-
Evaluating the Usefulness of Non-Diagnostic Speech Data for Developing Parkinson's Disease Classifiers
Authors:
Terry Yi Zhong,
Esther Janse,
Cristian Tejedor-Garcia,
Louis ten Bosch,
Martha Larson
Abstract:
Speech-based Parkinson's disease (PD) detection has gained attention for its automated, cost-effective, and non-intrusive nature. As research studies usually rely on data from diagnostic-oriented speech tasks, this work explores the feasibility of diagnosing PD on the basis of speech data not originally intended for diagnostic purposes, using the Turn-Taking (TT) dataset. Our findings indicate tha…
▽ More
Speech-based Parkinson's disease (PD) detection has gained attention for its automated, cost-effective, and non-intrusive nature. As research studies usually rely on data from diagnostic-oriented speech tasks, this work explores the feasibility of diagnosing PD on the basis of speech data not originally intended for diagnostic purposes, using the Turn-Taking (TT) dataset. Our findings indicate that TT can be as useful as diagnostic-oriented PD datasets like PC-GITA. We also investigate which specific dataset characteristics impact PD classification performance. The results show that concatenating audio recordings and balancing participants' gender and status distributions can be beneficial. Cross-dataset evaluation reveals that models trained on PC-GITA generalize poorly to TT, whereas models trained on TT perform better on PC-GITA. Furthermore, we provide insights into the high variability across folds, which is mainly due to large differences in individual speaker performance.
△ Less
Submitted 24 May, 2025;
originally announced May 2025.
-
Scenario of Use Scheme: Threat Model Specification for Speaker Privacy Protection in the Medical Domain
Authors:
Mehtab Ur Rahman,
Martha Larson,
Louis ten Bosch,
Cristian Tejedor-García
Abstract:
Speech recordings are being more frequently used to detect and monitor disease, leading to privacy concerns. Beyond cryptography, protection of speech can be addressed by approaches, such as perturbation, disentanglement, and re-synthesis, that eliminate sensitive information of the speaker, leaving the information necessary for medical analysis purposes. In order for such privacy protective appro…
▽ More
Speech recordings are being more frequently used to detect and monitor disease, leading to privacy concerns. Beyond cryptography, protection of speech can be addressed by approaches, such as perturbation, disentanglement, and re-synthesis, that eliminate sensitive information of the speaker, leaving the information necessary for medical analysis purposes. In order for such privacy protective approaches to be developed, clear and systematic specifications of assumptions concerning medical settings and the needs of medical professionals are necessary. In this paper, we propose a Scenario of Use Scheme that incorporates an Attacker Model, which characterizes the adversary against whom the speaker's privacy must be defended, and a Protector Model, which specifies the defense. We discuss the connection of the scheme with previous work on speech privacy. Finally, we present a concrete example of a specified Scenario of Use and a set of experiments about protecting speaker data against gender inference attacks while maintaining utility for Parkinson's detection.
△ Less
Submitted 26 September, 2024; v1 submitted 24 September, 2024;
originally announced September 2024.
-
On the radial growth of ballistic aggregation and other aggregation models
Authors:
Tillmann Bosch,
Steffen Winter
Abstract:
For a class of aggregation models on the integer lattice $\mathbb{Z}^d$, $d\geq 2$, in which clusters are formed by particles arriving one after the other and sticking irreversibly where they first hit the cluster, including the classical model of diffusion-limited aggregation (DLA), we study the growth of the clusters. We observe that a method of Kesten used to obtain an almost sure upper bound o…
▽ More
For a class of aggregation models on the integer lattice $\mathbb{Z}^d$, $d\geq 2$, in which clusters are formed by particles arriving one after the other and sticking irreversibly where they first hit the cluster, including the classical model of diffusion-limited aggregation (DLA), we study the growth of the clusters. We observe that a method of Kesten used to obtain an almost sure upper bound on the radial growth in the DLA model generalizes to a large class of such models. We use it in particular to prove such a bound for the so-called ballistic model, in which the arriving particles travel along straight lines. Our bound implies that the fractal dimension of ballistic aggregation clusters in $\mathbb{Z}^2$ is 2, which proves a long standing conjecture in the physics literature.
△ Less
Submitted 25 August, 2023;
originally announced August 2023.
-
Real-time imaging of atomic potentials in 2D materials with 30 keV electrons
Authors:
Sytze de Graaf,
Majid Ahmadi,
Ivan Lazić,
Eric G. T. Bosch,
Bart J. Kooi
Abstract:
Scanning transmission electron microscopy (STEM) is the most widespread adopted tool for atomic scale characterization of two-dimensional (2D) materials. Many 2D materials remain susceptible to electron beam damage, despite the standardized practice to reduce the beam energy from 200 keV to 80 or 60 keV. Although, all elements present can be detected by atomic electrostatic potential imaging using…
▽ More
Scanning transmission electron microscopy (STEM) is the most widespread adopted tool for atomic scale characterization of two-dimensional (2D) materials. Many 2D materials remain susceptible to electron beam damage, despite the standardized practice to reduce the beam energy from 200 keV to 80 or 60 keV. Although, all elements present can be detected by atomic electrostatic potential imaging using integrated differential phase contrast (iDPC) STEM or electron ptychography, capturing dynamics with atomic resolution and enhanced sensitivity has remained a challenge. Here, by using iDPC-STEM, we capture defect dynamics in 2D WS$_2$ by atomic electrostatic potential imaging with a beam energy of only 30 keV. The direct imaging of atomic electrostatic potentials with high framerate reveals the presence and motion of single atoms near defects and edges in WS$_2$ that are otherwise invisible with conventional annular dark-field STEM or cannot be captured sufficiently fast by electron ptychography.
△ Less
Submitted 24 February, 2021;
originally announced February 2021.
-
Observational daily and regional photovoltaic solar energy production for the Netherlands
Authors:
Benjamin P. M. Laevens,
Olav ten Bosch,
Frank P. Pijpers,
Wilfried G. J. H. M. van Sark
Abstract:
This paper presents a classical estimation problem for calculating the energy generated by photovoltaic solar energy systems in the Netherlands, on a daily, annual and regional basis. We identify two data sources to construct our methodology: pvoutput, an online portal with solar energy yield measurements, and modelled irradiance data, from the Royal Netherlands Meteorological Institute. Combining…
▽ More
This paper presents a classical estimation problem for calculating the energy generated by photovoltaic solar energy systems in the Netherlands, on a daily, annual and regional basis. We identify two data sources to construct our methodology: pvoutput, an online portal with solar energy yield measurements, and modelled irradiance data, from the Royal Netherlands Meteorological Institute. Combining these, we obtain probability functions of observing energy yields, given the irradiance, which we then apply to our PV systems database, allowing us to calculate daily and annual solar energy yields. We examine the variation in our daily and annual estimates as a result of taking different subsets of pvoutput systems with certain specifications such as orientation, tilt and inverter to PV capacity ratio. Hence we obtain specific annual energy yields in the range of 877-946 kWh/kWp and 838-899 kWh/kWp for 2016 and 2017 respectively. The current method used at Statistics Netherlands assumes this to be 875 kWh/kWp, meaning the yields were underestimated and overestimated for 2016 and 2017 respectively. Finally, we translate our national estimates into solar energy yields per municipality. This research demonstrates that an irradiance based measure of solar energy generation is necessary to obtain more accurate energy yields on both a national and regional level.
△ Less
Submitted 23 March, 2021; v1 submitted 3 March, 2020;
originally announced March 2020.
-
Hypernom: Mapping VR Headset Orientation to S^3
Authors:
Vi Hart,
Andrea Hawksley,
Henry Segerman,
Marc ten Bosch
Abstract:
Hypernom is a virtual reality game. The cells of a regular 4D polytope are radially projected to S^3, the sphere in 4D space, then stereographically projected to 3D space where they are viewed in the headset. The orientation of the headset is given by an element of the group SO(3), which is also a space that is double covered by S^3. In fact, the headset outputs a point of this double cover: a uni…
▽ More
Hypernom is a virtual reality game. The cells of a regular 4D polytope are radially projected to S^3, the sphere in 4D space, then stereographically projected to 3D space where they are viewed in the headset. The orientation of the headset is given by an element of the group SO(3), which is also a space that is double covered by S^3. In fact, the headset outputs a point of this double cover: a unit quaternion. The positions of the cells are multiplied by this quaternion before projection to 3D space, which moves the player through S^3. When the player is sufficiently close to a cell, they eat it. The aim of the game is to eat all of the cells of the polytope, which, roughly speaking, is achieved by moving one's head through all possible orientations, twice.
△ Less
Submitted 21 July, 2015;
originally announced July 2015.
-
RDF Validation Requirements - Evaluation and Logical Underpinning
Authors:
Thomas Bosch,
Andreas Nolle,
Erman Acar,
Kai Eckert
Abstract:
There are many case studies for which the formulation of RDF constraints and the validation of RDF data conforming to these constraint is very important. As a part of the collaboration with the W3C and the DCMI working groups on RDF validation, we identified major RDF validation requirements and initiated an RDF validation requirements database which is available to contribute at http://purl.org/n…
▽ More
There are many case studies for which the formulation of RDF constraints and the validation of RDF data conforming to these constraint is very important. As a part of the collaboration with the W3C and the DCMI working groups on RDF validation, we identified major RDF validation requirements and initiated an RDF validation requirements database which is available to contribute at http://purl.org/net/rdf-validation. The purpose of this database is to collaboratively collect case studies, use cases, requirements, and solutions regarding RDF validation. Although, there are multiple constraint languages which can be used to formulate RDF constraints (associated with these requirements), there is no standard way to formulate them. This paper serves to evaluate to which extend each requirement is satisfied by each of these constraint languages. We take reasoning into account as an important pre-validation step and therefore map constraints to DL in order to show that each constraint can be mapped to an ontology describing RDF constraints generically.
△ Less
Submitted 17 July, 2015; v1 submitted 16 January, 2015;
originally announced January 2015.
-
Designing an Ontology for the Data Documentation Initiative
Authors:
Thomas Bosch,
Andias Wira-Alam,
Brigitte Mathiak
Abstract:
An ontology of the DDI 3 data model will be designed by following the ontology engineering methodology to be evolved based on state-of-the-art methodologies. Hence DDI 3 data and metadata can be represented in form of a standard web interchange format RDF and processed by highly available RDF tools. As a consequence the DDI community has the possibility to publish and link LOD data sets to become…
▽ More
An ontology of the DDI 3 data model will be designed by following the ontology engineering methodology to be evolved based on state-of-the-art methodologies. Hence DDI 3 data and metadata can be represented in form of a standard web interchange format RDF and processed by highly available RDF tools. As a consequence the DDI community has the possibility to publish and link LOD data sets to become part of the LOD cloud.
△ Less
Submitted 14 February, 2014;
originally announced February 2014.
-
Looking at a digital research data archive - Visual interfaces to EASY
Authors:
Andrea Scharnhorst,
Olav ten Bosch,
Peter Doorn
Abstract:
In this paper we explore visually the structure of the collection of a digital research data archive in terms of metadata for deposited datasets. We look into the distribution of datasets over different scientific fields; the role of main depositors (persons and institutions) in different fields, and main access choices for the deposited datasets. We argue that visual analytics of metadata of coll…
▽ More
In this paper we explore visually the structure of the collection of a digital research data archive in terms of metadata for deposited datasets. We look into the distribution of datasets over different scientific fields; the role of main depositors (persons and institutions) in different fields, and main access choices for the deposited datasets. We argue that visual analytics of metadata of collections can be used in multiple ways: to inform the archive about structure and growth of its collection; to foster collections strategies; and to check metadata consistency. We combine visual analytics and visual enhanced browsing introducing a set of web-based, interactive visual interfaces to the archive's collection. We discuss how text based search combined with visual enhanced browsing enhances data access, navigation, and reuse.
△ Less
Submitted 14 April, 2012;
originally announced April 2012.