinese question answering system for reading comprehension (Cqarc). This paper systematically introduces and discusses key techniques in the Cqarc, describes the processing mechanism of the Cqarc, presents processing strategies and methods in the Cqarc. Cqarc uses heuristic rules to look for lexical and semantic clues in the question and the story. Finally we have tested Cqarc on Chinese reading comprehension corpus (CRCC). Overall, Cqarc found the correct sentence 42% of the time, which is encouraging given the simplicity of its rules. To the best of our knowledge, this is the first work that reports that the use of a rule-based approach achieves satisfying results on answering questions for Chinese reading comprehension tests.
我们开发了一个基于规则的中文阅读理解问答系统(Cqarc)。本文系统地介绍和讨论了Cqarc的关键技术,描述了Cqarc的加工机理,提出了Cqarc的加工策略和方法。Cqarc使用启发式规则在问题和故事中寻找词汇和语义线索。最后,我们在汉语阅读理解语料库(CRCC)上对Cqarc进行了测试。总的来说,Cqarc在42%的时间里找到了正确的句子,考虑到其规则的简单性,这是令人鼓舞的。据我们所知,这是第一个报告使用基于规则的方法在汉语阅读理解测试中获得令人满意的答题结果的工作。
{"title":"A Rule-based Chinese Question Answering System for Reading Comprehension Tests","authors":"Xiaoyan Hao, Xiaoming Chang, Kaiying Liu","doi":"10.1109/IIH-MSP.2007.59","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.59","url":null,"abstract":"We have developed a rule-based system, which is called Chinese question answering system for reading comprehension (Cqarc). This paper systematically introduces and discusses key techniques in the Cqarc, describes the processing mechanism of the Cqarc, presents processing strategies and methods in the Cqarc. Cqarc uses heuristic rules to look for lexical and semantic clues in the question and the story. Finally we have tested Cqarc on Chinese reading comprehension corpus (CRCC). Overall, Cqarc found the correct sentence 42% of the time, which is encouraging given the simplicity of its rules. To the best of our knowledge, this is the first work that reports that the use of a rule-based approach achieves satisfying results on answering questions for Chinese reading comprehension tests.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"829 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126060361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Method for Making Three-Party Password-Based Key Exchange Resilient to Server Compromise 一种基于三方密码的密钥交换抵御服务器入侵的方法
Zhu Hongfeng, Liu Tianhua, Liu Jie, Chang Guiran
This paper presents a new password authentication and key-exchange protocol suitable for three-party without a server public key and exchanging keys over an untrusted network. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak password phrases to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromises. Finally, user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the host. Furthermore, the authentication server can't get any information for the session key between the two users and the mutual authentication will carry through between the server and the two users. The proposed protocol's security, simplicity, and speed make it ideal for a wide range of real-world applications in which secure password authentication is required.
提出了一种新的密码认证和密钥交换协议,适用于无服务器公钥的三方在非可信网络上交换密钥。新协议可以抵抗被动或主动网络入侵者发起的字典攻击,原则上,即使是弱密码短语也可以安全使用。它还提供了完美的前向保密,可以保护过去的会话和密码免受未来的泄露。最后,用户密码以非明文形式存储——与密码本身相同,因此获取密码数据库的攻击者不能直接使用它来破坏安全性并立即访问主机。另外,认证服务器无法获取到两个用户之间的会话密钥信息,只能在服务器和两个用户之间进行相互认证。所提出的协议的安全性、简单性和速度使其成为需要安全密码身份验证的广泛现实应用程序的理想选择。
{"title":"A Method for Making Three-Party Password-Based Key Exchange Resilient to Server Compromise","authors":"Zhu Hongfeng, Liu Tianhua, Liu Jie, Chang Guiran","doi":"10.1109/IIH-MSP.2007.29","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.29","url":null,"abstract":"This paper presents a new password authentication and key-exchange protocol suitable for three-party without a server public key and exchanging keys over an untrusted network. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak password phrases to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromises. Finally, user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the host. Furthermore, the authentication server can't get any information for the session key between the two users and the mutual authentication will carry through between the server and the two users. The proposed protocol's security, simplicity, and speed make it ideal for a wide range of real-world applications in which secure password authentication is required.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"28 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120911884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Principal Component Analysis of O-linked Glycosylation Sites in Protein Sequence 蛋白质序列中o链糖基化位点的主成分分析
Xue-mei Yang, Yenwei Chen, M. Ito, I. Nishikawa
In this paper, a detailed analysis about the structure of O-glycosylated protein has been done by calculating the positional probability functions (PPFs) and principal components. We found that the content of proline , serine , threonine and alanine in O-glycosylated protein is higher than those in nonglycosylated protein. Furthermore, we also found that the serine near N or C terminus was easily glycosylated and the threonine near N terminus is easily glycosylated. The prediction was also done as a classification problem. The test protein sequence is projected to the common subspace and then by calculating the distance between the projection and each class center, the test protein sequence can be assigned into the "nearest" class. The prediction accuracy is about 60%-100%.
本文通过计算位置概率函数(ppf)和主成分,对o糖基化蛋白的结构进行了详细的分析。我们发现,o糖基化蛋白中的脯氨酸、丝氨酸、苏氨酸和丙氨酸含量高于非糖基化蛋白。此外,我们还发现N或C端附近的丝氨酸容易糖基化,N端附近的苏氨酸容易糖基化。预测也是作为一个分类问题来完成的。将测试蛋白序列投影到公共子空间,然后通过计算投影到每个类中心的距离,将测试蛋白序列分配到“最近”的类中。预测精度约为60% ~ 100%。
{"title":"Principal Component Analysis of O-linked Glycosylation Sites in Protein Sequence","authors":"Xue-mei Yang, Yenwei Chen, M. Ito, I. Nishikawa","doi":"10.1109/IIH-MSP.2007.248","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.248","url":null,"abstract":"In this paper, a detailed analysis about the structure of O-glycosylated protein has been done by calculating the positional probability functions (PPFs) and principal components. We found that the content of proline , serine , threonine and alanine in O-glycosylated protein is higher than those in nonglycosylated protein. Furthermore, we also found that the serine near N or C terminus was easily glycosylated and the threonine near N terminus is easily glycosylated. The prediction was also done as a classification problem. The test protein sequence is projected to the common subspace and then by calculating the distance between the projection and each class center, the test protein sequence can be assigned into the \"nearest\" class. The prediction accuracy is about 60%-100%.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"53 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120923131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Edge-based Lane Change Detection and its Application to Suspicious Driving Behavior Analysis 基于边缘的变道检测及其在可疑驾驶行为分析中的应用
Sin-Yu Chen, J. Hsieh
This paper presents a novel edge labeling scheme for detecting lanes from videos in real time. Firstly, pairs of edge pixels with different edge types are grouped using the labeling technique. Then, different lane hypotheses can be generated for lane modeling. Then, a lane geometrical constraint is derived from the pinhole camera geometry for filtering out impossible lane hypotheses. Since the constraint is invariant to shadows and lighting changes, each desired lane can be robustly detected even though different occlusions and shadows are included in the analyzed scenes. After filtering, a kernel-based modeling technique is then proposed for modeling different lane properties. With the modeling, different lanes can be effectively detected and tracked even though they are fragmented into pieces of segments or occluded by shadows. The proposed scheme works very well to analyze lane conditions with night vision. With the lane information, different dangerous driving behaviors like lane departure can be directly analyzed from road scenes. Experimental results show that the proposed scheme is powerful in lane detection. The average accuracy rate of vehicle detection is 95%.
提出了一种实时检测视频中车道的边缘标记方法。首先,利用标记技术对不同边缘类型的边缘像素对进行分组;然后,生成不同的车道假设进行车道建模。然后,从针孔相机几何中导出车道几何约束,用于过滤不可能的车道假设。由于约束不受阴影和光照变化的影响,因此即使在分析的场景中包含不同的遮挡和阴影,也可以鲁棒地检测到每个期望的车道。滤波后,提出了一种基于核的车道属性建模技术。通过建模,可以有效地检测和跟踪不同的车道,即使它们被分割成碎片或被阴影遮挡。该方案能够很好地利用夜视分析车道状况。有了车道信息,可以直接从道路场景中分析出车道偏离等不同的危险驾驶行为。实验结果表明,该方法具有较强的车道检测能力。车辆检测的平均准确率为95%。
{"title":"Edge-based Lane Change Detection and its Application to Suspicious Driving Behavior Analysis","authors":"Sin-Yu Chen, J. Hsieh","doi":"10.1109/IIH-MSP.2007.390","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.390","url":null,"abstract":"This paper presents a novel edge labeling scheme for detecting lanes from videos in real time. Firstly, pairs of edge pixels with different edge types are grouped using the labeling technique. Then, different lane hypotheses can be generated for lane modeling. Then, a lane geometrical constraint is derived from the pinhole camera geometry for filtering out impossible lane hypotheses. Since the constraint is invariant to shadows and lighting changes, each desired lane can be robustly detected even though different occlusions and shadows are included in the analyzed scenes. After filtering, a kernel-based modeling technique is then proposed for modeling different lane properties. With the modeling, different lanes can be effectively detected and tracked even though they are fragmented into pieces of segments or occluded by shadows. The proposed scheme works very well to analyze lane conditions with night vision. With the lane information, different dangerous driving behaviors like lane departure can be directly analyzed from road scenes. Experimental results show that the proposed scheme is powerful in lane detection. The average accuracy rate of vehicle detection is 95%.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1