- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
- Context-Aware Activity Recognition Systems
- IoT-based Smart Home Systems
- Internet Traffic Analysis and Secure E-voting
- Internet of Things and Social Network Interactions
- Immune cells in cancer
- Cancer Immunotherapy and Biomarkers
- Fungal Biology and Applications
- Fungal Plant Pathogen Control
- Advanced Data Compression Techniques
- Advanced Algorithms and Applications
- Mycorrhizal Fungi and Plant Interactions
- Consumer Perception and Purchasing Behavior
- Mycotoxins in Agriculture and Food
- Diabetic Foot Ulcer Assessment and Management
- Powdery Mildew Fungal Diseases
- Fungal and yeast genetics research
- Neural Networks and Applications
- Energy and Environmental Systems
- Structural Health Monitoring Techniques
- Immune Cell Function and Interaction
- Plant Pathogens and Fungal Diseases
- Privacy, Security, and Data Protection
Osaka University
2019-2025
Kyushu University
2017
Kaneka (United States)
1990
Tumor-associated macrophages (TAMs) promote cancer cell proliferation, invasion, and metastasis by producing various mediators. Although preclinical studies demonstrated that TAMs preferentially express CD163 CD204, the TAM subsets in oral squamous carcinoma (OSCC) remain unknown. In this study, we examined expression role of OSCC. Forty-six patients with OSCC were analyzed for biopsy samples immunohistochemistry. We their production immune suppressive molecules (IL-10 PD-L1) peripheral...
As several home appliances, such as air conditioners, heaters, and refrigerators, were connecting to the Internet, they became targets of cyberattacks, which cause serious problems compromising safety even harming users. We have proposed a method detect attacks based on user behavior. This models behavior sequences events including operation IoT (Internet Things) devices other monitored activities. Considering users behave depending condition time temperature, our learns event for each...
Many devices, such as air conditioners and refrigerators, are now being connected to the Internet and, a consequence, have become targets of cyberattacks. Especially, operations by attackers can cause serious problems, which may harm users. However, attacks difficult detect because they use same protocol legitimate In this paper, we propose method based on user behavior. We model behavior sequence events, includes operation IoT devices other monitored any sensors. Our learns sequences events...
人工ホダ木栽培シイタケ子実体の一般成分,遊離アミノ酸,タンパク質のアミノ酸組成, 5'-GMPの蓄積含量を測定した.(1) 一般成分としては,粗タンパク質量が25.9%,炭水化物が67.0%であった.(2) 遊離アミノ酸総量は, 1665mg/100g dry weightであり,グルタミン酸が最も多く, 385.9mg/100g weightであった.アミノ酸量は,子実体の成育にともなって,乾燥重量当りの含有比率は,やや少なくなる傾向にあった.(3) タンパク質のアミノ酸組成は,グルタミン酸が最も多く,メチオニン,シスチンが少なかった.(4) 5'-GMPの蓄積含量は,傘部に多く柄部に少なくその比率は, 2.6倍であった.また,子実体の成育にともなって蓄積量は増加した.成熟子実体全体で, 312.8mg/100g weightであった.
To construct a digital twin, we have to analyze large amount of video data obtained from the real world in real-time perceive an accurate current situation. The increase traffic flowing through networks and accompanying power consumption are problems. One solution is edge computing distribute analyzing tasks; it requires dynamic control task distribution selecting models according network status application requirements. Our research group has formulated optimization problem for distributed...
To mitigate the risk of cyberattacks on home IoT devices, we have proposed a method for detecting anomalous operations by learning behaviors users based operation sequences their devices and conditions. While this requires sufficient amount training data, achieving accurate detection is still possible utilizing data with similar lifestyles. However, are unwilling to share private information others. In study, propose platform utilize without sharing information. We introduce an agent that...
As the number of IoT consumer electronics is increasing, cyberattacks to devices are increasing. In particular, operating by attackers make users feeling unsafe and may harm physically. Therefore, we have proposed a method detect anomalous operations learning users' behavior. However, this misdetects many legitimate if sufficient amount data on One approach avoid misdetections even cannot be obtained from each user use collected others. But do not want share their private information with...
At the stage of planning steel-frame structures, it is important to obtain whole characteristic construction works, aseismic safety structures and so on. So, this system uses Genetic Algorithm as an evolutionary computation method. This report proposes a support by which users can useful information on quantity surveying steels basic structural performances in short time.
Internet-of-things (IoT) devices are vulnerable to malicious operations by attackers, which can cause physical and economic harm users; therefore, we previously proposed a sequence-based method that modeled user behavior as sequences of in-home events base home state detect anomalous operations. However, users' states based on the time day; hence, attackers could exploit system maximize attack opportunities. Therefore, then an estimation-based detection estimated using not only day but also...