Papers - YAMABA Hisaaki
-
Aridome N., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 575 - 579 2025.2
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Proceedings of International Conference on Artificial Life and Robotics
As a method for detecting layout defects in web pages, image-based visual regression testing is proposed. However, it has the problem that it takes time to detect unintended layout differences that are not based on HTML code changes. This paper proposes a prototype of MixVRT which is a tool to detect layout defects in web pages. It is a visual regression testing tool that highlights layout defects in web pages. From evaluation experiments, the time find to layout defects can be reduced.
-
Kimura Y., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 580 - 584 2025.2
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The digitalization of forms is being promoted. One of the effective ways to manage contents filled in fields is using electronic forms. Several tools have been developed to generate them automatically. However, when you use a paper form, the layout of the original form may change, and it takes time to generate electronic one because it is necessary to place fill-in fields on an electronic form by dragging with a mouse. This paper proposes a method for automatic fill-in fields detection and labels assignment to reduce time required to place fill-in fields without changing the layout. The proposed method can reduce the time to place fill-in fields.
-
A study of Collaborative malware detection using item response theory Reviewed
Takuro Inada, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. 2025 Int'l Symp. on Artificial Life and Robotics (ISAROB 2025) 1070 - 1073 2025.1
Publishing type:Research paper (international conference proceedings)
-
Introducing Generative AI into Unrealistic Image CAPTCHA for Effective Image Generation Reviewed
Kana Saiki, Hisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
Proc. 2025 Int'l Symp. on Artificial Life and Robotics (ISAROB 2025) 1085 - 1090 2025.1
Authorship:Corresponding author Publishing type:Research paper (international conference proceedings)
-
Introduction of Feature Points in Images for Improvement of Finding Letters Type CAPTCHA Based on Neural Style Transfer Reviewed
Ramu Kiura, Hisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
Proc. 2025 Int'l Symp. on Artificial Life and Robotics (ISAROB 2025) 1079 - 1084 2025.1
Authorship:Corresponding author Publishing type:Research paper (international conference proceedings)
-
Investigation of Detection Methods for Trojaned DNNs under Specific Conditions Reviewed
Shunya Izaki, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. 2025 Int'l Symp. on Artificial Life and Robotics (ISAROB 2025) 1074 - 1078 2025.1
Publishing type:Research paper (international conference proceedings)
-
ASLA: Automatic Segmentation and Labeling by Deep Learning for Document Pictures Reviewed
Kakinoki Kanta, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 10 ( 4 ) 362 - 367 2024.9
Language:English Publishing type:Research paper (scientific journal) Publisher:ALife Robotics Corporation Ltd.
In this paper, we propose ASLA, a segmentation and label generation system for document pictures. ASLA reduces the duration needed for separating document pictures into areas and label generation. By using the application example, we have verified that ASLA operates properly. We have evaluated the usefulness of ASLA in regard to time and accuracy. We have assessed the efficacy of the rule-based area correction method. As a result, we have verified that ASLA is useful.
-
Onaga Haruki, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 10 ( 4 ) 336 - 341 2024.9
Language:English Publishing type:Research paper (scientific journal) Publisher:ALife Robotics Corporation Ltd.
It is difficult for mobile application developers to understand the structure of large and complex mobile applications. To support iOS application development, we proposed SwiftDiagram: a visualization of the static structure of Swift source code, and demonstrated its usefulness. To further support them, this paper has implemented RAGESS(Real-time Automatic Generation of SwiftDiagram System), which is a software visualization tool. RAGESS performs static analysis on Swift source code and automatically generates the corresponding SwiftDiagram whenever the target project build succeeds.
-
An Attempt to Solve Fill in the Missing Letters CAPTCHA Using Generative AI Reviewed
Yamaba H., Usuzaki S., Aburada K., Mukunoki M., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1322 LNEE 385 - 395 2024.8
Authorship:Lead author, Corresponding author Language:English Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes in Electrical Engineering
This paper reports an attempt to solve the fill in the missing letters type CAPTCHA using generative AI. Many websites have adopted CAPTCHA to prevent bots and other automated programs from engaging in malicious activities such as posting comment spam. Text-based CAPTCHA is the most common and earliest form of CAPTCHA. However, as optical character recognition (OCR) technology has improved, the intensity of distortions applied to a CAPTCHA to keep it unrecognizable by OCR has also increased. This has reached a point where humans are having difficulty recognizing CAPTCHA text. The CAPTCHA proposed in the previous study asks users to spell a word by filling in some blanks. Since the number of letters displayed is minimal, it is challenging to identify the correct word. However, one or more images that can serve as hints to help users guess the answer word are also provided. It is expected that the ability to guess can distinguish between humans and computers. However, it is conceivable that generative AI, which has been advancing in recent years, can substitute for this ability. A series of experiments was carried out to evaluated the performance of the generative AI’s ability to solve the proposed CAPTCHA. First, we examined whether a well-known image recognition system could accurately identify the images used in the CAPTCHA problems. Next, we used the recognition results to have the generative AI solve the CAPTCHA problems and determined the accuracy rate. Additionally, we evaluated the performance of the generative AI itself by solving the problems using the correct identification of each image. From the experimental results, it was found that the CAPTCHA is relatively robust against attack techniques using generative AI.
-
Evacuation Support System for Tsunami Disasters that Considers Shelter Congestion Reviewed
Nishi H., Nabeyama K., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1322 LNEE 51 - 62 2024.8
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes in Electrical Engineering
When a tsunami occurs, an evacuation support system capable of providing information on evacuation routes and shelter locations would enable evacuations to be conducted more swiftly and safely. In previous research, a proposal was made for an evacuation support system using low-power, long-distance communication. However, a challenge arose when shelter locations reached full capacity, requiring information to be shared, which in turn necessitated redirection of evacuees to alternative shelters. Therefore, in this study, a method for sharing shelter congestion information at an earlier stage was developed. The method of sharing based on the remaining capacity of shelters increased evacuation completion by up to 29 evacuees in an evacuee population of 1000.
-
Usability improvement in color constancy CAPTCHA Reviewed
Usuzaki Shotaro, Yihan Wang, Aburada Kentaro, Yamaba Hisaaki, Takatsuka Kayoko, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
IEICE Communications Express 13 ( 8 ) 331 - 334 2024.8
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHAs have traditionally been used to deter bots, but ensuring protection against machine learning attacks has become difficult. To tackle this problem, we proposed a CAPTCHA based on color constancy, a human cognitive ability that is difficult for machines to reproduce. Although this method achieved high attack resistance while maintaining usability compared to existing CAPTCHAs, the response time increased due to the color selection operation. To address this, we changed the task to a click-type format while keeping the original concept. Our experimental results show that our method matches the response times of existing CAPTCHAs without compromising attack resistance.
-
Okazaki N., Usuzaki S., Waki T., Kawagoe H., Park M., Yamaba H., Aburada K.
Future Internet 16 ( 8 ) 2024.8
Publishing type:Research paper (scientific journal) Publisher:Future Internet
We propose a detection system incorporating a weighted voting mechanism that reflects the vote’s reliability based on the accuracy of each detector’s examination, which overcomes the problem of cooperative detection. Collaborative malware detection is an effective strategy against zero-day attacks compared to one using only a single detector because the strategy might pick up attacks that a single detector overlooked. However, cooperative detection is still ineffective if most anti-virus engines lack sufficient intelligence to detect zero-day malware. Most collaborative methods rely on majority voting, which prioritizes the quantity of votes rather than the quality of those votes. Therefore, our study investigated the zero-day malware detection accuracy of the collaborative system that optimally rates their weight of votes based on their malware categories of expertise of each anti-virus engine. We implemented the prototype system with the VirusTotal API and evaluated the system using real malware registered in MalwareBazaar. To evaluate the effectiveness of zero-day malware detection, we measured recall using the inspection results on the same day the malware was registered in the MalwareBazaar repository. Through experiments, we confirmed that the proposed system can suppress the false negatives of uniformly weighted voting and improve detection accuracy against new types of malware.
DOI: 10.3390/fi16080259
-
Prototype of RAGESS Which Is a Tool for Automatically Generating SwiftDiagram to Support iOS App Development Reviewed
H. Onaga, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proc. 2024 Int'l Conf. on Artificial Life and Robotics (ICAROB 2024) 252 - 256 2024.2
Publishing type:Research paper (international conference proceedings)
-
Extension to Support Types and Operation/Function Definitions in BWDM to Generate Test Case Tool from the VDM++ Specification Reviewed
S. Takakura, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proc. 2024 Int'l Conf. on Artificial Life and Robotics (ICAROB 2024) 257 - 261 2024.2
Publishing type:Research paper (international conference proceedings)
-
Proposal of ASLA Which Is a Segmentation and Labeling Tool for Document Images Based on Deep Learning Reviewed
K. Kakinoki, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proc. 2024 Int'l Conf. on Artificial Life and Robotics (ICAROB 2024) 262 - 266 2024.2
Publishing type:Research paper (international conference proceedings)
-
On an improvement of hand gesture recognition for realizing an s-EMG based user authentication using finger spelling Reviewed
Hisaaki Yamaba, Naoki Sawagashira, Kentaro Aburada, Tetsuro Katayama, Naonobu Okazaki
Proc. 2024 Int'l Symp. on Artificial Life and Robotics (ISAROB 2024) 933 - 938 2024.1
Authorship:Lead author, Corresponding author Publishing type:Research paper (international conference proceedings)
-
Investigation of malware classification based on image representation Reviewed
Hyoga Kawagoe, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. 2024 Int'l Symp. on Artificial Life and Robotics (ISAROB 2024) 929 - 932 2024.1
Publishing type:Research paper (international conference proceedings)
-
Proposal of a DDoS Attack Detection Method Using the Communication Interval Reviewed
Iwasa K., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1114 LNEE 165 - 174 2024
Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes in Electrical Engineering
As the scale of Distributed Denial of Service (DDoS) attacks has been escalating in recent years, the need for real-time detection of attacks has increased. Existing intrusion detection systems (IDSs) perform detection with a fixed window size (assumed to be in hours). In previous research, attack detection was performed by preparing windows of multiple sizes, selecting the appropriate window based on the state of the data, and using features learned in advance for that window size. Although this method yielded a high DDoS attack detection rate of 98.30%, it exhibited a considerable false-positive rate of 7.37%. The proposed method measures the communication intervals of identical packets within the window, identified as attack-related in the previous survey, and classifies those packets with an average communication interval below a set threshold as attacks. The experiment resulted in a 50.2% decrease in the false-positive rate.
-
Proposal of Fill in the Missing Letters CAPTCHA Using Associations from Images Reviewed
Yamaba H., Mustaza M.N.F.B., Usuzaki S., Aburada K., Mukunoki M., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1114 LNEE 206 - 217 2024
Authorship:Lead author, Corresponding author Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes in Electrical Engineering
This paper proposes a new fill in the missing letters type CAPTCHA using associations from images. Many web sites have adopted CAPTCHA to prevent bots and other automated programs from malicious activities such as posting comment spam. Text-based CAPTCHA is the most common and earliest CAPTCHA. But as optical character recognition (OCR) technology has improved, the intensity of distortions that must be applied to a CAPTCHA for it to remain unrecognizable by OCR has increased. This has reached a point where humans are having difficulty recognizing CAPTCHA text. The idea of the proposed CAPTCHA asks users to spell a word by filling some blanks. Since the number of shown letters are few, it is difficult to answer the correct word. But one or more images that can be used as hints to guess what is the answer word are also shown to the users. A series of experiments was carried out to evaluated the performance of the proposed CAPTCHA. First, a computer program was developed with various software languages for the usability evaluation. The system was used for the experiments to find the suitable parameters of the CAPTCHA such as numbers of letters that will be disclosed, position of disclosed letters. Next, security evaluation experiments were carried out using the system under the obtained parameters. The results of the experiments showed that the performance and limitation of the proposed CAPTCHA.
-
Study of an Image-Based CAPTCHA that is Resistant to Attacks Using Image Recognition Systems Reviewed
Nishikawa S., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Okazaki N.
Lecture Notes in Electrical Engineering 1114 LNEE 175 - 184 2024
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes in Electrical Engineering
In today’s digital age, image-based CAPTCHAs are increasingly vulnerable to attacks using annotation services, which tag images and classify images according to their contents, or reverse image search services. To prevent such attacks, an image-based CAPTCHA was proposed that takes advantage of the fact that humans can correctly recognize images containing many discontinuous points, while existing image recognition systems misrecognize them. However, this CAPTCHA proved susceptible to attacks using noise reduction filters. The objective of the present study is to create a CAPTCHA using images that are resistant to such filters. Images used in the new CAPTCHA were realized by increasing the proportion of lines forming discontinuous surfaces in images. Experimental results demonstrated a human recognition rate of 95.8%, with the image recognition systems successfully identifying only one image overall. Moreover, when a noise reduction filter was applied, the recognition rate was lower than those reported in previous studies.
-
Development of keypads which use colors or shapes to prevent shoulder surfing Reviewed
Masuzawa R., Aburada K., Yamaba H., Katayama T., Okazaki N.
Artificial Life and Robotics 28 ( 4 ) 710 - 717 2023.11
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
In conventional smart phones and ATMs, a four-digit passcode is entered into a keypad, and the user confirms whether the passcode matches the keypad. However, there is a risk that a third party can easily steal the password by watching the code entry or analyzing the position of fingerprints left on the keypad. There are other solutions, such as biometric authentication or the use of special displays, but both of them are costly and difficult to implement. In this study, we propose a keypad that does not leave fingerprints on the screen, is low cost, and can be used to input passcodes without worry, even if someone is standing next to it. The proposed keypad uses cursors that are moved by directional keys to select numbers, making fingerprint analysis difficult. Because attackers do not know the color that the user has selected, they cannot know which cursor the user is moving. To verify the safety and convenience of this system, we conducted experiments on subjects in their 20 s and 50 s. The results showed that the average difference in authentication time from the conventional method was about 5 s, and the method was generally convenient. We conclude that our keypad system is secure, because no peeping attacks on a subject were successful in guessing the subject’s passcode.
-
Tsunami evacuation simulation considering road width in Aoshima district Reviewed
Nabeyama K., Usuzaki S., Aburada K., Yamaba H., Katayama T., Okazaki N.
Artificial Life and Robotics 28 ( 4 ) 779 - 788 2023.11
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
Japan is one of the countries in the world where natural disasters occur most frequently. Typhoons, earthquakes, tsunamis, volcanic eruptions, and many other natural disasters occur in Japan every year, and the risks are immeasurable. Japan is especially prone to earthquakes because of its location on the North American Plate, Eurasian Plate, Pacific Plate, and Philippine Sea Plate. Preparation for a Nankai Trough earthquake is one of the most important issues. A Nankai trough earthquake is predicted to occur with a probability of 70–80% within 30 years. Accordingly, a tsunami of more than 10 ms is expected to hit a wide area along the Pacific coast from the Kanto region to the Kyushu region, and the impact is expected to be significant. When a tsunami warning is issued, an evacuation support system that provides information on evacuation sites and routes enables faster and safer evacuation actions. In a previous study conducted in our laboratory, we proposed an evacuation support system using Low-Power Wide-Area communications and conducted a simulation to find ways to improve the evacuation support system. However, the simulation was insufficient in that it did not consider delays in evacuation completion time due to road congestion caused by limited road width, which can be expected in an actual disaster. In our current research, as an improvement to make the simulation more realistic for further developing our evacuation support system, we propose a simulation that considers road width. We examined how adoption of this simulation methodology would affect the simulation results by comparing simulations that did and did not consider road width. As a result, the proposed method showed a lower percentage of completed evacuations than the previous simulation, especially for children and the elderly. The reason for this result is that when evacuations begin simultaneously, crowding occurs as people all rush to evacuation centers. This congestion on the roads near evacuation centers prevents people from completing their evacuations. Such a phenomenon is expected to occur not only in simulations but also on actual roads. For this reason, our proposed simulation method that considers road width is a more realistic simulation. Since evacuations by car in the event of a disaster also occur, a future issue is to simulate car congestion as well. Furthermore, simulating what would happen if a disaster made a road impassable is also important.
-
Tende I.G., Aburada K., Yamaba H., Katayama T., Okazaki N.
Agriculture (Switzerland) 13 ( 3 ) 2023.3
Language:English Publishing type:Research paper (scientific journal) Publisher:Agriculture (Switzerland)
Prediction of crop yields is very helpful in ensuring food security, planning harvest management (storage, transport, and labor), and performing market planning. However, in Tanzania, where a majority of the population depends on crop farming as a primary economic activity, the digital tools for predicting crop yields are not yet available, especially at the grass-roots level. In this study, we developed and evaluated Maize Yield Prediction System (MYPS) that uses a short message service (SMS) and the Web to allow rural farmers (via SMS on mobile phones) and government officials (via Web browsers) to predict district-level end-of-season maize yields in Tanzania. The system uses LSTM (Long Short-Term Memory) deep learning models to forecast district-level season-end maize yields from remote sensing data (NDVI on the Terra MODIS satellite) and climate data [maximum temperature, minimum temperature, soil moisture, and precipitation (rainfall)]. The key findings reveal that our unimodal and bimodal deep learning models are very effective in predicting crop yields, achieving mean absolute percentage error (MAPE) scores of 3.656% and 6.648%, respectively, on test (unseen) data. This system will help rural farmers and the government in Tanzania make critical decisions to prevent hunger and plan better harvesting and marketing of crops.
-
Saputra M.C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 352 - 356 2023.2
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The outbreak of the COVID-19 pandemic changed the model of the learning process. Online learning became one of the best solutions for many educational institutions, including the University, especially the Faculty of Computer Science, Brawijaya University. The continuance intention factor for using an online learning management system is important to ensure learning sustainability. To understand students' continuance intention this study proposes self determination model as a research model to find the factors affecting students' continuance intention toward online learning management systems. The proposed model is useful for investigating continuance intention factors. The study finds that intrinsic regulation, external regulation, identified regulation, and introjected regulation significantly positive impact on continuance intention in learning management systems. Finally, this study provides suggestions for the Faculty to improve the continuance intention of the student in using an online learning management system.
-
Miyashita T., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 347 - 351 2023.2
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Proceedings of International Conference on Artificial Life and Robotics
TDD is a development methodology that brings us closer to better implementation and testing by repeating a series of steps: test design, implementation that satisfies the tests, and refactoring. This paper proposes a framework aimed at supporting the implementation steps in TDD. The proposed framework generates source code that passes tests while retaining refactoring by the developer. The prototyped framework reduced the time required for the implementation process by 94.22% and the generation time by 66.17% compared to manual work.
-
On an improvement of hand gesture recognition for realizing a user authentication system using s-EMG
Soichiro Ishibashi, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Naonobu Okazaki
Proc. of the 28th International Symposium on Artificial Life and Robotics 968 - 972 2023.1
Authorship:Corresponding author Language:English Publishing type:Research paper (international conference proceedings)
-
A study of improving the safety of defense system based on whitelist
Tsubasa Waki, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, and Naonobu Okazaki
Proc. of the 28th International Symposium on Artificial Life and Robotics 963 - 967 2023.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Investigation of evacuation simulation from Tsunami considering road width in Aosima
Keita Nabeyama, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, and Naonobu Okazaki
Proc. of the 28th International Symposium on Artificial Life and Robotics 953 - 958 2023.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Investigation of PIN authentication schemes resistant to video-based recording attacks
Ryo Masuzawa, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park and Naonobu Okazaki
Proc. of the 28th International Symposium on Artificial Life and Robotics 959 - 962 2023.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Analysis of Self Determination Factors for Continuance Intention on Online Learning Management System Reviewed
Saputra Mochamad Chandra, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu, Wicaksono Satrio Agung
Journal of Robotics, Networking and Artificial Life 10 ( 1 ) 91 - 95 2023
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
The COVID-19 pandemic outbreak transformed the paradigm of the educational process. Many educational institutions, including the University, mainly the Faculty of Computer Science, Brawijaya University, have experienced success with learning through the Internet. The continuance intention factor for using an online learning management system is important to ensure learning sustainability. This study investigates continuance intention factor by using self determination model as a research model. The objective of this study is to find the factor factors affecting students' continuance intention toward online learning management systems. The proposed model is useful for investigating continuance intention factors. The study finds that intrinsic regulation, external regulation, identified regulation, and introjected regulation significantly positive impact on continuance intention in learning management systems. Finally, this study provides suggestions for the Faculty to improve the continuance intention of the student in using an online learning management system.
-
Prototype of the Framework CATdd to Support Continuous Development in Test Driven Development Reviewed
Miyashita Takeaki, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 4 ( 1 ) 35 - 40 2023
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
TDD is a development methodology to improve software quality. In this study, we prototype the framework CATdd (Continuous Automated Test Driven Development), which supports continuous development with TDD. CATdd reduces the time of implementation step in TDD by generating new source code that passes tests using LLM. CATdd maintains consistency with other source code in the project by using existing source code and related source code to prompt. As a result of the evaluation experiments, the time for the implementation step in TDD was reduced by 94% for a simple task and by 56% for another more complex task. In conclusion, CATdd is useful to support continuous development.
-
Expansion of Application Scope and Addition of a Function for Operations into BWDM which is an Automatic Test Cases Generation Tool for VDM++ Specification Reviewed
Muto Takafumi, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 9 ( 3 ) 255 - 262 2022.12
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
The use of the formal specification description language VDM++ in software design can eliminate ambiguity in the specification. However, software testing after implementation is necessary even if the design uses VDM++, but manually generating test cases is labor-intensive and time-consuming. Therefore, our laboratory developed BWDM, which is an automatic test case generation tool for VDM++ specifications. However, BWDM is not very useful because it has three problems about its narrow scope of application. This paper solves the three problems and improves the usefulness of BWDM by expanding the scope of application of VDM++ definitions and adding a function to generate test cases for object states. In addition, we conducted a comparison experiment with manual test case generation and confirmed that BWDM can reduce work time.
-
Proposal of Gamma Which Is a Messaging Platform for Spatial Data Reviewed
Ueda Takahiro, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 9 ( 2 ) 136 - 142 2022.9
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
This paper proposes Gamma, which is a messaging platform for spatial data. Gamma uses distributed MQTT system for spatial data sharing, and this paper aims to improve the usefulness of distributed MQTT system. In the experiment, it has been found that Gamma can process more messages than a single MQTT broker. It is confirmed that Gamma achieves scalability by increasing the number of Gateways and distributed MQTT brokers. Furthermore, it is confirmed that the efficiency of the distributed MQTT system can be improved by setting the responsibility area of Gateways.
-
Detection of Blob and Feature Envy Smells in a Class Diagram using Class's Features Reviewed
Priyambadha Bayu, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Robotics, Networking and Artificial Life 9 ( 1 ) 43 - 48 2022.8
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
Measuring the quality of software design artifacts is difficult due to the limitation of information in the design phase. The class diagram is one of the design artifacts produced during the design phase. The syntactic and semantic information in the class is essential to consider in the measurement process. Smell detection uses class-related information to detect the smell as an indicator of a lack of quality. Several classifiers use all information related to the class to prove how informative it for the smell detection process. The smell types that are a concern in this research are Blob and Feature Envy. The experiment using three classifiers (j48, Multi-Layer Perceptron, and Naïve Bayes) confirms that Blob smell detection utilizes the information successfully. On the other hand, Feature Envy still needs more elaboration. The average true positive rate by the classifiers is about 80.67%.
-
Proposal of a Method to Generate Classes and Instance Variable Definitions in VDM++ Specification by Using Machine Learning Reviewed
Suga Kensuke, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 2 ( 4 ) 189 - 194 2022.3
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
Writing VDM++ specifications is difficult. The existing method can automatically generate only type and constant definitions in VDM++ specification from natural language specification by using machine learning. This paper proposes a method to generate classes and instance variable definitions in VDM++ specification from natural language specification to improve the usefulness of the existing method. From the evaluation experiment by using F- values, it has been confirmed that the proposed method can improve the usefulness of the existing method.
-
Proposal for a blockchain based agricultural input voucher system Reviewed
Tende I.G., Aburada K., Yamaba H., Katayama T., Okazaki N.
Artificial Life and Robotics 27 ( 3 ) 461 - 471 2022.1
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
Most of the small-scale farmers in Tanzania can’t afford to buy quality agricultural inputs (fertilizers and seeds), therefore the Tanzanian government issues paper-based subsidy vouchers to farmers for buying the inputs at half price. However, challenges like misuse of the vouchers by some government officials (stealing and favoritism in allocation) and lack of trust (difficulty of verifying vouchers’ authenticity) have resulted into low crop productivity for the farmers and loss of government funds. To address this, we have developed agricultural input voucher system which stores and allocates digital subsidy vouchers to farmers in the Hyperledger Fabric blockchain network whose features like hashing and digital signature prevent misuse and ensure trust of the vouchers. Farmers access the digital vouchers through Short Message Service (SMS) in their mobile phones. Evaluation reveals that, the developed system is effective and meets performance demands of Tanzanian farmers. Also, Raft has better performance than Kafka consensus protocol.
-
Proposal of Gamma Which Is a Spatial Data Sharing Distributed MQTT System
Ueda Takahiro, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
人工生命とロボットに関する国際会議予稿集 27 188 - 192 2022.1
Language:English Publishing type:Research paper (international conference proceedings) Publisher:株式会社ALife Robotics
This paper proposes Gamma, which is a new distributed MQTT system, to improve the usefulness of distributed MQTT systems for sharing spatial data. In the experiment, it has been found that Gamma can process more messages than a single MQTT broker. It is confirmed that Gamma achieves scalability by increasing the number of Gateways and distributed MQTT brokers. Furthermore, it is confirmed that the efficiency of the distributed MQTT system can be improved by setting the responsibility area of Gateways.
-
Proposal of a Method to Generate Classes and Instance Variable Definitions in the VDM++ Specification from Natural Language Specification
Suga Kensuke, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
人工生命とロボットに関する国際会議予稿集 27 178 - 182 2022.1
Language:English Publishing type:Research paper (international conference proceedings) Publisher:株式会社ALife Robotics
Writing VDM++ specifications is difficult. The existing method can automatically generate type and constant definitions in VDM++ specification from natural language specification using machine learning. This paper proposes a method to generate classes and instance variable definitions in the VDM++ specification from natural language specification to improve the usefulness of the existing method. From the evaluation experiment by using F-values, it has been confirmed that the proposed method can improve the usefulness of the existing method.
-
Expansion of Application Scope and Addition of a Function for Operations into BWDM to Generate Test Cases from VDM++ Specification
Muto Takafumi, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
人工生命とロボットに関する国際会議予稿集 27 183 - 187 2022.1
Language:English Publishing type:Research paper (international conference proceedings) Publisher:株式会社ALife Robotics
Generating test cases from the VDM++ specification to eliminate ambiguity in the specification is labor-intensive and time-consuming. Therefore, our laboratory developed BWDM, which is an automatic test case generation tool for VDM++ specifications. However, BWDM is not very useful because it has three problems about its narrow scope of application. This paper extends BWDM to solve three problems. In addition, we conducted a comparison experiment with manual test case generation and confirmed a time saving of about 17 minutes.
-
Development of an anti-peeping passcode keypad using color/shape cursors
Ryo Masuzawa, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
Proc. of the 27th International Symposium on Artificial Life and Robotics 2022.1
Language:English Publishing type:Research paper (international conference proceedings)
-
An Attempt at Data Augmentation for Realizing User Authentication Using s-EMG Signals
Soichiro Ishibashi, Yuya Yamamoto, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Naonobu Okazaki
Proc. of the 27th International Symposium on Artificial Life and Robotics 2022.1
Authorship:Corresponding author Language:English Publishing type:Research paper (international conference proceedings)
-
Muto T., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 183 - 187 2022
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
Generating test cases from the VDM++ specification to eliminate ambiguity in the specification is labor-intensive and time-consuming. Therefore, our laboratory developed BWDM, which is an automatic test case generation tool for VDM++ specifications. However, BWDM is not very useful because it has three problems about its narrow scope of application. This paper extends BWDM to solve three problems. In addition, we conducted a comparison experiment with manual test case generation and confirmed a time saving of about 17 minutes.
-
Proposal and Evaluation of the Interactive Video CAPTCHA for Resistant to both Relay Attack and Automated Attack Reviewed
Kentaro Aburada, Shotaro Usuzaki, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
62 ( 12 ) 1864 - 1878 2021.12
Language:Japanese Publishing type:Research paper (scientific journal)
-
Development of a system to detect eye position abnormality based on eye-tracking Reviewed
Uchida, Noriyukia, Takatuka, Kayoko, Yamaba, Hisaaki, Mukunoki, Masayukib, Okazaki, Naonobub
Journal of Robotics, Networking and Artificial Life 8 ( 3 ) 205 - 210 2021.12
Language:English Publishing type:Research paper (scientific journal) Publisher:Journal of Robotics, Networking and Artificial Life
Test suite reusability measurement is important to obtain the value of reusability as the degree of effectiveness of reused test suite. The measurement in this experiment considers not only the frequency of the successful test suite to examine different objects but also the code coverage as the criteria of a good test suite. The combination of the frequency and code coverage in the measurement reports the current condition of test suite reusability. The research confirms the test suite reusability measurement provides useful information to know the degree of effectiveness of reused test suite, especially in regression testing and automated testing.
-
Proposal for a crop protection information system for rural farmers in Tanzania Reviewed
Tende I.G., Aburada K., Yamaba H., Katayama T., Okazaki N.
Agronomy 11 ( 12 ) 2021.12
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Agronomy
Crop protection information, such as how to control emergent and outbreak crop diseases and pests, as well as the latest research, regulations, and quality control measures for pesticides and fertilizers, is important to farmers. Rural smallholder farmers in Tanzania have traditionally relied on government agricultural officers who visit them in their villages to provide this crop protection information. However, these officers are few and cannot reach all the farmers on time. This means that farmers fail to make critical farming decisions on time, which can lead to low crop productivity. In this study, we aim to provide farmers with reliable and instant crop protection information by developing a system based on the Short Message Service (SMS) and the Web. This system automatically replies to farmers’ requests for the latest crop protection information in the Swahili language through SMS on a mobile phone or a Web system. The findings reveal that our proposed system can provide farmers with crop protection information at lower cost (500 times cheaper) than the existing Tigo Kilimo system. Furthermore, our proposed system’s deep learning model is effective in understanding and processing Swahili natural language SMS queries for crop protection information with an accuracy of 96.43%. This crop protection information will help farmers make better critical farming decisions on time and improve crop productivity.
-
Performance Evaluation of Blockchain Based Agricultural Input Voucher System
Tende, Isakwisa Gaddy; Aburada, Kentaro; Yamaba, Hisaaki; Katayama, Tetsuro; Okazaki, Naonobu
10th IEEE Global Conference on Consumer Electronics, GCCE 2021 637 - 638 2021.10
Publishing type:Research paper (scientific journal)
-
Study on an Evacuation Support System for Tsunami Disasters Using Low Power Wide Area Network
Karin Honda, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 199 - 211 2021.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Improvements in a Dynamic CAPTCHA for Mobile Devices
Karin HONDA, Akane SHIIYA, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 187 - 191 2021.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of Agricultural Work Record Management System Using Voice Input
Maria TAKEGUCHI, Kentaro ABURADA, Hisaaki YAMABA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 175 - 186 2021.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Medical Data Management System Using Blockchain and Proxy Re-Encryption
Ryoma IKEDA, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 161 - 174 2021.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Data Expansion Using GAN to Improve Malware Classification by CNN
Kaisei KAWABATA, Kentaro ABURADA, Hisaaki YAMABA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 155 - 159 2021.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
On a Creation of a Barrier-free Map Using Accelerometers on Smartphones
Maria TAKEGUCHI, Daisuke HOSHIZAKI, Kentaro ABURADA, Hisaaki YAMABA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 149 - 153 2021.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Infectious Disease Spreading Risk —Usage of Infection Data of Covid-19—
Kentaro KOIDA, Yuya KOZAKAI, Kayoko TAKATSUKA, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 143 - 147 2021.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Study on Quantification of Quality Characteristics of Project Schedules
Ryoma IKEDA, Kazuki IMAMURA, Kayoko TAKATSUKA, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 137 - 141 2021.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Parameter Optimization of OCSVM by GridSearchCV for Improving IoT Malware Detection Accuracy
Hiroki MURANAKA, Shuto GOTO, Kentaro ABURADA, Hisaaki YAMABA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 125 - 129 2021.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Data Expansion Using Adversarial Examples to Improve the Accuracy of Intrusion Detection Systems
Kaisei KAWABATA, Kazuki KANEMARU, Kentaro ABURADA, Hisaaki YAMABA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 131 - 135 2021.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Proposal of CAPTCHA Using the Combination of Latin and Jawi Script
Hisaaki YAMABA, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Kentaro ABURADA, Naonobu OKAZAKI
宮崎大学工学部紀要 ( 50 ) 119 - 123 2021.9
Authorship:Lead author Language:English Publishing type:Research paper (bulletin of university, research institution)
-
On an Attempt at Application of Deep Learning to a User Authentication Method Using s-EMG
Hisaaki YAMABA, Kenya SHIRAISHI, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 50 ) 193 - 197 2021.9
Authorship:Lead author Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language Reviewed
Yamaba, Hisaaki, Sohaimi, Ahmad Saiful Aqmal Bin Ahmad, Usuzaki, Shotaro, Aburada, Kentaro, Mukunoki, Masayukia, Park, Mirangb, Okazaki, Naonobua
16th International Workshop on Security, IWSEC 2021 119 - 133 2021.9
Authorship:Lead author, Corresponding author Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal and evaluation for color constancy CAPTCHA Reviewed
Usuzaki S., Aburada K., Yamaba H., Katayama T., Mukunoki M., Park M., Okazaki N.
Artificial Life and Robotics 26 ( 3 ) 291 - 296 2021.8
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
CAPTCHAs are technologies that distinguish humans and bot to prevent illegal access. Unfortunately, current CAPTCHAs, even the latest Google reCAPTCHA, have already broken with high accuracy. Although the devices, including emphasizing the distortion of the text and adding noise to the image, improve the machine resistance, they may decrease the accessibility of the web page. The purpose of this study is to propose a new CAPTCHA that can decrease the machine resistance while keeping usability. To achieve this purpose, we focused on color constancy. Color constancy is a human’s characteristic that enables humans to recognize the original color of the object by ignoring the effects of illumination light. Color constancy has not been fully reproduced by the program yet. We proposed color constancy CAPTCHA that the user is required to answer an original color of the object in a specified area on the CAPTCHA image with a color filter. In this paper, we created a prototype of CAPTCHA, applied two kinds of color filters, and then evaluated each case for the human success rate, machine success rate, and usability.
-
Measuring test suite reusability based on the usage frequency and coverage of reused test cases Reviewed
Saputra M.C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 8 ( 1 ) 24 - 28 2021.6
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Journal of Robotics, Networking and Artificial Life
Test suite reusability measurement is important to obtain the value of reusability as the degree of effectiveness of reused test suite. The measurement in this experiment considers not only the frequency of the successful test suite to examine different objects but also the code coverage as the criteria of a good test suite. The combination of the frequency and code coverage in the measurement reports the current condition of test suite reusability. The research confirms the test suite reusability measurement provides useful information to know the degree of effectiveness of reused test suite, especially in regression testing and automated testing.
-
Measuring redundancy score for test suite evaluation by using test cases matching approach Reviewed
Saputra M.C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 8 ( 1 ) 1 - 5 2021.6
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Journal of Robotics, Networking and Artificial Life
Evaluating a test suite that contains redundant test cases is necessary to reduce the cost of testing. The redundant test cases exist when both of the two test cases are executed the same lines of code. This research evaluates the test suite by identifying redundant test cases. Exact match approach is used to investigate the redundant test cases in the test suite. The redundancy score is defined by redundancy formula which is calculated by dividing the number of redundant test cases by numbers of test cases in a test suite. The experiment uses two Java programs. The redundancy scores of the two test suites from each program are 0.37 and 0.67, respectively. It means 37% and 67% redundant test cases are included in the test suites. The redundancy score provides useful information to improve the efficiency of software testing, especially in testing other programs by reusing the same test suite such as regression testing and automated testing.
-
Development and Evaluation of Swahili Text Based CAPTCHA Reviewed
Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech 2021) 297 - 301 2021.3
Language:English Publishing type:Research paper (international conference proceedings)
-
Utilizing the similarity meaning of label in class cohesion calculation Reviewed
Priyambadha B., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 7 ( 4 ) 270 - 274 2021.3
Language:English Publishing type:Research paper (scientific journal) Publisher:Journal of Robotics, Networking and Artificial Life
The cohesion is one of the design quality indicators in software engineering. The measurement of the value of cohesion is done by looking at the correlation between attributes and methods that are in a class. In Direct Distance Design Class Cohesion (D C ) metrics, attributes, and methods are assumed to have a good correlation if they have a similar type. But, the similarity of type parameters and attributes do not always indicate that these attributes are managed (correlated) in the method. This study is trying to gain information that can enhance the degree of certainty of a correlation between the methods and attributes. Relatedness between them has been seen from closeness the meaning of the name tag attribute, method, and parameters. The experimental results declared an increase in the value of cohesion produced in line with the similarity of meaning. 3 2
-
Test Suite Reusability Measurement Based on Uses Frequently and Coverage of Reused Test Cases
Chandra Saputra Mochamad, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
人工生命とロボットに関する国際会議予稿集 26 344 - 347 2021.1
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社ALife Robotics
Reusability of a test suite is one of important factors to decrease the cost in software testing. This research defines and measures the test suite reusability score expressed with the degree of reusability of the test suite. It is calculated by considering both frequency and code coverage of successful reused test cases in the test suite. Test suite reusability measurement provides useful information to improve the efficiency of software testing, especially in regression testing and automated testing.
-
Improvement of RETUSS to Ensure Traceability between Sequence Diagram in UML and Java Source Code in Real Time
Kaoru Arima, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2021 Int’l Conf. on Artificial Life and Robotics (ICAROB 2021) 352 - 355 2021.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Method for detecting eye misalignment based on movement near the center of the pupil
Noriyuki Uchida, Kayoko Takatuka, Hisaaki Yamaba, Masayuki Mukunoki, Naonobu Okazaki
Proc. 2021 Int’l Conf. on Artificial Life and Robotics (ICAROB 2021) 165 - 169 2021.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Test Suite Reusability Measurement Based on Frequency and Coverage of Reused Test Cases
Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2021 Int’l Conf. on Artificial Life and Robotics (ICAROB 2021) 344 - 347 2021.1
Language:English Publishing type:Research paper (international conference proceedings)
-
The Seven Information Features of Class for Blob and Feature Envy Smell Detection in a Class Diagram
Bayu Priyambadha, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2021 Int’l Conf. on Artificial Life and Robotics (ICAROB 2021) 348 - 351 2021.1
Language:English Publishing type:Research paper (international conference proceedings)
-
An attempt at an introduction of deep learning for a user authentication system using s-EMG
Hisaaki Yamaba, Kenya Shiraishi, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. of the 26th International Symposium on Artificial Life and Robotics 2021.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Blockchain-based vote-type unknown malware detection method using a characteristic of anti-virus vendors’ voting
Hiroki Muranaka, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proc. of the 26th International Symposium on Artificial Life and Robotics 2021.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Development and evaluation of blockchain based agricultural input voucher system
Isakwisa Gaddy Tende, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Naonobu Okazaki
Proc. of the 26th International Symposium on Artificial Life and Robotics 2021.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Test suite reusability measurement based on uses frequently and coverage of reused test cases
Saputra M.C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 2021 344 - 347 2021
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
Reusability of a test suite is one of important factors to decrease the cost in software testing. This research defines and measures the test suite reusability score expressed with the degree of reusability of the test suite. It is calculated by considering both frequency and code coverage of successful reused test cases in the test suite. Test suite reusability measurement provides useful information to improve the efficiency of software testing, especially in regression testing and automated testing.
-
Performance Evaluation of Blockchain Based Agricultural Input Voucher System
Tende I.G., Aburada K., Yamaba H., Katayama T., Okazaki N.
2021 IEEE 10th Global Conference on Consumer Electronics, GCCE 2021 637 - 638 2021
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:2021 IEEE 10th Global Conference on Consumer Electronics, GCCE 2021
Large portion of rural small-scale farmers in Tanzania can't afford to buy quality agricultural inputs (fertilizers and seeds), therefore the government of Tanzania provides these farmers with paper-based subsidy vouchers which allow them to buy the agricultural inputs at only half price. However, challenges like misuse of the vouchers by some government officials (stealing and favoritism in vouchers' allocation) and lack of trust (difficulty of verifying vouchers' authenticity) have resulted into low crop productivity for the farmers and loss of government funds. In our previous work, we developed agricultural input voucher system which stores and allocates digital subsidy vouchers to farmers in the Hyperledger Fabric blockchain network and we evaluated its performance based on transaction throughput and latency metrics which are important to farmers, who access the system through Short Message Service (SMS) in their mobile phones. The blockchain network's features such as hashing and digital signature prevent misuse and ensure trust of the digital vouchers. In this paper, we evaluate performance of the developed blockchain network based on resources (CPU and memory) consumption metrics which are important in planning resources during system deployment. The evaluation findings reveal that, Raft consensus protocol consumes resources more efficiently than Kafka consensus protocol.
-
Development of a system to detect eye position abnormality based on eye-tracking
Uchida N., Takatuka K., Yamaba H., Mukunoki M., Okazaki N.
Journal of Robotics, Networking and Artificial Life 8 ( 3 ) 205 - 210 2021
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Journal of Robotics, Networking and Artificial Life
In previous research, we developed a method to automate the conventional evaluation of eye misalignment (cover test) and distinguish misaligned eyes from their movements. However, this method had the problem that vertical eye movements were affected by the eyelids and eyelashes, and could not be completely detected. To solve this problem, we have developed another method to recognize abnormalities by observing only the movement near the center of the pupil.
-
Identification of Redundant Test Cases by Using Similarity Measurement Method for Test Suite Evaluation Reviewed
Saputra Mochamad Chandra, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 1 ( 4 ) 187 - 192 2021
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
Evaluating the test suite that contains redundant test cases is necessary to ensure the efficiency of the testing and reducing the cost of testing. The principle of redundant test cases on this research is any test cases on a similar path executed with a similar high value of normalized Euclidean distance. The first, the similarity calculated between the test cases and path coverage uses Euclidean distance. The value of the Euclidean distance on the test case with the lowest value of distance indicating highly similar and possibly executing similar lines of code. The normalized Euclidean distance is using to normalize the value from Euclidean distance result. The experiment uses two java programs. Each redundancy score is 0.37 and 0.67, respectively. It means 37% and 67% of the test cases should be avoided because there are inefficiency test cases on the test suite. The research confirms redundant test cases can be identified by Euclidean distance and normalized Euclidean distance to evaluate the test suite.
-
Identification of Redundant Test Cases by Using Similarity Measurement Method for Test Suite Evaluation
Saputra Mochamad Chandra, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 1 ( 4 ) 187 - 192 2021
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
Evaluating the test suite that contains redundant test cases is necessary to ensure the efficiency of the testing and reducing the cost of testing. The principle of redundant test cases on this research is any test cases on a similar path executed with a similar high value of normalized Euclidean distance. The first, the similarity calculated between the test cases and path coverage uses Euclidean distance. The value of the Euclidean distance on the test case with the lowest value of distance indicating highly similar and possibly executing similar lines of code. The normalized Euclidean distance is using to normalize the value from Euclidean distance result. The experiment uses two java programs. Each redundancy score is 0.37 and 0.67, respectively. It means 37% and 67% of the test cases should be avoided because there are inefficiency test cases on the test suite. The research confirms redundant test cases can be identified by Euclidean distance and normalized Euclidean distance to evaluate the test suite.
-
Extension of the Function to Ensure Real-time Traceability between UML Sequence Diagram and Java Source Code on RETUSS
Arima Kaoru, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 2 ( 1 ) 37 - 41 2021
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
Ensuring traceability of software deliverables is one of the methods to ensure software quality. RETUSS (Real-time Ensure Traceability between UML and Source-code System) is a tool that saves labor and time, and eliminates mistakes by human handling in ensuring traceability between UML and source code. However, RETUSS is not useful due to its limited scope of application. This paper improves the usefulness of RETUSS by extending the function to ensure real-time traceability between UML sequence diagrams and Java source code on RETUSS.
-
Extension of the Function to Ensure Real-time Traceability between UML Sequence Diagram and Java Source Code on RETUSS Reviewed
Arima Kaoru, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Journal of Advances in Artificial Life Robotics 2 ( 1 ) 37 - 41 2021
Language:English Publishing type:Research paper (scientific journal) Publisher:株式会社 ALife Robotics
Ensuring traceability of software deliverables is one of the methods to ensure software quality. RETUSS (Real-time Ensure Traceability between UML and Source-code System) is a tool that saves labor and time, and eliminates mistakes by human handling in ensuring traceability between UML and source code. However, RETUSS is not useful due to its limited scope of application. This paper improves the usefulness of RETUSS by extending the function to ensure real-time traceability between UML sequence diagrams and Java source code on RETUSS.
-
Katayama T., Shigyo Y., Kita Y., Yamaba H., Aburada K., Okazaki N.
Journal of Robotics, Networking and Artificial Life 7 ( 3 ) 165 - 169 2020.12
Language:English Publishing type:Research paper (scientific journal) Publisher:Journal of Robotics, Networking and Artificial Life
The natural language includes ambiguous expressions. Vienna Development Method (VDM) is one of methodology on the formal methods to write the specification without ambiguity. Because VDM++ is written by strict grammar, it is difficult to write a VDM++ specification. This research attempts to generate a VDM++ specification automatically from a natural language specification by machine learning. To generate a VDM++ specification, it is necessary to extract words that consist of predicate corresponding to the function and nouns corresponding to variable from the natural language specification. This paper proposes an approach to generate a VDM++ specification based on its grammar from the classified word list. Identifiers are generated from the classified word list, and then the VDM++ specification can be generated by converting them into VDM++ grammar.
-
FMD-VS: A virtual sensor to index FMD virus scattering Reviewed
Takatsuka K., Sekiguchi S., Yamaba H., Aburada K., Mukunoki M., Okazaki N.
PLoS ONE 15 ( 9 September ) 2020.9
Language:English Publishing type:Research paper (scientific journal) Publisher:PLoS ONE
Foot-and-mouth disease (FMD) models—analytical models for tracking and analyzing FMD outbreaks—are known as dominant tools for examining the spread of the disease under various conditions and assessing the effectiveness of countermeasures. There has been some remarkable progress in modeling research since the UK epidemic in 2001. Several modeling methods have been introduced, developed, and are still growing. However, in 2010 when a FMD outbreak occurred in the Miyazaki prefecture, a crucial problem reported: Once a regional FMD outbreak occurs, municipal officials in the region must make various day-today decisions throughout this period of vulnerability. The deliverables of FMD modeling research in its current state appear insufficient to support the daily judgments required in such cases. FMD model can be an efficient support tool for prevention decisions. It requires being conversant with modeling and its preconditions. Therefore, most municipal officials with no knowledge or experience found full use of the model difficult. Given this limitation, the authors consider methods and systems to support users of FMD models who must make real-time epidemic-related judgments in the infected areas. We propose a virtual sensor, designated “FMD-VS,” to index FMD virus scattering in conditions where there is once a notion of FMD; and (2) shows how we apply the developed FMD-VS technique during an outbreak. In (1), we show our approach to constructing FMD-VS based on the existing FMD model and offer an analysis and evaluation method to assess its performance. We again present the results produced when the technique applied to 2010 infection data from the Miyazaki Prefecture. For (2), we outline the concept of a method that supports the prevention judgment of municipal officials and show how to use FMD-VS.
-
Amidakuji-type Gaze Authentication Using Gaze Features
Shogo MIYAZAKI, Hiromu KUNIFUSA, Kentaro ABURADA, Hisaaki YAMABA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 129 - 133 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Proposal of a Shelter Determination Method Considering Walking Speed of Evacuees in Aoshima Area
Karin HONDA, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 295 - 299 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Study on a Blockchain-based Collaborative Malware Detection System
Ryusei FUJI, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 275 - 294 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Analysis of Near Miss Accidents of Traffic in Rainy Weather
Ryoma IKEDA, Yasutaka TSUCHIDA, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 269 - 273 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Proposal of an IoT Bot Detection Method Using n-gram Analysis and One-Class SVM
Ryoma IKEDA, Masami MORI, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 263 - 267 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
An Analysis Method of Project Schedule Delay Risks
Shogo MIYAZAKI, Shogo TANABE, Kayoko TAKATUKA, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 257 - 261 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Study on Improving the Usability and Machine Resistance of Color Constancy CAPTCHA
Shotaro USUZAKI, Yuki SUNAMOTO, Naonobu OKAZAKI, Hisaaki YAMABA, Kentaro ABURADA
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 251 - 255 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Evaluation of a Set of Manual Alphabets Based Gestures for a User Authentication Method Using s-EMG
Hisaaki YAMABA, Yuki Nagatomo, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 233 - 237 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of Audio Based CAPTCHA with Mouse Using Environmental Sound
Karin HONDA, Ryusei IWAMURA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 171 - 175 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
An Improved Method of "CloneSpot" for Detecting Repackaged Applications Using Metadata
Ryusei FUJI, Ken'ichiro GOMI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 165 - 169 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Evaluation of CAPTCHA for Mobile Devices against Bots Using Hough Transform
Maria TAKEGUCHI, Takaharu YANAI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 159 - 163 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Research on a Support System for Project Risk Management
Shogo MIYAZAKI, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 49 ) 135 - 157 2020.9
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
On a user authentication method to realise an authentication system using s-EMG Reviewed
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
International Journal of Grid and Utility Computing 11 ( 5 ) 725 - 734 2020.8
Language:English Publishing type:Research paper (scientific journal) Publisher:International Journal of Grid and Utility Computing
To prevent shoulder-surfing attacks, we proposed a user authentication method using surface electromyogram (s-EMG) signals, which can be used to identify who generated the signals and which gestures were made. Our method uses a technique called 'pass-gesture', which refers to a series of hand gestures, to achieve s-EMG-based authentication. However, it is necessary to introduce computer programs that can recognise gestures from the s-EMG signals. In this paper, we propose two methods that can be used to compare s-EMG signals and determine whether they were made by the same gesture. One uses support vector machines (SVMs), and the other uses dynamic time warping. We also introduced an appropriate method for selecting the validation data used to train SVMs using correlation coefficients and cross-correlation functions. A series of experiments was carried out to confirm the performance of those proposed methods, and the effectiveness of the two methods was confirmed.
-
Proposal for Rotating 3D Text-based CAPTCHA Using Subjective Contour Reviewed
The IEICE Transaction on Communications J103-B ( 8 ) 332 - 343 2020.8
Language:Japanese Publishing type:Research paper (scientific journal)
-
Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG Reviewed
Yamaba H., Nagatomo Y., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 1150 AISC 834 - 844 2020.3
Language:Japanese Publishing type:Research paper (international conference proceedings) Publisher:Advances in Intelligent Systems and Computing
© 2020, Springer Nature Switzerland AG. At the present time, since mobile devices such as tablet-type PCs and smart phones have penetrated deeply into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We introduced manual kana of the Japanese Sign Language syllabary and selected the candidate gestures based on them. Their performances were evaluated by constructing their identifier using support vector machines.
-
Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication Reviewed
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Lecture Notes on Data Engineering and Communications Technologies 47 323 - 333 2020.1
Language:Japanese Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes on Data Engineering and Communications Technologies
© 2020, Springer Nature Switzerland AG. At the present time, since mobile devices such as tablet-type PCs and smart phones have penetrated deeply into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We introduced manual kana of the Japanese Sign Language syllabary and compared the identification performance of some candidate sets of feature values with adopting support vector machines.
-
Shigyo Yasuhiro, Katayama Tetsuro, Aburada Kentaro, Kita Yoshihiro, Yamaba Hisaaki, Okazaki Naonobu
Proceedings of International Conference on Artificial Life and Robotics 2020 763 - 766 2020.1
Language:English Publishing type:Research paper (international conference proceedings) Publisher:ALife Robotics Corporation Ltd.
The natural language includes ambiguous expressions. VDM is one of methodology on the formal methods to write the specification without ambiguity. Because VDM++ is written by strict grammar, it is difficult to write a VDM++ specification. This research attempts to generate a VDM++ specification automatically from a natural language specification by machine learning. To generate a VDM++ specification, it is necessary to extract words which consist of predicate corresponding to the function and nouns corresponding to variable from the natural language specification. This paper proposes an approach to generate a VDM++ specification from the extracted words list. Identifiers are generated from the extracted words list, and then the VDM++ specification can be generated by converting them into VDM++ grammar.
-
The Measurement of Class Cohesion using Semantic Approach
Priyambadha Bayu, Katayama Tetsuro, Kita Yoshihiro, Aburada Kentaro, Yamaba Hisaaki, Okazaki Naonobu
Proceedings of International Conference on Artificial Life and Robotics 2020 759 - 762 2020.1
Language:English Publishing type:Research paper (international conference proceedings) Publisher:ALife Robotics Corporation Ltd.
The cohesion is one of the design quality indicators that can be measured by focusing on the correlation between elements inner the class. In Direct Distance Design Class Cohesion (D3C2) metrics, elements are assumed correlated if they have a similar type. In this research, the correlation between elements' inner class is not only based on type similarity but also on the meaning of the element's name. The results confirm that the value of cohesion increases in line with the similarity of meaning.
-
Test Cases Redundant Elimination on Code Coverage Uses Distance and Correlation Measurement Method
Mochamad Chandra Saputra, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proc. 2020 Int’l Conf. on Artificial Life and Robotics (ICAROB 2020) 755 - 758 2020.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Implementation of CAPTCHA suitable for mobile devices Reviewed
K. Aburada, S. Usuzaki, H. Yamaba, T. Katayama, M. Mukunoki, M. Park, and N. Okazaki
IEICE Communications Express 8 ( 12 ) 601 - 605 2019.12
Language:English Publishing type:Research paper (scientific journal)
-
An evaluation of the interactive video CAPTCHA method against automated attack Reviewed
K. Aburada, S. Usuzaki, H. Yamaba, T. Katayama, M. Mukunoki, M. Park, and N. Okazaki
IEICE Communications Express 8 ( 12 ) 453 - 457 2019.12
Language:English Publishing type:Research paper (scientific journal)
-
Application of Pairwise Testing into BWDM which is a Test Case Generation Tool for the VDM++ Specification Reviewed
T. Katayama, F. Hirakoba, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journal of Robotics, Networks and Artificial Life 6 ( 3 ) 143 - 147 2019.12
Language:English Publishing type:Research paper (scientific journal)
-
Implementation of Tamias to Check Production Rules for Parsing Expression Grammar Reviewed
T. Katayama, T. Miyaji, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journal of Robotics, Networks and Artificial Life 6 ( 2 ) 123 - 127 2019.9
Language:English Publishing type:Research paper (scientific journal)
-
Evaluation of manual alphabets based gestures for a user authentication method using s-emg Reviewed
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 1036 570 - 580 2019.8
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. At the present time, since mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We measured s-EMG signals of manual kana of The Japanese Sign Language syllabary and evaluated their potential as the important element of the user authentication method.
-
Blockchain-based malware detection method using shared signatures of suspected malware files Reviewed
Fuji R., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Shiratori N., Okazaki N.
Advances in Intelligent Systems and Computing 1036 305 - 316 2019.8
Language:Japanese Publishing type:Research paper (international conference proceedings) Publisher:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. Although rapid malware detection is very important, the detection is difficult due to the increase of new malware. In recent years, blockchain technology has attracted the attention of many people due to its four main characteristics of decentralization, persistency, anonymity, and auditability. In this paper, we propose a blockchain-based malware detection method that uses shared signatures of suspected malware files. The proposed method can share the signatures of suspected files between users, allowing them to rapidly respond to increasing malware threats. Further, it can improve the malware detection by utilizing signatures on the blockchain. In the evaluation experiment, we perform a more real simulation compared with our previous work to evaluate the detection accuracy. Compared with heuristic methods or behavior-based methods only, the proposed system which uses these methods plus signature-based method using shared signatures on the blockchain improved the false negative rate and the false positive rate.
-
Examination of Dynamic CAPTCHA for Mobile Devices and Verification of Bot Tolerance Using Tracking Technology
Ryusei FUJI, Riku MIZUTA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 257 - 261 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Proposal of a Reading Text CAPTCHA Using Human Visual Complementation Ability
Ryusei FUJI, Masahiko HOSHINO, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 251 - 255 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Study on Comprehensive Evaluation of Margin to Be Dispersed Through Schedule Network
Ryusei FUJI, Naoki TAKAHASHI, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 245 - 249 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of Audio Based CAPTCHA with Simple Operation Using Mouse
Ryusei FUJI, Tatsuya SAKAMOTO, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 239 - 243 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Ladder Lottery Type Gaze Authentication Considering Device Characteristics
Ryusei FUJI, Seira KURONO, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 235 - 238 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of Eye Position Abnormality Detection System Based on Pupil Position Tracking
Ryusei FUJI, Masaya KAWAKAMI, Kayoko TAKATSUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 229 - 233 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of ColorCAPTCHA Using Color Constancy
Ryusei FUJI, Shohei KAWAKAMI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 223 - 227 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Investigation of Finger Character Based Gesture of Personal Authentication by sEMG
Ryusei FUJI, Shinpei INOTANI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 217 - 221 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
An investigation on Detection of Low Rate DDoS Attack Using Sketch Data Structures
Ryusei FUJI, Kosei II, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 213 - 216 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of Delay Risk Tolerance Evaluation Method of Project Schedule
Meguru TOMITA, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 195 - 212 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Study of Amidakuji-type Gaze Authentication with Randomness
Shogo MIYAZAKI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 189 - 193 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
On a Bot Detection Method Focused on HTTP Request Transmission Behavior of Clients
Ryusei FUJI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 183 - 187 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Proposal of Real-Time Entropy-based DDoS Attack Detection Method
Shotaro USUZAKI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 48 ) 167 - 181 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG
Yamaba H., Inotani S., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 927 693 - 701 2019.3
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Advances in Intelligent Systems and Computing
© 2019, Springer Nature Switzerland AG. At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare many gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We measured s-EMG signals of manual kana of The Japanese Sign Language syllabary and examined their ability for the use of passwords of the authentication method.
-
Nagatomo M., Aburada K., Yamaba H., Okazaki N., Park M.
Advances in Intelligent Systems and Computing 927 683 - 692 2019.3
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Advances in Intelligent Systems and Computing
© 2019, Springer Nature Switzerland AG. Currently, IoT devices often use wireless technologies to communicate with each other. An example is ad-hoc device pairing such as wireless distribution of meeting materials from a PC to mobile device. The problem in this case is spoofing by an impersonator. In order to solve this problem, we proposed secure device pairing method using similarity between displacement data of a marker displayed on devices and acceleration data obtained from devices. We performed experiments to confirm similarity and whether impersonator can pair with the server. As a result, we found that similarity was low and unstable. Therefore, in this paper, we propose an extended method that marker changes at an interval. These sequence of markers displayed on the device is used to recognize the device by a camera in addition to calculation of the similarity. We performed 3 experiments to confirm the similarity displacement data and examined whether an eavesdropper outside the camera range can perform pairing. Also, we performed pairing of some device together. As a result, average similarity was higher than that of previous method and pairing of three devices succeeded at rate of about 70%.
-
Interactive Video CAPTCHA for Better Resistance to Automated Attack Reviewed
Usuzaki S., Aburada K., Yamaba H., Katayama T., Mukunoki M., Park M., Okazaki N.
2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018 1 - 2 2019.2
Language:English Publishing type:Research paper (international conference proceedings) Publisher:2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018
© 2018 IPSJ. A 'Completely Automated Public Turing Test to Tell Computers and Humans Apart' (CAPTCHA) widely used online services so that prevents bots from automatic getting a large of accounts. Interactive video type CAPTCHAs that attempt to detect this attack by using delay time due to communication relays have been proposed. However, these approaches remain insufficiently resistant to bots. We propose a CAPTCHA that combines resistant to automated and relay attacks. In our CAPTCHA, the users recognize a moving object (target object) from among a number of randomly appearing decoy objects and tracks the target with mouse cursor. The users pass the test when they were able to track the target for a certain time. Since the target object moves quickly, the delay makes it difficult for a remote solver to break the CAPTCHA during a relay attack. It is also difficult for a bot to track the target using image processing because it has same looks of the decoys. We evaluated our CAPTCHA's resistance to relay and automated attacks. Our results show that, if our CAPTHCA's parameters are set suitable value, a relay attack cannot be established economically and false acceptance rate with bot could be reduced to 0.01% without affecting human success rate.
-
Tamias: a Syntax File Checker for Parsing Expression Grammar
Toshihiro Miyaji, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 169 - 172 2019.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Development of Library Fescue Extracting Elements of Attributes and Operations of Class Diagram in UML
Keisuke Mori, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 165 - 168 2019.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Application of Pairwise Testing to Test Cases by Boundary Value Analysis in BWDM
Futa Hirakoba, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 161 - 164 2019.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Implementation of an Arduino Simulator to Support Circuit Design
Tatsumi Nishida, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 173 - 176 2019.1
Language:English Publishing type:Research paper (international conference proceedings)
-
CHAMSIN: CaptcHA by caMouflaged StrINg Reviewed
Mukunoki Masayuki, Yamaba Hisaaki, Usuzaki Shotaro, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 3 ) 55 - 60 2019
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
We propose a new CAPTCHA scheme that uses random dot patterns (RDPs) to prevent highly-developed bots attacks. Human beings can recognize a moving figure filled by a RDP from a background that is filled by another RDP; however, it is impossible to find such figures when they are stationary. Since image recognition by bots is usually carried out frame by frame, it is hard for bots to recognize such moving figures. The proposed CAPTCHA scheme exploits this characteristic. Several experiments were carried out to confirm that the proposed CAPTCHA scheme is usable enough and has enough resistance against bot attacks.
-
HMD-based Cover Test System for the Diagnosis of Ocular Malalignment Reviewed
Noriyuki Uchida, Kayoko Takatuka, Atsusi Nakazawa, Masayuki Mukunoki, Hisaaki Yamaba, Naonobu Okazaki
Journal of Artificial Life and Robotics, Springer 2019
Language:English Publishing type:Research paper (scientific journal)
-
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit Reviewed
Tetsuro Katayama, Tatsumi Nishida, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networks and Artificial Life 2019
Language:English Publishing type:Research paper (scientific journal)
-
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic
Aburada K., Arikawa Y., Usuzaki S., Yamaba H., Katayama T., Park M., Okazaki N.
Artificial Life and Robotics 2019
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2019, International Society of Artificial Life and Robotics (ISAROB). Distributed denial of service attacks are a serious threat in the current information society, where the Internet plays an important role as infrastructure. We have been studying ways to mitigate these attacks using a method that distinguishes between legitimate users and attacks. Our previous method was not sufficient because it only analyzed access logs after the attack. In this study, we propose a new method that can distinguish between legitimate users and attacks while the services are running. When the IDS detects an attack, a quarantine server distinguishes legitimate users using access characteristics. The access characteristics are: (1) user follows links, (2) sender accessed a popular page, and (3) the sender’s current average transmission interval. Our experiments confirmed that the proposed method can distinguish between legitimate users and attacks.
-
Investigation on sharing signatures of suspected malware files using blockchain technology Reviewed
Fuji R., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Shiratori N., Okazaki N.
Lecture Notes in Engineering and Computer Science 2239 94 - 99 2019
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes in Engineering and Computer Science
© 2019 Turkiye Klinikleri Journal of Medical Sciences. All rights reserved. In recent years, the amount of new malware has been rapidly increasing. Because malware has an adverse effect on the Internet, upon which modern society is increasingly dependent, its detection is very important. In addition, blockchain technology has attracted the attention of many people in recent years due to its four main characteristics of decentralization, persistency, anonymity, and auditability. In this paper, we propose a system for sharing the signatures of suspected malware files using blockchain technology. The proposed system can share the signatures of suspected files between users, allowing them to rapidly respond to increasing malware threats. Further, it improves the accuracy of detection and removal of malware by utilizing signatures recorded by the blockchain. In the evaluation experiment, we created a prototype of the proposed system and investigated its effect on the accuracy of detection and removal of malware. Compared with heuristic methods or behavior-based methods only, the proposed system which uses these methods plus signature-based method using shared signatures on the blockchain improved the false negative rate by about 4% and the false positive rate by about 2.5%.
-
A Proposal of New Reading Text CAPTCHA using Random Dot Patterns Reviewed
Yamaba H., Usuzaki S., Aburada K., Mukunoki M., Park M., Okazaki N.
Proceedings - 2018 6th International Symposium on Computing and Networking, CANDAR 2018 207 - 212 2018.12
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Proceedings - 2018 6th International Symposium on Computing and Networking, CANDAR 2018
© 2018 IEEE. According to the growth of troubles caused by malicious programs called bots, CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) comes to be an important role in the current information society. CAPTCHA identifies bots from legitimate human users by requiring some questions that are easy for humans to solve but difficult for bots. However, the progress of computing technology such as Optical Character Recognition (OCR) function. bots come to be able to solve present CAPTCHAs. In order to outcome such troublesome bots, more sophisticated CAPTCHA that requires the high cognitive ability of human beings is desired. In this paper, we propose a new CAPTCHA scheme that uses random dot patterns. Human beings can recognize a moving figure filled by a random dot pattern from a background that is filled by another random dot pattern; however, they lose the figure in the background when the figure pauses. Since image recognition by computer programs is usually carried out frame by frame, it is hard for bots to recognize such a moving figure filled by a random dot pattern from another random dot pattern background. The proposed CAPTCHA scheme exploits this characteristic of random dot patterns. This CAPTCHA requires users to answer a text filled by a random dot pattern that is moving on a background also filled by another random dot pattern. Several experiments were carried out to confirm that the proposed CAPTCHA scheme has enough resistance against bot attacks using representative image recognition methods. Results of the experiments showed that the image recognition methods cannot find out the answer text. Other experiments were also carried out to evaluate the usability of the proposed CAPTCHA scheme. The system usability scheme was adopted in the experiments. The obtained score was 89 that means this CAPTCHA scheme has high usability. These results showed that the CAPTCHA scheme is usable enough and has enough resistance against bot attacks.
-
Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG
Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, and Naonobu Okazaki
Ad- vances in Network-Based Information Systems, Lecture Notes on Data Engineering and Communications Technologies 732 - 742 2018.9
Language:English Publishing type:Research paper (scientific journal)
-
Selection of Features for User Authentication System Using Surface Electromyogram Signals
Konomi HIRATA, Minami YOKOYAMA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 315 - 319 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of a PIN Authentication Method Using User's Sight Line Path
Konomi HIRATA, Syota YAMAGUCHI, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 311 - 314 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of the Automated Cover-uncover Test System for Ocular Malalignment Detection
Konomi HIRATA, Koki HINOKUMA, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 305 - 309 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Research on the Qualitative Automated Cover-uncover Test System for the Ocular Malalignment Detection
Konomi HIRATA, Koki HINOKUMA, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 291 - 303 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of Decision Support System for Prevention of Foot-and-mouth Disease
Konomi HIRATA, Kaito IWAMITSU, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 285 - 289 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Consideration of CAPTCHA System Suitable for Use of Mobile Device
Meguru TOMITA, Tsubomi HATSU, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 279 - 283 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Consideration of Interactive Motion Picture CAPTCHA System Aiming at Compatibility between Relay Attack Tolerance and BOT Tolerance
Meguru TOMITA, Ryohei TATSUDA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 255 - 277 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Consideration of Application of Unified Management System of Time and Cost to Large Scale Project
Meguru TOMITA, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 249 - 253 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Consideration of Discrimination by Myoelectric Potential of Finger Character Which is Hard to Distinguish in Image Recognition
Meguru TOMITA, Makoto KUROGI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 243 - 247 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Evaluation of Delay Risk Tolerance of Project Schedule Network
Meguru TOMITA, Naoki KADOGAWA, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 237 - 241 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Proposal of a User Identification Method for Realizing an Authentication System Using s-EMG
Tokiyoshi KUROGI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 227 - 236 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Highly Responsive Detection Method of Distributed Denial-of-Service Attacks Using Data Mining Technique
Shotaro USUZAKI, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 221 - 225 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Simulation on Evacuation Behavior During Disaster in Aoshima District
Shotaro USUZAKI, Takahiro FUJII, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 215 - 219 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Investigation of the Color Constancy of Color Obstruction Images for CAPTCHA
Shotaro USUZAKI, Yusuke NAKAHARA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 211 - 214 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Introduction of Traffic Characteristics to Distinguish Legitimate User Traffic from DDoS Attack Traffic
Shotaro USUZAKI, Yuki ARIKAWA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 201 - 210 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of TFVIS (Transitions and Flow VISalization) for Java Programs Reviewed
59 ( 4 ) 1137 - 1149 2018.4
Language:Japanese Publishing type:Research paper (scientific journal)
-
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time Reviewed
Tetsuro Katayama, Keisuke Mori, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada and Naonobu Okazaki
Journal of Robotics, Networks and Artificial Life 5 ( 2 ) 114 - 117 2018.4
Language:English Publishing type:Research paper (scientific journal)
-
Yamaba H., Kurogi T., Aburada K., Kubota S., Katayama T., Park M., Okazaki N.
Artificial Life and Robotics 23 ( 1 ) 87 - 93 2018.3
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2017, ISAROB. At present, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In this paper, we introduced support vector machines (SVM) for improvement of the method of identifying gestures. A series of experiments was carried out to evaluate the performance of the SVM based method as a gesture classifier and we also discussed its security.
-
A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG Reviewed
T. Kurogi, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
The 6th International Conference on Emerging Internet, Data & Web Technologies 889 - 900 2018.3
Language:English Publishing type:Research paper (international conference proceedings)
At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching.
The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In this paper, we intro- duced dynamic time warping (DTW) for improvement of the method of identifying gestures. -
Evaluation of Index Poisoning Method in Large Scale Winny Network Reviewed
K.Aburada, Y. Kita, H.Yamaba, T.Katayama, M. Park, N.Okazak
The 6th International Conference on Emerging Internet, Data & Web Technologies 999 - 1006 2018.3
Language:English Publishing type:Research paper (international conference proceedings)
In recent years, P2P file-sharing networks are used all over the world. This has led to social problems such as the illegal distribution of copyrighted material and the leakage of personal information through computer viruses because P2P does not have a control function for file distribution. To address these issues, a control method called index poi- soning has been studied. However, problems such as pollution in the net- work index and a need to increment control traffic have been reported when index poisoning is applied to a P2P file-sharing network. We pro- pose a method that implements dynamic clustering to limit the range of index poisoning as a solution for these problems that also maintains the effectiveness of the control function. In this study, we implement index poisoning on the large-scale Winny network and evaluate the system performance.
-
An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks Reviewed
R. Tatsuda, H.Yamaba, K.Aburada, T.Katayama, M. Park, N. Shiratori, N.Okazak
The 6th International Conference on Emerging Internet, Data & Web Technologies 870 - 879 2018.3
Language:English Publishing type:Research paper (international conference proceedings)
CAPTCHA is a type of challenge response test used to dis- tinguish human users from malicious computer programs such as bots, and is used to protect email, blogs, and other web services from bot attacks. So far, research on enhance of CAPTCHA’s resistance to bot attacks has been proceeded to counter advanced automated attacks method. However, an attack technique known as a relay attack has been devised to circumvent CAPTCHA. In this attack, since human solves CAPTCHA, the existing measures assuming bots have no effect on this attack. We designed a new CAPTCHA scheme for relay attacks tolerance and automated attacks tolerance. In this paper, we tested the robustness of the proposed method against several types of automated attacks. We constructed an experimental environment in which a relay attack can be simulated, and designed a series of experiments to evaluate the perfor- mance of the proposed method. As a result, we found that the proposed CAPTCHA scheme offers some of level of resistance to automated attacks and relay attacks.
-
Implementation of RETUSS to Ensure Traceability between Class Diagram in UML and Java Source Code in Real Time Reviewed
K. Mori, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2017) 2018.2
Language:English Publishing type:Research paper (international conference proceedings)
Ensuring of the traceability of deliverables is one of effective methods to secure the quality of software. It can verify that the requirements are reflected in the programs. But it has two problems: taking much labor and time, and causing mistakes by human handling. This paper has implemented RETUSS (Real-time Ensure Traceability between UML and Source-code System) in order to solve the above two problems. RETUSS can ensure traceability between Class diagram in UML and Java source code in real time.
-
Prototype of a Tool to Defect Specific Comments Reviewed
S. Tanoue, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2017) 2018.2
Language:English Publishing type:Research paper (international conference proceedings)
This paper has developed a prototype of a tool to detect specific comments. With the prototype, you can use regular expressions, describe patterns of detected strings in a configuration file, and then detect specific comments. The prototype was applied to projects with 5,000 LOC (Lines of Code) or more. As a result, the recall rate achieved 100% and the precision rate achieved 80%. Reducing improper comments and comments detected by the prototype which express tasks remaining in the source code can improve understandability of the source code.
-
Usuzaki S., Arikawa Y., Yamaba H., Aburada K., Kubota S., Park M., Okazaki N.
Journal of Information Processing 26 ( 0 ) 257 - 266 2018.1
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Journal of Information Processing
© 2018 Information Processing Society of Japan. Distributed Denial-of-Service (DDoS) attack detection systems are classified into a signature based approach and an anomaly based approach. However, such methods tend to suffer from low responsiveness. On the other hand, real-time burst detection which is used in data mining offers two advantages over traditional statistical methods. First, it can be used for real-time detection when an event is occurring, and second, it can work with less processing as information about events are compressed, even if a large number of events occur. Here, the authors add the function for attack detection in real-time burst detection technique, and propose a highly responsive DDoS attack detection technique. This paper performs experiments to evaluate its effectiveness, and discusses its detection accuracy and processing performance.
-
A study on user identification method using cross-correlation and SVM to realize an authentication system by s-EMG Reviewed
T. Kurogi, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
International Symposium on Artificial Life and Robotics 462 - 467 2018.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Automated cover-uncover test system using active LCD shutter glasses Reviewed
N. Uchida, K. Takatsuka, K. Hinokuma, K. Hirata, H.Yamaba, N.Okazak
International Symposium on Artificial Life and Robotics 698 - 702 2018.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Introduction of traffic characteristics to distinguish legitimate user traffic from DDoS attack traffic Reviewed
Y. Arikawa, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
International Symposium on Artificial Life and Robotics 484 - 489 2018.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Evaluation of farmers market information system to connect with some social stakeholders
Tende I., Kubota S., Yamaba H., Aburada K., Okazaki N.
Journal of Information Processing 26 ( 0 ) 247 - 256 2018.1
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Journal of Information Processing
© 2018 Information Processing Society of Japan. A large part of the population in Tanzania consists of rural smallholder farmers. Due to lack of market information, farmers sell crops to middlemen at lower prices and hence don’t get enough profits. Previously we developed a WEB and SMS (Short Message Service) based Farmers Market Information System using a Waterfall model which automatically replies to farmers’ requests for market prices of crops through SMS. We then improved the system so that, farmers can access crop buyers’ details and crop demand reports through SMS while crop buyers can access farmers’ details and crop demand reports through SMS or WEB. We also evaluated the effectiveness of the system to crop buyers’ incomes and times for accessing market information after implementing the system in Tanzania in the SWAHILI language. In this paper we further evaluate the system effectiveness. Findings reveal that the system helped farmers to get improved incomes and access market information in shorter times. The system also helped farmers and crop buyers to sell and buy larger quantities of crops respectively. The findings also reveal that young people can learn and use the system more easily than old people. Users can also easily learn and use the system if they can read and write in the SWAHILI language regardless of their education levels.
-
An examination of the interactive video CAPTCHA method to resist relay attack
Tatsuda Ryohei, Aburada Kentaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 7 ( 4 ) 136 - 141 2018
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHA is a kind of challenge response test, which is used to distinguish human users from malicious computer program such as bots. However, the attack technique called relay attack as a method to avoid the CAPTCHA has been devised. This attack relays the CAPTCHA challenges to remote human-solvers, let them to decode CAPTCHA challenges. We used delay time that is caused by communications needed in relay attack. Our new CAPTCHA uses this delay time between communications to prevent relay attacks. We constructed an experimental environment in which relay attack can be simulated, made a series of experiments in order to evaluate the performance of the proposed method.
-
Development of a Monitoring System Based on Power Consumption Reviewed
Kentaro Aburada, Kengo Todaka, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori et al.
The 20th International Conference on Network-Based Information Systems (NBiS-2017) 363 - 372 2017.8
Language:English Publishing type:Research paper (international conference proceedings)
-
Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method Reviewed
Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park et al.
The 20th International Conference on Network-Based Information Systems (NBiS-2017) 914 - 923 2017.8
Language:English Publishing type:Research paper (international conference proceedings)
-
Discriminating Legitimate Access from a Web Access Log Recorded During DDoS Attack
Hiroaki Tachibana, Yuki Arikawa, Shotaro Usuzaki, Shin-Ichiro Kubota, Kayoko Takatsuka, Hisaaki Yamana, Naonobu Okazaki
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 46 ) 239 - 246 2017.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Proposal of a Mitigation Method of HTTP Flood Attacks Using a Server for Detailed Examination of Pseudo Positive Accesses
Yuki Arikawa, Shin-Ichiro Kubota, Hisaaki Yamana, Naonobu Okazaki
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 46 ) 247 - 250 2017.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Evaluation of Feature Values of Surface Electromyograms for User Authentication of Mobile Devices
Tokiyoshi Kurogi, Hisaaki Yamana, Shin-Ichiro Kubota, Tetsuro Katayama, Naonobu Okazaki
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 46 ) 251 - 255 2017.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of Puzzle Authentication Method with Video Recording Attack Resistance
Koki Hinokuma, Hisaaki Yamana, Shin-Ichiro Kubota, Naonobu Okazaki
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 46 ) 263 - 267 2017.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A study on the CAPTHA Using Mouse Tracking
Ryohei Tatsuda, Hisaaki Yamana, Shin-Ichiro Kubota, Naonobu Okazaki
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 46 ) 257 - 261 2017.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Evaluation of feature values of surface electromyograms for user authentication on mobile devices Reviewed
Yamaba H., Kurogi A., Kubota S., Katayama T., Park M., Okazaki N.
Artificial Life and Robotics 22 ( 1 ) 108 - 112 2017.3
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2016, ISAROB. At the present time, mobile devices, such as tablet-type PCs and smart phones, have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that use surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, are detected over the skin surface. Muscle movement can be differentiated by analyzing the s-EMG. In this paper, a method that uses a list of gestures as a password is proposed. And also, results of experiments are presented that was carried out to investigate the performance of the method extracting feature values from s-EMG signals (using the Fourier transform) adopted in this research. Myo T M , which is the candidate of s-EMG measurement device used in a prototype system for future substantiative experiments, was used in the experiment together with the s-EMG measuring device used in the previous research to investigate its performance.
-
Development of a Tool to Keep Consistency between a Model and a Source Code in Software Development Using MDA Reviewed
Y. Kikkawa, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, N. Okazaki
Journal of Robotics, Networking and Artificial Life 3 ( 4 ) 231 - 235 2017.3
Language:English Publishing type:Research paper (scientific journal)
-
Prototype of Test Cases Automatic Generation Tool BWDM Based on Boundary Value Analysis with VDM++ Reviewed
H. Tachiyama, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2017) 275 - 278 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Improvement of Transitions and Flow Visualization TFVIS for Exception Handling Reviewed
T. Sato, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2017) 283 - 287 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of Refactoring Support Tool MCC Focusing on the Naming of Variables Reviewed
S. Tanoue, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2017) 279 - 282 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Improvement of Decision Table Automatic Generation Tool VDTable for let in Statement Reviewed
Y. Huang, T. Katayama, Y. Kita, H. Yamaba, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2017) 271 - 274 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
An attempt to use support vector machines for a user authentication system using surface electromyogram signals Reviewed
H.Yamaba, T.Kurogi, S.Kubota, T.Katayama, M. Park, N.Okazak
International Symposium on Artificial Life and Robotics 541 - 544 2017.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Takatsuka Kayoko, Sekiguchi Satoshi, Yamaba Hisaaki, Kubota Shinichiro, Okazaki Naonobu
KAGAKU KOGAKU RONBUNSHU 43 ( 2 ) 117 - 122 2017
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Society of Chemical Engineers, Japan
<p>Foot-and-mouth disease (FMD), a "specific domestic animal infectious disease," needs biosecurity in the early stage but cannot be detected during the incubation period. This problem is dealt with by use of a detection agent and by immediate culling when the outbreak begins. However, developing a detection agent raises budgetary problems, and securing sites for culling and burial takes time. In this study, we adopted an epidemiological model known as the Keeling Model and developed a mathematical method to detect infected farms during the incubation period before clinical symptoms first appear. Our model based on the Keeling Model estimates the unobservable variate λ (the infection index), which indicates the situation of the susceptible farms with the observable variates of whether or not surrounding farms infected, the number and species of animals, and the distances between farms. In addition, we devised a model (Infection Estimating Model) and an estimation approach to estimate whether or not a farm is infected. The proposed method was applied to the case of FMD that occurred in Miyazaki Prefecture in 2010, and the validity of our proposal was confirmed. Moreover, as a result of an experiment to compare estimation accuracy, a universal factor was discovered that will improve estimation accuracy.</p>
-
On Accuracy Improvement in Surroundings Estimation for Surroundings Adaptable Integrated Authentication Method
Hisaaki Yamana, Hirotaka Nagano, Kayoko Takatsuka, Shin-Ichiro Kubota, Naonobu Okazaki
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 45 ) 243 - 247 2016.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of the Mathematic Technique to Detect Infections-farm Which Is in Latency Period of Foot-and-mouth Disease
Kayoko Takatsuka, Koki Takahashi, Hisaaki Yamana, Shin-Ichiro Kubota, Naonobu Okazaki
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 45 ) 249 - 253 2016.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
An attempt to use a gesture control armband for a user authentication system using surface electromyograms Reviewed
H.Yamaba, A.Kurogi, S.Kubota, T.Katayama, N.Okazak
International Symposium on Artificial Life and Robotics 342 - 345 2016.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Development of a Tool to Keep Consistency between a Model and a Source Code in Software Development Using MDA
Y. Kikkawa, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2015) 340 - 344 2016.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Implementation and Evaluation of Index Poisoning Method Using the Clustering for Winny Network Reviewed
56 ( 12 ) 2395 - 2504 2015.12
Language:Japanese Publishing type:Research paper (scientific journal)
-
Prototype of a Decision Table Generation Tool from the Formal Specification Reviewed
T. Katayama, K. Nishikawa, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journal of Robotics, Networking and Artificial Life 2 ( 3 ) 205 - 208 2015.12
Language:English Publishing type:Research paper (scientific journal)
-
TFVIS: a Supporting Debugging Tool for Java Programs by Visualizing Data Transitions and Execution Flows Reviewed
T. Katayama, H. Nakamura, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Journal of Robotics, Networking and Artificial Life 2 ( 3 ) 177 - 181 2015.12
Language:English Publishing type:Research paper (scientific journal)
-
A Study of Effectiveness Indicators to Select the Protocol CoAP or HTTP Communicating with REST in IoT Environment
Shin-Ichiro Kubota, Hiroshi Mizogami, Hisaaki Yamana, Naonobu Okazaki
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 44 ) 229 - 233 2015.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
An Examnation on Identifying a Number of Decoy Web Sites through Tor Anonymity Networks with SVM
Hirofumi Sou, Tomoki Yoshiyama, Emiri Yokoyama, Hisaaki Yamaba, Shinichiro Kubota
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 44 ) 235 - 239 2015.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
An Attempt of User Authentication Method Using Surface Electromyogram Signals
Hisaaki Yamaba,So Nagatomo, Shinichiro Kubota, Naonobu Okazaki
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 44 ) 235 - 239 2015.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Application of Center of Gravity to Enhance Wireless LAN Based Location Estimation Method Using Rules
Shinichiro Kubota, Kentaro Kodama, Hisaaki Yamaba, Naonobu Okazaki
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 44 ) 241 - 245 2015.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of a Modification Method of a Source Code to Correspond with a Modified Model in MDA Reviewed
Tetsuro Katayama, Yuuki Kikkawa, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 2 ( 2 ) 136 - 140 2015.4
Language:English Publishing type:Research paper (scientific journal)
-
Proposal and Its Evaluation of Neighbors Based Routing for ad hoc networks Reviewed
Kentaro Aburada, Hisaaki Yamaba, Shin-ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 2 ( 2 ) 121 - 125 2015.4
Language:English Publishing type:Research paper (scientific journal)
-
Prototype of a Supporting Tool to Generate Testing Communication Diagram Reviewed
Tetsuro Katayama, Seiya Urata, Yohei Ogata, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 2 ( 1 ) 9 - 12 2015.4
Language:English Publishing type:Research paper (scientific journal)
-
An Authentication Method Independent of Tap Operation on the Touchscreen of a Mobile Device Reviewed
Hisaaki Yamaba, So Nagatomo, Kentaro Aburada, Shinichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 2 ( 1 ) 60 - 63 2015.4
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Testing Method Using Similarity of Interleaving for Java Multi-threaded Programs Reviewed
Tetsuro Katayama, Shoichiro Kitano, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 1 ( 4 ) 299 - 302 2015.3
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Modification Method of a Source Code to Correspond with a Modified Model in MDA
Y. Kikkawa, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2015) 384 - 387 2015.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal of a Testing Method Using Similarity of Interleaving for Java Multi-threaded Programs
S. Kitano, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2015) 380 - 383 2015.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of a Decision Table Generation Tool from the Formal Specification
K. Nishikawa, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2015) 388 - 391 2015.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Evaluation of Neighbors Based Routing for ad hoc networks
Kentaro Aburada, Hisaaki Yamaba, Shinichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2015) 335 - 338 2015.1
Language:English Publishing type:Research paper (international conference proceedings)
-
An Authentication Method for Mobile Devices that is Independent of Tap-Operation on a Touchscreen
Hisaaki Yamaba, So Nagatomo, Kentaro Aburada, Shinichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2015) 327 - 330 2015.1
Language:English Publishing type:Research paper (international conference proceedings)
-
TFVIS: a Supporting Debugging Tool for Java Programs by Visualizing Data Transitions and Execution Flows
H. Nakamura, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2015) 376 - 379 2015.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Prototype of a Supporting Tool to Generate Testing Communication Diagram
T. Katayama, S. Urata, Y. Ogata, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2015) 368 - 371 2015.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal of a Supporting Method for Debugging to Reproduce Java Multi-threaded Programs by Petri-net Reviewed
Tetsuro Katayama, S. Kitano, Yoshihiro Kita, Hisaaki Yamaba, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 1 ( 3 ) 207 - 211 2014.12
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Supporting Method to Generate a Decision Table from the Formal Specification Reviewed
Tetsuro Katayama, K. Nishikawa, Yoshihiro Kita, Hisaaki Yamaba, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 1 ( 3 ) 174 - 178 2014.12
Language:English Publishing type:Research paper (scientific journal)
-
Representation of human preference using folksonomy and the idea called concept Reviewed
Hisaaki Yamaba, Michihito Tanoue, Kayoko Takatsuka, Naonobu Okazaki, Shigeyuki Tomita
Artificial Life and Robotics 19 ( 3 ) 299 - 304 2014.11
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Method to Build Markov Chain Usage Model from UML Diagrams for Communication Delay Testing in Distributed Systems Reviewed
Tetsuro Katayama, Zhijia Zhao, Yoshihiro Kita, Hisaaki Yamaba, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 1 ( 2 ) 120 - 124 2014.9
Language:English Publishing type:Research paper (scientific journal)
-
Proposal of a Visualizing Method of Data Transitions to Support Debugging for Java Programs Reviewed
Tetsuro Katayama, Hiroto Nakamura, Yoshihiro Kita, Hisaaki Yamaba, Naonobu Okazaki
Journal of Robotics, Networking and Artificial Life 1 ( 2 ) 111 - 115 2014.9
Language:English Publishing type:Research paper (scientific journal)
-
Representation of Human Preference Using Users' Impressions -A Method of Inference of Users' Impressions Using Folksonomy-
Michihito Tanoue, Hisaaki Yamaba, Kayoko Takatsuka, Naonobu Okazaki and Shigeyuki Tomita
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 43 ) 263 - 272 2014.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of a Supporting Method to Generate a Decision Table from the Formal Specification
K. Nishikawa, T. Katayama, Y. Kita, H. Yamaba, N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2014) 218 - 221 2014.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal of a Supporting Method for Debugging to Reproduce Java Multi-threaded Programs by Petri-Net
S. Kitano, T. Katayama, Y. Kita, H. Yamaba, N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2014) 218 - 221 2014.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal of a Method to Build Markov Chain Usage Model from UML Diagrams for Communication Delay Testing in Distributed Systems
H. Zhao, T. Katayama, Y. Kita, H. Yamaba, N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2014) 214 - 217 2014.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal of a Visualizing Method of Data Transitions to Support Debugging for Java Programs
H. Nakamura, T. Katayama, Y. Kita, H. Yamaba, N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB 2014) 210 - 213 2014.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Representation of human preference using folksonomy and the idea called concept Reviewed
Michihito Tanoue, Hisaaki Yamaba, Kayoko Takatsuka, Naonobu Okazaki, Shigeyuki Tomita
International Symposium on Artificial Life and Robotics 162 - 167 2014.1
Language:English Publishing type:Research paper (international conference proceedings)
-
On a serendipity-oriented recommender system based on folksonomy Reviewed
Hisaaki Yamaba, Michihito Tanoue, Kayoko Takatsuka, Naonobu Okazaki, Shigeyuki Tomita
Artificial Life and Robotics 18 ( 1-2 ) 89 - 94 2013.9
Language:English Publishing type:Research paper (scientific journal)
-
A conversion method from an ETSC to a timed Petri net to improve the matrix-based discrete event controller and its unified support system Reviewed
Hisaaki Yamaba, Shoichiro Kitano, Kayoko Takatsuka, Tetsuro Katayama, Naonobu Okazaki, Shigeyuki Tomita
Proceedings of 17th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems 467 - 476 2013.9
Language:English Publishing type:Research paper (international conference proceedings)
-
On a serendipity oriented recommender system based on folksonomy and its evaluation Reviewed
Hisaaki Yamaba, Michihito Tanoue, Kayoko Takatsuka, Naonobu Okazaki, Shigeyuki Tomita
Proceedings of 17th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems 276 - 284 2013.9
Language:English Publishing type:Research paper (international conference proceedings)
-
Development and Evaluation of Serendipitous Recommender Systems using Folksonomy
Michihito Tanoue, Hisaaki Yamaba, Kayoko Takatsuka, Naonobu Okazaki and Shigeyuki Tomita
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 42 ) 313 - 318 2013.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Transformation Method from ETSC to Timed Petri Net to Improve Matrix-Based Discrete-Event System Controller and its Unified Support System
Hisaaki Yamaba, Shoichiro Kitano, Kayoko Takatsuka, Tetsuro Katayama, Naonobu Okazaki and Shigeyuki Tomita
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 42 ) 319 - 325 2013.8
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Examination of Interference Method to IP-traceback by DDoS Attackers and the Proposal of its Countermeasure Reviewed
Security Management 26 ( 3 ) 15 - 32 2013.1
Language:Japanese Publishing type:Research paper (scientific journal)
-
On a serendipity oriented recommender system based on folksonomy Reviewed
Hisaaki Yamaba, Michihito Tanoue, Kayoko Takatsuka, Naonobu Okazaki, Shigeyuki Tomita
International Symposium on Artificial Life and Robotics 2013.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Proposal of a Method for Distribution Tree Construction on P2P Streaming System in Consideration of NAT Traversal Reviewed
53 ( 7 ) 1884 - 18890 2012.7
Language:Japanese Publishing type:Research paper (scientific journal)
-
On an Operational Model and a Computer Support Environment for Batch Plants Based on Adaptive Scheduling –Application of simulators to obtain initial conditions for re-scheduling– Reviewed
Hisaaki Yamaba, Shigeyuki Tomita
11th International Symposium on Process Systems Engineering (PSE2012) 2012.7
Language:English Publishing type:Research paper (international conference proceedings)
-
Acquisition of Rules for Selecting Suppliers of Raw Materials in Distributed Production Systems by means of Reinforcement Learning Reviewed
Hisaaki Yamaba, Kayoko Takatsuka, Shigeyuki Tomita
International Symposium on Artificial Life and Robotics 2012.1
Language:English Publishing type:Research paper (international conference proceedings)
-
A Design Support System for Discrete Production Systems with AGVs -Object-Oriented Simulator Generator and Acquisition of AGV Control Rules Using Reinforcement Learning - "jointly worked" Reviewed
Hisaaki YAMABA and Shigeyuki TOMITA
Kagaku Kogaku Ronbunshu 36 ( 2 ) 127 - 135 2010.3
Language:Japanese Publishing type:Research paper (scientific journal)
-
An Operational Model and a Computer Support Environment for Batch Plants Based on Adaptive Scheduling Reviewed
Hisaaki Yamaba, Makoto Hirosaki and Shigeyuki Tomita
Proceedings of 12th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems LNAI 5179 33 - 40 2008.9
Language:English Publishing type:Research paper (international conference proceedings)
-
An Attempt to Obtain Scheduling Rules of Network-based Support System for Decentralized Scheduling of Distributed Production Systems Reviewed
Hisaaki Yamaba, Shinichi Matsumoto and Shigeyuki Tomita
Proceedings of 2008 IEEE International Conference on Indeutirial Informatics 506 - 511 2008.7
Language:English Publishing type:Research paper (international conference proceedings)
-
Network-based Support System for Decentralized Scheduling of Distributed Production Systems through Man-Machine Collaboration Reviewed
Seigo Kaneizumi, Shigeyuki Tomita]
2006 IEEE International Conference on Industrial Informatics 2006.8
Language:English Publishing type:Research paper (international conference proceedings)
-
Acquisition of AGV Control Rules Using Multi-Agent Reinforcement Learning
Shuichi Satoh, Shigeyuki Tomita]
Proceedings of PSE ASIA 2005 2005.9
Language:English Publishing type:Research paper (international conference proceedings)
-
On a Semantic Model for Explaining Functional Mechanisms Inhering in Micro Chemical-Devices
Kayoko Takatsuka, Shigeyuki Tomita
Proceedings of PSE ASIA 2005 2005.9
Language:English Publishing type:Research paper (international conference proceedings)
-
Acquisition of AGV Control Rules Using Profit Sharing Method Reviewed
Hitoshi Yohsioka, Shigeyuki Tomita]
Proceedings of KES2004 2004.9
Language:English Publishing type:Research paper (international conference proceedings)
-
On an Object-Oriented Modeling of Supply Chain and its Operating Strategy
Shigeyuki Tomita
Proceedings of PSE 2003 2004.1
Language:English Publishing type:Research paper (international conference proceedings)
-
On a Generic Computational Environment for Generating Simulators for Supply Chain Management
Shigeyuki Tomita
Proceedings of PSE ASIA 2002 2002.11
Language:English Publishing type:Research paper (international conference proceedings)
-
Acquisition of AGV Control Rules Using Reinforcement Learning(共著) Reviewed
Shigeyuki Tomita
Proceedings of KES2002 2002.9
Language:English Publishing type:Research paper (international conference proceedings)
-
Design of flexible production system by means of tax-system-like algorithm(TA) Reviewed
Shigeyuki Tomita
Proceedings of PSE 2000 2000.8
Language:English Publishing type:Research paper (international conference proceedings)
-
ツリー型の工程を持つ多目的バッチプラントの知的運転支援システム Reviewed
冨田重幸,山場久昭,大島榮次
化学工学論文集 17 ( 4 ) 740 - 749 1991.11
Language:Japanese Publishing type:Research paper (international conference proceedings)