PiPS: an Effective Strategy and Approach for Privacy in Public Surveillance
Sajid Ahmed; Noriaki Yoshiura
7th International Conference on Machine Learning for Networking (MLN'2024), Volume:To appear, Jun. 2025, [Reviewed]
Towards Better Accuracy on Imbalance Image Datasets Using Image Augmentation and Convolutional Neural Networks. Sajid Ahmed; Noriaki Yoshiura; Saif Hassan; Adil Khan
7th International Conference on the Dynamics of Information Systems (DIS),
First page:189,
Last page:212, Feb. 2025,
[Reviewed]Research institution
DOI:https://doi.org/10.1007/978-3-031-81010-7_13DOI ID:10.1007/978-3-031-81010-7_13,
DBLP ID:conf/dis2/AhmedYHK24 Obfuscating LLVM IR with the Application of Lambda Calculus. Rei Kasuya; Noriaki Yoshiura
ACIIDS (2),
First page:27,
Last page:39, 2023,
[Reviewed]International conference proceedings
DOI:https://doi.org/10.1007/978-981-99-5837-5_3DOI ID:10.1007/978-981-99-5837-5_3,
DBLP ID:conf/aciids/KasuyaY23 Modeling and Verification of a Hybrid Model of Mobile Banking Based Branchless Banking System in E-Banking Using SPIN Tej Narayan Thakur; Noriaki Yoshiura
ACM International Conference Proceeding Series,
First page:149,
Last page:156, Feb. 2022,
[Reviewed]Branchless banking is known as "banking beyond branches"that bridges the gap between the banking institutions and the unbanked people of the rural areas and provides financial services at their doorstep/village by using banking agents. Banking agents employ electronic data capture (EDC) systems such as point of sale (POS) systems and payment cards and create a financial system accessible to all levels of society irrespective of the demographic and geographic conditions of the country. Mobile technologies are becoming more popular day by day among unbanked people. Banking agents can utilize mobile banking to operate branchless banking in rural areas that can be more convenient and cheaper than the overhead costs of POS systems. This paper proposes a new hybrid model of Mobile Banking-based Branchless Banking System (MB-BBS) that provides branchless banking services and mobile banking services to unbanked people in rural areas globally. This paper employs a process meta language (PROMELA) to specify system descriptions and security properties and builds a verification model of MB-BBS. Finally, MB-BBS is successfully verified using a simple PROMELA interpreter (SPIN). The SPIN verification results prove that the proposed MB-BBS is error-free, and banks can employ the MB-BBS model to provide enhanced banking services to unbanked people globally.
International conference proceedings
DOI:https://doi.org/10.1145/3524304.3524326Scopus:https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85132245666&origin=inwardScopus Citedby:https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=85132245666&origin=inwardDOI ID:10.1145/3524304.3524326,
SCOPUS ID:85132245666 AntiPhiMBS-TRN: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Transaction Level. Tej Narayan Thakur; Noriaki Yoshiura
Intelligent Information and Database Systems - 14th Asian Conference,
First page:595,
Last page:607, 2022,
[Reviewed]Springer, International conference proceedings
DOI:https://doi.org/10.1007/978-3-031-21967-2_48DOI ID:10.1007/978-3-031-21967-2_48,
DBLP ID:conf/aciids/ThakurY22 Smart Help Desk to support user's PC settings. Kohichi Ogawa; Nobukuni Hamamoto; Noriaki Yoshiura
ICCE-TW,
First page:527,
Last page:528, 2022,
[Reviewed]IEEE, International conference proceedings
DOI:https://doi.org/10.1109/ICCE-Taiwan55306.2022.9869137DOI ID:10.1109/ICCE-Taiwan55306.2022.9869137,
DBLP ID:conf/icce-tw/OgawaHY22 Modeling and Verification of Contactless Mobile Banking System in E-Banking Using SPIN. Tej Narayan Thakur; Noriaki Yoshiura
Computational Science and Its Applications - ICCSA 2021 - 21st International Conference,
First page:581,
Last page:597, 2021,
[Reviewed]Springer, International conference proceedings
DOI:https://doi.org/10.1007/978-3-030-86979-3_41DOI ID:10.1007/978-3-030-86979-3_41,
DBLP ID:conf/iccsa/ThakurY21 AntiPhiMBS-Auth: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Authentication Level. Tej Narayan Thakur; Noriaki Yoshiura
Database Systems for Advanced Applications. DASFAA 2021 International Workshops - BDQM, GDMA, MLDLDSA, MobiSocial, and MUST,
First page:365,
Last page:380, 2021,
[Reviewed]Springer, International conference proceedings
DOI:https://doi.org/10.1007/978-3-030-73216-5_25DOI ID:10.1007/978-3-030-73216-5_25,
DBLP ID:conf/dasfaa/ThakurY21 AntiPhiMBS: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Application Level. Tej Narayan Thakur; Noriaki Yoshiura
Intelligent Information and Database Systems - 13th Asian Conference(ACIIDS),
First page:399,
Last page:412, 2021,
[Reviewed]Springer, International conference proceedings
DOI:https://doi.org/10.1007/978-3-030-73280-6_32DOI ID:10.1007/978-3-030-73280-6_32,
DBLP ID:conf/aciids/ThakurY21 Identification of writing on bulletin board via tor Noriaki Yoshiura; Kaichiro Iida
ACM International Conference Proceeding Series,
First page:135,
Last page:139, Jan. 2020,
[Reviewed]© 2020 Association for Computing Machinery. In recent years, awareness of protection of personal information has been increased, and anonymous communication that enables communication with hiding personal information attracts attention. Tor (The Onion Router) realizes anonymous communication most widely, but this anonymization is used for crime. This paper aims to identify users who maliciously write to the Internet bulletin board using Tor. This paper proposes a method of detecting Tor packet of writing on bulletin board. This method captures Tor packets and decides whether the packets is used for writing on bulletin board by using fingerprint. This paper implements the method and experiments to evaluates the method. The result of experiments shows that identification of writing on bulletin websites which use usual CGI programs is not successful at high probability and that modifying CGI programs is useful for identification of writing on bulletin websites. The result also shows that identification of writing on bulletin websites is difficult if users write on bulletin websites and access other websites such as streaming websites.
ACM, International conference proceedings
DOI:https://doi.org/10.1145/3378936.3378967Scopus:https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85082001123&origin=inwardScopus Citedby:https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=85082001123&origin=inwardDOI ID:10.1145/3378936.3378967,
DBLP ID:conf/icsim/YoshiuraI20,
SCOPUS ID:85082001123 A Method of Collecting the IP Addresses of Hidden Server in Tor Networks. Noriaki Yoshiura; Kento Koizumi
Proceedings of the 9th International Conference on Software and Computer Applications(ICSCA),
First page:242,
Last page:246, 2020,
[Reviewed]ACM, International conference proceedings
DOI:https://doi.org/10.1145/3384544.3384589DOI ID:10.1145/3384544.3384589,
DBLP ID:conf/icsca/YoshiuraK20 Packet Reachability Verification in OpenFlow Networks. Noriaki Yoshiura; Keigo Sugiyama
Proceedings of the 9th International Conference on Software and Computer Applications(ICSCA),
First page:227,
Last page:231, 2020,
[Reviewed]ACM, International conference proceedings
DOI:https://doi.org/10.1145/3384544.3384573DOI ID:10.1145/3384544.3384573,
DBLP ID:conf/icsca/YoshiuraS20 Privacy Protection in Location Based Service by Secure Computation Masato Ishikawa; Noriaki Yoshiura
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
Volume:12034 LNAI,
First page:493,
Last page:504, 2020,
[Reviewed]© 2020, Springer Nature Switzerland AG. Mobile devices with Global Positioning System enable various kinds of location information searches using location based services (LBS). Location information and query contents of searchers are privacy information. Privacy protection requires to hide location information and query contents of searchers from not only third parties such as eavesdroppers but also location database servers which answer queries. This paper focuses on privacy protection in nearest neighbor search. There are several researches of secure computation in nearest neighbor search for other than LBS. This paper proposes a new method of privacy protection in LBS. The method is based on Asymmetric Scalar-product Preserving Encryption. This paper also shows that the proposed method is faster and more secure than conventional privacy protection methods in LBS.
Springer, International conference proceedings
DOI:https://doi.org/10.1007/978-3-030-42058-1_41Scopus:https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85082390021&origin=inwardScopus Citedby:https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=85082390021&origin=inwardDOI ID:10.1007/978-3-030-42058-1_41,
ISSN:0302-9743,
eISSN:1611-3349,
DBLP ID:conf/aciids/IshikawaY20,
SCOPUS ID:85082390021 A Method of Communication Control for Collecting Data of Mobile Robot that Monitor User's Network Equipment
小川康一; 吉浦紀晃; 小川康一; 吉浦紀晃
情報処理学会論文誌ジャーナル(Web), Volume:60, Number:3, First page:779, Last page:790, Mar. 2019, [Reviewed]
We have already proposed and developed a monitoring method by using small computers and web cameras to grasp the status of network equipment of users. Moreover, we have also developed a mobile robot that collects the monitoring information from monitoring devices. However, there is a problem that the communication between the monitoring devices and the mobile robot is not completed before the mobile robot moves leave the computers because the monitoring method does not consider the amount of data that are saved in each monitoring device and the communication quality between the mobile robot and the monitoring devices. In order to improve this problem, this paper proposes a new method of controlling the mobile robot to optimize the communication quality between the mobile robot and the monitoring devices. This paper also implements the proposed method and evaluates the effectiveness of the proposed method through experiments.
Japanese
ISSN:1882-7764, J-Global ID:201902264708803373, CiNii Articles ID:170000150198, CiNii Books ID:AN00116647
A Monitoring Method for Network Devices Using Mobile Robots and Small Computers
小川 康一; 吉浦 紀晃
情報処理学会論文誌, Volume:60, Number:2, First page:668, Last page:679, Feb. 2019, [Reviewed]
In Saitama University, users can freely use a variety of network devices in the network environments of the users. Therefore, there are many kinds of network devices in the university network, and the solutions of network troubles are complicated. To solve this problem, we have already proposed a monitoring method of network devices by using image processing. Each monitoring device in this method, however, needs a mobile network to inform the monitored information of network operators. If the monitoring devices increase, this method takes a high cost. To solve the problem, this paper proposes a method of collecting monitored information by using a remote-controlled mobile robot. In order to confirm the effectiveness of the proposed method, we conduct experiments where monitoring devices are attached to media converters of the university, and the mobile robot collects monitored information. Collecting one-hour monitored information takes 1 or 2 seconds. Collecting one-day monitored information takes about 5 seconds on average and about 9 seconds at a maximum. The experimental results show that the proposed method have communication ability equivalent to the previous research and collect monitored information in a short time. Compared to the previous research, the proposed method reduces the communication cost in an environment of monitoring many network devices.
Japanese
ISSN:1882-7764, CiNii Articles ID:170000150143, CiNii Books ID:AN00116647
Analysis of Questionnaire Result on Installing Security Cameras on School Routes
吉浦紀晃; 加藤蒼悟; 田北啓洋; 太田直哉; 藤井雄作
情報処理学会論文誌ジャーナル(Web), Volume:59, Number:3, First page:1106, Last page:1118, Mar. 2018, [Reviewed]
Today, security cameras are indispensable for crime investigations. It becomes common to use security cameras in shops or public spaces. Tokyo local gorvenmnet planed to install about 6,500 security cameras on school routes of about 1,300 public elementary schools. There has been never an idea that local gorvernments have the resposibility of security of school routes and use security cameras. The authors of this paper have been researching security cameras and did a questionnaire survey to all local gorvenments about installing security cameras on school routes. This paper shows the result of the questionnaire survey.
Japanese
ISSN:1882-7764, J-Global ID:201802282625549298, CiNii Articles ID:170000149399, CiNii Books ID:AN00116647
Development of Monitoring Equipment for Network Devices by Using Small Computers and Image-processing Technology
小川康一; 小川康一; 吉浦紀晃; 吉浦紀晃
情報処理学会論文誌ジャーナル(Web), Volume:59, Number:3, First page:1026, Last page:1037, Mar. 2018, [Reviewed]
In a university, users can freely use network equipment in the network of the university. Much of the network equipment does not deal with SNMP and even if SNMP is available, the network administrators cannot monitor the network equipment because it is of great variety. The network administrators, however, have to solve the network troubles that are caused by the network equipment in the user environment. To solve the network troubles is a big burden for network administrators. This paper suggests a system which reduces the burden for network administrators by checking a status of the network equipment of users through a web camera in conjunction with a small computer and by automatically determining whether the network equipment is at normal status or abnormal status. The system uses still images or videos that are obtained by the web camera. Whether the system uses still images or videos depends on which kinds of network troubles are focused on.
Japanese
ISSN:1882-7764, J-Global ID:201802268655260880, CiNii Articles ID:170000149390, CiNii Books ID:AN00116647
Development of a Support System to Resolve Network Troubles by Mobile Robots Kohichi Ogawa; Noriaki Yoshiura
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
Volume:11226 LNCS,
First page:209,
Last page:220, 2018,
[Reviewed]© 2018, Springer Nature Switzerland AG. Universities have campus networks and different network administration policies. In some universities, network users can install network devices, which are printers, routers or Ethernet switches, in the networks of the rooms of users for themselves. All the users are not familiar with IT and cannot resolve the network troubles whose causes are the installed network devices. The users ask campus network operators of the universities to resolve the troubles instantaneously, but the operators do not know the network environment of the users or resolve the troubles. The network devices do not have management functions such SNMP because the users do not think that the functions are necessary. These network troubles are burdens of campus network operators and increase the cost of network administration. This paper proposes the support system which resolves the network troubles in the user network environments. This paper also implements and evaluates the support system.
Springer, International conference proceedings
DOI:https://doi.org/10.1007/978-3-030-02738-4_18Scopus:https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85055647084&origin=inwardScopus Citedby:https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=85055647084&origin=inwardDOI ID:10.1007/978-3-030-02738-4_18,
ISSN:0302-9743,
eISSN:1611-3349,
DBLP ID:conf/idcs/OgawaY18,
SCOPUS ID:85055647084 Model checking of TTCAN protocol using UPPAAL Liu Shuxin; Noriaki Yoshiura
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
Volume:10963 LNCS,
First page:550,
Last page:564, 2018,
[Reviewed]© Springer International Publishing AG, part of Springer Nature 2018. Recent years, vehicles are becoming more and more intelligent and automatic. Some experts estimate that more than 80% of all current innovations within vehicles are based on distributed electronic systems. The critical parts of such systems are the services provided by the underlying distributed control networks. TTCAN is the extension of the standard Controller Area Network (CAN), which is the most widely adopted in-vehicle network. As the complexity of TTCAN protocol, formal verification is the best choice to verify the specification correctness of TTCAN protocol. The previous researches are only able to verify the models of TTCAN protocol with no more than three nodes. If there are four nodes in the model, it meets two problems: state space explosion and magnanimous verification time. This paper proposes a novel method and the model of TTCAN protocol with 4 nodes can be verified. TTCAN is the extension of the standard Controller Area Network (CAN), which is the most widely adopted in-vehicle network.
Springer, International conference proceedings
DOI:https://doi.org/10.1007/978-3-319-95171-3_43Scopus:https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85050002176&origin=inwardScopus Citedby:https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=85050002176&origin=inwardDOI ID:10.1007/978-3-319-95171-3_43,
ISSN:0302-9743,
eISSN:1611-3349,
DBLP ID:conf/iccsa/LiuY18,
SCOPUS ID:85050002176 A browser application for keyword recommendation based on user web search Chen Kuo; Noriaki Yoshiura
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
Volume:10962 LNCS,
First page:147,
Last page:162, 2018,
[Reviewed]© Springer International Publishing AG, part of Springer Nature 2018. Keywords are the words and phrases that are typed into the search box of a search engine such as Google by the Internet users to find out the Web sites that match what the Internet users are trying to find. Keywords can reflect the preferences and needs of users. Keyword recommendation of search engine is a good way to quickly find the target information. Although third-party Web tracking and Google Analytic can analyze keywords of users, both of them work for commercial advertising. Our goal is to provide some tailor-made keywords for users in the browser. We help users find out the keywords that they may be interested in. This paper introduces a browser application that recommends users keywords by analyzing data of the users.
Springer, International conference proceedings
DOI:https://doi.org/10.1007/978-3-319-95168-3_10Scopus:https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85049917979&origin=inwardScopus Citedby:https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=85049917979&origin=inwardDOI ID:10.1007/978-3-319-95168-3_10,
ISSN:0302-9743,
eISSN:1611-3349,
DBLP ID:conf/iccsa/KuoY18,
SCOPUS ID:85049917979 The Relation Between Syntax Restriction of Temporal Logic and Properties of Reactive System Specification Noriaki Yoshiura
INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2017), PT II,
Volume:10192,
First page:105,
Last page:114, 2017,
[Reviewed]Open reactive systems provide services to users by interacting the users and environments of the systems. There are several methods that describe formal specifications of reactive systems. Temporal logic is one of the methods. An open reactive system specification is defined to be realizable if and only if there is a program that satisfies the specification even if the environment and the users of the reactive system take any behaviors. There are several kinds of the methods of deciding realizability of open reactive system. These methods are based on automata theory and their complexities are at least double exponential times of the length of a specification. This paper shows the relation between a syntax and realizability properties of reactive system specifications. This relation can reduce the complexity of deciding the properties of reactive system specifications.
SPRINGER INT PUBLISHING AG, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-319-54430-4_11DOI ID:10.1007/978-3-319-54430-4_11,
ISSN:0302-9743,
DBLP ID:conf/aciids/Yoshiura17,
Web of Science ID:WOS:000401653300011 Computational Verification of Network Programs for Several OpenFlow Switches in Coq Hiroaki Date; Noriaki Yoshiura
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2016, PT II,
Volume:9787,
First page:223,
Last page:238, 2016,
[Reviewed]OpenFlow is a network technology that enables to control network equipment centrally, to realize complicated forwarding of packets and to change network topologies flexibly. In OpenFlow networks, network equipment is separated into OpenFlow switches and OpenFlow controllers. OpenFlow switches do not have controllers that usual network equipment has. OpenFlow controllers control OpenFlow switches. OpenFlow controllers are configured by programs. Therefore, network configurations are realized by software. This kind of software can be created by several kinds of programming languages. NetCore is one of them. The verification method of NetCore programs has been introduced. This method uses Coq, which is a formal proof management system. This method, however, deals with only networks that consist of one OpenFlow switch. This paper proposes a methodology that verifies networks that consist of several OpenFlow switches.
SPRINGER INT PUBLISHING AG, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-319-42108-7_17DOI ID:10.1007/978-3-319-42108-7_17,
ISSN:0302-9743,
DBLP ID:conf/iccsa/DateY16,
Web of Science ID:WOS:000381934000017 Abuse Prevention of Street Camera Network by Browsing-History DisclosureYusaku Fujii; Noriaki Yoshiura; Naoya Ohta; Akihiro Takita; Hiroshi Ueda; Koichi Maru
The Journal of Community Informatics,
Volume:12,
Number:1,
First page:152,
Last page:156, 2016,
[Reviewed]A street camera network, in which many street cameras are installed at a high density, similar to street lights throughout a nation, will have a stronger positive effect in suspect tracking and crime deterrence in the near future. On the other hand, it will also have a stronger negative effect related to the violation of privacy of ordinary citizens. In order to make such a stronger surveillance camera system, which forcibly captures the images of passersby for the public interest, be accepted as an essential social infrastructure by a society, it is necessary for this camera system to make ordinary citizens be convinced that it is used only for the public interest. To realize this, a new concept, in which the abuse of a street camera network is deterred by browsing-history disclosure, is proposed.
University of Waterloo, Scientific journal
DOI:https://doi.org/10.15353/joci.v12i1.3216DOI ID:10.15353/joci.v12i1.3216,
eISSN:1712-4441 Abuse Prevention of Street Camera Network by Browsing-History Disclosure
Yusaku Fujii; Noriaki Yoshiura; Naoya Ohta; Akihiro Takita
2015 4TH INTERNATIONAL CONFERENCE ON INSTRUMENTATION, COMMUNICATIONS, INFORMATION TECHNOLOGY, AND BIOMEDICAL ENGINEERING (ICICI-BME), First page:17, Last page:17, 2015, [Reviewed]
IEEE, English, International conference proceedings
Web of Science ID:WOS:000380425600006
Implementation of Theorem Prover of Relevant Logic Noriaki Yoshiura
CURRENT APPROACHES IN APPLIED ARTIFICIAL INTELLIGENCE,
Volume:9101,
First page:13,
Last page:22, 2015,
[Reviewed]The formalization of human deductive reasoning is a main issue in artificial intelligence. Although classical logic is one of the most useful ways for the formalization, the material implication of classical logic has some fallacies. Relevant logic has been studied for the removal of material implication fallacies in classical logic for the formalization of human deductive reasoning. Relevant logic ER is free from fallacies of material implication and has more provability than typical relevant logic R. Moreover, ER has a decision procedure, even though almost all relevant logics are undecidable. This is one of the reasons why ER is an appropriate logic for the formalization of human deductive reasoning. This paper implements automated theorem prover of Relevant logic ER and experiments on this theorem prover to check the processing time of implemented automated theorem prover.
SPRINGER-VERLAG BERLIN, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-319-19066-2_2DOI ID:10.1007/978-3-319-19066-2_2,
ISSN:0302-9743,
DBLP ID:conf/ieaaie/Yoshiura15,
Web of Science ID:WOS:000363236300002 Implementation of Decision Procedure of Stepwise Satisfiability of Reactive System Specifications Noriaki Yoshiura; Yuma Hirayanagi
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT IV,
Volume:9158,
First page:686,
Last page:698, 2015,
[Reviewed]Reactive systems ideally never terminate and maintain some interaction with their environment. Temporal logic is one of the methods for formal specification description of reactive systems. For a reactive system specification, we do not always obtain a program that satisfies it because the reactive system program must satisfy the specification no matter how the environment of the reactive system behaves. This problem is known as realizability or feasibility. The complexity of deciding realizability of specifications that are described in linear temporal logic is double or triple exponential time of the length of specifications and realizability decision is impractical. This paper implements stepwise satisfiability decision procedure with tableau method and proof system. Stepwise satisfiability is one of the necessary conditions of realizability of reactive system specifications. The proposed procedure decides stepwise satisfiability of reactive system specifications.
SPRINGER-VERLAG BERLIN, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-319-21410-8_52DOI ID:10.1007/978-3-319-21410-8_52,
ISSN:0302-9743,
DBLP ID:conf/iccsa/YoshiuraH15,
Web of Science ID:WOS:000364988500052 Extracting Environmental Constraints in Reactive System Specifications Yuichi Fukaya; Noriaki Yoshiura
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT IV,
Volume:9158,
First page:671,
Last page:685, 2015,
[Reviewed]Reactive systems ideally never terminate and maintain some interaction with their environment. Temporal logic is one of the methods for formal specification description of reactive systems. For a reactive system specification, we do not always obtain a program that satisfies it because the reactive system program must satisfy the specification no matter how the environment of the reactive system behaves. This problem is known as realizability or feasibility. The complexity of deciding realizability of specifications that are described in linear temporal logic is double or triple exponential time of the length of specifications and realizability decision is impractical. To check reactive system specifications, Strong satisfiability is one of the necessary conditions of realizability of reactive system specifications. If a reactive system specification is not strong satisfiable, it is necessary to revise the specification. This paper proposes the method of revising reactive system specifications that are not strong satisfiable. This method extracts environmental constraints that are included in reactive system specifications.
SPRINGER-VERLAG BERLIN, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-319-21410-8_51DOI ID:10.1007/978-3-319-21410-8_51,
ISSN:0302-9743,
DBLP ID:conf/iccsa/FukayaY15,
Web of Science ID:WOS:000364988500051 Abuse Prevention of Street Camera Network by Browsing-History Disclosure
Yusaku Fujii; Noriaki Yoshiura; Naoya Ohta; Akihiro Takita
2015 4TH INTERNATIONAL CONFERENCE ON INSTRUMENTATION, COMMUNICATIONS, INFORMATION TECHNOLOGY, AND BIOMEDICAL ENGINEERING (ICICI-BME), Volume:12, Number:1, First page:17, Last page:17, 2015, [Reviewed]
IEEE, English, International conference proceedings
DBLP ID:journals/jci/FujiiYOTUM16, Web of Science ID:WOS:000380425600006
Shopping street safety using all-in-one-type security cameras
Kosuke Muramatsu; Mizuki Ishizawa; Akihiro Takita; Noriaki Yoshiura; Naoya Ohta; Koichi Maru; Hiroshi Ueda; Yusaku Fujii
ICIC Express Letters, Volume:8, First page:3001, Last page:3006, Dec. 2014, [Reviewed]
© 2014 ICIC International. In this paper, we review an “all-in-one-type” stand-alone security camera that is developed for the e-JIKEI Network, which is a network that is designed to allow residents to view their surroundings remotely using an all-in-one-type security camera. We developed an all-in-one device called the “e-JIKEI Camera”. However, the “e-JIKEI Camera” was too expensive to be installed in individual homes. Therefore, in this study, we develop a relatively inexpensive “all-in-one-type” security camera. A social experiment with the all-in-one-type camera is carried out. The experiment is designed to monitor safety in shopping street areas. We also propose a guideline for security camera operations in order to protect the privacy of ordinary citizens. The effectiveness of the security camera and privacy protection using the guidelines are proved by the social experiment. Our social experiments have led to the introduction of the many security cameras to the shopping street areas.
English, Scientific journal
ISSN:1881-803X
合格発表時における大学Webサイトへの大量アクセス対応について
小川康一; 吉浦紀晃
学術情報処理研究(CD-ROM), Number:18, First page:33, Last page:42, Sep. 2014, [Reviewed]
学術情報処理研究編集委員会, Japanese
ISSN:2188-9511, J-Global ID:201502235674382835, CiNii Articles ID:40020248146
Review of the e-JIKEI Network: Security camera system for privacy protection and community safety Akihiro Takita; Naoya Ohta; Yusaku Fujii; Hiroshi Ueda; Noriaki Yoshiura; Koichi Maru
2014 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2014,
[Reviewed]We review our proposed concept, the "e-JIKEI Network", and relating social activities. Recently, security camera has attracted considerable attention for improving security in public places such as the station, shop, and street which is full of people's traffic. However, in the local community which is more important for individual person, installing of security camera makes little progress because of high installation cost and the problem of violation of privacy. To solve these problems and promote the installation of security camera, we established "The e-JIKEI Network Promotion Institute" (http://www.e-jikei.org/index_e.html) and developed two types of security camera systems. In order to reduce the installation cost, we developed computer-based security camera system named "Dairi-EYE" series and a stand-alone type security camera. The Dairi-EYE series can construct a security camera system with a computer and inexpensive cameras connected by using USB and LAN. The stand-alone type security camera can work with power-supply only and don't require wiring for video and network cables which raises the installation cost. To solve invading of privacy, we proposed privacy protection concept and introduced it into the Dairi-EYE and a stand-alone camera. A lot of social experiments using our security camera system have been carried out.
IEEE, English, International conference proceedings
DOI:https://doi.org/10.1109/ICIEV.2014.6850855DOI ID:10.1109/ICIEV.2014.6850855,
Web of Science ID:WOS:000346137900176 Resolving Fallback and Path MTU Problems Caused by Denying ICMP Packets in IPv6. Noriaki Yoshiura; Keita Omi
Internet and Distributed Computing Systems - 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014. Proceedings,
First page:227,
Last page:236, 2014,
[Reviewed]Springer
DOI:https://doi.org/10.1007/978-3-319-11692-1_20DOI ID:10.1007/978-3-319-11692-1_20,
DBLP ID:conf/idcs/YoshiuraO14 Static Data Race Detection for Java Programs with Dynamic Class Loading. Noriaki Yoshiura; Wei Wei
Internet and Distributed Computing Systems - 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014. Proceedings,
First page:161,
Last page:173, 2014,
[Reviewed]Springer
DOI:https://doi.org/10.1007/978-3-319-11692-1_14DOI ID:10.1007/978-3-319-11692-1_14,
DBLP ID:conf/idcs/YoshiuraW14 Network operational Method by using Software-Defined Networking for Improvement of Communication Quality at Disasters Koichi Ogawa; Noriaki Yoshiura
2014 16th Asia-Pacific Network Operations and Management Symposium (APNOMS),
First page:1,
Last page:4, 2014,
[Reviewed]The Great East Japan Earthquake, which occurred in March 2011, damaged information infrastructure. Latest researches showed that some parts of communication networks are available even immediately after the earthquake. Therefore, connections among the different available parts of communication networks can keep communication quality for damaged areas at disasters. Recently, "Software-Defined Networking (SDN)" is one of the up-and-coming network configuration technologies. SDN is useful for the network operation and connection quality at disasters. This paper describes the problems of the information infrastructure at disasters, proposes a network operation method at disasters using SDN to keep connection quality for disaster areas and implements the proposed method.
IEEE, English, International conference proceedings
DOI:https://doi.org/10.1109/APNOMS.2014.6996602DOI ID:10.1109/APNOMS.2014.6996602,
DBLP ID:conf/apnoms/OgawaY14,
Web of Science ID:WOS:000392821700100 Effects and Plans of Rolling Black Outs of University in the Metropolitan Area on Great East Japan Earthquake
小川康一; 吉浦紀晃
情報処理学会論文誌ジャーナル(CD-ROM), Volume:54, Number:3, First page:1028, Last page:1037, Mar. 2013, [Reviewed]
2011年3月11日に発生した東日本大震災は,東北地方を中心に大きな被害をもたらした.大震災によって,信頼していた通信手段であるインターネットや固定電話や携帯電話の利用に支障が出た.Webサーバが稼働せずに情報発信ができないことも問題となった.震源地から遠く離れた埼玉大学では,地震による直接の被害はなかったものの,その後のエネルギー問題に起因する計画停電などによって間接的に影響が出た.通常,停電への対応としては発電機の利用があるが,計画停電への対応を発電機で行うことは困難であった.そこで,埼玉大学ではデータセンターとVirtual Private Serverを活用することで計画停電に対応した.そのため情報基盤が停止することはなく,学生や教職員はメールやWebによる情報の伝達を継続することができた.このようなコミュニケーション基盤は大学のような教育機関だけでなく,企業や公共機関における安否確認や連絡手段の確保に重要な機能となっている.本論文では,埼玉大学における震災への対応,今回の震災から得た教訓,震災対策について述べる.The Great East Japan Earthquake, which occurred on March 11th 2011, caused significant damage around Tohoku region in Japan. The earthquake was detrimental to reliable communication means such as the Internet, land phones and mobile phones. The earthquake also caused unavailability of web servers; inability to put out information on the Internet became a serious problem. Saitama University is far from the epicenter of the earthquake and the damage at the university was small. However, the university was indirectly affected by rolling blackouts due to energy problems. One of the countermeasures of blackouts is to use power generators, but it is difficult to deal with rolling blackouts only by power generators. The university responded to rolling blackouts by Data Center and Virtual Private Server and could maintain communications among students and staff of the university via e-mail or web servers during blackouts. Maintenance of communication infrastructure such as e-mail or web servers is important for safety confirmation system and communication means not only at education institutions such as universities but also at corporations and public institutions. This paper describes the handling of the earthquake at the university and lessons from earthquake, and discusses earthquake countermeasures for information infrastructure.
情報処理学会, Japanese
ISSN:1882-7837, J-Global ID:201302246004368278, CiNii Articles ID:110009552588
Static Data Race Detection for Java Programs with Dynamic Class Loading by Analysis of String Expressions
WEI Wei; 吉浦紀晃
情報処理学会論文誌ジャーナル(CD-ROM), Volume:54, Number:2, First page:787, Last page:796, Feb. 2013, [Reviewed]
マルチスレッドプログラムでは,スレッド間の排他制御においてミスが起こりやすい.排他制御が正しく行われないことに起因するエラーの1つとしてデータレースがある.データレース検出には動的手法と静的手法があり,動的手法はプログラム実行を通して得られた情報を解析することでデータレースを検出する.静的手法はプログラムのソースコードを調べることでデータレースを検出する.Javaプログラムの静的データレース検出方法がすでに提案されているが,この静的データレース検出方法では動的クラスローディングが無視されている.そこで本論文では静的データレース検出方法における動的クラスローディングへの対策の方法を提案し,プログラムを実装する.さらに,開発したプログラムでJavaプログラムのデータレースの検出を試行し,新たにデータレースを起こす箇所を発見した.これにより,本論文の検出プログラムの有効性を示した.Multi-thread programs are likely to have bugs in mutual exclusions between threads. Data race is one of the problems that occur from wrong mutual exclusions. There are two kinds of methods of data race detection: dynamic analysis detection and static analysis detection. Dynamic analysis detection is to detect data race by analyzing the results of program executions. Static analysis detection is to detect data race by analyzing source codes of programs. A method of static analysis detection of data race for Java programs has been proposed, but this method cannot deal with dynamic class loading. This paper proposes a method of static analysis detection of data race for dynamic class loading and implements this method. The experiment of this paper uses this method for Java programs that have dynamic class loading. This experiment shows that the proposed method can find possibilities of data race in Java programs more than previous data race detection methods.
情報処理学会, Japanese
ISSN:1882-7837, J-Global ID:201302215773995541, CiNii Articles ID:110009537077
Indicating important parts in searched web pages by retrieval keywords Shunichi Yokoo; Noriaki Yoshiura
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
Volume:8178,
First page:250,
Last page:263, 2013,
[Reviewed]Users cannot always find retrieval keywords immediately in web pages that are obtained by search engines. There are several reasons, one of which is that the retrieval keywords are hidden in searched web pages. To solve the problem, this paper develops software that indicates important HTML elements in searched web pages. The software finds HTML elements that are the most closely related with the retrieval keywords and indicates important part in searched web pages. This paper also evaluates the software by experiments. The results of the experiments show that the software can indicate important parts more correctly than existing similar software and reduce time taken to find the retrieval keywords in searched web pages. © Springer International Publishing Switzerland 2013.
Springer Verlag, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-319-04048-6_22DOI ID:10.1007/978-3-319-04048-6_22,
ISSN:1611-3349,
DBLP ID:conf/pakdd/YokooY13,
SCOPUS ID:84894135788 Smart street light system with energy saving function based on the sensor network. Yusaku Fujii; Noriaki Yoshiura; Akihiro Takita; Naoya Ohta
The Fourth International Conference on Future Energy Systems, e-Energy '13, Berkeley, CA, USA, May 22-24, 2013,
First page:271,
Last page:272, 2013,
[Reviewed]ACM
DOI:https://doi.org/10.1145/2487166.2487202DOI ID:10.1145/2487166.2487202,
DBLP ID:conf/eenergy/FujiiYTO13 Construction and verification of Mobile Ad Hoc Network Protocols Natsuki Kimura; Noriaki Yoshiura
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
Volume:8300,
First page:198,
Last page:212, 2013,
[Reviewed]In recent years, Mobile Ad hoc Networks (MANETs) have been focused with the development and the spread of mobile devices. However, MANETs have a security problem. MANETs do not have choke points like Firewalls. It is difficult for MANETs to have choke points because each mobile device in MANETs moves and because fixed routing does not exist. Moreover there are many kinds of attacks in MANETs such as packet sniffing, tampering, spoofing, etc. Gang Xu et al. proposed a method for constructing secure MANETs. The method is considered to prevent attacks against MANETs because each mobile device in MANETs uses Trusted Platform Module (TPM). TPM can become foundation of security because Tamper-resistance of TPM is difficult to analyze. However, Gang Xu et al. does not present the concrete protocol. This paper constructs the concrete protocol from the proposal of Gang Xu et al and verifies the concrete protocol by SPIN to construct secure protocol. This paper presents the process of constructing secure protocols from ideas of protocols. As a result of constructing and verifying the protocols, this paper concludes that the secure protocol cannot be constructed from the proposal of Gang Xu et al without the connection with certificate authority (CA) of public keys. © Springer International Publishing Switzerland 2013.
Springer, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-319-03584-0_15DOI ID:10.1007/978-3-319-03584-0_15,
ISSN:0302-9743,
DBLP ID:conf/css/KimuraY13,
SCOPUS ID:84894116607 Smart street light system looking like usual street lights based on sensor networks Noriaki Yoshiura; Yusaku Fujii; Naoya Ohta
13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013,
First page:633,
Last page:637, 2013,
[Reviewed]Currently, in the whole world, enormous electric energy is consumed by the street lights, which are automatically turn on when it becomes dark and automatically turn off when it becomes bright. This is the huge waste of energy in the whole world and should be changed. This paper discusses a smart street light system, whose concept is proposed by Fujii et al. The main aim of smart street light systems is that lights turn on when needed and light turn off when not needed. Moreover, the smart street light system in this paper behaves like usual street lights that turn on all night. The ideal behavior of the smart street light system is that no one finds turn-off of street lights at night. Whenever someone see street lights, they turn on and whenever no one see street lights, they turn off. The smart street light system consists of LED lights, brightness sensors, motion sensors and short-distance communication networks. The lights turn on before pedestrians and vehicles come and turn off or reduce brightness when there is no one. It will be difficult for pedestrians and drivers of vehicles to distinguish our smart street lights and the conventional street lights because our street lights all turn on before they come. © 2013 IEEE.
English, International conference proceedings
DOI:https://doi.org/10.1109/ISCIT.2013.6645937DOI ID:10.1109/ISCIT.2013.6645937,
SCOPUS ID:84891075985 Detection of the Music or Video Files in BitTorrent
Zhou Zhiqiang; Noriaki Yoshiura
THEORY AND PRACTICE OF COMPUTATION, Volume:5, First page:202, Last page:213, 2012, [Reviewed]
Nowadays the Internet has been spreading widely all over the world and the network traffic has been increasing rapidly in the Internet. Peer-To-Peer (P2P) networks have been used widely in order to deliver operating system DVD image or several packages of commercial software, but everyone does not always use P2P networks rightly or legally. One of the examples of illegal usage of P2P networks is to exchange the audio or video files which violate copyrights. BitTorrent is one of the P2P networks that are used relatively rightly. This paper proposes the method which detects illegal file exchange of BitTorrent. This paper regards video or music files exchanged by BitTorrent as illegal files and proposes the method which detects the video or music files exchanged by BitTorrent. This paper also implements this method in BitTorrent software and evaluates this method.
SPRINGER, English, International conference proceedings
ISSN:1867-2914, Web of Science ID:WOS:000317053700016
Operational experiences from the viewpoint of university it system administrators in the metropolitan area on east Japan great earthquake Kohichi Ogawa; Noriaki Yoshiura
SIGUCCS'12 - ACM Proceedings of the SIGUCCS Annual Conference,
First page:239,
Last page:243, 2012,
[Reviewed]Saitama University is located in the metropolitan area of Japan. In March 2011 on the East Japan Great Earthquake occurred. The university is about 200 km from the epicenter of the earthquake. While the earthquake did not have a direct impact on the university, it did result in multiple indirect damages. The earthquake influenced operations of the university's information infrastructure, whose system administrators had to take several operations in order to keep the infrastructure service functioning. One of the damages of the earthquake was a rolling blackout. The earthquake caused damages to various electric power plants, including Fukushima Daiichi Nuclear Power Plant. The area in and around Tokyo, the Metropolitan Area in Japan, was short of electric power, and rolling blackouts were unavoidable. Some important servers, such as web servers and e-mail, could not run because the rolling blackouts frequently caused hardware troubles. As a result, it was difficult for the people of the university to use communication tools such as email, web and so on. This paper explains operational experiences and lessons based on the experiences from the viewpoint of system administrators in Saitama University
the article also discusses operation and management of information systems in disasters. Copyright © 2012 ACM.
ACM, English, International conference proceedings
DOI:https://doi.org/10.1145/2382456.2382515DOI ID:10.1145/2382456.2382515,
DBLP ID:conf/siguccs/OgawaY12,
SCOPUS ID:84869169126 Stepwise satisfiability checking procedure for reactive system specifications by tableau method and proof system Yoshinori Neya; Noriaki Yoshiura
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
Volume:7635,
First page:283,
Last page:298, 2012,
[Reviewed]Open reactive systems are systems that ideally never terminate and are intended to maintain some interaction with their environment. Temporal logic is one of the methods for formal specification description of open reactive systems. For an open reactive system specification, we do not always obtain a program satisfying it because the open reactive system program must satisfy the specification no matter how the environment of the open reactive system behaves. This problem is known as realizability and the complexity of realizability check is double or triple exponential time of the length of specification formula and realizability checking of specifications is impractical. This paper implements stepwise satisfiability checking procedure with tableau method and proof system. Stepwise satisfiability is one of the necessary conditions of realizability of reactive system specifications. The implemented procedure uses proof system that is introduced in this paper. This proof system can accelerate the decision procedure, but since it is imcomplete it cannot itself decide the realizability property of specifications. The experiment of this paper shows that the implemented procedure can decide the realizability property of several specifications. © 2012 Springer-Verlag.
Springer, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-642-34281-3_21DOI ID:10.1007/978-3-642-34281-3_21,
ISSN:0302-9743,
DBLP ID:conf/icfem/NeyaY12,
SCOPUS ID:84871650261 Applying Tesseract-OCR to detection of image spam mails Daisuke Yamakawa; Noriaki Yoshiura
14th Asia-Pacific Network Operations and Management Symposium: "Management in the Big Data and IoT Era", APNOMS 2012 - Final Program,
First page:1,
Last page:4, 2012,
[Reviewed]This paper applies Tesseract-OCR, optical character recognition software, to image spam mail filters. Tesseract-OCR can be specific to a certain language and this paper makes Tesseract-OCR specific to spam words. This specialization decreases times and CPU power that it takes to check whether images of mails include spam words. This paper examines the ability of the spam mail filter of Tesseract-OCR by experiment. © 2012 IEEE.
IEEE, English, International conference proceedings
DOI:https://doi.org/10.1109/APNOMS.2012.6356068DOI ID:10.1109/APNOMS.2012.6356068,
DBLP ID:conf/apnoms/YamakawaY12,
SCOPUS ID:84871654382 Test tool for equivalence of access control list Hirokazu Sayama; Noriaki Yoshiura
14th Asia-Pacific Network Operations and Management Symposium: "Management in the Big Data and IoT Era", APNOMS 2012 - Final Program,
First page:1,
Last page:4, 2012,
[Reviewed]Computer network security is one of the important issues in the Internet age. Network administrators of organizations such as companies or universities filter IP packets at network equipment such as Layer 3 switch or firewall between their organizations and the Internet to keep the security of the computer networks. One of the expressions of the filtering rules of IP packets is access control list. Access control lists are lists of rules, which describe permission or denial of packet transition based on source IP address, destination IP address, port numbers and so on. Access control lists are not always fixed
network administrators change access control lists according to the change of network topology or network security policy. After several changes, access control lists may include redundancies and network administrators have to modify the access control list to remove redundancies. This modification must keep the semantics of access control list. After modification, the network administrators must confirm that the semantics of access control list does not change. One of the methods of equivalence of two access control lists is to send test IP packets to the network equipment that filters IP packets and to check the transitions of the IP packets. This paper proposes the method of generating test packets to confirm the equivalence of two access control lists. © 2012 IEEE.
IEEE, English, International conference proceedings
DOI:https://doi.org/10.1109/APNOMS.2012.6356103DOI ID:10.1109/APNOMS.2012.6356103,
DBLP ID:conf/apnoms/SayamaY12,
SCOPUS ID:84871666951 e-JIKEI Network using e-JIKEI Cameras: Community security using considerable number of cheap stand-alone cameras Yusaku Fujii; Koichi Maru; Kojiro Kobayashi; Noriaki Yoshiura; Naoya Ohta; Hiroshi Ueda; Preecha Yupapin
SAFETY SCIENCE,
Volume:48,
Number:7,
First page:921,
Last page:925, Aug. 2010,
[Reviewed]The e-JIKEI Network, a concept for realizing a safer and more comfortable community, and the e-JIKEI Camera, a stand-alone camera developed for the e-JIKEI Network, are reviewed. The concept of the e-JIKEI Network is that residents view their surroundings using cheap cameras, which act as their eyes, and home computers, which act as their brains, using the free software provided by us through the Internet. For the complete protection of the privacy of ordinary citizens, we propose a second concept supporting the concept of the e-JIKEI Network; in this concept, those who own and manage images (owners) and those who have the right to view these images (viewers) are separated by means of image encryption. Since 2004, the "Dairi-EYE" series, a free software for a personal computer (PC)-based system, has been distributed through our website. However, the use of PCs is not very user-friendly. Therefore, an all-in-one device called the "e-JIKEI Camera" has been developed. A social experiment of the e-JIKEI Network using e-JIKEI Cameras has been carried out. (C) 2010 Elsevier Ltd. All rights reserved.
ELSEVIER SCIENCE BV, English, Scientific journal
DOI:https://doi.org/10.1016/j.ssci.2010.03.018DOI ID:10.1016/j.ssci.2010.03.018,
ISSN:0925-7535,
Web of Science ID:WOS:000278038100010 COMMUNITY SECURITY BY WIDELY AVAILABLE INFORMATION TECHNOLOGY WITH ALTRUISM Introduction of system and prospects for realizing e-JIKEI Network
丸浩一; 藤井雄作; 杉田陽市; 太田直哉; 吉浦紀晃; 上田浩; 白木慎也
建築雑誌, Volume:125, Number:1599, First page:99, Last page:104, Jan. 2010, [Reviewed]
A novel concept on operating security camera system, "e-JIKEI Network", attempts on the introduction of systems, and prospects for the concept are described. The basic concept of "e-JIKEI Network" is that a community will have a strong ability to prevent crime only if some residents keep watch on what happens around their houses using information technology. Community safety would thus be realized by the voluntary cooperation and altruism of ordinary citizens. On the introduction of the systems, altruistic mind of the citizens has been enhanced, and consequently, the systems have been successfully introduced to residential districts and schools.
一般社団法人日本建築学会, Japanese
ISSN:0003-8555, J-Global ID:201002266128353162, CiNii Articles ID:110007522840
Creating worldwide community safety with present technology and privacy protection: The e-JIKEI Network project Kohjiro Kobayashi; Koichi Maru; Naoya Ohta; Noriaki Yoshiura; Hiroshi Ueda; Preecha Yupapin; Yusaku Fujii
1ST INTERNATIONAL CONFERENCE ON SECURITY CAMERA NETWORK, PRIVACY PROTECTION AND COMMUNITY SAFETY 2009,
Volume:2,
Number:1,
First page:6,
Last page:13, 2010,
[Reviewed]In this paper, the e-JIKEI Network project, a project for creating community safety with present day technology, is reviewed With the e-JIKEI Network, each individual watches around his/her house using cameras as his/her eyes, a computer as his/her brain, and software. For privacy protection, we propose the e-JIKEI with Privacy Protection, in which people who own and manage images (the owner) and people who have the right to view the images (the viewer) are separated by the encryption of the images. In order to evaluate our concept, social experiments have been performed. The present status and future prospects have been discussed in detail. (C) 2009 Published by Elsevier Ltd.
ELSEVIER SCIENCE BV, English, International conference proceedings
DOI:https://doi.org/10.1016/j.sbspro.2010.01.005DOI ID:10.1016/j.sbspro.2010.01.005,
ISSN:1877-0428,
Web of Science ID:WOS:000281956700001 Restrained surveillance towards community benefit Sabaragamu Koralalage Krishan; Noriaki Yoshiura
1ST INTERNATIONAL CONFERENCE ON SECURITY CAMERA NETWORK, PRIVACY PROTECTION AND COMMUNITY SAFETY 2009,
Volume:2,
Number:1,
First page:28,
Last page:35, 2010,
[Reviewed]Today, there are millions of surveillance cameras monitoring and recording day to day activities of people in the sake of safety and security of general public. However, like double-edged sword, there are both pros and cons when using such technology to protect people. Some of the advantages like detecting abnormal behaviors, identifying theft attempts of evidence for crime scene, etc., are overrun by the abilities of abusing the same technology in several ways due to the miniaturization and lack of limits or controls on their use. Especially miniaturization with latest technological development has enabled setting and hiding those cameras beyond the imaginations. Therefore in this paper we proposed a method to protect people from monitoring and recording their behaviors without consent and control illegal usage while enabling a method to distinguish legal cameras from fake. (C) 2009 Published by Elsevier Ltd.
ELSEVIER SCIENCE BV, English, International conference proceedings
DOI:https://doi.org/10.1016/j.sbspro.2010.01.008DOI ID:10.1016/j.sbspro.2010.01.008,
ISSN:1877-0428,
Web of Science ID:WOS:000281956700004 USB memory for surveillance camera software Noriaki Yoshiura; Yoshinori Neya
1ST INTERNATIONAL CONFERENCE ON SECURITY CAMERA NETWORK, PRIVACY PROTECTION AND COMMUNITY SAFETY 2009,
Volume:2,
Number:1,
First page:36,
Last page:41, 2010,
[Reviewed]This paper proposes surveillance camera software system which runs on personal computer without hard disk. Several kinds of surveillance camera software have been proposed and some of them are free software. However, these kinds of software need personal computer which has some operation system and users which have ability or knowledge of computer. These facts are hurdles of spreading or installing surveillance camera. The surveillance camera software which is proposed in this paper is USB memory style software and works on personal computer without hard disk. This software does not require operating system because USB memory has operating system in it. This system is made based on Knoppix which is one of the Linux distributions and Linux free surveillance camera software. (C) 2009 Published by Elsevier Ltd.
ELSEVIER SCIENCE BV, English, International conference proceedings
DOI:https://doi.org/10.1016/j.sbspro.2010.01.009DOI ID:10.1016/j.sbspro.2010.01.009,
ISSN:1877-0428,
Web of Science ID:WOS:000281956700005 Security of communities based on the e-JIKEI Network with information technology and altruism Koichi Maru; Yusaku Fujii; Yoichi Sugita; Naoya Ohta; Noriaki Yoshiura; Hiroshi Ueda; Shinya Shiraki
1ST INTERNATIONAL CONFERENCE ON SECURITY CAMERA NETWORK, PRIVACY PROTECTION AND COMMUNITY SAFETY 2009,
Volume:2,
Number:1,
First page:88,
Last page:94, 2010,
[Reviewed]Attempts on the introduction of systems of the e-JIKEI Network, a novel concept on operating security camera system, are reviewed. The concept of the e-JIKEI Network is that a community will have a strong ability to prevent crime only if some residents keep watch their surroundings. Community safety would be realized by the voluntary cooperation and altruism of citizens. Before introducing the systems, altruistic mind of the citizens has been enhanced, and consequently, the systems have been successfully introduced to residential districts and schools. The prospects for the concept of the e-JIKEI Network are discussed. (C) 2009 Published by Elsevier Ltd.
ELSEVIER SCIENCE BV, English, International conference proceedings
DOI:https://doi.org/10.1016/j.sbspro.2010.01.019DOI ID:10.1016/j.sbspro.2010.01.019,
ISSN:1877-0428,
Web of Science ID:WOS:000281956700015 Introduction of security camera system with privacy protection into a residential area Takashi Yokote; Yusaku Fujii; Koichi Maru; Noriaki Yoshiura; Naoya Ohta; Hiroshi Ueda
1ST INTERNATIONAL CONFERENCE ON SECURITY CAMERA NETWORK, PRIVACY PROTECTION AND COMMUNITY SAFETY 2009,
Volume:2,
Number:1,
First page:105,
Last page:110, 2010,
[Reviewed]Social experiment is explained about introduction of the security camera system with privacy protection into residential area in this paper. In July 2008, this experiment by using the security camera system with privacy protection had been started into a residential area: Tsunatori-cho, Isesaki. In this experiment, the security camera system doesn't monitor only a premise of house but also watches the road which is public space in front of the house. This system is introduced into one of several houses of residential area, there is to keep the life in the whole region. However, monitoring of public space has the risk of privacy violation. So the privacy protection function was added to prevent this risk. Because images are encrypted and saved by this function, nobody watch them without a password for decoding. Consequently, the privacy is protected because only a person owning a password can watch. Detail of social experiment using this system in residential area is explained. (C) 2009 Published by Elsevier Ltd.
ELSEVIER SCIENCE BV, English, International conference proceedings
DOI:https://doi.org/10.1016/j.sbspro.2010.01.022DOI ID:10.1016/j.sbspro.2010.01.022,
ISSN:1877-0428,
Web of Science ID:WOS:000281956700018 Analysis of Spam Mail Sent to Japanese Mail Addresses in the Long Term Daisuke Yamakawa; Noriaki Yoshiura
PROCEEDINGS OF THE 2010 IEEE-IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM,
First page:833,
Last page:836, 2010,
[Reviewed]Today e-mail is a indispensable communication tool because of wide spread of Internet technology and many spam mails are delivered in the Internet. In order to avoid spam mails, spam filter is used in many mail servers or PC. It checks the content, sending address or so on of a mail and decides whether the mail is a spam mail. After spam filter works well to remove spam mails, spam senders improve the methods of sending spam. Spam filter technology and spam sending method make a vicious circle. Ending this vicious circle needs spam mail characteristics including the change according to spam filter improvement. This paper analyzes spam mails which are saved in the long term in order to obtain spam mail characteristics and reports the result of this analysis.
IEEE, English, International conference proceedings
DOI:https://doi.org/10.1109/NOMS.2010.5488360DOI ID:10.1109/NOMS.2010.5488360,
ISSN:1542-1201,
DBLP ID:conf/noms/YamakawaY10,
Web of Science ID:WOS:000287357500102 COMMUNITY SECURITY BY WIDELY AVAILABLE INFORMATION TECHNOLOGY WITH ALTRUISM : Introduction of system and prospects for realizing e-JIKEI Network(New Frontiers of Ubiquitous Computing in Architecture and Urbanism)
MARU Koichi; FUJII Yusaku; SUGITA Yoichi; OHTA Naoya; YOSHIURA Noriaki; UEDA Hiroshi; SHIRAKI Shinya
Architectural Institute of Japan, Number:8, First page:99, Last page:104, Jan. 2010, [Reviewed]
A novel concept on operating security camera system, "e-JIKEI Network", attempts on the introduction of systems, and prospects for the concept are described. The basic concept of "e-JIKEI Network" is that a community will have a strong ability to prevent crime only if some residents keep watch on what happens around their houses using information technology. Community safety would thus be realized by the voluntary cooperation and altruism of ordinary citizens. On the introduction of the systems, altruistic mind of the citizens has been enhanced, and consequently, the systems have been succe...
社団法人日本建築学会, Japanese, Scientific journal
ISSN:1347-6548, CiNii Articles ID:110007522840, CiNii Books ID:AA12207715
Formal Analysis of OTag Protocol on Authentication and Confidentiality
Krishan Sabaragamu Koralalage; Noriaki Yoshiura
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), First page:224, Last page:229, 2009, [Reviewed]
A novel RFID Tag architecture called OTag (Object Tag)[4] and its protocol was designed to enhance the communication among real world objects. ITS (Intelligent Transportation System) was selected as the very first candidate to adopt above technology. Three actors of ITS; vehicle, user and infrastructure were represented as relevant instances of OTag class to enable the communications. To assure the security and privacy of above communications, five sub protocols: non encrypted reading, encrypted reading, encrypted writing ownership transferring and key updating were evaluated using formal analysis technique. First of all, the five protocols were modeled in formal language called HLPSL[1,3]. Then the validation of the modeled protocol representations was conducted by using a tool called SPAN[3]. After that, those five protocols were executed against the modeled intruder to verify desired security goals to verify the strengths and weakness by using AVISPA [1, 2]. Finally, results of each execution were analyzed to derive the concluding remarks.
IEEE, English, International conference proceedings
ISSN:1976-0035, Web of Science ID:WOS:000283532900041
iRail: A Novel Architecture Towards Autonomous Locomotives and Intelligent Infrastructures for Developing Countries Krishan Sabaragamu Koralalage; Noriaki Yoshiura
2009 12TH INTERNATIONAL IEEE CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC 2009),
First page:504,
Last page:509, 2009,
[Reviewed]Due to the improvement of technology, the way human being do things are changing day by day. Railway infrastructures and locomotives have also been enhanced with latest technologies. Japan and Europe are the frontiers to adopt state-of-the-art technologies to railway systems. However we discover that there is a possibility beyond the current available systems. Though it is not an easy task to step beyond the best available technology, our aim was to develop novel autonomous locomotives with intelligent infrastructures to enhance railway systems in developing countries. In this paper we proposed a novel architecture called iRail by designing a rich radio frequency tag, its communicational protocols, and possible applications. The proposed system will manage incidents efficiently with faster recovery time, allow autonomous independent locomotive movements, provide comprehensive real time information to both passengers and operators, avoid collisions among locomotives and also between locomotive and rail road crossing vehicles, reduce overheads, and simplify maintenance by guaranteeing secure wireless communication system.
IEEE, English, International conference proceedings
DOI:https://doi.org/10.1109/ITSC.2009.5309671DOI ID:10.1109/ITSC.2009.5309671,
Web of Science ID:WOS:000289120000084 iPark: A Universal Solution for Vehicle Parking Krishan Sabaragamu Koralalage; Noriaki Yoshiura
VISIONING AND ENGINEERING THE KNOWLEDGE SOCIETY: A WEB SCIENCE PERSPECTIVE, PROCEEDINGS,
Volume:5736,
First page:594,
Last page:604, 2009,
[Reviewed]Urbanization and drastic increase of vehicle usage has brought up a considerable problem in vehicle parking. Lack of efficient infrastructure facilities to manage increasing demand with available space and inability to provide intelligent, standard, and interoperable parking solutions are some of the main reasons to cause the above problem. Therefore, in this paper we introduced a novel parking solution called iPark which could solve almost all the existing issues using rich radio frequency chip design. iPark could realize the potential benefits in intelligent transportation systems (ITS) and allows real time, efficient, effective and hassle free parking. It also enables dynamic parking management, provides information on idling lots, allow prior reservations, provide navigation support towards idling or reserved lot, automate collecting of charges and enforce rules and regulations on illegal parking. Moreover, unlike other solutions, iPark works for both free entrance and controlled entrance parking lots by reducing the unnecessary burdens.
SPRINGER-VERLAG BERLIN, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-642-04754-1_60DOI ID:10.1007/978-3-642-04754-1_60,
ISSN:0302-9743,
DBLP ID:conf/wsks/KoralalageY09,
Web of Science ID:WOS:000273452000060 uCard: A Novel Privacy Friendly Radio Frequency Tag Architecture for Universal Loyalty Card Krishan Sabaragamu Koralalage; Noriaki Yoshiura
DIGITAL BUSINESS,
Volume:21,
First page:53,
Last page:63, 2009,
[Reviewed]According to some authoritative marketing analysis, a lame percentage of daily sales are increased by its frequent customers. Due to the above fact almost all the stores started to implement point card or loyalty card schemes to achieve the eighty to twenty situation for both the customers and the retailers. Currently average customer has got at least five to six loyalty cards on different stores. Some venders have implemented such card system into the mobile phones. In addition to those cards each person at least has to have two or more hospital or access cards too. However subscribing several cards to achieve economical benefits have become a burden due to the difficulty arise when managing them. Therefore in this paper we proposed a novel privacy friendly loyalty card architecture which allows easy management of cards by using all-in-one card called uCard (Universal Card) using Radio Frequency Identification technology. Our universal card architecture will provide an ideal strategy for stores to build new relationships and to harvest the reward of customer loyalty by enhancing the customer experience while eliminating the hassle of managing several cards and decreasing the fear on personal privacy.
SPRINGER, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-642-11532-5_7DOI ID:10.1007/978-3-642-11532-5_7,
ISSN:1867-8211,
DBLP ID:conf/digibiz/KoralalageY09,
Web of Science ID:WOS:000301970600007 Decreasing Access Control List Processed in Hardware Takumichi Ishikawa; Noriaki Yoshiura
MANAGEMENT ENABLING THE FUTURE INTERNET FOR CHANGING BUSINESS AND NEW COMPUTING SERVICES, PROCEEDINGS,
Volume:5787,
First page:453,
Last page:457, 2009,
[Reviewed]Access control list (ACL) is one of the most important things in computer network security. While cheap router or PC processes ACL by software, network equipment such as Layer 2 or 3 switch processes ACL by hardware because there is a speed limit in software process ability. The hardware process of ACL can handle high speed network packet, however, this capability limits ACL configuration such as the limit of the number of rules in ACL. This paper proposes the software that decreases the number of rules in ACL to satisfy the limit of hardware. This paper also evaluates this software by experiment in which this software is applied to practical ACL.
SPRINGER-VERLAG BERLIN, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-642-04492-2_51DOI ID:10.1007/978-3-642-04492-2_51,
ISSN:0302-9743,
DBLP ID:conf/apnoms/IshikawaY09,
Web of Science ID:WOS:000272825300051 Object Tag Architecture for Innovative Intelligent Transportation Systems Krishan Sabaragamu Koralalage; Noriaki Yoshiura
ADVANCES IN DATABASES AND INFORMATION SYSTEMS, PROCEEDINGS,
Volume:5739,
First page:314,
Last page:329, 2009,
[Reviewed]Safety is the paramount reason for Intelligent Transportation Systems (ITS). There are three main actors in ITS system: users, vehicles and infrastructure. Though the communications among those three actors are very vital, there is no common platform to make extensive Communication among those three actors yet. That is one of the main reasons to occur fatalities. Therefore we consider the Radio Frequency (RF) identification as a candidate technology and develop a novel tag architecture called OTag (Object Tag) to enable the communication among them including vehicle to vehicle. In this paper we explain the OTag architecture and its protocol which enables a common communication platform. Furthermore, access control mechanisms, ability to be interoperable, stand-alone, self-describing, and plug and play usage are also described. Thus, how OTag architecture will advance the existing ITSs and create novel applications to support safe, secure, comfortable and productive social life in eco-friendly manner are concentrated.
SPRINGER-VERLAG BERLIN, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-642-03973-7_23DOI ID:10.1007/978-3-642-03973-7_23,
ISSN:0302-9743,
DBLP ID:conf/adbis/KoralalageY09,
Web of Science ID:WOS:000271897800022 Formal definition of relevant logical symbol occurrence Noriaki Yoshiura
KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS,
Volume:5178,
First page:508,
Last page:516, 2008,
[Reviewed]The formalization of human reasoning is a main issue in artificial intelligence. Although relevant logic is one of most useful ways of such formalization, inference of logic does not correspond to that of human reasoning because the aim of logical inference is to deal with the truth values of propositions while that of human reasoning is to discover useful information. We introduce the concept of logical symbol occurrence relevance into relevant logic for formalization of human reasoning. This paper discusses relevance of logical symbol occurrence and gives formal definition of relevance from the discussion. Moreover, we propose new logic where all logical symbol occurrences in theorems are relevant with respect to the relevance definition of this paper.
SPRINGER-VERLAG BERLIN, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-540-85565-1-63DOI ID:10.1007/978-3-540-85565-1-63,
ISSN:0302-9743,
DBLP ID:conf/kes/Yoshiura08,
Web of Science ID:WOS:000259394400063 Discovering Web Pages Censored by Search Engines in Japan Takanori Moroi; Noriaki Yoshiura
2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING CONTROL & AUTOMATION, VOLS 1 AND 2,
First page:1171,
Last page:1176, 2008,
[Reviewed]Google is a popular search engine, however, there are some cases that search results are manipulated artificially by Google. In this paper, we develop a system of discovering semiautomatically the web pages which are censored by Google in Japan. We also analyze the censored web pages discovered by the system to find the tendency of censorship. The outline of discovering censored web pages is as follows: The system compares the results of American and Japanese Google. If some web page exists on the result of American Google but not on that of Japanese Google, the system decides by using search option whether this web page is censored. The experiment in this paper discovers 169 web pages censored by Japanese Google in 14 weeks.
IEEE, English, International conference proceedings
DOI:https://doi.org/10.1109/CIMCA.2008.137DOI ID:10.1109/CIMCA.2008.137,
DBLP ID:conf/cimca/MoroiY08,
Web of Science ID:WOS:000277076500202 Statistical Analysis of Slow Portsweep Noriaki Yoshiura
CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS,
Volume:5297,
First page:470,
Last page:473, 2008,
[Reviewed]This paper reports statistical analysis of portsweep, especially, slow portsweep. Since we need long span traffic data in order to analyze slow portsweep, we collected traffic data during twenty-five months by one PC having sixteen IP addresses on a network interface. The report of this paper seems useful for network attack detection or protection, especially for long span network attacks.
SPRINGER-VERLAG BERLIN, English, International conference proceedings
DOI:https://doi.org/10.1007/978-3-540-88623-5-54DOI ID:10.1007/978-3-540-88623-5-54,
ISSN:0302-9743,
DBLP ID:conf/apnoms/Yoshiura08,
Web of Science ID:WOS:000261030600054 e-JIKEI Network Project/Japan Enhancing community security
Hiroshi Ueda; Yusaku Fujii; Shigeru Kumakura; Noriaki Yoshiura; Naoya Ohta
eGov, Volume:11, Number:12, First page:9, Last page:11, Dec. 2006, [Invited]
English, Scientific journal
Residential district security using home computers
Yusaku Fujii; Shigeru Kumakura; Noriaki Yoshiura; Naoya Ohta; Hiroaki Otsuka
18th IMEKO World Congress 2006: Metrology for a Sustainable Development, Volume:2, First page:932, Last page:936, 2006
We are promoting a novel concept the e-JIKEI Network: a community will have a strong ability to prevent crime only if some residents keep watch on what happens around their houses with the aid of their own home computers, commercially available cheap cameras, and freesoftware. Under this scheme, residents would view their surroundings using cheap cameras as their own eyes and home computers as their own brains with altruistic spirit. Community safety would thus be realized by the voluntarily cooperation and altruism of ordinary citizens using widespread modern technology. In this paper, an attempt for realizing the residential district security using the e-JIKEI Network is described.
English, International conference proceedings
SCOPUS ID:84877742816
Development and Evaluation of a Working Model for Real-Time Interactive Distance Learning over the Japan Gigabit Network
Rajkumar Deshpande; YOSHIURA NORIAKI; ONOZATO YOSHIKUNI; Prakash Vyavahare
Journal of Computer Society of INDIA,, Volume:Vol.36,July-September2006, Number:No.3, First page:2, Last page:7, 2006, [Reviewed]
Performance evaluation on two-dimensional cellular networks considering mobility of mobile nodes Michihiro Inoue; Noriaki Yoshiura; Yoshikuni Onozato; Hiroshige Kimura
IEEJ Transactions on Electronics, Information and Systems,
Volume:126,
Number:7,
First page:877,
Last page:882, 2006,
[Reviewed]In this paper, we investigate the performance of two-dimensional cellular networks in consideration of the mobility of mobile nodes through the simulation. We assume that each mobile node moves in accordance with the random way point method in the two-dimensional cellular network. The speed of mobile nodes are given by three different probability distributions, that is, truncated exponential, uniform, and reverse truncated distributions. The moving angle of mobile nodes is given by the uniform distribution. The performance is measured by blocking probability of handover call, mean handover times, and mean channel occupation time. From the simulation studies, we conclude that 1)the effect of the change of moving angle on the performance is very small. 2)concerning the speed distribution of the mobile nodes, the dominant factor on the performance is the low speed of mobile nodes.
Institute of Electrical Engineers of Japan, English, Scientific journal
DOI:https://doi.org/10.1541/ieejeiss.126.877DOI ID:10.1541/ieejeiss.126.877,
ISSN:1348-8155,
J-Global ID:200902291153835590,
CiNii Articles ID:10018146520,
SCOPUS ID:33745773492 Channel Control on One-dimensional Cellular Networks from the Viewpoint of Holding Time.
吉浦紀晃; 井上通宏; 小野里好邦
シミュレーション, Volume:24, Number:2, First page:112, Last page:121, Jun. 2005, [Reviewed]
In one-dimensional mobile cellular networks such as arterial roads or speedways, blocking rate of call increases according to the increase of new call arrival rate. If there is only one available channel and if we do not distinguish between new call and handover call, then it is arbitrary which new call or handover call can use the available channel and starts communication. Moreover, if some call uses a channel in the long time and keeps long communication, then there would not be available channels for new arrival or handover calls. If we assign the priority of channel usage to calls, then there is possibility that all calls can not use channel fairly. In this paper, we introduce channel assignment strategy and evaluate this strategy by simulation. This strategy is that if there is a new arrival or handover call and if some call uses a channel in the long time, then this long call is quitted and the channel that is used in the long time by the call is assigned to the new arrival or handover call.
日鉄技術情報センタ-, Japanese
ISSN:0285-9947, J-Global ID:200902295100156913, CiNii Articles ID:110003969613, CiNii Books ID:AN00329524
Performance Evaluation on One-dimentional Cellular Networks under Several Kinds of Speed Distributions
井上通宏; 吉浦紀晃; 小野里好邦
情報処理学会論文誌, Volume:46, Number:2, First page:470, Last page:481, Feb. 2005, [Reviewed]
In this paper, we use simulation method to evaluate how the mobile node's speed distribution difference or difference between maximum and minimum speeds influences the communication performance of one-dimensional mobile cellular networks such as arterial roads or speedways. Our simulation results show that the speed distribution which has the much more low speed mobile users than the high speed mobile users has maximally 20% higher blocking probability and 16% longer mean holding time of completed calls compared to the other speed distribution which has the much more high speed mobile users than the low speed mobile users. In the heavy traffic situation, distribution difference has influences on blocking probability and mean holding time of completed calls. The number of completed call does not vary whatever speed distribution or the difference between maximum and minimum speeds is. By considering our simulation results, we can mention that the number of low speed mobile users has much influences on the the blocking probability and the mean holding time of completed calls.
一般社団法人情報処理学会, Japanese
ISSN:0387-5806, J-Global ID:200902263224098360, CiNii Articles ID:110002768552
Decision Procedures for stepwise satisfiability of reactive system specification YOSHIURA Noriaki; Noriaki Yoshiura; Computer Center; Gunma University
Computer Software,
Volume:22,
Number:1,
First page:45,
Last page:57, Jan. 2005,
[Reviewed]Reactive systems are intended to maintain some interaction with their environment such as system users and provide services for the users. Temporal logic is one of the methods for formal specification descriptions of reactive systems. Reactive system formal specification is realizable if and only if there is a reactive system which satisfies the specification for any behavior of system users. The unrealizable specifications are divided into several classes. In this paper, we give the decision procedure of stepwise satisfiability which is one of the classes.
日本ソフトウェア科学会, Japanese
DOI:https://doi.org/10.11309/jssst.22.1_45DOI ID:10.11309/jssst.22.1_45,
ISSN:0289-6540,
J-Global ID:200902271509100174,
CiNii Articles ID:110003744164,
CiNii Books ID:AN10075819 Effect of mobility on communication performance in overloaded one-dimensional cellular networks M Inoue; N Yoshiura; Y Onozato
DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS,
Volume:3816,
First page:82,
Last page:92, 2005,
[Reviewed]In this paper, we investigate the communication performance of one-dimensional cellular networks from the viewpoint of the mobile node's speed with the simulation method assuming various types of speed distributions. Simulation results are measured as blocking probabilities of both new and handoff calls and call completion probability. We can observe the phenomenon that blocking probabilities of both new and handoff calls are not related to the mobile node's speed distribution, but the call completion probability concerns with that under overloaded situation when the blocking probabilities are not small.
SPRINGER-VERLAG BERLIN, English, Scientific journal
DOI:https://doi.org/10.1007/11604655_12DOI ID:10.1007/11604655_12,
ISSN:0302-9743,
DBLP ID:conf/icdcit/InoueYO05,
Web of Science ID:WOS:000235804200012 Community Security By Widely Available Information Technology.
Yusaku Fujii; Noriaki Yoshiura; Naoya Ohta
J. Community Informatics, Volume:2, Number:1, 2005, [Reviewed]
DBLP ID:journals/jci/FujiiYO05, CiNii Articles ID:10026029846
Creating a Worldwide Community Security Structure Using Individually Maintained Home Computers: The e-JIKEI Network Project 藤井雄作; 吉浦紀晃; 太田直哉
Social Science Computer Review,
Volume:23,
Number:2,
First page:250,
Last page:258, 2005,
[Reviewed]DOI:https://doi.org/10.1177/0894439304273274DOI ID:10.1177/0894439304273274 Decision procedures for several properties of reactive system specifications N Yoshiura
SOFTWARE SECURITY - THEORIES AND SYSTEMS,
Volume:3233,
First page:154,
Last page:173, 2004,
[Reviewed]Reactive systems, such as operating systems or elevator control systems, are systems that ideally never terminate and are intended to maintain some interaction with their environment. Temporal logic is one of the methods for formal specification descriptions of reactive systems. By describing the formal specifications of reactive systems we can check the consistency of the specifications and whether they contain defects. By using a synthesis algorithm we also obtain reactive system programs from the formal specifications and prevent programming bugs. Therefore, it is important to describe reactive system formal specifications to secure reactive system programs. However, it is difficult to describe realizable reactive system specifications and it is important to revise unrealizable reactive system specifications into realizable reactive system specifications. In previous research, three properties have been introduced into unrealizable reactive system specifications. By using these properties, we can acquire more detailed information about the cause of the defects of unrealizable reactive system specifications in the specification description process. In this paper, we propose decision procedures that judge whether a reactive system specification has these properties. We also prove the soundness and completeness of these procedures.
SPRINGER-VERLAG BERLIN, English, Scientific journal
DOI:https://doi.org/10.1007/978-3-540-37621-7_8DOI ID:10.1007/978-3-540-37621-7_8,
ISSN:0302-9743,
DBLP ID:conf/isss2/Yoshiura03,
Web of Science ID:WOS:000225088600008 Finding the causes of unrealizability of reactive system formal specifications N Yoshiura
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS,
First page:34,
Last page:43, 2004,
[Reviewed]Reactive systems are the systems that maintain some interaction with their environment. Temporal logic is one of the methods for formal specification descriptions of reactive systems. The formal specifications of reactive systems enables to check the consistency of the specifications and whether they contain defects. By using a synthesis algorithm we also obtain reactive system programs from the formal specifications and prevent programming bugs. Thus, it is important to describe reactive system formal specifications. However it is difficult to describe realizable reactive system specifications and it is necessary to find the causes of unrealizable reactive system specifications. In previous research, three properties have been introduced into unrealizable reactive system specifications and we suppose that this classification gives the hists of finding the causes of unrealizability. In this paper we propose several heuristics of finding the causes of unrealizability of reactive system formal specifications. To find the causes, we use tableau methods and the classification of the reactive system specifications.
IEEE COMPUTER SOC, English, International conference proceedings
DOI:https://doi.org/10.1109/SEFM.2004.1347501DOI ID:10.1109/SEFM.2004.1347501,
DBLP ID:conf/sefm/Yoshiura04,
Web of Science ID:WOS:000224600300004 Proposal for a world wide home security system using PC-cameras the e-Vigilante Network Project
K. Hagiwara; Y. Chigira; N. Yoshiura; Y. Fujii
Proceedings of the SICE Annual Conference, First page:1743, Last page:1746, 2004
This paper describes a project for the design and implementation of a community security system using individually maintained home computers that are connected to the internet. In the initial stage of the project, a preliminary kit has been developed that consists of a commercial camera, free-software and an operation manual. Using the preliminary kit, an experimental security system has been implemented with the cooperation of private households in the historic town of Kiryu. The primary goal of the experiment is to verify the effectiveness of the concept in the prevention of crimes. The future prospects are also discussed.
English, International conference proceedings
SCOPUS ID:12744253735
Characteristic of crossover traffic in graphical representation of cellular networks
M. Inoue; N. Yoshiura; Y. Onozato
Midwest Symposium on Circuits and Systems, Volume:2, First page:II477, Last page:II480, 2004
In this paper, we will evaluate the communication performance of one-dimensional mobile cellular networks from the view point of the mobile node's speed distributions with the simulation method changing the minimum and maximum speeds, the type of speed distributions and the type of holding time distributions. Simulation results are measured as total number of completed calls, mean holding time of completed calls and probability distribution of holding time of completed calls. We can observe the phenomenon that the total number of completed calls changes according to the type of holding time distributions when arrival rate increases in the heavy traffic situation.
English, International conference proceedings
ISSN:1548-3746, SCOPUS ID:11144336635
Proposal for a world wide home security system using PC-cameras Subtitle: the e-Vigilante Network Project
K Hagiwara; Y Chigira; N Yoshiura; Y Fujii
SICE 2004 ANNUAL CONFERENCE, VOLS 1-3, First page:1514, Last page:1517, 2004, [Reviewed]
This paper describes a project for the design and implementation of a community security system using individually maintained home computers that are connected to the internet. In the initial stage of the project, a preliminary kit has been developed that consists of a commercial camera, free-software and an operation manual. Using the preliminary kit, an experimental security system has been implemented with the cooperation of private households in the historic town of Kiryu. The primary goal of the experiment is to verify the effectiveness of the concept in the prevention of crimes. The future prospects are also discussed.
SOC INSTRUMENT CONTROL ENGINEERS JAPAN, English, International conference proceedings
Web of Science ID:WOS:000231324801114
Mobile network system evaluation from the viewpoint of completed call rate
N Yoshiura; M Inoue
8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, First page:531, Last page:536, 2004, [Reviewed]
In this paper, we evaluate the Communication quality from the viewpoint of velocity distribution in the one dimensional cellular network system. We did the simulation in the case that velocity distribution is different and variance is different in the same velocity distribution. By the result of this simulation, we discuss the relation between communication quality and velocity distribution, and especially, we discuss the completed call rate.
INT INST INFORMATICS & SYSTEMICS, English, International conference proceedings
Web of Science ID:WOS:000227676400097
Application of One Way Function to Biometric Authentication Noriaki Yoshiura; Yoshikuni Onozato; Hiroshige Kimura
IEEJ Transactions on Electronics, Information and Systems,
Volume:124,
Number:8,
First page:1538,
Last page:1545, 2004
In biometric authentication, the biometric data is registered and authentication is done by collation input biometric data with the registered biometric data. If the registered biometric data is stolen, there is a possibility that the the biometric data of registrants may be used improperly. It is very difficult to prevent such improper use because we no longer change biometric data. Therefore it is necessary to pay sufficient attention to the protection of biometric data. This paper proposes the application of one way function to biometric authentication in order to protect biometric data of registrants. We examine and discuss the possibility of application of one way function in biometric authentication. © 2004, The Institute of Electrical Engineers of Japan. All rights reserved.
一般社団法人 電気学会, English, Scientific journal
DOI:https://doi.org/10.1541/ieejeiss.124.1538DOI ID:10.1541/ieejeiss.124.1538,
ISSN:1348-8155,
J-Global ID:200902284458593043,
CiNii Articles ID:10013325107,
SCOPUS ID:35248875858 Logic of relevant connectives for knowledge base reasoning
N Yoshiura
INFORMATION MODELLING AND KNOWLEDGE BASES XIV, Volume:94, First page:66, Last page:80, 2003, [Reviewed]
The formalization of human knowledge base reasoning is a main issue in artificial intelligence. Although logic is one of most useful ways of such formalization, inference of logic does not correspond to that of knowledge base reasoning. The reason is that the aim of logical inference is to deal with the truth values of propositions while that of human reasoning is to infer useful information. As far as logical connectives are concerned, whether there is some relation between two propositions, we can connect them by logical connectives such as conjunction and so on in classical logic. However, in daily speech or in knowledge base reasoning, when we introduce logical connectives into propositions, we give consideration to relation between the propositions. In this paper, we discuss relevance of logical connectives on formalization of knowledge base reasoning and propose logic LRC (Logic of Relevant Connectives). LRC is based on relevant logic ER from which fallacies of relevance and validity are removed. ER has two merits. One is that it is one of the stronger relevant logical systems, and the other is that ER is decidable. These characteristics are the reason why LRC is based on ER.
I O S PRESS, English, International conference proceedings
ISSN:0922-6389, Web of Science ID:WOS:000187422000006
Program synthesis for stepwise satisfiable specification of reactive system Noriaki Yoshiura; Naoki Yonezaki
International Workshop on Principles of Software Evolution (IWPSE),
Volume:2000-,
First page:58,
Last page:67, 2000,
[Reviewed]Reactive system, such as operating systems or elevator control systems, is a system which ideally never terminates and is intended to maintain some interaction with environment. In previous researches, a reactive system specification is required to satisfy realizability for synthesizing a program from it. A specification is realizable if and only if there exists a system which satisfies the specification no matter how the environment behaves. However, many of actual reactive system specifications do not satisfy realizability and there exist actual reactive system programs of such specifications. In this paper, we discuss realizability property of actual reactive system specifications and show that stepwise satisfiability is a property which actual reactive system specifications have to satisfy. This paper also presents a synthesis procedure of reactive system programs from stepwisely satisfiable specifications. By this procedure, we can synthesize prototype programs from an imperfect specification. It is useful to synthesize prototype programs in the middle of describing a specification because prototype programs give useful information for testing or revising the specification. Thus, the procedure in this paper is useful for system specification revision.
Institute of Electrical and Electronics Engineers Inc., English, International conference proceedings
DOI:https://doi.org/10.1109/ISPSE.2000.913222DOI ID:10.1109/ISPSE.2000.913222,
SCOPUS ID:1442346087 More Expressive Temporal Logic for Specifications.Noriaki Yoshiura; Naoki Yonezaki
SEKE'93, The 5th International Conference on Software Engineering and Knowledge Engineering, Tutorials, June 14-15, 1993, Technical Program, June 16-18, 1993, Hotel Sofitel, San Francisco Bay, USA,
First page:363,
Last page:366, 1993,
[Reviewed]Knowledge Systems Institute
DBLP ID:conf/seke/YoshiuraY93
Applying reinforcement learning to deck building games
YICHEN CUI; 吉浦紀晃
Mar. 2025
Web サーバにおけるTorブラウザからのアクセス検知
小島彰悟; 吉浦紀晃
Mar. 2025
JavaScriptコードの変換手法と頻度の調査 -通常のwebサイトとonionサービスの比較-
普入健太; 吉浦紀晃
Mar. 2025
複数台設置された独立制御信号機の性能評価
萩原, 貴利; 吉浦, 紀晃
Mar. 2024
Mar. 2024 - Mar. 2024, Japanese
信号機制御を機械学習により最適化する研究が行われているが、信号機単一での性能評価しか行われていない。そこで、本研究では、機械学習により信号制御を行う信号機に一部を置き換えた場合、その地域に全体における交通効率への影響をシミュレーションにより行う。独立制御の信号機はDQNアルゴリズムを適用しており、交差点周辺の交通量から車両全体の平均速度等を基準に現示を決定する。周辺の信号機が固定時間で動作している環境での独立制御の信号機の有効性を検証するため、交通シミュレーションツールSUMOで格子上に交わる道路ネットワークを設計し、独立制御の信号機の設置台数を変化させシミュレーションを行う。
R-NaDを用いたガイスターAIに関する研究
原田, 響己; 吉浦, 紀晃
Mar. 2024
Mar. 2024 - Mar. 2024, Japanese
本研究では不完全情報ゲームの1つに分類されるボードゲームであるガイスターを対象に,勾配法であるR-NaDを適用したガイスターAIの構築を試みた.その後,ガイスターAI大会にて上位に入賞している「naotti2020」といった有力なガイスターAIとの対戦を通して,その結果からR-NaDを用いたガイスターAIの性能と戦略について検討を行った.結果として,構築したガイスターAIは有力なガイスターAIに匹敵する性能を発揮した.また,赤駒を多く前面に配置する初期配置を好み,青駒を多く前面に配置する初期配置はしないといったように,特有の戦略傾向があることが判明した.
Bitcoin資金洗浄サービスUniJoinについての調査
大杉, 遼; 吉浦, 紀晃
Mar. 2024
Mar. 2024 - Mar. 2024, Japanese
暗号通貨における資金洗浄サービスは,ユーザの資金に対し分散及び合算を行った後、返金することで資金の匿名性を強化するサービスである.資金洗浄サービスは犯罪に利用されることがあるため,資金洗浄サービス内のBitcoinの追跡は重要である.本研究では,資金洗浄サービスの一つであるUnijoinについて,入金用のBitcoinアドレスから送金先のBitcoinアドレスをどの程度推定できるかの検証を行う.実際にUnijoinを利用したデータを元に取引を追跡し条件付けをすることによって入金先Bitcoinアドレスから出金先Bitcoinアドレスをどの程度推定することができるかの検証を行う.
SDNにおけるセキュリティ対策の改良に関する研究
ZHIYUAN, HAO; 吉浦, 紀晃
Mar. 2024
Mar. 2024 - Mar. 2024, Japanese
SDNに対する攻撃を検出するためのシステムであるSPHINXでは、その検出にネットワーク内のスイッチからコントローラへ報告されるトラフィック量が利用されている。よって、SPHINXの攻撃検出が正当性はスイッチの信頼性に依存し、スイッチ自体が攻撃元となっている場合には検出できない。SPHINXではネットワーク内のスイッチの信頼性を検証する仕組みがされるが、 全てのスイッチの信頼性を検証できるわけではなく、ネットワーク上の位置によっては検証できない。本研究では、これまで検証できていなかったスイッチの検証と検証の効率化を目指す。
Cross Site Leakの攻撃の危険性の分析と対策に関する研究
Duo Chen; 吉浦紀晃
Mar. 2023
環境の動作の変更を想定したシステムの合成に関する研究
松井大志; 吉浦紀晃
Mar. 2023
分散型Bitcoin資金洗浄サービスの出金先アドレスの検出と絞り込み
佐藤 大河; 吉浦 紀晃
Mar. 2022
マルウェアのネットワーク通信の特徴調査及びSSLインスペクションの評価
諸 鷹大; 吉浦 紀晃
Mar. 2022
IoTにおけるTPMの処理スケジューリング
本澤 翔矢; 吉浦 紀晃
Mar. 2022
モデル検査器を用いた完全情報ゲームの必勝戦略の構築の可能性について
高橋 昂平; 吉浦 紀晃
Mar. 2022
Proposal for the Smart Helpdesk to support PC settings
小川 康一; 浜元 信州; 吉浦 紀晃
インターネットと運用技術シンポジウム論文集, Nov. 2021
Nov. 2021 - Nov. 2021, Japanese
Development of Speech simulation VR system
廣瀬竜介; 吉浦紀晃
電子情報通信学会大会講演論文集(CD-ROM), 2021
2021 - 2021
Identifying Hidden Services Using Website Fingerprinting Attack
西村怜二; 吉浦紀晃
情報処理学会研究報告(Web), 2021
2021 - 2021
Fingerprinting Attack for plural Webpages accesses on Tor by using similarity of Webpages
WENJIE Teng; 吉浦紀晃
情報処理学会研究報告(Web), 2021
2021 - 2021
Stock prediction with BERT and LSTM
新津康平; 吉浦紀晃
情報処理学会研究報告(Web), 2021
2021 - 2021
サーバラック内機器監視手法の提案
小川 康一; 吉浦 紀晃
Nov. 2020
携帯端末を利用した無線LANシステムの運用管理支援手法の開発と実装
小川 康一; 吉浦 紀晃
Nov. 2019
Oral presentation
移動ロボットと監視装置を利用した無線LANシステムの運用管理支援手法の提案
小川康一; 吉浦紀晃
情報処理学会研究報告(Web), Jun. 2019
Japanese
Bitcoin資金洗浄サービスへの預け入れに対する返金先アドレスの絞り込み
佐藤千尋; 吉浦紀晃
電子情報通信学会大会講演論文集(CD-ROM), Mar. 2019
Japanese
行列計算を用いた秘密計算による位置情報保護
石川正人; 吉浦紀晃
電子情報通信学会大会講演論文集(CD-ROM), Mar. 2019
Japanese
常時録画型TVドアホンを用いた市民参加型地域見守りシステムの提案
藤井雄作; 田北啓洋; 加藤蒼悟; 太田直哉; 吉浦紀晃; 澤野勝利; 高橋純一
Nov. 2018
Nov. 2018 - Nov. 2018
一般市民の協力により設置された多数のカメラによる地域社会の見守りと,一般市民のプライバシー保護を両立させることを目的として,暗号化保存機能と常時録画機能を備えたTVドアホン「e自警ドアホン」を開発した.また,一般市民ボランティアによるe自警ドアホンを用いた自宅回りの見守り,および,それを自治会が組織化して活用することによる地域社会の安全・安心の向上と,一般市民のプライバシー保護の両立を目指して,社会実験を実施した.e自警ドアホンの特徴として,①(自宅周りの見守りのための)常時録画,②(プライバシー保護のための)暗号化保存,③(通常ドアホンの既設配線を使える)2線式接続,などが挙げられる.社会実験においては,個々のドアホン設置住民を所有者,自治会役員会を閲覧権者とする運用方法を試行し,地域内見守りの効果,プライバシー保護の効果,などについて,検証を試みた.
利用者のネットワーク障害時に管理者を支援する移動ロボットの開発と実装
小川 康一; 吉浦 紀晃
Jun. 2018
Jun. 2018 - Jun. 2018, Japanese
A Method of Communication Control for collecting Information by Mobile Robots that monitor Network Equipment of Users
小川 康一; 吉浦 紀晃
インターネットと運用技術シンポジウム論文集, Nov. 2017
Japanese
移動ロボットによる環境地図を用いたネットワーク機器監視情報の自動収集手法
小川康一; 小川康一; 吉浦紀晃; 吉浦紀晃
情報処理学会研究報告(Web), Sep. 2017
Japanese
移動ロボットと小型コンピュータを活用したネットワーク機器監視手法
小川康一; 吉浦紀晃; 小川康一; 吉浦紀晃
情報処理学会シンポジウムシリーズ(CD-ROM), Jun. 2017
Japanese
小型コンピュータと画像処理技術を活用したネットワーク機器監視装置の開発
小川康一; 小川康一; 吉浦紀晃; 吉浦紀晃
情報処理学会研究報告(Web), Jun. 2017
Japanese
User identifying method of writing bulletin board using Tor
飯田 嘉一郎; 吉浦 紀晃
電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, Mar. 2017
Japanese
A Method of collecting the IP addresses of Hidden Server in Tor networks
小泉 賢人; 吉浦 紀晃
電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, Mar. 2017
Japanese
User identifying method of writing bulletin board using Tor
飯田嘉一郎; 吉浦紀晃
電子情報通信学会技術研究報告, Feb. 2017
Japanese
A Method of collecting the IP addresses of Hidden Server in Tor networks
小泉賢人; 吉浦紀晃
電子情報通信学会技術研究報告, Feb. 2017
Japanese
プライバシに配慮した地域見守り防犯カメラシステムの開発
田北 啓洋; 村松 公祐; 丸 浩一; 上田 浩; 吉浦 紀晃; 太田 直哉; 藤井 雄作
2017
2017 - 2017
防犯カメラ画像の暗号化によるプライバシ保護とセキュリティ確保の両立
田北 啓洋; 村松 公祐; 丸 浩一; 上田 浩; 吉浦 紀晃; 太田 直哉; 藤井 雄作
2017
2017 - 2017
Versatile Monitoring System for Network Equipment by Image processing Technology
小川康一; 小川康一; 吉浦紀晃; 吉浦紀晃
情報処理学会研究報告(Web), Jun. 2016
Japanese
Torネットワークにおける通信分析システム
堀越雄貴; 吉浦紀晃
情報処理学会全国大会講演論文集, Mar. 2016
Japanese
Proposal and implementation of IP Traceback method by OpenFlow
矢野 隼太; 吉浦 紀晃
Mar. 2016
Mar. 2016 - Mar. 2016, Japanese
Verification of NetCore Programs by Coq
伊達 弘明; 吉浦 紀晃
電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, Mar. 2016
Japanese
AS-6-14 Analysis of Questionnaire Result on Introducing Security Cameras on School Routes
Yoshiura Noriaki; Kato Sogo; Takita Akihiro; Ohta Naoya; Fujii Yusaku
Proceedings of the IEICE Engineering Sciences Society/NOLTA Society Conference, Mar. 2016, The Institute of Electronics, Information and Communication Engineers
Mar. 2016 - Mar. 2016, Japanese
通学路への防犯カメラの導入に関するアンケート結果の分析
吉浦紀晃; 加藤蒼梧; 田北啓洋; 太田直哉; 藤井雄作
電子情報通信学会大会講演論文集(CD-ROM), Mar. 2016
Japanese
Proposal and implementation of IP Traceback method by OpenFlow
矢野隼太; 吉浦紀晃
情報処理学会研究報告(Web), Feb. 2016
Japanese
Will every streetlight have network cameras in the near future?
Y. Fujii; N. Yoshiura
SCIENCE, eLetters, 2016
2016 - 2016
通信の信頼性確保を考慮した位置情報に基づくネットワーク運用手法
小川康一; 吉浦紀晃
情報処理学会シンポジウムシリーズ(CD-ROM), Jul. 2015
Japanese
Operational Experiences of IT Services using Optical Fiber Network at Saitama University
小川康一; 吉浦紀晃
情報処理学会研究報告(Web), Jun. 2015
Japanese
Study for implementation of smart street lamps controlled by a sensor network
HIRAYANAGI Yuma; YOSHIURA Noriaki
IEICE technical report. Internet Architecture, Mar. 2015
Japanese
This paper implements the basic part of a smart street lamp system that is controlled by a sensor network. The street lamps in the system light up only when a pedestrian or a vehicle comes around the street lamps or can see the street lamps. This system consists of a server, street lamps and sensors that have built-in wireless communication modules. The server, the street lamps and sensors set up a mesh network. The server receives signals from the sensors and controls lighting up of the lamps according to the signals from the sensors. Lighting off of the street lamps decreases energy consumption, but declines safety and security in streets. This system keeps lighting up the street lamps that are around pedestrians or vehicles to keep streets safe. This paper creates the software for the server, lamps and sensors in the system and evaluates the software by an experiment.
分解証明法を利用したリアクティブシステム仕様の強充足可能性判定器の提案
中村風太; 吉浦紀晃
情報処理学会研究報告(Web), Mar. 2015
Japanese
時間論理により記述されたリアクティブシステム仕様の満たすべき性質の一つに強充足可能性がある.システム利用者からのいかなる要求列についても,それに対し仕様を満たすようなシステムのある応答列が存在するという性質である.仕様が強充足可能性を満たしているかを判定するためにモデルを利用した判定法が存在するが,二重指数の計算コストがかかり大きな仕様の判定に対してあまり有効ではない.そこで本論文では,モデルを利用しない判定法として,様相論理に対する分解証明法を利用した仕様の強充足可能性判定器の提案を行う.提案法の判定手続きを与え,提案法における健全性及び完全性を示す.
リアクティブシステム仕様の外部環境制約式に関する研究
深谷悠一; 吉浦紀晃
情報処理学会研究報告(Web), Mar. 2015
Japanese
時相論理で記述されたリアクティブシステム仕様の満たすべき性質の一つに強充足可能性がある.これは 「将来生起する環境からの入力が与えられたとき,いかなる入力に対しても仕様を満たす応答が存在する」 という性質である.リアクティブシステムは環境に対して開いたシステムであるので,その仕様は環境からのすべての入力パターンを考慮する必要がある.そのため,強充足可能性はリアクティブシステム仕様の満たすべき重要な性質である.仕様が強充足不能であると判明した場合,仕様を修正する必要がある.このとき,仕様の欠陥情報を理解しやすい表現で得ることができれば,仕様を修正する助けとなる.そこで,本論文では強充足不能な仕様の外部環境制約式の導出手続きを提案する.外部環境制約式とは仕様を満たせない環境からの入力の集合を表す時相論理式である.本手続きでは,得られる制約式が単純で直感的な形を保つよう制約式の形を限定する.得られる制約式はその形において最も多くの欠陥情報を表現した式である.
Study for implementation of smart street lamps controlled by a sensor network
平柳優馬; 吉浦紀晃
電子情報通信学会技術研究報告, Feb. 2015
Japanese
この論文では人の周りと人の視界に入る街路灯のみを点灯させるスマート街路灯システムの基本部分の実装を行った.このシステムは,無線メッシュネットワークにより相互に通信可能な街路灯とセンサと街路灯の点灯を制御するサーバからなる.街路灯の消灯は省エネルギーにはなるが,安全性の低下を招く一方,このシステムでは街路灯の消費電力を小さくすると同時に人の視野の範囲内を明るくすることで安全性を維持することを目指している.センサと街路灯に見立てたものを作り実際のハードウェア用いてシステムを動作させることに成功した.センサ 7 個と街路灯 7 本と制御用のサーバからなるメッシュネットワークを構築して動作することを確認した.This paper implements the basic part of a smart street lamp system that is controlled by a sensor network. The street lamps in the system light up only when a pedestrian or a vehicle comes around the street lamps or can see the street lamps. This system consists of a server, street lamps and sensors that have built-in wireless communication modules. The server, the street lamps and sensors set up a mesh network. The server receives signals from the sensors and controls lighting up of the lamps according to the signals from the sensors. Lighting off of the street lamps decreases energy consumption, but declines safety and security in streets. This system keeps lighting up the street lamps that are around pedestrians or vehicles to keep streets safe. This paper creates the software for the server, lamps and sensors in the system and evaluates the software by an experiment.
Network Management Method for Priority Control of Important Information based on location Information during Disasters
小川康一; 吉浦紀晃
情報処理学会研究報告(Web), Jun. 2014
Japanese
The authors propose "Disaster ID Assignment Method" in that packets of important information can be transmitted at high priority in disasters. Disaster ID assignment method is a network management method that is based on location information. The method attaches IDs to packet from or to disaster areas. The IDs are used to give priority communications from or to disaster areas. Network equipment identifies communications from or to disaster areas by IDs. This paper calls the IDs "Disaster IDs". Network equipment preferentially processes the communications by the IDs. Network equipment needs to identify communications that are related with disaster areas in order to control the priority of communication from or to the disaster areas. Identification of communications for disaster areas needs to obtain location information by IP Addresses of disaster areas. In order to verify the effectiveness of this method, this paper constructed a verification environment in the campus of the authors. The results of an experiment in the verification environment confirm that the packets of important information can be transmitted faster than other packets.
複数の配信ツリーを持つP2Pライブ配信システム
土方健志; 吉浦紀晃
情報処理学会全国大会講演論文集, Mar. 2014
Japanese
インターネット上でのライブ配信システムとして、P2Pを利用したシステムが研究されている。しかしメッシュ型のP2Pを利用すると、視聴者の新規接続や切断、あるいは配信データを要求する際の問い合わせが複雑であることなどから、データの受信がコンテンツの再生に間に合わない状況が生まれてしまう。そこで本研究ではこれを解消し、全ての視聴者の再生が途切れないシステムとして、配信者と視聴者を複数の配信ツリーで接続するシステムを提案し、配信ツリーの作成と視聴者が切断した際の再構築に関するアルゴリズムについて研究を行った。要件を満たすアルゴリズムを作成し、視聴者の数に応じた配信ツリーの構造を示した。
デマと流言を抑制する災害時のネットワーク運用手法
小川康一; 吉浦紀晃
情報処理学会全国大会講演論文集, Mar. 2014
Japanese
東日本大震災では,Twitterなどのソーシャルメディアや有志による災害情報サイトなどが立ち上がり、人命救助や安否確認、救援物資の確保など、多くの活用方法が見出され,情報伝達手段としてのインターネットの可能性が明らかになった.しかし,一方でデマや流言などが蔓延し,情報が不足した人々を不安に陥れた.そこで,本研究では災害時に発生するデマや流言を抑制し,災害に重要な通信を優先するネットワーク運用手法について述べる.
Network Priority Control during Disasters and effectiveness Evaluation
Ogawa Kohichi; Yoshiura Noriaki
IEICE technical report. Internet Architecture, Feb. 2014, 一般社団法人電子情報通信学会
Feb. 2014 - Feb. 2014, Japanese
In disasters, important communication for disasters area should be given priority, but it is not given priority because many people use network to obtain information on disasters. This paper proposes a countermeasure against the network trouble during disasters. The countermeasure attaches IDs to communications from or to the disaster areas. The IDs are used to give priority communications from or to the disaster areas; network equipment identifies communications for disaster areas by IDs. This paper calls the IDs "Disaster IDs". Network equipment preferentially processes the communications with the IDs. Network equipment needs to identify communications that are related with disaster areas in order to control the priority of communication from or to the disaster areas. Identification of communications for disaster areas needs to obtain location information by IP Addresses of disaster areas. This paper uses OpenFlow to implement the proposed countermeasure.
Network Priority Control during Disasters and effectiveness Evaluation
小川 康一; 吉浦 紀晃
研究報告インターネットと運用技術(IOT), Feb. 2014
Feb. 2014 - Feb. 2014, Japanese
災害時には,人々のネットワーク利用の殺到によって,災害地への重要な通信が優先的にネットワークに転送されにくくなる問題点がある.本論文では,災害地の通信を優先するといった,災害時のネットワークの対応策について提案する.対応策の具体的な方法は,ネットワークを流れるパケット内の IP アドレス情報から災害地の通信であると判断できた場合には,その通信に 「災害 ID」 を付与することである.ネットワーク機器はこの災害 ID を確認し,災害 ID が付いている場合には優先的に配送を行う.また,災害地からの通信,または災害地への通信を優先制御するために,通信が災害地からのものであるかを把握する必要がある.そのためには,IP アドレスと位置情報の対応関係の把握が必要となる.この対応関係の把握のためにデータベースを利用する.この対応策を具体的に実現する方法の 1 つとして OpenFlow を用いる.In disasters, important communication for disasters area should be given priority, but it is not given priority because many people use network to obtain information on disasters. This paper proposes a countermeasure against the network trouble during disasters. The countermeasure attaches IDs to communications from or to the disaster areas. The IDs are used to give priority communications from or to the disaster areas; network equipment identifies communications for disaster areas by IDs. This paper calls the IDs "Disaster IDs". Network equipment preferentially processes the communications with the IDs. Network equipment needs to identify communications that are related with disaster areas in order to control the priority of communication from or to the disaster areas. Identification of communications for disaster areas needs to obtain location information by IP Addresses of disaster areas. This paper uses OpenFlow to implement the proposed countermeasure.
Improvement of Communication Quality during Disasters by using OpenFlow : Proposal Method of Disaster ID based on Location Information
Ogawa Kohichi; Yoshiura Noriaki
IEICE technical report. Internet Architecture, Jun. 2013, 一般社団法人電子情報通信学会
Jun. 2013 - Jun. 2013, Japanese
In emergencies by disasters, important communication for disasters area is not able to transfer preferentially because people uses network frequently. This paper proposes a countermeasure for the network during disasters. The countermeasure is a method that gives priority to communication from the disaster area. The method of the countermeasure is that attach ID of specific to packets from or to disaster areas if network equipments identify data of disaster areas from network packets. This paper calls the IDs "Disaster IDs". By attaching Disaster IDs, network equipments are able to check Disaster IDs. Network equipments transfer priority to data which attaches Disaster IDs. Network equipments need to identify whether the communication from disaster areas in order to control the priority of communication from the disaster area. Identification for communications from disaster areas needs to grasp of location information by IP Addresses from or to disaster areas. This grasp of correspondence uses databases. This paper uses OpenFlow as one way to achieve concrete countermeasures.
Effects and Plans of Rolling Black Outs of University in the Metropolitan Area on Great East Japan Earthquake
小川 康一; 吉浦 紀晃
Mar. 2013
Mar. 2013 - Mar. 2013, Japanese
2011年3月11日に発生した東日本大震災は,東北地方を中心に大きな被害をもたらした.大震災によって,信頼していた通信手段であるインターネットや固定電話や携帯電話の利用に支障が出た.Webサーバが稼働せずに情報発信ができないことも問題となった.震源地から遠く離れた埼玉大学では,地震による直接の被害はなかったものの,その後のエネルギー問題に起因する計画停電などによって間接的に影響が出た.通常,停電への対応としては発電機の利用があるが,計画停電への対応を発電機で行うことは困難であった.そこで,埼玉大学ではデータセンターとVirtual Private Serverを活用することで計画停電に対応した.そのため情報基盤が停止することはなく,学生や教職員はメールやWebによる情報の伝達を継続することができた.このようなコミュニケーション基盤は大学のような教育機関だけでなく,企業や公共機関における安否確認や連絡手段の確保に重要な機能となっている.本論文では,埼玉大学における震災への対応,今回の震災から得た教訓,震災対策について述べる.The Great East Japan Earthquake, which occurred on March 11th 2011, caused significant damage around Tohoku region in Japan. The earthquake was detrimental to reliable communication means such as the Internet, land phones and mobile phones. The earthquake also caused unavailability of web servers; inability to put out information on the Internet became a serious problem. Saitama University is far from the epicenter of the earthquake and the damage at the university was small. However, the university was indirectly affected by rolling blackouts due to energy problems. One of the countermeasures of blackouts is to use power generators, but it is difficult to deal with rolling blackouts only by power generators. The university responded to rolling blackouts by Data Center and Virtual Private Server and could maintain communications among students and staff of the university via e-mail or web servers during blackouts. Maintenance of communication infrastructure such as e-mail or web servers is important for safety confirmation system and communication means not only at education institutions such as universities but also at corporations and public institutions. This paper describes the handling of the earthquake at the university and lessons from earthquake, and discusses earthquake countermeasures for information infrastructure.
Indicating Important Parts in Searched Web Pages by Retrieval Terms
YOKOO SHUNICHI; YOSHIURA NORIAKIU
IEICE technical report. Internet Architecture, Mar. 2013, 一般社団法人電子情報通信学会
Mar. 2013 - Mar. 2013, Japanese
Users cannot always find retrieval terms immediately in web pages that are obtained by search engines. There are several reasons, one of which is that the retrieval terms are hidden in searched web pages. To solve the problem, this paper develops software that indicates important HTML elements in searched web pages. The software finds HTML elements which are the most closely related to the retrieval terms and indicates important part in searched web pages. This paper also evaluates the software by experiments. The results of the experiments show that the software can indicate important parts more correctly than existing similar software and reduce time taken to find the retrieval terms in searched web pages.
Development of Web Application Firewall by Using Bayesian Filter
HISHINUMA TAKESHI; YOSHIURA NORIAKI
IEICE technical report. Internet Architecture, Mar. 2013, 一般社団法人電子情報通信学会
Mar. 2013 - Mar. 2013, Japanese
Recently, many web applications which provide many kinds of services on the Internet and secu- rity is important in their operations. Web Application Firewall(WAF)is used for security of web applications. Many of WAFs consists of signature-based filters which have prepared particular input patterns, but the fil- ters do not always have proper patterns for malicious codes, malicious scripts and vulnerability due to bugs of individual web applications. This paper develops a WAF which learns good or bad input patterns by Bayesian filter when the administrators of web applications suggest input which should be rejected or ac- cepted. Input inspection uses a Bayesian filter and an anomaly detector. The anomaly detector is based on statistics, which are data of N-gram of inputs for web applications. This paper implements a prototype of our WAF by script language Python and experiments with randomly-generated HTTP requests. The results of the experiment found that iteration of learning by using Bayesian filter decreases false positives and false negatives.
Indicating Important Parts in Searched Web Pages by Retrieval Terms
横尾 駿一; 吉浦 紀晃
研究報告インターネットと運用技術(IOT), Mar. 2013
Mar. 2013 - Mar. 2013, Japanese
検索エンジンで検索を行った際に,検索されたWebページにおいて検索ワードの存在する箇所が非表示になっている場合,検索ワードがすぐに見つからない問題がある.この問題を解決するため,使用された検索ワードに基づいてWebページ内のHTML要素の中から最も検索ワードと関連が深いと思われる箇所を探し,その箇所を表示させるソフトウェアを開発した.結果,既存の類似したソフトウェアよりも正確に検索ワードの存在する箇所を表示し,ユーザが検索ワードを探す手間を省くことができる場合が存在することが確認できた.Users cannot always find retrieval terms immediately in web pages that are obtained by search engines. There are several reasons, one of which is that the retrieval terms are hidden in searched web pages. To solve the problem, this paper develops software that indicates important HTML elements in searched web pages. The software finds HTML elements which are the most closely related to the retrieval terms and indicates important part in searched web pages. This paper also evaluates the software by experiments. The results of the experiments show that the software can indicate important parts more correctly than existing similar software and reduce time taken to find the retrieval terms in searched web pages.
Development of Web Application Firewall by Using Bayesian Filter
菱沼 猛; 吉浦 紀晃
研究報告インターネットと運用技術(IOT), Mar. 2013
Mar. 2013 - Mar. 2013, Japanese
近年,インターネット上では様々なWebアプリケーションによるサービスが提供されているが,その運用ではセキュリティ対策が大きな課題となる.Web Application Firewall(以下WAF)は,事前に用意された特定の入力のパターンに基づくシグネチャベースの入力検査を行うが,悪意のあるコードやスクリプト,バグ等による個々のWebアプリケーション固有の脆弱性に対して,入力検査のための適切な入力のパターンが常に用意されているとは限らない.そこで本論文では,Webアプリケーションの管理者が提示する拒否すべき入力や許可すべき入力からベイジアンフィルタによる学習を行うWAFを開発した.入力検査では統計情報に基づくベイジアンフィルタとアノマリ検出器を併用し,統計情報にはN-gram統計を利用する.スクリプト言語Pythonを用いて本WAFのプロトタイプを実装し,ランダムに作成したHTTPリクエストによる実験を行った.実験の結果,ベイジアンフィルタによる学習を繰り返すことで入力検査における誤検知および検知漏れが減少していくことが確認できた.Recently, many web applications which provide many kinds of services on the Internet and security is important in their operations. Web Application Firewall(WAF) is used for security of web applications. Many of WAFs consists of signature-based filters which have prepared particular input patterns, but the filters do not always have proper patterns for malicious codes, malicious scripts and vulnerability due to bugs of individual web applications. This paper develops a WAF which learns good or bad input patterns by Bayesian filter when the administrators of web applications suggest input which should be rejected or accepted. Input inspection uses a Bayesian filter and an anomaly detector. The anomaly detector is based on statistics, which are data of N-gram of inputs for web applications. This paper implements a prototype of our WAF by script language Python and experiments with randomly-generated HTTP requests. The results of the experiment found that iteration of learning by using Bayesian filter decreases false positives and false negatives.
Indicating Important Parts in Searched Web Pages by Retrieval Terms
横尾駿一; 吉浦紀晃
電子情報通信学会技術研究報告, Mar. 2013
Mar. 2013 - Mar. 2013, Japanese
Development of Web Application Firewall by Using Bayesian Filter
菱沼猛; 吉浦紀晃
電子情報通信学会技術研究報告, Mar. 2013
Mar. 2013 - Mar. 2013, Japanese
Static Data Race Detection for Java Programs with Dynamic Class Loading by Analysis of String Expressions
魏偉; 吉浦 紀晃
Feb. 2013
Feb. 2013 - Feb. 2013, Japanese
マルチスレッドプログラムでは,スレッド間の排他制御においてミスが起こりやすい.排他制御が正しく行われないことに起因するエラーの1つとしてデータレースがある.データレース検出には動的手法と静的手法があり,動的手法はプログラム実行を通して得られた情報を解析することでデータレースを検出する.静的手法はプログラムのソースコードを調べることでデータレースを検出する.Javaプログラムの静的データレース検出方法がすでに提案されているが,この静的データレース検出方法では動的クラスローディングが無視されている.そこで本論文では静的データレース検出方法における動的クラスローディングへの対策の方法を提案し,プログラムを実装する.さらに,開発したプログラムでJavaプログラムのデータレースの検出を試行し,新たにデータレースを起こす箇所を発見した.これにより,本論文の検出プログラムの有効性を示した.Multi-thread programs are likely to have bugs in mutual exclusions between threads. Data race is one of the problems that occur from wrong mutual exclusions. There are two kinds of methods of data race detection: dynamic analysis detection and static analysis detection. Dynamic analysis detection is to detect data race by analyzing the results of program executions. Static analysis detection is to detect data race by analyzing source codes of programs. A method of static analysis detection of data race for Java programs has been proposed, but this method cannot deal with dynamic class loading. This paper proposes a method of static analysis detection of data race for dynamic class loading and implements this method. The experiment of this paper uses this method for Java programs that have dynamic class loading. This experiment shows that the proposed method can find possibilities of data race in Java programs more than previous data race detection methods.
Resolving Problems caused by denying ICMP packets in IPv6.
近江 敬太; 吉浦 紀晃
研究報告インターネットと運用技術(IOT), May 2012
May 2012 - May 2012, Japanese
IPv6 では ICMP パケットの遮断が原因で起こるフォールバック問題と Path MTU 問題がある.ICMP パケットが端末に届かない状況下でフォールバック問題や Path MTU 問題が発生した場合,通信に遅延が発生する.本論文では,フォールバック問題か Path MTU 問題が発生した場合,問題が生じている端末へ正規の ICMP パケットと同等な ICMP パケットを送信し,通信の遅延を解消させるシステムを開発した.開発したシステムの有効性を確かめるため実験を行った.実験ではフォールバック問題で起こる通信の遅延は解消できた.In IPv6, denying ICMP packets causes two problems; one is a problem of fallback in IPv4/IPv6 Dual-Stack environment and the other is that of Path MTU Discovery. Each of the problems delays communication. This paper creates a system that shortens this communication delay. The overview of the system behavior is as follows; the system runs on the gateway of a network and chapters the IPv6 traffic of the nodes in the network. The system checks IPv6 communication between the nodes in the network and outside of the network. If the system notices failure of the IPv6 communication, the system sends ICMP packets to the node that is a node of IPv6 communication to prompt fallback of IPv6/IPv4 or adjustment of packet length for path MTU problem. This paper evaluates the performance of the system by experiment, which shows that the system can shorten communication delay that is caused by the fallback problem.
Test Generation for Equivalence of Access Control List
吉浦 紀晃; 佐山 弘和
研究報告インターネットと運用技術(IOT), Mar. 2012
Mar. 2012 - Mar. 2012, Japanese
Access Control List は、Layer3 スイッチや Firewall などのネットワーク機器において、どのようなパケットを通過させ遮断させるかを記述したものである.AccessControl List はネットワークトポロジーやセキュリティポリシーの変更、セキュリティインシデントの発生などで変更されることがある.ネットワーク管理者はその度に変更することになるが、この変更が積み重なると Access Control List には冗長な記述が増えてくることがある.ネットワーク管理者が Access Control List を書き換える場合、その前後で Access Control List の意味が変わっていないことを確認する必要がある.本論文では、2 つの Access Control List の等価性を判定するためのテストケースの作成方法を提案する.このテストケースはパケットであり、2 つの Access Control List をそれぞれ設定したときのこのパケットを透過性をチェックすることで、2 つの Access Control List の等価性を判定する.Computer network security is one of the important issues in the Internet age. Network Administrators of companies or universities filters IP packets at network equipment between their organizations and the Internet to keep the security of the computer networks. Access control lists are lists of rules, which describe permission or denial of packet transition by source IP address, destination IP address, port numbers and so on. Access control lists are not always fixed; network administrators change access control list according to the change of network topology or network security policy. After several changes, access control lists may include redundancies and network administrators have to modify the access control list to remove redundancies. This modification keeps the semantics of access control list. After modification, the network administrators have to confirm that the semantics of access control list does not change. For this purpose, this paper proposes the method of generating test packets to confirm the equivalence of two access control lists.
Test Generation for Equivalence of Access Control List
YOSHIURA NORIAKI; SAYAMA HIROKAZU
IEICE technical report. Internet Architecture, Mar. 2012, 一般社団法人電子情報通信学会
Mar. 2012 - Mar. 2012, Japanese
Computer network security is one of the important issues in the Internet age. Network Administrators of companies or universities filters IP packets at network equipment between their organizations and the Internet to keep the security of the computer networks. Access control lists are lists of rules, which describe permission or denial of packet transition by source IP address, destination IP address, port numbers and so on. Access control lists are not always fixed; network administrators change access control list according to the change of network topology or network security policy. After several changes, access control lists may include redundancies and network administrators have to modify the access control list to remove redundancies. This modification keeps the semantics of access control list. After modification, the network administrators have to confirm that the semantics of access control list does not change. For this purpose, this paper proposes the method of generating test packets to confirm the equivalence of two access control lists.
リアクティブシステム仕様の実現不能判定器の高速化
閨芳紀; 吉浦紀晃
情報処理学会全国大会講演論文集, Mar. 2012
Mar. 2012 - Mar. 2012, Japanese
高い信頼性の求められるリアクティブシステムを開発するためには形式的手法による検証が有効である.特に仕様の段階での自動検証は開発コスト削減にも非常に効果的である.そのリアクティブシステムの仕様が満たすべき性質の一つに実現可能性がある.この性質を満たすことを検証するために,タブローと推論規則を用いた実現不能性判定手続きの提案がされ,これに基づく実現不能判定器の作成が行われた.しかしながら,この判定器では判定能力,速度共に不十分で判定できない仕様が存在する.そこで,本研究ではより判定能力,速度に優れた実現不能判定器の開発を行う.
静的データレース検出における動的クラスローディングへの対策
WEI Wei; 吉浦紀晃
情報処理学会全国大会講演論文集, Mar. 2012
Mar. 2012 - Mar. 2012, Japanese
M. Naik らは、静的データレース検出方法を提案している。この静的データレース検出方法では、動的クラスローディングが無視されている。多くのJavaプログラムに動的クラスローディングが使われているので、もし動的クラスローディングを無視すると重要なデータレースを漏らすおそれがある。そこで、本研究では静的データレース検出方法における動的クラスローディングへの対策を提案する。動的クラスローディングへの対策アルゴリズムには、URLの文字列表現を計算するのが重要である。URLの文字列表現は3つのパターンで計算されている。3つのパターンとは、ユーザからの入力に依存しているパターン、変数間の演算に依存しているパターン、そしてコンフィグファイルに依存しているパターンである。本研究では、動的クラスローディングへの対策を提案する。
A Framework for Communication Infrastructure against Disasters
Ogawa Kohichi; Yoshiura Noriaki
IEICE technical report. Internet Architecture, Feb. 2012, 一般社団法人電子情報通信学会
Feb. 2012 - Feb. 2012, Japanese
The Great East Japan Earthquake, which occurred on March 11th 2011, caused significant damage around Tohoku region in Japan. Some means of communication on Internet, telephone and mobile phone have been used as reliable communication methods, but they were unavailable due to the earthquake. This paper proposes a framework for communication infrastructure against disasters. In addition, this paper proposes hardware for disaster response which implemented this framework. This hardware is called 'BOX'. This box includes several servers and starts automatically the communication service in disasters. The boxes are supposed to be located at several places for backup of communication infrastructure.
Automatic detecting music and video file downloaded by BitTorrent
周 志強; 吉浦 紀晃
IEICE technical report, Feb. 2011, 電子情報通信学会
Feb. 2011 - Feb. 2011, Japanese
Automatic Detecting Music and Video File Downloaded by BitTorrent
周 志強; 吉浦 紀晃
Feb. 2011
Feb. 2011 - Feb. 2011, Japanese
近年,インターネットの普及に伴って,インターネットのトラフィックが年々増大している.サーバー対クライアントの通信に加えて,クライアント同士が通信する Peer to Peer (P2P) の利用が盛んに利用されるようになってきている.P2P の 1 種である BitTorrent は OS などの大きなファイルのダウンロードに利用される一方,著作権侵害など違法なファイル配信に利用されることがある.本研究では BitTorrent でファイルをダウンロードする時,音楽や映像ファイルを自動で検出し,違法なファイルとしてこのダウンロードを止める仕組みを提案する.Recently, with internet spreading , network traffic increases year by year. While Server-Client system is used , Peer to Peer (P2P) communication comes to be used actively. BitTorrent which is one kind of P2P is used to download big files such as OS etc. It is also used to download illegal files such as the copyright infringing material etc. This study proposes a mechanism that automatically detects music and video file downloaded by BitTorrent,and stops this dovnload.
Implementation of automated theorem prover of relevant logic ER
吉沢 康伸; 吉浦 紀晃
Mar. 2010
Mar. 2010 - Mar. 2010, Japanese
適切さの論理ERの自動定理証明器の実装
吉沢康伸; 吉浦紀晃
人工知能学会人工知能基本問題研究会資料, Mar. 2010
Mar. 2010 - Mar. 2010, Japanese
Reduction of Access Control List for Hardware Processing
石川 拓道; 吉浦 紀晃
インターネットと運用技術シンポジウム2009論文集, Dec. 2009
Dec. 2009 - Dec. 2009, Japanese
ネットワークにおけるアクセスコントロールリスト(Access Control List,ACL)はファイアウォールの機能の1つでネットワークセキュリティにおいて重要な役割を果たすものである。 ACLの処理には一律でかつ短い時間で処理が可能なハードウェアが使われることが多いが、 ACLは物理的制限のあるハードウェアに適したサイズでなければならない。そこで本論文では与えられたACLの記述を短縮し、ハードウェアのサイズに当てはまるようにするプログラムを開発する。そして開発したプログラムを実際のACLに使用するこAccess control list (ACL) is one of the most important,things in computer,network security. While an inexpensive router or PC processes ACL by software, network equipment such as Layer 2 or 3 switch processes ACL by hardware because there is a speed limit
A Study of Mobile Node's Mobility and Communication Performance Evaluation On Mobile Communication Systems
井上通宏; 吉浦紀晃; 小野里好邦; 木村博茂
日本シミュレーション学会大会発表論文集, Jun. 2008
Jun. 2008 - Jun. 2008, English
埼玉大学FTTLの構築
伊藤和人; 田邊俊治; 小川康一; 吉浦紀晃; 重原孝臣; 前川仁
学術情報処理研究, Sep. 2007
Sep. 2007 - Sep. 2007, Japanese
利他主義とITによる地域社会の安全化~集合住宅既設エレベータへの設置事例と集合住宅内でのコンセンサス形成~
大塚洋明; 熊倉繁; 藤井雄作; 吉浦紀晃
電気学会全国大会講演論文集, Mar. 2006
Mar. 2006 - Mar. 2006, Japanese
分散自律設置カメラシステムによる地域社会の安全化--e自警ネットワーク構想の概要と学校への導入事例紹介 (第22回センシングフォーラム 資料--センシング技術の新たな展開と融合) -- (セッション1B2 ネットワークセンシングシステム)
藤井 雄作; 吉浦 紀晃; 太田 直哉
Sep. 2005
Sep. 2005 - Sep. 2005, Japanese
Simulation Study of Performance Evaluation on Two-dimensional Cellular Networks From the view point of Mobile Node's Speed Distributions
INOUE Michihiro; YOSHIURA Noriaki; ONOZATO Yoshikuni
電気学会研究会資料. CMN, 通信研究会, May 2005
May 2005 - May 2005, Japanese
Performance Evaluation on One-dimentional Cellular Networks under Several Kinds of Speed Distributions
INOUE MICHIHIRO; YOSHIURA NORIAKI; ONOZATO YOSHIKUNI
IPSJ journal, Feb. 2005, Information Processing Society of Japan (IPSJ)
Feb. 2005 - Feb. 2005, Japanese
In this paper, we use simulation method to evaluate how the mobile node's speed distribution difference or difference between maximum and minimum speeds influences the communication performance of one-dimensional mobile cellular networks such as arterial roads or speedways. Our simulation results show that the speed distribution which has the much more low speed mobile users than the high speed mobile users has maximally 20% higher blocking probability and 16% longer mean holding time of completed calls compared to the other speed distribution which has the much more high speed mobile users than the low speed mobile users. In the heavy traffic situation, distribution difference has influences on blocking probability and mean holding time of completed calls. The number of completed call does not vary whatever speed distribution or the difference between maximum and minimum speeds is. By considering our simulation results, we can mention that the number of low speed mobile users has much influences on the the blocking probability and the mean holding time of completed calls.
Using the Security Camera System Based on Individually Maintained Computers for Homeland Security
YOSHIURA N.
The e-JIKEI Network Project, Proc. IEEE IMTC 2005, (Ottawa, Canada), 5, 2005
2005 - 2005
Simulation Study of Performance Evaluation on One-dimensional Cellular Networks From the view point of Mobile Node's Speed Distributions
井上通宏; 吉浦紀晃; 小野里好邦
電気学会通信研究会資料, Jun. 2004
Jun. 2004 - Jun. 2004, Japanese
Characteristic of Crossover Traffic in Graphical Representation of Cellular networks
Michihiro Inoue; YOSHIURA NORIAKI; ONOZATO YOSHIKUNI
The 2004 IEEE International Midwest Symposium on Circuits and System(MWSCAS2004),July 25-28, Hiroshima, Japan, 2004
2004 - 2004
生体情報による認証へのハッシュ関数の応用
吉浦紀晃; 吉崎陽一; 中村智博; 小野里好邦
情報科学技術フォーラム, Aug. 2003
Aug. 2003 - Aug. 2003, Japanese
Experiment of Biometric Recognition by Hash Function
NAKAMURA T; Yoshiura Noriaki; Onozato Yoshikuni
IPSJ SIG Notes, Feb. 2003, 一般社団法人情報処理学会
Feb. 2003 - Feb. 2003, Japanese
In recent years, exact individual recognition is demanded from the increase in the electronic commerce by the spread of the internet etc. In the present condition, recognition with a password is main stream, but biometric recognition through the internet increase from now on. Although biometric data is encrypted and saved in the existent recognition system, it may be decrypted, and then the biometric data itself may be stolen. This paper experiments of biometric recognition by proposing the method of treating the biometric data by hash function.
Performance of live and interactive video in Distance Education
R.Deshpande; YOSHIURA NORIAKI; R.Nakanishi; ONOZATO YOSHIKUNI
25th Annual Conference,Pacific Telecommunications Council(PTC2003), January 19-23, Hilton Hawaiian Village Honolulu,Hawaii,U.S.A., Collaborative Applications T.1.2.1 (2003), 2003
2003 - 2003
Experiment of Multi point Distance Learning
吉浦 紀晃; 中西 令; 小野里 好邦
情報処理学会研究報告インターネットと運用技術(IOT), Oct. 2002
Oct. 2002 - Oct. 2002, Japanese
遠隔講義はネットワークの発達と共に広く研究されており 実際の講義等で利用されている.また、遠隔講義のシステムの提案や、実際の遠隔講義における様々な考察や報告が行われている.しかしながら 多地点参加の遠隔講義に関する報告は少なく ほとんどが2 3地点参加の遠隔講義のものである.本論文では、多くの地点の遠隔講義への参加を容易にするために、MPEG4ストリーム配信システムと遠隔会議システムの2つのシステムを用いることにより スケーラビリティを持つ遠隔講義システムを用意し 8地点というこれまであまり報告されていない多地点による遠隔講義を実際に行った.運用者や実施者による考察 受講者のアンケート、映像や音声の途切れ時間 トラフィックなどの情報など 遠隔講義の実施により得られた様々な情報から 今回利用したシステムの有効性や多地点の遠隔講義の問題点とその分析を行なう.The rapid advancement of the Information technology(IT) such as the Internet has been changing education, particularly distance lecture becomes very popular in higher education. Although, there are several reports of experiments of distance lecture, most of them is reports of two or three point distance lecture. This paper presents an experiment of eight point distance lecture and analyzes the results of this experiment with questionnaire answers of participants, image and sound pause data and traffic data. The system distance lecture system used in this paper is a hybrid system of two network communication systems; one is MPEG4 streaming system and the other is distance meeting system. This hybrid system has scalability of distance lecture participant sites.
Experiment of Multi point Distance Learning
YOSHIURA Noriaki; NAKANISHI Ryo; ONOZATO Yoshikuni
IEICE technical report. Internet Architecture, Oct. 2002, The Institute of Electronics, Information and Communication Engineers
Oct. 2002 - Oct. 2002, Japanese
The rapid advancement of the Information Technology (IT) such as the Internet has been changing education, particularly distance lecture becomes very popular in higher education. Although, there are several reports of experiments of distance lecture, most of them is reports of two or three point distance lecture. This paper presents an experiment of eight point distance lecture and analyzes the results of this experiment with questionnaire answers of participants, image and sound pause data and traffic data. The system distance lecture system used in this paper is a hybrid system of two network communication systems; one is MPEG4 streaming system and the other is distance meeting system. This hybrid system has scalability of distance lecture participant sites.
Concentration of DNS Server Administration.
吉浦紀晃
情報処理学会研究報告, Oct. 2001, 一般社団法人情報処理学会
Oct. 2001 - Oct. 2001, Japanese
In a large oragnization such as university, each department has its own subdomain and DNS server. Since multilingualization or several kinds of attacks occurs on DNS server, administrators of DNS server are required to deal with many problems. One of the best ways of administration of DNS server is to concentrate many DNS servers into one DNS server. The benefit is that many administrators are not needed. The weak point of this way is that the administrator of centralized DNS server have to deal with much DNS data. This paper proposes the way of DNS administration, which separates DNS server administration and DNS data administration, and presents the Web based DNS data registration system.
環境に合わせて最適な動作を行うリアクティブシステム
吉浦紀晃
日本ソフトウエア科学会大会論文集, Sep. 2001
Sep. 2001 - Sep. 2001, Japanese
Synthesis of Evolutional Reactive System Programs.
吉浦紀晃
電子情報通信学会技術研究報告, Jul. 2001
Jul. 2001 - Jul. 2001, Japanese
Synthesis of Evolutional Reactive System Programs
YOSHIURA Noriaki
Technical report of IEICE. SS, Jul. 2001, 一般社団法人電子情報通信学会
Jul. 2001 - Jul. 2001, Japanese
Reactive system is a system which ideally never terminates and is intended to maintain some interaction with its environment. There are some researches of synthesis reactive system programs from specifications discribed in formal languages. The synthesis methods proposed in these researches synthesize several reactive system programs from one specification. It becomes a problem how to choose a good reactive system program among several synthesized programs. However, which reactive system is good depends on the behaviors of the environment. That is, we can not decide which reactive system program is good until it interacts the environment. Thus, it is desirable that a reactive system program should evolve itself according to the behavior of the environment. In this paper, we propose an idea of reactive system program evolution.
DNSサーバの分散管理から集中管理への移行 (第4回ネットワークシンポジウム講演論文集)
吉浦 紀晃; Yonezaki Naoki
Apr. 2001
Apr. 2001 - Apr. 2001, Japanese
Relation between stepwise satisfiablity and safety property of reactive system specification
YOSHIURA Noriaki; YONEZAKI Naoki
Technical report of IEICE. SS, Jan. 2001, 一般社団法人電子情報通信学会
Jan. 2001 - Jan. 2001, Japanese
Several concepts of realizability of specification of reactive system has been introduced. It is possible to check whether specifications of reactive sysmtem are realizable if these specifications are described by temporal logic. The realizability introduced in some papers are too strong for actual reactive systems. Stepwise satisfiablity, one of the concepts of realizability, is suitable for actual reactive systems. On the other hand, safety property is one of the most important properties of reactive systems. However, the formal definition of this property is not discussed so much. This paper discusses the relation between stepwise satisfiablity and safety property.
時相論理によるリアクティブシステム動作仕様からの効率的なプログラムの合成法 (第3回ネットワークシンポジウム講演論文集)
吉浦 紀晃
Apr. 2000
Apr. 2000 - Apr. 2000, Japanese
Relevant Logic $ER$ with Extended Provability (Program Transformation, Symbolic Computation and Algebraic Manipulation)
Yoshiura Noriaki; Yonezaki Naoki
RIMS Kokyuroku, Jan. 2000, 京都大学
Jan. 2000 - Jan. 2000, Japanese
Comparison of Relevant Logic R and ER
YOSHIURA Noriaki; YONEZAKI Naoki; Noriaki Yoshiura; Naoki Yonezaki
Journal of Japanese Society for Artificial Intelligence, Nov. 1999, 人工知能学会
Nov. 1999 - Nov. 1999, Japanese
The formalization of human deductive reasoning is a main issue in artificial intelligence. Although classical logic (CL) is one of the most useful ways for the formalization, the implication of CL has some fallacies. For example, in Cl, A→B can be inferred form B for and arbitrary formula A. This inference is incorrect from the viewpoint of the meaning of implication which human has. In human deductive reasoning, when A⇾B is inferred, A and B should be related. Relevant logic has been studied for removal of implication fallacies in CL. The system R is a typical logical system from which fallacies of relevance and validity are removed. ER is a relevant typical logical system from which fallacies of relevance and validity are removed. ER is a relevant logical system from which these fallacies are removed and this system is not weaker than R. Especially, it is known that disjunctive syllogism holds in ER but does not hold in R. This inference rule is considered to be natural in human reasoning. In this paper, we prove that ER is properly stronger than R. This means that, for the formalization of human deductive reasoning, ER is more suitable than other relevant logical systems. The proof consists of the following steps: First, the natural deduction systems FR and FR' are introduced. FR is a natural deduction system equivalent to R. It is proved that FR' is stronger than FR. Next, we show that he normalization theorem holds in FR' and that there is a proof of ER corresponding to each normal proof of FR'. In addition, We show the fact that there is theorem of ER which can not be inferred in R. It follows that ER is properly stronger than R.
Routing Control for a network including public address and private address networks.
吉浦紀晃; 桜井成一朗; 坂本直志; 藤本衛
情報処理学会研究報告, Sep. 1999, 一般社団法人情報処理学会
Sep. 1999 - Sep. 1999, Japanese
Private network address is a temporary solution for exhaustion of the 32-bit IP address space. From the view of network security, private network addresses have been also used in many sites. This paper presents one example of administrating campus network in which public address networks and private address networks coexist. One of the problems in such an administration is control of routing and it is necessary for solving this problem that all routers for private address network deal with variable length subnet mask (VLSM) and routing protocol handling VLSM.
Decidability of Relevant Logic ER.
吉浦紀晃; 米崎直樹
人工知能学会誌, Sep. 1999, 人工知能学会
Sep. 1999 - Sep. 1999, Japanese
Relevant Logic ER with Extended Provability
YOSHIURA Noriaki; YONEZAKI Naoki; Noriaki Yoshiura; Naoki Yonezaki
Journal of Japanese Society for Artificial Intelligence, Nov. 1998, 人工知能学会
Nov. 1998 - Nov. 1998, Japanese
The formalization of human deductive reasoning is a main issue in artificial intelligence. Although classical logic (CL) is one of the most useful ways for the formalization, the implication of CL has some fallacies. For example, in CL, A ⟶ B can be inferred from B for an arbitrary formula A. This inference is not relevant from the viewpoint of the meaning of implication which human has. In human reasoning, when A ⟶ B is inferred, A and B should be related. Relevant logic has been studied for removal of the implication fallacies of CL. For the relevance of A ⟶ B, several principles are introduced. One of the most important principles is Variable-sharing, where, if A ⟶ B is a theorem, then A and B share an atomic proposition. Relevant logical system should satisfy this principle. Another principle is that the truth values of A and B do not decide A ⟶ B. Classification of the fallacies of implication is also introduced. Fallacies are classified into those of relevance, validity, or necessity. Since the fallacies of relevance and validity are strong fallacies, they are removed from almost all relevant logical systems. Relevant logic, however, is a weaker logical system than CL. In this paper, we propose the relevant logic ER. Then we prove that Variable-sharing holds in ER, that fallacies of relevance and validity are removed from ER. We also prove that ER is not weaker than R. Respecially, disjunctive syllogism holds in ER but does not hold in R. In this sense, ER is a natural formalization of human reasoning.
Logic of Relevant Connectives.
吉浦紀晃; 米崎直樹
日本ソフトウエア科学会大会論文集, Sep. 1998
Sep. 1998 - Sep. 1998, Japanese
Formalization of human deductive reasoning with respect to relevance of connectives
YOSHIURA Noriaki; YONEZAKI Naoki
IEICE technical report. Artificial intelligence and knowledge-based processing, Nov. 1997, 一般社団法人電子情報通信学会
Nov. 1997 - Nov. 1997, Japanese
The formalization of human deductive reasoning is a main issue in artificial intelligence. Although logic is one of the most useful ways of such formalization, inference of logic does not necessarily correspond to human deductive reasoning. The reason is that the aim of logical inference is to deduce the truth while that of human reasoning is to infer useful information. In this paper, we discuss and define relevance of logical connectives on human deductive reasoning and propose the logical system LRC (Logic of Relevant Connectives). LRC is based on the relevant logical system ER which implication fallacy is removed from and is one of the strongest relevant logical systems.
Relevant logic ER, the extended system R
吉浦 紀晃; 米崎 直樹
全国大会講演論文集, Sep. 1997
Sep. 1997 - Sep. 1997, Japanese
論理の主たる目的は, 人間の行なう演繹的な推論を形式化することである。しかし, 古典論理における含意「ならば」は, 日常利用する「ならば」とは, 違和を感じる箇所もある。例えば, 古典論理では, 「2+3=5」が真であることから, 「雪は白いならば, 2+3=5」が真となる。しかし, このような推論は, 奇異に感じられる。古典論理の含意が持つこのような違和感は次のように3つに分類される。1. 関連性の違和感 A→(B→A), 2. 恒真性の違和感 (A∧¬A)→B, A→(B∨¬B), 3. 偶然性の違和感 A→((A→B)→B)。適切さの論理は, これらの違和感を除去することを目的として研究されてきた。Lewisによる関連性の違和感が除去された厳密含意の提案に始まり, 多くの適切さの論理の体系が提案されている。代表的な体系としては, ChurchやMohによる, 関連性と恒真性の違和感が除去された論理体系Rや, Ackennannによる, すべての違和感が除去された論理体系Eなどがある。関連性・恒真性の違和感は強い違和感とみなされ, ほとんどの体系で, これらは除去されている。一方, 適切さの論理では, 体系が弱いという問題がある。例えば, 自然演繹における推論規則Disjunctive syllogism (DS)が許されない。[numerical formula]この推論規則が認められない理由は, 以下のように(A∨¬A)+Bが証明可能となるためである。[numerical formula][5]では, DSが問題のある規則と見なされ, 適切さの論理では, この推論規則は除去されている。また, 違和感を含んでいない以下の式が, 適切さの論理では定理ではない。1. A→(B→(A∧B)), 2. A→(A∧(B∨¬B))。適切さの論理では, 1.が定理である場合, A→(B→A)が定理となり, また, 2.が定理である場合, A→(B∨¬B)が定理となるため, これら2つの式は定理とはならない。このように, 適切さの論理では, 違和感を除去するために, 結果として, 定理となることが自然であると考えられる式が定理とはならず, また, 自然な推論規則が成り立たない。本稿では, 関連性・恒真性の違和感が除去されており, 体系Rよりも強い論理体系ERを提案する。ERは, [4]に示されているsequentによる自然演繹の体系として与えられ, 各推論規則では, 式の属性が利用される。この属性は, 証明を制御し, 違和感を含む式の推論を防ぐために利用される。また, 属性を利用する点からみると, ERは, Labelled deductive systemの一種であるといえる。
Relevant Logic for Knowledge Based Reasoning.
吉浦紀晃; 米崎直樹
日本ソフトウエア科学会大会論文集, Sep. 1996
Sep. 1996 - Sep. 1996, Japanese
The decision procedure for The Temporal Logic with More Than Operator.
吉浦紀晃; 米崎直樹
日本ソフトウエア科学会大会論文集, Sep. 1992
Sep. 1992 - Sep. 1992, Japanese