The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] persona(142hit)

61-80hit(142hit)

  • Evaluation of BER in Bluetooth Wireless Systems Disturbed by Radiated Noise from Spread Spectrum Clock Systems

    Takahide MURAKAMI  Yasushi MATSUMOTO  Katsumi FUJII  Akira SUGIURA  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E89-B No:10
      Page(s):
    2897-2904

    Frequency-modulated clock signals are widely used in personal computers to reduce the amplitude of the clock harmonic noise, as measured using an electromagnetic interference (EMI) test receiver. However, the power of the clock harmonics is not decreased with this technique called spread spectrum clocking (SSC). Hence, the impact of the harmonics of a frequency-modulated clock on the bit error rate (BER) and packet error rate (PER) of a Bluetooth system is theoretically analyzed. In addition, theoretical analysis covers the effectiveness of a frequency hopping spread spectrum (FH-SS) scheme and forward error correction (FEC) in mitigating the degradation in the BER and PER caused by clock harmonic interference. The results indicate that the BER and PER strongly depend on the modulating frequency and maximum frequency deviation of the clock harmonic. They also indicate that radiated clock harmonics may considerably degrade the BER and PER when a Bluetooth receiver is very close to a personal computer. Frequency modulating the clock harmonics slightly reduces the BER while it negligibly reduces the PER.

  • Impersonation Attacks on Key Agreement Protocols Resistant to Denial of Service Attacks

    Kyung-Ah SHIM  

     
    LETTER-Application Information Security

      Vol:
    E89-D No:7
      Page(s):
    2306-2309

    Hirose and Yoshida proposed an authenticated key agreement protocol based on the intractability of the Computational Diffie-Hellman problem. Recently, Hirose and Matsuura pointed out that Hirose and Yoshida's protocol is vulnerable to Denial-of-Service (DoS) attacks. And they proposed two key agreement protocols which are resistant to the DoS attacks. Their protocols are the first authenticated key agreement protocols resistant to both the storage exhaustion attack and the CPU exhaustion attack. In this paper we show that Hirose and Matsuura's DoS-resistant key agreement protocols and Hirose and Yoshida's key agreement protocol are vulnerable to impersonation attacks. We make suggestions for improvements.

  • A Novel Ranging Method using Energy Window Bank in Non-coherent UWB Systems

    Woon-Yong PARK  Won-Cheol LEE  Sungsoo CHOI  Kwan-Ho KIM  

     
    LETTER

      Vol:
    E89-A No:6
      Page(s):
    1766-1770

    This paper proposes a novel UWB ranging scheme employing 1-bit ADCs and analog window bank for energy collection. For an appropriate 1-bit ADC process DC offset is exploited and removed via performing analog low pass filter. To improve ranging accuracy in presence of ambiguity, dual overlapped window banks designated as primary and auxiliary windows are utilized. Corresponding to the proposed ranging scheme, its performance is verified by conducting simulations in two types of channel conditions. The simulation results show that the proposed ranging scheme performs well even in condensed multipath environment and low SNR situation.

  • Framework for Personalized User Interface by Sharing User-Centric Context between Real and Virtual Environments

    Seiie JANG  Woontack WOO  

     
    PAPER-Human-computer Interaction

      Vol:
    E89-D No:5
      Page(s):
    1694-1701

    In this paper, we propose a framework that provides users with personalized interfaces by sharing user-centric context between real and virtual environments. The proposed framework consists of ubi-UCAM for generating user's contexts, NAVER for managing virtual environment, and rv-Interface for linking ubi-UCAM with NAVER. Firstly, personalized interface helps users to concentrate on their tasks of interest by reducing burdensome menu selections according to user's context. In addition, user-adaptive contents based on user's preferences allow more pleasure personal experiences. Finally, personalized interface with context hand-over mechanism enables users to continuously interact with virtual environments, even if the users move around. According to experimental results, we expect that the proposed framework can play an important role for realizing user-centric VR applications by exploiting personalized interface that adapts to user-centric context.

  • Personal Mesh: A Design of Flexible and Seamless Internet Access for Personal Area Network

    Hoaison NGUYEN  Hiroyuki MORIKAWA  Tomonori AOYAMA  

     
    PAPER

      Vol:
    E89-B No:4
      Page(s):
    1080-1090

    With the proliferation of various types of computing and networking resources in ubiquitous computing environments, an architecture allowing mobile users to flexibly access these resources is desirable. We have focused our attention on the access link resources of devices surrounding users. Our framework named Personal Mesh allows personal devices to seamlessly access the Internet via appropriate access links available in a personal area network. The Personal Mesh deals with two technical issues: access link selection management and a PAN mobility support mechanism. In this paper, we describe the design and implementation of Personal Mesh and show the effectiveness of our system by experiment.

  • Teeth Image Recognition for Biometrics

    Tae-Woo KIM  Tae-Kyung CHO  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E89-D No:3
      Page(s):
    1309-1313

    This paper presents a personal identification method based on BMME and LDA for images acquired at anterior and posterior occlusion expression of teeth. The method consists of teeth region extraction, BMME, and pattern recognition for the images acquired at the anterior and posterior occlusion state of teeth. Two occlusions can provide consistent teeth appearance in images and BMME can reduce matching error in pattern recognition. Using teeth images can be beneficial in recognition because teeth, rigid objects, cannot be deformed at the moment of image acquisition. In the experiments, the algorithm was successful in teeth recognition for personal identification for 20 people, which encouraged our method to be able to contribute to multi-modal authentication systems.

  • Personal Name Resolution Crossover Documents by a Semantics-Based Approach

    Xuan-Hieu PHAN  Le-Minh NGUYEN  Susumu HORIGUCHI  

     
    PAPER-Natural Language Processing

      Vol:
    E89-D No:2
      Page(s):
    825-836

    Cross-document personal name resolution is the process of identifying whether or not a common personal name mentioned in different documents refers to the same individual. Most previous approaches usually rely on lexical matching such as the occurrence of common words surrounding the entity name to measure the similarity between documents, and then clusters the documents according to their referents. In spite of certain successes, measuring similarity based on lexical comparison sometimes ignores important linguistic phenomena at the semantic level such as synonym or paraphrase. This paper presents a semantics-based approach to the resolution of personal name crossover documents that can make the most of both lexical evidences and semantic clues. In our method, the similarity values between documents are determined by estimating the semantic relatedness between words. Further, the semantic labels attached to sentences allow us to highlight the common personal facts that are potentially available among documents. An evaluation on three web datasets demonstrates that our method achieves the better performance than the previous work.

  • Tangible Media Control System for Intuitive Interactions with Multimedia Contents

    Sejin OH  Woontack WOO  

     
    PAPER

      Vol:
    E89-D No:1
      Page(s):
    53-61

    In this paper, we present the Tangible Media Control System (TMCS), which allows users to manipulate media contents through physical objects in an intuitive way. Currently, most people access digital media contents by exploiting GUI. However, it only provides limited manipulation of the contents. The proposed system, instead of a mouse and a keyboard, adopts two types of tangible objects, i.e. a RFID-enabled object and a tracker-embedded object. The TMCS enables users to easily access and control digital media contents through tangible objects. In addition, it supports an interactive media controller which can be used to synthesize media contents according to users' taste. It also offers personalized contents, which suits users' preferences, by exploiting context such as the users' profile and situational information. Accordingly, the TMCS demonstrates that tangible interfaces with context can provide more effective interfaces to satisfy users' demands. Therefore, the proposed system can be applied to various interactive applications such as multimedia education, entertainment, multimedia editor, etc.

  • User Preference Modelling for Access Selection in Multiple Radio Access Environments

    Elaheh HOMAYOUNVALA  A. Hamid AGHVAMI  

     
    PAPER

      Vol:
    E88-B No:11
      Page(s):
    4186-4193

    Access selection in future multiple radio access environments is considered in this paper from a new perspective, that of the consumer. A model is proposed for the automatic acquisition of user preferences to assist in access selection decision making. The proposed approach uses a two-level Bayesian C-Metanetwork that models individual user preferences in terms of affordable cost, acceptable level of quality of service and reputation of the access networks. User preferences under different contexts, such as leisure and business, are also considered. The model also adapts to the change of user preferences over time. A simulator has been developed to evaluate the proposed model and the simulation results are promising in terms of the proportion of correct preference predictions after a small number of training samples.

  • An Internet-Based Cycle Ergometer Health Promotion System for Providing Personally Fitted Exercise

    Zhihui WANG  Tohru KIRYU  Mamoru IWAKI  Keisuke SHIBAI  

     
    PAPER-Biological Engineering

      Vol:
    E88-D No:8
      Page(s):
    1985-1992

    General exercise approaches are not convenient for some people in undertaking appropriate exercise due to the limited variety of present programs at existing exercise machines. Moreover, continuous support by one sports doctor is only available for a limited number of users. In this paper, therefore, we propose an Internet-based technical framework, which is designed on multi-tiered client/server architecture, for integrating and easily upgrading exercise programs. By applying the technical framework, a cycle ergometer health promotion system was developed for providing personally fitted. We also presented some facilities to assist sports doctors in quickly designing and remotely improving individual exercise protocols against cycle ergometer exercise based on a history database. Then we evaluated the Internet-based cycle ergometer system during two months of feasibility experiments for six elderly persons in terms of usability. As a result, the Internet-based cycle ergometer system was effective for continuously supporting the personal fitting procedure.

  • An Extension of 4G Mobile Networks towards the Ubiquitous Real Space

    Kazuo IMAI  Wataru TAKITA  Sadahiko KANO  Akihisa KODATE  

     
    INVITED PAPER

      Vol:
    E88-B No:7
      Page(s):
    2700-2708

    While mobile networks have been enhanced to support a variety of mobile multimedia services such as video telephony and rich data content delivery, a new challenge is being created by the remarkable development of micro-device technologies such as micro processor-chips, sensors, and RF tags. These developments suggest the rapid emergence of the ubiquitous computing environment; computers supporting human life without imposing any stress on the users. The combination of broadband global networks and ubiquitous computing environment will lead to an entirely new class of services, which we call ubiquitous networking services. This paper discusses how to create ubiquitous service environments comparing global networking approaches which are based on fixed and mobile networks. It is shown that the mobile approach is better from service applicability and reliability viewpoints. Networking architecture is proposed which expand 4G mobile cellular networks to real space via gateways on the edges of the mobile network (i.e. mobile terminals). A new set of technical requirements will emerge via this approach, which may accelerate the paradigm shift from the current mobile network architecture and even from the Internet of today.

  • Study on the Transmission Mechanism for Wearable Device Using the Human Body as a Transmission Channel

    Katsuyuki FUJII  Masaharu TAKAHASHI  Koichi ITO  Keisuke HACHISUKA  Yusuke TERAUCHI  Yoshinori KISHI  Ken SASAKI  Kiyoshi ITAO  

     
    PAPER

      Vol:
    E88-B No:6
      Page(s):
    2401-2410

    Recently, wearable devices which use the human body as a transmission channel have been developed. However, there has been a lack of information related the transmission mechanism of such devices in the physical layer. Electro-magnetic communication trials using human body as transmission media have more than a decade's history. However, most of the researches have been conducted by researchers who just want to utilize the fact and practically no physical mechanisms have been researched until recently. Hence, in previous study, the authors proposed calculation models of the wearable transmitter and the receiver attached to the arm using the FDTD method. Moreover, the authors compared the calculated received signal levels to the measured ones by using a biological tissue-equivalent phantom. However, there was little analysis on each component of the propagated signal. In this paper, the authors clarified the transmission mechanism of the wearable device using the human body as a transmission channel from the view point of the interaction between electromagnetic wave and the human body. First, the authors focused their attention on measuring the each component of the propagated signal using a shielded loop antenna. From these results, the favorable direction of electrodes of the transmitter was proposed to use the human body as a transmission channel. As a result, longitudinal direction is effective for sending the signal to the receiver, compared to the transversal direction. Next, the authors investigated the dominant signal transmission channel, because the question of whether the dominant signal channel is in or around the arm had remained unsettled. To clear this question, the authors proposed the calculation model of an arm wearing the transmitter and receiver placed into a hole of a conductor plate. The electric field distribution and received signal voltage was investigated as a function of the gap between the hole of the conductor plate and the surface of the arm. The result indicated that the dominant signal transmission channel is not inside but the surface of the arm because signal seems to be distributed as a surface wave.

  • European Research towards Future Wireless Communications

    Flemming Bjerge FREDERIKSEN  Ramjee PRASAD  Gert F. PEDERSEN  Istvan Z. KOVACS  

     
    INVITED PAPER

      Vol:
    E88-B No:6
      Page(s):
    2259-2267

    This paper presents an overview of four on-going European research projects in the field of mobile and wireless communications leading to the next generations of wireless communications. The projects started in 2004. They investigate requirements and definition of access technology, network architecture, antennas and propagation, security, services, applications and socio-economic impact.

  • Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards

    Wei-Chi KU  Shen-Tien CHANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E88-B No:5
      Page(s):
    2165-2167

    Recently, Das et al. proposed a dynamic ID-based verifier-free password authentication scheme using smart cards. To resist the ID-theft attack, the user's login ID is dynamically generated and one-time used. Herein, we demonstrate that Das et al.'s scheme is vulnerable to an impersonation attack, in which the adversary can easily impersonate any user to login the server at any time. Furthermore, we also show several minor weaknesses of Das et al.'s scheme.

  • A Framework of Time, Place, Purpose and Personal Profile Based Recommendation Service for Mobile Environment

    Sineenard PINYAPONG  Toshikazu KATO  

     
    PAPER

      Vol:
    E88-D No:5
      Page(s):
    938-946

    Nowadays more people have started using their mobile phone to access information they need from anywhere at anytime. In advanced mobile technology, Location Service allows users to quickly pinpoint their location as well as makes a recommendation to fascinating events. However, users desire more appropriate recommendation services. In other words, the message service should push a message at a proper place in time. In consequence, customers obtain a higher level of satisfaction. In this paper, we propose a framework of time, place, purpose and personal profile based recommendation service. We illustrate scenarios in "push", "pull" and "don't disturb" services, where our DB queries can recommend the relevant message to users. The three factors: time, place and purpose are mutually dependent and the basic rules to analyze the essential data are summarized. We also create algorithms for DB query. We are filtering messages by one important factor: personal profile such as user's preference and degree of preference. Furthermore, we discuss an implementation of the prototype system, including results of experimental evaluation.

  • A VoiceFont Creation Framework for Generating Personalized Voices

    Takashi SAITO  Masaharu SAKAMOTO  

     
    PAPER-Speech Synthesis and Prosody

      Vol:
    E88-D No:3
      Page(s):
    525-534

    This paper presents a new framework for effectively creating VoiceFonts for speech synthesis. A VoiceFont in this paper represents a voice inventory aimed at generating personalized voices. Creating well-formed voice inventories is a time-consuming and laborious task. This has become a critical issue for speech synthesis systems that make an attempt to synthesize many high quality voice personalities. The framework we propose here aims to drastically reduce the burden with a twofold approach. First, in order to substantially enhance the accuracy and robustness of automatic speech segmentation, we introduce a multi-layered speech segmentation algorithm with a new measure of segmental reliability. Secondly, to minimize the amount of human intervention in the process of VoiceFont creation, we provide easy-to-use functions in a data viewer and compiler to facilitate checking and validation of the automatically extracted data. We conducted experiments to investigate the accuracy of the automatic speech segmentation, and its robustness to speaker and style variations. The results of the experiments on six speech corpora with a fairly large variation of speaking styles show that the speech segmentation algorithm is quite accurate and robust in extracting segments of both phonemes and accentual phrases. In addition, to subjectively evaluate VoiceFonts created by using the framework, we conducted a listening test for speaker recognizability. The results show that the voice personalities of synthesized speech generated by the VoiceFont-based speech synthesizer are fairly close to those of the donor speakers.

  • A Spatial Model for Ubiquitous Computing Services

    Ichiro SATOH  

     
    PAPER-Software Platform Technologies

      Vol:
    E88-B No:3
      Page(s):
    923-931

    We present a world model for location-aware and user-aware services in ubiquitous computing environments. It can be dynamically organized like a tree based on geographical containment, such as in a user-room-floor-building hierarchy and each node in the tree can be constructed as an executable software component. The model is unique to existing approaches because it enables location-aware services to be managed without databases, can be managed by multiple computers, and provides a unified view of the locations of not only physical entities and spaces, including users and objects, but also computing devices and services. A prototype implementation of this approach was constructed on a Java-based mobile agent system. This paper presents the rationale, design, implementation, and applications of the prototype system.

  • An Efficient Caching Scheme for Personal Communication Service Networks

    ChangWoo PYO  Jie LI  Hisao KAMEDA  

     
    PAPER-Switching for Mobile Communications

      Vol:
    E87-B No:12
      Page(s):
    3603-3610

    Personal communication service (PCS) networks support the delivery of communication services as the mobile user moves from one region to another. When a mobile user receives a call, the network has to quickly determine its current location. The existing approach suffers from high delay in locating the mobile since the mobile's current location has to be always consulted on the location databases. Caching the location of the remote mobile is useful to reduce this delay. However, the longer the useless record caused by the movement of the mobile remains in a cache, the higher the degradation of cache memory utilization is imposed on a system. In this paper, we propose an efficient caching scheme that a cached record is not allowed to remain over the predefined time, called a time-threshold, in a cache. A long time-threshold may cause to increase the obsoleteness of the cached record. In contrast, a short time-threshold may cause to degrade memory utilization. This paper finds the optimal time-threshold to enlarge cache memory utilization. Also, we provide a unique solution for determining the optimal time-threshold, and study the effects of changing the important parameters of mobility, calling patterns, and network conditions on the optimal time-threshold. Furthermore, we compare the performance of the proposed caching call delivery scheme and the existing call delivery schemes.

  • Personal Entropy from Graphical Passwords: Methods for Quantification and Practical Key Generation

    Masato AKAO  Shinji YAMANAKA  Goichiro HANAOKA  Hideki IMAI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E87-A No:10
      Page(s):
    2543-2554

    In many cryptosystems incorporating human beings, the users' limited memories and their indifference to keeping the systems secure may cause some severe vulnerability of the whole systems. Thus we need more studies on personal entropy, from an information theoretical point of view, to capture the characteristics of human beings as special information sources for cryptosystems. In this paper, we discuss and analyze the use of personal entropy for generating cryptographic keys. In such a case, it is crucially important to precisely evaluate the amount of personal entropy that indicates the actual key length. We propose an advanced key generation scheme based on the conventional graphical passwords proposed in [12]. We improve them to make the most of the secret information extracted in one drawing, i.e., we incorporate the on-line pen pressure and pen inclination information in addition to utilize more secret information. We call the scheme dynamic graphical passwords, and propose a practical construction of them. We also show a precise way of quantifying their entropy, and finally, as an experimental result, we can generate a key of over 110-bit long, using the data of a single drawing. When quantifying their entropy, we need to precisely evaluate the entropy of graphical passwords as well as that of the on-line information of pen movements. We need to precisely evaluate the entropy of graphical passwords by considering the users' biased choices of their graphical passwords. It is expected that they tend to choose their passwords that are memorable as easily as possible, thus we quantify the burden of memorizing each graphical password by the length of its description using a special language based on [12]. We improve the approach in [12] by more directly reflecting how easily each graphical password can be memorized.

  • Security Analysis of a Threshold Access Control Scheme Based on Smart Cards

    Gwoboa HORNG  Chao-Liang LIU  Yao-Te HWANG  

     
    LETTER-Information Security

      Vol:
    E87-A No:8
      Page(s):
    2177-2179

    In 2003, Wu proposed a threshold access control scheme based on smart cards. In this letter, we show that the scheme is vulnerable to various attacks.

61-80hit(142hit)