Papers - KATAYAMA Tetsuro
-
Considering the Semantic Approach to Assess the Class Cohesion Invited
Bayu Priyambadha, T. Katayama
236 - 246 2020.3
Authorship:Corresponding author Language:English Publishing type:Research paper (conference, symposium, etc.)
-
Test Case Redundancy Elimination Uses Similarity Measurement on Quality Assurance Testing Invited
Mochamad Chandra Saputra, T. Katayama
224 - 235 2020.3
Authorship:Corresponding author Language:English Publishing type:Research paper (conference, symposium, etc.)
-
Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG Reviewed
Yamaba H., Nagatomo Y., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 1150 AISC 834 - 844 2020.3
Language:English Publishing type:Research paper (scientific journal) Publisher:Advances in Intelligent Systems and Computing
© 2020, Springer Nature Switzerland AG. At the present time, since mobile devices such as tablet-type PCs and smart phones have penetrated deeply into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We introduced manual kana of the Japanese Sign Language syllabary and selected the candidate gestures based on them. Their performances were evaluated by constructing their identifier using support vector machines.
-
Test Cases Redundant Elimination on Code Coverage Uses Distance and Correlation Measurement Method Reviewed
Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Nanoubu Okazaki
PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB2020) 755 - 758 2020.1
Language:English Publishing type:Research paper (scientific journal) Publisher:ALIFE ROBOTICS CO, LTD
The Euclidean distance and correlation measured by comparing the line executed by the test case to find the similarity of the test cases. The test cases have the lowest value of distance means highly similar and possible executing a similar line or path. The research tries to eliminate redundant test cases based on that similarity. Several redundant test cases are eliminated to get the best test cases. By Euclidean distance, the research can eliminate a similar test case on the test suite.
-
The Measurement of Class Cohesion using Semantic Approach Reviewed
Bayu Priyambadha, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Nanoubu Okazaki
PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB2020) 759 - 762 2020.1
Language:English Publishing type:Research paper (scientific journal) Publisher:ALIFE ROBOTICS CO, LTD
The cohesion is one of the design quality indicators that can be measured by focusing on the correlation between elements inner the class. In Direct Distance Design Class Cohesion (D3C2) metrics, elements are assumed correlated if they have a similar type. In this research, the correlation between elements' inner class is not only based on type similarity but also on the meaning of the element's name. The results confirm that the value of cohesion increases in line with the similarity of meaning.
-
Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication Reviewed
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Lecture Notes on Data Engineering and Communications Technologies 47 323 - 333 2020.1
Language:English Publishing type:Research paper (scientific journal) Publisher:Lecture Notes on Data Engineering and Communications Technologies
© 2020, Springer Nature Switzerland AG. At the present time, since mobile devices such as tablet-type PCs and smart phones have penetrated deeply into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We introduced manual kana of the Japanese Sign Language syllabary and compared the identification performance of some candidate sets of feature values with adopting support vector machines.
-
Proposal of an Algorithm to Generate VDM++ by Using Words Extracted from the Natural Language Specification Reviewed
Yasuhiro Shigyo, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB2020) 763 - 766 2020.1
Language:English Publishing type:Research paper (scientific journal) Publisher:ALIFE ROBOTICS CO, LTD
The natural language includes ambiguous expressions. VDM is one of methodology on the formal methods to write the specification without ambiguity. Because VDM++ is written by strict grammar, it is difficult to write a VDM++ specification. This research attempts to generate a VDM++ specification automatically from a natural language specification by machine learning. To generate a VDM++ specification, it is necessary to extract words which consist of predicate corresponding to the function and nouns corresponding to variable from the natural language specification. This paper proposes an approach to generate a VDM++ specification from the extracted words list. Identifiers are generated from the extracted words list, and then the VDM++ specification can be generated by converting them into VDM++ grammar.
-
Evaluation of manual alphabets based gestures for a user authentication method using s-emg
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 1036 570 - 580 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. At the present time, since mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We measured s-EMG signals of manual kana of The Japanese Sign Language syllabary and evaluated their potential as the important element of the user authentication method.
-
Blockchain-based malware detection method using shared signatures of suspected malware files
Fuji R., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Shiratori N., Okazaki N.
Advances in Intelligent Systems and Computing 1036 305 - 316 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. Although rapid malware detection is very important, the detection is difficult due to the increase of new malware. In recent years, blockchain technology has attracted the attention of many people due to its four main characteristics of decentralization, persistency, anonymity, and auditability. In this paper, we propose a blockchain-based malware detection method that uses shared signatures of suspected malware files. The proposed method can share the signatures of suspected files between users, allowing them to rapidly respond to increasing malware threats. Further, it can improve the malware detection by utilizing signatures on the blockchain. In the evaluation experiment, we perform a more real simulation compared with our previous work to evaluate the detection accuracy. Compared with heuristic methods or behavior-based methods only, the proposed system which uses these methods plus signature-based method using shared signatures on the blockchain improved the false negative rate and the false positive rate.
-
The measurement of class cohesion using semantic approach Reviewed
Priyambadha B., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 2020 759 - 762 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The cohesion is one of the design quality indicators that can be measured by focusing on the correlation between elements inner the class. In Direct Distance Design Class Cohesion (D3C2) metrics, elements are assumed correlated if they have a similar type. In this research, the correlation between elements' inner class is not only based on type similarity but also on the meaning of the element’s name. The results confirm that the value of cohesion increases in line with the similarity of meaning.
-
Test cases redundant elimination on code coverage uses distance and correlation measurement method Reviewed
Saputra M.C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 2020 755 - 758 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The Euclidean distance and correlation measured by comparing the line executed by the test case to find the similarity of the test cases. The test cases have the lowest value of distance means highly similar and possible executing a similar line or path. The research tries to eliminate redundant test cases based on that similarity. Several redundant test cases are eliminated to get the best test cases. By Euclidean distance, the research can eliminate a similar test case on the test suite.
-
Shigyo Y., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 2020 763 - 766 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The natural language includes ambiguous expressions. VDM is one of methodology on the formal methods to write the specification without ambiguity. Because VDM++ is written by strict grammar, it is difficult to write a VDM++ specification. This research attempts to generate a VDM++ specification automatically from a natural language specification by machine learning. To generate a VDM++ specification, it is necessary to extract words which consist of predicate corresponding to the function and nouns corresponding to variable from the natural language specification. This paper proposes an approach to generate a VDM++ specification from the extracted words list. Identifiers are generated from the extracted words list, and then the VDM++ specification can be generated by converting them into VDM++ grammar.
-
On a user authentication method to realise an authentication system using s-EMG Reviewed
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
International Journal of Grid and Utility Computing 11 ( 5 ) 725 - 734 2020
Language:English Publishing type:Research paper (scientific journal) Publisher:International Journal of Grid and Utility Computing
© 2020 Inderscience Enterprises Ltd. To prevent shoulder-surfing attacks, we proposed a user authentication method using surface electromyogram (s-EMG) signals, which can be used to identify who generated the signals and which gestures were made. Our method uses a technique called 'pass-gesture', which refers to a series of hand gestures, to achieve s-EMG-based authentication. However, it is necessary to introduce computer programs that can recognise gestures from the s-EMG signals. In this paper, we propose two methods that can be used to compare s-EMG signals and determine whether they were made by the same gesture. One uses support vector machines (SVMs), and the other uses dynamic time warping. We also introduced an appropriate method for selecting the validation data used to train SVMs using correlation coefficients and cross-correlation functions. A series of experiments was carried out to confirm the performance of those proposed methods, and the effectiveness of the two methods was confirmed.
-
State transition tuple coverage criterion for extended place/transition net-based testing Reviewed
Takagi T., Kurozumi R., Katayama T.
Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2019-December 29 - 30 2019.12
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC
© 2019 IEEE. This paper shows a STT (State Transition Tuple) coverage criterion for extended place/transition net-based testing. A STT as a measuring object consists of state transitions whose execution may trigger a target failure. The test efficiency is evaluated based on the ratio of STTs executed by test cases.
-
Implementation of CAPTCHA suitable for mobile devices Reviewed
Aburada Kentaro, Usuzaki Shotaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 12 ) 601 - 605 2019.12
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHA is a technology designed to prevent automated programs (known as bots) from acquiring access to on-line accounts to send spam mail, manipulate vote numbers in on-line polls, or take other malicious actions. In addition, access to Web services has been incorporated into mobile devices, such as smartphones. However, because most CAPTCHAs are not designed for mobile devices, user-friendly CAPTCHA for mobile devices is required. Thus, we implemented CAPTCHA on mobile devices and evaluated its resistance to bots. Our CAPTCHA showed robustness against bots, with good usability.
-
An evaluation of the interactive video CAPTCHA method against automated attack Reviewed
Aburada Kentaro, Usuzaki Shotaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 12 ) 453 - 457 2019.12
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHA is designed to detect automated programs (called bots) by requiring them to perform tasks that are easy for humans but difficult for automations. CAPTCHAs are vulnerable to relay attacks in which the challenges are relayed to remote human-solvers. In our previous paper, we proposed an interactive video type CAPTCHA that is strongly resistant to relay attacks. However, a quantitative evaluation of resistance to automated attacks still has not been carried out. Herein, we implement an automated attack for applying to our CAPTCHA and evaluate its resistance to automated attacks. Our results show the robustness of our proposed method against mean shift algorithm.
-
Application of Pairwise Testing into BWDM which is a Test Case Generation Tool for the VDM++ Specification Reviewed
Katayama Tetsuro, Futa Hirakoba, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 6 ( 3 ) 143 - 147 2019.12
Language:English Publishing type:Research paper (scientific journal)
-
回路上の電圧値可視化による回路設計支援ツールADVISの開発 Reviewed
西田 龍登, 片山 徹郎
組込みシステムシンポジウム2019論文集 1 - 4 2019.9
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Implementation of Tamias to Check Production Rules for Parsing Expression Grammar Reviewed
Katayama Tetsuro, Miyaji Toshihiro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 6 ( 2 ) 123 - 127 2019.9
Language:English Publishing type:Research paper (scientific journal)
-
Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit Reviewed
( 2019 ) 1 - 4 2019.8