The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: network software architecture; user authentication; optical burst switching; image-to-image retrieval; wireless LAN; electronic medical record system; collaborative learning system; Web-service-based avatar service model; OFDM-based wireless network; wireless sensor network; GMPLS-based optical transport network; optical packet switching; mobile ad hoc network;...
It is expected that the age when men and robots live together is close at hand. In the age, his/her everyday life will be helped by robots. To provide a comfortable symbiotic human life with robots, customization to meet with userpsilas requirements is greatly important. Rule-based languages allow programs to be easily described at a high and abstract level, however, they suffer from long execution...
Most common computer authentication method is traditional 'User Name' and 'password'. There are numerous Biometric authentication methods also proposed. In this paper, we propose a novel and new alternative; Figure as a Password. In this scheme users will get complete freedom to select their Passwords. In this paper, we conduct an extensive survey of the existing graphical password schemes and propose...
We propose a novel algorithm for reducing burst transmission delay and packet loss rate. In optical burst switching (OBS), a certain offset time and burst assembly period are needed, leading to transmission delay. In order to reduce the delay, the proposed method transmits a control packet before the burst assembly period expires. Due to this mechanism, a method is needed to estimate burst length...
Image-to-image retrieval (I2I) accompanied by data compression are presented. Given a query image, the presented retrieval system computes PCA and/or ICA bases by extracting source information. On the data compression in the sense of rate-distortion, this method outperforms JPEG which uses DCT. Besides, PCA and ICA bases reflect each imagepsilas edge and texture information. Therefore, these bases...
In this paper we introduce our new protocol, RSOCKS which enables Internet client to access to the server in the guarded network inside NAT/FW. There are some methods to solve this problem, including the port forwarding and SOCKS. However these protocols assume the situation that the server application is installed a server computer and fixed to the network. In the future it is thought that the application...
Achievement of the QoS guarantee has come to be expected even in the wireless LAN communications. Because it is difficult to realize remodeling the MAC method of layer 2, we focus on the realization of per-flow QoS (throughput) using TCP control in layer 4. In the concrete, TCP-AV which has bandwidth reservation mechanism is used. A lot of paper has already been published about fairness of throughput...
ICT has been applied to a variety of medical fields, such as on-line medical treatment remuneration systems and community health information networks. However, there have been few studies on the requirements for electronic medical record systems conducted from the viewpoint of medical doctors. This paper discusses the requirements for medical record systems based on an analysis of a cardiac surgery...
The Next-Generation Network (NGN) is currently under development. Supporting 3rd party SIP applications on NGNs is necessary in order to improve the services provided to NGN subscribers. We propose using certain function in order to fully open up NGN and allow 3rd party service providers to offer services running on SIP application servers. If the deployment objectives of our proposed functions are...
We propose the implementation of a new learning environment that can utilize the computer for things as basic as taking lecture notes in a conventional lecture. Though active learning is visible to the user, as computers have become ubiquitous, they will support the teacher during a lecture and the student in the class. We aim to nurture motivation for learning, study skills, cooperativeness, and...
This paper describes a novel framework for animating avatars in a broadband network, such as the next generation network. New types of communication support services in virtual worlds are becoming widely accepted. In these virtual worlds, a user facilitates communication with other inhabitants by using his/her avatar. Incidental communication in virtual worlds, which is also called informal communication,...
Change-point detection schemes, which represent one type of anomaly detection schemes, are a promising approach for detecting network anomalies, such as attacks and epidemics by unknown viruses and worms. These events are detected as change-points. However, they generally also detect false-positive change-points caused by other events, such as hardware problems. Therefore there is a requirement for...
A context-aware service is a user-centric and flexible network service based on a user context. To realize such a context-aware service, we must coordinate various resources such as Web applications, sensor networks, information appliances, context information and actuators. However, it is difficult to coordinate resources described in different protocols. Toward constructing a framework for any resource,...
In this paper, we present some simple techniques for enhancing the diversity provided by retransmissions in OFDM modulations. The primary techniques of interest is constellation rearrangement (CoRe) for retransmission. CoRe consists in swapping the positions and/or negation of the least significant bits (LSB) and aims at ldquoequalizingrdquo the protection degree experienced by the bits transmitted...
This paper proposes a security system using wireless sensor network and human motion sensor. This security system is installed at Yamaguchi power plant in Japan. Building multi-hop wireless network has wireless communication capable and analog to digital processing. A module is called Waseda Hibikino Module version 1 (WHM-1). We use it and it has used low-power radio with multi-wireless access channels...
Traffic in IP networks has increased and services have diversified over the last few years. IP networks need to have scalability and high-quality data transmissions and they must be able to incorporate new functions. For good processing performance and ease of adding functions to the transport stratum on a next-generation network (NGN), we have proposed a functionally distributed transport networking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.