Manabu Okamoto

ORCID: 0009-0004-3612-9639
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Speech and Audio Processing
  • Speech Recognition and Synthesis
  • User Authentication and Security Systems
  • Advanced Adaptive Filtering Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Acoustic Wave Phenomena Research
  • Music and Audio Processing
  • Cryptography and Data Security
  • Gaze Tracking and Assistive Technology
  • Advanced Data Compression Techniques
  • Context-Aware Activity Recognition Systems
  • Hand Gesture Recognition Systems
  • Speech and dialogue systems
  • Education and Learning Interventions
  • Tactile and Sensory Interactions
  • Robotics and Automated Systems
  • Neural Networks and Applications
  • Human auditory perception and evaluation
  • Caching and Content Delivery
  • IPv6, Mobility, Handover, Networks, Security
  • Access Control and Trust
  • Wireless Body Area Networks
  • Antenna Design and Optimization
  • Network Security and Intrusion Detection
  • Advanced Steganography and Watermarking Techniques

Sojo University
2020-2024

Kanagawa Institute of Technology
2010-2023

NTT (Japan)
2003-2020

Obihiro University of Agriculture and Veterinary Medicine
2013

Waseda University
2007-2010

Toshiba (Japan)
2005

Kyoto University
2003

Interface (United Kingdom)
1996-1999

We have developed a method of segregating desired speech from concurrent sounds received by two microphones. In this method, which we call SAFIA, signals microphones are analyzed discrete Fourier transformation. For each frequency component, differences in the amplitude and phase between channels calculated. These used to select components signal that come direction reconstruct these as source signal. To clarify effect resolution on proposed conducted three experiments. First, relationship...

10.1250/ast.22.149 article EN Nippon Onkyo Gakkaishi/Acoustical science and technology/Nihon Onkyo Gakkaishi 2001-01-01

Consumer electronics equipped with a microphone array, such as car navigation devices and headsets commonly implement speech enhancement techniques based on the gradient method to cope additive noise. However, while these had been originally developed for voice communication can maximize signal-to-distortion ratio (SDR), they cannot always automatic recognition (ASR) accuracy. For this reason, front-end parameters have adjusted by human experts each environment acoustic model. In study, we...

10.1109/tce.2020.2986003 article EN IEEE Transactions on Consumer Electronics 2020-04-08

A stereo microphone array developed for a high-definition videophone system is presented. The consists of pair fixed beamformers to collect sounds in clearly while suppressing the far-end talk emitted from loudspeakers decrease undesirable influence acoustic echo. Both objective and subjective experimental results demonstrate that satisfies required specifications, which have not been achieved by several conventional schemes.

10.1109/tce.2008.4560160 article EN IEEE Transactions on Consumer Electronics 2008-05-01

A password-based authentication is a simple technique used for user of computer or Web services. However, by shoulder surfing passwords can be stolen easily. To prevent these attacks, we need to shield our keypad from view using body cupping hand. hide them easily, it better that itself the range inputting keys small. We propose password system with only three and show an analysis security evaluation results short test. Our method also utilized handicapped users who find hard use input in...

10.1109/sai.2016.7556148 article EN 2016 SAI Computing Conference (SAI) 2016-07-01

We have developed a sound image rendering system for headphones that enables anyone to easily create realistic 3-D sound. This paper presents the structure of this system, and results subjective tests confirm system's feasibility in affecting has been used making music CDs.

10.1109/30.628695 article EN IEEE Transactions on Consumer Electronics 1997-01-01

This paper presents the fragility function for wooden house obtained from field investigation of flood disaster in Nakanoshima town, Niigata prefecture due to July 13, 2004 heavy rainfall. At emergency phase disasters, early understanding overview damage is required management personnel and resource. To understand easily, which estimates inundation depth helpful. The measured at many points rank each identified this disaster. constructed using these data. Additionally, we marshaled those...

10.2208/prohe.49.439 article EN PROCEEDINGS OF HYDRAULIC ENGINEERING 2005-01-01

We have developed a self-adjustable speech enhancement and recognition (SSER) system to make automatic (ASR) robust variation of acoustic conditions. The SSER enhances components in observed signals, switching parameter values accordance with the Candidates for value are automatically generated using real-coded genetic algorithm (GA) advance. experimental results show that performance parameter-set is improved by proposed method.

10.1109/icce.2019.8661925 article EN 2023 IEEE International Conference on Consumer Electronics (ICCE) 2019-01-01

Abstract The distribution of secret information so that no one knows which is being passed to whom, such as in a poker game or the like, an important issue for security. Secret expected have applications key distribution, electronic voting, and on. A method must maintain secrecy untraceability distributed content, without requiring any effort on part recipient. In this paper, authors propose method, using third‐party organizations, recipient can easily receive having engage work itself; be...

10.1002/ecjc.20308 article EN Electronics and Communications in Japan (Part III Fundamental Electronic Science) 2007-04-23

We propose a method for achieving sharp directivity by sensing signals in diffuse acoustic field. Directivity control based on beamforming has been studied to make it possible extract the waveform and location of an identified target source even if there are many noise sources. Sharp can be achieved minimizing output power filter. However, is difficult minimize over broad frequency ranges. Our approach spatial properties transfer functions correlation matrix, using reflector that surrounds...

10.1109/icassp.2012.6287858 article EN 2012-03-01

10.1109/gcce62371.2024.10760962 article EN 2022 IEEE 11th Global Conference on Consumer Electronics (GCCE) 2024-10-29

In this paper, we propose a novel training strategy for deep neural network (DNN) based small-footprint acoustic models. The accuracy of DNN-based automatic speech recognition (ASR) systems can be greatly improved by leveraging large amounts data to improve the level expression. DNNs use many parameters enhance performance. Unfortunately, resource-constrained local devices are unable run complex ASR systems. For building compact models, knowledge distillation (KD) approach is often used. KD...

10.1109/slt.2018.8639545 article EN 2022 IEEE Spoken Language Technology Workshop (SLT) 2018-12-01

Several studies have reported that experts outperform novices in specific domains. However, the superiority of accuracy, taking both trueness and precision into consideration, has not yet been explored. Here, we examined differences between expert novice performances by evaluating accuracy their estimations physical concentrations sodium chloride solutions while employing a visual analog scale. In Experiment 1, 14 13 tasted 6 until they had learned intensities. Subsequently, repeatedly rated...

10.1093/chemse/bjs137 article EN Chemical Senses 2013-01-10

The vast majority of online servicesrequire some form ofpersonal authentication.Unfortunately, standard password authenticationstrikes a poor balance between security and convenience, whereas strongerauthentication schemes,such as those involvingbiometrics, one-time passwords, electronic certificates, depend on specialized hardware and/orhardware tokens.To achieve robustness, cost-effectiveness together, we propose scheme for dynamicknowledge-based authentication in which Twitter direct...

10.5121/ijnsa.2013.5501 article EN International Journal of Network Security & Its Applications 2013-09-30

In this paper, we propose a personal portable proxy server that offers various functions from USB flash drive.With the rapidly growing volume of data generated by applications, managing becomes problem.A drive can help us manage easily, because carry any and application anytime on drive.Therefore, an intelligent with drive.This provides convenient features, such as content filtering, history sharing, phishing prevention, especially automatic form completion.We also using to exchange...

10.7763/ijcce.2014.v3.326 article EN International Journal of Computer and Communication Engineering 2014-01-01

When an ultrasound vibration that has been amplitude-modulated by audible sound is transmitted to auricular cartilage such as the tragus, heard. To study this phenomenon, we measured nonlinear effect using a piece of pig's and acceleration sensor, found self-demodulation occurred in cartilage. We also pressure level acoustic coupler simulated our earphone placed on tragus. The results show was generated coupler's air chamber. However, most important factor from produced Therefore, think perceived

10.1143/jjap.42.2918 article EN Japanese Journal of Applied Physics 2003-05-30

When finite-state machines are used for dialogue models of a conversational agent, learning algorithms which learn probabilistic automata with the state merging method useful. However these should whole data every time number example dialogues increases. Therefore, cost is large when we construct gradually. We proposed decreases compatibility checks by caching information, and evaluated it perplexities learned models. From comparison among models, caches only compatibility-changed states...

10.1109/kmn.2002.1115179 article EN 2003-06-25

A stereo microphone array developed for a high-definition videophone system is presented. It consists of pair fixed beamformers to collect sounds in clearly while suppressing the far-end talk decrease undesirable influence acoustic echo. Experimental results prove that satisfies required specifications, which have not been achieved with conventional schemes.

10.1109/icce.2008.4587858 article EN 2008-01-01

In teleconferencing, conversation should flow naturally between separate sites. The acoustic design should, of course, be able to at least convey the correct volume. However, sound localization is also very important for realizing kind virtual reality world that teleconferencing. Coordinating visual image (a speaker’s face) and (his or her voice) creates a environment in which participants each site feel as if they are having same room. Two prototype teleconferencing systems with effects...

10.1121/1.425148 article EN The Journal of the Acoustical Society of America 1999-02-01

The acquisition of comprehensive sound field information is a central topic in spatial acoustics. In conventional systems, recording devices must be located at the listener’s viewpoint. This research introduces technique for spherical microphone arrays which makes use a-priori regarding distribution sources. proposal generates descriptions viewpoints that are away from device, as long there no sources between target viewpoint and array. Sound descriptions, set harmonic expansion...

10.1121/1.4950265 article EN The Journal of the Acoustical Society of America 2016-04-01

Mixing information is a key technique in network security. In mental poker, Internet lottery, and Mix-Net for electronic voting, we use shuffling to maintain anonymity, privacy, fairness. this paper, propose method confirm whether mix done well by finding fixed point the system while keeping how shuffle was secret.

10.1109/tencon.2011.6129014 article EN 2011-11-01
Coming Soon ...