The inaudible sound communication system of our implementation estimates the correct positions of received symbols in its decoding process by calculating the correlations with the pre-defined ...synchronization patterns. This paper describes that a theoretical approach based on solving Euler graphs taking account of constraint conditions may potentially provide more efficient synchronization patterns, compared with the conventional technique that employs random sequences for designing synchronization patterns.
Adenosquamous carcinoma (ASC) is defined as a tumor showing components of adenocarcinoma with well-formed ductal structures and squamous cell carcinoma (SCC) in the same lesion. Only a few cases of ...oral ASC have been reported. The prognosis of ASC is generally poor. On the other hand, it has been demonstrated that the malignant transformation of oral leukoplakia is generally associated with pathological findings of well-differentiated SCC with low-grade malignancy. In this paper, we report a case of ASC on the tongue that developed during follow-up for leukoplakia. A 66-year-old woman visited our hospital with a chief complaint of a white painful tongue lesion in November 2009. At presentation, a white rough surface lesion measuring 18 × 8 mm was noted on the right margin of the tongue. The lesion was diagnosed to be oral leukoplakia on initial biopsy. After 3 years 10 months of observation, an erosive lesion was found at the same region. The lesion was diagnosed to be SCC on a second biopsy, and partial glossectomy was therefore performed. The surgical specimen revealed that growth and invasion of nuclear chromatin-rich atypical cells including Alcian-blue-positive mucous cells and partially recognized ductal structures. Finally, the lesion was diagnosed to be ASC (pT1N0M0). As of 4 years and 2 months postoperatively, the patient is doing well, with no evidence of recurrence.
Spectrogram art communications exchange visual messages drawn on sound signals. This study attempts to reduce the crest factor of spectrogram art signals to improve their visibility. This paper ...describes some experimental results examining our proposed technique that employs clipping and filtering processes.
Music summarization is often employed in music genre classification to reduce the computational cost. To examine how the accuracy of the music genre classification tasks is controlled with music ...summarization, this study compares our proposed technique that extracts summaries from multiple sections of the music data with a conventional technique that extracts a summary from a single section. The experimental result indicates that appropriate summarization of music data may potentially give better performances.
Distortion based Watermark Extraction Technique Using 1D CNN Matsunaga, Yuto; Aoki, Naofumi; Dobashi, Yoshinori ...
2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC),
2021-April-13
Conference Proceeding
We have proposed a novel concept of a digital watermarking technique for music data that focuses on the use (a) of sound synthesis and sound effect techniques. The previous proposed technique was ...confirmed a vulnerability to high-pass filtering. This paper describes the details of the conventional embedding technique and the improved traction technique that employs the Deep Neural Networks. This paper describes the experimental results of evaluating the resistance of the proposed technique against high-pass filtering. It is demonstrated that the proposed technique in this paper has appropriate resistance (b) against high-pass filtering attack, which was not good at conventional technique.
This paper describes an experimental result of modeling stomp boxes of the distortion effect based on a machine learning approach. Our proposed technique models a distortion stomp box as a neural ...network consisting of LSTM layers. In this approach, the neural network is employed for learning the nonlinear behavior of the distortion stomp boxes. All the parameters for replicating the distortion sound are estimated through its training process using the input and output signals obtained from some commercial stomp boxes. The experimental result indicates that the proposed technique may have a certain appropriateness to replicate the distortion sound by using the well-trained neural networks.
This study has investigated some viewpoints to assess the appropriateness of machine-made scores compared with man-made scores created for Dance Dance Revolution, one of the most popular music games. ...It was found that the conventional software based on a machine learning approach could generate scores that looked similar to manually created ones in terms of idiom patterns of dance motion. However, it was also found that the difficulty of the machine-made scores should be controlled more appropriately to guarantee that the players enjoy the game. Based on these evaluations, improvement of the conventional software was attempted.
This study has developed a system that performs data communications using high frequency inaudible band of sound signals. Unlike radio communication systems using specified wireless devices, it only ...requires microphones and speakers employed in ordinary telephony communication systems. In this study, we investigate the possibility of a machine learning approach to improve the recognition accuracy identifying binary symbols transmitted through sound signals. This paper describes some experiments evaluating the performance of our proposed technique employing a neural network as its classifier. The experimental results indicate that the proposed technique may have certain appropriateness for designing an optimal classifier for the symbol identification.
Steganography may be employed for secretly transmitting side information in order to improve the performance of signal processing such as packet loss concealment and band extension of telephony ...speech. The previous studies employ LSB replacement technique for embedding steganogram information into speech data. Instead of such a lossy steganography technique, this study has investigated a loss less steganography technique for G.711, the most common codec for telephony systems such as VoIP. The proposed technique in this study exploits the redundancy of G.711 for embedding steganogram information into speech data without degradation. This paper newly investigates the possibility of a semi-loss less steganography technique for increasing the capacity of the loss less steganography technique.
This study proposes a technique of lossless steganography for G.711, the most common codec for digital speech communications such as VoIP (Voice over IP). The proposed technique in this study ...exploits the characteristics of G.711 for embedding steganogram information without any degradation. This paper shows the capacity of the proposed technique.