- Robotics and Automated Systems
- Robotic Path Planning Algorithms
- Music Technology and Sound Studies
- Robotics and Sensor-Based Localization
- Social Robot Interaction and HRI
- User Authentication and Security Systems
- Music and Audio Processing
- Modular Robots and Swarm Intelligence
- Advanced Manufacturing and Logistics Optimization
- Tactile and Sensory Interactions
- Advanced Malware Detection Techniques
- Hand Gesture Recognition Systems
- Remote Sensing and LiDAR Applications
- Robot Manipulation and Learning
- Memory and Neural Mechanisms
- Psychiatry, Mental Health, Neuroscience
- Anomaly Detection Techniques and Applications
- Manufacturing Process and Optimization
- Embodied and Extended Cognition
- EEG and Brain-Computer Interfaces
- Industrial Vision Systems and Defect Detection
- Network Security and Intrusion Detection
- Teleoperation and Haptic Systems
- Face recognition and analysis
- Hepatitis C virus research
Kyushu Institute of Technology
2015-2024
Google (United States)
2021-2023
Kitakyushu National College of Technology
2023
National Institute of Technology
2023
Hayashi Eye Hospital
2021
Aso Iizuka Hospital
2021
GlaxoSmithKline (Japan)
2020
Carnegie Mellon University
2008-2015
Fukuda Denshi (Japan)
2013
Kinki Central Hospital
2009
In this paper, we propose and evaluate Use Your Illusion, a novel mechanism for user authentication that is secure usable regardless of the size device on which it used. Our system relies human ability to recognize degraded version previously seen image. We illustrate how distorted images can be used maintain usability graphical password schemes while making them more resilient social engineering or observation attacks. Because difficult mentally "revert" image, without knowledge original...
We introduce context-aware scalable authentication (CASA) as a way of balancing security and usability for authentication. Our core idea is to choose an appropriate form active (e.g., typing PIN) based on the combination multiple passive factors user's current location) provide probabilistic framework dynamically selecting scheme that satisfies specified requirement given factors. also present results three user studies evaluating feasibility users' receptiveness our concept. suggest...
While past work has examined password usage on a specific computer, web site, or organization, there is little examining overall in daily life. Through diary study, we examine all of passwords, and offer some new findings based quantitative analyses regarding how often people log in, where they frequently use foreign computers. Our analysis also confirms updates existing statistics about patterns. We discuss implications for design as well security education.
Gestures are a promising candidate as an input modality for ambient computing where conventional modalities such touchscreens not available. Existing works have focused on gesture recognition using image sensors. However, their cost, high battery consumption, and privacy concerns made cameras challenging always-on solution. This paper introduces efficient technique miniaturized 60 GHz radar sensor. The recognizes four directional swipes omni-swipe chip (6.5 × 5.0 mm) integrated into mobile...
To investigate whether female fertility decreases with age due to poor oocyte quality, we examined the presence of DNA fragmentation in ovulated oocytes from young, mature and aged mice. Oocytes three groups mice (7–8, 20–24 40–48 weeks) were retrieved ovlducts 15 h after human chorionic gonadotrophin (HCG) injection.. each mouse incubated a CO2 Incubator for 0–60 tubal fluid (HTF). After incubation, was stained terminal deoxynucleotidyl transferase-mediated dUDP nick-end labelling (TUNEL)...
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the design, implementation, evaluation novel class authentication systems that are resilient observation attacks.Our proposal is first rely human simultaneously process multiple sensory inputs authenticate, most attacks. We build prototype based feedback gained through low fidelity tests. conduct within-subjects usability study...
Most mobile phones and tablets support only two access control device states: locked unlocked. We investigated how well all or-nothing meets the need of users by interviewing 20 participants who had both a smartphone tablet. find all-or-nothing to be remarkably poor fit with users' preferences. On tablets, wanted roughly half their applications available even when was protected authentication. also solicited participants' interest in new mechanisms designed specifically facilitate sharing....
Accurate detection of anomalies in multivariate time series data has attracted much attention due to its importance a wide range applications. Since it is difficult obtain accurately labeled data, many unsupervised anomaly algorithms for have been developed. However, building such system challenging since requires capturing temporal dependencies each and must also encode the inter-correlations between different pairs series. To meet this challenge, we propose Multi Scale Convolutional...
We explore how well the intersection between our own everyday memories and those captured by smartphones can be used for what we call autobiographical authentication-a challenge-response authentication system that queries users about day-to-day experiences. Through three studies-two on MTurk one field study-we found are good, but make systematic errors at answering questions. Using Bayesian modeling to account these response errors, derived a formula computing confidence rating attempting...
Nod and shake of one's head are intuitive universal gestures in communication. As smartwatches become increasingly intelligent through advances user activity sensing technologies, many use scenarios demand quick responses from users confirmation dialogs, to accept or dismiss proposed actions. Such actions include making emergency calls, taking service recommendations, starting stopping exercise timers. Head these could be preferable touch interactions for being hands-free easy perform. We...
We introduce a body-based identification system that leverages individual differences in body segment lengths and hand waving gesture patterns. The identifies users based on two-second captured by Microsoft Kinect. To evaluate our system, we collected 8640 measurements from 75 participants through two lab studies field study. In the first study, evaluated feasibility of concept basic properties features to narrow down design space. second achieved 1% equal error rate user among seven...
Reducing the dose of drug affects treatment efficacy in pegylated interferon (Peg-IFN) and ribavirin combination therapy for patients with hepatitis C virus (HCV) genotype 1. The aim this study was to investigate impact exposure, as well baseline factors virological response on 2 patients. Two-hundred fifty HCV who were undergo 24 weeks included study, 213 completed treatment. Significantly more achieved a rapid (RVR), defined RNA negativity at week 4, sustained (SVR) (92%, 122/133) compared...
Summary. Chronic hepatitis C (CH‐C) genotype 1 patients who achieved early virologic response have a high probability of sustained (SVR) following pegylated interferon (Peg‐IFN) plus ribavirin therapy. This study was conducted to evaluate how reducing drug doses affects complete (c‐EVR) defined as virus (HCV) RNA negativity at week 12. Nine hundred eighty‐four with CH‐C were enrolled. Drug evaluated independently on body weight base from actually taken. From multivariate analysis, the mean...
While a large body of research on image-based authentication has focused memorability, comparatively less attention been paid to the new security challenges these schemes may introduce. Because images can convey more information than text, be vulnerable educated guess attacks passwords. In this paper, we evaluate resilience recognition-based graphical scheme using distorted against two types through user studies.
We introduce RadarHand, a wrist-worn wearable with millimetre wave radar that detects on-skin touch-based proprioceptive hand gestures. Radars are robust, private, small, penetrate materials, and require low computation costs. first evaluated the tactile perception nature of back found tapping on thumb is least error all finger joints, followed by index finger, middle ring pinky in eyes-free high cognitive load situation. Next, we trained deep-learning models for gesture classification. two...
Passwords are the most common authentication scheme today. However, it is difficult for people to memorize strong passwords, such as random sequences of characters. Additionally, passwords do not provide protection against phishing attacks. This paper introduces WebTicket, a low cost, easy-to-use and reliable web account management system that uses "tickets", which tokens contain two-dimensional barcode can be printed or stored on smartphones. Users log into accounts by presenting barcodes...
This paper addresses the problem of using a mobile, autonomous robot to manage forest whose trees are destined for eventual harvesting. “Manage” in this context means periodical weeding between all forest. We have constructed robotic system enabling an move without damaging them and cut weeds as it traverses was accomplished by 1) computing trajectory advance its entrance into forest, 2) developing program equipping with instruments needed follow trajectory. Computation is facilitated...
In the normal course of human interaction people typically exchange more than spoken words. Emotion is conveyed at same time in form nonverbal messages. this paper, we present a new perceptual model mood detection designed to enhance robot’s social skill. This assumes 1) there are only two hidden states (positive or negative mood), and 2) these can be recognized by certain facial bodily expressions. A Viterbi algorithm has been adopted predict state from visible physical manifestation. We...
The increasing amount of sea garbage proving to be a huge problem not only for marine life but also causing tremendous number troubles humans living along the coastlines. Especially Japan, that is surrounded by ocean which has long coastline spans thousands kilometers, and this provides ample opportunities debris accumulate. This paper proposes 3D mapping system utilizing semantic information from RGBD sensor extracted specifically trained state-of-art deep learning neural network merge with...
Bile acids in the spent medium for cell culture were analyzed by gas-liquid chromatography and chromatography-mass spectrometry to determine whether human hepatoblastoma line could synthesize bile acids. Cholic, chenodeoxycholic, lithocolic found medium, a portion of chenodeoxycholic acid all lithocholic sulfated. Since cells had been cultured serum-free it is clear that newly synthesized sulfated cells. Chenodeoxycholic was main suggesting might predominantly acid. On other hand, fetal or...
To enhance the affinity between humans and robots, we have attempted to give a robot "consciousness" ¿emotion¿ such as that identified in animals. A hierarchical structure model has been developed connect robot's consciousness with behavior. However, it is difficult autonomously control timing changes behavior of robot. Therefore, order induce change behavior, motivation developed, was combined model. Then, action dopamine neurotransmitters incorporated add activity conjunction incentive...
In October 2012, International Submarine Engineering Ltd. (ISE) delivered an Explorer Autonomous Underwater Vehicle (AUV) to Fukada Salvage and Marine Works Co. of Japan for marine salvage ocean resource exploration. This vehicle is based on the standard 3000 m depth rated AUV design was customized meet customer's needs. The (named "Deep 1") equipped with a multibeam echosounder, sidescan sonar, sub-bottom profiler, Doppler Velocity Log/Acoustic Current Profiler (DVL/ADCP), sound velocity...
Time is a difficult concept for parents to communicate with young children. We developed TimeBlocks, novel tangible, playful object facilitate communication about concepts of time TimeBlocks consists set cubic blocks that function as physical progress bar. Parents and children can physically manipulate the represent time. evaluated through field study in which six families tried four days at their homes. The results indicate played useful role facilitating often challenging task time-related...