Eiji Hayashi

ORCID: 0009-0008-1248-554X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Robotics and Automated Systems
  • Robotic Path Planning Algorithms
  • Music Technology and Sound Studies
  • Robotics and Sensor-Based Localization
  • Social Robot Interaction and HRI
  • User Authentication and Security Systems
  • Music and Audio Processing
  • Modular Robots and Swarm Intelligence
  • Advanced Manufacturing and Logistics Optimization
  • Tactile and Sensory Interactions
  • Advanced Malware Detection Techniques
  • Hand Gesture Recognition Systems
  • Remote Sensing and LiDAR Applications
  • Robot Manipulation and Learning
  • Memory and Neural Mechanisms
  • Psychiatry, Mental Health, Neuroscience
  • Anomaly Detection Techniques and Applications
  • Manufacturing Process and Optimization
  • Embodied and Extended Cognition
  • EEG and Brain-Computer Interfaces
  • Industrial Vision Systems and Defect Detection
  • Network Security and Intrusion Detection
  • Teleoperation and Haptic Systems
  • Face recognition and analysis
  • Hepatitis C virus research

Kyushu Institute of Technology
2015-2024

Google (United States)
2021-2023

Kitakyushu National College of Technology
2023

National Institute of Technology
2023

Hayashi Eye Hospital
2021

Aso Iizuka Hospital
2021

GlaxoSmithKline (Japan)
2020

Carnegie Mellon University
2008-2015

Fukuda Denshi (Japan)
2013

Kinki Central Hospital
2009

In this paper, we propose and evaluate Use Your Illusion, a novel mechanism for user authentication that is secure usable regardless of the size device on which it used. Our system relies human ability to recognize degraded version previously seen image. We illustrate how distorted images can be used maintain usability graphical password schemes while making them more resilient social engineering or observation attacks. Because difficult mentally "revert" image, without knowledge original...

10.1145/1408664.1408670 article EN 2008-07-23

We introduce context-aware scalable authentication (CASA) as a way of balancing security and usability for authentication. Our core idea is to choose an appropriate form active (e.g., typing PIN) based on the combination multiple passive factors user's current location) provide probabilistic framework dynamically selecting scheme that satisfies specified requirement given factors. also present results three user studies evaluating feasibility users' receptiveness our concept. suggest...

10.1145/2501604.2501607 article EN 2013-07-24

While past work has examined password usage on a specific computer, web site, or organization, there is little examining overall in daily life. Through diary study, we examine all of passwords, and offer some new findings based quantitative analyses regarding how often people log in, where they frequently use foreign computers. Our analysis also confirms updates existing statistics about patterns. We discuss implications for design as well security education.

10.1145/1978942.1979326 article EN 2011-05-07

Gestures are a promising candidate as an input modality for ambient computing where conventional modalities such touchscreens not available. Existing works have focused on gesture recognition using image sensors. However, their cost, high battery consumption, and privacy concerns made cameras challenging always-on solution. This paper introduces efficient technique miniaturized 60 GHz radar sensor. The recognizes four directional swipes omni-swipe chip (6.5 × 5.0 mm) integrated into mobile...

10.1145/3411764.3445367 article EN 2021-05-06

To investigate whether female fertility decreases with age due to poor oocyte quality, we examined the presence of DNA fragmentation in ovulated oocytes from young, mature and aged mice. Oocytes three groups mice (7–8, 20–24 40–48 weeks) were retrieved ovlducts 15 h after human chorionic gonadotrophin (HCG) injection.. each mouse incubated a CO2 Incubator for 0–60 tubal fluid (HTF). After incubation, was stained terminal deoxynucleotidyl transferase-mediated dUDP nick-end labelling (TUNEL)...

10.1093/oxfordjournals.humrep.a019421 article EN Human Reproduction 1996-07-01

A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the design, implementation, evaluation novel class authentication systems that are resilient observation attacks.Our proposal is first rely human simultaneously process multiple sensory inputs authenticate, most attacks. We build prototype based feedback gained through low fidelity tests. conduct within-subjects usability study...

10.1145/1357054.1357085 article EN 2008-04-06

Most mobile phones and tablets support only two access control device states: locked unlocked. We investigated how well all or-nothing meets the need of users by interviewing 20 participants who had both a smartphone tablet. find all-or-nothing to be remarkably poor fit with users' preferences. On tablets, wanted roughly half their applications available even when was protected authentication. also solicited participants' interest in new mechanisms designed specifically facilitate sharing....

10.1145/2335356.2335359 article EN 2012-07-11

Accurate detection of anomalies in multivariate time series data has attracted much attention due to its importance a wide range applications. Since it is difficult obtain accurately labeled data, many unsupervised anomaly algorithms for have been developed. However, building such system challenging since requires capturing temporal dependencies each and must also encode the inter-correlations between different pairs series. To meet this challenge, we propose Multi Scale Convolutional...

10.1109/access.2022.3178592 article EN cc-by IEEE Access 2022-01-01

10.5954/icarob.2025.os11-4 article EN Proceedings of International Conference on Artificial Life and Robotics 2025-02-13

We explore how well the intersection between our own everyday memories and those captured by smartphones can be used for what we call autobiographical authentication-a challenge-response authentication system that queries users about day-to-day experiences. Through three studies-two on MTurk one field study-we found are good, but make systematic errors at answering questions. Using Bayesian modeling to account these response errors, derived a formula computing confidence rating attempting...

10.1145/2493432.2493453 article EN 2013-09-08

Nod and shake of one's head are intuitive universal gestures in communication. As smartwatches become increasingly intelligent through advances user activity sensing technologies, many use scenarios demand quick responses from users confirmation dialogs, to accept or dismiss proposed actions. Such actions include making emergency calls, taking service recommendations, starting stopping exercise timers. Head these could be preferable touch interactions for being hands-free easy perform. We...

10.1145/3610900 article EN cc-by-nc Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2023-09-27

We introduce a body-based identification system that leverages individual differences in body segment lengths and hand waving gesture patterns. The identifies users based on two-second captured by Microsoft Kinect. To evaluate our system, we collected 8640 measurements from 75 participants through two lab studies field study. In the first study, evaluated feasibility of concept basic properties features to narrow down design space. second achieved 1% equal error rate user among seven...

10.1145/2556288.2557043 article EN 2014-04-26

Reducing the dose of drug affects treatment efficacy in pegylated interferon (Peg-IFN) and ribavirin combination therapy for patients with hepatitis C virus (HCV) genotype 1. The aim this study was to investigate impact exposure, as well baseline factors virological response on 2 patients. Two-hundred fifty HCV who were undergo 24 weeks included study, 213 completed treatment. Significantly more achieved a rapid (RVR), defined RNA negativity at week 4, sustained (SVR) (92%, 122/133) compared...

10.1111/j.1365-2893.2009.01182.x article EN Journal of Viral Hepatitis 2009-08-12

Summary. Chronic hepatitis C (CH‐C) genotype 1 patients who achieved early virologic response have a high probability of sustained (SVR) following pegylated interferon (Peg‐IFN) plus ribavirin therapy. This study was conducted to evaluate how reducing drug doses affects complete (c‐EVR) defined as virus (HCV) RNA negativity at week 12. Nine hundred eighty‐four with CH‐C were enrolled. Drug evaluated independently on body weight base from actually taken. From multivariate analysis, the mean...

10.1111/j.1365-2893.2009.01116.x article EN Journal of Viral Hepatitis 2009-06-23

While a large body of research on image-based authentication has focused memorability, comparatively less attention been paid to the new security challenges these schemes may introduce. Because images can convey more information than text, be vulnerable educated guess attacks passwords. In this paper, we evaluate resilience recognition-based graphical scheme using distorted against two types through user studies.

10.1145/1978942.1979242 article EN 2011-05-07

We introduce RadarHand, a wrist-worn wearable with millimetre wave radar that detects on-skin touch-based proprioceptive hand gestures. Radars are robust, private, small, penetrate materials, and require low computation costs. first evaluated the tactile perception nature of back found tapping on thumb is least error all finger joints, followed by index finger, middle ring pinky in eyes-free high cognitive load situation. Next, we trained deep-learning models for gesture classification. two...

10.1145/3617365 article EN ACM Transactions on Computer-Human Interaction 2023-10-27

Passwords are the most common authentication scheme today. However, it is difficult for people to memorize strong passwords, such as random sequences of characters. Additionally, passwords do not provide protection against phishing attacks. This paper introduces WebTicket, a low cost, easy-to-use and reliable web account management system that uses "tickets", which tokens contain two-dimensional barcode can be printed or stored on smartphones. Users log into accounts by presenting barcodes...

10.1145/2207676.2208545 article EN 2012-05-05

This paper addresses the problem of using a mobile, autonomous robot to manage forest whose trees are destined for eventual harvesting. “Manage” in this context means periodical weeding between all forest. We have constructed robotic system enabling an move without damaging them and cut weeds as it traverses was accomplished by 1) computing trajectory advance its entrance into forest, 2) developing program equipping with instruments needed follow trajectory. Computation is facilitated...

10.20965/jrm.2018.p0223 article EN cc-by-nd Journal of Robotics and Mechatronics 2018-04-20

In the normal course of human interaction people typically exchange more than spoken words. Emotion is conveyed at same time in form nonverbal messages. this paper, we present a new perceptual model mood detection designed to enhance robot’s social skill. This assumes 1) there are only two hidden states (positive or negative mood), and 2) these can be recognized by certain facial bodily expressions. A Viterbi algorithm has been adopted predict state from visible physical manifestation. We...

10.20965/jrm.2019.p0629 article EN cc-by-nd Journal of Robotics and Mechatronics 2019-08-19

The increasing amount of sea garbage proving to be a huge problem not only for marine life but also causing tremendous number troubles humans living along the coastlines. Especially Japan, that is surrounded by ocean which has long coastline spans thousands kilometers, and this provides ample opportunities debris accumulate. This paper proposes 3D mapping system utilizing semantic information from RGBD sensor extracted specifically trained state-of-art deep learning neural network merge with...

10.1109/restcon60981.2024.10463570 article EN 2024-02-16

Bile acids in the spent medium for cell culture were analyzed by gas-liquid chromatography and chromatography-mass spectrometry to determine whether human hepatoblastoma line could synthesize bile acids. Cholic, chenodeoxycholic, lithocolic found medium, a portion of chenodeoxycholic acid all lithocholic sulfated. Since cells had been cultured serum-free it is clear that newly synthesized sulfated cells. Chenodeoxycholic was main suggesting might predominantly acid. On other hand, fetal or...

10.1172/jci110701 article EN Journal of Clinical Investigation 1982-11-01

To enhance the affinity between humans and robots, we have attempted to give a robot "consciousness" ¿emotion¿ such as that identified in animals. A hierarchical structure model has been developed connect robot's consciousness with behavior. However, it is difficult autonomously control timing changes behavior of robot. Therefore, order induce change behavior, motivation developed, was combined model. Then, action dopamine neurotransmitters incorporated add activity conjunction incentive...

10.1109/cira.2009.5423223 article EN 2009-12-01

In October 2012, International Submarine Engineering Ltd. (ISE) delivered an Explorer Autonomous Underwater Vehicle (AUV) to Fukada Salvage and Marine Works Co. of Japan for marine salvage ocean resource exploration. This vehicle is based on the standard 3000 m depth rated AUV design was customized meet customer's needs. The (named "Deep 1") equipped with a multibeam echosounder, sidescan sonar, sub-bottom profiler, Doppler Velocity Log/Acoustic Current Profiler (DVL/ADCP), sound velocity...

10.1109/ut.2013.6519831 article EN 2013-03-01

Time is a difficult concept for parents to communicate with young children. We developed TimeBlocks, novel tangible, playful object facilitate communication about concepts of time TimeBlocks consists set cubic blocks that function as physical progress bar. Parents and children can physically manipulate the represent time. evaluated through field study in which six families tried four days at their homes. The results indicate played useful role facilitating often challenging task time-related...

10.1145/2207676.2208299 article EN 2012-05-05
Coming Soon ...