論文 - 油田 健太郎
-
Okazaki N., Usuzaki S., Waki T., Kawagoe H., Park M., Yamaba H., Aburada K.
Future Internet 16 ( 8 ) 2024年8月
担当区分:最終著者 掲載種別:研究論文(学術雑誌) 出版者・発行元:Future Internet
We propose a detection system incorporating a weighted voting mechanism that reflects the vote’s reliability based on the accuracy of each detector’s examination, which overcomes the problem of cooperative detection. Collaborative malware detection is an effective strategy against zero-day attacks compared to one using only a single detector because the strategy might pick up attacks that a single detector overlooked. However, cooperative detection is still ineffective if most anti-virus engines lack sufficient intelligence to detect zero-day malware. Most collaborative methods rely on majority voting, which prioritizes the quantity of votes rather than the quality of those votes. Therefore, our study investigated the zero-day malware detection accuracy of the collaborative system that optimally rates their weight of votes based on their malware categories of expertise of each anti-virus engine. We implemented the prototype system with the VirusTotal API and evaluated the system using real malware registered in MalwareBazaar. To evaluate the effectiveness of zero-day malware detection, we measured recall using the inspection results on the same day the malware was registered in the MalwareBazaar repository. Through experiments, we confirmed that the proposed system can suppress the false negatives of uniformly weighted voting and improve detection accuracy against new types of malware.
DOI: 10.3390/fi16080259
-
Usability improvement in color constancy CAPTCHA
Usuzaki Shotaro, Yihan Wang, Aburada Kentaro, Yamaba Hisaaki, Takatsuka Kayoko, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
IEICE Communications Express 13 ( 8 ) 331 - 334 2024年8月
担当区分:責任著者 記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人 電子情報通信学会
CAPTCHAs have traditionally been used to deter bots, but ensuring protection against machine learning attacks has become difficult. To tackle this problem, we proposed a CAPTCHA based on color constancy, a human cognitive ability that is difficult for machines to reproduce. Although this method achieved high attack resistance while maintaining usability compared to existing CAPTCHAs, the response time increased due to the color selection operation. To address this, we changed the task to a click-type format while keeping the original concept. Our experimental results show that our method matches the response times of existing CAPTCHAs without compromising attack resistance.
-
視覚の補完機能を利用した文字型CAPTCHAの一検討
西秀峻, 鎌田大貴, 臼崎翔太郎, 油田健太郎, 山場久昭, 朴美娘, 岡崎直宣
火の国情報シンポジウム2025 1 - 6 2025年3月
担当区分:責任著者 掲載種別:研究論文(研究会,シンポジウム資料等)
-
IoTマルウェア検知精度向上のためのパラメータに応じたOne-Class SVMの性能調査
川越彪雅, 高崎球宇我, 臼崎翔太郎, 油田健太郎, 山場久昭, 朴美娘, 岡崎直宣
火の国情報シンポジウム2025 1 - 7 2025年3月
担当区分:責任著者 掲載種別:研究論文(研究会,シンポジウム資料等)
-
反射成分が含まれる画像におけるプライバシーリスク検出手法の検討
臼﨑翔太郎,油田健太郎,山場久昭,岡崎直宣
情報処理学会 第87回全国大会 1 - 8 2025年3月
掲載種別:研究論文(研究会,シンポジウム資料等)
-
Aridome N., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 575 - 579 2025年2月
掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Proceedings of International Conference on Artificial Life and Robotics
As a method for detecting layout defects in web pages, image-based visual regression testing is proposed. However, it has the problem that it takes time to detect unintended layout differences that are not based on HTML code changes. This paper proposes a prototype of MixVRT which is a tool to detect layout defects in web pages. It is a visual regression testing tool that highlights layout defects in web pages. From evaluation experiments, the time find to layout defects can be reduced.
-
Kimura Y., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 580 - 584 2025年2月
掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Proceedings of International Conference on Artificial Life and Robotics
The digitalization of forms is being promoted. One of the effective ways to manage contents filled in fields is using electronic forms. Several tools have been developed to generate them automatically. However, when you use a paper form, the layout of the original form may change, and it takes time to generate electronic one because it is necessary to place fill-in fields on an electronic form by dragging with a mouse. This paper proposes a method for automatic fill-in fields detection and labels assignment to reduce time required to place fill-in fields without changing the layout. The proposed method can reduce the time to place fill-in fields.
-
Introducing Generative AI into Unrealistic Image CAPTCHA for Effective Image Generation 査読あり
Kana Saiki, Hisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
Proc. 30th Int'l Sympo. on Artificial Life and Robotics 2025 (AROB 30th 2025) 2025年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Introduction of Feature Points in Images for Improvement of Finding Letters Type CAPTCHA Based on Neural Style Transfer 査読あり
Ramu Kiura, Hisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
Proc. 30th Int'l Sympo. on Artificial Life and Robotics 2025 (AROB 30th 2025) 2025年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Investigation of Detection Methods for Trojaned DNNs under Specific Conditions 査読あり
Shunya Izaki, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. 30th Int'l Sympo. on Artificial Life and Robotics 2025 (AROB 30th 2025) 2025年1月
担当区分:責任著者 記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
A study of Collaborative malware detection using item response theory 査読あり
Takuro Inada, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. 30th Int'l Sympo. on Artificial Life and Robotics 2025 (AROB 30th 2025) 2025年1月
担当区分:責任著者 記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Proposal and Evaluation of a Gaze Authentication Method that Combines Image Selection and Eye Movement Trajectory Features 査読あり
Mirang Park, Zhaolin Chang, Shotaro Usuzaki, Kentaro Aburada, Naonobu Okazaki
2024 12th International Symposium on Computing and Networking Workshops (CANDARW) 359 - 364 2024年11月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
ASLA: Automatic Segmentation and Labeling by Deep Learning for Document Pictures 査読あり
Kakinoki K., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 10 ( 4 ) 362 - 367 2024年11月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Journal of Robotics, Networking and Artificial Life
In this paper, we propose ASLA, a segmentation and label generation system for document pictures. ASLA reduces the duration needed for separating document pictures into areas and label generation. By using the application example, we have verified that ASLA operates properly. We have evaluated the usefulness of ASLA in regard to time and accuracy. We have assessed the efficacy of the rule-based area correction method. As a result, we have verified that ASLA is useful.
-
Onaga H., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 10 ( 4 ) 336 - 341 2024年9月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Journal of Robotics, Networking and Artificial Life
It is difficult for mobile application developers to understand the structure of large and complex mobile applications. To support iOS application development, we proposed SwiftDiagram: a visualization of the static structure of Swift source code, and demonstrated its usefulness. To further support them, this paper has implemented RAGESS(Real-time Automatic Generation of SwiftDiagram System), which is a software visualization tool. RAGESS performs static analysis on Swift source code and automatically generates the corresponding SwiftDiagram whenever the target project build succeeds.
-
視線による画像選択と視線軌跡の特徴量を組み合わせた個人認証システム
常 照林,臼﨑 翔太郎,油田 健太郎,岡崎 直宣,朴 美娘
セキュリティサマーサミット 2024年7月
掲載種別:研究論文(研究会,シンポジウム資料等)
-
Kanta Kakinoki, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
The 2024 International Conference on Artificial Life and Robotics (ICAROB2024) 262 - 266 2024年2月
記述言語:日本語 掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Proceedings of International Conference on Artificial Life and Robotics
Writing VDM++ specifications is difficult. The existing method can automatically generate type and constant definitions in VDM++ specification from natural language specification using machine learning. This paper proposes a method to generate classes and instance variable definitions in the VDM++ specification from natural language specification to improve the usefulness of the existing method. From the evaluation experiment by using F-values, it has been confirmed that the proposed method can improve the usefulness of the existing method.
-
Shota Takakura, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
The 2024 International Conference on Artificial Life and Robotics (ICAROB2024) 257 - 261 2024年2月
記述言語:日本語 掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Proceedings of International Conference on Artificial Life and Robotics
Writing VDM++ specifications is difficult. The existing method can automatically generate type and constant definitions in VDM++ specification from natural language specification using machine learning. This paper proposes a method to generate classes and instance variable definitions in the VDM++ specification from natural language specification to improve the usefulness of the existing method. From the evaluation experiment by using F-values, it has been confirmed that the proposed method can improve the usefulness of the existing method.
-
Haruki Onaga, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
The 2024 International Conference on Artificial Life and Robotics (ICAROB2024) 252 - 256 2024年2月
記述言語:日本語 掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Proceedings of International Conference on Artificial Life and Robotics
Writing VDM++ specifications is difficult. The existing method can automatically generate type and constant definitions in VDM++ specification from natural language specification using machine learning. This paper proposes a method to generate classes and instance variable definitions in the VDM++ specification from natural language specification to improve the usefulness of the existing method. From the evaluation experiment by using F-values, it has been confirmed that the proposed method can improve the usefulness of the existing method.
-
On an improvement of hand gesture recognition for realizing an s-EMG based user authentication using finger spelling 査読あり
Hisaaki Yamaba, Naoki Sawagashira, Kentaro Aburada, Tetsuro Katayama, Naonobu Okazaki
Proc. 29th Int'l Sympo. on Artificial Life and Robotics 2024 (AROB 29th 2024) 933 - 938 2024年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Investigation of malware classification based on image representation 査読あり
Hyoga Kawagoe, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. 29th Int'l Sympo. on Artificial Life and Robotics 2024 (AROB 29th 2024) 929 - 932 2024年1月
担当区分:責任著者 記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
プロジェクト・スケジュールの遅延リスク分析のための手法の開発 査読あり
高塚佳代子,佐藤知一,油田健太郎,岡崎直宣
化学工学論文集 49 ( 6 ) 159 - 165 2023年11月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Kagaku Kogaku Ronbunshu
Since introducing the project management technique “earned value management” in the 1970s, planning and schedule management that balances the three factors of process, resources, and cost are now possible. However, delay risk has increased over the years because of the large-scale scope and changes in the surrounding environment. Therefore, besides the above three factors, preparation and management regarding delay risk are critical. However, many projects rely on the experience and intuition of directors to monitor risk. This study develops a project schedule management mechanism and system that analyzes delay risk besides processes, resources, and costs. A schedule network generation unit with multiple activities and a delay risk evaluation unit are included in the schedule management system to achieve this purpose. As a mechanism for managing delay risk, we propose a method that evaluates the margin (delay risk tolerance) of the total float of the schedule network that has a negative correlation with delay risk and a simple and accurate calculation method.
-
Study of an Image-Based CAPTCHA that is Resistant to Attacks Using Image Recognition Systems 査読あり
Nishikawa S., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1114 LNEE 175 - 184 2023年10月
担当区分:責任著者 掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Lecture Notes in Electrical Engineering
In today’s digital age, image-based CAPTCHAs are increasingly vulnerable to attacks using annotation services, which tag images and classify images according to their contents, or reverse image search services. To prevent such attacks, an image-based CAPTCHA was proposed that takes advantage of the fact that humans can correctly recognize images containing many discontinuous points, while existing image recognition systems misrecognize them. However, this CAPTCHA proved susceptible to attacks using noise reduction filters. The objective of the present study is to create a CAPTCHA using images that are resistant to such filters. Images used in the new CAPTCHA were realized by increasing the proportion of lines forming discontinuous surfaces in images. Experimental results demonstrated a human recognition rate of 95.8%, with the image recognition systems successfully identifying only one image overall. Moreover, when a noise reduction filter was applied, the recognition rate was lower than those reported in previous studies.
-
Proposal of Fill in the Missing Letters CAPTCHA Using Associations from Images 査読あり
Yamaba H., Mustaza M.N.F.B., Usuzaki S., Aburada K., Mukunoki M., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1114 LNEE 206 - 217 2023年10月
掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Lecture Notes in Electrical Engineering
This paper proposes a new fill in the missing letters type CAPTCHA using associations from images. Many web sites have adopted CAPTCHA to prevent bots and other automated programs from malicious activities such as posting comment spam. Text-based CAPTCHA is the most common and earliest CAPTCHA. But as optical character recognition (OCR) technology has improved, the intensity of distortions that must be applied to a CAPTCHA for it to remain unrecognizable by OCR has increased. This has reached a point where humans are having difficulty recognizing CAPTCHA text. The idea of the proposed CAPTCHA asks users to spell a word by filling some blanks. Since the number of shown letters are few, it is difficult to answer the correct word. But one or more images that can be used as hints to guess what is the answer word are also shown to the users. A series of experiments was carried out to evaluated the performance of the proposed CAPTCHA. First, a computer program was developed with various software languages for the usability evaluation. The system was used for the experiments to find the suitable parameters of the CAPTCHA such as numbers of letters that will be disclosed, position of disclosed letters. Next, security evaluation experiments were carried out using the system under the obtained parameters. The results of the experiments showed that the performance and limitation of the proposed CAPTCHA.
-
Proposal of a DDoS Attack Detection Method Using the Communication Interval 査読あり
Iwasa K., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1114 LNEE 165 - 174 2023年10月
担当区分:責任著者 掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Lecture Notes in Electrical Engineering
As the scale of Distributed Denial of Service (DDoS) attacks has been escalating in recent years, the need for real-time detection of attacks has increased. Existing intrusion detection systems (IDSs) perform detection with a fixed window size (assumed to be in hours). In previous research, attack detection was performed by preparing windows of multiple sizes, selecting the appropriate window based on the state of the data, and using features learned in advance for that window size. Although this method yielded a high DDoS attack detection rate of 98.30%, it exhibited a considerable false-positive rate of 7.37%. The proposed method measures the communication intervals of identical packets within the window, identified as attack-related in the previous survey, and classifies those packets with an average communication interval below a set threshold as attacks. The experiment resulted in a 50.2% decrease in the false-positive rate.
-
Analysis of Self Determination Factors for Continuance Intention on Online Learning Management System 査読あり
Saputra Mochamad Chandra, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu, Wicaksono Satrio Agung
Journal of Robotics, Networking and Artificial Life 10 ( 1 ) 91 - 95 2023年9月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:株式会社 ALife Robotics
The COVID-19 pandemic outbreak transformed the paradigm of the educational process. Many educational institutions, including the University, mainly the Faculty of Computer Science, Brawijaya University, have experienced success with learning through the Internet. The continuance intention factor for using an online learning management system is important to ensure learning sustainability. This study investigates continuance intention factor by using self determination model as a research model. The objective of this study is to find the factor factors affecting students' continuance intention toward online learning management systems. The proposed model is useful for investigating continuance intention factors. The study finds that intrinsic regulation, external regulation, identified regulation, and introjected regulation significantly positive impact on continuance intention in learning management systems. Finally, this study provides suggestions for the Faculty to improve the continuance intention of the student in using an online learning management system.
-
Development of keypads which use colors or shapes to prevent shoulder surfing 査読あり
Masuzawa R., Aburada K., Yamaba H., Katayama T., Okazaki N.
Artificial Life and Robotics 28 ( 4 ) 710 - 717 2023年8月
担当区分:責任著者 掲載種別:研究論文(学術雑誌) 出版者・発行元:Artificial Life and Robotics
In conventional smart phones and ATMs, a four-digit passcode is entered into a keypad, and the user confirms whether the passcode matches the keypad. However, there is a risk that a third party can easily steal the password by watching the code entry or analyzing the position of fingerprints left on the keypad. There are other solutions, such as biometric authentication or the use of special displays, but both of them are costly and difficult to implement. In this study, we propose a keypad that does not leave fingerprints on the screen, is low cost, and can be used to input passcodes without worry, even if someone is standing next to it. The proposed keypad uses cursors that are moved by directional keys to select numbers, making fingerprint analysis difficult. Because attackers do not know the color that the user has selected, they cannot know which cursor the user is moving. To verify the safety and convenience of this system, we conducted experiments on subjects in their 20 s and 50 s. The results showed that the average difference in authentication time from the conventional method was about 5 s, and the method was generally convenient. We conclude that our keypad system is secure, because no peeping attacks on a subject were successful in guessing the subject’s passcode.
-
Tsunami evacuation simulation considering road width in Aoshima district 査読あり
Nabeyama K., Usuzaki S., Aburada K., Yamaba H., Katayama T., Okazaki N.
Artificial Life and Robotics 28 ( 4 ) 779 - 788 2023年7月
担当区分:責任著者 掲載種別:研究論文(学術雑誌) 出版者・発行元:Artificial Life and Robotics
Japan is one of the countries in the world where natural disasters occur most frequently. Typhoons, earthquakes, tsunamis, volcanic eruptions, and many other natural disasters occur in Japan every year, and the risks are immeasurable. Japan is especially prone to earthquakes because of its location on the North American Plate, Eurasian Plate, Pacific Plate, and Philippine Sea Plate. Preparation for a Nankai Trough earthquake is one of the most important issues. A Nankai trough earthquake is predicted to occur with a probability of 70–80% within 30 years. Accordingly, a tsunami of more than 10 ms is expected to hit a wide area along the Pacific coast from the Kanto region to the Kyushu region, and the impact is expected to be significant. When a tsunami warning is issued, an evacuation support system that provides information on evacuation sites and routes enables faster and safer evacuation actions. In a previous study conducted in our laboratory, we proposed an evacuation support system using Low-Power Wide-Area communications and conducted a simulation to find ways to improve the evacuation support system. However, the simulation was insufficient in that it did not consider delays in evacuation completion time due to road congestion caused by limited road width, which can be expected in an actual disaster. In our current research, as an improvement to make the simulation more realistic for further developing our evacuation support system, we propose a simulation that considers road width. We examined how adoption of this simulation methodology would affect the simulation results by comparing simulations that did and did not consider road width. As a result, the proposed method showed a lower percentage of completed evacuations than the previous simulation, especially for children and the elderly. The reason for this result is that when evacuations begin simultaneously, crowding occurs as people all rush to evacuation centers. This congestion on the roads near evacuation centers prevents people from completing their evacuations. Such a phenomenon is expected to occur not only in simulations but also on actual roads. For this reason, our proposed simulation method that considers road width is a more realistic simulation. Since evacuations by car in the event of a disaster also occur, a future issue is to simulate car congestion as well. Furthermore, simulating what would happen if a disaster made a road impassable is also important.
-
画像と視線入力装置を用いたユーザ認証方式の提案 査読あり
金井 秀真, 安浪 巧, 油田 健太郎, 岡崎 直宣, 朴 美娘
情報処理 学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2023)論文集 538 - 543 2023年7月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Prototype of the Framework CATdd to Support Continuous Development in Test Driven Development 査読あり
Miyashita Takeaki, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 4 ( 1 ) 35 - 40 2023年6月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:株式会社 ALife Robotics
TDD is a development methodology to improve software quality. In this study, we prototype the framework CATdd (Continuous Automated Test Driven Development), which supports continuous development with TDD. CATdd reduces the time of implementation step in TDD by generating new source code that passes tests using LLM. CATdd maintains consistency with other source code in the project by using existing source code and related source code to prompt. As a result of the evaluation experiments, the time for the implementation step in TDD was reduced by 94% for a simple task and by 56% for another more complex task. In conclusion, CATdd is useful to support continuous development.
-
Development and Evaluation of a Deep Learning Based System to Predict District-Level Maize Yields in Tanzania 査読あり
Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
Agriculture (MDPI) 13 ( 3 ) 2023年3月
担当区分:責任著者 記述言語:英語 掲載種別:研究論文(学術雑誌)
-
Saputra M.C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 352 - 356 2023年1月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Proceedings of International Conference on Artificial Life and Robotics
The outbreak of the COVID-19 pandemic changed the model of the learning process. Online learning became one of the best solutions for many educational institutions, including the University, especially the Faculty of Computer Science, Brawijaya University. The continuance intention factor for using an online learning management system is important to ensure learning sustainability. To understand students' continuance intention this study proposes self determination model as a research model to find the factors affecting students' continuance intention toward online learning management systems. The proposed model is useful for investigating continuance intention factors. The study finds that intrinsic regulation, external regulation, identified regulation, and introjected regulation significantly positive impact on continuance intention in learning management systems. Finally, this study provides suggestions for the Faculty to improve the continuance intention of the student in using an online learning management system.
-
Miyashita T., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 347 - 351 2023年1月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Proceedings of International Conference on Artificial Life and Robotics
TDD is a development methodology that brings us closer to better implementation and testing by repeating a series of steps: test design, implementation that satisfies the tests, and refactoring. This paper proposes a framework aimed at supporting the implementation steps in TDD. The proposed framework generates source code that passes tests while retaining refactoring by the developer. The prototyped framework reduced the time required for the implementation process by 94.22% and the generation time by 66.17% compared to manual work.
-
Investigation of evacuation simulation from Tsunami considering road width in Aosima 査読あり
Keita Nabeyama, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
Proc. 28th Int'l Sympo. on Artificial Life and Robotics 2023 (AROB 28th 2023) 953 - 958 2023年1月
担当区分:責任著者 記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
On an improvement of hand gesture recognition for realizing a user authentication system using s-EMG 査読あり
Soichiro Ishibashi, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Naonobu Okazaki
Proc. 28th Int'l Sympo. on Artificial Life and Robotics 2023 (AROB 28th 2023) 968 - 972 2023年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
A study of improving the safety of defense system based on whitelist 査読あり
Tsubasa Waki, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
Proc. 28th Int'l Sympo. on Artificial Life and Robotics 2023 (AROB 28th 2023) 963 - 967 2023年1月
担当区分:責任著者 記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Investigation of PIN authentication schemes resistant to video-based recording attacks 査読あり
Ryo Masuzawa, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. 28th Int'l Sympo. on Artificial Life and Robotics 2023 (AROB 28th 2023) 959 - 962 2023年1月
担当区分:責任著者 記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Proposal of Gamma Which Is a Messaging Platform for Spatial Data 査読あり
Ueda Takahiro, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 9 ( 2 ) 136 - 142 2022年10月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:株式会社 ALife Robotics
This paper proposes Gamma, which is a messaging platform for spatial data. Gamma uses distributed MQTT system for spatial data sharing, and this paper aims to improve the usefulness of distributed MQTT system. In the experiment, it has been found that Gamma can process more messages than a single MQTT broker. It is confirmed that Gamma achieves scalability by increasing the number of Gateways and distributed MQTT brokers. Furthermore, it is confirmed that the efficiency of the distributed MQTT system can be improved by setting the responsibility area of Gateways.
-
Proposal of a Method to Generate Classes and Instance Variable Definitions in VDM++ Specification by Using Machine Learning 査読あり
Suga Kensuke, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 2 ( 4 ) 189 - 194 2022年10月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:株式会社 ALife Robotics
Writing VDM++ specifications is difficult. The existing method can automatically generate only type and constant definitions in VDM++ specification from natural language specification by using machine learning. This paper proposes a method to generate classes and instance variable definitions in VDM++ specification from natural language specification to improve the usefulness of the existing method. From the evaluation experiment by using F- values, it has been confirmed that the proposed method can improve the usefulness of the existing method.
-
Expansion of Application Scope and Addition of a Function for Operations into BWDM which is an Automatic Test Cases Generation Tool for VDM++ Specification 査読あり
Muto Takafumi, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 9 ( 3 ) 255 - 262 2022年10月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:株式会社 ALife Robotics
The use of the formal specification description language VDM++ in software design can eliminate ambiguity in the specification. However, software testing after implementation is necessary even if the design uses VDM++, but manually generating test cases is labor-intensive and time-consuming. Therefore, our laboratory developed BWDM, which is an automatic test case generation tool for VDM++ specifications. However, BWDM is not very useful because it has three problems about its narrow scope of application. This paper solves the three problems and improves the usefulness of BWDM by expanding the scope of application of VDM++ definitions and adding a function to generate test cases for object states. In addition, we conducted a comparison experiment with manual test case generation and confirmed that BWDM can reduce work time.
-
Detection of Blob and Feature Envy Smells in a Class Diagram using Class's Features 査読あり
Priyambadha Bayu, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 9 ( 1 ) 43 - 48 2022年8月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:株式会社 ALife Robotics
Measuring the quality of software design artifacts is difficult due to the limitation of information in the design phase. The class diagram is one of the design artifacts produced during the design phase. The syntactic and semantic information in the class is essential to consider in the measurement process. Smell detection uses class-related information to detect the smell as an indicator of a lack of quality. Several classifiers use all information related to the class to prove how informative it for the smell detection process. The smell types that are a concern in this research are Blob and Feature Envy. The experiment using three classifiers (j48, Multi-Layer Perceptron, and Naïve Bayes) confirms that Blob smell detection utilizes the information successfully. On the other hand, Feature Envy still needs more elaboration. The average true positive rate by the classifiers is about 80.67%.
-
ウィンドウサイズ調整型監視によるリアルタイム性DDoS攻撃検知手法の検討
溝口 李佳, 臼﨑 翔太郎, 油田 健太郎, 山場 久昭, 岡崎 直宣
火の国情報シンポジウム2022 1 - 8 2022年3月
担当区分:責任著者 掲載種別:研究論文(研究会,シンポジウム資料等)
-
色の恒常性を利用したCAPTCHAの機械攻撃耐性の評価と分析
永井 麻裕, 臼﨑 翔太郎, 油田 健太郎, 山場 久昭, 椋木 雅之, 岡崎 直宣
火の国情報シンポジウム2022 1 - 8 2022年3月
担当区分:責任著者 掲載種別:研究論文(研究会,シンポジウム資料等)
-
An Attempt at Data Augmentation for Realizing User Authentication Using s-EMG Signals 査読あり
Soichiro Ishibashi, Yuya Yamamoto, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Naonobu Okazaki
Proc. 27th Int'l Sympo. on Artificial Life and Robotics 2022 (AROB 27th 2022) 1043 - 1046 2022年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Proposal for a blockchain based agricultural input voucher system 査読あり
Tende, I. G., Aburada, K., Yamaba, H., Katayama, T., Okazaki, N.
Artificial Life and Robotics 2022年1月
担当区分:責任著者 記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
Muto T., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2022) 183 - 187 2022年1月
記述言語:日本語 掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Proceedings of International Conference on Artificial Life and Robotics
Generating test cases from the VDM++ specification to eliminate ambiguity in the specification is labor-intensive and time-consuming. Therefore, our laboratory developed BWDM, which is an automatic test case generation tool for VDM++ specifications. However, BWDM is not very useful because it has three problems about its narrow scope of application. This paper extends BWDM to solve three problems. In addition, we conducted a comparison experiment with manual test case generation and confirmed a time saving of about 17 minutes.
-
Suga K., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2022) 178 - 182 2022年1月
記述言語:日本語 掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Proceedings of International Conference on Artificial Life and Robotics
Writing VDM++ specifications is difficult. The existing method can automatically generate type and constant definitions in VDM++ specification from natural language specification using machine learning. This paper proposes a method to generate classes and instance variable definitions in the VDM++ specification from natural language specification to improve the usefulness of the existing method. From the evaluation experiment by using F-values, it has been confirmed that the proposed method can improve the usefulness of the existing method.
-
Proposal of Gamma Which Is a Spatial Data Sharing Distributed MQTT System 査読あり
Ueda T., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2022) 188 - 192 2022年1月
記述言語:日本語 掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Proceedings of International Conference on Artificial Life and Robotics
This paper proposes Gamma, which is a new distributed MQTT system, to improve the usefulness of distributed MQTT systems for sharing spatial data. In the experiment, it has been found that Gamma can process more messages than a single MQTT broker. It is confirmed that Gamma achieves scalability by increasing the number of Gateways and distributed MQTT brokers. Furthermore, it is confirmed that the efficiency of the distributed MQTT system can be improved by setting the responsibility area of Gateways.
-
Development of an anti-peeping passcode keypad using color/shape cursors 査読あり
Ryo Masuzawa, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
Proc. 27th Int'l Sympo. on Artificial Life and Robotics 2022 (AROB 27th 2022) 1038 - 1042 2022年1月
担当区分:責任著者 記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Proposal for a crop protection information system for rural farmers in Tanzania 査読あり
Tende I.G., Aburada K., Yamaba H., Katayama T., Okazaki N.
Agronomy (MDPI) 11 ( 12 ) 2021年12月
担当区分:責任著者 記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Agronomy
Crop protection information, such as how to control emergent and outbreak crop diseases and pests, as well as the latest research, regulations, and quality control measures for pesticides and fertilizers, is important to farmers. Rural smallholder farmers in Tanzania have traditionally relied on government agricultural officers who visit them in their villages to provide this crop protection information. However, these officers are few and cannot reach all the farmers on time. This means that farmers fail to make critical farming decisions on time, which can lead to low crop productivity. In this study, we aim to provide farmers with reliable and instant crop protection information by developing a system based on the Short Message Service (SMS) and the Web. This system automatically replies to farmers’ requests for the latest crop protection information in the Swahili language through SMS on a mobile phone or a Web system. The findings reveal that our proposed system can provide farmers with crop protection information at lower cost (500 times cheaper) than the existing Tigo Kilimo system. Furthermore, our proposed system’s deep learning model is effective in understanding and processing Swahili natural language SMS queries for crop protection information with an accuracy of 96.43%. This crop protection information will help farmers make better critical farming decisions on time and improve crop productivity.
-
リレーアタック耐性とボット耐性の両立を目指したインタラクティブな動画CAPTCHAの提案と評価 査読あり
油田 健太郎,臼崎 翔太郎,山場 久昭,片山 徹郎,椋木 雅之,朴 美娘,岡崎 直宣
情報処理学会論文誌 62 ( 12 ) 1864 - 1878 2021年12月
担当区分:筆頭著者, 責任著者 記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
スマートロックにおける2端末による機械学習を用いた歩行認証に関する研究 査読あり
朴 美娘,渡辺 一樹,油田 健太郎,岡崎 直宣
情報処理学会論文誌 62 ( 12 ) 2011 - 2023 2021年12月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches 査読あり
Park Mirang, Kentaro Aburada, Naonobu Okazaki
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) 359 - 364 2021年11月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Performance Evaluation of Blockchain Based Agricultural Input Voucher System 査読あり
Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
IEEE 10th Global Conference on Consumer Electronics (GCCE2021) 716 - 717 2021年10月
担当区分:責任著者 記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Extension of the Function to Ensure Real-time Traceability between UML Sequence Diagram and Java Source Code on RETUSS
Arima Kaoru, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 2 ( 1 ) 37 - 41 2021年10月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:株式会社 ALife Robotics
Ensuring traceability of software deliverables is one of the methods to ensure software quality. RETUSS (Real-time Ensure Traceability between UML and Source-code System) is a tool that saves labor and time, and eliminates mistakes by human handling in ensuring traceability between UML and source code. However, RETUSS is not useful due to its limited scope of application. This paper improves the usefulness of RETUSS by extending the function to ensure real-time traceability between UML sequence diagrams and Java source code on RETUSS.
-
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language 査読あり
Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Park Mirang, Naonobu Okazaki
The 16th International Workshop on Security (IWSEC 2021) 2021年9月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Measuring test suite reusability based on the usage frequency and coverage of reused test cases 査読あり
Saputra M. C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 8 ( 1 ) 24 - 28 2021年6月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
Measuring redundancy score for test suite evaluation by using test cases matching approach 査読あり
Saputra M. C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 8 ( 1 ) 1 - 5 2021年6月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
Utilizing the similarity meaning of label in class cohesion calculation 査読あり
Priyambadha B., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 7 ( 4 ) 270 - 274 2021年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Journal of Robotics, Networking and Artificial Life
The cohesion is one of the design quality indicators in software engineering. The measurement of the value of cohesion is done by looking at the correlation between attributes and methods that are in a class. In Direct Distance Design Class Cohesion (D C ) metrics, attributes, and methods are assumed to have a good correlation if they have a similar type. But, the similarity of type parameters and attributes do not always indicate that these attributes are managed (correlated) in the method. This study is trying to gain information that can enhance the degree of certainty of a correlation between the methods and attributes. Relatedness between them has been seen from closeness the meaning of the name tag attribute, method, and parameters. The experimental results declared an increase in the value of cohesion produced in line with the similarity of meaning. 3 2
-
Identification of Redundant Test Cases by Using Similarity Measurement Method for Test Suite Evaluation 査読あり
Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Advances in Artificial Life Robotics (JAALR) 1 ( 4 ) 186 - 191 2021年3月
記述言語:英語 掲載種別:研究論文(学術雑誌)
-
ウェアラブル端末を用いた覗き見耐性を持つジェスチャー認証手法の提案と評価
嘉藤鴻介,渡辺一樹,油田健太郎,岡崎直宣,朴美娘
IPSJ SIG Technical Reports 2021-SPT-41 ( 17 ) 2021年3月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
継続的な認証及び異なる歩行速度での二つの端末を用いた異常検知による歩行認証の研究
渡辺一樹,油田健太郎,岡崎直宣,朴美娘
IPSJ SIG Technical Reports 2021-SPT-41 ( 16 ) 2021年3月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Development and Evaluation of Swahili Text Based CAPTCHA 査読あり
Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech 2021) 297 - 301 2021年3月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Proposal and evaluation for color constancy CAPTCHA 査読あり
Usuzaki S., Aburada K., Yamaba H., Katayama T., Mukunoki M., Park M., Okazaki N.
Artificial Life and Robotics 26 ( 3 ) 291 - 296 2021年1月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Artificial Life and Robotics
CAPTCHAs are technologies that distinguish humans and bot to prevent illegal access. Unfortunately, current CAPTCHAs, even the latest Google reCAPTCHA, have already broken with high accuracy. Although the devices, including emphasizing the distortion of the text and adding noise to the image, improve the machine resistance, they may decrease the accessibility of the web page. The purpose of this study is to propose a new CAPTCHA that can decrease the machine resistance while keeping usability. To achieve this purpose, we focused on color constancy. Color constancy is a human’s characteristic that enables humans to recognize the original color of the object by ignoring the effects of illumination light. Color constancy has not been fully reproduced by the program yet. We proposed color constancy CAPTCHA that the user is required to answer an original color of the object in a specified area on the CAPTCHA image with a color filter. In this paper, we created a prototype of CAPTCHA, applied two kinds of color filters, and then evaluated each case for the human success rate, machine success rate, and usability.
-
Development and evaluation of blockchain based agricultural input voucher system 査読あり
Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
Proc. 26th Int'l Sympo. on Artificial Life and Robotics 2021 (AROB 26th 2021) 1 - 6 2021年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
The Seven Information Features of Class for Blob and Feature Envy Smell Detection in a Class Diagram 査読あり
Bayu Priyambadha, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2021 Int’l Conf. on Artificial Life and Robotics (ICAROB 2021) 348 - 351 2021年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Test Suite Reusability Measurement Based on Frequency and Coverage of Reused Test Cases 査読あり
Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2021 Int’l Conf. on Artificial Life and Robotics (ICAROB 2021) 344 - 347 2021年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
An attempt at an introduction of deep learning for a user authentication system using s-EMG 査読あり
Hisaaki Yamaba, Kenya Shiraishi, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. 26th Int'l Sympo. on Artificial Life and Robotics 2021 (AROB 26th 2021) 1 - 5 2021年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Blockchain-based vote-type unknown malware detection method using a characteristic of anti-virus vendors' voting 査読あり
Hiroki Muranaka, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. 26th Int'l Sympo. on Artificial Life and Robotics 2021 (AROB 26th 2021) 1 - 5 2021年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Improvement of RETUSS to Ensure Traceability between Sequence Diagram in UML and Java Source Code in Real Time 査読あり
Kaoru Arima, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2021 Int’l Conf. on Artificial Life and Robotics (ICAROB 2021) 352 - 355 2021年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches
Park M., Aburada K., Okazaki N.
Proceedings - 2021 9th International Symposium on Computing and Networking Workshops, CANDARW 2021 359 - 364 2021年
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Proceedings - 2021 9th International Symposium on Computing and Networking Workshops, CANDARW 2021
The use of mobile terminals with small touchscreens such as smartwatches has increased dramatically in recent years. A PIN or pattern lock is commonly used for personal authentication on such devices, but because the information is displayed directly, authentication information can be leaked to someone peeking at the screen. In this paper, we propose a gesture-based smartwatch authentication method that reduces the likelihood of leaks by allowing the owner to include a dummy (or "fake") number at the time of authentication registration. The dummy number enables the user to perform an authenticating gesture different from that indicated by the icon displayed on the screen. In a series of experiments, we confirmed the usability of the proposed method, evaluated the effect of long-term familiarity and assessed the method's resistance to shoulder-surfing. In the usability experiment, the authentication time and success rate were 10.9 seconds and 73.3%, respectively. The authentication time and success rate in the long-term familiarity experiment improved to 8.8 seconds and 93%, and the leakage rate in the peep experiments was 0%.
-
Katayama T., Shigyo Y., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 7 ( 3 ) 165 - 169 2020年12月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Journal of Robotics, Networking and Artificial Life
The natural language includes ambiguous expressions. Vienna Development Method (VDM) is one of methodology on the formal methods to write the specification without ambiguity. Because VDM++ is written by strict grammar, it is difficult to write a VDM++ specification. This research attempts to generate a VDM++ specification automatically from a natural language specification by machine learning. To generate a VDM++ specification, it is necessary to extract words that consist of predicate corresponding to the function and nouns corresponding to variable from the natural language specification. This paper proposes an approach to generate a VDM++ specification based on its grammar from the classified word list. Identifiers are generated from the classified word list, and then the VDM++ specification can be generated by converting them into VDM++ grammar.
-
FMD-VS: A virtual sensor to index FMD virus scattering 査読あり
Takatsuka K., Sekiguchi S., Yamaba H., Aburada K., Mukunoki M., Okazaki N.
PLoS ONE 15 ( 9 September ) 2020年9月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:PLoS ONE
Foot-and-mouth disease (FMD) models—analytical models for tracking and analyzing FMD outbreaks—are known as dominant tools for examining the spread of the disease under various conditions and assessing the effectiveness of countermeasures. There has been some remarkable progress in modeling research since the UK epidemic in 2001. Several modeling methods have been introduced, developed, and are still growing. However, in 2010 when a FMD outbreak occurred in the Miyazaki prefecture, a crucial problem reported: Once a regional FMD outbreak occurs, municipal officials in the region must make various day-today decisions throughout this period of vulnerability. The deliverables of FMD modeling research in its current state appear insufficient to support the daily judgments required in such cases. FMD model can be an efficient support tool for prevention decisions. It requires being conversant with modeling and its preconditions. Therefore, most municipal officials with no knowledge or experience found full use of the model difficult. Given this limitation, the authors consider methods and systems to support users of FMD models who must make real-time epidemic-related judgments in the infected areas. We propose a virtual sensor, designated “FMD-VS,” to index FMD virus scattering in conditions where there is once a notion of FMD; and (2) shows how we apply the developed FMD-VS technique during an outbreak. In (1), we show our approach to constructing FMD-VS based on the existing FMD model and offer an analysis and evaluation method to assess its performance. We again present the results produced when the technique applied to 2010 infection data from the Miyazaki Prefecture. For (2), we outline the concept of a method that supports the prevention judgment of municipal officials and show how to use FMD-VS.
-
主観的輪郭を用いた回転3Dテキスト型CAPTCHAの提案 査読あり
臼崎翔太郎,油田健太郎,山場久昭,片山徹郎,椋木雅之,朴美娘,岡崎直宣
電子情報通信学会論文誌B J103-B ( 8 ) 332 - 343 2020年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
On a user authentication method to realise an authentication system using s-EMG 査読あり
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
International Journal of Grid and Utility Computing 11 ( 5 ) 725 - 734 2020年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:International Journal of Grid and Utility Computing
To prevent shoulder-surfing attacks, we proposed a user authentication method using surface electromyogram (s-EMG) signals, which can be used to identify who generated the signals and which gestures were made. Our method uses a technique called 'pass-gesture', which refers to a series of hand gestures, to achieve s-EMG-based authentication. However, it is necessary to introduce computer programs that can recognise gestures from the s-EMG signals. In this paper, we propose two methods that can be used to compare s-EMG signals and determine whether they were made by the same gesture. One uses support vector machines (SVMs), and the other uses dynamic time warping. We also introduced an appropriate method for selecting the validation data used to train SVMs using correlation coefficients and cross-correlation functions. A series of experiments was carried out to confirm the performance of those proposed methods, and the effectiveness of the two methods was confirmed.
-
Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG 査読あり
Yamaba H., Nagatomo Y., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 1150 AISC 834 - 844 2020年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© 2020, Springer Nature Switzerland AG. At the present time, since mobile devices such as tablet-type PCs and smart phones have penetrated deeply into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We introduced manual kana of the Japanese Sign Language syllabary and selected the candidate gestures based on them. Their performances were evaluated by constructing their identifier using support vector machines.
-
分散機械学習における勾配の異常検知を用いたブロックチェーンシステムの提案とその実現性の評価
長友 誠, 油田 健太郎,岡崎 直宣,朴 美娘
IPSJ SIG Technical Reports 2020年3月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication 査読あり
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Lecture Notes on Data Engineering and Communications Technologies 47 323 - 333 2020年1月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Lecture Notes on Data Engineering and Communications Technologies
© 2020, Springer Nature Switzerland AG. At the present time, since mobile devices such as tablet-type PCs and smart phones have penetrated deeply into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We introduced manual kana of the Japanese Sign Language syllabary and compared the identification performance of some candidate sets of feature values with adopting support vector machines.
-
Development and Evaluation of Farmers Extension Information System 査読あり
Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
Proc. 25th Int'l Sympo. on Artificial Life and Robotics 2020 (AROB 25th 2020) 2020年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Proposal of an Algorithm to Generate VDM++ by Using Words Extracted from the Natural Language Specification 査読あり
Yasuhiro Shigyo, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Nanoubu Okazaki
Proc. 2020 Int’l Conf. on Artificial Life and Robotics (ICAROB 2020) 2020年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
The Measurement of Class Cohesion using Semantic Approach 査読あり
Bayu Priyambadha, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Nanoubu Okazaki
Proc. 2020 Int’l Conf. on Artificial Life and Robotics (ICAROB 2020) 2020年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Test Cases Redundant Elimination on Code Coverage Uses Distance and Correlation Measurement Method 査読あり
Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Nanoubu Okazaki
Proc. 2020 Int’l Conf. on Artificial Life and Robotics (ICAROB 2020) 2020年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
スマートウォッチにおけるジェスチャを用いた個人認証方式の提案と評価
長友 誠,小関 朋奈,渡辺 一樹,油田 健太郎,岡崎 直宣,朴 美娘
2020 Symposium on Cryptography and Information Security(SCIS2020) 2020年1月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Evaluation of Color-Based CAPTCHA Using Color Constancy 査読あり
Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
Proc. 25th Int'l Sympo. on Artificial Life and Robotics 2020 (AROB 25th 2020) 2020年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Vote-Based Unknown Malware Detection System Using Consortium Blockchain 査読あり
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki
Proc. 25th Int'l Sympo. on Artificial Life and Robotics 2020 (AROB 25th 2020) 2020年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
An evaluation of the interactive video CAPTCHA method against automated attack 査読あり
Aburada Kentaro, Usuzaki Shotaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 12 ) 453 - 457 2019年12月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人 電子情報通信学会
CAPTCHA is designed to detect automated programs (called bots) by requiring them to perform tasks that are easy for humans but difficult for automations. CAPTCHAs are vulnerable to relay attacks in which the challenges are relayed to remote human-solvers. In our previous paper, we proposed an interactive video type CAPTCHA that is strongly resistant to relay attacks. However, a quantitative evaluation of resistance to automated attacks still has not been carried out. Herein, we implement an automated attack for applying to our CAPTCHA and evaluate its resistance to automated attacks. Our results show the robustness of our proposed method against mean shift algorithm.
-
Nagatomo Makoto, Watanabe Kazuki, Aburada Kentaro, Okazaki Naonobu, Park Mirang
IEICE Communications Express 8 ( 12 ) 495 - 500 2019年12月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人 電子情報通信学会
Recently, mobile terminals having small touchscreen such as smartwatches are increasing. PIN or pattern lock are used for personal authentication for smartwatches, but it is possible to leak authentication information by peeking the screen because the information is displayed directly. Therefore, in this paper, we propose Personal Identification with Any Shift (PIAS), which user taps different icon from registered icon on 3 × 3 icons. In addition, we implemented PIAS and evaluated it by confirming the usability and shoulder-surfing resistance. As a result, authentication time and success rate was 13.8 s and 89.4%, and the rate of successful shoulder-surfing attack was 0.0%.
-
Implementation of CAPTCHA suitable for mobile devices 査読あり
Aburada Kentaro, Usuzaki Shotaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 12 ) 601 - 605 2019年12月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人 電子情報通信学会
CAPTCHA is a technology designed to prevent automated programs (known as bots) from acquiring access to on-line accounts to send spam mail, manipulate vote numbers in on-line polls, or take other malicious actions. In addition, access to Web services has been incorporated into mobile devices, such as smartphones. However, because most CAPTCHAs are not designed for mobile devices, user-friendly CAPTCHA for mobile devices is required. Thus, we implemented CAPTCHA on mobile devices and evaluated its resistance to bots. Our CAPTCHA showed robustness against bots, with good usability.
-
Application of Pairwise Testing into BWDM which is a Test Case Generation Tool for the VDM++ Specification. 査読あり
Tetsuro Katayama, Futa Hirakoba, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networks and Artificial Life, Atlantis Press 6 ( 3 ) 143 - 147 2019年12月
記述言語:英語 掲載種別:研究論文(学術雑誌)
-
ブロックチェーンを用いた分散機械学習におけるパラメータ異常検知システムの提案
長友誠, 油田健太郎, 岡崎直宣, 朴美娘
CSS2019 1343 - 1348 2019年10月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
ブロックチェーンを用いた不正ログイン対策の検討
藤竜成, 臼崎翔太郎, 油田健太郎, 朴美娘, 白鳥則郎, 岡崎直宣
CSS2019 1336 - 1342 2019年10月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Implementation of Tamias to Check Production Rules for Parsing Expression Grammar 査読あり
Tetsuro Katayama, Toshihiro Miyaji, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networks and Artificial Life, Atlantis Press 6 ( 2 ) 123 - 127 2019年9月
記述言語:英語 掲載種別:研究論文(学術雑誌)
-
Blockchain-based malware detection method using shared signatures of suspected malware files 査読あり
Fuji R., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Shiratori N., Okazaki N.
Advances in Intelligent Systems and Computing 1036 305 - 316 2019年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. Although rapid malware detection is very important, the detection is difficult due to the increase of new malware. In recent years, blockchain technology has attracted the attention of many people due to its four main characteristics of decentralization, persistency, anonymity, and auditability. In this paper, we propose a blockchain-based malware detection method that uses shared signatures of suspected malware files. The proposed method can share the signatures of suspected files between users, allowing them to rapidly respond to increasing malware threats. Further, it can improve the malware detection by utilizing signatures on the blockchain. In the evaluation experiment, we perform a more real simulation compared with our previous work to evaluate the detection accuracy. Compared with heuristic methods or behavior-based methods only, the proposed system which uses these methods plus signature-based method using shared signatures on the blockchain improved the false negative rate and the false positive rate.
-
Nagatomo M., Watanabe K., Aburada K., Okazaki N., Park M.
Advances in Intelligent Systems and Computing 1036 560 - 569 2019年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. Recently, mobile devices having small touchscreen such as smartwatches has been increasing due to miniaturization of electronic devices. Currently, PIN and pattern lock are used for personal authentication of these devices, but there is possibility of leakage of authentication information by shoulder-surfing attack. Many authentication methods having shoulder-surfing resistance are proposed until now. However, these methods are for smartphones or tablets having middle-size screen. Hence, when these authentication methods apply for smartwatches, the usability reduces because a user cannot touch the screen accurately. Therefore, in this paper, we propose personal authentication method having shoulder-surfing resistance for smartwatches. In this method, the user selects alternative icon to registered icon on 3 × 3 matrix using shift rule. In addition, we implemented the proposed method on smartwatch, and performed two experiments to confirm usability and shoulder-surfing resistance. As a result, average authentication time and authentication success rate was 13.8 s and 89.4%, and touch success rate was 96.2% when using shift rule. Also, the leakage rate of authentication information was 0.0%.
-
Gait-based authentication for smart locks using accelerometers in two devices 査読あり
Watanabe K., Nagatomo M., Aburada K., Okazaki N., Park M.
Advances in Intelligent Systems and Computing 1036 281 - 291 2019年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. Smart locks can be opened and closed electronically. Fingerprint or face authentication is inconvenient for smart locks because it requires the user to stop for several seconds in front of the door and remove certain accessories (e.g., gloves, sunglasses). This study proposes a user authentication method based on gait features. Conventional gait-based authentication methods have low identification accuracy. The proposed gait-based authentication method uses accelerometers in a smartphone and a wearable device (i.e., smartwatch). We extracted 31 features from the acquired acceleration data and calculated identification accuracy for various machine-learning algorithms. The highest accuracy was 95.3%, obtained using random forest. We found that the maximum interval, minimum interval, and minimum value had the highest contributions to identification accuracy, and variance, median, and standard deviation had the lowest contributions.
-
Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart Lock 査読あり
Watanabe K., Nagatomo M., Aburada K., Okazaki N., Park M.
Lecture Notes in Networks and Systems 97 352 - 362 2019年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Lecture Notes in Networks and Systems
© Springer Nature Switzerland AG 2020. Currently, authentication in Smart locks is performed by fingerprint or face authentication. However, these authentications are inconvenient for smart locks because they require the user to stop for several seconds in front of the door and remove certain accessories (e.g., gloves, sunglasses). In this paper, we propose a user authentication method based on gait features. We propose a system model of gait-based authentication method using accelerometers in a smartphone and a wearable device (i.e., smartwatch), that is robust for unknown data using anomaly detection by machine learning. In addition, we conduct experiment to confirm the authentication rate of the proposed gait-based authentication. As a result, when using Isolation Forest as the anomaly detection algorithm, the average FAR (False Acceptance Rate) was 8.3%, the average FRR (False Rejection Rate) was 9.5%. Furthermore, we found that the better algorithm of anomaly detection of FAR and FRR is different depending on the subjects.
-
Evaluation of manual alphabets based gestures for a user authentication method using s-emg 査読あり
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 1036 570 - 580 2019年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. At the present time, since mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We measured s-EMG signals of manual kana of The Japanese Sign Language syllabary and evaluated their potential as the important element of the user authentication method.
-
Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker 査読あり
Nagatomo Makoto, Aburada Kentaro, Okazaki Naonobu, Park Mirang
International Journal of Networking and Computing 9 ( 2 ) 318 - 338 2019年7月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:IJNC編集委員会
Currently, devices with wireless technologies often communicate each other ad hoc. For example, a presenter wirelessly distributes ad-hoc meeting materials from a PC to mobile device in a meeting room. However, there is a problem of spoofing by an impersonator outside the room. Hence, devices must conduct secure pairing, which is exchange of key necessary for encrypting communication contents, before the communication. As a pairing method between devices, there are pairing methods using RSS from access point as features. However, RSS changes significantly due to environmental factors. On the other hand, there are the pairing methods which compare acceleration data from devices with displacement data of devices from camera of a server. However, these methods have problems that it is necessary to use infrared camera and difficult to recognize inclination of devices. Thus, these methods cannot perform accurate device pairing. Therefore, in this paper, we propose a method that perform pairing using devices' accelerometers and markers displayed on devices, and a camera of authentication server. This method performs pairing by calculating similarity between velocity data from acceleration data from devices and displacement data of the marker from camera after comparing marker sequence displayed on the device. This method has advantage that can detect devices' inclination by recognizing markers' inclination. We performed three types of experiments to confirm the similarity of displacement data and acceleration data, whether an impersonator outside camera range can perform pairing, and possibility of several devices pairing together. As a result, we founded that the larger the device's display is, the higher the similarity, the proposed method can distinguish legitimate user from impersonator outside camera range by average similarity, and three devices succeeded pairing at rate of 71.8%.
-
スマートロックにおける異常検知を用いた二つの端末の加速度による歩行認証の提案 査読あり
臼崎翔太郎, 油田健太郎, 山場久昭, 朴美娘, 岡崎直宣
情報処理 学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2019)論文集 1155 - 1160 2019年7月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
複数ウィンドウサイズの効率的監視によるバースト形態に依らないDDoS 攻撃検出手法の検討 査読あり
臼崎翔太郎, 油田健太郎, 山場久昭, 朴美娘, 岡崎直宣
情報処理 学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2019)論文集 495 - 504 2019年7月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
マルウェア検知システムにおけるブロックチェーンベースのマルウェア 情報共有手法の検討
藤竜成,臼崎翔太郎,油田健太郎,山場久昭,片山徹郎,朴美娘,白鳥則郎,岡崎直宣
信学技報 119 ( 144 ) 293 - 298 2019年7月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
マーカーを用いたカメラと加速度センサによるセキュアデバイスペアリング手法の評価
長友誠, 油田健太郎, 岡崎直宣, 朴美娘
IPSJ SIG Technical Reports 2019年5月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG 査読あり
Yamaba H., Inotani S., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 927 693 - 701 2019年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© 2019, Springer Nature Switzerland AG. At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare many gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We measured s-EMG signals of manual kana of The Japanese Sign Language syllabary and examined their ability for the use of passwords of the authentication method.
-
Nagatomo M., Aburada K., Yamaba H., Okazaki N., Park M.
Advances in Intelligent Systems and Computing 927 683 - 692 2019年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© 2019, Springer Nature Switzerland AG. Currently, IoT devices often use wireless technologies to communicate with each other. An example is ad-hoc device pairing such as wireless distribution of meeting materials from a PC to mobile device. The problem in this case is spoofing by an impersonator. In order to solve this problem, we proposed secure device pairing method using similarity between displacement data of a marker displayed on devices and acceleration data obtained from devices. We performed experiments to confirm similarity and whether impersonator can pair with the server. As a result, we found that similarity was low and unstable. Therefore, in this paper, we propose an extended method that marker changes at an interval. These sequence of markers displayed on the device is used to recognize the device by a camera in addition to calculation of the similarity. We performed 3 experiments to confirm the similarity displacement data and examined whether an eavesdropper outside the camera range can perform pairing. Also, we performed pairing of some device together. As a result, average similarity was higher than that of previous method and pairing of three devices succeeded at rate of about 70%.
-
Investigation on Sharing Signatures of Suspected Malware Files Using Blockchain Technology 査読あり
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, and Naonobu Okazaki
Lecture Notes in Engineering and Computer Science: Proceedings of The International MultiConference of Engineers and Computer Scientists 2019 2019年3月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
CHAMSIN: CaptcHA by caMouflaged StrINg 査読あり
Mukunoki Masayuki, Yamaba Hisaaki, Usuzaki Shotaro, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 3 ) 55 - 60 2019年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人 電子情報通信学会
We propose a new CAPTCHA scheme that uses random dot patterns (RDPs) to prevent highly-developed bots attacks. Human beings can recognize a moving figure filled by a RDP from a background that is filled by another RDP; however, it is impossible to find such figures when they are stationary. Since image recognition by bots is usually carried out frame by frame, it is hard for bots to recognize such moving figures. The proposed CAPTCHA scheme exploits this characteristic. Several experiments were carried out to confirm that the proposed CAPTCHA scheme is usable enough and has enough resistance against bot attacks.
-
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit 査読あり
Tetsuro Katayama and Tatsumi Nishida and Yoshihiro Kita and Hisaaki Yamaba and Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 5 ( 4 ) 249 - 252 2019年3月
記述言語:英語 掲載種別:研究論文(学術雑誌)
-
Application of Pairwise Testing to Test Cases by Boundary Value Analysis in BWDM 査読あり
Futa Hirakoba, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
[Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 2019年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Implementation of an Arduino Simulator to Support Circuit Design 査読あり
Tatsumi Nishida, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
[Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 2019年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Tamias: a Syntax File Checker for Parsing Expression Grammar 査読あり
Toshihiro Miyaji, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
[Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 2019年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Development of Library Fescue Extracting Elements of Attributes and Operations of Class Diagram in UML 査読あり
Keisuke Mori, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
[Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 2019年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
覗き見耐性を持つ小型タッチスクリーン端末における個人認証方式の提案 査読あり
長友誠,渡辺一樹,油田健太郎,岡崎直宣,朴美娘
[2019 Symposium on Cryptography and Information Security (SCIS2019) 2019年1月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
A bot detection method focused on HTTP request transmission behavior of clients 査読あり
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki, Mirang Park
Proc. 24rd Int'l Sympo. on Artificial Life and Robotics 2019 (AROB 24rd 2019) 2019年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic 査読あり
Aburada K., Arikawa Y., Usuzaki S., Yamaba H., Katayama T., Park M., Okazaki N.
Artificial Life and Robotics 2019年1月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Artificial Life and Robotics
© 2019, International Society of Artificial Life and Robotics (ISAROB). Distributed denial of service attacks are a serious threat in the current information society, where the Internet plays an important role as infrastructure. We have been studying ways to mitigate these attacks using a method that distinguishes between legitimate users and attacks. Our previous method was not sufficient because it only analyzed access logs after the attack. In this study, we propose a new method that can distinguish between legitimate users and attacks while the services are running. When the IDS detects an attack, a quarantine server distinguishes legitimate users using access characteristics. The access characteristics are: (1) user follows links, (2) sender accessed a popular page, and (3) the sender’s current average transmission interval. Our experiments confirmed that the proposed method can distinguish between legitimate users and attacks.
-
A Proposal of New Reading Text CAPTCHA using Random Dot Patterns 査読あり
Yamaba H., Usuzaki S., Aburada K., Mukunoki M., Park M., Okazaki N.
Proceedings - 2018 6th International Symposium on Computing and Networking, CANDAR 2018 207 - 212 2018年12月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Proceedings - 2018 6th International Symposium on Computing and Networking, CANDAR 2018
© 2018 IEEE. According to the growth of troubles caused by malicious programs called bots, CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) comes to be an important role in the current information society. CAPTCHA identifies bots from legitimate human users by requiring some questions that are easy for humans to solve but difficult for bots. However, the progress of computing technology such as Optical Character Recognition (OCR) function. bots come to be able to solve present CAPTCHAs. In order to outcome such troublesome bots, more sophisticated CAPTCHA that requires the high cognitive ability of human beings is desired. In this paper, we propose a new CAPTCHA scheme that uses random dot patterns. Human beings can recognize a moving figure filled by a random dot pattern from a background that is filled by another random dot pattern; however, they lose the figure in the background when the figure pauses. Since image recognition by computer programs is usually carried out frame by frame, it is hard for bots to recognize such a moving figure filled by a random dot pattern from another random dot pattern background. The proposed CAPTCHA scheme exploits this characteristic of random dot patterns. This CAPTCHA requires users to answer a text filled by a random dot pattern that is moving on a background also filled by another random dot pattern. Several experiments were carried out to confirm that the proposed CAPTCHA scheme has enough resistance against bot attacks using representative image recognition methods. Results of the experiments showed that the image recognition methods cannot find out the answer text. Other experiments were also carried out to evaluate the usability of the proposed CAPTCHA scheme. The system usability scheme was adopted in the experiments. The obtained score was 89 that means this CAPTCHA scheme has high usability. These results showed that the CAPTCHA scheme is usable enough and has enough resistance against bot attacks.
-
Proposal and evaluation of secure device pairing method with camera and accelerometer 査読あり
Nagatomo M., Aburada K., Okazaki N., Park M.
Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018 310 - 315 2018年12月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018
© 2018 IEEE. With the advancement of wireless short-range technology, the number of mobile devices is also increasing. Consequently, devices often exchange information using wireless communications, but this communication has vulnerabilities, such as eavesdropping and man-in-the-middle attack. Therefore, it is necessary to perform secure pairing between devices before wireless communication begin. In this paper, we assume that devices are securely paired in limited space, such as a room using wireless communication. The method for secure pairing using Received signal strength (RSS) is simple, but RSS is easy to change due to environmental factors. Recently, pairing methods using camera and accelerometer are studied. However, these methods do not directly detect inclination of the device. We propose the one of secure device pairing method using camera and accelerometer. Our proposed method make the camera read a marker on the display of the device. The marker's inclination corresponds to the device's inclination, hence, we assume that the accuracy is higher than that of existing methods.
-
青島地区における避難者の歩行速度を考慮した災害時の避難行動に関するシミュレーション
本田佳鈴,山場久昭,油田健太郎,岡崎直宣
[IPSJ SIG Technical Reports 1 - 8 2018年11月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
被疑クライアントのHTTP リクエスト送信挙動に基づいたボット判定手法
藤竜成,山場久昭,油田健太郎,岡崎直宣
[IPSJ SIG Technical Reports 2018年11月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
スライドウィンドウを利用したエントロピー手法による軽量なDDoS 攻撃検知手法の検討
臼崎翔太郎,山場久昭,油田健太郎,岡崎直宣
[IPSJ SIG Technical Reports 2018年11月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
An Examination of Pairing Method with Camera and Acceleration Sensor 査読あり
Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park
The 11th International Conference on Mobile Computing and Ubiquitous Networking 2018年10月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
スマートフォンとウェアラブル端末の加速度センサーを用いたスマートロックにおける歩行認証の検討 査読あり
渡辺一樹,長友誠,油田健太郎,岡崎直宣,朴美娘
コンピュー タセキュリティシンポジウム(CSS2018)論文集 173 - 178 2018年10月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
The Interactive Video CAPTCHA for Better Tolerance of Automated Attack 査読あり
Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
The 11th International Conference on Mobile Computing and Ubiquitous Networking 2018年10月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
A Study on Smart Lock Authentication Using Smart Phone and Wearable Device Acceleration Sensor 査読あり
Kazuki Watanabe, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park
The 13th International Workshop on Security 2018年9月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
スマートロックにおける二端末の加速度を用いた歩行状態による本人認証の検討 査読あり
渡辺一樹,長友誠,油田健太郎,岡崎直宣,朴美娘
FIT2018(第17 回情報科 学技術フォーラム) 論文集 4 137 - 140 2018年9月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Evaluation of user identification methods for realizing an authentication system using s-EMG 査読あり
Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Lecture Notes on Data Engineering and Communications Technologies 22 733 - 742 2018年9月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time 査読あり
Katayama Tetsuro, Mori Keisuke, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 5 ( 2 ) 114 - 117 2018年9月
-
カメラと加速度センサを用いたデバイスペアリング方式の提案とその評価 査読あり
長友 誠, 油田 健太郎, 岡崎 直宣, 朴 美娘
情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2018)論文集 2018年7月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
クライアントのHTTPリクエスト送信動作に着目したボット検知手法の検討 査読あり
藤 竜成, 油田 健太郎, 山場 久昭, 朴 美娘, 岡崎 直宣
情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2018)論文集 2018年7月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
色恒常性を利用したカラー CAPTCHA の検討 査読あり
臼崎 翔太郎, 油田 健太郎, 山場 久昭, 椋木 雅之, 朴 美娘, 岡崎 直宣
情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2018)論文集 2018年7月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
ランダム性を持ったあみだくじ型視線認証の検討 査読あり
宮崎 翔吾, 油田 健太郎, 山場 久昭, 朴 美娘, 岡崎 直宣
情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2018)論文集 2018年7月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
Java プログラムのデータ遷移可視化ツールTFVIS の開発 査読あり
佐藤拓弥, 片山徹郎, 喜多義弘, 山場久昭, 油田健太郎, 岡崎直宣
情報処理学会論文誌 59 ( 4 ) 1137 - 1149 2018年4月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
Hisaaki Yamaba, Tokiyoshi Kurogi, Kentaro Aburada, Shin-Ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Artificial Life and Robotics 23 ( 1 ) 87 - 93 2018年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Artificial Life and Robotics
© 2017, ISAROB. At present, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In this paper, we introduced support vector machines (SVM) for improvement of the method of identifying gestures. A series of experiments was carried out to evaluate the performance of the SVM based method as a gesture classifier and we also discussed its security.
-
Implementation and User Testing of Personal Authentication Having Shoulder Surfing Resistance with Mouse Operations 査読あり
Makoto Nagatomo, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki, Mirang Park
IEICE Communications Express 7 ( 3 ) 2018年3月
記述言語:英語 掲載種別:研究論文(学術雑誌)
-
Usuzaki S., Arikawa Y., Yamaba H., Aburada K., Kubota S., Park M., Okazaki N.
Journal of Information Processing 26 257 - 266 2018年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Journal of Information Processing
© 2018 Information Processing Society of Japan. Distributed Denial-of-Service (DDoS) attack detection systems are classified into a signature based approach and an anomaly based approach. However, such methods tend to suffer from low responsiveness. On the other hand, real-time burst detection which is used in data mining offers two advantages over traditional statistical methods. First, it can be used for real-time detection when an event is occurring, and second, it can work with less processing as information about events are compressed, even if a large number of events occur. Here, the authors add the function for attack detection in real-time burst detection technique, and propose a highly responsive DDoS attack detection technique. This paper performs experiments to evaluate its effectiveness, and discusses its detection accuracy and processing performance.
-
Evaluation of farmers market information system to connect with some social stakeholders 査読あり
Tende I., Kubota S., Yamaba H., Aburada K., Okazaki N.
Journal of Information Processing 26 247 - 256 2018年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Journal of Information Processing
© 2018 Information Processing Society of Japan. A large part of the population in Tanzania consists of rural smallholder farmers. Due to lack of market information, farmers sell crops to middlemen at lower prices and hence don’t get enough profits. Previously we developed a WEB and SMS (Short Message Service) based Farmers Market Information System using a Waterfall model which automatically replies to farmers’ requests for market prices of crops through SMS. We then improved the system so that, farmers can access crop buyers’ details and crop demand reports through SMS while crop buyers can access farmers’ details and crop demand reports through SMS or WEB. We also evaluated the effectiveness of the system to crop buyers’ incomes and times for accessing market information after implementing the system in Tanzania in the SWAHILI language. In this paper we further evaluate the system effectiveness. Findings reveal that the system helped farmers to get improved incomes and access market information in shorter times. The system also helped farmers and crop buyers to sell and buy larger quantities of crops respectively. The findings also reveal that young people can learn and use the system more easily than old people. Users can also easily learn and use the system if they can read and write in the SWAHILI language regardless of their education levels.
-
An Examination of CAPTCHA for tolerance of Relay attacks and Automated Attacks 査読あり
Ryohei Tatsuda, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki
Lecture Notes on Data Engineering and Communications Technologies 17 2018年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Evaluation of Index Poisoning Method in Large Scale Winny Network 査読あり
Kentaro Aburada, Yoshihiro Kita, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Lecture Notes on Data Engineering and Communications Technologies 17 2018年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance 査読あり
Makoto Nagatomo, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki, Mirang Park
Lecture Notes on Data Engineering and Communications Technologies 17 2018年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
A study on a user identification method using dynamic time warping to realize an authentication system by s-EMG 査読あり
Tokiyoshi Kurogi, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Lecture Notes on Data Engineering and Communications Technologies 17 2018年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Implementation of RETUSS to Ensure Traceability between Class Diagram in UML and Java Source Code in Real Time 査読あり
Keisuke Mori, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada and Naonobu Okazaki
Proc. 2018 Int'l Conf. on Artificial Life and Robotics (ICAROB 2018) 2018年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Prototype of a Tool to Defect Specific Comments 査読あり
Satoshi Tanoue, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada and Naonobu Okazaki
Proc. 2018 Int'l Conf. on Artificial Life and Robotics (ICAROB 2018) 2018年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
A study on user identification method using cross-correlation and SVM to realize an authentication system by s-EMG 査読あり
T. Kurogi, H. Yamaba, K. Aburada, T. Katayama, M. Park, and N. Okazaki
Proc. 23rd Int'l Sympo. on Artificial Life and Robotics 2018 (AROB 23rd 2018) 2018年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Introduction of traffic characteristics to distinguish legitimate user traffic from DDoS attack traffic 査読あり
Y. Arikawa, H. Yamaba, K. Aburada, T. Katayama, M. Park, and N. Okazaki
Proc. 23rd Int'l Sympo. on Artificial Life and Robotics 2018 (AROB 23rd 2018) 2018年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
An examination of the interactive video CAPTCHA method to resist relay attack
Tatsuda Ryohei, Aburada Kentaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE COMMUNICATIONS EXPRESS 7 ( 4 ) 136 - 141 2018年
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人 電子情報通信学会
CAPTCHA is a kind of challenge response test, which is used to distinguish human users from malicious computer program such as bots. However, the attack technique called relay attack as a method to avoid the CAPTCHA has been devised. This attack relays the CAPTCHA challenges to remote human-solvers, let them to decode CAPTCHA challenges. We used delay time that is caused by communications needed in relay attack. Our new CAPTCHA uses this delay time between communications to prevent relay attacks. We constructed an experimental environment in which relay attack can be simulated, made a series of experiments in order to evaluate the performance of the proposed method.
-
感染指数に基づく口蹄疫の感染推定手法
高塚 佳代子,関口 敏,山場 久昭,油田 健太郎,岡崎 直宣
SSI2017 2017年11月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
マウス操作を用いた個人認証方式のユーザビリティと覗き見耐性の実験と評価
長友 誠,喜多 義弘,油田 健太郎,岡崎 直宣,朴 美娘
コンピュータセキュリティシンポジウム2017論文集 2017年10月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
BWDM: Test Cases Automatic Generation Tool Based on Boundary Value Analysis with VDM++ 査読あり
Tetsuro Katayama, Hiroki Tachiyama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 4 ( 2 ) 2017年9月
記述言語:英語 掲載種別:研究論文(学術雑誌)
-
スケジュールのロバスト性をフロートの解空間の大きさで評価する方法について
高塚 佳代子,佐藤 知一,山場 久昭,油田 健太郎,岡崎 直宣
化学工学会第49回秋季大会 2017年9月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Evaluating Effectiveness of Farmers Market Information System to Crop Buyers
Isakwisa Gaddy Tende, Shin-Ichiro Kubota, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
電子情報通信学会ソサイエティ大会 2017年9月
記述言語:英語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Development of a Monitoring System Based on Power Consumption 査読あり
Kentaro Aburada, Kengo Todaka, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki
Lecture Notes on Data Engineering and Communications Technologies 7 2017年8月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method 査読あり
Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki
Lecture Notes on Data Engineering and Communications Technologies 7 2017年8月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Evaluation and Improvement of Farmers Market Information System to Connect with Some Social Stakeholders 査読あり
Isakwisa Gaddy Tende, Shin-Ichiro Kubota, Kentaro Aburada, Naonobu Okazaki
Lecture Notes on Data Engineering and Communications Technologies 7 2017年8月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
表面筋電位による個人認証システム実現のための相互相関係数を用いた個人識別手法の検討
黒木 聡舜,山場 久昭,油田 健太郎,朴 美娘,岡崎 直宣
研究報告セキュリティ心理学とトラスト(SPT) 59 - 64 2017年7月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
リレーアタックに耐性を持つインタラクティブな動画CAPTCHA方式の検討
立田 怜平,山場 久昭,油田 健太郎,朴 美娘,岡崎 直宣
研究報告セキュリティ心理学とトラスト(SPT) 51 - 58 2017年7月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
家庭の電力消費量に基づく人間の行動を推定するための基礎研究
前花拓海,石川秀大,油田健太郎,嶋田浩和,戸高賢吾
信学技報 117 ( 70 ) 29 - 34 2017年6月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
リアルタイムバースト検出手法の利用による即応性を考慮したDDoS攻撃検知手法の検討 査読あり
臼崎 翔太郎, 有川 佑樹, 山場 久昭, 油田健太郎, 久保田 真一郎,岡崎 直宣
情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2017)論文集 1411 - 1419 2017年6月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
DPIを用いたIoT機器向け不正侵入検知システムの検討 査読あり
油田健太郎,山場久昭,朴美娘,岡崎直宣
情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2017)論文集 1627 - 1634 2017年6月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
Winnyネットワークにおけるキーの生存時間とノード数を考慮したインデックスポイゾニングの評価
山本 碧, 油田 健太郎, 山場 久昭, 久保田 真一郎, 朴 美娘, 岡崎 直宣
情報処理学会研究報告. CSEC, [コンピュータセキュリティ] 2015 ( 26 ) 1 - 7 2015年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
近年,P2P 技術を応用して作成されたファイル共有を目的としたソフトウェアが社会的に注目を浴びている.しかし,これらは効率の良いファイル共有ができる反面,その多くがファイルの流通制御機能をもたないため,情報漏洩や違法なファイルの流通が問題となっている.この解決策としてインデックスポイゾニングと呼ばれるファイル流通制御方式が研究されている.インデックスポイゾニングを P2P ファイル共有ネットワークへ適用する際に,トラフィックの増大やインデックスの汚染などの問題が発生し,通信インフラへの影響があることが確認されている.これらの問題を解決する手法として,ファイルの流通制御を低下させることのない,動的なクラスタリングを用いた手法が提案されている.本論文ではその手法において,現実的な実験環境にてその有効性を評価する.
-
山場 久昭, 長友 想, 油田 健太郎, 久保田 真一郎, 片山 徹郎, 朴 美娘, 岡崎 直宣
情報処理学会研究報告. CSEC, [コンピュータセキュリティ] 2015 ( 32 ) 1 - 6 2015年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
近年,スマートフォンやタブレットのようなモバイル端末の普及に伴い,覗き見によって認証に必要な情報が第三者に取得されてしまてしまうことが問題となってきている.これを解決する技術として,指紋などの生体情報を用いた生体認証が注目されている.本論文では,そのひとつである筋電位を用いた個人認証について検討を行う.具体的には,前腕部の筋電位の波形が手首から先の手の動き (ジェスチャー) によって異なる波形を示すことを利用し,そのジェスチャーを組み合わせてパスワードとして用いる手法を提案する.今回は,個人認証に用いる生体認証として筋電位が利用可能であるのか,筋電位の波形からジェスチャーを判断することができるのか,また,それを計算機上に行わせるのが可能かどうかについて検討を行ったので,報告する.
-
検索可能暗号におけるブルームフィルタを応用した検索方式の提案
佐保 航輝, 油田 健太郎, 山場 久昭, 久保田 真一郎, 朴 美娘, 岡崎 直宣
情報処理学会研究報告. CSEC, [コンピュータセキュリティ] 2015 ( 8 ) 1 - 7 2015年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
近年,クラウドストレージサービスが一般のユーザのみでなく企業でも利用されている.クラウドストレージサービスを利用することによってインターネットに接続されている環境であればどこでもデータの利活用が可能になったが,安全性が課題とされる.サーバ側の不正閲覧等を防ぐために,暗号化したデータを復号することなく検索可能とした検索可能暗号が注目されている.その手法の一つとしてブルームフィルタを用いることでより検索自由度を高めようとした方式があるが,一度登録したキーワードを削除することができず,削除する際には再構成する必要があった.そこで本研究では,ブルームフィルタを拡張したカウンティングフィルタを用いることでキーワードの削除を可能とするより柔軟な手法を提案する.
-
Winnyネットワークにおけるキーの生存時間とノード数を考慮したインデックスポイゾニングの評価
山本 碧, 油田 健太郎, 山場 久昭, 久保田 真一郎, 朴 美娘, 岡崎 直宣
情報処理学会研究報告. IOT, [インターネットと運用技術] 2015 ( 26 ) 1 - 7 2015年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
近年,P2P 技術を応用して作成されたファイル共有を目的としたソフトウェアが社会的に注目を浴びている.しかし,これらは効率の良いファイル共有ができる反面,その多くがファイルの流通制御機能をもたないため,情報漏洩や違法なファイルの流通が問題となっている.この解決策としてインデックスポイゾニングと呼ばれるファイル流通制御方式が研究されている.インデックスポイゾニングを P2P ファイル共有ネットワークへ適用する際に,トラフィックの増大やインデックスの汚染などの問題が発生し,通信インフラへの影響があることが確認されている.これらの問題を解決する手法として,ファイルの流通制御を低下させることのない,動的なクラスタリングを用いた手法が提案されている.本論文ではその手法において,現実的な実験環境にてその有効性を評価する.
-
山場 久昭, 長友 想, 油田 健太郎, 久保田 真一郎, 片山 徹郎, 朴 美娘, 岡崎 直宣
情報処理学会研究報告. IOT, [インターネットと運用技術] 2015 ( 32 ) 1 - 6 2015年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
近年,スマートフォンやタブレットのようなモバイル端末の普及に伴い,覗き見によって認証に必要な情報が第三者に取得されてしまてしまうことが問題となってきている.これを解決する技術として,指紋などの生体情報を用いた生体認証が注目されている.本論文では,そのひとつである筋電位を用いた個人認証について検討を行う.具体的には,前腕部の筋電位の波形が手首から先の手の動き (ジェスチャー) によって異なる波形を示すことを利用し,そのジェスチャーを組み合わせてパスワードとして用いる手法を提案する.今回は,個人認証に用いる生体認証として筋電位が利用可能であるのか,筋電位の波形からジェスチャーを判断することができるのか,また,それを計算機上に行わせるのが可能かどうかについて検討を行ったので,報告する.
-
検索可能暗号におけるブルームフィルタを応用した検索方式の提案
佐保 航輝, 油田 健太郎, 山場 久昭, 久保田 真一郎, 朴 美娘, 岡崎 直宣
情報処理学会研究報告. IOT, [インターネットと運用技術] 2015 ( 8 ) 1 - 7 2015年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
近年,クラウドストレージサービスが一般のユーザのみでなく企業でも利用されている.クラウドストレージサービスを利用することによってインターネットに接続されている環境であればどこでもデータの利活用が可能になったが,安全性が課題とされる.サーバ側の不正閲覧等を防ぐために,暗号化したデータを復号することなく検索可能とした検索可能暗号が注目されている.その手法の一つとしてブルームフィルタを用いることでより検索自由度を高めようとした方式があるが,一度登録したキーワードを削除することができず,削除する際には再構成する必要があった.そこで本研究では,ブルームフィルタを拡張したカウンティングフィルタを用いることでキーワードの削除を可能とするより柔軟な手法を提案する.
-
Content access control scheme for P2P networks using a reputation value
Aburada K., Kita Y., Park M., Okazaki N.
Proceedings - International Conference on Advanced Information Networking and Applications, AINA 2015-April 527 - 533 2015年4月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Proceedings - International Conference on Advanced Information Networking and Applications, AINA
© 2015 IEEE. In recent years, with the improvement of the high speed communication infrastructure, P2P content distribution systems have been attracting more attention. In a P2P content distribution system, the lack of a central management server provides the system its robustness. However, it also leads to problems in content reliability and accessibility. We propose a secure content distribution system with improved accessibility by introducing a secret sharing scheme.
-
Study of filter sharing method using virtual peers in P2P networks
Sakuma M., Kita Y., Aburada K., Park M., Okazaki N.
Proceedings - International Conference on Advanced Information Networking and Applications, AINA 2015-April 720 - 726 2015年4月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Proceedings - International Conference on Advanced Information Networking and Applications, AINA
© 2015 IEEE. Among the problems faced by peer-to-peer (P2P) networks is the malicious content that often spreads unchecked because such contents are transferred from any peer to the other peer directly. While various personal and/or shared countermeasure filtering methods are available, such filters have different configurations and strength levels. Therefore, if malicious content is permitted to penetrate peers with weak filters, they can spread across an entire network. In response, in this paper, we propose a filter sharing method that utilizes virtual peers.
-
文字認識攻撃に耐性を持つランダム妨害図形を用いた画像ベースCAPTCHA方式の提案
田村 拓己, 久保田 真一郎, 油田 健太郎, 片山 徹郎, 朴 美娘, 岡崎 直宣
情報処理学会論文誌 56 ( 3 ) 808 - 818 2015年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
ボットによるWebサービスの不正利用対策として,CAPTCHAと呼ばれる反転チューリングテストが利用されている.Webサイトへの導入のしやすさや回答方式の理解のしやすさから,文字列の画像を用いたCAPTCHA方式が広く普及している.しかし,ボットによる文字認識技術の発展が著しく,高い確率でテストが突破されるなど,その脆弱性が指摘されている.高度化するボットの文字認識技術に対抗し,解読難度を高くしたCAPTCHAや画像識別などの人間の高度な能力を利用するCAPTCHAが提案されているが,利便性が低いことや特定の攻撃に弱い点が問題となっている.本稿では,人間特有の画像認識能力を利用することで,利便性を保ち十分な堅牢性を持つ新たなCAPTCHA方式を提案する.提案手法は,判定に利用する提示画像に正答の文字列を含まないようにすることで文字認識攻撃に耐性を持たせた.また,提示画像には,人間が画像を補完して認識できる程度の妨害図形を付加し,堅牢性を向上させた.提案手法の有効性を確認するため,画像CAPTCHA方式において考えられる攻撃への耐性を考察し,利便性の評価としてアンケートによるユーザビリティ評価を行った.その結果,システム実装に必要な妨害図形の量に関する閾値を明らかにし,提案手法が攻撃に対して十分な耐性を持ち,ユーザビリティが優れていることを示した.A reversal turing test called CAPTCHA is used in many webservice sites to prevent the automatic program called bots from making unauthorized accounts. The CAPTCHA with images of correct answer string, called as the text-based CAPTCHA, is widely prevalent because of an ease implementing in the website. The optical character recognition technologies enable bots solve the text-based CAPTCHA automatically. Any researchers have pointed out the vulnerability of the text-based CAPTCHA. Absorbing the vulnerability of the text-based CAPTCHA, the image-based CAPTCHA is proposed, which use the human abilities to discern objects in images. However, the existing image-based CAPTCHAs also have problems about usability and robustness. In this paper, we propose a new image-based CAPTCHA using images without a correct answer string and with obstruction figures, to achieve high usability and robustness. In order to confirm a effectiveness of the proposed method, we argue to absorb some considerable attacks in the image-based CAPTCHA, and conduct assessment of usability through our questionnaire. The results show that the proposed system absorb the attacks adequately and has usability.
-
Winnyネットワークにおけるクラスタリングを用いたインデックスポイゾニングの検討 (情報通信マネジメント)
油田 健太郎, 山場 久昭, 朴 美娘, 岡崎 直宣
電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 114 ( 43 ) 153 - 161 2014年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人電子情報通信学会
現在,P2Pファイル共有ネットワークが世界中で利用されている.しかし,その多くはファイルの流通制御をもたないため,著作権侵害ファイルの流通やコンピュータウイルスによる個人情報の流出などが社会問題となっている.その解決策としてインデックスポイゾニングと呼ばれるファイル流通制御方式が研究されている.しかし,P2Pファイル共有ネットワークヘインデックスポイゾニングを適用する際に,トラフィックの増大やインデックスの汚染などの問題が発生することが確認されている.そこで本論文では,ファイルの流通制御を低下させることなく,それらの問題を解決する手法として,動的なクラスタリングを提案することで従来手法を改善し,その一部をWinnyネットワーク向けに実装することで,提案手法の有効性を評価する.
-
Winnyネットワークにおけるクラスタリングを用いたインデックスポイゾニングの検討
油田健太郎, 山場久昭, 朴美娘, 岡崎直宣
研究報告コンピュータセキュリティ(CSEC) 2014 ( 30 ) 1 - 9 2014年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
現在,P2P ファイル共有ネットワークが世界中で利用されている.しかし,その多くはファイルの流通制御をもたないため,著作権侵害ファイルの流通やコンピュータウイルスによる個人情報の流出などが社会問題となっている.その解決策としてインデックスポイゾニングと呼ばれるファイル流通制御方式が研究されている.しかし,P2P ファイル共有ネットワークへインデックスポイゾニングを適用する際に,トラフィックの増大やインデックスの汚染などの問題が発生することが確認されている.そこで本論文では,ファイルの流通制御を低下させることなく,それらの問題を解決する手法として,動的なクラスタリングを提案することで従来手法を改善し,その一部を Winny ネットワーク向けに実装することで,提案手法の有効性を評価する.
-
Winnyネットワークにおけるクラスタリングを用いたインデックスポイゾニングの検討
油田健太郎, 山場久昭, 朴美娘, 岡崎直宣
研究報告インターネットと運用技術(IOT) 2014 ( 30 ) 1 - 9 2014年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
現在,P2P ファイル共有ネットワークが世界中で利用されている.しかし,その多くはファイルの流通制御をもたないため,著作権侵害ファイルの流通やコンピュータウイルスによる個人情報の流出などが社会問題となっている.その解決策としてインデックスポイゾニングと呼ばれるファイル流通制御方式が研究されている.しかし,P2P ファイル共有ネットワークへインデックスポイゾニングを適用する際に,トラフィックの増大やインデックスの汚染などの問題が発生することが確認されている.そこで本論文では,ファイルの流通制御を低下させることなく,それらの問題を解決する手法として,動的なクラスタリングを提案することで従来手法を改善し,その一部を Winny ネットワーク向けに実装することで,提案手法の有効性を評価する.
-
Proposal of a puzzle authentication method with shoulder-surfing attack resistance
Park M., Kita Y., Aburada K., Okazaki N.
Proceedings - 2014 International Conference on Network-Based Information Systems, NBiS 2014 495 - 500 2014年1月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Proceedings - 2014 International Conference on Network-Based Information Systems, NBiS 2014
© 2014 IEEE. Recently, mobile terminals such as smartphones have come into widespread use. Most of such mobile terminals store several types of important data, such as personal information. Therefore, in order to prevent data theft, it is necessary to lock and unlock terminals using a personal authentication method such as personal identification numbers (PINs). However, most existing authentication methods have a common problem, referred to as shoulder-surfing in which authentication information is covertly obtained by peeking over the shoulder of a user as he/she completes the authentication sequence. In this paper, we propose a puzzle authentication method that is very simple and sufficiently secure, even when the authentication sequence is being watched. This method uses a grid-based authentication scheme in which a user selects four out of 16 panels, and four out of 16 positions. We also implemented the proposed method on a mobile terminal and evaluated it through experiments and questionnaire surveys.
DOI: 10.1109/NBiS.2014.87
-
Investigation of the routing method based on the number of neighbor nodes
Aburada K., Park M., Okazaki N.
2014 7th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2014 103 - 104 2014年
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:2014 7th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2014
In ad hoc networks, due to the mobility of nodes, radio wave interference, and limited resources, such as batteries, communication links are unstable and restricted. In this paper, we propose the neighbors-based routing (NBR) protocol by constructing paths in an area in which a large number of nodes exists. Simulations confirm that the proposed protocol has higher connectivity and a lower control overhead than existing protocols in topologies in which nodes move. © 2014 IEEE.
-
Proposal of a Zone Disjoint Multi-path Routing for ad hoc networks
Aburada K., Eto M., Okazaki N., Park M.
8th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2010 2010年9月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:8th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2010
Many researches are going on in ad hoc networks and several routing protocols have been proposed. However, these protocols are "single- path" protocols which construct only one route. In ad hoc networks, due to limitation of battery capacity and mobility of nodes, communication links are unstable. Therefore, "multi-path" protocols are desired for constructing "robust" routes. Additionally, in considering the case where interference spreads to a certain area, each path is desired to be away from other paths to some degree. In this paper, we introduce the concept of "zone", and propose a Zone Disjoint Multi-path Routing Protocol, called ZDMR, for constructing multi-path routes which disjoint each other in a zone level. Our simulations confirm that this protocol has a higher connectivity than existing protocols.
-
アドホックネットワークにおけるゾーンを用いた複数経路構築手法の評価
江藤 大, 油田 健太郎, 岡崎 直宣
全国大会講演論文集 72 ( 0 ) 137 - 138 2010年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
尾花 志穂, 油田 健太郎, 岡崎 直宣
全国大会講演論文集 72 ( 0 ) 133 - 134 2010年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
アドホックネットワークにおける近隣端末数に基づく経路構築手法の検討
稲葉 健吾, 油田 健太郎, 岡崎 直宣
全国大会講演論文集 72 ( 0 ) 135 - 136 2010年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
-
センサネットワークにおける回帰分析を用いたノード位置推定手法の提案
油田 健太郎, 河内 康佑, 岡崎 直宣, 冨田 重幸, 朴 美娘
電子情報通信学会論文誌. B, 通信 = The transactions of the Institute of Electronics, Information and Communication Engineers. B 92 ( 1 ) 88 - 97 2009年1月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人電子情報通信学会
センサネットワークでは,センサが取得したデータとともに,どこでそのデータを取得したのかという地理的位置情報が重要となる場合が多い.特に,位置に依存した大規模なサービスを提供するためには,地理的位置情報を各ノードが自律的に取得できることが望ましい.一方,センサネットワークにおけるルーチングに関しては,各ノードにGPSなどの特殊なデバイスを備える必要がなく,コストや消費電力の点で有利な位置情報を必要としない手法についていくつか研究が行われている.そこで,本論文では位置情報を必要としないルーチング手法の一つであるHVGF (Hop-Vector-based Greedy Forwarding)で用いられるホップべクトルの概念に注目し,各センサノードが自律的に自身の位置情報を推定する手法の提案を行う.提案手法では,任意の二つのセンサノードについてセンサノードがもつホップべクトルから算出されるユークリッドノルムと実座標から算出される実距離との相関関係に着目した距離推定を行う.ここでは特に,離散値であるホップ数に基づいて推定される距離に含まれる誤差を考慮した位置推定手法を提案する.シミュレーションにより,提案手法は既存手法と比較して位置情報を保持しているノードの割合が少ない場合でも高い精度が得られること,また大規模なシステムヘの適用の可能性があることを示す.
-
センサネットワークにおけるホップベースルーティング手法の精度に関する検討
佐藤雄亮, 油田健太郎, 岡崎 直宣, 冨田 重幸
情報処理学会研究報告モバイルコンピューティングとユビキタス通信(MBL) 2008 ( 94 ) 49 - 56 2008年9月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
本論文では DCS (Deta-Centric Storage) センサネットワークを対象とした地理的位置情報を必要としないルーティング方式である HVGF (Hop-Vector based Greedy Forwarding) を提案する.提案方式では,n 個の基準点を設け,基準点からのホップ数を要素とするベクトルを全てのノードに作成し,そのn次元ベクトル間の距離に基づいて Greedy Forwarding を行う.シミュレーションによる評価を行い,既存の正確な位置情報を用いる手法に比べノード密度が低い場合や,ノードの分布に偏りがある場合のネットワークにおいて有効な結果が得られた.また,提案方式における最適な基準点の数についての考察を行った.In this paper, we propose a new routing scheme, HVGF (Hop-Vector based Greedy Forwarding) which doesn't need geographic information for data-centric sensor networks. In this scheme, we introduce n base-points, and assign n-dimensional hop-vector, which consists of number of hops from each base-point to the node, to each node. Then, each node forwards packets greedily based on distance between hop-vectors of the node and of destination. The simulation results show that HVGF works well in the low density networks or networks which contain a large void in the center, compared to existing greedy forwarding scheme using information of real geographical location. We also examine the performance of the proposed scheme concerning various number of base points.
-
RM-004 センサネットワークにおけるHop-Vectorに基づくノード位置推定手法の検討(ユビキタス・モバイルコンピューティング,査読付き論文)
河内 康佑, 佐藤 雄亮, 油田 健太郎, 岡崎 直宣, 冨田 重幸
情報科学技術フォーラム講演論文集 7 ( 4 ) 47 - 50 2008年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:FIT(電子情報通信学会・情報処理学会)運営委員会
-
アドホックネットワークにおける階層型複数経路構築手法の提案と評価
油田 健太郎, 高辻 慎吾, 岡崎 直宣
宮崎大學工學部紀要 36 273 - 280 2007年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:宮崎大学
A global positioning system (GPS)-based routing protocol, called Zone-based Hierarchical Link State (ZHLS) routing protocol, have been proposed for routing data packets for ad hoc networks. In this protocol, the network is divided into non-overlapping zones. Each node only knows the node connectivity within its zone and the zone connectivity of the whole network. The link state routing is performed on two levels: local node and global zone levels. Hierarchical approach reduces the amount of overhead of dynamic changing topology. ZHLS is, however, single-path protocol which detects only one route. In ad hoc networks, due to mobility of nodes and instability of communication links, multi-path protocols are required. In this paper, I propose a Multiple-Route Zone-based Hierarchical Source Routing (called MR-ZHSR) which generates disjoint paths in global zone level. If a disconnected link is detected in the currently used route, packet transmission can be switched to another route without delay.
-
データセントリックセンサネットワークにおけるルーティング方式の検討
佐藤雄亮, 油田健太郎, 岡崎 直宣, 富田 重幸, 朴美娘
情報処理学会研究報告モバイルコンピューティングとユビキタス通信(MBL) 2007 ( 44 ) 125 - 130 2007年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
バッテリ駆動のセンサ端末で構成されるセンサネットワークでは,省電力化が重要な課題となる.特に,通信は最もエネルギー消費の高い動作だと言われており,通信量を抑制することは,電力資源が乏しいセンサネットワークにとって有効である.そこで,本論文では通信量を増加させずに,かつ位置情報を必要としない簡易なルーティング方式であるHVGF(Hop-Vector based Greedy Forwarding)を提案する.提案方式では,n個の基準点を設け,基準点からのホップ数を要素とするベクトルを全てのノードに作成し,そのn次元ベクトル間の距離に基づいてグリーディーフォワーディングを行う.シミュレーションによる評価を行い,既存の正確な位置情報を用いる手法に比べノード密度が低い場合や,ノードの分布に偏りがある場合のネットワークにおいて有効な結果が得られた.For sensor networks consisting of battery-powered sensor nodes, power saving is significant challenge. It is effective to reduce the amount of communication for sensor networks where power resource is scarce, because sensor nodes consume energy most in communication. We propose a routing protocol, HVGF (Hop-Vector based Greedy Forwarding), which reduces the amount of communication and doesn't need geographic information. In this method, we introduce n base points, and assign n-dimensional hop-vector consist of number of hops from each base point to each nodes. Then, each node forwards packets greedily based on distance between hop-vectors of the node and destination. The simulation results show that HVGF works well in the low density network or network which contains a large void in the center compared to existing greedy forwarding method using information of real geographical position.
-
データセントリックセンサネットワークにおけるルーティング方式の検討
佐藤 雄亮, 油田 健太郎, 岡崎 直宣, 冨田 重幸, 朴 美娘
電子情報通信学会技術研究報告. MoMuC, モバイルマルチメディア通信 107 ( 39 ) 125 - 130 2007年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人電子情報通信学会
バッテリ駆動のセンサ端末で構成されるセンサネットワークでは,省電力化が重要な課題となる。特に,通信は最もエネルギー消費の高い動作だと言われており,通信量を抑制することは,電力資源が乏しいセンサネットワークにとって有効である.そこで,本論文では通信量を増加させずにかつ位置情報を必要としない簡易なルーティング方式であるHBGF(Hop-Vector based Greedy Forwarding)を提案する.提案方式では,n個の基準点を設け,基準点からのホップ数を要素とするベクトルを全てのノードに作成し,そのn次元ベクトル間の距離に基づいてグリーディーフォワーディングを行う.シミュレーションによる評価を行い,既存の正確な位置情報を用いる手法に比ベノード密度が低い場合や,ノードの分布に偏りかおる場合のネットワークにおいて有効な結果が得られた.
-
油田 健太郎, 藤本 竜之介
アドミニストレーション 13 ( 3 ) 131 - 145 2007年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:熊本県立大学
-
GTD理論に基づくWeb2.0時代のメール処理手法に関する実践と考察
藤本 竜之介, 油田 健太郎
アドミニストレーション 13 ( 3 ) 19 - 46 2007年3月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:熊本県立大学
-
Proposal of a robust zone-based hierarchical routing method for ad hoc networks
Aburada K., Morita K., Okazaki N., Tomita S., Mi R.
2006 Asia-Pacific Conference on Communications, APCC 2006年12月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:2006 Asia-Pacific Conference on Communications, APCC
Ad hoc routing protocols can be divided into two categories. One is proactive schemes, the other is reactive schemes. Two schemes have advantage and disadvantage each other. There are hybrid schemes which are good mix of proactive schemes and reactive schemes. In hybrid schemes, nodes maintain the complete routing information of particular area only. Outside of this area, a node search for a route only when it needs to forward a packet. In consequence, the communication overhead is reduced Zone-based Hierarchical Link State (ZHLS) routing protocol is proposed as a hybrid scheme. However, ZHLS take time to search new route when route is disconnected because it search only one route. In particular, real-time application is severely-impacted by this delay. For this reason, it is necessary to construct multiple routes as backup route. In this paper, we propose Multiple-Route Zone-based Hierarchical Source Routing (called MR-ZHSR) scheme that extends ZHLS routing protocol to construct multi-path routes. © 2006 IEEE.
-
油田健太郎, 守田 可南子, 岡崎 直宣, 富田 重幸, 朴美娘
情報処理学会研究報告モバイルコンピューティングとユビキタス通信(MBL) 2006 ( 50 ) 119 - 124 2006年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
本稿では,アドホックネットワーク上においてロバストな通信手法を実現するために,複数の経路を構築する新たな手法を提案し,その評価結果について報告する提案手法では,あらかじめ決められた領域にノードを対応させ,経路制御を領域内および領域間の2つに階層化する.そして,階層化された上位の層で重複のない複数の経路を構築することにより,通信リンクが切断された場合においても,切断されたリンクを特定することなく,ただちに経路を切り替えることができる.また提案手法では,複数経路を構築する場合にソースルーティングを用いることにより,複数経路の情報を送信ノードのみ保持すればよく,経路制御に必要なトラフイックを抑えることができる.シミュレーションによる評価を行い,従来手法に比べ経路制御情報量や経路構築にかかる計算量の増加を抑えつつ,ノードの移動速度が速くかつルーティングテーブルの更新間隔が長い場合においてもロバストな通信を行えることを示す.A global positioning system(GPS)-based routing protocol,called Zone-based Hierarchical Link State(ZHLS)routing protocol,have been proposed for routing data packets for ad hoc networks. In this protocol,the network is divided into non-overlapping zones. Each node only knows the node connectivity within its zone and the zone connectivity of the whole network. The link state routing is performed on two levels:local node and global zone levels. Hierarchical approach reduces the amount of overhead of dynamic changing topology. ZHLS is, however, single-path protocol which detects only one route. In ad hoc networks, due to mobility of nodes and instability of communication links,multi-path protocols are required. In this paper, we propose a Multiple-Route Zone-based Hierarchical Source Routing (called MR-ZHSR) whichgenerates disjoint paths in global zone level. If a disconnected link is detected in the currently used route,the route can be switched to another route without delay for re-routing.
-
油田 健太郎, 守田 可南子, 岡崎 直宣, 冨田 重幸, 朴 美娘
電子情報通信学会技術研究報告. MoMuC, モバイルマルチメディア通信 106 ( 44 ) 119 - 124 2006年5月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人電子情報通信学会
本稿では,アドホックネットワーク上においてロバストな通信手法を実現するために,複数の経路を構築する新たな手法を提案し,その評価結果について報告する.提案手法では,あらかじめ決められた領域にノードを対応させ,経路制御を領域内および領域間の2つに階層化する.そして,階層化された上位の層で重複のない複数の経路を構築することにより,通信リンクが切断された場合においても,切断されたリンクを特定することなく,ただちに経路を切り替えることができる.また提案手法では,複数経路を構築する場合にソースルーティングを用いることにより,複数経路の情報を送信ノードのみ保持すればよく,経路制御に必要なトラフィックを抑えることができる.シミュレーションによる評価を行い,従来手法に比べ経路制御情報量や経路構築にかかる計算量の増加を抑えつつ,ノードの移動速度が速くかつルーティングテーブルの更新間隔が長い場合においてもロバストな通信を行えることを示す.
-
モバイルアドホックネットワーク上の Peer to Peer システムにおける情報検索手法の一検討
小林 亜衣, 蛯原 敏博, 油田 健太郎, 岡崎 直宣
宮崎大學工學部紀要 34 211 - 218 2005年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:宮崎大学
Abstract ###Recently, mobile ad-hoc network technology is progressed and the creation of new and ###attractive services is required. In this situation, we are examining peer to peer (P2P) systems ###over the mobile ad-hoc networks. Our focus is on searching methods of contents in P2P systems. ###In general, mobile ad-hoc networks may consist of asymmetric wireless links due to differing ###propagation patterns or source of interference. In this paper, we introduce a search method for ###the P2P systems supporting asymmetric wireless links. We evaluate the proposed method by ###simulations, in the viewpoint of efficiency of search.
-
油田 健太郎, 本田 浩一, 岡崎 直宣, 冨田 重幸, 朴 美娘
宮崎大學工學部紀要 34 235 - 242 2005年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:宮崎大学
Abstract ###A global positioning system (GPS)-based routing protocol, called Zone-based Hierarchical Link ###State (ZHLS) routing protocol, have been proposed for routing data packets for ad hoc networks. In ###this protocol, the network is divided into non-overlapping zones. Each node only knows the node ###connectivity within its zone and the zone connectivity of the whole network. The link state routing is ###performed on two levels : local node and global zone levels. Hierarchical approach reduces the amount ###of overhead of dynamic changing topology. ZHLS is, however, single-path protocol which detects ###only one route. In ad hoc networks, due to mobility of nodes and instability of communication links, ###multipath protocols are required. In this paper, we propose a Multiple-Route Zone-based Hierarchical ###Source Routing (called MR-ZHSR) which generates disjoint paths in global zone level. If a ###disconnected link is detected in the currently used route, the route can be switched to another route ###without delay for re-routing.
-
油田健太郎, 本田 浩一, 岡崎 直宣, 冨田 重幸
情報処理学会研究報告モバイルコンピューティングとユビキタス通信(MBL) 2004 ( 114 ) 63 - 70 2004年11月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
本論文では,アドホックネットワークにおいて複数の経路を構築する階層型複数経路構築手法を提案する.ここでは,あらかじめ決められた領域にノードを対応させ,経路制御を領域内,領域間の2つに階層化することにより,経路構築の際の計算量を減らすことができる.提案方式では,経路構築時にゾーン内の状態を考慮して最短経路を構築することにより,より短い経路を構築できる.また,互いに重複する複数経路を持たないように構築することにより,どのリンクが切断されたかを特定する必要がなく,ただちに経路を切り替えることができる.A global positioning system (GPS)-based routing protocol, called zone-based hierarchical link state (ZHLS) routing protocol, have been proposed for routing data packets for ad hoc networks. In this protocol, the network is divided into non-overlapping zones. Each node only knows the node connectivity within its zone and the zone connectivity of the whole network. The link state routing is performed on two levels : local node and global zone levels. Hierarchical approach reduces the amount of overhead of dynamic changing topology. ZHLS is, however, single-path protocol which detects only one route. In ad hoc networks, due to mobility of nodes and instability of communication links, multipath protocols are required. In this paper, we propose an eXtended ZHLS (called XZHLS) which generates disjoint paths in global zone level. If a disconnected link is detected in the currently using route, packet transmission is switched to another route.
-
油田健太郎, 本田 浩一, 岡崎 直宣, 冨田 重幸
情報処理学会研究報告高度交通システム(ITS) 2004 ( 114 ) 63 - 70 2004年11月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人情報処理学会
本論文では,アドホックネットワークにおいて複数の経路を構築する階層型複数経路構築手法を提案する.ここでは,あらかじめ決められた領域にノードを対応させ,経路制御を領域内,領域間の2つに階層化することにより,経路構築の際の計算量を減らすことができる.提案方式では,経路構築時にゾーン内の状態を考慮して最短経路を構築することにより,より短い経路を構築できる.また,互いに重複する複数経路を持たないように構築することにより,どのリンクが切断されたかを特定する必要がなく,ただちに経路を切り替えることができる.A global positioning system (GPS)-based routing protocol, called zone-based hierarchical link state (ZHLS) routing protocol, have been proposed for routing data packets for ad hoc networks. In this protocol, the network is divided into non-overlapping zones. Each node only knows the node connectivity within its zone and the zone connectivity of the whole network. The link state routing is performed on two levels : local node and global zone levels. Hierarchical approach reduces the amount of overhead of dynamic changing topology. ZHLS is, however, single-path protocol which detects only one route. In ad hoc networks, due to mobility of nodes and instability of communication links, multipath protocols are required. In this paper, we propose an eXtended ZHLS (called XZHLS) which generates disjoint paths in global zone level. If a disconnected link is detected in the currently using route, packet transmission is switched to another route.
-
初心者ユーザ遠隔支援システムにおけるユーザ管理手法に関する検討
油田 健太郎, 金澤 昌史, 平塚 祥泰, 岡崎 直宣
宮崎大學工學部紀要 33 399 - 406 2004年10月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:宮崎大学
Abstract ###Remote access attracts attention as a technique for supporting the beginner PC users. ###However, when remote PC is connected to the internet via a fire-wall, remote access to the ###PC from the outside is difficult. In this paper, we will propose a method for realize a secure ###remote access in such cases. We will also describe our implementatlon of prototype ###system.
-
岡崎 直宣, 油田 健太郎
宮崎大學工學部紀要 32 365 - 371 2003年7月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:宮崎大学
Abstract ###Remote access attracts attention as a technique for supporting the beginner PC users in remoteness. ###However, when remote PC is connected to the internet via a router which has function of the Network ###Address Translator, remote access to such the PC from the outside is difficult. In this paper, we will ###report an examination of the method for realize a secure remote access in such network architecture. We ###will also describe our prototype-system.