Cisp-Bmei 2017)

Total Page:16

File Type:pdf, Size:1020Kb

Cisp-Bmei 2017) 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI 2017) Shanghai, China 14-16 October 2017 Pages 1-754 IEEE Catalog Number: CFP17J14-POD ISBN: 978-1-5386-1938-4 1/3 Copyright © 2017 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP17J14-POD ISBN (Print-On-Demand): 978-1-5386-1938-4 ISBN (Online): 978-1-5386-1937-7 Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com TABLE OF CONTENTS AN EFFICIENT ALGORITHM FOR RECOGNITION OF POINTER SCALE VALUE ON DASHBOARD........................................................................................................................................................................1 Pengfei Li ; Qingxiang Wu ; Yao Xiao ; Yanan Zhang AN IMPROVED SPATIO-TEMPORAL CONTEXT TRACKING ALGORITHM COMBINING LK OPTICAL FLOW..................................................................................................................................................................7 Zhongjian Li ; Yaru Su ; Wenke Ma ANALYSIS ON THE VALIDITY OF EYE MOVEMENT DATA DURING VIDEO VIEWING............................... 14 Ying Xu ; Su-Ting Xu ; Xing-Tong Liu ; Fang Meng FOURIER PHASE INHERITANCE RATE ..................................................................................................................... 19 Guangyan Ge ; Xiuping Wang ; Yichao Lou ; Tianyu Ye ; Guangtao Ge LUNAR DEM SUPER-RESOLUTION RECONSTRUCTION VIA SPARSE REPRESENTATION ........................ 24 Chunqiu Liu ; Wenliang Du ; Xiaolin Tian MANIFOLD INCONSISTENCY CONSTRAINED SPARSE CODING FOR IMAGE SUPER- RESOLUTION RECONSTRUCTION.............................................................................................................................. 29 Huasheng Zhu ; Kaiyan Xie ; Jun Ye ; Zhaoming Wu MOVING TARGET DETECTION BASED ON IMPROVED THREE FRAME DIFFERENCE AND VISUAL BACKGROUND EXTRACTOR........................................................................................................................ 34 Siyang Wu ; Dongfang Chen ; Xiaofeng Wang PDPMT: PROVABLE DATA POSSESSION FOR MULTIPLE CLOUD TENANTS................................................. 39 Daoli Huang ; Changsheng Wan PROGNOSIS PREDICTION OF HUMAN BREAST CANCER BY INTEGRATING DEEP NEURAL NETWORK AND SUPPORT VECTOR MACHINE: SUPERVISED FEATURE EXTRACTION AND CLASSIFICATION FOR BREAST CANCER PROGNOSIS PREDICTION ......................... 45 Dongdong Sun ; Minghui Wang ; Huanqing Feng ; Ao Li REAL TIME TARGET TRACKING BASED ON NONLINEAR MEAN SHIFT AND PARTICLE FILTERS.............................................................................................................................................................................. 50 Zhenghua Shu ; Guodong Liu ; Zhihua Xie ; Zhong Ren REAL-TIME HUMAN GESTURE GRADING BASED ON OPENPOSE .................................................................... 55 Sen Qiao ; Yilin Wang ; Jian Li RESEARCH ON GASTRIC DISEASE AUXILIARY DIAGNOSIS BASED ON VAGUE SOFT SETS.................... 61 Penggang Chen ; Xiaoyi Feng SCRATCH DETECTION OF ROUND BUTTONS BASED ON MACHINE VISION................................................. 66 Lingfeng Kong ; Qingxiang Wu ; Kai Lin ; Baolin Chen THE COMPARATIVE STUDY ON TWO CONTROLLERS OF TORQUE RIPPLES IN THE PHOTOELECTRIC TRACKING SERVO SYSTEM ..................................................................................................... 72 Ruijuan Guo ; Shuang Du ; Huimin Yin THE WAVELET LIFTING METHOD FOR IMAGE FUSION OF SURPASSED PRESENCE OF SURREAL............................................................................................................................................................................ 77 Chao Yu ; Yuxing Wu ; Wei Yu RESEARCH ON SPATIO-TEMPORAL CONTEXT LEARNING BASED ON HARRIS-SURF .............................. 82 Yao Zhang ; Hua Cai ; Kai Cui ; Ya'Nan Chu ; Mei Liu SCENE DETECTION OF NEWS VIDEO USING CNN FEATURES........................................................................... 87 Yize Cui ; Yiheng Cai ; Changyan Qiu ; Xurong Gao VIDEO COPY DETECTION USING HISTOGRAM BASED SPATIO-TEMPORAL FEATURES.......................... 92 Feifei Lee ; Junjie Zhao ; Koji Kotani ; Qiu Chen BLIND SUPER-RESOLUTION IMAGE RECONSTRUCTION BASED ON NOVEL BLUR TYPE IDENTIFICATION ............................................................................................................................................................. 97 Liqing Huang ; Youshen Xia CROWDED SCENE UNDERSTANDING ALGORITHM BASED ON TWO-STREAM RESIDUAL NETWORK........................................................................................................................................................................ 103 Pengcheng Li ; Xinghao Jiang ; Tanfeng Sun ; Ke Xu FACIAL EXPRESSION RECOGNITION BY LEARNING SPATIOTEMPORAL FEATURES WITH MULTI-LAYER INDEPENDENT SUBSPACE ANALYSIS............................................................................ 109 Chenhan Lin ; Fei Long ; Yongjie Zhan IMPROVED CNN-BASED FACIAL LANDMARKS TRACKING VIA RIDGE REGRESSION AT 150 FPS ON MOBILE DEVICES .................................................................................................................................... 115 Zhenye Gan ; Lizhuang Ma ; Chengjie Wang ; Yicong Liang REAL-TIME MONITORING FOR THE MINING ROBOT BASED ON AN IMPROVED SIFT MATCHING ALGORITHM............................................................................................................................................ 124 He Kai ; Ma Xianmin REAL-TIME SVM-BASED EMOTION RECOGNITION ALGORITHM................................................................. 129 Wout Swinkels ; Luc Claesen ; Feng Xiao ; Haibin Shen THE VIDEO FACE RECOGNITION METHOD AND SYSTEM BASED ON THE FUSION OF MULTIPLE FEATURES.................................................................................................................................................. 135 Xin Ye ; Qiuyu Zhu A VIDEO STITCHING SYSTEM BASED ON MIRROR PYRAMIDS AND NON-OVERLAPPING CALIBRATION METHOD.............................................................................................................................................. 141 Ling Zhu ; Wei Wang ; Yu Liu ; Shiming Lai ; Jing Li AN FPGA IMPLEMENTATION OF MULTI-CHANNEL VIDEO PROCESSING AND 4K REAL- TIME DISPLAY SYSTEM............................................................................................................................................... 147 Xin Guo ; Xinyue Wei ; Yiqing Liu AUTOMATED LEARNING OF USER-BEHAVIOUR PATTERNS IN INTELLIGENT HOUSE ENVIRONMENT .............................................................................................................................................................. 153 Dominika Adamek ; Grzegorz Popek PREDICTIVE MODELING FOR MONOCULAR VISION BASED RAIL TRACK EXTRACTION..................... 159 M. Alper Selver ; E. Yesim Zoral ; Burak Belenlioglu ; Sinan Dogan REAL-TIME PLANE SEGMENTATION FOR SCENE UNDERSTANDING IN ROBOT NAVIGATION................................................................................................................................................................... 165 Zhu Rui ; Zhao Yongjia SECURITY MECHANISM OF VIDEO CONTENT INTEGRATED BROADCAST CONTROL PLATFORM UNDER TRIPLE PLAY............................................................................................................................ 170 Peng Yu ; Nenghuan Zhang ; Shengyan Zhang ; Qi Wang A REVERSIBLE WATERMARKING ALGORITHM FOR HIGH EFFICIENCY VIDEO CODING ................... 175 Chunting Cai ; Gui Feng ; Chi Wang ; Xue Han AN OPTIMIZED VIDEO SELECTIVE ENCRYPTION ALGORITHM.................................................................... 181 Xiaoqiang Di ; Yingzheng Wang ; Jinqing Li ; Ligang Cong ; Hui Qi ; Yuxin Zhang FOOTBALL VIDEO RECOMMENDATION SYSTEM WITH AUTOMATIC RATING BASED ON USER BEHAVIOR............................................................................................................................................................ 186 Jian Ding ; Yongbin Wang ; Qi Wang ; Yizhen Cao H.264 BASED SCREEN CONTENT CODING WITH HSV QUANTIZATION ........................................................ 191 Anna Zhang ; Zhongyuan Wang ; Zhen Han ; Youming Fu ; Zhen He SHARPNESS-PRESERVATION VIDEO UPSCALING............................................................................................... 196 Zhongyuan Wang ; Liguo Zhou ; Rong Zhu ; Zheng He ; Dan Chen VIDEO SALIENCY DETECTION BASED ON ROBUST SEEDS GENERATION AND SPATIO- TEMPORAL PROPAGATION ......................................................................................................................................
Recommended publications
  • Sound Masking Done Right: Simple Solutions for Complex Problems
    SOUND MASKING DONE RIGHT: SIMPLE SOLUTIONS FOR COMPLEX PROBLEMS Robert Chanaud, Ph.D. Magnum Publishing L.L.C. i Copyright 2008, Robert Chanaud, All Rights Reserved Published with permission by Magnum Publishing, LLC No part of this book may be reproduced, stored in a retrieval system, or transmitted in any other form, or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. While every effort has been made to ensure that the contents of this document are accurate and reliable, Magnum Publishing LLC, Robert Chanaud, or Atlas Sound L.P. cannot assume liability for any damages caused by inaccuracies in the data or documentation, or as a result of the failure of the data, documentation, software, or products described herein to function in a particular manner. The authors and publishers make no warranty, expressed or implied, nor does the fact of distribution constitute a warranty. International Standard Book Number: 978-0-9818166-0-9 Printed in the United States of America ii - Sound Masking Done Right: Simple Solutions for Complex Problems - About Bob Chanaud Dr. Robert C. Chanaud received his BS from the US Coast Guard Academy, his MS from the University of California and his PhD from Purdue University. Active in the field of acoustics since 1958, he taught at Purdue University and the University of Colorado and, in 1975, founded Dynasound, Inc. He has developed software programs to facilitate the design and equalization of masking systems. Acknowledgements The following companies have graciously supplied products for evaluation: Atlas Sound Cambridge Sound Management Dynasound Soft dB Sound Advance Notation Square brackets [ ] are references contained at the end of the manual.
    [Show full text]
  • MARK Serv Grap GLOB 2013 EUROCOM Catalog EN V8 2013
    EUROCOM The New Standard for Installed Systems Summer 2013 EUROCOM The EUROCOM Story Innovative Tools Discover EUROCOM, the new for Modern standard for installed systems: Systems Integrators New ideas, breathtaking technologies, a unique design aesthetic, fl exibility – and tremendous value! I’m often asked why BEHRINGER customers love our made them tick. I quickly realized that companies were Over the past two decades we have with a diff erent sales and distribution Longtime BEHRINGER observers will products so much. The answer is simple… it’s because charging US$1000 or more for a piece of equipment, heard from many customers who model, terms of sale, marketing and recognize our EUROLIVE, EURODESK we are so passionate about everything we do. while the components inside were only worth US$100! have used our products in installed support requirements. We recognized and EUROPOWER product family Our customers tell us what they want, and we design sound systems. After all, system early on that the nature of project-driven names. The origin of these names So I immediately grabbed my soldering iron and went to and build products that sound great and provide integrators and contractors are always sales diff ers considerably from that of stems from our roots as a small work on my fi rst signal processor. Word spread quickly amazing feature sets—at extremely aff ordable prices! looking for products that deliver a retail sales and that our organization startup in Germany, hence the among friends that my products sounded really good. would need to adapt in name—EURO. So, of course when It all started 29 years ago when I was studying classical More importantly, I found out that my friends were very order to fully and properly it came time to name the family piano and sound engineering.
    [Show full text]
  • USC College of Letters, Arts and Sciences Regularly
    USC College of Letters, Arts and Sciences regularly recognizes students who have achieved a GPA of 3.5 or higher during the previous semester by including their names on the Dean’s List. Students here achieved this honor in Fall 2010. The high caliber of scholarship showed by these students enhances the quality of education for all of our students while rewarding our faculty for their efforts. On behalf of USC College, I congratulate and commend them for their contribution to scholarly life at the University of Southern California. Sincerely, For a printed certificate, please email [email protected] (include USC ID #) Howard Gillman Dean of USC College of Letters, Arts and Sciences Hasan Abbas Mohammad Nasser Al-Rashid Daniel Christopher Ayala Claire Elizabeth Bazley Curt James Black Rachel Esther Braun Catherine Ting Cai Tsz Chun Chan Kasey Chee-Shiow Cheng Janet Chu Alyssa Michelle Corbett Dillon Wayne Abbott Autumn Christiana Altamirano Yelena Ayzenberg Amy Lauren Culver Beck Courtney Jewel Blackmon Sarah Jane Brayton Robert Alexander Cala Catherine Chan Christopher Yun-Duk Cheng Yung-Tien Chu Connor Scott Corcoran Laila Abdanan Margaret Lynn Altergott Robin Moshe Babadjouni James J. Becker Melanie Katherine Blair Jonathan P. Brebner Maren Elizabeth Caldwell Riti Chandiok John Cheng Holly Chu Alexander Gerard Corsini Sherwin Abdoli Michael Ryan Altonaga Alexandra Babiarz Samantha Rae Beckett Ryan Craig Blakemore Vivian Marie Breckenridge Margaret Elizabeth Irina Calos Inggrid Chandranata Melissa Ee Xin Cheong Mark Albert Chuang Kristine Rillo Cotangco Mahmood Abdulla Evangeline Alva Dianne Thuy Van Bach Brianna L Beckman Ashley Marie Blakeney David Brega Marie Tomi Calvet Jamie I-Fan Chang Alexandria Nicole Cheung Enyinnaya Ifeanyi Chukwuma Alex Jeffrey Cote Anand Mathew Abraham Amanda Kristina Alvarez Shelby Lane Bachman Nathan Elisha Behnam Erini Gretchen Blakey Jordan Anne Bretsch Jean M.
    [Show full text]
  • Sound Masking in Patient Rooms
    Navigate to ... Navigate to ... SnoCQ eguraie: nRtuMedPin oait ontaimskgi s highprofile | May 19, 2014 | 0 Comments by Benjamin Davenny Noise levels in hospitals have become an increasing concern as more noise sources have been added to the hospital environment. These sources range from noisy medical instruments to the layout of patient rooms as they relate to the nurses’ station. Numerous studies have evaluated the impact of noise levels on the hospital environment, but few have considered the type of noise source. The sound of a fan is different from an alarm, even if they measure at the same sound levels. Without clear objectives on the type of noises studied, there is a false impression that a quieter environment is always a better one. Some of these noise sources are necessary in a modern working hospital. The trick is to take a different look at their sources and Ben Davenny develop more efficient methods to reduce disturbance to patients. The often-cited World Health Organization (WHO) and Environmental Protection Agency (EPA) guidelines for hospitals require low noise levels in patient rooms, precluding conversation in corridors with patient doors open. This requirement conflicts with nurses’ needs to see patients and discuss patient care. The WHO and EPA guidelines are also based mainly on transportation noise, whose character is quite distinctive and bothersome to building occupants. Introducing a constant noise source as background sound helps to reduce the impact of impulsive tonal noises such as speech. The typical background noise level can be considered a constant noise with full frequency content. These noise sources include air movement from the building’s HVAC system and cooling fans, as well as electronic sound masking systems.
    [Show full text]
  • Machine Learning Based Cyber Attack Targeting on Controlled Information
    Machine Learning Based Cyber Attacks Targeting on Controlled Information By Yuantian Miao A thesis submitted in fulfillment for the degree of Doctor of Philosophy Faculty of Science, Engineering and Technology (FSET) Swinburne University of Technology May 2021 Abstract Due to the fast development of machine learning (ML) techniques, cyber attacks utilize ML algorithms to achieve a high success rate and cause a lot of damage. Specifically, the attack against ML models, along with the increasing number of ML-based services, has become one of the most emerging cyber security threats in recent years. We review the ML-based stealing attack in terms of targeted controlled information, including controlled user activities, controlled ML model-related information, and controlled authentication information. An overall attack methodology is extracted and summarized from the recently published research. When the ML model is the target, the attacker can steal model information or mislead the model’s behaviours. The model information stealing attacks can steal the model’s structure information or model’s training set information. Targeting at Automated Speech Recognition (ASR) system, the membership inference method is studied to whether the model’s training set can be inferred at user-level, especially under the black-box access. Under the label-only black-box access, we analyse user’s statistical information to improve the user-level membership inference results. When even the label is not provided, google search results are collected instead, while fuzzy string matching techniques would be utilized to improve membership inference performance. Other than inferring training set information, understanding the model’s structure information can launch an effective adversarial ML attack.
    [Show full text]
  • Noise Assessment Activities
    Noise assessment activities Interesting stories in Europe ETC/ACM Technical Paper 2015/6 April 2016 Gabriela Sousa Santos, Núria Blanes, Peter de Smet, Cristina Guerreiro, Colin Nugent The European Topic Centre on Air Pollution and Climate Change Mitigation (ETC/ACM) is a consortium of European institutes under contract of the European Environment Agency RIVM Aether CHMI CSIC EMISIA INERIS NILU ÖKO-Institut ÖKO-Recherche PBL UAB UBA-V VITO 4Sfera Front page picture: Composite that includes: photo of a street in Berlin redesigned with markings on the asphalt (from SSU, 2014); view of a noise barrier in Alverna (The Netherlands)(from http://www.eea.europa.eu/highlights/cutting-noise-with-quiet-asphalt), a page of the website http://rumeur.bruitparif.fr for informing the public about environmental noise in the region of Paris. Author affiliation: Gabriela Sousa Santos, Cristina Guerreiro, Norwegian Institute for Air Research, NILU, NO Núria Blanes, Universitat Autònoma de Barcelona, UAB, ES Peter de Smet, National Institute for Public Health and the Environment, RIVM, NL Colin Nugent, European Environment Agency, EEA, DK DISCLAIMER This ETC/ACM Technical Paper has not been subjected to European Environment Agency (EEA) member country review. It does not represent the formal views of the EEA. © ETC/ACM, 2016. ETC/ACM Technical Paper 2015/6 European Topic Centre on Air Pollution and Climate Change Mitigation PO Box 1 3720 BA Bilthoven The Netherlands Phone +31 30 2748562 Fax +31 30 2744433 Email [email protected] Website http://acm.eionet.europa.eu/ 2 ETC/ACM Technical Paper 2015/6 Contents 1 Introduction ...................................................................................................... 5 2 Noise Action Plans .........................................................................................
    [Show full text]
  • 22Nd International Congress on Acoustics ICA 2016
    Page intentionaly left blank 22nd International Congress on Acoustics ICA 2016 PROCEEDINGS Editors: Federico Miyara Ernesto Accolti Vivian Pasch Nilda Vechiatti X Congreso Iberoamericano de Acústica XIV Congreso Argentino de Acústica XXVI Encontro da Sociedade Brasileira de Acústica 22nd International Congress on Acoustics ICA 2016 : Proceedings / Federico Miyara ... [et al.] ; compilado por Federico Miyara ; Ernesto Accolti. - 1a ed . - Gonnet : Asociación de Acústicos Argentinos, 2016. Libro digital, PDF Archivo Digital: descarga y online ISBN 978-987-24713-6-1 1. Acústica. 2. Acústica Arquitectónica. 3. Electroacústica. I. Miyara, Federico II. Miyara, Federico, comp. III. Accolti, Ernesto, comp. CDD 690.22 ISBN 978-987-24713-6-1 © Asociación de Acústicos Argentinos Hecho el depósito que marca la ley 11.723 Disclaimer: The material, information, results, opinions, and/or views in this publication, as well as the claim for authorship and originality, are the sole responsibility of the respective author(s) of each paper, not the International Commission for Acoustics, the Federación Iberoamaricana de Acústica, the Asociación de Acústicos Argentinos or any of their employees, members, authorities, or editors. Except for the cases in which it is expressly stated, the papers have not been subject to peer review. The editors have attempted to accomplish a uniform presentation for all papers and the authors have been given the opportunity to correct detected formatting non-compliances Hecho en Argentina Made in Argentina Asociación de Acústicos Argentinos, AdAA Camino Centenario y 5006, Gonnet, Buenos Aires, Argentina http://www.adaa.org.ar Proceedings of the 22th International Congress on Acoustics ICA 2016 5-9 September 2016 Catholic University of Argentina, Buenos Aires, Argentina ICA 2016 has been organised by the Ibero-american Federation of Acoustics (FIA) and the Argentinian Acousticians Association (AdAA) on behalf of the International Commission for Acoustics.
    [Show full text]
  • Hybrid Active Noise Barrier with Sound Masking
    Hybrid active noise barrier with sound masking Xun WANG1; Yosuke KOBA2; Satoshi ISHIKAWA2; Shinya KIJIMOTO2 1;2 Kyushu University, Japan ABSTRACT In this paper, a hybrid active noise barrier (ANB) with sound masking capability is considered. To protect the speech privacy, several sound masking techniques have been developed. However, these sound masking techniques based on the superposition of the masker and original sound will lead to increase in the loudness of the sound after masking. Against this problem, this paper proposes a soundproof system which combines an ANB with a sound masking system. The ANB applies a new type of hybrid active noise control (ANC) system, which can reduce the noise diffraction and the noise propagated to the ear positions of the people behind the ANB simultaneously, to attenuate the conversation sound. Consequently, the required volume of the masker sound will decrease because of the smaller loudness of the original conversation sound in the control area. The sound masking system applies a method which can generate masker based on the frequency properties of the original sound. Several simulations are carried out to investigate the sound attenuation and sound masking performance of this system, and the results show that comparing with the traditional sound masking system, the proposed system needs smaller masker sound to achieve the sound masking effect. Keywords: Active Noise Control, Noise Barrier, Sound Masking I-INCE Classification of Subjects Number(s): 38.1, 38.2 1. INTRODUCTION In the open areas such as clinics, pharmacies, banks and offices, leakage of the privacy contained in the conversations has been seen as a very serious problem.
    [Show full text]
  • PROCEEDINGS of the ICA CONGRESS (Onl the ICA PROCEEDINGS OF
    ine) - ISSN 2415-1599 ISSN ine) - PROCEEDINGS OF THE ICA CONGRESS (onl THE ICA PROCEEDINGS OF Page intentionaly left blank 22nd International Congress on Acoustics ICA 2016 PROCEEDINGS Editors: Federico Miyara Ernesto Accolti Vivian Pasch Nilda Vechiatti X Congreso Iberoamericano de Acústica XIV Congreso Argentino de Acústica XXVI Encontro da Sociedade Brasileira de Acústica 22nd International Congress on Acoustics ICA 2016 : Proceedings / Federico Miyara ... [et al.] ; compilado por Federico Miyara ; Ernesto Accolti. - 1a ed . - Gonnet : Asociación de Acústicos Argentinos, 2016. Libro digital, PDF Archivo Digital: descarga y online ISBN 978-987-24713-6-1 1. Acústica. 2. Acústica Arquitectónica. 3. Electroacústica. I. Miyara, Federico II. Miyara, Federico, comp. III. Accolti, Ernesto, comp. CDD 690.22 ISSN 2415-1599 ISBN 978-987-24713-6-1 © Asociación de Acústicos Argentinos Hecho el depósito que marca la ley 11.723 Disclaimer: The material, information, results, opinions, and/or views in this publication, as well as the claim for authorship and originality, are the sole responsibility of the respective author(s) of each paper, not the International Commission for Acoustics, the Federación Iberoamaricana de Acústica, the Asociación de Acústicos Argentinos or any of their employees, members, authorities, or editors. Except for the cases in which it is expressly stated, the papers have not been subject to peer review. The editors have attempted to accomplish a uniform presentation for all papers and the authors have been given the opportunity
    [Show full text]
  • Performing Chinese Contemporary Art Song
    Performing Chinese Contemporary Art Song: A Portfolio of Recordings and Exegesis Qing (Lily) Chang Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Elder Conservatorium of Music Faculty of Arts The University of Adelaide July 2017 Table of contents Abstract Declaration Acknowledgements List of tables and figures Part A: Sound recordings Contents of CD 1 Contents of CD 2 Contents of CD 3 Contents of CD 4 Part B: Exegesis Introduction Chapter 1 Historical context 1.1 History of Chinese art song 1.2 Definitions of Chinese contemporary art song Chapter 2 Performing Chinese contemporary art song 2.1 Singing Chinese contemporary art song 2.2 Vocal techniques for performing Chinese contemporary art song 2.3 Various vocal styles for performing Chinese contemporary art song 2.4 Techniques for staging presentations of Chinese contemporary art song i Chapter 3 Exploring how to interpret ornamentations 3.1 Types of frequently used ornaments and their use in Chinese contemporary art song 3.2 How to use ornamentation to match the four tones of Chinese pronunciation Chapter 4 Four case studies 4.1 The Hunchback of Notre Dame by Shang Deyi 4.2 I Love This Land by Lu Zaiyi 4.3 Lullaby by Shi Guangnan 4.4 Autumn, Pamir, How Beautiful My Hometown Is! by Zheng Qiufeng Conclusion References Appendices Appendix A: Romanized Chinese and English translations of 56 Chinese contemporary art songs Appendix B: Text of commentary for 56 Chinese contemporary art songs Appendix C: Performing Chinese contemporary art song: Scores of repertoire for examination Appendix D: University of Adelaide Ethics Approval Number H-2014-184 ii NOTE: 4 CDs containing 'Recorded Performances' are included with the print copy of the thesis held in the University of Adelaide Library.
    [Show full text]
  • Understanding Sound Masking
    WHY SOUND MASKING? HOW DOES IT WORK? WILL I HEAR IT? HOW EFFECTIVE IS IT? Disruptive noises and conversations make tasks harder to If you’ve ever ran water at your kitchen sink while trying to talk to Sound masking allows easy communication over short someone in the next room, you’ll understand. You can tell your How is the solution complete. Errors happen more often. That adds to stress. conversational partner is speaking, but it’s difficult to comprehend Common misconceptions distances while what they’re saying. That’s because the running water has raised the noise floor in your area. implemented? protecting employees Can’t music provide masking? More than 40 million North Americans work in open plan offices featuring Are acoustics A sound masking system uses loudspeakers The noise floor is the level of constant sound present in a space. If it to distribute a comfortable, engineered from the noises coming from surrounding partial height panels. Granted, these cubicles make better use of space really that important? Music alone does not provide the is too high, you’ll find it irritating. Too low, and you can easily overhear background sound. This makes it difficult to hear frequency spectrum required to offices and workstations. Understanding and improve communication flow, but they’re an acoustical challenge. conversations and noises. incidental noises or conversations. consistently mask conversations and Research conducted over the last decade noises. Music preferences are a matter Traditional walls have given way to modular furniture systems, more by the Center for the Built Environment The LogiSon Acoustic Network’s loudspeakers of personal taste, and because music (CBE) and others shows that poor acoustics are usually installed in a grid-like pattern above contains variations and patterns, it As noise travels, its volume decreases to a level that is covered up by the masking sound, so it follows that this employees use the same space, and everyone is seated closer together.
    [Show full text]
  • Wang, Prefinal3.Indd
    creators of an emperor aihe wang Creators of an Emperor: The Political Group behind the Founding of the Han Empire he enthronement of Liu Bang Ꮵ߶ initiated China’s first lasting em- T pire, the Han ዧ (206 bc–220 ad), and created a model of emperor- ship for over two millennia of subsequent dynasties. Han emperorship was a mode of Chinese authoritarianism different from the extremism of the Qin, and Liu Bang’s shadow can be recognized in many later monarchs, from Zhu Yuanzhang to Mao Zedong.1 The founding of the Han was achieved by a large group of people, addressed at the time -who sup ”,۝פ and in subsequent history as “Meritorious Officials ported Liu Bang in the civil war and enthroned him as the emperor. This group was, in essence, responsible for founding the Han dynasty and instituting its particular model of emperorship. To understand the formation of the Han dynasty, and more importantly, of the political culture that breeded authoritarianism, we need to understand the na- ture of this political group and its members’ divergent interests in pro- moting emperorship. Rather than focusing on the position of the group in the institu- tions of the empire, I study the participants’ own understandings and interpretations of the process of creating an emperor. My focus is not so much on the facts of events, as much as on how events were under- stood and interpreted by the participants and subsequent writers of the time. In other words, I want to bring to the analytical foreground the multitude of thoughts and words that motivated the actions and con- structed the events involved in creating an emperor, since it is through both words and deeds that we can allocate responsibility among those who created monarchy.2 To do so, I investigate three specific ques- This article was completed with the support of a research grant from the University of Hong Kong.
    [Show full text]