Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Secure Distributed Processing of BP with Updatable Decomposition Data

    Many studies have been conducted to perform machine learning while maintaining data confidentiality. For example, many studies have been conducted in this field on 1) secure multiparty computation (SMC), 2) qu...

    Hirofumi Miyajima, Noritaka Shigei in Transactions on Engineering Technologies (2023)

  2. No Access

    Article

    Learning algorithms for vector quantization using vertically partitioned data with IoT

    The use of cloud computing systems that support AI is expanding. On the other hand, as the number of terminals and devices connected to the system increases, the decline in capacity is becoming apparent. Edge ...

    Hirofumi Miyajima, Noritaka Shigei, Hiromi Miyajima in Artificial Life and Robotics (2021)

  3. No Access

    Chapter and Conference Paper

    Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files

    Although rapid malware detection is very important, the detection is difficult due to the increase of new malware. In recent years, blockchain technology has attracted the attention of many people due to its f...

    Ryusei Fuji, Shotaro Usuzaki in Advances in Networked-based Information Sy… (2020)

  4. No Access

    Chapter and Conference Paper

    A Machine Learning Framework for Edge Computing to Improve Prediction Accuracy in Mobile Health Monitoring

    The great challenges in the aging society and the lack of human resources, especially in health care, remains a formidable task. The cloud centric computing paradigm offers a solution in processing IoT applica...

    Sigdel Shree Ram, Bernady Apduhan in Computational Science and Its Applications… (2019)

  5. No Access

    Chapter and Conference Paper

    An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks

    CAPTCHA is a type of challenge response test used to distinguish human users from malicious computer programs such as bots, and is used to protect email, blogs, and other web services from bot attacks. So far,...

    Ryohei Tatsuda, Hisaaki Yamaba in Advances in Internet, Data & Web Technolog… (2018)

  6. No Access

    Chapter and Conference Paper

    Evaluation of Never Die Network System for Disaster Prevention Based on Cognitive Wireless Technologys

    We developed a Never Die Network (NDN) system that is a new network system to achieve both the Network Capability in the normal and Network Connectivity in disaster based on the experience of Great East Japan...

    Goshi Sato, Noriki Uchida, Norio Shiratori in Complex, Intelligent, and Software Intensi… (2018)

  7. No Access

    Chapter and Conference Paper

    Development of a Monitoring System Based on Power Consumption

    In recent years, there has been an increase in demand for monitoring systems to help ensure the safety and wellbeing of elderly people and children [1, 2]. In this paper, we collaborate with a local company to co...

    Kentaro Aburada, Kengo Todaka in Advances in Network-Based Information Syst… (2018)

  8. No Access

    Chapter and Conference Paper

    Learning Method of Fuzzy Inference Systems for Secure Multiparty Computation

    Many studies on privacy preserving of machine learning and data mining for cloud computing have been done in various methods by use of randomization techniques, cryptographic algorithms, anonymization methods,...

    Hirofumi Miyajima, Noritaka Shigei in Transactions on Engineering Technologies (2018)

  9. No Access

    Chapter and Conference Paper

    Enhancing an IaaS Ontology Clustering Scheme for Resiliency Support in Hybrid Cloud

    When an undesirable situation occurs in a hybrid cloud computing environment, vital issues arise when searching for IaaS cloud services that best-match to the user’s requirements. This includes the different ...

    Toshihiro Uchibayashi, Bernady Apduhan in Computational Science and Its Applications… (2016)

  10. No Access

    Chapter and Conference Paper

    Towards a Cloud Ontology Clustering Mechanism to Enhance IaaS Service Discovery and Selection

    The continuing advances in cloud computing technology, infrastructures, applications, and hybrid cloud have led to provide solutions to challenges in big data and high performance computing applications. The i...

    Toshihiro Uchibayashi, Bernady Apduhan in Computational Science and Its Applications… (2015)

  11. No Access

    Article

    A domain specific sub-ontology derivation end-user tool for the Semantic Grid

    Sub-ontology, as the name implies, is a subset of an ontology tailored for a specific domain. Large-scale ontology data can be optimized by extracting the required sub-ontology. Sub-ontology extraction that re...

    Toshihiro Uchibayashi, Bernady O. Apduhan, Norio Shiratori in Telecommunication Systems (2014)

  12. No Access

    Article

    Analysis of the Bluetooth device discovery protocol

    Device discovery and connection establishment are fundamental to communication between two Bluetooth (BT) devices. In this paper, we give an analytical model of the time it takes for the master in a piconet to...

    Goutam Chakraborty, Kshirasagar Naik, Debasish Chakraborty in Wireless Networks (2010)

  13. No Access

    Chapter and Conference Paper

    An Effective Inference Method Using Sensor Data for Symbiotic Healthcare Support System

    We have been investigating a symbiotic healthcare support system in ubiquitous computing environment. By using knowledge about healthcare and various kinds of information including vital sign, location informa...

    Satoru Izumi, Yusuke Kobayashi in Computational Science and Its Applications… (2010)

  14. Chapter and Conference Paper

    Visitor Access Control Scheme Utilizing Social Relationship in the Real World

    Access control to resources is one of the most important technologies for supporting human activities in the digital space. To realize the control two schemes were proposed: RBAC (Role-Based Access Control) an...

    Gen Kitagata, Debasish Chakraborty, Satoshi Ogawa, Atushi Takeda in Trust Management IV (2010)

  15. No Access

    Chapter and Conference Paper

    Design and Implementation of Adaptive Inter-platform Communication Mechanism for Agent-Based Framework in Ubiquitous Computing Environment

    Recently, various computing technologies such as embedded computer, and wireless access networks etc. are in general use, and applications in ubiquitous computing (ubicomp) environments are widely spread. In t...

    Taishi Ito, Hideyuki Takahashi in Computational Science and Its Applications… (2010)

  16. No Access

    Chapter and Conference Paper

    3D Collaboration Environment Based on Real Space and Digital Space Symbiosis

    In this paper, we propose 3D symbiotic collaboration environment which is based on concept of real and digital spaces symbiosis. Collaboration environments which are using Augmented Reality have been expected ...

    Gen Kitagata, Akira Sakatoku, Akifumi Kawato in Computational Science and Its Applications… (2010)

  17. No Access

    Chapter and Conference Paper

    Towards a Framework for Workflow Composition in Ontology Tailoring in Semantic Grid

    Research and developments in Semantic Grid computing has gained much attention in areas of knowledge discovery, medical sciences, business world, among others. Dealing with large domain ontology in this comput...

    Toshihiro Uchibayashi, Bernady O. Apduhan in Computational Science and Its Applications… (2009)

  18. No Access

    Chapter and Conference Paper

    An Agent-Based Healthcare Support System in Ubiquitous Computing Environments

    This paper presents an advanced healthcare support system in ubiquitous computing environment. By utilizing knowledge about healthcare and various information including vital sign, physical location, and video...

    Hideyuki Takahashi, Satoru Izumi in Ambient Assistive Health and Wellness Mana… (2009)

  19. No Access

    Chapter and Conference Paper

    An Agent-Based Framework for Healthcare Support System

    There is a steady increase of number of people who are suffering from lifestyle-related diseases. Although much work has been done on healthcare support system, these existing systems are limited in ability of...

    Hideyuki Takahashi, Satoru Izumi in Principles of Practice in Multi-Agent Syst… (2009)

  20. No Access

    Chapter and Conference Paper

    Symbiotic Computing: Concept, Architecture and Its Applications

    Aiming towards the next generation ubiquitous stage we have been pursuing a research on information and communication paradigm, called “Symbiotic computing.” Here, we first describe a basic concept and an arch...

    Takuo Suganuma, Kenji Sugawara, Norio Shiratori in Ubiquitous Intelligence and Computing (2007)

previous disabled Page of 3