Learn More
Linear Discriminant Analysis (LDA) is a well-known scheme for feature extraction and dimension reduction. It has been used widely in many applications involving high-dimensional data, such as face recognition and image retrieval. An intrinsic limitation of classical LDA is the so-called singularity problem, that is, it fails when all scatter matrices are(More)
Presynaptic Ca(V)2.2 (N-type) calcium channels are subject to modulation by interaction with syntaxin 1 and by a syntaxin 1-sensitive Galpha(O) G-protein pathway. We used biochemical analysis of neuronal tissue lysates and a new quantitative test of colocalization by intensity correlation analysis at the giant calyx-type presynaptic terminal of the chick(More)
Content-based music genre classification is a fundamental component of music information retrieval systems and has been gaining importance and enjoying a growing amount of attention with the emergence of digital music on the Internet. Currently little work has been done on automatic music genre classification, and in addition, the reported classification(More)
Linear Discriminant Analysis (LDA) is a well-known method for feature extraction and dimension reduction. It has been used widely in many applications involving high-dimensional data, such as image and text classification. An intrinsic limitation of classical LDA is the so-called singularity problems; that is, it fails when all scatter matrices are(More)
Ebola virus (EboV) is a highly pathogenic enveloped virus that causes outbreaks of zoonotic infection in Africa. The clinical symptoms are manifestations of the massive production of pro-inflammatory cytokines in response to infection and in many outbreaks, mortality exceeds 75%. The unpredictable onset, ease of transmission, rapid progression of disease,(More)
We propose a technique to reliably generate a cryptographic key from a user’s voice while speaking a password. The key resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Moreover, the technique is sufficiently robust to enable the user to reliably regenerate the key by(More)
Recent years have witnessed a dramatic increase in the quantity of image data collected, due to advances in fields such as medical imaging, reconnaissance, surveillance, astronomy, multimedia etc. With this increase has come the need to be able to store, transmit, and query large volumes of image data efficiently. A common operation on image databases is(More)
When automatic speech recognition (ASR) and speaker verification (SV) are applied in adverse acoustic environments, endpoint detection and energy normalization can be crucial to the functioning of both systems. In low signal-to-noise ratio (SNR) and nonstationary environments, conventional approaches to endpoint detection and energy normalization often fail(More)
BACKGROUND The first identified cases of avian influenza A(H7N9) virus infection in humans occurred in China during February and March 2013. We analyzed data obtained from field investigations to describe the epidemiologic characteristics of H7N9 cases in China identified as of December 1, 2013. METHODS Field investigations were conducted for each(More)