This paper presents a voice conversion technique based on bilinear models and introduces the concept of contextual modeling. The bilinear approach reformulates the spectral envelope representation from line spectral f...This paper presents a voice conversion technique based on bilinear models and introduces the concept of contextual modeling. The bilinear approach reformulates the spectral envelope representation from line spectral frequencies feature to a two-factor parameterization corresponding to speaker identity and phonetic information, the so-called style and content factors. This decomposition offers a flexible representation suitable for voice conversion and facilitates the use of efficient training algorithms based on singular value decomposition. In a contextual approach (bilinear) models are trained on subsets of the training data selected on the fly at conversion time depending on the characteristics of the feature vector to be converted. The performance of bilinear models and context modeling is evaluated in objective and perceptual tests by comparison with the popular GMM-based voice conversion method for several sizes and different types of training data.展开更多
Discussed in this paper is the dependent structure in the tails of distributions of random variables from some heavy-tailed stationary nonlinear time series. One class of models discussed is the first-order autoregres...Discussed in this paper is the dependent structure in the tails of distributions of random variables from some heavy-tailed stationary nonlinear time series. One class of models discussed is the first-order autoregressive conditional heteroscedastic (ARCH) process introduced by Engle (1982). The other class is the simple first-order bilinear models driven by heavy-tailed innovations. We give some explicit formulas for the asymptotic values of conditional probabilities used for measuring the tail dependence between two random variables from these models. Our results have significant meanings in finance.展开更多
Bilinear model driven by ARCH (1) noises is proposed. Existence, uniqueness and form of sta-tionary solution to this new model are presented. Maximum likelihood estimation of the model is discussedand some simulation ...Bilinear model driven by ARCH (1) noises is proposed. Existence, uniqueness and form of sta-tionary solution to this new model are presented. Maximum likelihood estimation of the model is discussedand some simulation results are given to evaluate our algorithm.展开更多
The only known construction of key-insulated signature(KIS) that can be proven secure in the standard model is based on the approach of using double signing. That is,the scheme requires two signatures:a signature with...The only known construction of key-insulated signature(KIS) that can be proven secure in the standard model is based on the approach of using double signing. That is,the scheme requires two signatures:a signature with a master key and a signature with the signer's secret key. This folklore construction method leads to an ineffcient scheme. Therefore it is desirable to devise an effcient KIS scheme. We present the first scheme with such a construction. Our construction derives from some variations of the Waters' signature scheme. It is computationally effcient and the signatures are short. The scheme is provably secure based on the diffculty of computational Diffe-Hellman(CDH) problem in the standard model.展开更多
A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or ...A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or if necessary,any third party can verify the signature with the help of the signer or the designated verifier.Directed signature schemes are widely used in situations where the receiver's privacy should be protected.Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available.Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications.In this paper,we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature.Then,we formalize its security model and present a concrete scheme in the standard model.Finally,we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption,and invisible under the decisional Diffie-Hellman assumption.展开更多
The interstand tension control is one of the most important ways to meet tight tolerances for strip product quality during tandem cold rolling process. Using coordinate analysis and parabolic approximation for the mas...The interstand tension control is one of the most important ways to meet tight tolerances for strip product quality during tandem cold rolling process. Using coordinate analysis and parabolic approximation for the mass flow balance principle, the strip velocities eliminating the use of forward slips and backward slips were calculated. In order to reduce the effect of roll eccentricity on the tension measurement, a filter based on bilinear transformation was de- signed. Applying a first-order Taylor series approximation, the transfer function matrix model of interstand tension stress was derived. The actual measurements on-site and the final calculation results showed that the established model had high calculation accuracy and was beneficial for interstand tension control of random cold rolling process.展开更多
The estimation of residual displacements in a structure due to an anticipated earthquake event has increasingly become an important component of performance-based earthquake engineering because controlling these displ...The estimation of residual displacements in a structure due to an anticipated earthquake event has increasingly become an important component of performance-based earthquake engineering because controlling these displacements plays an important role in ensuring cost-feasible or cost-effective repairs in a damaged structure after the event.An attempt is made in this study to obtain statistical estimates of constant-ductility residual displacement spectra for bilinear and pinching oscillators with 5%initial damping,directly in terms of easily available seismological,site,and model parameters.None of the available models for the bilinear and pinching oscillators are useful when design spectra for a seismic hazard at a site are not available.The statistical estimates of a residual displacement spectrum are proposed in terms of earthquake magnitude,epicentral distance,site geology parameter,and three model parameters for a given set of ductility demand and a hysteretic energy capacity coefficient in the case of bilinear and pinching models,as well as for a given set of pinching parameters for displacement and strength at the breakpoint in the case of pinching model alone.The proposed scaling model is applicable to horizontal ground motions in the western U.S.for earthquake magnitudes less than 7 or epicentral distances greater than 20 km.展开更多
This paper studies the parameter estimation problems of the nonlinear systems described by the bilinear state space models in the presence of disturbances.A bilinear state observer is designed for deriving identificat...This paper studies the parameter estimation problems of the nonlinear systems described by the bilinear state space models in the presence of disturbances.A bilinear state observer is designed for deriving identification algorithms to estimate the state variables using the input-output data.Based on the bilinear state observer,a novel gradient iterative algorithm is derived for estimating the parameters of the bilinear systems by means of the continuous mixed p-norm cost function.The gain at each iterative step adapts to the data quality so that the algorithm has good robustness to the noise disturbance.Furthermore,to improve the performance of the proposed algorithm,a dynamicmoving window is designed which can update the dynamical data by removing the oldest data and adding the newestmeasurement data.A numerical example of identification of bilinear systems is presented to validate the theoretical analysis.展开更多
In order to investigate the general reliability assessment methods based on performance degradation data,two commonly used stochastic process approaches,bilinear process method and random-effect model were studied.Ana...In order to investigate the general reliability assessment methods based on performance degradation data,two commonly used stochastic process approaches,bilinear process method and random-effect model were studied.Analyzing procedure and effectiveness of these two methodologies were studied and compared.Meanwhile,the two approaches were illustrated through practical applications.The residual plots and the 10th percentile curves of the two methods were presented to demonstrate the comparative results.The randomeffect model yielded more volatile residuals and a lower and unsafe 10th percentile curve.Consequently the bilinear process model can be concluded to derive more reasonable results due to its one-stage estimation property.展开更多
We construct a fuzzy varying coefficient bilinear regression model to deal with the interval financial data and then adopt the least-squares method based on symmetric fuzzy number space. Firstly, we propose a varying ...We construct a fuzzy varying coefficient bilinear regression model to deal with the interval financial data and then adopt the least-squares method based on symmetric fuzzy number space. Firstly, we propose a varying coefficient model on the basis of the fuzzy bilinear regression model. Secondly, we develop the least-squares method according to the complete distance between fuzzy numbers to estimate the coefficients and test the adaptability of the proposed model by means of generalized likelihood ratio test with SSE composite index. Finally, mean square errors and mean absolutely errors are employed to evaluate and compare the fitting of fuzzy auto regression, fuzzy bilinear regression and fuzzy varying coefficient bilinear regression models, and also the forecasting of three models. Empirical analysis turns out that the proposed model has good fitting and forecasting accuracy with regard to other regression models for the capital market.展开更多
An enhanced formal model of security for proxy signature schemes is presented and a provably secure short proxy signature scheme is proposed from bilinear maps. The proposed proxy signature scheme is based on two shor...An enhanced formal model of security for proxy signature schemes is presented and a provably secure short proxy signature scheme is proposed from bilinear maps. The proposed proxy signature scheme is based on two short secure signature schemes. One is used for delegating the signing rights and computing the standard signature; the other is used for computing proxy signature. Finally, a security proof of the proposed proxy signature scheme is showed by reducing tightly the security of the proposed proxy signature scheme to the security of the two basic signature schemes. The proposed proxy signature scheme has the shortest ordinary signatures and proxy signatures. Moreover, the proxy signature generation needs no pairing operation and verification needs just two pairing operation.展开更多
文摘This paper presents a voice conversion technique based on bilinear models and introduces the concept of contextual modeling. The bilinear approach reformulates the spectral envelope representation from line spectral frequencies feature to a two-factor parameterization corresponding to speaker identity and phonetic information, the so-called style and content factors. This decomposition offers a flexible representation suitable for voice conversion and facilitates the use of efficient training algorithms based on singular value decomposition. In a contextual approach (bilinear) models are trained on subsets of the training data selected on the fly at conversion time depending on the characteristics of the feature vector to be converted. The performance of bilinear models and context modeling is evaluated in objective and perceptual tests by comparison with the popular GMM-based voice conversion method for several sizes and different types of training data.
基金This work was supported by the National Natural Science Foundation of China (Grant No. 10071003) partially supported by a cooperative project from Yunnan Province.
文摘Discussed in this paper is the dependent structure in the tails of distributions of random variables from some heavy-tailed stationary nonlinear time series. One class of models discussed is the first-order autoregressive conditional heteroscedastic (ARCH) process introduced by Engle (1982). The other class is the simple first-order bilinear models driven by heavy-tailed innovations. We give some explicit formulas for the asymptotic values of conditional probabilities used for measuring the tail dependence between two random variables from these models. Our results have significant meanings in finance.
基金This work was supported by the National Natural Science Foundation of China(Grant Nos. 10071003 & 10171005).
文摘Bilinear model driven by ARCH (1) noises is proposed. Existence, uniqueness and form of sta-tionary solution to this new model are presented. Maximum likelihood estimation of the model is discussedand some simulation results are given to evaluate our algorithm.
基金the National Natural Science Foundation of China (Nos. 60773092,60873229,60903178 and 60672072)the Zhejiang Provincial Natural Science Foundation of China (No. Y106505)+1 种基金the Fundamental Research Funds for the Central Universities (No. 2010B09614)the Foundation of Hohai University (No. 2084/409265)
文摘The only known construction of key-insulated signature(KIS) that can be proven secure in the standard model is based on the approach of using double signing. That is,the scheme requires two signatures:a signature with a master key and a signature with the signer's secret key. This folklore construction method leads to an ineffcient scheme. Therefore it is desirable to devise an effcient KIS scheme. We present the first scheme with such a construction. Our construction derives from some variations of the Waters' signature scheme. It is computationally effcient and the signatures are short. The scheme is provably secure based on the diffculty of computational Diffe-Hellman(CDH) problem in the standard model.
基金the Natural Science Foundation of Shaanxi Province (No.2010JQ8017)the China Postdoctoral Science Foundation (No.2011M501427)the Special Found for Basic Scientific Research of Central Colleges of Chang’an University(No.CHD2012JC047)
文摘A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or if necessary,any third party can verify the signature with the help of the signer or the designated verifier.Directed signature schemes are widely used in situations where the receiver's privacy should be protected.Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available.Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications.In this paper,we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature.Then,we formalize its security model and present a concrete scheme in the standard model.Finally,we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption,and invisible under the decisional Diffie-Hellman assumption.
基金Item Sponsored by Fundamental Research Funds for the Central Universities of China(N110307001)
文摘The interstand tension control is one of the most important ways to meet tight tolerances for strip product quality during tandem cold rolling process. Using coordinate analysis and parabolic approximation for the mass flow balance principle, the strip velocities eliminating the use of forward slips and backward slips were calculated. In order to reduce the effect of roll eccentricity on the tension measurement, a filter based on bilinear transformation was de- signed. Applying a first-order Taylor series approximation, the transfer function matrix model of interstand tension stress was derived. The actual measurements on-site and the final calculation results showed that the established model had high calculation accuracy and was beneficial for interstand tension control of random cold rolling process.
文摘The estimation of residual displacements in a structure due to an anticipated earthquake event has increasingly become an important component of performance-based earthquake engineering because controlling these displacements plays an important role in ensuring cost-feasible or cost-effective repairs in a damaged structure after the event.An attempt is made in this study to obtain statistical estimates of constant-ductility residual displacement spectra for bilinear and pinching oscillators with 5%initial damping,directly in terms of easily available seismological,site,and model parameters.None of the available models for the bilinear and pinching oscillators are useful when design spectra for a seismic hazard at a site are not available.The statistical estimates of a residual displacement spectrum are proposed in terms of earthquake magnitude,epicentral distance,site geology parameter,and three model parameters for a given set of ductility demand and a hysteretic energy capacity coefficient in the case of bilinear and pinching models,as well as for a given set of pinching parameters for displacement and strength at the breakpoint in the case of pinching model alone.The proposed scaling model is applicable to horizontal ground motions in the western U.S.for earthquake magnitudes less than 7 or epicentral distances greater than 20 km.
基金funded by the National Natural Science Foundation of China(No.61773182)the 111 Project(B12018).
文摘This paper studies the parameter estimation problems of the nonlinear systems described by the bilinear state space models in the presence of disturbances.A bilinear state observer is designed for deriving identification algorithms to estimate the state variables using the input-output data.Based on the bilinear state observer,a novel gradient iterative algorithm is derived for estimating the parameters of the bilinear systems by means of the continuous mixed p-norm cost function.The gain at each iterative step adapts to the data quality so that the algorithm has good robustness to the noise disturbance.Furthermore,to improve the performance of the proposed algorithm,a dynamicmoving window is designed which can update the dynamical data by removing the oldest data and adding the newestmeasurement data.A numerical example of identification of bilinear systems is presented to validate the theoretical analysis.
基金National Natural Science Foundation of China(11202011)Beijing Natural Science Foundation(3154034)+1 种基金Fundamental Research Funds for the Central Universities(YWK13HK11)National Basic Research Program of China(2012CB720000)
文摘In order to investigate the general reliability assessment methods based on performance degradation data,two commonly used stochastic process approaches,bilinear process method and random-effect model were studied.Analyzing procedure and effectiveness of these two methodologies were studied and compared.Meanwhile,the two approaches were illustrated through practical applications.The residual plots and the 10th percentile curves of the two methods were presented to demonstrate the comparative results.The randomeffect model yielded more volatile residuals and a lower and unsafe 10th percentile curve.Consequently the bilinear process model can be concluded to derive more reasonable results due to its one-stage estimation property.
文摘We construct a fuzzy varying coefficient bilinear regression model to deal with the interval financial data and then adopt the least-squares method based on symmetric fuzzy number space. Firstly, we propose a varying coefficient model on the basis of the fuzzy bilinear regression model. Secondly, we develop the least-squares method according to the complete distance between fuzzy numbers to estimate the coefficients and test the adaptability of the proposed model by means of generalized likelihood ratio test with SSE composite index. Finally, mean square errors and mean absolutely errors are employed to evaluate and compare the fitting of fuzzy auto regression, fuzzy bilinear regression and fuzzy varying coefficient bilinear regression models, and also the forecasting of three models. Empirical analysis turns out that the proposed model has good fitting and forecasting accuracy with regard to other regression models for the capital market.
基金The National Natural Science Foundationof China (No.60703048)the Natural Science Foundationof Hubei Province (No.2007ABA313)
文摘An enhanced formal model of security for proxy signature schemes is presented and a provably secure short proxy signature scheme is proposed from bilinear maps. The proposed proxy signature scheme is based on two short secure signature schemes. One is used for delegating the signing rights and computing the standard signature; the other is used for computing proxy signature. Finally, a security proof of the proposed proxy signature scheme is showed by reducing tightly the security of the proposed proxy signature scheme to the security of the two basic signature schemes. The proposed proxy signature scheme has the shortest ordinary signatures and proxy signatures. Moreover, the proxy signature generation needs no pairing operation and verification needs just two pairing operation.