-
Article type: Cover
Pages
Cover1-
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Article type: Index
Pages
Toc1-
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Susumu HATTORI, Yoshiyuki OHNISHI
Article type: Article
Session ID: ME2009-153
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
In industrial vision metrology, off-the shelf cameras with known or unknown interior orientation parameters are widely employed. CCD which has long been used as an imaging sensor is now gradually replaced by CMOS. But the authors have often experienced the deterioration of measurement with a CMOS camera, the reason of which is unclear. This paper discusses experiments on precision comparison between the two types of cameras with almost the same conditions. The results show that the measurement precision with a CMOS camera is lower than that with a CCD camera by 5-10% in RMS object space coordinates. This paper discusses the experiment and analysis from viewpoint of respective factors.
View full abstract
-
Shohei WATADA, Ken-Ichiro HAYASHI, Masashi TODA, Takeshi NAGASAKI, Yui ...
Article type: Article
Session ID: ME2009-154
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
Collisions often occur because the area behind a car is not clearly visible in the dark. In this paper, we propose a system to measure the distance between the rear of the car and a target behind it in order to reduce the number of these accidents. Because it is expensive and time-consuming to develop new devices, this system uses a factory-installed monocular camera, brake light, and tail light that are installed beforehand. The light from the brake light and tail light diffuses, though, so with this system, we aim to extract the slit light from the distribution of the diffused light, and to apply a light-section method.
View full abstract
-
Yukihiro BANDOH, Seishi TAKAMURA, Hirohisa JOZAWA
Article type: Article
Session ID: ME2009-155
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
Over the past decade video acquisition rate has brokenthrough over 1000[Hz]. Current display systems, unfortunately, have a maximum frame-rate about 60[frames/sec]. The display systems are definitely slower than the camera system. When a high frame-rate video (over 1000[frames/sec]) is played in real time, however, it is necessary to down-sample the frame-rate of the video. Such video has many frames around the "constant interval" sub-sampled frame that do not yield jerky motion since the optical flow field displacement within the frames is too small to be perceived. In other words, constant frame interval is not always needed when down-sampling high frame-rate video. Relaxing the interval requirement allows greater flexibility in selecting the frames to be sub-sampled, which allows the number of bits in a sub-sampled sequence to be reduced. When we relax the interval requirement, it is important to realize the same subjective image quality as sequence sub-sampled with constant interval. In this paper, we evaluate the relationship between the subjective quality of sequence sub-sampled with variable interval and the deviation from constant interval. We clarify the permissible deviation from constant interval subject to realizing the same subjective image quality.
View full abstract
-
Ryotaro Okabe, Yasutami Chigusa, Taizoh Hattori, Mitsuhiro Tomita
Article type: Article
Session ID: ME2009-156
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
In this paper we present the combination of two well known techniques like Video Synthesis and Flocking Behavior to introduce a new form of video animation, Real-Video based Animation. This system can be used in the elaboration of games and special effects for movies. We have developed a system that makes possible to manipulate objects in the frames of a video while maintaining its natural appearance and complexity and allows us to multiply an object in the frame or control the pattern of its movement. The system accepts as input a video in format AVI and renders automatically another with new patterns from the original. Video Synthesis and Flocking Behavior are well known independent techniques but the combination of them was not researched yet.
View full abstract
-
Hiromasa HIRATA, Satoshi FUKADA, Yoshinori ITO, Motoyuki HORII
Article type: Article
Session ID: ME2009-157
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
IPTV provides IP broadcasting, VOD, and IP transmission of digital terrestrial broadcasting and enables users to access to thousands of video contents across them. On the other hand, it is difficult for users to find video contents in them. Therefore we propose a video content recommendation method with using widget application, which can provide video contents related on a user's viewing video content. And we implemented the experimental system of the proposed method, and conducted subjective assessments for the recommendation results by using the system. This paper also discusses the experimental results.
View full abstract
-
Takayuki NAKANISHI, Osamu ARAKI
Article type: Article
Session ID: ME2009-158
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
In this report, we propose a method for automatic generation of handwritten-like fonts. This method uses parameters for each type of stroke, which generated from control point of Bezier Curve. In addition, stochastic random fluctuations are added to each stroke rendering of fonts. This method has two advantages. First, this expresses a lot of different styles of handwriting fonts. Second, the generated font image is slightly different for the same character despite the same parameter values of handwriting fluctuation.
View full abstract
-
TIMOTHE FAUDOT, SATOSHI SHIMADA, AKIRA KOJIMA
Article type: Article
Session ID: ME2009-159
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
Nowadays, a lot of conferences, meetings, symposiums, etc. provide video reviews of the talks that have been taking place. Using a professional video editing software, the creation process of those videos can be painful and time-consuming. Using computer visions techniques like background/foreground subtraction, particle filtering and face detection for discovering interesting parts of the talk we can leverage this difficulty to a quasi null factor, meanwhile speeding up the process. While usual approaches use separate audio/video/presentation files, we propose to recover everything directly from a High Definition video stream of the talk. The produced meta-data and video allows seamless integration with Scene Knowledge, a video reviewing on-line system developed by NTT.
View full abstract
-
Yusuke ENDO, Rei ONGA, Masanori HIROTOMO, Masakatu MORII
Article type: Article
Session ID: ME2009-160
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
The two dimensional code is widely used since it is useful for the mobile phone with the CCD camera. The QR code is well known as the two dimensional code. It consists of the monochrome modules, so it cannot contain large multimedia data. In this paper, we propose a multiplexed color QR code. It is a two dimensional code which consists of modules, colored by the assigned RGB value in the color space. The proposed method designs the color code by estimating the value-to-noise ratio in the RGB color space.
View full abstract
-
Toshihiko WAKAHARA, Noriyasu YAMAMOTO, Hiroki OCHI
Article type: Article
Session ID: ME2009-161
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
Two-dimensional bar codes, such as the QR (Quick Response) codes, are frequently used with progress of the Internet and introducing the QR decoding function in the cellar phone. A bar code shows an individual identification number (ID) fundamentally. As the amount of information shown by one-dimensional bar codes is limited, two-dimensional bar codes have been developed. This paper studies the QR coding method and the redundancy characteristics of the QR coding are described. The information of the dotted picture can be multiplexed in the redundant area and multiplexing characteristics are evaluated.
View full abstract
-
HIROYUKI NISHI, YOSHIMASA KIMURA
Article type: Article
Session ID: ME2009-162
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
It is difficult to record speakers' voice in appropriate level in case that the distances between the speakers and the microphone are not same. This paper reports the new recording system -Dual INPut LEvel method-DINPLE method, which processes the monaural input as the stereo sound after amplified by the different level. Then the appropriate channel is selected and adopted by the power value in the buffer.
View full abstract
-
Moriyuki HATA, Satoshi TAOKA, Toshimasa WATANABE
Article type: Article
Session ID: ME2009-163
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
The term "Conference" means an academic meeting in general for presentation and discussion on scientific research/education activities, possibly including refereeing procedures. There are many intermediate processing steps before the completion. Among them session scheduling takes much effort and long processing time, because several dozen to thousand papers may have to be handled. It is a combinatorial optimization problem for maximize or minimize a given objective function under some constraints, such as avoiding assignments of chairpersons to the time slots for presentation of their papers. The problem is known to be NP-hard. Requirements are divided into hard ones and soft ones. All hard ones have to be satisfied, while it is desirable that as many soft ones as possible are met. Hence the objective is to obtain a conference timetable satisfying all hard requirements and as many soft ones as possible. In this research, we focus on the local search method (LS for short), well-known as heuristics for combinatorial optimization, propose a new algorithm based on the method, and evaluate its capability by means of results of computing experiment. Also explained are several functions implemented for supporting session scheduling. This paper reports current status of developing the proposed system.
View full abstract
-
Mei KODAMA
Article type: Article
Session ID: ME2009-164
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
Over the broadband internet, we often use video contents. In addition, not only broadcast but also IPTV are used in large display and PC now. In this paper, we pay attention to "Video Contents Distribution System", and once they receive some contents data, we have to consider how to manage them and to control the quality. Here, we consider an algorithm of scalable video coding in order to control the video quality easily according to the diversity of usage of video contents. We show the concept of quantization parameters description and a new modified method of scalable video coding to provide multi-quality video to users.
View full abstract
-
Tomohiro TSUJI, Tomonobu YOSHINO, Sei NAITO, Shuichi MATSUMOTO
Article type: Article
Session ID: ME2009-165
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
As the next generation video application, ultra-high resolution video whose resolution is much higher than conventional full HDTV is quite attractive, and the new encoding scheme which gives higher coding performance than H.264/MPEG-4 AVC is strongly required. As the related work, extending macroblock size schemes are proposed to effectively eliminate the redundancy under the pretty high spatial correlation as the representative feature of ultra-high resolution video signals. Among conventional extending macroblock size schemes, the spatially adaptive macroblock size selection based on the analysis of spatially local image feature within a video frame is regarded as the potentially effective approach. In this paper, the effectiveness of the spatially adaptive macroblock size selection scheme is strictly evaluated for 7680x4320 resolution sequences under the practical condition for encoder parameters.
View full abstract
-
Hiroshi SANKOH, Akio ISHIKAWA, Sei NAITO, Shigeyuki SAKAZAWA
Article type: Article
Session ID: ME2009-166
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
We proposed a robust matting method based on 3D-model feedback which refines each silhouette and 3D-shape recursively. This method can improve each silhouette and 3D shape mutually by giving feedbacks from the processing results on repairing missed parts and filtering out unwanted parts in 3D shape and silhouettes iteratively. In this study, we propose a filtering process by using location information of objects in 3D shape and the color information of each silhouette for the purpose of getting rid of unwanted parts which cannot be cleaned up with existing method. Furthermore, we expand our proposed matting method by combining this filtering method. Experimental results show the effectiveness of our methods.
View full abstract
-
Tatsuaki Ito, Yukihiro Nakamura, Hirohisa Tezuka, Shinyo Muto, Masanob ...
Article type: Article
Session ID: ME2009-167
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
Because broadcasting technologies and networks have been continuously upgraded, we are now able to access extremely large numbers of channels and TV programs in daily life. However, it has become difficult for users to find interesting TV programs from among the multitude of programs available. In this paper, we propose a TV-program recommendation system that utilizes the user's life log data such as browsing histories on WWW, locations visited, personal scheduler on PC, and TV-programs watched. We implement prototype to evaluate effectiveness of our approach. A subjective experiment shows that life log data is effective in improving the quality of program recommendations.
View full abstract
-
Tadamasa TAKEMURA, Tomohiro KURODA, Kazuya OKAMOTO, Naoto KUME, Hiroyu ...
Article type: Article
Session ID: ME2009-168
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
It is expected that the information technology makes the medical treatment efficiency, and need to the spread of the Electronic Medical Records in the e-Japan plan. However, id is not introduced as expected. One side, and the clinical records defend interests of patients. Toward direction where all information is recorded from the viewpoint on the site of the medical treatment. This is thought that it is necessary to catch with the system that consolidates a patient in not the system but the hospital and a life log both medics that records only information that the medicine requested.
View full abstract
-
Takuya MURAYAMA, Hirohisa TEZUKA, Shinyo MUTO, Masanobu ABE
Article type: Article
Session ID: ME2009-169
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
we proposed ordinary/unordinary state's label to increase the kind of life log services and to improve the quality of the life log services. We have tried to classify heart rates data to ordinary/unordinary class before. In this paper, we show the results of experiments which we add new characters such as an average of heart rates in a certain window, and time-oriented characters to classify heart rates data with higher accuracy. And we show we classified subjects to two groups. The subjects in one groups, can be esitimated their ordinary/unordinary state from their heart rates. However, we studied the other group's subjects can not be estimated their ordinary/unordinary state from their heart rates. And we observed the case the labeling accuracy getting better with new characters in the case of subjects who can not be estimated their ordinary/unordinary state from their heart rates.
View full abstract
-
Keisuke UTSU, Hiroshi ISHII
Article type: Article
Session ID: ME2009-170
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
In ad hoc networks, flooding is used to deliver messages to the whole network. To reduce redundant packets and traffic load, many methods have been proposed. But since those studies do not take into account the actual load condition of each node that will affect network efficiency, not many studies achieve both ensuring the high message reachability and reducing redundant rebroadcast. We have proposed novel methods using the MAC transmission queue of each node to make the decision about whether rebroadcast messages should be sent or not. In this paper, we focus on the Load-aware Dynamic Probabilistic Flooding (LDPF), which determines the rebroadcast probability dynamically based on MAC transmission queue information. Through a network simulation, we evaluate and show the effectiveness of our proposal.
View full abstract
-
Hidenori KIKUCHI
Article type: Article
Session ID: ME2009-171
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
3G mobile broadband, such as FOMA provided by NTT docomo, extends its providing area, and high-speed data transmission is now available all over the country. Because the environment of this high-speed data transmission has been consolidated, large-volume data such as video can be transmitted. Also, variety of communication service for multi media goes on increasing. Sony has developed real-time video transmission system "LocationPorter" by using 3G mobile broadband. "LocationPorter" is a high-quality and stable real-time video transmission system which combines Sony's original video/audio compression technology. Since this is the video transmission by mobile communication, stability of video transmission as the change of communication environment is required. However, Sony successfully produced high-quality and high stability video transmission system by mounting Sony's unique QoS technology. Here is the exposition of Sony's unique QoS technique.
View full abstract
-
Yosuke TODO, Yasuo ASAKURA, Masakatu MORII
Article type: Article
Session ID: ME2009-172
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
The threats of the attacks that exploit vulnerabilities in software are amazingly increased in recent years. Because of the lack of information about the security, in general, it is extremely difficult for users to update their software, and most of the vulnerabilities are left for a long time. In this paper, we propose a vulnerability scanner for client using existing vulnerability databases. The proposed system observes vulnerability databases existing on the Internet and automatically updates our system's database. So it can reduce the system administrator's tasks compared with the manual updating system, and can keep the database latest.
View full abstract
-
Yuki OZAWA, Toshihiro OHIGASHI, Masakatu MORII
Article type: Article
Session ID: ME2009-173
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
In November 2008, Beck and Tews have proposed a message falsification attack on WPA-TKIP. Their attack (called the Beck-Tews attack) works for only wireless LAN products that support IEEE802.11e QoS features. The Beck-Tews attack can recover a MIC key and falsify an encrypted short packet (for example, an ARP packet and a DNS packet) with 12-15 minutes. In JWIS2009, Ohigashi and Morii have proposed a new message falsification attack based on the man-in-the-middle attack. This attack can work for any WPA implementations, and uses three kinds of attack modes. Additionally, they reduce the execution time of the attack to about 1 minute in the message falsification mode, which is a mode for falsifying a message using an MIC key obtained by other attack mode. However, the execution time written in JWIS2009 has been obtained from the rough theoretical estimation. In this paper, we evaluate the execution time of the attack of JWIS2009 by the experiment in a realistic environment. As a result, we demonstrate that the average execution time of the attack of JWIS2009 is about 10 seconds in the message falsification mode.
View full abstract
-
Tatsuya Takehisa, Masanori Hirotomo, Ryoichi Isawa, Masakatu Morii, Ko ...
Article type: Article
Session ID: ME2009-174
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
Recently, the variety of attacks against servers in the Internet is increased. The survivability of servers serving the remote access VPN is influenced by several cyber attacks. As a countermeasure against the attacks, we have proposed a method for the remote access VPN with dynamic port randomization function by mobile codes. In this paper, we evaluate the performance of the dynamic port randomization function embedding the remote access VPN, and show efficiency of our method.
View full abstract
-
Article type: Appendix
Pages
App1-
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Article type: Appendix
Pages
App2-
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Article type: Appendix
Pages
App3-
Published: September 24, 2009
Released on J-STAGE: September 20, 2017
CONFERENCE PROCEEDINGS
FREE ACCESS