The binding of the user's identity and biometric feature data to an entity is provided by an authority through a digitally signed data structure called a biometric certificate. Therefore, the main goal (or contrib...
详细信息
The binding of the user's identity and biometric feature data to an entity is provided by an authority through a digitally signed data structure called a biometric certificate. Therefore, the main goal (or contribution) of this work is to propose a simple method for generating biometric digital key with biometric certificate on fuzzy fingerprint vault mechanism. Biometric digital key from biometric data has many applications such as automatic identification, user authentication with message encryption, etc. Therefore, this work analysis the related existing scheme and proposes a simplified model where a general fuzzy fingerprint vault using biometric certificate with security consideration.
Our project focuses on evaluating the impact of pen-based computing devices and collaboration-facilitating software in the engineering, science, and technical communication classrooms. The faculty members engaged in t...
详细信息
Our project focuses on evaluating the impact of pen-based computing devices and collaboration-facilitating software in the engineering, science, and technical communication classrooms. The faculty members engaged in the project are implementing pen-based devices (both HP tablet PCs and Wacom pen slates) in their courses. In order to take full advantage of the technology, these instructors are also using DyKnow Vision software to encourage students to work together, to reduce students' time spent copying notes and problems on the whiteboard, and to encourage more efficient methods of studying for exams. The assessment component of the project includes both formative and summative methods deployed throughout the 2006-07 academic year.
By giving intelligence into an artifact, there are a lot of chances for people to have more convenient life. We developed a smart object, called Intelligent Gadget (IG), to give the intelligence into an object. IG con...
详细信息
By giving intelligence into an artifact, there are a lot of chances for people to have more convenient life. We developed a smart object, called Intelligent Gadget (IG), to give the intelligence into an object. IG consists of a hardware and software platform that can be attached to any kinds of the personal belongings. Personal objects that IG attached can be easily carried or possessed. With the reconfigurable and autonomous grouping characteristics of IG, we developed a personalized service that monitors the personal stuffs, called personal stuff monitoring (PSMon). PSMon prevents people from loosing their belongings and from not forgetting the personal stuffs which should be carried. In this paper, we present the development of PSMon including its features, service environment, working scenario, and PSMon prototype.
An effective interconnect network interface card (NIC) is critical to the achievement of a high-performance cluster system. An original NIC architecture based on the Intel IOP310 I/O processor chipset is presented in ...
详细信息
An effective interconnect network interface card (NIC) is critical to the achievement of a high-performance cluster system. An original NIC architecture based on the Intel IOP310 I/O processor chipset is presented in this paper. The NIC is a part of DCNet, which is the cluster interconnect network developed by NCIC. The I/O processor makes it powerful for the NIC to offload the processing of communication protocol from the host CPU. In the NIC architecture, the memory bus is extended to be a local bus for system peripheral interconnection, and a memory integrated network interface (MINI) is implemented and embedded. The testing results of DCNet show that the NIC obtains reasonable user-level communication performance, and prove that the NIC architecture, which based on I/O processor and the MINI approach, is feasible and effective to achieve the high performance.
For the upcoming ubiquitous computing environments in the u-health areas involve the measurement of physiological signals in the daily life. However, the measurement of those signals, such as the photoplethysmography ...
详细信息
For the upcoming ubiquitous computing environments in the u-health areas involve the measurement of physiological signals in the daily life. However, the measurement of those signals, such as the photoplethysmography (PPG), and the electrocardiogram (ECG), requires being still tight during the measurement in order to get the accurate result preventing noises caused by the casual movement. In this paper, we propose a method to obtain the accurate physiological signals in the situation where the little movement is allowed. By measuring PPG and motion signals at the forehead during in motion, we calibrate the distorted PPG signal with the motion signals. We show that the calibrated PPG signal is accurate enough by comparing with the result that is measured at the finger without any movement.
In this research, real-time face tracking and gesture recognizing embedded quadruped robot with a tele-operation server is presented. Using ***21 embedded system, this robot transfers MPEG-4 video to tele-operation se...
详细信息
In this research, real-time face tracking and gesture recognizing embedded quadruped robot with a tele-operation server is presented. Using ***21 embedded system, this robot transfers MPEG-4 video to tele-operation server which processes image data for gesture recognition and face detection, and human following. The developed quadruped robot has 3 DOF 4 legs and pan-tilt actuators. This system can recognize user' s face and hand motion and serve various music contents to robot user.
In this paper, the user identification based on face and speaker information obtained from camera and microphone for the intelligent service robot is proposed. For this purpose, we use fisherface method for face recog...
详细信息
In this paper, the user identification based on face and speaker information obtained from camera and microphone for the intelligent service robot is proposed. For this purpose, we use fisherface method for face recognition. The choice of the fisherface method in this setting is motivated by its insensitivity to large variation in light direction, face pose, and facial expression. Furthermore, we utilize Gaussian Mixture Model (GMM) classifier which uses a Mel-Frequency Cepstral Coefficients (MFCC) as feature vector for speaker recognition. The weighted sum method is used to fuse cosine similarity and log- likelihood produced from fisherface and GMM classifier, respectively. The experimental results reveal that the presented fusion method showed a better performance than fisherface and GMM classifier itself through the research robot platform called WEVER developed in ETRI.
We propose a mitigation technique of high-level multiple access interference(MAI) for multimedia optical Code- Division Multiple-Access(CDMA) systems using the optical power selector. The proposed system can eliminate...
详细信息
We propose a mitigation technique of high-level multiple access interference(MAI) for multimedia optical Code- Division Multiple-Access(CDMA) systems using the optical power selector. The proposed system can eliminate high-intensity MAI at the receiver for the low-priority users. Moreover, the proposed scheme can reduce by half the required number of code sequences compared to the conventional scheme. As a result, the proposed scheme can obtain higher code spreading gain due to the increase of number of weights at the same code-length. We analyze performances of the proposed scheme and show that both the high-priority users and low-priority users achieve lower bit error rates in comparison to the conventional scheme.
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. (2006), First we mathematically model and generalize our approach. T...
详细信息
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. (2006), First we mathematically model and generalize our approach. Then we propose our novel technique, based on decomposition of a number (pixel-value) in sum of prime numbers. The particular representation generates a different set of (virtual) bit-planes altogether, suitable for embedding purposes. They not only allow one to embed secret message in higher bit-planes but also do it without much distortion, with a much better stego-image quality, and in a reliable and secured manner, guaranteeing efficient retrieval of secret message. A comparative performance study between the classical least significant bit (LSB) method, the Fibonacci LSB data-hiding technique and our proposed schemes has been done. Analysis indicates that image quality of the stego-image hidden by the technique using Fibonacci decomposition improves against that using simple LSB substitution method, while the same using the prime decomposition method improves drastically against that using Fibonacci decomposition technique. Experimental results show that, the stego-image is visually indistinguishable from the original cover-image.
暂无评论