Papers - YAMABA Hisaaki
-
Consideration of Application of Unified Management System of Time and Cost to Large Scale Project
Meguru TOMITA, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 249 - 253 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Consideration of Discrimination by Myoelectric Potential of Finger Character Which is Hard to Distinguish in Image Recognition
Meguru TOMITA, Makoto KUROGI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 243 - 247 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Evaluation of Delay Risk Tolerance of Project Schedule Network
Meguru TOMITA, Naoki KADOGAWA, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 237 - 241 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Proposal of a User Identification Method for Realizing an Authentication System Using s-EMG
Tokiyoshi KUROGI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 227 - 236 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Highly Responsive Detection Method of Distributed Denial-of-Service Attacks Using Data Mining Technique
Shotaro USUZAKI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 221 - 225 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Simulation on Evacuation Behavior During Disaster in Aoshima District
Shotaro USUZAKI, Takahiro FUJII, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 215 - 219 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Investigation of the Color Constancy of Color Obstruction Images for CAPTCHA
Shotaro USUZAKI, Yusuke NAKAHARA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 211 - 214 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Introduction of Traffic Characteristics to Distinguish Legitimate User Traffic from DDoS Attack Traffic
Shotaro USUZAKI, Yuki ARIKAWA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 201 - 210 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of TFVIS (Transitions and Flow VISalization) for Java Programs Reviewed
59 ( 4 ) 1137 - 1149 2018.4
Language:Japanese Publishing type:Research paper (scientific journal)
-
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time Reviewed
Tetsuro Katayama, Keisuke Mori, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada and Naonobu Okazaki
Journal of Robotics, Networks and Artificial Life 5 ( 2 ) 114 - 117 2018.4
Language:English Publishing type:Research paper (scientific journal)
-
Yamaba H., Kurogi T., Aburada K., Kubota S., Katayama T., Park M., Okazaki N.
Artificial Life and Robotics 23 ( 1 ) 87 - 93 2018.3
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2017, ISAROB. At present, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In this paper, we introduced support vector machines (SVM) for improvement of the method of identifying gestures. A series of experiments was carried out to evaluate the performance of the SVM based method as a gesture classifier and we also discussed its security.
-
A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG Reviewed
T. Kurogi, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
The 6th International Conference on Emerging Internet, Data & Web Technologies 889 - 900 2018.3
Language:English Publishing type:Research paper (international conference proceedings)
At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching.
The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In this paper, we intro- duced dynamic time warping (DTW) for improvement of the method of identifying gestures. -
Evaluation of Index Poisoning Method in Large Scale Winny Network Reviewed
K.Aburada, Y. Kita, H.Yamaba, T.Katayama, M. Park, N.Okazak
The 6th International Conference on Emerging Internet, Data & Web Technologies 999 - 1006 2018.3
Language:English Publishing type:Research paper (international conference proceedings)
In recent years, P2P file-sharing networks are used all over the world. This has led to social problems such as the illegal distribution of copyrighted material and the leakage of personal information through computer viruses because P2P does not have a control function for file distribution. To address these issues, a control method called index poi- soning has been studied. However, problems such as pollution in the net- work index and a need to increment control traffic have been reported when index poisoning is applied to a P2P file-sharing network. We pro- pose a method that implements dynamic clustering to limit the range of index poisoning as a solution for these problems that also maintains the effectiveness of the control function. In this study, we implement index poisoning on the large-scale Winny network and evaluate the system performance.
-
An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks Reviewed
R. Tatsuda, H.Yamaba, K.Aburada, T.Katayama, M. Park, N. Shiratori, N.Okazak
The 6th International Conference on Emerging Internet, Data & Web Technologies 870 - 879 2018.3
Language:English Publishing type:Research paper (international conference proceedings)
CAPTCHA is a type of challenge response test used to dis- tinguish human users from malicious computer programs such as bots, and is used to protect email, blogs, and other web services from bot attacks. So far, research on enhance of CAPTCHA’s resistance to bot attacks has been proceeded to counter advanced automated attacks method. However, an attack technique known as a relay attack has been devised to circumvent CAPTCHA. In this attack, since human solves CAPTCHA, the existing measures assuming bots have no effect on this attack. We designed a new CAPTCHA scheme for relay attacks tolerance and automated attacks tolerance. In this paper, we tested the robustness of the proposed method against several types of automated attacks. We constructed an experimental environment in which a relay attack can be simulated, and designed a series of experiments to evaluate the perfor- mance of the proposed method. As a result, we found that the proposed CAPTCHA scheme offers some of level of resistance to automated attacks and relay attacks.
-
Implementation of RETUSS to Ensure Traceability between Class Diagram in UML and Java Source Code in Real Time Reviewed
K. Mori, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2017) 2018.2
Language:English Publishing type:Research paper (international conference proceedings)
Ensuring of the traceability of deliverables is one of effective methods to secure the quality of software. It can verify that the requirements are reflected in the programs. But it has two problems: taking much labor and time, and causing mistakes by human handling. This paper has implemented RETUSS (Real-time Ensure Traceability between UML and Source-code System) in order to solve the above two problems. RETUSS can ensure traceability between Class diagram in UML and Java source code in real time.
-
Prototype of a Tool to Defect Specific Comments Reviewed
S. Tanoue, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2017) 2018.2
Language:English Publishing type:Research paper (international conference proceedings)
This paper has developed a prototype of a tool to detect specific comments. With the prototype, you can use regular expressions, describe patterns of detected strings in a configuration file, and then detect specific comments. The prototype was applied to projects with 5,000 LOC (Lines of Code) or more. As a result, the recall rate achieved 100% and the precision rate achieved 80%. Reducing improper comments and comments detected by the prototype which express tasks remaining in the source code can improve understandability of the source code.
-
Usuzaki S., Arikawa Y., Yamaba H., Aburada K., Kubota S., Park M., Okazaki N.
Journal of Information Processing 26 ( 0 ) 257 - 266 2018.1
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Journal of Information Processing
© 2018 Information Processing Society of Japan. Distributed Denial-of-Service (DDoS) attack detection systems are classified into a signature based approach and an anomaly based approach. However, such methods tend to suffer from low responsiveness. On the other hand, real-time burst detection which is used in data mining offers two advantages over traditional statistical methods. First, it can be used for real-time detection when an event is occurring, and second, it can work with less processing as information about events are compressed, even if a large number of events occur. Here, the authors add the function for attack detection in real-time burst detection technique, and propose a highly responsive DDoS attack detection technique. This paper performs experiments to evaluate its effectiveness, and discusses its detection accuracy and processing performance.
-
A study on user identification method using cross-correlation and SVM to realize an authentication system by s-EMG Reviewed
T. Kurogi, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
International Symposium on Artificial Life and Robotics 462 - 467 2018.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Automated cover-uncover test system using active LCD shutter glasses Reviewed
N. Uchida, K. Takatsuka, K. Hinokuma, K. Hirata, H.Yamaba, N.Okazak
International Symposium on Artificial Life and Robotics 698 - 702 2018.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Introduction of traffic characteristics to distinguish legitimate user traffic from DDoS attack traffic Reviewed
Y. Arikawa, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
International Symposium on Artificial Life and Robotics 484 - 489 2018.1
Language:English Publishing type:Research paper (international conference proceedings)