4/30/2009

Running around the Imperial Palace

Mecca, a place which an activity or interest is centered, for Tokyoite casual runners (joggers) is the Imperial Palace. Of course, we, general populations, are not allowed to get into the palace. I mean it a round run around the palace.
The run distance is about 5km, that is 3.1 miles, and theoretically no traffic signals which force runners to stop over.

Its scenery is very nice as depicted below.



I and my friend, Tam, tried to get there on April 28th. That was my first run around the palace. I jumped out from Tameike-sannoh office at 5:20M as soon as the last business meeting was finished. There are two runner's stations.
One is near Jimbo-cho station and the other is located at Koujimachi station.
See http://runsta.jp/ for further information, unfortunately in Japanese.

We joined at Jimbo-cho runner's station (3-11-1-1F Kanda Jimbo-cho, Chiyoda-ku, Tokyo. TEL: 03-3264-0089), and payed JPY700, with which we used a dressing and shower room and a locker.
Runners’ Station hours of operation will remain:
Monday: not available (Koujimachi station is open)
Tuesday-Thursday: 7am-20pm
Saturday:8am-20pm
Sunday: 8am-18pm

Note that we might have an alternative, which is to chose a public bath which costs JPY400. I heard beforehand that the bath is always busy and clouded by runners because of its high cost performance.

We started running at 18:07pm (according my nike+ipod system) from Kitano-maru park. The course was counter-clockwise as most of runners take.
Nice cool April weather welcomed us and that beautiful experience lasted 25 minutes or so.
Here is my record from the nike+ipod logging system.



According to Wikipedia, the distinction between running and jogging is the speed, where it is defining jogging as running slower than 6 mph (10 minute per mile pace, 10 km/h, 6 min/km). My run was slightly faster than 5min/km, and thus I was a runner on that day.

4/15/2009

Phony QR Codes Everywhere

2D barcodes are everywhere in Japan as introduced by my previous blog article. (above picures are from http://www.atpress.ne.jp/view/5401 and http://blog.goo.ne.jp/qr_quel/e/f109124f6ee13baf0bb9c065ceb4e0a5) Real objects are linked to related information sources. The observation, linkage between the real world and the cyberspace, reminds us two key concepts: digital signage and crossmedia communication. You may see digital signs with flat displays in downtowns. That emobies the concept of digital signage. If a 2D barcode appears at the display, you can switch the storyline from that display media to your cell-phone. In general, signs (including digital ones) can be found everywhere, and those invite you to another medium, in this context, mobile communication. Insight found here is that such crossmedia communication gains coarse-to-fine information retrieval, in other words, public-to-personal level shift in communication. Shifting communication from public to dedicated medium exposes a risk of privacy violation and resulting a phishing crime, which attempts to acquire usernames, passwords, credit card numbers etc. In 2007, Prof. Sakamura and his research team of University Tokyo conducted a interesting experiment at Shinjuku district, a downtown of Tokyo. In thier experiment, 2D barcodes were attached onto 300 telegraph poles. They tried to prove vulnarability of 2D barcodes for phishing, in comparison with their trusted code schemes. That intent was proved successfully. Three hundred 2D barcodes were maliciously replaced by someone with phony barcodes which invited potential customers to adult content providers. Here is an example which I and my colleagues demonstrated.



Prof. Sakamura’s paper “Verifying Identifier-Authenticity in Ubiquitous Computing Environment(2007) ” proposes an authentication mechanism of 2D barcodes. We need more bits for authentication of barcodes, supposing PKI based technologies are adopted. Microsoft’s High Capacity Color Barcode(HCCB) is a typical technology. (see my article Minoru Etoh, "Cellular Phones as Information Hubs," Proc ACM SIGIR Workshop on Mobile Information Retrieval, Singapore, July, 2008.) On one hand, we can add an authentication mechanism to a code system as proposed by University of Tokyo and Microsoft, on the other hand it’s hard to see “conjunction integrity” of the code and the real object. We can paste verified codes to any objects. The code itself is not phony though, the integrity where the right code is attached to the right object is not guaranteed. Verifying the integrity of code attachment, in other word, indivisible authentication of integral objects: code and object is the key technical issue.