Masahiro Kobayashi

ORCID: 0000-0002-6501-7095
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Natural Language Processing Techniques
  • Syntax, Semantics, Linguistic Variation
  • Advanced Optical Network Technologies
  • RFID technology advancements
  • Software-Defined Networks and 5G
  • Energy Harvesting in Wireless Networks
  • Indoor and Outdoor Localization Technologies
  • Speech and dialogue systems
  • IoT and Edge/Fog Computing
  • Network Traffic and Congestion Control
  • Topic Modeling
  • Cooperative Communication and Network Coding
  • Molecular Communication and Nanonetworks
  • Reinforcement Learning in Robotics
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Mobile Agent-Based Network Management
  • Network Time Synchronization Technologies
  • Distributed and Parallel Computing Systems
  • Advanced Algorithms and Applications
  • Wireless Communication Networks Research
  • Literature, Language, and Rhetoric Studies
  • Age of Information Optimization
  • Digital Transformation in Law
  • Power Line Inspection Robots

NTT (Japan)
2002-2024

Tottori University
2006-2014

Tohoku University
2008-2009

Edge computing is a new paradigm to provide capability at the edge servers close end devices. A significant research challenge in finding efficient task offloading and cloud considering various characteristics limited network server resources. Several reinforcement learning (RL)-based task-offloading methods have been developed, because RL can immediately output by pre-learning. However, these do not take into account clouds or focus only on single cloud. They also bandwidth topology of...

10.1109/tnsm.2023.3267809 article EN cc-by IEEE Transactions on Network and Service Management 2023-04-18

Application layer multicast (ALM) is highly expected to replace IP multicasting as the new technological choice for content delivery. Depending on streaming application, ALM nodes will construct a tree and deliver stream through this tree. However, if node resides in leaves, it cannot its descendant nodes. In case, quality of service (QoS) be compromised dramatically. To overcome problem, topology-aware hierarchical arrangement graph (THAG) was proposed. By employing multiple description...

10.1109/tmm.2008.2008933 article EN IEEE Transactions on Multimedia 2008-12-18

Radio frequency identification (RFID) enables everyday objects to be identified, tracked, and recorded. Because of expense, size, lifetime requirements, some simple active RFID tags are designed with only a transmitter. The transmitter-only unaware each other simply blink ID packets periodically. question is how we can read the enough confidence. paper models access protocol as pure ALOHA develops mathematical analysis identify tag blinks within interrogation zone without prior knowledge...

10.1109/pimrc.2004.1370901 article EN 2005-01-12

During the last several years, Internet has evolved from a wired infrastructure to hybrid of and wireless domains by spreading worldwide interoperability for microwave access (WiMAX), Wi-Fi, cellular networks. Therefore, there is growing need facilitate reliable content delivery over such heterogeneous On other hand, application layer multicast (ALM) become promising approach streaming media server large number interested nodes. ALM nodes construct tree deliver stream through this tree....

10.1109/tmm.2009.2032692 article EN IEEE Transactions on Multimedia 2009-09-24

Edge computing is a new paradigm to provide capability at the edges close end devices. A significant research challenge in edge finding an efficient task offloading and cloud servers, considering various characteristics limited network server resources. Several studies have proposed reinforcement learning (RL) based method, because RL can immediately output by pre-learning. However, due performance problem of RL, these previous do not consider clouds or focus only on single cloud. They also...

10.1109/icc45855.2022.9838540 article EN ICC 2022 - IEEE International Conference on Communications 2022-05-16

Network functions virtualization (NFV) enables telecommunications service providers to realize various network services by flexibly combining multiple virtual (VNFs). To provide such services, an NFV control method should optimally allocate VNFs into physical networks and servers taking account of the combination(s) objective constraints for each metric defined VNF type, e.g., placements routes between VNFs. The also be extendable adding new metrics or changing combination metrics. One...

10.1587/transcom.2019ebp3114 article EN IEICE Transactions on Communications 2020-01-23

Network functions virtualization (NFV) enables telecommunications service providers to provide various network services by flexibly combining multiple virtual (VNFs). To such with carrier-grade quality, an NFV controller must optimally allocate VNFs into physical networks and servers, taking account combination(s) of objective constraints for each metric defined VNF type. The should also be extendable, i.e., new metrics able added. One approach control optimize allocations is construct...

10.1109/icc.2018.8422429 article EN 2018-05-01

Owing to the critical role of domain name system (DNS), its query log data are utilized for various network monitoring purposes. With diversification services, these have become increasingly complex, making mining useful information challenging. DNS can be considered as superposition two types communication patterns: groups domains accessed simultaneously (e.g., ad servers and content delivery (CDN) servers) time-series access patterns based on user behavior characteristics trends during...

10.1109/tnsm.2023.3238858 article EN IEEE Transactions on Network and Service Management 2023-01-23

Network services provisioning with Service Function Chaining (SFC) consists of various controls such as Virtual (VNF) placement and traffic flow routing, executed dynamically. These take time to execute from start completion (reconfiguration delay), the reconfiguration delay varies depending on type control. When control is a long eliminate Quality (QoS) degradation, it will longer complete, resulting in continued degradation. To optimize network performance, method needs consider difference...

10.1109/ccnc51644.2023.10060258 article EN 2023-01-08

Radio frequency identification (RFID) enables everyday objects to be identified, tracked, and recorded. This paper presents a design of N-ary pulse position modulation transmission-only active RFID system for monitoring large number high density objects. A burst frame from tag consists multiple duplicated blink units the interval between them is randomly selected predefined steps avoid continuous collision. The reader segments composite streams performs cross-correlation recover overlapped...

10.1109/icpads.2005.245 article EN 2006-10-11

There exist distributed processing environments composed of many heterogeneous computers. It is required to schedule parallel processes in an appropriate manner. For the scheduling, prediction execution load a process effective exploit resources environments. We propose long-term methods with references properties and runtime predictions. Since method different according situation, we module selection select state changing CPU using neural network. also discuss about implementation system,...

10.1109/aina.2008.135 article EN 2008-01-01

Changes to business modelsChanges models means shifting from a standardized supply service model where carriers provide services through individual networks such as NGN (Next Generation Network), B2B2X (business-to-business-to-X) middle B operators can build businesses and according their needs by freely incorporating original value-added functions the base supplied carriers.Accommodating these changes requires that respond flexibly various operator promptly offer services.The technology...

10.53829/ntr201610fa4 article EN Deleted Journal 2016-10-01

Radio frequency identification (RFID) enables everyday objects to be identified, tracked, and recorded. Because of expense, size, lifetime requirements, some simple active RFID tags are designe...

10.2316/journal.202.2005.1.202-1431 article EN International Journal of Computers and Applications 2005-01-01

Radio frequency identification (RFID) enables everyday objects to be identified, tracked, and recorded. Because of expense, size, lifetime requirements, some simple active RFID tags are designed with only transmitters. Transmission-only unaware each other simply blink ID packets periodically over a common channel. The question is what really happens: false alarm due consecutive collisions or missed object event? authors model the access transmission-only as pure ALOHA develop mathematical...

10.1080/1206212x.2005.11441751 article EN International Journal of Computers and Applications 2005-01-01

係り受け関係のついた大量のコーパスを元にして作成されたデータを対象として, 動詞の結合価に関する検討を行った.これは, 係り受け関係まで付与された大量データからなるコーパスが存在してはじめて可能となった分析である.動詞の結合価に関する検討は, 各動詞の基本的な格パターンに着目して結合価を決定することを中心として検討されてきた.しかし, 省略を含め, 結合価が実際の言語データでどういう形で出現しているかについて, 全容を示すようなものは報告されていない.ここでは, 大量のコーパスデータから作成した結合価データを用い, 実際のデータで動詞にかかる格助詞がどういうパターンで出ているのかを調査し, 格助詞パターンの出現状況を把握するとともに, それらの格助詞パターンを用いて同音異表記がどの程度判定できるかを検討した.動詞約12, 400概念 (表記の異なりレベルで約9, 400単語) から作成した動詞の格助詞組み合わせパターンは, 延べパターン数で37, 237パターン, 異なりパターンで188パターンとなった.また, 同音異表記セットについて, これらのパターンを用い,...

10.5715/jnlp.12.4_21 article EN Journal of Natural Language Processing 2005-01-01

Mobile networks require high availability to provide reliable connectivity for various mobile services. Therefore, when a service outage occurs due base station (BS) failures, network operators need immediately resolve the effects of outage. Cell Outage Compensation (COC) is critical technology that resolves The COC method composed two steps: antenna selection from antennas neighboring BSs and optimization tilts selected coverage in area. Although most existing works on methods focus tilt...

10.1109/icc45041.2023.10279017 article EN ICC 2022 - IEEE International Conference on Communications 2023-05-28
Coming Soon ...