- Caching and Content Delivery
- Network Traffic and Congestion Control
- Peer-to-Peer Network Technologies
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Complex Network Analysis Techniques
- Anomaly Detection Techniques and Applications
- Advanced Wireless Network Optimization
- Advanced Malware Detection Techniques
- Software-Defined Networks and 5G
- Advanced Data Storage Technologies
- Spam and Phishing Detection
- Neural Networks and Applications
- Opinion Dynamics and Social Influence
- Face and Expression Recognition
- Machine Learning and Data Classification
- Advanced Optical Network Technologies
- Distributed and Parallel Computing Systems
- Mobile Ad Hoc Networks
- Advanced MIMO Systems Optimization
- Text and Document Classification Technologies
- IPv6, Mobility, Handover, Networks, Security
- Cooperative Communication and Network Coding
- Fault Detection and Control Systems
- Opportunistic and Delay-Tolerant Networks
Universidade Federal de São Carlos
2024
Waseda University
2017-2024
Hashimoto Municipal Hospital
2024
National Institute of Technology, Yonago College
2024
Meisei University
2021
Nagasaki University
2020
Toyo University
2018-2020
Kyushu Institute of Technology
2005-2018
National Institute of Advanced Industrial Science and Technology
2018
Chiba Institute of Technology
2012-2017
Identifying elephant flows is very important in developing effective and efficient traffic engineering schemes. In addition, obtaining the statistics of these also useful for network operation management. On other hand, with rapid growth link speed recent years, packet sampling has become a attractive scalable means to measure flow statistics; however, it makes identifying much more difficult. Based on Bayes' theorem, this paper develops techniques schemes identify periodically sampled...
Wild watermelon from the Botswana desert had an ability to survive under severe drought conditions by maintaining its water status (water content and potential). In analysis two-dimensional electrophoresis of leaf proteins, seven spots were newly induced after watering stopped. One with molecular mass 40 kilodaltons was accumulated abundantly. The cDNA encoding for protein cloned based on amino-terminal sequence amino acid deduced determined nucleotide sequences exhibited homology enzymes...
This paper provides a novel characterization of fairness concepts in network resource allocation problems from the viewpoint information theory. The fundamental idea adopted this is to characterize utility functions used optimization problems, which motivate concepts, based on trade-off between user and system satisfaction. Here, satisfaction evaluated using divergence measures that were originally theory evaluate difference two probability distributions. In paper, are applied implemented...
With the rapid increase of link speed in recent years, packet sampling has become a very attractive and scalable means collecting flow statistics; however, it also makes inferring original characteristics much more difficult.In this paper, we develop techniques schemes to identify flows with large number packets (also known as heavy-hitter flows) from sampled statistics.Our approach follows two-stage strategy: We first parametrically estimate length distribution flows.We then Bayes' theorem,...
インターネットは世界を結ぶ情報社会の基盤となっている.しかし,その基礎となるTCP/IP(Transmission Control Protocol/Internet Protocol)技術の設計の中では,極端に長い通信遅延時間,頻繁なパケット損,間欠的な通信リンクの出現,などが発生する通信環境は想定されておらず,情報通信を必要とする環境の著しい多様化に対応するためには拡張が必要である.惑星間インターネットを起源に持つ,遅延耐性ネットワーク(DTN:Delay, Disruption, Disconnection Tolerant Networking)と呼ばれる技術領域は,従来のTCP/IP 技術では対応できなかった状況においてもエンドツーエンドの情報伝達を実現する枠組みとして誕生した.本論文では,従来技術をある程度知っている読者を想定し,近年研究が活発化しているDTN 技術に関して概説を与える.DTN...
Self actuated shutdown system (SASS) with a Curie point electromagnet (CPEM) has been developed for use in large-scale liquid metal cooled fast breeder reactor (LMFBR) order to establish the passive capability against anticipated transient without scram (ATWS) events. The basic characteristics of SASS have already investigated by various out-of-pile tests material elements. As final stage development, stability needs be confirmed under actual reactor-operational environment high temperature,...
In this letter, we develop a novel computational approach for network bandwidth allocation problems in which the compoundable constraints about preferable transmission rate fall infeasible region. The is based on an iterative technique non-convex optimization over fixed point set of certain nonexpansive mapping. realized maximizes predefined utility and closest to with respect norm. Numerical examples show that our efficient way solve non-concave maximization problem.
Our major purpose in this study is to develop a method for achieving power conservation with network itself. The proposed saving approach takes traffic characteristics of into consideration. If switch can adapt its processing speed arrival rate, be expected depending on the utilization. same idea already materialized just as Intel's SpeedStep technology. We first confirm consideration by measuring consumption some switches and show that Gigabit Ethernet port consumes 2 or 3 W an addition...
It is known that Internet routing policies for both intra- and inter-domain can naturally give rise to triangle inequality violations (TIVs) with respect quality of service (QoS) network metrics such as latencies between nodes. This motivates the exploitation TIVs phenomenon in design TlV-aware overlay architecture which capable choosing paths improve end-to-end QoS without changing underlying architecture. Our idea find routes node pairs based on TIV optimization terms latency packet loss...
In this paper, we propose a swing-up control law for the Pendubot, type of two-joint, two-link, underactuated robot in which shoulder joint is actuated and elbow unactuated, maintaining fully extended as much possible. The proposed designed by energy-based method. Using phase plane trajectories obtained from angular velocity oscillatory motion forearm, target trajectory calculated so that small advance forearm. We design tracking forearm upper arm behave single pendulum. effectiveness method...
Abstract This paper presents a new maximum power point tracking control for photovoltaic (PV) panels. The can be categorized into the Perturb and Observe (P&O) method. It utilizes instantaneous voltage ripples at PV panel output terminals caused by switching of chopper connected to in order identify direction (MPP). MPP is achieved feedback average terminal panel. Appropriate use values separate purposes enables both quick transient response good convergence with almost no...
In recent years, there has been a growing problem of smartphone addiction. As the excessive use smartphones negatively impacted our daily lives, many apps for reducing addiction have developed around world. this study, we focus on app restriction function, which is one key features digital medicines addiction, and analyze usage function verify its effectiveness. The results showed significant differences in both psychological behavioral aspects between those who used did not. Specifically,...
Abstract Peer‐to‐peer (P2P) applications have been expanding rapidly in recent years, and the contribution of P2P to present Internet traffic is close that World Wide Web (WWW). In this study, flow WWW analyzed by network measurement. The characteristics are examined, especially terms arrival interval, duration, size, rate. Based on results analysis, effect a increase overall investigated. study will be utilized design, proposals for control procedures, modeling, considering particular...
The threshold network model is a type of finite random graph. For this model, we obtain an almost-sure convergence theorem for the average distance and derive variant Poisson approximation degree distribution by using extreme value theory.
鳥取産ナシ寄生のナミハダニとカンザワハダニについて休眠の実態を調査した。(1) 両種ハダニの16°Cにおける休眠誘起の臨界日長は12hr前後であった。20°C以上の高温では休眠が阻止される傾向がみられた。(2) 両種ハダニは10月上旬には約半数が休眠雌であった。これらの雌の育った光周感応期の日長時間は12∼12.5hrであった。ナミハダニは11月上旬,カンザワハダニは11月下旬にすべて休眠雌となり,後者の休眠雌の出現は緩慢であった。(3) ナシ樹主幹部へとりつけた誘殺バンドへの越冬雌の侵入は,ナミハダニでは10月中旬,カンザワハダニでは10月上旬がピークとなった。越冬場所は前者がナシ樹皮間隙,後者がナシ樹上(誘引なわ,樹皮間隙),落葉などであった。(4) 両種ハダニ休眠雌の越冬数は秋季のナシ葉上のハダニ密度に依存しており,9月下旬の葉当たり密度あるいは9∼10月の発生量から越冬数を予察することが可能である。(5)...
We propose an anomaly detection method that trains a baseline model describing the normal behavior of network traffic without using manually labeled data. The trained distribution is used as basis for comparison with audit traffic. proposed can be carried out in unsupervised manner through use time-periodical packet sampling different purpose from which it was intended. That is, we take advantage lossy nature extracting packets unlabeled original By real traces, show comparable terms false...
This paper presents a file replication scheme with analogy to thermal diffusion for storage load balancing in unstructured peer-to-peer (P2P) sharing networks. The proposed is intended balance among peers dynamic, distributed, and autonomous manner, as diffusion. Theoretical analysis results show that the presented actually has statistical equation. In addition, includes parameters widely explore trade-off between search performance existing P2P Simulation compared other schemes, better...
High definition television (HDTV) video delivery services over IP networks have recently started. To make the delivered high-quality HDTV comfortable to view, we need design appropriate systems and then monitor quality of experience. Currently, subjective assessment is main method used quantify quality. However, it unsuitable for real time monitoring Therefore, an objective that can effectively estimate from characteristics. We propose a full-reference-type measurement applicable evaluation...