Masayoshi Aritsugi

ORCID: 0000-0003-0861-849X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Advanced Database Systems and Queries
  • Distributed systems and fault tolerance
  • Spam and Phishing Detection
  • Advanced Data Storage Technologies
  • Topic Modeling
  • Caching and Content Delivery
  • Text and Document Classification Technologies
  • Mobile Ad Hoc Networks
  • Data Management and Algorithms
  • Anomaly Detection Techniques and Applications
  • Sentiment Analysis and Opinion Mining
  • Machine Learning and Data Classification
  • Network Security and Intrusion Detection
  • Time Series Analysis and Forecasting
  • Scientific Computing and Data Management
  • Image Retrieval and Classification Techniques
  • Peer-to-Peer Network Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Parallel Computing and Optimization Techniques
  • Web Data Mining and Analysis
  • Image Processing and 3D Reconstruction
  • Software Engineering Research
  • Access Control and Trust

Kumamoto University
2015-2024

Kumamoto City Hospital
2024

Kumamoto Health Science University
2016

Graduate School USA
2009-2014

Kiryu University
2000-2007

Gunma University
1997-2007

Kyushu University
1995-2002

Kurashiki University of Science and the Arts
2002

The global agricultural sector confronts significant obstacles such as population growth, climate change, and natural disasters, which negatively impact food production pose a threat to security. In response these challenges, the integration of IoT AI technologies emerges promising solution, facilitating data-driven decision-making, optimizing resource allocation, enhancing monitoring control systems in operations address challenges promote sustainable farming practices. This study examines...

10.3390/electronics13101894 article EN Electronics 2024-05-11

Data fusion is a prevalent technique for assembling imperfect raw data coming from multiple sources to capture reliable and accurate information. Dempster–Shafer evidence theory one of useful methodologies in the uncertain multisource The existing literature lacks thorough comprehensive review recent advances Dempster– Shafer fusion. Therefore, state art has be surveyed gain insight into how beneficial it evolved over time. In this paper, we first provide methods based on its extensions,...

10.62762/cjif.2024.999646 article EN Chinese journal of information fusion. 2024-09-30

To mitigate the effects of lack IoT standardization, including scalability, reusability, and interoperability, we propose a domain-agnostic monitoring control framework (MCF) for design implementation Internet Things (IoT) systems. We created building blocks layers five-layer architecture built MCF's subsystems (monitoring subsystem, computing subsystem). demonstrated utilization MCF in real-world use-case smart agriculture, using off-the-shelf sensors actuators an open-source code. As user...

10.3390/s23052714 article EN cc-by Sensors 2023-03-01

Hyperparameter optimization is a fundamental part of Auto Machine Learning (AutoML) and it has been widely researched in recent years; however, still remains as one the main challenges this area. Motivated by need faster more accurate hyperparameter algorithms we developed HyperBRKGA, new population-based approach for optimization. HyperBRKGA combines Biased Random Key Genetic Algorithm with an Exploitation Method order to search space efficiently than other commonly used algorithms, such...

10.1109/access.2023.3277310 article EN cc-by-nc-nd IEEE Access 2023-01-01

Intelligent applications in several areas increasingly rely on big data solutions to improve their efficiency, but the processing and management of incur high costs. Although cloud-computing-based offer a promising solution provide scalable abundant resources, current cloud-based platforms do not properly address latency, privacy, bandwidth consumption challenges that arise when sending large volumes user cloud. Computing edge fog layers is quickly emerging as an extension cloud computing...

10.3390/app14010452 article EN cc-by Applied Sciences 2024-01-04

Machine learning has recently become a popular algorithm in building reliable intrusion detection systems (IDSs). However, most of the models are static and trained using datasets containing all targeted intrusions. If new intrusions emerge, these must be retrained old to classify accurately. In real-world situations, threats continuously appear. Therefore, machine algorithms used for IDSs should have ability learn incrementally when emerge. To solve this issue, we propose T-DFNN. T-DFNN is...

10.1109/access.2021.3127985 article EN cc-by IEEE Access 2021-01-01

As most of the Internet Things (IoT) applications are event-driven, emergence serverless computing paradigm, which is a natural fit for event-driven applications, promising to host multi-tenant IoT applications. Furthermore, increasing resource capability low-cost edge and fog devices provides an opportunity take advantage resources available leads edge-fog-cloud continuum, can conduct processing across entire continuum. To identify necessary adaptations we integrate paradigm in each layer...

10.1109/bigcomp60711.2024.00063 article EN 2024-02-18

In this paper, we try to reduce the amount of control traffic optimized link state routing protocol (OLSR). OLSR is a proactive for mobile ad-hoc networks (MANETs). known well as low protocol, since it adopts multipoint relays (MPRs). MPRs concept significantly reduces number broadcast messages during flooding process. Although MPR optimal each node transmit its all two hop neighbors, show there are still redundant which can be piggybacked with other in dense networks. This redundancy caused...

10.1109/tencon.2010.5686013 article EN 2010-11-01

Social network services (SNS) are more and popular. People increasingly accustomed to express their opinions on SNS in two ways: (1) product reviews online shopping sites (2) posts, comments, tweets, chats social sites. text classification is challenging due various natural language phenomena, such as spelling mistakes variations, polysemy, contextual ambiguity semantic variations. In this paper, we propose a novel deep learning architecture called Hybrid Convolutional Neural Networks...

10.1109/bcd2018.2018.00022 article EN 2018-07-01

Incremental learning is a promising algorithm for creating an adaptive network intrusion detection system (IDS) model. In contrast with batch models, incremental models can be retrained easily when new data emerge. Moreover, some such as the Hoeffding Tree model, only using latest training data. This advantage appealing because computer networks produce enormous amounts of every day. Using detecting ever-growing intrusions save computational resources while preserving performance models....

10.1145/3556223.3556252 article EN 2022-07-29

Semantic text similarity (STS) uses specific test collections as its performance evaluation measurement. The consist of pairs with the same meaning even though in different form. existence is scarce compared information retrieval (IR) collections. This paper investigates possibility to reuse IR for STS tasks. Text are derived from relevant pair Latent semantic analysis (LSA) and explicit (ESA) evaluate Glasgow's collections, which provided by ACM SIGIR community. Jaccard index measures...

10.1145/2428736.2428784 article EN 2012-12-03

Vehicular ad hoc networks (VANETs) are the specific class of Mobile (MANETs). Since vehicles tend to move in a high speed, network topology is rapidly changed. Thus vehicle's connectivity problem one interesting issues VANETs. Ad on-demand multipath distance vector (AOMDV) extended version (AODV). AOMDV designed overcome due highly dynamic topology. It provides for data packets delivery from source destination. Although outperforms AODV packet ratio, AOMDV's establishment and maintenance...

10.1109/icnc.2012.47 article EN 2012-12-01

This paper presents a strategy to improve positioning estimation from low-cost Inertia Measurement Unit (IMU) sensor and Global Positioning System (GPS) for apron vehicle localization. IMU provides raw acceleration values its attitude, while GPS geodetic position, velocity, heading course values. Fusion result both sensors believed could comply Advanced-Surface Movement Guidance Control (A-SMGCS) standard with less economical cost. Within this paper, we propose graded Kalman filter method...

10.1109/tencon.2017.8227906 article EN 2017-11-01

The performance of a machine learning algorithm is highly dependent on its hyperparameters. However, hyperparameter optimization not trivial task as it problem-specific. difficulty rises when coupled with larger number hyperparameters resulting in high search space dimensions. common understanding seems to be that the only done limited Indeed, have been commonly utilized optimization. This study investigates role by using genetic (GA) main method for convolutional neural network (CNN)....

10.1109/bdcat50828.2020.00016 article EN 2020-12-01

Hyperparameters and architecture greatly influence the performance of convolutional neural networks (CNNs); therefore, their optimization is important to obtain desired results. One state-of-the-art methods achieve this use neuroevolution that utilizes a genetic algorithm (GA) optimize CNN. However, GA often trapped into local optimum resulting in premature convergence. In study, we propose an approach called "diversity-guided algorithm-convolutional network (DGGA-CNN)" uses adaptive...

10.1109/access.2021.3091729 article EN cc-by IEEE Access 2021-01-01

In semiconductor manufacturing, it is required to detect anomalies which cause expensive defects. recent years, Generative Adversarial Networks (GANs) have played a big role in anomaly detection. This study aims by analyzing sensor data using GAN when multivariate time series of are given. Our could cannot be detected visually. Experimental results indicated that an attention mechanism tell us important sensors detecting anomalies.

10.1016/j.procs.2021.08.090 article EN Procedia Computer Science 2021-01-01

Fidelity plays an important role in quantum information processing, which provides a basic scale for comparing two states. At present, one of the most commonly used fidelities is Uhlmann-Jozsa (U-J) fidelity. However, U-J fidelity needs to calculate square root matrix, not trivial case large or infinite density matrices. Moreover, measure overlap, has limitations some cases and cannot reflect similarity between states well. Therefore, novel called Tanimoto coefficient (QTC) proposed this...

10.1109/jas.2022.106079 article EN IEEE/CAA Journal of Automatica Sinica 2023-01-20

In vehicle dead reckoning or positioning systems, an inertial measurement unit (IMU) sensor has important role to provide acceleration and orientation of the vehicle. The from IMU accelerometer is used calculate velocity vehicle, then it estimates vehicle's distance traveled time. However, suffers external noises such as vibrations (generated engine, alternator, compressor, etc) road noises. This paper delivers deep analysis focuses on how handle error vibrations. A filter method proposed by...

10.2197/ipsjjip.27.33 article EN Journal of Information Processing 2019-01-01

It is useful if a bug tracking system can detect report duplication with unfinished reports. To investigate the feasibility, we study relations between accuracy of duplicate detection using features extracted from textual information in reports and number words this paper. The results show that increasing to be used over certain does not affect very much. also indicate had better use about 100 80 Eclipse OpenOffice, respectively, because may have many wrong candidates more than numbers. We...

10.1109/apsec.2015.33 article EN 2015-12-01
Coming Soon ...