Updated on 2023/08/28

写真a

 
ATA Shingo
 
Organization
Graduate School of Informatics Department of Core Informatics Professor
School of Engineering Department of Information Science
Title
Professor
Affiliation
Institute of Informatics

Position

  • Graduate School of Informatics Department of Core Informatics 

    Professor  2022.04 - Now

  • School of Engineering Department of Information Science 

    Professor  2022.04 - Now

Degree

  • Doctor of Engineering ( Osaka University )

  • Master of Engineering ( Osaka University )

Research Areas

  • Informatics / Information network

  • Manufacturing Technology (Mechanical Engineering, Electrical and Electronic Engineering, Chemical Engineering) / Communication and network engineering  / Information Network

  • Informatics / Information network

Research Career

  • Operation and Management of Virtualized Networks

    virtualization, operation, management  Joint Research in Organization

    1900.04 

  • Measurement, Analysis, and Application of Network Traffic

    Measurement, Traffic Analysis, Internet  Individual

    1900.04 

  • Network Architecture for Future Internet

    Future Internet, Network, Architecture  Individual

    1900.04 

  • High-Speed Data Transfer Mechanisms

    router, switching technology, packet  Individual

    1900.04 

  • Network Architecture

    Network, Architecture, Control  Individual

    1900.04 

Professional Memberships

  • THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS

      Domestic

  • ACM

      Overseas

  • IEEE

      Overseas

  • THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS

Committee Memberships (off-campus)

  • 情報指向ネットワーク技術特別研究専門委員会 顧問   電子情報通信学会  

    2019.05 - Now 

  • 情報指向ネットワーク技術特別研究専門委員会 副委員長   電子情報通信学会  

    2015.05 - Now 

  • 情報通信マネジメント研究専門委員長   電子情報通信学会  

    2014.05 - 2016.05 

  • 英文論文誌B編集委員   電子情報通信学会  

    2012.05 - 2016.05 

  • 情報通信マネジメント研究専門委員副委員長   電子情報通信学会  

    2011.05 - 2013.05 

  • 情報通信マネジメント研究専門委員会幹事   電子情報通信学会  

    2009.05 - 2011.05 

  • 情報通信マネジメント研究専門委員会幹事補佐   電子情報通信学会  

    2008.05 - 2009.05 

  • ネットワークシステム研究専門委員会専門委員   電子情報通信学会  

    2006.05 - 2012.05 

  • 情報ネットワーク研究専門委員   電子情報通信学会  

    2005.05 - Now 

  • 情報ネットワーク研究会幹事補佐   電子情報通信学会  

    2004.05 - 2005.05 

  • テレコミュニケーションマネージメント研究専門委員   電子情報通信学会  

    2003.05 - 2008.05 

  • -   文部科学省・日本学術振興会等による事業の審査委員会  

    2020.04 - 2021.03 

      More details

    文部科学省「サイエンス・インカレ」審査委員

  • 情報指向ネットワーク技術特別研究専門委員会 委員長   電子情報通信学会  

    2019.04 - Now 

  • 理事   大学 ICT 推進協議会  

    2018.05 - Now 

  • -   学会誌等の編集・審査委員会  

    2018.05 - 2019.03 

      More details

    電子情報通信学会 英文論文誌小特集「Enhancing Information Centric Networking Technologies Towards Real-world Infrastructure」編集委員長

  • 情報通信マネジメント研究専門委員会顧問   電子情報通信学会  

    2016.05 - Now 

  • -   学会誌等の編集・審査委員会  

    2015.07 

      More details

    電子情報通信学会 英文論文誌小特集「Management for the Era of Internet of Things and Big Data」編集委員

  • -   学会誌等の編集・審査委員会  

    2015.05 

      More details

    Associate Editor, International Journal of Network Management

  • -   学会誌等の編集・審査委員会  

    2014.03 

      More details

    電子情報通信学会 英文論文誌小特集「Position Papers Exploring Innovative Intelligence and Technologies in Communications」編集委員

  • -   学会誌等の編集・審査委員会  

    2014.03 

      More details

    電子情報通信学会 英文論文誌小特集「Architectures and Technologies for Improving Scalability, Reliability, and Robustness of Future Information Networks」編集委員

  • -   学会誌等の編集・審査委員会  

    2014.02 

      More details

    電子情報通信学会 英文論文誌小特集「Position Papers Exploring Innovative Intelligence and Technologies in Communications (2)」編集委員

  • -   学会誌等の編集・審査委員会  

    2013.10 

      More details

    電子情報通信学会 英文論文誌小特集「EU’s FP7 ICT R&D Project Activities on Future Broadband Access Technologies in Conjunction with Main Topics of 2013 IEICE ICT Forum」編集委員

  • Secretary, ComSoc CNOM   IEEE  

    2013.05 - 2017.05 

  • -   学会誌等の編集・審査委員会  

    2013.05 

      More details

    電子情報通信学会 英文論文誌B 常任編集委員

  • -   学会誌等の編集・審査委員会  

    2013.05 

      More details

    電子情報通信学会 英文論文誌小特集「Management for Flexible ICT Systems and Services」編集委員

  • -   文部科学省・日本学術振興会等による事業の審査委員会  

    2013.04 - 2014.03 

      More details

    文部科学省「サイエンス・インカレ」審査委員

  • -   学会誌等の編集・審査委員会  

    2012.10 

      More details

    電子情報通信学会 和文論文誌小特集「震災復興や新興国の近未来に役立つ情報ネットワーク技術」編集委員

  • -   文部科学省・日本学術振興会等による事業の審査委員会  

    2012.04 - 2013.03 

      More details

    文部科学省「サイエンス・インカレ」審査委員

  • -   学会誌等の編集・審査委員会  

    2011.09 

      More details

    電子情報通信学会 英文論文誌小特集「Towards Future Networks and Services」編集委員長

  • -   文部科学省・日本学術振興会等による事業の審査委員会  

    2011.04 - 2012.03 

      More details

    文部科学省「サイエンス・インカレ」審査委員

  • -   文部科学省・日本学術振興会等による事業の審査委員会  

    2010.04 - 2011.03 

      More details

    科学技術研究費補助金審査委員

  • -   文部科学省・日本学術振興会等による事業の審査委員会  

    2009.04 - 2010.03 

      More details

    科学技術研究費補助金審査委員

▼display all

Awards

  • 電子情報通信学会情報通信マネジメント研究賞

    2014  

     More details

    Country:Japan

  • 電子情報通信学会ネットワークシステム研究賞

    2013  

     More details

    Country:Japan

  • Best Paper Award, IEEE CQR 2011

    2011  

  • 電子情報通信学会情報ネットワーク研究賞

    2011  

     More details

    Country:Japan

  • 電子情報通信学会情報通信マネジメント研究賞

    2010  

     More details

    Country:Japan

  • 電子情報通信学会 情報ネットワーク研究賞

    2005  

     More details

    Country:Japan

  • 電子情報通信学会情報通信マネジメント研究賞

    2018.03  

  • 電子情報通信学会ネットワークシステム研究賞

    2013  

     More details

    Country:Japan

  • 電子情報通信学会 通信ソサイエティ活動功労賞

    2011  

     More details

    Country:Japan

  • Best Paper Award, IEEE CQR 2011

    2011  

  • 電子情報通信学会 通信ソサイエティ活動功労賞

    2009  

     More details

    Country:Japan

  • 電子情報通信学会 通信ソサイエティ活動功労賞

    2005  

     More details

    Country:Japan

  • IEICE Telecommunication Management Research Award

    2001  

     More details

    Country:Japan

▼display all

Education

  • Osaka University   Department of Informatics and Mathematical Science   Doctor's Course   Graduated/Completed

    - 2000

  • Osaka University    

    - 1996

Papers

  • Analysis of skeletal characteristics of flat feet using three-dimensional foot scanner and digital footprint Reviewed

    Tomoko Yamashita, Kazuhiko Yamashita, Mitsuru Sato, Masashi Kawasumi, Shingo Ata

    BioMedical Engineering Online   21 ( 56 )   1 - 12   2022.12

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1186/s12938-022-01021-7

  • Coronavirus disease pandemic’s impact on the step count of community-dwelling adults in Japan: A prospective cohort study Reviewed

    Yamashita Tomoko, Yamashita Kazuhiko, Shimizu Yuko, Kawasumi Masashi, Kagawa Takefumi, Ata Shingo

    Journal of Life Support Engineering   34 ( 2 )   34 - 38   2022.06( ISSN:1341-9455

     More details

    Publishing type:Research paper (scientific journal)  

  • Quantification and Visualization of Reliable Hemodynamics Evaluation Based on Non-Contact Arteriovenous Fistula Measurement Reviewed

    Rumi Iwai, Takunori Shimazaki, Yoshifumi Kawakubo, Kei Fukami, Shingo Ata, Takeshi Yokoyama, Takashi Hitosugi, Aki Otsuka, Hiroyuki Hayashi, Masanobu Tsurumoto, Reiko Yokoyama, Tetsuya Yoshida, Shinya Hirono, Daisuke Anzai

    Sensors   22 ( 7 )   1 - 17   2022.04( ISSN:14248220

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/s22072745

  • 非接触撮像による動静脈瘻(AVF)の新しい定量的測定法

    岩井 瑠美, 島崎 拓則, 川久保 芳文, 鶴本 雅信, 林 博之, 田蒔 正治, 大塚 紹, 深水 圭, 阿多 信吾, 安在 大祐

    電子情報通信学会技術研究報告(MEとバイオサイバネティックス)   121 ( 337 )   254 - 259   2022.01( ISSN:0913-5685

     More details

    血液透析療法は,血液を一旦体外へ送り出しダイアライザと呼ばれる浄化器を介して,血液から老廃物・余分な水分を取りのぞく腎臓の機能を代行する治療法である.通常の血管では十分な血流量を得ることができないため,外科手術で作られたArterio Venous Fistula(AVF)と呼ばれる特殊は血管が用いられる.AVFは狭窄しやすく,治療前後に聴診法や触診法によるAVFの血流チェックが行われているが,いずれも定性的(正常あるいは異常)な判断しかできず,接触感染に注意が必要となるなどの問題をもつ.我々は光学技術を応用し非接触かつ非侵襲でAVFの脈波を測定する装置を開発した.本研究では,被験者20名に対して吻合部の非接触撮影を行い,血行動態の可視化とSNR(Signal-to-Noise Ratio)による定量化を試みた.AVFから駆出される血液の流れを動画で確認でき,SNRは中央値=-0.47,第1四分位=-0.67,第3四分位=0.00であった.(著者抄録)

  • Heat Stroke Prevention in Hot Specific Occupational Environment Enhanced by Supervised Machine Learning with Personalized Vital Signs Reviewed

    Takunori Shimazaki, Daisuke Anzai, Kenta Watanabe, Atsushi Nakajima, Mitsuhiro Fukuda, Shingo Ata

    Sensors   22 ( 1 )   1 - 12   2022.01( ISSN:14248220

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/s22010395

  • 逐次蓄積型学習ベース異常検知における学習データ抽出手法

    阿多 信吾

    電子情報通信学会技術研究報告(ICM)   121   84 - 89   2022

  • 足部3次元解析による中足部回転モーメントの評価システムの開発

    山下 和彦, 山下 知子, 阿多 信吾, 佐藤 満

    生体医工学   Annual60 ( Abstract )   109_2 - 109_2   2022( ISSN:1347443X

     More details

    <p>[背景] 扁平足や外反母趾などの足部変形は歩行機能を阻害する.足部のバイオメカニクスに着目すると,中足部を構成する舟状骨高や足底圧分布から足部特性が計測されている.中足部は上下運動のみではなく3次元的に動作する.そこで本研究では,スマートフォンを用いて3次元的に足部骨格を計測し,中足部に加わる回転モーメント評価システムを開発することを目的とした.[方法] 対象者は中高年の989名(39-89歳)とした.提案する中足部回転モーメントは本システムで抽出する舟状骨の足部中心線からの距離(モーメントアーム)と体重から導出した.そして中足部回転モーメントと足部骨格の変形の相関を求めた.中足部回転モーメントは体重の影響を受けるため,BMI別に解析を行った.[結果] 静止立位時の中足部回転モーメントは7~15 Nmと導出された.中足部回転モーメントの要素である舟状骨のモーメントアームはBMIが大きくことで増大した.さらに中足部回転モーメントは足部の骨格のずれと BMIが大きくなることで相関が高まった.[考察] 中足部回転モーメントと足部骨格の変形には関連があることが明らかになった.閉鎖運動連鎖(CKC)の観点から中足部の衝撃吸収機能は変形性膝関節症などの関節疾患と関係すると予想され,中足部回転モーメントとの関連が考えられる.以上より,足部骨格の3次元的な特徴量計測の意義が示唆された.</p>

    DOI: 10.11239/jsmbe.annual60.109_2

  • Differences in Foot Features Between Children and Older Adults Assessed using a Three-Dimensional Foot Scanning System: A Cross-Sectional Observational Study(和訳中)

    Yamashita Tomoko, Yamashita Kazuhiko, Sato Mitsuru, Ata Shingo

    Advanced Biomedical Engineering   11   172 - 177   2022

  • Differences in Foot Features Between Children and Older Adults Assessed using a Three-Dimensional Foot Scanning System: A Cross-Sectional Observational Study

    Yamashita Tomoko, Yamashita Kazuhiko, Sato Mitsuru, Ata Shingo

    Advanced Biomedical Engineering   11 ( 0 )   172 - 178   2022

     More details

    <p>Deformities of the foot result in loss of walking function. The skeletal structure of the foot develops during childhood, and quantitative assessment of the foot is warranted. In healthy children, foot length and navicular height have been studied individually; however, the foot has not been sufficiently studied in its entirety, and the growth curve of the foot has not been clarified. In particular, the heel is an important site influencing foot biomechanics. In this study, we developed a three-dimensional (3D) foot scanner and digital footprint device to examine the foot characteristics of both children and adults. This study aimed to compare the foot characteristics of developing children with those of adults. Overall, 154 children (aged 8–10 years) and 403 adults (aged 40–89 years) were included in the study. The 3D foot scanner and digital footprint device were used for measurements. Foot length, forefoot width, foot height, navicular height, and heel width were evaluated. In particular, the ratio of each indicator to foot length was used to evaluate the characteristics of the child's foot. The measurement indices were significantly larger in adults than in children, indicating that the indices increase as children grow, irrespective of sex. The results of the measurements and the ratios to foot length showed large individual differences between adults and children in some of the measurement indices. However, there was no difference in the heel width between children and adults. In contrast, forefoot flattening was greater in adults. Increases in foot length and heel width were found to vary greatly among individuals and those with different characteristics. While foot length and navicular height increased in adults, heel characteristics did not differ significantly between children aged 8–10 years and adults. Children appear to show foot geometries and proportions different from adults, which would have important implications for the ergonomics of children's footwear.</p>

    DOI: 10.14326/abe.11.172

  • スマートフォンを用いた足部3次元解析による外反母趾の発生メカニズムの解析

    山下 知子, 山下 和彦, 佐藤 満, 阿多 信吾

    生体医工学   Annual60 ( Abstract )   109_1 - 109_1   2022( ISSN:1347443X

     More details

    <p>[背景] 外反母趾は,子どもから高齢者まで幅広く発生する一般的な足部変形である.しかし外反母趾の発生メカニズムは十分に解明されていない.外反母趾には靴などのフットウェアや体重などの外的要因が挙げられるが,足部骨格特性の影響を明らかにすることが重要である.本研究では,スマートフォンを用いて3次元に足部の表面構造を計測し,外反母趾に関連する足部骨格の特徴を明らかにすることを目的とした.[方法] 対象者は中高年女性268名とした.着目点は本システムで新たに設定した拇指角,舟状骨位置・高さ,足部骨格のずれ,横アーチの高さ・幅等とした.さらに舟状骨の位置と体重から中足部回転モーメントを導出することを試みた.[結果] 拇指角と相関があった特徴量は骨格のずれ,舟状骨の位置,横アーチ幅,中足部回転モーメントであった.骨格のずれと相関が高かったのは舟状骨の位置,足部高,横アーチ幅であった.拇指角は中足部回転モーメントが大きくなることで有意に増加した.[考察] 外反母趾に影響を与えるメカニズムとして,1.舟状骨の位置・高さに起因し,回転モーメントが増大するものと,2.前足部の幅に起因する2つが推察された.1により舟状骨と内側・中間楔状骨の可動性が大きくなり,第1中足骨の捻じれが発生する可能性が推察された.以上より,足部骨格の特徴量を定量的に計測することで外反母趾のリスク推定を行える可能性が示唆された.</p>

    DOI: 10.11239/jsmbe.annual60.109_1

  • Efficient 3D-RSS map estimation method based on area classification

    Danjo Azusa, Ata Shingo, Matsuda Takahiro

    IEICE Communications Express   10 ( 10 )   816 - 821   2021.10

     More details

    <p>We consider the determination of three-dimensional maps of received signal strength (3D-RSS maps) for disaster-recovery networks enabled by unmanned aerial vehicles (UAVs). In this paper, we extend the existing tensor completion based estimator to propose an efficient new 3D-RSS map estimator. To reduce the sensing route length for the UAV, the proposed method utilizes two approaches for estimating the RSS maps (the tensor completion-based and path-loss-based approaches), depending upon the number of high buildings. We show by simulation experiments that the proposed method can achieve a data-collection time comparable to those of existing methods with a shorter sensing route.</p>

    DOI: 10.1587/comex.2021xbl0139

    CiNii Article

  • Foot-surface-structure analysis using a smartphone-based 3D foot scanner

    Yamashita T.

    Medical Engineering and Physics   95   90 - 96   2021.09( ISSN:13504533

     More details

  • [奨励講演]逐次蓄積型学習ベース異常検知における学習データの効用

    深澤那月, 吉田直樹, 阿多信吾, 岡育生

    電子情報通信学会技術研究報告 (ICM)   119 ( 438 )   49 - 54   2021.03

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • Exact Analysis of Error State Probability for Viterbi Decoding in Sequence Dependent Channels Reviewed

    Tomizuka Tadashi, Oka Ikuo, Ata Shingo

    IEICE TRANSACTIONS ON COMMUNICATIONS   E104B ( 1 )   3 - 6   2021.01( ISSN:0916-8516

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.14923/transfunj.2020JAL2011

  • Comparisons of foot skeletal between foot 3D measurement system and digital footprint

    Yamashita Tomoko, Yamashita Kazuhiko, Ata Shingo

    Transactions of Japanese Society for Medical and Biological Engineering   Annual59 ( Abstract )   369 - 369   2021( ISSN:1347443X

     More details

    <p>The function of the medial longitudinal arch of the foot is essential for maintaining a stable gait.To assess this, many studies measure the outer dimensions of the foot, utilizing footprints. However, it has been highlighted that inconsistent results have been obtained during measurements.Therefore, this study compared the evaluation index of the medial longitudinal arch using the results obtained from a developed 3D foot-scanning system and footprint. The target group consisted of 403 people (mean age, 63.7±12.0 years).Resultantly, the 3D foot-scanning system index moderately contributed to CSI, which are the indices of the medial longitudinal arch associated with the digital footprint. It became clear that the use of quantitative indices for 3D foot measurements is important for evaluating the medial longitudinal arch.</p>

    DOI: 10.11239/jsmbe.annual59.369

    CiNii Article

  • 基幹ネットワークにおける拡張可能な端末識別のためのリアルタイム処理アーキテクチャ

    阿多 信吾

    電子情報通信学会技術研究報告 (IN)   121   13 - 18   2021

  • Optimizing functional split of baseband processing on TWDM-PON based fronthaul network Reviewed

    Go Hasegawa, Masayuki Murata, Yoshihiro Nakahira, Masayuki Kashima, Shingo Ata

    330 - 336   2020.12

     More details

    Publishing type:Research paper (international conference proceedings)   Kind of work:Joint Work  

    DOI: 10.1109/MSN50589.2020.00061

  • TWDM-PONにおける遅延及びサーバ性能制約を考慮したベースバンド処理機能の配置最適化

    長谷川剛,村田正幸,中平佳裕,鹿嶋正幸,阿多信吾

    電子情報通信学会技術研究報告(CQ)   120 ( 108 )   51 - 56   2020.07

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • A Device Identification Method Based on Combination of Multiple Information Reviewed

    Yuki Imamura, Nobuyuki Nakamura, Taketsugu Yao, Shingo Ata, Ikuo Oka

    1 - 4   2020.04

     More details

    Publishing type:Research paper (international conference proceedings)   Kind of work:Joint Work  

    DOI: 10.1109/NOMS47738.2020.9110448

  • An Automatic Error Identification Method in Call Control Protocol Using Levenshtein Distance Reviewed

    Keishu Umoto, Shingo Ata, Yasubumi Chimura, Nobuyuki Nakamura, Tatetsugu Yao

    1 - 5   2020.02

     More details

    Publishing type:Research paper (international conference proceedings)   Kind of work:Joint Work  

  • 通信トラヒックを活用した学習ベースの異常検知における学習データの自動蓄積

    深澤那月, 吉田直樹, 阿多信吾, 岡育生

    電子情報通信学会技術研究報告 (ICM)   119 ( 438 )   49 - 54   2020.02

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • Channel Selection Metric by the Number of Users and SNR in WLAN

    Okutate T.

    Proceedings - 2019 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2019   2019.12( ISBN:9781728130385

     More details

  • Probability Distribution Analysis of Backoff Time with Frozen Backoff in CSMA/CA

    Samoto K.

    Proceedings - 2019 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2019   2019.12( ISBN:9781728130385

     More details

  • Special Section on Enhancing Information Centric Networking Technologies Towards Real-world Infrastructure FOREWORD Reviewed

    Ata Shingo

    IEICE TRANSACTIONS ON COMMUNICATIONS   E102B ( 9 )   1791 - 1791   2019.09( ISSN:0916-8516

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Single Work  

  • DNSクエリの類似性にもとづく機器情報補完手法

    平澤卓也, 阿多信吾, 岡育生

    電子情報通信学会技術研究報告 (IN)   119 ( 195 )   23 - 28   2019.08

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • TWDM-PONに基づくフロントホールネットワークの機能配置の最適化に関する一検討

    長谷川剛, 村田正幸, 中平佳裕, 鹿嶋正幸, 阿多信吾

    電子情報通信学会技術研究報告 (NS)   119 ( 194 )   35 - 40   2019.08

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • 探索型ネットワーク設計導出方式を用いた障害自動切り分け技術

    福田達也, 黒田貴之, 下西英之, 阿多信吾

    電子情報通信学会技術研究報告 (NS)   119 ( 194 )   41 - 46   2019.08

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • 複数の観測情報を用いた機器同定精度の向上

    今村裕揮,中村信之, 八百健嗣, 阿多信吾, 岡育生

    電子情報通信学会技術研究報告 (IN)   119 ( 195 )   29 - 34   2019.08

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • 無線LANにおけるSNRとユーザ数を考慮した通信路選択のメトリックに関する検討

    奥立大雅, 岡育生, 阿多信吾

    電子情報通信学会技術研究報告 (IT)   119 ( 149 )   23 - 26   2019.07

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • CSMA/CAにおけるバックオフ凍結を考慮したバックオフ時間の確率分布

    佐本紘希, 岡育生, 阿多信吾

    電子情報通信学会技術研究報告 (IT)   119 ( 149 )   27 - 30   2019.07

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • Design and Implementation of Tracking System for Moving Objects in Information-Centric Networking Reviewed

    1 - 5   2019.02

     More details

    Publishing type:Research paper (international conference proceedings)   Kind of work:Joint Work  

  • Realization of Mobility-Controlled Flying Router in Information-Centric Networking Reviewed

    Gao Yuhao, Kitagawa Taku, Eum Suyong, Ata Shingo, Murata Masayuki

    JOURNAL OF COMMUNICATIONS AND NETWORKS   20 ( 5 )   443 - 451   2018.10( ISSN:1229-2370

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/JCN.2018.000069

  • Exact Analysis for Error Probability of Max-Log-MAP Decoding in Sequence Dependent Channels Reviewed

    Tadashi Tomizuka, Riku Iwanaga, Ikuo Oka, Shingo Ata

    Proceedings of ISITA 2018   2018.10

     More details

    Publishing type:Research paper (international conference proceedings)   Kind of work:Joint Work  

  • Compact CAR: Low-Overhead Cache Replacement Policy for an ICN Router Reviewed

    OOKA Atsushi, EUM Suyong, ATA Shingo, MURATA Masayuki

    一般社団法人 電子情報通信学会 IEICE Transactions on Communications   101 ( 6 )   1366 - 1378   2018.06( ISSN:0916-8516

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Joint Work  

    <p>Information-centric networking (ICN) has gained attention from network research communities due to its capability of efficient content dissemination. In-network caching function in ICN plays an important role to achieve the design motivation. However, many researchers on in-network caching due to its ability to efficiently disseminate content. The in-network caching function in ICN plays an important role in realizing the design goals. However, many in-network caching researchers have focused on where to cache rather than how to cache: the former is known as content deployment in the network and the latter is known as cache replacement in an ICN router. Although the cache replacement has been intensively researched in the context of web-caching and content delivery network previously, networks, the conventional approaches cannot be directly applied to ICN due to the fine granularity of chunks in ICN, which eventually changes the access patterns. In this paper, we argue that ICN requires a novel cache replacement algorithm to fulfill the requirements in the design of a high performance ICN router. Then, we propose a novel cache replacement algorithm to satisfy the requirements named Compact CLOCK with Adaptive Replacement (Compact CAR), which can reduce the consumption of cache memory to one-tenth compared to conventional approaches. In this paper, we argue that ICN requires a novel cache replacement algorithm to fulfill the requirements set for high performance ICN routers. Our solution, Compact CLOCK with Adaptive Replacement (Compact CAR), is a novel cache replacement algorithm that satisfies the requirements. The evaluation result shows that the consumption of cache memory required to achieve a desired performance can be reduced by 90% compared to conventional approaches such as FIFO and CLOCK.</p>

    DOI: 10.1587/transcom.2017EBP3299

    CiNii Article

  • ワークフローのモジュール化によるネットワーク運用管理自動化手法

    瓦井 太雄, 吉田 直樹, 中山 裕貴, 林 經正, 阿多 信吾

    電子情報通信学会技術研究報告 (ICM)   117 ( 491 )   13 - 18   2018.03

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • Number of Users Estimated by Statistics of Random Backoff Time in WiFi Networks Reviewed International coauthorship

    Norihiro Matsumoto, Ikuo Oka, Shingo Ata

    International Workshop on Nonlinear Circuits, Communications and Signal Processing   2018.03

     More details

    Publishing type:Research paper (international conference proceedings)   Kind of work:Joint Work  

  • 機械学習アルゴリズムを用いた呼制御プロトコルにおけるエラー識別

    兎本 圭脩, 阿多 信吾, 千村 保文, 中村 信之, 八百 健嗣

    電子情報通信学会総合大会   2018.03

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • Mobility-controlled Flying Routers for Information-centric Networking Reviewed

    Taku Kitagawa, Shingo Ata, Suyong Eum, Masayuki Murata

    Proceedings of IEEE Consumer Communications & Networking Conference (IEEE CCNC 2018)   2018.01

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/CCNC.2018.8319303

  • Scalable Cache Component in ICN Adaptable to Various Network Traffic Access Patterns Reviewed

    OOKA Atsushi, SUYONG Eum, ATA Shingo, MURATA Masayuki

    一般社団法人 電子情報通信学会 IEICE Transactions on Communications   101 ( 1 )   35 - 48   2018

     More details

    Publishing type:Research paper (scientific journal)  

    <p>Information-centric networking (ICN) has received increasing attention from all over the world. The novel aspects of ICN (e.g., the combination of caching, multicasting, and aggregating requests) is based on names that act as addresses for content. The communication with name has the potential to cope with the growing and complicating Internet technology, for example, Internet of Things, cloud computing, and a smart society. To realize ICN, router hardware must implement an innovative cache replacement algorithm that offers performance far superior to a simple policy-based algorithm while still operating with feasible computational and memory overhead. However, most previous studies on cache replacement policies in ICN have proposed policies that are too blunt to achieve significant performance improvement, such as first-in first-out (popularly, FIFO) and random policies, or impractical policies in a resource-restricted environment, such as least recently used (LRU). Thus, we propose CLOCK-Pro Using Switching Hash-tables (CUSH) as the suitable policy for network caching. CUSH can identify and keep popular content worth caching in a network environment. CUSH also employs CLOCK and hash-tables, which are low-overhead data structure, to satisfy the cost requirement. We numerically evaluate our proposed approach, showing that our proposal can achieve cache hits against the traffic traces that simple conventional algorithms hardly cause any hits.</p>

    DOI: 10.1587/transcom.2017ITP0006

    CiNii Article

  • Automation of Network Operations by Cooperation between Anomaly Detections and Operation Logs Reviewed International coauthorship

    Naoki Yoshida, Shingo Ata, Hiroki Nakayama, Tsunemasa Hayashi

    Proceedings of IEEE GLOBECOM 2017   2017.12

     More details

    Publishing type:Research paper (international conference proceedings)   Kind of work:Joint Work  

  • Identification of Communication Devices from Analysis of Traffic Patterns Reviewed International coauthorship

    Hiroki Kawai, Shingo Ata, Nobuyuki Nakamura, Ikuo Oka

    Proceedings of 13th International Conference on Network and Service Management (CNSM 2017)   2017.11

     More details

    Publishing type:Research paper (international conference proceedings)   Kind of work:Joint Work  

  • データベースを利用したSDNアーキテクチャの動的構成手法 Reviewed International coauthorship

    佐藤 寧洋,河合 勇輝, 阿多 信吾, 岡 育生

    電子情報通信学会論文誌   J100-B ( 12 )   2017.10

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Joint Work  

  • Management of Information, Communications, and Networking: from the Past to the Future Reviewed

    Ata Shingo, Tonouchi Toshio

    一般社団法人 電子情報通信学会 IEICE TRANSACTIONS ON COMMUNICATIONS   E100B ( 9 )   1614 - 1622   2017.09( ISSN:0916-8516

     More details

    Publishing type:Research paper (scientific journal)  

    <p>As a result of large-scale and complicated of ICT (Information and Communication Technology), the technologies of operations and management of ICT infrastructure and systems are changing to adopt the variation and diversity of usage and communication characteristics. In retrospect, operations and management technologies cover widely from the support of telecommunications operations and remote monitoring for maintaining network equipments, to an integrated network management framework for configuration, monitoring, testing and controls. Recently, the spread of network virtualization technologies enable agility, integrity, and resilience to ICT services. Operations and management technologies will be more important in future, for the support of integrated management of ICT infrastructure including computing resource, and automation of service operations. In this paper, we review research activities of the Technical Committee on Information and Communications Management (ICM) with discussions of individual research category. We then describe the state-of-the-art topics and future directions in the area of ICM.</p>

    DOI: 10.1587/transcom.2016PFI0017

    CiNii Article

  • Identification of User Behavior from Flow Statistics Reviewed International coauthorship

    Shingo Ata, Yusuke Iemura, Nobuyuki Nakamura, Ikuo Oka

    Proceedings of APNOMS 2017   2017.09

     More details

    Publishing type:Research paper (international conference proceedings)   Kind of work:Joint Work  

  • 無線 LAN における DCF のバックオフを用いたユーザ数推定

    松本 憲祐, 岡 育生, 阿多 信吾

    電子情報通信学会技術研究報告 (IT)   117 ( 120 )   33 - 36   2017.07

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • 仲上-m フェージング環境における SN 比の推定誤り率解析

    村上達彦, 岡育生, 阿多信吾

    電子情報通信学会技術研究報告 (IT)   117 ( 120 )   37 - 42   2017.07

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • 通信トラヒックのパターン分析にもとづく通信機器同定に関する手法

    河合 嘉輝, 阿多 信吾, 岡 育生, 中村 信之

    電子情報通信学会技術研究報告 (IN)   2017.06

     More details

    Publishing type:Research paper (conference, symposium, etc.)   Kind of work:Joint Work  

  • Performance Improvement of Hybrid Search Engine for Wide and Sparse Rules

    Keiko Endo, Yuji Yano, Shingo Ata, Ikuo Oka

    Proc. ICEIC 2017   2017.01

  • Analysis of Popularity Pattern of User Generated Contents and its Application to Content-aware Networking

    Tatsuya Tanaka, Shingo Ata, Masayuki Murata

    Proc. IEEE GLOBECOM 2016 ICNRA Workshop   1 - 6   2016.12

  • Quadrature Amplitude Modulation Classification by Two Amplitude Moments

    ONO Tomoaki, OKA Ikuo, ATA Shingo

    J99-B ( 11 )   1048 - 1051   2016.11

     More details

    A signal detection and its classification are important to cognize radio environments, which include a radio wave monitoring or cognitive radio applications. In this paper, a new QAM classification method is presented. The method is based on two amplitude moments. The classification error probability is derived in the presence of timing offset, and the numerical results demonstrate the superior classification performance of the method.

    DOI: 10.14923/transcomj.2016jbl4002

  • 2 種の振幅モーメントを用いた直交振幅変調の識別に関する研究

    大野 倫明, 岡 育生, 阿多 信吾

    電子情報通信学会論文誌   J99-B ( 11 )   1048 - 1051   2016.11

  • Maximum Likelihood Estimation for SNR in Nakagami Fading Channels

    Shinji Nishijima, Ikuo Oka, Shingo Ata

    Proc. ISITA 2016   385 - 388   2016.11

  • Quantitavely Assess Network Security Risk for Virtual Network's Triage

    Zelong Li, Shingo Ata, Ikuo Oka

    Proc. APNOMS 2016   2016.10

  • Statistical Analysis of Network Traffic by Applications of Smart Devices

    Takeshi Tsumuro, Shingo Ata, Ikuo Oka

    Proc. APNOMS 2016   2016.10

  • Retrieving Information with Autonomously- Flying Routers in Information-Centric Network

    Taku Kitagawa, Shingo Ata, Masayuki Murata

    Proc. IEEE ICC 2016   1 - 6   2016.06

  • PSK and QAM Classification by Likelihood under Unknown SNR Condition

    Shinji Nishijima, Ikuo Oka, Shingo Ata

    Proc. 2016 RISP International Workshop on Nonlinear Circuits, Communications and Signal Processing   2016.05

  • PSK and QAM Classification by Likelihood under Unknown SNR Condition

    Shinji Nishijima, Ikuo Oka, Shingo Ata

    Journal of Signal Processing   20 ( 4 )   183 - 186   2016.04

  • B-7-22 Statistical Analysis of Network Traffic by Applications of Mobile Devices Reviewed

    Tsumuro Takeshi, Ata Shingo, Nakamura Nobuyuki, Oka Ikuo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2016 ( 2 )   2016.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-7-57 A Study on Power-Saving Control by Intermittent Operation using Traffic Forecast in Sensor Networks Reviewed

    Kataoka Yukiko, Saito Yusuke, Ata Shingo, Inoue Kazunari

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2016 ( 2 )   2016.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Energy-efficient High-speed Search Engine Using a Multi-dimensional TCAM Architecture with Parallel Pipelined Subdivided Structure

    Masami Nawa, Kenzo Okuda, Yasuto Kuroda, Yuji Yano, Hisashi Iwamoto, Kazunari Iwamoto, Ikuo Oka

    Prof. IEEE CCNC 2016   316 - 321   2016.01

  • PSK and QAM Classification by Likelihood under Unknown SNR Condition Reviewed

    Nishijima Shinji, Oka Ikuo, Ata Shingo

    信号処理学会 Journal of Signal Processing   20 ( 4 )   183 - 186   2016

     More details

    Publishing type:Research paper (scientific journal)  

    Modulation classification is a key technology in current wireless communication systems. The technology is used to find the modulation employed or estimate channel state information (CSI). In this paper, a modulation classification method is proposed for phase shift keying (PSK) and quadrature amplitude modulation (QAM) under an unknown signal-to-noise ratio (SNR) condition. The method works without carrier synchronization and is based on likelihood estimation using the probability density function (pdf) of the received signal envelope. The superior classification error rate of the proposed method is demonstrated by computer simulations.

    DOI: 10.2299/jsp.20.183

    CiNii Article

  • Abstract Model of SDN Architectures Enabling Comprehensive Performance Comparisons

    Tatsuya Sato, Yasuhiro Sato, Ikuo Oka

    Proc CNSM 2015   1 - 8   2015.11

  • BT-2-3 A Palm Sized CCN Node by Raspberry Pi Reviewed

    Ata Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2015 ( 2 )   "SS - 22"   2015.08

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Single Work  

    CiNii Article

  • Enhancing Immediacy of Identification with Multi-Stage Application Identification

    Yuichi Kumano, Nobuyuki Nakamura, Yoshihiro Nakahira, Ikuo Oka

    Proc. NTMS 2015   1 - 5   2015.07

  • Design of Communication Architecture to Support Stream Data over Content-centric Networking

    Kenya Kawasaki, Masayuki Murata

    Proc. CFI 2015   57 - 62   2015.06

  • Establishing PDCA Cycles for Agile Network Management in SDN/NFV Infrastructure

    Kotaro Shibata, Hiroki Nakayama, Tsunemasa Hayashi

    Prof. IFIP/IEEE IM 2015   -   2015.05

  • Caching Algorithm for Content-Oriented Networks Using Prediction of Popularity of Contents

    Hiroki Nakayama, Ikuo Oka

    Proc. ManFI 2015   -   2015.05

  • High-Speed Design of Conflict-less Name Lookup and Efficient Selective Cache on CCN Router

    Atsuhi Ooka, Kazunari Inoue, Masayuki Murata

    IEICE Transactions on Communications   E98-B ( 4 )   607 - 620   2015.04

     More details

    Publishing type:Research paper (scientific journal)  

  • A Method of Multi-stage Application Identification for Improving Identification Accuracy Reviewed

    KUMANO Yuichi, ATA Shingo, NAkAMURA Nobuyuki, NAKAHIRA Yoshihiro, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information and communication management   114 ( 523 )   19 - 24   2015.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    A method of application identification is important for network management because it is used for traffic controls and anomaly traffic detection. To apply traffic controls based on applications immediately, real-time application idenfitication technique is essential. We previously proposed a method of real-time application identification, and it achieved high accuracy. However, our proposed method needs the same number of packets to identify each application because it uses only one classifier. The problem in our proposed method is to need more packets than necessary in order to identify applications even if it can identify applications earlier. In this paper, we propose a method of multi-stage application identification, which use multi-classifier. First, we reveal that accuracy is degraded when increase number of applications. Second, we examine traffic features used by group classification. Finally, we describe how to classify applications into groups. We demonstrate that our proposed method can identify applications earlier than using one classifier.

    CiNii Article

  • A Hierarchical Controller Architecture to Overcome Issues on Real SDN System Reviewed

    NAKAYAMA Hiroki, HAYASHI Tsunemasa, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information and communication management   114 ( 523 )   115 - 120   2015.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    OpenFlow, one of the famous implementation of Software Defined Network (SDN), has a goal of eliminating vendor lock in. However, since OpenFlow only provides the mechanism to decide how packet will be transferred as the protocol, it could not provide whole control via OpenFlow protocol. Therefore, the OpenFlow switch available for its network system strongly depends on how the switch supports the configuration interface and functions for its switch. In this paper we propose the SDN switch architecture, which conclude the OpenFlow controller inside the switch, to avoid vendor lock in for this reason. Furthermore, we also show that our proposal architecture can overcome the issue of using OpenFlow including the large initial costs and lack of number of flow table.

    CiNii Article

  • An Error Probability Analysis for QAM Classification by Two Amplitude Moments Reviewed

    ONO Tomoaki, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information theory   114 ( 470 )   53 - 57   2015.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    A signal detection and its classification are important to cognize radio environments, which include a radio wave monitering or cognitive radio applications. In this paper, a new QAM classification method is presented. The method is based on two amplitude moments. The classification error probability is derived in the presence of timing offset, and the humerical results demonstrate the superior classification performance of the method.

    CiNii Article

  • A Design and Implementation of Name Completion in Content-Centric Networking Reviewed

    MAEDA Ryo, ATA Shingo, KITAMURA Hiroshi

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   114 ( 478 )   227 - 232   2015.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    The naming scheme in a content-centric networking (CCN) is important because it directly affects the user-friendliness of the client. In particular, it is usual to introduce a hierarchical naming scheme to archive global uniqueness of names without conflicts, is overly demanding for the client to collect complete names of content because hierarchical complete names require knowing the entirety of the structure, which makes end users difficult to specify the content without knowledge of complete naming structure. In this paper we propose name completion, which is a process for completing partially specified names to fully specified names, and we describe its design and implementation. We next demonstrate an implementation of name completion in an experimental network to show the effectiveness of the name completion procedure.

    CiNii Article

  • SNR Estimation for QAM by Likelihood Methods Reviewed

    NISHIJIMA Shinji, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information theory   114 ( 470 )   59 - 62   2015.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    According to radio channel conditions, the adaptive system changes modulation, coding, or power dynamically. The exact estimation of channel SNR is important in the adaptive system. In this paper, the new methods of maximum likelihood estimation are presented for SNR by using the probability density function (pdf) of envelope of received signals. The methods work in unknown signal power conditions, and don't require the carrier synchronization. The estimation accuracy of the proposed method is evaluated by normalized mean square error (NMSE).

    CiNii Article

  • Improving Cache Efficiency of {Content-Centric Networking} by Using Encoded Addresses

    Yuma Kitade, Masayuki Murata

    Proceedings of the Seventh International Conference on Creative Content Technologies (CONTENT 2015)   -   2015.03

  • Lecture 1(The 12th Annual FD Conference) Reviewed

    ATA Shingo

    Osaka City University, OCU journal of higher education studies   12 ( 2 )   49 - 54   2015.03( ISSN:13492152

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Single Work  

    DOI: 10.24544/ocu.20171218-087

    CiNii Article

  • Name Completion for Improving Flexibility of Names in Information-Centric Networking

    Ryo Maeda, Hiroshi Kitamura

    Proceedings of the 3rd International Conference on Green and Human Information Technology (ICGHIT 2015)   134 - 137   2015.02

  • Using Layer-7 Filter to Overcome the Conflict of Management Policy in Real SDN System Reviewed

    NAKAYAMA Hiroki, HAYASHI Tsunemasa, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information and communication management   114 ( 389 )   67 - 72   2015.01( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Since network virtualization such as Software Defined Network (SDN) and Network Function Virtualization (NFV) is pervading in network services, network infrastructure became available with low cost and short period. Therefore, it became easier for 2nd providers to provide their own service by using network infrastructures provided by 1st provider. However, since 1st provider only provides limited functions of management plane, it is difficult for 2nd providers to conduct a smooth management of service. In this paper, we propose the architecture, Service Dependent Management plane (SDM), to provide partial management plane for 2nd provider to overcome this issue. Furthermore we introduce the user command specified implementation, Simple Management of Access-Restriction Translator Gateway (SMART-GW), and demonstrate its feasibility and performance so that our proposed model is feasible enough for practical use in the carrier class networks.

    CiNii Article

  • Address Control and Management of the IPv6 Security Enhanced Communication Architecture : Unified Multiplex Reviewed

    KITAMURA Hiroshi, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   114 ( 373 )   23 - 28   2014.12( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    IPv6 has huge wide address space. By utilizing this good feature, we can easily emphasize the security of IPv6 communications. We are proposing a Unified Multiplex Communication Architecture that protects privacy and emphasizes the security by changing IPv6 addresses for each session actively. Since this mechanism is based on innovating usage of IPv6 addresses, anyone can use this easily without modifying existing applications. However, this type of actively address changing approach is completely new. In order to provide a simple and appropriate management method to control many IPv6 addresses, there are many problems to solve. In this paper, we report design and implementation of the method to solve them by setting Tag to each address in the kernel address pool.

    CiNii Article

  • Error Rate Performance of Fixed Rate Spinal Codes

    Hodaka Tashiro, Yu Morishima, Ikuo Oka

    Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2014)   -   2014.12

  • Bit Error Rate of Fixed Rate Spinal Codes Combined with 64QAM (Satellite Telecommunications) Reviewed

    TASHIRO Hodaka, MORISHIMA Yu, OKA Ikuo, ATA Shingo

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   114 ( 265 )   141 - 144   2014.10( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Spinal codes are the new approach for rateless codes. Spinal codes are decoded by a dynamic search as well as convolutional codes which have a long constraint length. Near capacity performance of spinal codes is demostrated. However, the error performance of spinal codes has not been studied enough. In this paper, the bit error rate of fixed rate spinal codes is examined by computer simulations. The error rate of fixed rate spinal codes is presented for rates from 1/15 to 8/9. A new method for symbol mapping is proposed to improve the bit error rate of high-rate codes.

    CiNii Article

  • Threshold Decoding Algorithms for Spinal Codes over Interference Channels (Satellite Telecommunications) Reviewed

    MORISHIMA Yu, OKA Ikuo, ATA Shingo

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   114 ( 265 )   129 - 133   2014.10( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Spinal codes are new class of rate-compatible codes. Decoder of the spinal codes has employed M-algorithm to find the least cost path on the code tree and sorting operation of M-algorithm increases the complexity of the decoder. To reduce decoder complexity, threshold algorithms have been proposed. These algorithms require the channel state information to determine the threshold, therefore, inaccurate estimation of channel state information causes performance degradation and sensitivity of the threshold should be considered. In this paper, we propose the symbol mapping method considering sensitivity of thresholds. In addition, we also evaluate the sensitivity of thresholds of symbol counting based threshold algorithms over interference channels.

    CiNii Article

  • B-7-28 Identification of User Behavior based on Time Variation of Traffic Statistics Reviewed

    Iemura Yusuke, Kumano Yuichi, Ata Shingo, Oka Ikuo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2014 ( 2 )   2014.09

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • BS-6-32 A Self-Adaptive Approach for Fine-grained Network Operation and Management in Software Defined Networks(BS-6.Network and service Design, Control and Management) Reviewed

    Shibata Kotaro, Nakayama Hiroki, Ata Shingo, Hayashi Tsunemasa

    一般社団法人電子情報通信学会 電子情報通信学会ソサイエティ大会講演論文集   2014 ( 2 )   "S - 98"-"S-99"   2014.09

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-7-29 Abstract Modeling of SDN Architecture Enabling Unified Performance Evaluation Reviewed

    Sato Tatsuya, Sato Yasuhiro, Ata Shingo, Oka Ikuo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2014 ( 2 )   2014.09

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Identification of User Behavior based on Time Variation of Traffic Statistics

    Yusuke Iemura, Ikuo Oka

    Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium (APNOMS 2014)   -   2014.09

  • Abstract Modeling of SDN Architecture Enabling Comprehensive Performance Evaluation in SDN Architecture

    Tatsuya Sato, Yasuhiro Sato, Ikuo Oka

    Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium (APNOMS 2014)   -   2014.09

  • Symbol Counting Bases Threshould Algorithms for Decoding Spinal Codes

    Yu Morishima, Ikuo Oka

    Proc. IEEE 11th Vehicular Technology Society Asia Pacific Wireless Communication Symposium (APWCS2014)   -   2014.08

  • Error Probability Performance of Spinal Codes under the Condition of Fixed Rate Reviewed

    TASHIRO Hodaka, MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information theory   114 ( 34 )   31 - 35   2014.05( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Spinal codes were proposed in 2011 by J.Perry, et al. as a new class of rateless codes. Spinal codes have a high randomness by using a hash function, witch realizes the sperior performance. The performance approaches the channel capacity in the additive white Gaussian noise channel. Spinal codes are decoded by a dynamic tree search which is employed for comvolutional codes if long constraint length. Howerver, it has not been studied enough about the characteristics of the Spinal codes. In this paper, the error probability is evaluated in the condition of a fixed rate. The error probability is found to have the error floor. To improve the error floor, the methods of systematic coding and tail symbol insertion are presented.

    CiNii Article

  • Block Length Estimation of Block Modulations by Cycrostationarity Reviewed

    JIN Shengdi, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, Technical report of IEICE. SAT   114 ( 27 )   1 - 4   2014.05( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    The modulation identifications is one of the key issues in the cognitive radios, and many works were devoted to the modulation classification of symbol-by-symbol modulations. However, few works were presented of block modulations. They are, for example, a signal detection of OFDM. In this paper, the decision method is improved in the block length estimation, which exploits the cyclostationarity. Simulation results of correct estimation rate show the superior performance of the improved method. The method does not require the accurate symbol rate and center frequency.

    CiNii Article

  • 2状態軟判定ビタビ復号におけるトランケーションの誤り率への影響の厳密解析

    森島 佑, 岡 育生

    電子情報通信学会論文誌 A   J97-A ( 5 )   391 - 394   2014.05

     More details

    Publishing type:Research paper (scientific journal)  

  • A Database Oriented Management for Asynchronous and Consistent Reconfiguration in Software-Defined Networks

    Yuki Kawai, Yasuhiro Sato, Dijiang Huang, Deep Medhi, Ikuo Oka

    Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS 2014)   1 - 5   2014.05

  • Low-Power and High-Speed Search Engine by Multi-dimensional TCAM Architecture with Parallel Pipelined Subdivided Structure Reviewed

    OKUDA Kenzo, NAWA Masami, ATA Shingo, YANO Yuji, KURODA Yasuto, IWAMOTO Hisashi, INOUE Kazunari, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   114 ( 7 )   67 - 72   2014.04( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    TCAM (Ternary Content Addressable Memory) is widely used for high speed searching applications on networking equipment. Unlike general RAMs, a TCAM consumes vast amounts of power, because it is designed to search its entire memory in a single cycle. As size of matching table grows continuously, it recently becomes serious. In this paper, we propose a novel TCAM-based hardware architecture, which solves potential restrictions of TCAM by enabling selective partial activate according to "don't care bits." For the purpose of reducing power consumed by TCAMs, we subdivide a TCAM into multiple sub TCAMs in LSI stage and stop look-up on sub TCAMs that consist of don't care bits.

    CiNii Article

  • Design of a High-speed Content-centric-networking Router Using Content Addressable Memory

    Atsushi Ooka, Kazunari Inoue, Masayuki Murata

    Proc. IEEE INFOCOM Workshop on Name-Oriented Mobility   458 - 463   2014.04

  • Caching Algorithm Using the Prediction of Content's Demand Reviewed

    NAKAYAMA Hiroki, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information and communication management   113 ( 492 )   125 - 130   2014.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Cache on the content deployment in network system plays the important role in the aspect of efficient content deliver. Since the capacity of cache on each network node is limited, a number of algorithms have been proposed. However, because of previous methods do not consider that the demand of content fluctuates rapidly, ineffectual cache of content remains on the cache. In this paper, we propose the method of using the prediction result of content demand. We first demonstrate that by applying prediction can improve the efficiency of cache utilization. However, predicting the demand of whole contents is not realistic in the aspect of computational cost. We therefore propose the method of reducing computational cost greatly without lack of cache efficiency. We demonstrate that by applying it to the real monitored data, cache hit rate can be increased about 60%.

    CiNii Article

  • A QAM Classification based on Two Amplitude Moments in the Presence of Symbol Timing Error Reviewed

    MATSUMURA Yasuhiro, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information theory   113 ( 483 )   187 - 192   2014.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    In cognitive radios, signal detection and modulation classification are becoming more and more important to recognize wireless environments. The modulation is well classified by a simple method using moments. However, the classification performance degrades significantly by timing offset offset. In this paper, we present both estimation method of symbol timing by using amplitude moment and a QAM classification method based on combined moments to improve the classification error probability in the presence of symbol timing error.

    CiNii Article

  • Rateless Codes Construction based on Codewords Splitting Reviewed

    MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Communication systems   113 ( 465 )   11 - 15   2014.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Spinal codes are recently proposed rateless codes which employ the hash functions to generate codewords. In spinal codes, codewords are obtained by the hash function with splitting the encoder states into subsequences. However, design methods of spinal codes and hash function have not been proposed. In this paper, we consider the design method of the rateless codes by replacing the hash function of spinal codes with other random structures. Specifically, we propose the rateless codes construction based on codewords splitting using generator matrices of block codes.

    CiNii Article

  • Hardware Design and Evaluation of a High-speed CCN Router Using CAM Reviewed

    OOKA Atsushi, ATA Shingo, INOUE Kazunari, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   113 ( 473 )   105 - 110   2014.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Content-centric networking (CCN) that is an innovative network architecture requires routers with performance far superior to that offered by today's Internet routers. There are, however, few router-level designs incorporating all the necessary components. The design and evaluation of a complete router is the primary contribution of this paper. We provide a concrete hardware design for a router model incorporating two entities that we propose. Our contributions are (1) presenting a proper algorithm for looking up and matching name addresses in CCN communication, (2) proposing a method to process CCN packets in a way that achieves high throughput and very low latency, and (3) demonstrating performance and cost on the basis of a concrete hardware design.

    CiNii Article

  • Towards Real-time Processing for Application Identification of Encrypted Traffic

    Yuichi Kumano, Nobuyuki Nakamura, Yoshihiro Nakahira, Ikuo Oka

    Proc. IEEE ICNC 2014   2014.02

  • Error Probability Analysis of Majority Decision in Tree Networks Composed of Fading Channels Reviewed

    NAKANISHI Shogo, MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information theory   113 ( 411 )   17 - 21   2014.01( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    In wireless sensor networks, multi-hop communications are often employed for power limitation of sensor nodes. A path diversity is an effective technique to get highly reliable communication since there are many paths from source to destination. In fading channels, by removing small signal, we can get highly reliable communication. In this paper, we propose a new relay method with threshold. The error probability of majority decision is analyzed, and an effect of a threshold change on error probability is presented to show that this proposed method is effective to fading in tree networks.

    CiNii Article

  • Error Probability Improvements by Small Signal Rejection in Tree Networks Employing Majority Decision Reviewed

    NAKANISHI Shogo, MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Communication systems   113 ( 390 )   7 - 10   2014.01( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    In wireless sensor networks, multi-hop communications are often employed for the power limitation of sensor nodes. A path diversity is an effective technique to get highly reliable communications since there are many paths from source to destination. In fading channels, a small signal has low reliability. In this paper, we propose a new multi-hop method which does not relay the small signal in a tree network. Simulation results show that our method is effective to fading in binary tree fading channels.

    CiNii Article

  • SeRViTR: A Framework, Implementation, and a Testbed for a Trustworthy Future Internet

    Shingo Ata, Dijiang Huang, Xuan Liu, Aikra Wada, Tianyi Xing, Parikshit Juluri, Chun-Jen Chung, Yasuhiro Sato, Deep Medhi

    Computer Networks   2014.01

     More details

    Publishing type:Research paper (scientific journal)  

  • Resource name based routing in the Network Layer

    Haesung Hwang, Masayuki Murata

    Journal of Network and Systems Management   22 ( 1 )   1 - 22   2014.01

     More details

    Publishing type:Research paper (scientific journal)  

  • Saving energy of networking hardware Reviewed

    Ata Shingo

    The Japan Joint Automatic Control Conference, Proceedings of the Japan Joint Automatic Control Conference   57 ( 0 )   1099 - 1100   2014

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Single Work  

    DOI: 10.11511/jacc.57.0_1099

    CiNii Article

  • コンテンツの需要の予測を利用したキャッシング法

    阿多 信吾

    電子情報通信学会技術研究報告   113   125 - 130   2014

  • Design and implementation of "Zone-ID Free" functions that improve IPv6 Link-Local Address usages for end-users Reviewed

    KITAMURA Hiroshi, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   113 ( 363 )   77 - 82   2013.12( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    IPv6 Link-Local address is supporting Auto Configuration and Neighbor Discovery of IPv6, and isn't in the specification of IPv4 and is one of the remarkable specifications that are produced by the IPv6. They are set to all IPv6 nodes automatically. Since IPv6 Link-Local Address owns different characteristics from accustomed existing Global address, new restrictions that require accompanying Zone-ID information to address information anytime are caused. This is the big problem for ordinal end users, and it makes difficult for them to deal with IPv6 Link-Local addresses. After analyzing the problem for using the IPv6 Link-Local address and Zone-ID, we propose "Zone ID Free" functions that solve above problems. They have been implemented and verified. Design and implementation of the "Zone ID Free" functions are reported in this paper.

    CiNii Article

  • Information-Centric Communication Architecture for Vehicular Networking

    Hiroshi Kitamura, Masayuki Murata

    Proc. ICCVE 2013   2013.12

  • A study on micro level traffic prediction for energy-aware routers

    Sou Koyano, Hisashi Iwamoto, Yuji Yano, Yasuto Kuroda, Kazunari Inoue, Ikuo Oka

    ACM SIGOPS Operating Systems Review   47 ( 3 )   26 - 33   2013.12

     More details

    Publishing type:Research paper (scientific journal)  

  • Archery sight-system by magnetic sensors for visually impaired persons

    Takuya Sasayama, Ikuo Oka, Thi Thi Zin, Hitoshi Watanabe, Hiroshi Sasano

    Proc. of ATC 2013   559 - 562   2013.10

  • Predicting Time Series of Individual Trends with Resolution Adaptive ARIMA

    Hiroki Nakayama, Ikuo Oka

    Proc. IEEE M&N 2013   143 - 148   2013.10

  • On the Use of Encoded Addresses for Content Distribution in CCN Reviewed

    KITADE Yuma, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   113 ( 206 )   97 - 102   2013.09( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    CCN is considered as a future network architecture to exchange contents without specifying addresses of nodes. One of advantages to adopt CCN is to improve the availability of network resource by using in-network caching. However, since nodes having a lot of popular contents may suffer heavy traffic load which leads frequent updates of caches in neighbor nodes, the efficiency of cache usage may be degraded. To solve this problem, we propose a method to widely spread contents by using random encoded addresses. From our simulation results, we show that our method can reduce up to 72% of cache size to achieve the same cache hit ratio when the access frequencies are biased to a specific node.

    CiNii Article

  • Dynamic Configuration Method of SDN Based on Database Definition Reviewed

    KAWAI Yuki, SATO Yasuhiro, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   113 ( 206 )   91 - 96   2013.09( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Software-Defined Network (SDN) is to decouple the control plane and the forwarding plane, and to provide programmable APIs to operate a centralized management of the whole network by describing a software program. In such centralized managements, network administrators can manage their own network flexibly and uniformly according to the knowledge of whole network. As the network size grows, a controller has to process a huge number of control message, and also has to handle the network information certainly, which are requested to update frequently. Thus, scalability of the controller and consistency of information update become important problems in SDN. In this paper, we propose a database-oriented management system for asynchronous configuration in SDN. We use database to ensure consistency of information update and configure network according to network conditions. Moreover, we apply our management system of SDN to Open Flow network and validate that Open Flow Network dynamically are reconfigured according to the database update.

    CiNii Article

  • A Study on Online Application Identification of Encrypted Traffic Reviewed

    KUMANO Yuichi, ATA Shingo, NAKAMURA Nobuyuki, NAKAHIRA Yoshihiro, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   113 ( 206 )   85 - 90   2013.09( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Application identification in the middle is one of important technique for network operators to manage application based traffic and policy controls. However, due to the increase of encrypted traffic, it is becoming harder to read application specific information from packets. We previously proposed a method of application identification of encrypted traffic, and it can achieve high accuracy as same as the case of normal traffic. However, it requires the offline identification which uses statistics of the whole of flows, and it can't identify flows in real-time. In this paper, we propose a method of application identification in high accuracy and real-time. First, we clarify the sufficient number of packets to identify the application of encrypted traffic with high accuracy. Second, we proposed the method of inferring flow statistics in order to achieve high accuracy even when we can use smaller packets than required packets in identification. According to evaluation of using the real traffic trace, proposed method can achieve high accuracy almost as the same as in offline method by observing smaller packets than required packets in identification.

    CiNii Article

  • An Experiment of Bearing Estimation Using Sound Localization Reviewed

    Sasayama Takuya, Minoda Akiko, Oka Ikuo, Tsujioka Tetsuo, Ata Shingo, Watanabe Hitoshi, Thi Thi Zin, Sasano Hiroshi

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2013   2013.09

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • State-of-the-art Research on ICN/CCN towards a Reality Reviewed

    ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Internet Architecture   113 ( 200 )   2013.08

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Single Work  

    CiNii Article

  • Majority Decision Sensor Networks Composed of Binary Tree Fading Links

    Shogo Nakanishi, Yu Morishima, Ikuo Oka

    Proc. of APCC 2013   2013.08

  • Deterministic Packet Buffer System with Multi FIFO Queues for the Advanced QoS

    Hisashi Iwamoto, Yuji Yano, Yasuto Kuroda, Koji Yamamoto, Kazunari Inoue

    IEICE Transactions on Communications   E96-B ( 7 )   1819 - 1825   2013.08

     More details

    Publishing type:Research paper (scientific journal)  

  • Sliding Block Decoding of Spinal Codes Reviewed

    MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information theory   113 ( 153 )   59 - 63   2013.07( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Spinal codes are recently proposed rateless codes that achieve Shannon capacity over binary symmetric channel and additive white Gaussian channel. In the decoding of spinal codes, we compute a minimum cost path on the tree of codes. Tail symbol technique is adopted for improving the convergence of surviving path, however, degradation in the information rate due to the tail symbol cannot be negligible in the case of small information block size. In this paper, we propose the sliding block decoding of spinal codes and we also demonstrate the superiority of the sliding block decoding in terms of the information rate for the small information block size systems.

    CiNii Article

  • Enhancing Traceability Against Variations of Time Series using Automated Parameter Re-estimation Detection Reviewed

    NAKAYAMA Hiroki, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information and communication management   113 ( 124 )   57 - 62   2013.07( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    It is necessary to update the prediction model's parameter with the progress of the time to reduce the deterioration of the accuracy of prediction, since the time series data of traffic changes every moment. However, the frequency of parameter re-estimation differs greatly due to the characteristic of time series data. In this paper, we propose a method to detect the phase for re-estimation automatically by using the residual of prediction as feedback information. Our method reduces the prediction error by handling the phase of re-estimation and also reduces unnecessary re-estimation. We realized a lightweight and general control structure by using moving average and moving standard deviation. We demonstrate that by applying it to the real monitored data in a major P2P file-sharing system the traceability against variations of time series increased about 20%.

    CiNii Article

  • 干渉に対する修正ビタビ復号の誤り率特性解析

    森島 佑, 岡 育生

    映像情報メディア学会誌和文論文誌   67 ( 7 )   2013.07

     More details

    Publishing type:Research paper (scientific journal)  

  • OpenFlow-based Content-Centric Networking Architecture and Router Implementation

    Atsushi Ooka, Toshio Koide, Hideyuki Shimonishi, Masayuki Murata

    Proc. of Future Network and Mobile Summit 2013   1 - 10   2013.07

  • A Deployment of Content-Centric Networking by Using OpenFlow Networks Reviewed

    OOKA Atsushi, ATA Shingo, KOIDE Toshio, SHIMONISHI Hideyuki, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   113 ( 36 )   43 - 48   2013.05( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Content-Centric Networking (CCN) is a novel architecture for dealing with various problems facing the Internet. However, there are deployment issues and the shortage of testbed environments. We focus on OpenFlow, which is a programmable environment without disrupting existing networks. Specific implementations of CCN using OpenFlow have not been examined in sufficient detail, although there have been investigations into the conceptual design. Our approach can solve the issues in existing designs by using a map from content names to hierarchically structured hash values and the longest prefix match.

    CiNii Article

  • A Behavior based Policy Management for Adaptive Trustworthiness Assignment in Future Network

    Akira Wada, Yasuhiro Sato, Xuan Liu, Tianyi Xing, Deep Medhi, Dijiang Huang, Ikuo Oka

    Proc. of IFIP/IEEE IM 2013   784 - 787   2013.05

  • Towards early deployable Content-Centric Networking enhanced by using IPv6

    Hiroshi Kitamura, Masayuki Murata

    Proc. IEEE/IFIP International Workshop on Management of the Future Internet (ManFI 2013)   1191 - 1194   2013.05

     More details

    Publishing type:Research paper (scientific journal)  

  • Design of Flexible Layer-3 Routing Protocol with Variable-Length Address Information and Its Implementation

    Yasuhiro Sato, Shingo Ata, Ikuo Oka

    WSEAS Transactions on Communications   ( 5 )   196 - 207   2013.05

     More details

    Publishing type:Research paper (scientific journal)  

  • Improving Latency in Traffic Prediction Based Energy-aware Routers

    Sou Koyano, Hisashi Iwamoto, Yuji Yano, Yasuto Kuroda, Kazunari Inoue, Ikuo Oka

    Proc. of IEEE GreenTech 2013   190 - 197   2013.04

  • Reliable Micro Advertisement System for IP Nodes Enabled by Using the DNS Reviewed

    KITAMURA Hiroshi, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   112 ( 464 )   161 - 166   2013.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    If there is a system that can show information of each IP communication node and its users will which types of communications are wished or not wished properly to outside, networks are properly managed and secure and stable communication environments are accomplished. In order to enable and realize such a system. the following problems must be solved. 1. There is no proper place where is connected to each node and services that run on the node and show the information of them. 2. Even if there is a proper place for it, it is not easy to guarantee that the shown information is properly reflected wills of the node and the users who run it. In order to solve above problems, we propose a system that can provide information of the IP communication nodes reliably. By using the DNS applicably, above problems are solved and it becomes possible to operate the system easily and surely. We propose such a system and report design and implementation of it.

    CiNii Article

  • Error Probability of Information and Position Estimation of Mobile Optical Transmitters using Path History Reviewed

    HARADA Kohei, MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information theory   112 ( 460 )   293 - 296   2013.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    In free-space optical communications, the transmitter position estimation is required to keep LOS (Line of Sight)link to communicate steadily in case of low-power signals or existence of background noise. The accuracy of tracking is expected to be improved by using path history of transmitter. In this paper a method for tracking and communication is presented. The method is based on the extended trellis diagram. Simulation results show the performance improvement by our method.

    CiNii Article

  • Threshold Algorithms for Decoding Spinal Codes Reviewed

    MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information theory   112 ( 460 )   297 - 302   2013.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Spinal codes are a recently proposed rateless code that achieves Shannon capacity on additive white Gaussian noise channel. Some breadth-first tree search algorithms are introduced for decoding spinal codes, how- ever, sorting operations of conventional decoding algorithms remain as critical throughput bottleneck. To achieve higher throughput of the decoder, non-sorting algorithms and highly parallerism are attractive. In this paper, we investigate a property of threshold algorithms for decoding spinal codes, i.e. , T-algorithm and metric-based thresh- old algorithm. These algorithms are evaluated from the view points of computational complexity and throughput, and we demonstrate the superiority of threshold decoding algorithms.

    CiNii Article

  • A Secure Content Centric Networking by Combination of IPv6 and Changeable Addresses Reviewed

    ATA Shingo, KITAMURA Hiroshi, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   112 ( 464 )   185 - 190   2013.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Content-Centric Networking (CCN) is promising as a future communication paradigm to exchange con- tents without specifying address of nodes. However, deployment of CCN from clean-slate would take a long time since all routing facilities are needed to be replaced. For early deployment of CCN it is feasible to use the current Internet infrastructure as much as possible, and achieve minimum modifications of applications and/or end nodes. Based on such background we propose a novel approach which enables to deploy CCN rapidly with extremely small modifications compared to other approaches. Our solution is based on the use of IPv6 network as a lower layer routing scheme. To realize we design some important components such as Name Mapper and Address Mapper. We also discuss about a deployment scenario for early adaptation of CCN in IPv6 networks.

    CiNii Article

  • Parameters to Minimize an Energy Overhead of Two Dimensional Sliced Packet Buffer Reviewed

    OKUDA Kenzo, ATA Shingo, YANO Yuji, KURODA Yasuto, IWAMOTO Hisashi, INOUE Kazunari, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   112 ( 464 )   7 - 12   2013.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Recently, energy consumption of routers has become a serious problem, hence power reduction is an urgent challenge. In particular, the occupancy of packet buffer is very low in core routers, which leads to unnec- essary consumption of electric power. To solve this problem, we proposed a new buffer architecture called Two Dimensional Sliced Packet Buffer. Dividing a whole buffer into multiple sub buffers at the LSI level enables to control power management independently according to its occupancy and traffic volume. In this paper, we show the optimal parameters to minimize power consumption. Through performance evaluation on power consumption and overhead, we show that optimal parameters are parallels 64 and serials 8, and our proposed packet buffer can reduce an average 50% of power consumption when an average input rate is 30%.

    CiNii Article

  • A-19-5 Development of Archery Support System for the Visual Impediment Person II Reviewed

    Sasayama Takuya, Oka Ikuo, Watanabe Hitoshi, Ata Shingo, Thi Zin Thi, Sasano Hiroshi

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2013   2013.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Introducing delete feature for unnecessary data to content-hash based distributed archive system

    Yutaka Yasuda, Ikuo Oka

    IEICE Communications Express   2 ( 1 )   12 - 17   2013.01

     More details

    Publishing type:Research paper (scientific journal)  

  • 2D Sliced Packet Buffer with Traffic Volume and Buffer Occupancy Adaptation for Power Saving

    Kenzo Okuda, Yasuto Kuroda, Yuji Yano, Hisashi Iwamoto, Kazunari Inoue, Ikuo Oka

    Proc. of IEEE CCNC 2013   97 - 105   2013.01

  • Latency Reduction in Energy-aware Routers Using Grained Traffic Prediction Reviewed

    KOYANO Sou, ATA Shingo, IWAMOTO Hisashi, YANO Yuji, KURODA Yasuto, INOUE Kazunari, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   112 ( 287 )   41 - 46   2012.11( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    We have proposed Sliced Router Architecture, which reduces the power consumption of routers by adjusting routers' performance according to the volume of traffic. In this architecture, it is crucial to consider not only packet loss but traffic latency. In this paper, we extend this architecture to reduce traffic latency under conditions of causing no packet loss. We also discuss the trade off in power-saving and worst traffic latency.

    CiNii Article

  • A High-grained Traffic Prediction for Microseconds Power Control in Energy-aware Routers

    Sou Koyano, Ikuo Oka, Kazunari Inoue

    Proc. of IEEE International Workshop on Green and Cloud Management (GCM)   2012.11

  • A Route Control Method in Software Defined Access Networks Reviewed

    IMANAKA Norihiro, NAKAMURA Nobuyuki, NAKAHIRA Yoshihiro, KASHIMA Masayuki, ATA Shingo, HASEGAWA Go

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   112 ( 230 )   161 - 166   2012.10( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Due to the wide use and spread of network communications, importance of provide appropriate qualities for network service, for incetance, to each user or each service has become greater. We are trying to provide these qualities in access networks because facilities could be introduced easily in access networks compared to core and metro networks. On the contrary, recentry Software Defined Network (SDN) came to be actively conducted research region. Especially OpenFlow has attracted considerable attention as it enables flexible network control through dealing with traffic in each flow. Hence it can be suitable for providing qualities on the goals of us. Therefore in the first pahase we propose a route control method in cases where OpenFlow is utilizable in multihomed access networks. In addition we offer its evaluation results in OpenFlow multihomed networks established across the Internet.

    CiNii Article

  • MobiCloud: a Geo-distributed Mobile Cloud Computing Platform

    Tianyi Xing, Dijiang Huang, Deep Medhi

    Proc. of 8th International Conference on Network and Service Management (CNSM)   2012.10

  • Signal Detection and Modulation Classification Using a Goodness of Fit Test

    Chiaki Honda, Ikuo Oka

    Proc. of 2012 International Symposium on Information Theory and its Applications (ISITA 2012),   2012.10

  • Towards Social Networking: A Proof-of-Concept Model

    Yasuhiro Sato, Hirona Shimokawa, Ikuo Oka

    Proc. of ASE/IEEE International Conference on Social Computing (SocialCom)   2012.09

  • A-6-6 Exact Bit Error Probability Analysis of 2-State Soft Decision Viterbi Decoding with Truncation Errors Reviewed

    MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2012   2012.08

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Error Performance Analysis of Majority Decision in Binary Tree Fading Channels Reviewed

    NAKANISHI Shogo, MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information theory   112 ( 124 )   13 - 18   2012.07( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    In wireless sensor networks, multi-hop communications are often employed for the power limitation of sensor node. A path diversity is an effective technique to get highly reliable communications. In this paper, we analyze the error performance of a majority decision in binary tree networks composed of fading channels. We evaluate the variance of bit error rate and and outage probability by a correlation matrix of decision variable, and show that the majority decision is effective to fading in binary tree fading channels.

    CiNii Article

  • Research Activities on Information and Communication Management in Academia Reviewed

    ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information and communication management   112 ( 120 )   2012.07( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Single Work  

    CiNii Article

  • FPS-RAM:Fast Prefix Search RAM-Based Hardware for Forwarding Engine

    Kazuya Zaitsu, Koji Yamamoto, Yasuto Kuroda, Kazunari Inoue, Ikuo Oka,

    EICE Transactions on Communications   E95-B ( 7 )   2306 - 2314   2012.07

     More details

    Publishing type:Research paper (scientific journal)  

  • Constructing Virtual Networking Environment in a Geo-Distributed Programmable Layer-2 Networking Environment (G-PLaNE)

    Tianyi Xing, Xuan Liu, Chun-Jen Chung, Akira Wada, Dijiang Huang, Deep Medhi,

    Proc. IEEE ICC Workshop on the Network of the Future (FutureNet V)   2012.06

  • Special Section on Towards Management for Future Networks and Services FOREWORD Reviewed

    Ata Shingo

    IEICE TRANSACTIONS ON COMMUNICATIONS   E95B ( 6 )   1901 - 1901   2012.06( ISSN:0916-8516

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Single Work  

  • A Slice Structure Using the Management of Network Traffic Prediction for Green IT

    Yuji Yano, Hisashi Iwamoto, Yasuto Kuroda, Shiro Ohtani, Kazunari Inoue

    Proc. EEE International Conference on High Performance Switching and Routing (HPSR),   2012.06

  • Basis Vector Estimation Analysis for Identification of Block Orthogonal Modulations Reviewed

    KINUGASA Takafumi, OKA Ikuo, ATA Shingo

    IEICE transactions on communications   95 ( 5 )   1882 - 1885   2012.05( ISSN:09168516

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Basis Vector Estimation Analysis for Identification of Block Orthogonal Modulations Volume and Number

    Takafumi Kinugasa, Ikuo Oka

    IEICE Transactions on Communications   E95-B ( 5 )   1882 - 1885   2012.05

     More details

    Publishing type:Research paper (scientific journal)  

  • Cross-Community Approach for Efficient Information Retrieval in Social Network

    Yasuhiro Sato, Hirona Shimokawa, Ikuo Oka

    Proc. of IEEE/IFIP Network Operations and Management Symposium (NOMS),   687 - 690   2012.04

  • 余弦モーメントと振幅モーメントを用いたQAMの変調識別

    大原 慎司, 岡 育生, 森島 佑

    電子情報通信学会論文誌 (B)   J95-B ( 4 )   598 - 601   2012.04

     More details

    Publishing type:Research paper (scientific journal)  

  • SeRViTR: A Framework for Trust and Policy Management for a Secure Internet and Its Proof-of-Concept Implementation

    Xuan Liu, Akira Wada, Tianyu Xing, Parikshit Juluri, Yasuhiro Sato, Dijiang Huang Deep Medhi,

    Proc. of 4th IEEE/IFIP International Workshop on Management of the Future Internet (ManFI)   1159 - 1166   2012.04

  • A-19-15 Development of Archery Support System for the Visual Impediment Person Reviewed

    Sasayama Takuya, Oka Ikuo, Watanabe Hitoshi, Ata Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2012   2012.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-8-1 Channel Models for Optical Communications via Biomedical Tissues Reviewed

    Sasaki Yusuke, Oka Ikuo, Tsujioka Tetsuo, Ata Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2012 ( 2 )   2012.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Corresponding Auto Names for IPv6 Addresses Reviewed

    KITAMURA Hiroshi, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   111 ( 469 )   187 - 192   2012.03( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    This document discusses notion and actual mechanisms of Corresponding Auto Names for IPv6 Addresses. With this mechanism, all IPv6 addresses (even if they are link-local scoped addresses) can obtain their own Names, and it will be able to use Names anywhere instead of IPv6 Addresses. IPv6 address is too long and complicated to remember, and it is very nuisance thing to type a literal IPv6 address manually as an argument of applications. Also, it is very difficult for human beings to tell which IPv6 address is set to which actual IPv6 node. In this sense, literal IPv6 address information can be called meaningless information for human beings. In order to solve above problems and to make the information meaningful, mechanisms called Corresponding Auto Names for IPv6 addresses have designed and implemented. They become human friendly information. By applying a simple naming rule to the Auto Names (e.g., use the same Auto Name Prefix for IPv6 addresses that are set to the same interface (node)), this will contribute to help people to understand which IPv6 address / Name indicates which actual IPv6 node.

    CiNii Article

  • FOREWORD Reviewed

    ATA Shingo

    The Institute of Electronics, Information and Communication Engineers IEICE Transactions on Communications   95 ( 6 )   1901 - 1901   2012( ISSN:0916-8516

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Single Work  

    DOI: 10.1587/transcom.E95.B.1901

    CiNii Article

  • フィードバックを用いた元のフロー分布推定法の精度向上手法

    磯崎裕臣, 岡育生

    電子情報通信学会論文誌 (B)   J95-B ( 4 )   568 - 575   2012

     More details

    Publishing type:Research paper (scientific journal)  

  • Implementation of Traffic Control Scheme Based on Trustworthy Routing Reviewed

    WADA Akira, SATO Yasuhiro, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   111 ( 232 )   51 - 56   2011.10( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    Our research group proposes Secure and Resilient Virtual Trust Routing (SeRViTR) to be able to provide trustworthy routing framework for both user-centric and network-centric routings. We currently develop a conceptual design and verify technical problems to realize SeRViTR. In this paper, we describe an implementation model of functional components in SeRViTR, and verify the trustworthy routing function and the trust management mechanism in inter-domain environment.

    CiNii Article

  • A Secure Communication Style to Use Changable IPv6 Address for Every Session and its Update Method Reviewed

    NISHIDA Kazuyuki, ATA Shingo, KITAMURA Hiroshi, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   111 ( 146 )   11 - 16   2011.07( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In this paper, we propose a new communication scheme, which utilizes IP address as a key of session, to realize a secure remote communication from outside network. In this scheme, IP address is an access key for a session by itself, and it varies for every session to reduce a security risk to be reused by anonymous parties. To realize this access scheme, we discuss on the listen model at the server, key updating, and key synchronizing issues. We also describe an implementation model of proposed scheme to show the feasibility.

    CiNii Article

  • Signal Detection and Modulation Classification Based on Distribution Tests Reviewed

    HONDA Chiaki, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   111 ( 142 )   31 - 34   2011.07( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Cognitive radio attracts much attention as a system to realize an efficient use of radio spectrum. In the cognitive radio, signal detection and modulation classification are key issues to recognize the radio channel condition. In this paper, new signal detection and modulation classification methods based on distribution tests are proposed. Both Anderson-Darling test and Cramer-Von-Mises test are examined for signal detection error probability and modulation classification error probability. Numerical results of error probability show that the proposed methods are effective to identify signals in the radio channel.

    CiNii Article

  • B-20-16 RELIABILITY ANALYSIS OF GRID SENSOR NETWORK Reviewed

    Nishino Kazutaka, Oka Ikuo, Ata Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2011 ( 2 )   2011.02

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Simplified DNS Query Methods under IPv4/IPv6 Mixed Environment Reviewed

    KITAMURA Hiroshi, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 449 )   55 - 60   2011.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    With a trigger of the IPv4 address exhaustion, it is naturally supposed that the IPv6 introductions will be accelerate to various network environments. Also, it will become general that both IPv4 and IPv6 addresses are set to one communication node and IPv4 and IPv6 mixed communications become popular. From a viewpoint of the DNS, it becomes general that both A record (for IPv4) and AAAA record (for IPv6) are associated with one domain name. In regular DNS resolving that obtain IP address(es) with a domain name argument, it is needed to achieve to obtain heterogeneous IP addresses (IPv4 and IPv6) (heterogeneous records (A and AAAA)) with a domain name argument. With the current DNS resolving mechanism, it is possible to achieve above features. However, it is inefficient and problematic. Also, for general end users, it is not necessary to be strongly conscious of the difference of IPv4 and IPv6 addresses. Therefore, this DNS resolving becomes a significant operation that judges the IPv6 introduction to the network is done smoothly or not. This paper clarifies problems of the current DNS resolving mechanism under IPv4/IPv6 mixed environment that is significant operation for the IPv6 introduction and discusses efficient and improved DNS resolving mechanisms.

    CiNii Article

  • A Router Architecture comprises plural components of Slice enabling Energy Consumption Reduction Reviewed

    IWAMOTO Hisashi, INOUE Kazunari, ATA Shingo, OTANI Shiro, HASEGAWA Go, YANO Yuji, KURODA Yasuto, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 448 )   129 - 134   2011.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    The complete network service of infrastructure is an urgent issue by means of continuous growth in network traffic. Apparently, the energy consumption of network routers may arise one of global environmental affairs, and therefore Research and Development works regarding power reduction is well desired. Our group proposes a unique feature embedded onto routers, which consists of plurality of slice, and is dynamically controlled by the prediction of network traffic flow. In this paper, we've examined slice control and LSI architecture, and have shown the validity of slice-architectural router.

    CiNii Article

  • Feasibility of Name Lookup Table in Routers for Realizing Content-centric Networks Reviewed

    HWANG Haesung, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 449 )   31 - 36   2011.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    The current Internet is designed to optimize the communications among the known hosts; the Internet protocol (IP) address of the destination node is known or otherwise resolved by inquiring the domain name system (DNS) server. However, highly intelligent network is expected in the future Internet that can route packets to the appropriate destination not only with an numerical identifier but also with information which is often referred as content-centric network. In this paper, we discuss that routing by topic names is feasible in network layer rather than in conventional application layer. In addition, we show that looking up topic names is feasible by evaluating the proposed router architecture.

    CiNii Article

  • 格子状ネットワークにおける多数決判定中継の誤り率特性

    西野 和貴, 岡 育生

    電子情報通信学会論文誌 (B)   J94-B ( 8 )   1002 - 1004   2011

     More details

    Publishing type:Research paper (scientific journal)  

  • Estimating Environment-Independent Parameters on Basis of Comparative Assessment of User's Subjectivity

    Yasuhiro Sato, Shin'ichiro Kitano, Ikuo Oka

    IEICE Transactions on Communications   E94-B ( 8 )   2265 - 2273   2011

     More details

    Publishing type:Research paper (scientific journal)  

  • Error Probability Analysis of Majority Decision in Tree Network Composed of BSC

    Kazutaka Nishino, Shinji Tani, Ikuo Oka

    IEICE Transactions on Communications   E94-B ( 2 )   562 - 564   2011

     More details

    Publishing type:Research paper (scientific journal)  

  • Cost Evaluation and Parameter Optimization of the Fast Forwarding Engine using Standard Memory Reviewed

    ZAITSU Kazuya, YAMAMOTO Koji, KURODA Yasuto, INOUE Kazunari, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 286 )   75 - 80   2010.11( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Ternary content addressable memory (TCAM) is becoming very popular for designing high-throughput forwarding engines on routers. However, TCAM has potential problems in terms of cost of hardware and power. We have proposed the RAM-based new hardware architecture for a fast forwarding engine that looks up a route by a single access. In this report, we evaluate the hardware cost of our forwarding engine by chip area. From the evaluation results, we confirm the optimal parameter which minimizes the hardware cost.

    CiNii Article

  • Improvement of Information Retrieval Efficiency by Crossing Multiple Community Networks Reviewed

    SHIMOKAWA Hirona, SATO Yasuhiro, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 224 )   33 - 38   2010.10( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Some studies have shown that using by a single scale-free network is not appropriate for modeling social networks that represent human relationships in real world. In the social networks, multiple community networks based on common interests or values exist together. However, there is no study on communication model where multiple community networks are taken into consideration. Moreover, the evaluation that considers the load-balancing of the hub node in the scale-free network is done as an application of the information search by crossing of multiple networks. In this paper, we investigate how the performance of information retrieval is affected by using multiple community networks. To evaluate the performance, we use a degree of density which denotes the processing cost of hub nodes as well as the distance.We show that the performance of information retrieval by crossing different community networks improves in terms of the number of hops and degree of density on any path between two nodes.

    CiNii Article

  • "I" Report : IEEE/IFIP NOMS 2010 - Towards Management of Future Network and Services Reviewed

    ATA Shingo

    Information Processing Society of Japan (IPSJ), IPSJ Magazine   51 ( 9 )   1215 - 1222   2010.09( ISSN:04478053

     More details

    Publishing type:Research paper (scientific journal)   Kind of work:Single Work  

    CiNii Article

  • A Method of Application Identification from Encrypted Traffic based on Characteristic Changes by Encryption Reviewed

    OKADA Yohei, ATA Shingo, NAKAMURA Nobuyuki, NAKAHIRA Yoshihiro, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 191 )   121 - 126   2010.08( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Recent years, there are many studies on identification of application from the monitored traffic in the Internet where various types of application traffic coexist. Application Identification is one of effective technologies for network management because application-based traffic control would be realizable based on results of identification. However, accurate identification is becoming difficult by using methods proposed so far due to the increase of encrypted traffic. In application identification, encryption is one of serious factors to degrade the accuracy of identification because it is so hard to infer the original (unencrypted) traffic from the encrypted one. Our research goal is to improve the accuracy of application identification whatever the target traffic is encrypted. In this paper, we propose a method of application identification from encrypted traffic based on characteristic changes by encryption. By applying this method, we show that the identification accuracy of application for the encrypted traffic can be improved.

    CiNii Article

  • Identification Error Analysis of Block Orthogonal Modulations Reviewed

    KINUGASA Takafumi, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 153 )   63 - 67   2010.07( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Cognitive radios are intelligent communications, and are expected to realize an efficient use of the radio channel. The modulation identifications is one of the problem in the cognitive radio. As for the modulation identifications for block orthogonal modulation, the method of clustering and labeling was proposed. However, the identification performance has been evaluated only by the computer simulation. In this paper, error probability analysis is presented for a block orthogonal modulation identification using General Orthogonal Modulation(GOM). The analysis includes an inner product of two signals and noise. This causes difficulties in the analysis. The multidimensional rotation is employed for the difficulties in order to derive error probability. Numerical results confirm the validity of analysis.

    CiNii Article

  • Analysis of characteristic changes by encryption for application identification of encrypted traffic Reviewed

    OKADA Yohei, ATA Shingo, NAKAMURA Nobuyuki, NAKAHIRA Yoshihiro, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 116 )   43 - 48   2010.07( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In network management, application identification of traffic is important. However, since encrypted traffic has been increasing in recent years, it is becoming difficult to identify the kind of application by methods proposed so far. In application identification, encryption is one of serious factors to degrade the accuracy of identification because it is so hard to infer the original (unencrypted) traffic from the encrypted one. Our research goal is to increase the accuracy of application identification even if there is encrypted traffic. In this paper, we numerically analyze how the characteristics of original traffic are changed by encryption. Specifically, we monitor packets of the same flow, at the points of before/after encryption. We then collect statistical information on monitored flows, and numerically analyze how this information has been changed by encryption. By applying regression analysis, we show that we can estimate the statistical characteristics of original traffic from measured encrypted traffic.

    CiNii Article

  • Statistical Characteristics of Decision Variable for MAP Decoding Reviewed

    KAIZU Aki, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 43 )   35 - 38   2010.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Computer simulations are widely used for an error probability estimation of convolutional codes. Few studies have been made for exact bit error probability of convolutional codes of more than 4-state. In this paper, an analytical approach presented for convolutional code with MAP decoding. Moments of decision variable are desired by the recurrence relations, and discussed with its probability density function, which leads to the exact error probability.

    CiNii Article

  • Hardware Implementation of Fast Forwarding Engine using Standard Memory and Dedicated Circuit Reviewed

    ZAITSU Kazuya, YAMAMOTO Koji, KURODA Yasuto, INOUE Kazunari, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 39 )   59 - 64   2010.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Ternary content addressable memory (TCAM) is becoming very popular for designing high-throughput forwarding engines on routers. However, TCAM has potential problems in terms of hardware cost and energy consumption, which limits it deploying large amounts of capacity. In this paper, we propose a new hardware architecture for a fast forwarding engine that fundamentally solves the potential problems of TCAM. We also develop a hardware design for our architecture. Our results show that the proposed hardware significantly reduces hardware cost and power consumption.

    CiNii Article

  • Improvement of Equalizing of Performance in Distributed Cooperative System Reviewed

    HIGASHI Shin'ichiro, ATA Shingo, NAKAO Akihiro, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   110 ( 4 )   21 - 26   2010.04( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In recent years, in distributed cooperative systems such as distributed file systems and online games, equalization of performance between collaborative nodes is one of impotant issues as well as explicit performance such as bandwidth, delay and packet loss rate. Selection of the server which can offer equal performance to collaborative nodes is necessary to offer equalized performance. To achieve this problem, we have proposed so far a server selection method that select the server by calculating the circumcenter of collaborative nodes according to the distance between nodes obtained by performance measures. However, depending on the location of nodes, there is a problem that using circumcenter is not always sufficient to find the most appropriate server. In this paper, we propose a method to improve the accuracy of server selection by solving the problem of using circumcenter by downhill simplex method. We also show probability of selection of the most suitable server can be improved around 55% compared to the previous proposal.

    CiNii Article

  • Automatic Classification Method of Query Trend Patterns Based on Statistical Characteristics Reviewed

    DOI Masato, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 463 )   139 - 144   2010.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In P2P file sharing systems, time dependent characteristics of queries (query trends) become much important to forecast the demand of file in future. Prediction of future demand would be effective for the efficient use of e.g., caching mechanism, however, accurate prediction of query trend is difficult because patterns of query trends may differ significantly according to a nature of keyword. Classification of query trend patterns is on of effective ways to forecast method for future demand. We previously proposed the method to classify trend patterns based on DFT and Ward clustering method. In this paper, we propose a method for automatic classification of query trend patterns accurately. According to the results, we show our proposed method can classify trend patterns by the high probability of 88.3%.

    CiNii Article

  • Delete and Update Methods for Neighbor Cache in IPv6 Reviewed

    ATA Shingo, KITAMURA Hiroshi, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 449 )   423 - 428   2010.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    This paper describes IPv6 neighbor cache update/delete methods from external nodes. In IPv6, mapping between datalink layer (MAC address) and network layer (IPv6) addresses are maintained by a neighbor cache in each node. After the neighbor discovery protocol, an entry of neighbor cache is created, and used the cached information during the communication. RFC4861 defines neighbor discovery methods and describes how to manage neighbor cache entries by neighbor discovery messages. However, RFC4861 does not define quick and clear neighbor cache update (delete) functions. This document proposes two types of IPv6 neighbor cache update (delete) methods from external nodes. One is a heuristic type method that does NOT require neighbor discovery message extensions. The other is an explicit type method that requires small neighbor discovery message extensions. We also provide a combined method to enable fast and sure deletion of the entry.

    CiNii Article

  • Communication Architecture Evolution that is enabled by Introducing Specific IP address for Each Session : Unified Multiplex Reviewed

    KITAMURA Hiroshi, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 449 )   404 - 410   2010.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We have proposed a new communication architecture called "Unified Multiplex Communication Architecture." Two new types of addresses are introduced. One is EA (Ephemeral Address) used at client nodes, the other is SSA (Specific Service Address) used at server nodes. They are exclusively used only for each communication session. Since they are introduced only by modifying the kernel, it is not necessary to modify the existing applications to use these addresses. End users can easily acquire the advantages of new types of communications. These addresses are enabled only when their sessions are valid. Therefore, it is easy to provide security enhancement and privacy protection functions. The new communication architecture can evolve the communication style from one-fixed to multiple-floated and from share to dedicate. The paper discusses the detailed functions that enable these features from the viewpoints of relationship between IP addresses and communication processes / sessions. The described functions have been implemented and verified.

    CiNii Article

  • Analysis of ICMP's Role on Specific Service Address and its Implementation Reviewed

    NISHIDA Kazuyuki, ATA Shingo, KITAMURA Hiroshi, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 449 )   417 - 422   2010.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We have proposed a new communication architecture that is called "Unified Multiplex Communication Architecture." By introducing new types of addresses that are assigned to and consumed at each communication session, the architecture can provide secure communication services without requiring special operations to end-users. We should reconsider the role of ICMP, since an address changes a concept from the identifier of a node to the identifier of service. In our architecture the target of ICMP, which is used to advertise control message for the node, change to the service. Therefore ICMP advertises control message in cooperation with a service by limiting response term or target node. In this paper, we clarify the function of ICMP suitable for Specific Service Address. First we show that the new role of ICMP for Unified Multiplex Communication Architecture. Furthermore, we propose a new technique to realize the flexible information mechanism of ICMP.

    CiNii Article

  • Mapping between Logical and Physical Topologies in Name-based Routing Reviewed

    HWANG Haesung, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 449 )   139 - 144   2010.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In future generation network, routing on contents or resource is anticipated as the post-Internet Protocol (IP) routing method. The final goal of our research is to show the feasibility of routing based on resource in Network Layer. As an initial step, we use 'name' for routing, particularly 'Fully Qualified Domain Name (FQDN)' to show the feasibility and to generalize it into resource-based routing. When writing the routing information of FQDN which has a hierarchical structured name into hierarchical logical topology, mismatch can occur if the physical topology's information is missing. In addition, routing tables should be reorganized to reflect the different access frequency among the FQDNs. In this paper, we propose a mapping algorithm of logical to physical topology and the reconstruction of routing tables. As a result, we show that using access frequency and physical topology's information increases the efficiency for searching FQDN.

    CiNii Article

  • Design and Implementation of Address Management Mechanism for Providing Specific Service Addresses Reviewed

    SAKAKIMA Keiichi, ATA Shingo, KITAMURA Hiroshi

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 449 )   411 - 416   2010.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We have proposed Unified Multiplex Communication Architecture that providing specific service addresses. The architecture can provide secure communication service by utilizing huge addressing space of IPv6. In this paper, we realize more flexible access control mechanism by embedding attribute information to IP addresses. For realizing this mechanism, all nodes on the network operate based on the rule that is made by network administrator. Finally, we design and implement address management mechanism that enables to provide diversity of specific service addresses.

    CiNii Article

  • Modulation classification in the presence of multiple signals Reviewed

    WANG Xiaomin, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 383 )   15 - 20   2010.01( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In this paper, a new modulation classification method is presented for multiple signals composed of large desired signal and small interference. Using higher-order moments of the received signal, the transmitted signal modulation and power are estimated by the method. Interference is classified by the estimated signal modulation with the higher-order moments. Numerical results of the classification error probability show that this method is effective for the classification of multiple signals.

    CiNii Article

  • B-8-30 A Measurement of Channel Characteristics inside Biomedical Tissues Using an Infrared Camera Reviewed

    Sasaki Yusuke, Oka Ikuo, Tsujioka Tetsuo, Ata Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   178   2010

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • A-6-2 A Maximum Likelihood Detection Method of Information and Position Reviewed

    MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2010   2010

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • 9-6 Pulse Interference Suppression Effects by Modified Viterbi Decoding Reviewed

    MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Image Information and Television Engineers, PROCEEDINGS OF THE ITE ANNUAL CONVENTION   2010 ( 0 )   9 - 6-1-_9-6-2_   2010( ISSN:13431846

     More details

    Publishing type:Research paper (scientific journal)  

    When some wireless communication systems operate in the same frequency band, it is essential to employ the techniques for interference mitigation. The goal of this paper is to investigate the performance of some mitigation techniques and to show the superiority of metric based limiting, which yields the better bit error rate performance.

    DOI: 10.11485/iteac.2010.0_9-6-1

    CiNii Article

  • A new TCAM architecture for managing ACL in routers

    Haesung Hwang, Koji Yamamoto, Kazunari Inoue, Masayuki Murata

    IEICE Transactions on Communications   E93-B ( 11 )   3004 - 3012   2010

     More details

    Publishing type:Research paper (scientific journal)  

  • Gradually Reconfiguring Virtual Network Topologies based on Estimated Traffic Matrices

    Yuichi Ohshita, Takashi Miyamura, Shin'ichi Arakawa, Eiji Oki, Kohei Shiomoto, Masayuki Murata

    IEEE/ACM Transactions on Networking   18 ( 1 )   177 - 189   2010

     More details

    Publishing type:Research paper (scientific journal)  

  • アドレス空間特性を適用した匿名化トレースデータによるネットワーク性能評価法

    田路祐介, 岡育生

    電子情報通信学会論文誌 (B)   J93-B ( 1 )   32 - 42   2010

     More details

    Publishing type:Research paper (scientific journal)  

  • 暗号化トラヒックのアプリケーション識別のための暗号化・平文トラヒックの特徴分析

    阿多 信吾

    電子情報通信学会技術研究報告   110,116   43 - 48   2010

  • 2次元配置センサネットワークの誤り率解析 Reviewed

    西野 和貴, 谷 真治, 岡 育生, 阿多 信吾

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. IT, 情報理論   109 ( 357 )   59 - 63   2009.12( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    無線センサネットワークでは,センサノードで取得した情報をネットワークを用いて収集する.個々のノードは容量や消費電力に制限があるため,大電力による通信は不向きである.このような無線センサネットワークにおいて,小電力を維持したまま信頼度の改善を行うためにはマルチホップ通信が有効である.本稿では,センサノードの情報を2次元平面にランダムに配置した中継ノードを介してフュージョンセンターに伝送する無線センサネットワークについて考える.多数のマルチホップ経路を2分木でモデル化し,フュージョンセンターで多数決判定する場合の誤り率を導出し,誤り率と中継段数の関係を明らかにする.

    CiNii Article

  • パルス状干渉を考慮したビタビ復号の効果 Reviewed

    森島 佑, 岡 育生, 阿多 信吾

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. IT, 情報理論   109 ( 357 )   65 - 70   2009.12( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    近年の電波需要の増加に対し利用可能な周波数帯は限られたものであり,802.11無線LANやBluetoothなどの複数の無線規格が同一の周波数帯に混在するような状況が生じている.このような状況下では機器間での干渉により深刻な性能劣化が引き起こされ,干渉の影響を軽減する方式が重要となる.本稿では,ビタビ復号を用いたシステムにおいて,干渉の影響を考慮した複数の方式について比較を行い,メトリックに対するリミッティングが干渉波の影響を軽減する方式として有効であることを明らかにする.

    CiNii Article

  • Implementation of Routing Mechanism for Variable-Length Address of Generalized Routing Protocol Reviewed

    SATO Yasuhiro, TOJI Yusuke, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   109 ( 276 )   77 - 82   2009.11( ISSN:0913-5685

     More details

    Publishing type:Research paper (scientific journal)  

    In next-generation network architectures, the number of nodes and equipment connected to networks increase more than ever. Due to the explosive increase of network equipment, an information retrieval technique to access surely and flexibility will be required. For this, we have proposed Generalized Routing Protocol with variable-length address information. Generalized Routing Protocol can achieve flexible information retrieval that has been implemented on overlay networks, such as DHT and DNS etc.. In this paper, we implement routing mechanism for variable-length address of Generalized Routing Protocol. Moreover, we verify whether routing information including variable-length address can be stored in routing table of GRP routers and exchanged between GRP routers.

    CiNii Article

  • Server Selection for Performance Equalization in Distributed Systems Reviewed

    HIGASHI Shin'ichiro, ATA Shingo, NAKAO Akihiro, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 273 )   65 - 70   2009.11( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In recent years, various distributed applications such as file sharing systems, online games, and multicast streamings are widely used. Some of distributed applications need to equalize their performance to every participant. For example, from the viewpoint of user experience, it is preferable for distributed file system to provide a steady throughput wherever the client are connecting to the server. Also, in online games, synchronization between players is one of important factors for smooth progress of the game, therefore equalization of delays among joining players is important. However, there is no generalized method to selecting the best node for equalization of network metrics whose importance are different according to applications. In this paper, we propose a server selection method for equalizing various performances in distributed systems. Our approach is based on surveying techniques especially trilateration. As an example of equalization, we evaluate the proposed method in the case of equalization of RTTs, and show our method can reduce around 50% of performance difference compared to random server selection cases.

    CiNii Article

  • A-6-2 Cutoff Rate of Binary Tree Network Composed of Binary Symmetric Channels Reviewed

    Tani Shinji, Oka Ikuo, Ata Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2009   2009.09

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-7-73 Implemention of Generalized Routing Protocol for Flexible Information Retrieval Reviewed

    Sato Yasuhiro, Taji Yusuke, Ata Shingo, Oka Ikuo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2009 ( 2 )   2009.09

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-6-17 Server Selection in Consideration of Synchronous Time in Distributed File Systems Reviewed

    Higashi Shinichiro, Ata Shingo, Nakao Akihiro, Oka Ikuo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2009 ( 2 )   2009.09

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • A Study on the Majority Decision of 2-dimensional Random Sensor Networks Reviewed

    NISHINO Kazutaka, TANI Shinji, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 143 )   91 - 95   2009.07( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In wireless sensor networks, many sensor nodes with relay transmission aggregate information. In this paper, we demonstrate error rate performance improvements due to majority decision which produce path diversity effects by a lot of routes in wireless sensor networks. We generate a topology from 2-dimensional randomly deployed nodes, and evaluate the performance by computer simulations and clarify that the path diversity by majority decision is effective for a reliable sensor network.

    CiNii Article

  • Low Energy Building Design in Packet Buffer Architecture with Deterministic Performance Guarantee Reviewed

    ZAITSU Kazuya, IWAMOTO Hisashi, KURODA Yasuto, YANO Yuji, YAMAMOTO Koji, INOUE Kazunari, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 134 )   17 - 22   2009.07( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    To design guaranteed high-performance router, it is problem that packet buffer is non-deterministic. We propose Head Buffer MMU which can realize high-speed data transfer guaranteed packet buffer. Moreover, the MMU can provide large buffers with cost-effective and low power consumption. In this paper, we design the bank selection circuit which can guarantee DRAM high-speed data transfer in Head Buffer MMU. We then show power saving of DRAM by using the bank selection circuit.

    CiNii Article

  • Challenges for Next Generation Network Operations and Service Management: a Report on APNOMS 2008 Reviewed

    Hong James Won-Ki, Meng Luoming, Kim Young-Tak, Uno Hiroshi, Ata Shingo, Ma Yan, Choi Deokjai

    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT   17 ( 1-2 )   91 - 98   2009.06( ISSN:1064-7570

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10922-009-9121-9

  • Error Performance of Viterbi Decoding Matched to Pulse Interferences Reviewed

    MORISHIMA Yu, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   109 ( 66 )   19 - 23   2009.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In recent years, the growth of wireless services has fostered many communication protocols in 2.4GHz band, including 802.11 Wireless LAN, Bluetooth, and so on. When some wireless communication systems work in the same frequency band, it is essential to employ the techniques for interference cancellation. In this paper, we present an interference cancellation method which employs the erasure bit decoding and ring trellis. The method is applicable to multiple pulse interferences, although the conventional erasure bit decoding method involves the number of erasure bits limitations. In addition, the method is evaluated in an interference channel from the view points of decoding bit error rate by computer simulations.

    CiNii Article

  • Analysis of Pattern of Query Trends in P2P File-Sharing System Reviewed

    DOI Masato, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 481 )   59 - 64   2009.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In P2P file sharing systems, caching of contents is one of practical methods to improve the search efficiency and the load balancing. Since the resources (e.g., disk spaces) for caching are limited, the contents to be cached may vary according to the cache replacement algorithm. However, typical cache replacement algorithms do not consider the time-dependent trends of query keywords. Therefore, the problem that many of caches that might not be effectively used remains comes to happen. Therefore, the cache replacement algorithms is necessary. In this paper, we analyze the time-dependent trends of query keywords in P2P file sharing system towards a new cache replacement method which takes query trends into consideration. First, we collect keyword (filename) queries by crawling the P2P file sharing system. We then analyze similarities of time-dependent trends of queries by using Discrete Fourier Transform. We then categorize trend pattern by applying the hierarchical clustering. As a result, we show that time-dependent trend patterns of query can be categorized into four types.

    CiNii Article

  • Estimation of Environment-Independent Parameter in Subjective Assessment by using Comparative Evaluation Reviewed

    SATO Yasuhiro, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 481 )   75 - 80   2009.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In recent years, due to the increase of the number of users connecting to the Internet, degradation of communication quality becomes one of the important problems. Such quality degradation is caused by competition of network resources between users/services, or interference between traffic with different properties. To overcome this problem, DiffServ and IntServ have been proposed as fundamental techniques. Although these approaches guarantee metrics such as end-to-end delay, packet loss rate, and transfer bit rate etc., feedbacks from the users are not considered. Moreover, recent studies have considered the feedbacks from users in controlling the QoS in real-time applications. However, evaluation of the quality is performed by an absolute assessment Therefore, we investigated a threshold which most of users do not feel dissatisfaction with the QoS, by performing experiment of user's subjective assessment using a comparative evaluation. However, we did not consider diversity of user's network environment. In this paper, we investigate environment-independent parameter in bulk data transmission by performing experiment regarding diversity of user's network environment.

    CiNii Article

  • Analysis of Difference between Encrypted and Normal Traffic and its Application to Detect Encrypted Traffic Reviewed

    MINAMIURA Yuki, ATA Shingo, NAKAMURA Nobuyuki, NAKAHIRA Yoshihiro, MURATA Masayuki, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 481 )   179 - 184   2009.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In network management, identification of traffic type is important. However encrypted traffic has been increasing (in recent year), and so it is becoming difficult to identify the traffic type. The identification of application from the encrypted traffic is generally difficult, and so it is expected that existing method to identify the application can't operate accurately. One of method to overcome this problem is to detect whether traffic is encrypted or not, and identification is operated for traffic remove encryption overhead from encrypted traffic. In this paper, we study the method to detect encrypted traffic early. We analyze statistical information of encrypted traffic and plaintext traffic. We show statistical information which has remarkable characteristics in each traffic. We then propose the method to detect encrypted traffic by using the information.

    CiNii Article

  • Modulation Classification Based on Amplitude and Cosine moments Reviewed

    OHARA Shinji, KITA Masato, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 472 )   105 - 108   2009.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Recently cognitive radios attract much attention, because it leads to flexible and high capacity wireless systems. Modulation identification is the first step and a key issue for cognitive radios. In this paper, a new modulation classification method based on amplitude and cosine moments is proposed. Our proposed method employs two dimensional decision variable composed of amplitude and cosine moments. Numerical results of the classification error probability show that the method presents superior identification performance for QAM compared with amplitude moments or cosine moments approach.

    CiNii Article

  • Analysis, Management, and its Implemantation of New Address Types in Unified Multiplex Communication Architecture Reviewed

    NISHIDA Kazuyuki, ATA Shingo, KITAMURA Hiroshi, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 458 )   321 - 326   2009.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We propose Unified Multiplex Communication Architecture that can provide secure communication by utilizing huge addressing space of IPv6. The advantage of Unified Multiplex is that it does not require any modifications of existing application to support exclusive use of IP address to each service. This system has a big feature regarding the use of IP addresses, i.e., a client assigns an Ephemeral Address (EA) for every session as an identifier of the session. Also, a server assigns Specific Service Address (SSA) for exclusive use for the connection from client. These types of addresses are completely new compared to legacy type of IP addresses that only identify the communication node. Therefore the characteristics of these types of addresses are still unclear to secure the correct use of them. In this paper, we analyze the fundamental characteristics of such service-oriented addresses (EA and SSA), especially in terms of usage, lifetime, and management. We then clarify what kinds of functionalities are required to realize these characteristics, and describe its implementation method.

    CiNii Article

  • Design of Generalized Routing Protocol to Support Various Layer3 Addresses Reviewed

    TOJI Yusuke, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 457 )   263 - 268   2009.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Next-generation network architectures will be governed by the need for flexibility. Therefore, Information access by not only IP addresses but also variable-length address information such as text or device-name will be required. In addition, the current Internet provides a number of the routing functions. For Instance, various service utilizes intelligent routing in overlay network. This reason is because the current routers is specialized in IP, and the routers can process only IP addresses. However, the routing process in these routing functions differ only slightly. The similar functions are realized with different layers. The decentralization of such an equivalent function causes a lot of problems like the inefficiency of processing and the mutual interference between layers, etc. in the network architecture. In this paper, we design and implement a new routing protocol, which can process the generalized addresses and support various protocol as advanced functions.

    CiNii Article

  • Support of Multi Attributes in Overlay Networks to Enhance Search Efficiency Reviewed

    MIZO Hiromi, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 458 )   393 - 398   2009.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Recently, in P2P systems such as the file-sharing system, traffic in the network is increasing enormously, so that the necessity for an improvement have been widely recognized. For the improvement of the P2P systems, constructing an overlay network based on a single attribute of the node, e.g., similarity of contents and geometric location of nodes, has previously been studied. When an overlay network is constructed in consideration of only a single attribute, however, there exists a mismatch between overlay topologies that are constructed based on different attributes, search efficiency falls as a result. Therefore, we have proposed the technique to optimize the overlay network with the support of multiple attributes. But in our previous technique, the overhead to support multiple attributes in overlay networks is large, and the search hit ratio may slightly fall. In this paper, we propose the new technique to realize the overlay network, namely SMART, that can support multiple attributes with lower overhead. SMART is based on two key ideas: 1) similarity of overlay topologies that are constructed based on different attributes, and 2) exchange of indices to merge multiple overlay networks. Through the performance evaluation using a simulation, we show that SMART supports multiple attributes with lower overhead and increases search efficiency.

    CiNii Article

  • Identification of Different TCP Versions Based on Cluster Analysis Reviewed

    OSHIO Junpei, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 457 )   205 - 210   2009.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    When multiple flows using different versions of TCP exist together on the network, they are influenced seriously between each other. One of methods to overcome this problem is to control such flows individually by identifying the TCP versions of each flow. Thus, this process needs to identify online which TCP version is used in each flow. In this paper, we first focus on the method for controlling the congestion window in different versions of TCP. We find out the characteristics value from the method, and then propose a method to identify flow by using the characteristics. We show that any two out of fourteen TCP versions which are implemented in Linux can be identified by using our proposed method.

    CiNii Article

  • Unified Multiplex Communication Architecture Deployment Influence Evaluation Reviewed

    KITAMURA Hiroshi, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 458 )   327 - 332   2009.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We have proposed a new communication architecture that is called "Unified Multiplex Communication Architecture." By introducing new types of addresses that are assigned to and consumed at each communication session, the architecture can provide secure communication services without requiring special operations to end users. The architecture has been designed to coexist with current communication environments and to be migrated to gradually. In the architecture that innovates address dealing methods drastically but can coexist with the current, communication infrastructure (e.g., DNS) and communication control tables (e.g., Routing Table, Neighbor Cache) themselves are not changed. However, their contents information dealing methods are changed. It is very important to evaluate influence to the current architecture that is caused by introducing the new architecture. This paper analyzes and evaluates the influence from various viewpoints with assuming the Unified Multiplex Communication Architecture deployment situations.

    CiNii Article

  • A Feasibility Analysis of Name-based Routing by Routers Reviewed

    HWANG Haesung, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 458 )   273 - 278   2009.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    The IPv4 (Internet Protocol version 4) addressing scheme has been the standard for Internet communication since its establishment in the 1960s. However, due to the technological advances in router technology and the enormous increase in Internet traffic usage, this addressing can no longer cope with various issues. In the past some proposals for partially solving these problems have been presented, but the proposals show limitations when it comes to establishing the foundations of future generation networks for which more sophisticated routing protocols, like content-based routing, are required. Furthermore, those previous approaches were not conceived to fully utilize the advantages of Ternary Content Addressable Memory (TCAM), which is a type of memory capable of performing high-speed lookups and is already implemented in high-end routers. In this thesis, we show that routing based on domain names in Network layer, which has been proposed as substitute for IP routing in the future, is already now a feasible technology and we evaluate the necessary hardware and network resources to implement name-based routing strategies. We present a routing scheme and propose three methods for equally balancing the routing information in the TCAM of multiple routers.

    CiNii Article

  • A Communication System making IP Addresses Anonymous and Manageable Reviewed

    SAKAKIMA Keiichi, ATA Shingo, KITAMURA Hiroshi

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 458 )   315 - 320   2009.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We propose and develop new communication system that realizes both anonymity of client nodes and distinction of client nodes, by using Ephemeral Address of Unified Multiplex communication architecture. In general, node distinction is much harder if anonymity of node improves. However, proposed communication system achieves both anonymity of node and distinction of node, by using dynamic address generation and address pool mechanism that Unified Multiplex communication architecture has. In this paper, we describe the design and the building method of proposed system, and then, we evaluate the effectivity of the system.

    CiNii Article

  • マーキング数推定による確率的パケットマーキングの高速化手法

    磯崎裕臣, 岡育生

    電子情報通信学会論文誌 (B)   J92-B ( 5 )   840 - 852   2009

     More details

    Publishing type:Research paper (scientific journal)  

  • A Strategic Approach for Re-organizing the Internet Topology by Applying Social Behavior Dynamics

    Yasuhiro Sato, Ikuo Oka

    Journal of Network and Systems Management   17 ( 42737 )   208 - 229   2009

     More details

    Publishing type:Research paper (scientific journal)  

  • Inferring Network Impact Factors: Applying Mixed Distribution to Measured RTTs

    Yasuhiro Sato, Ikuo Oka, Chikato Fujiwara

    IEICE Transactions on Communications   E92-B ( 4 )   1233 - 1243   2009

     More details

    Publishing type:Research paper (scientific journal)  

  • Inferring Network Impact Factors: Appying Mixed Distribution to Measured RTTs

    SATO Yasuhiro, ATA Shingo, OKA Ikuo, FUJIWARA Chikato

    IEICE Transactions on Communications   E92-B ( 4 )   1233 - 1243   2009( ISSN:09168516

     More details

    Publishing type:Research paper (scientific journal)  

    The end-to-end round trip time (RTT) is one of the most important communication characteristics for Internet applications. From the viewpoint of network operators, RTT may also become one of the important metrics to understand the network conditions. Given this background, we should know how a factor such as a network incident influences RTTs. It is obvious that two or more factors may interfere in the observed delay characteristics, because packet transmission delays in the Internet are strongly dependent on the time-variant condition of the network. In this paper, we propose a modeling method by using mixed distribution which enables us to express delay characteristic more accurately where two or more factors exist together. And, we also propose an inferring method of network behavior by decomposition of the mixed distribution based on modeling results. Furthermore, in experiments we investigate the influence caused by each network impact factor independently. Our proposed method can presume the events that occur in a network from the measurements of RTTs by using the decomposition of the mixed distribution.

    DOI: 10.1587/transcom.e92.b.1233

    CiNii Article

  • 分散アプリケーションにおける性能均一化のためのサーバ選択法

    阿多 信吾

    電子情報通信学会技術研究報告(NS2009-115) 109   77 - 82   2009

  • Error Probability of Orthogonal Modulation Estimation by Clustering Reviewed

    Yamamoto Takahiro, Oka Ikuo, Ata Shingo

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. SAT, 衛星通信   108 ( 274 )   185 - 189   2008.10( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    The increased demands for wireless communications lead to the development of cognitive radio, which realizes an effective utilization of channel resources. In the cognitive radio, the cognition takes an important role, and a modulation should be classified correctly at receivers. In this paper, an identification of block orthogonal modulations is discussed using general orthogonal modulations. We propose clustering method to estimate basis vectors of orthogonal modulations, and symbol estimation method by the estimated basis vectors. Bit error rate of the estimated modulation is evaluated in an additive white Gaussian noise channel by computer simulations.

    CiNii Article

  • Identification of Different TCP Versions Based on Clustering Reviewed

    OSHIO Junpei, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 258 )   83 - 88   2008.10( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    When multiple flows using different versions of TCP exist together on the network, they are influenced seriously between each other. One of methods to overcome this problem is to control such flows individually by identifying the TCP versions of each flow. Thus, this process needs to identify online which TCP version is used in each flow. In this paper, we first focus on the method for controlling the congestion window in two different versions of TCP (TCP Reno and one of the other versions). We then propose a method to identify flow by using the characteristics. We show that TCP Reno and other TCP versions can be identified by using our proposed method.

    CiNii Article

  • QAM classification based on cosine moments with phase offset Reviewed

    KITA Masato, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 250 )   15 - 19   2008.10( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    When a carrier frequency and a phase are not recovered with the sufficient accuracy in a receiver, a signal point rotates in a vector diagram. The signal point rotation causes a phase offset. In this paper, the optimal modulation classification method based on cosine moments with the phase offset is considered. At the front end of modulation classifier, the small signals are rejected, and only the large signals are fed into the classifier to improve the performance. Numerical results of the classification error probability show the effectiveness of proposed methods with phase offset for QAM classification.

    CiNii Article

  • Deployable overlay network for defense against distributed SYN flood attacks Reviewed

    Ohsita Yuichi, Ata Shingo, Murata Masayuki

    The Institute of Electronics, Information and Communication Engineers IEICE TRANSACTIONS ON COMMUNICATIONS   E91B ( 8 )   2618 - 2630   2008.08( ISSN:0916-8516

     More details

    Publishing type:Research paper (scientific journal)  

    Distributed denial-of-service attacks on public servers have recently become more serious. Most of them are SYN flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. We need a defense method which can protect legitimate traffic so that end users can connect the target servers during such attacks. In this paper, we propose a new framework, in which all of the TCP connections to the victim servers from a domain are maintained at the gateways of the domain (i. e., near the clients). We call the nodes maintaining the TCP connection <i>defense nodes</i>. The defense nodes check whether arriving packets are legitimate or not by maintaining the TCP connection. That is, the defense nodes delegate reply packets to the received connection request packets and identify the legitimate packets by checking whether the clients reply to the reply packets. Then, only identified traffic are relayed via overlay networks. As a result, by deploying the defense nodes at the gateways of a domain, the legitimate packets from the domain are relayed apart from other packets including attack packets and protected. Our simulation results show that our method can protect legitimate traffic from the domain deploying our method. We also describe the deployment scenario of our defense mechanism.

    DOI: 10.1093/ietcom/e91-b.8.2618

    CiNii Article

  • Caching Strategy based on Change of Query Trends in P2P Networks Reviewed

    DOI Masato, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 123 )   91 - 96   2008.07( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In P2P file sharing systems, caching of contents is one of practical methods to improve the search efficiency and the load balancing. Since the resources (e.g., disk spaces) for caching are limited, the contents to be cached may vary according to the cache replacement algorithm. However, typical cache replacement algorithms do not consider the time-dependent trends of query keywords, many of caches are not utilized effectively, which limits the improvement of performance by caching. In this paper, we propose a new cache replacement algorithm by taking the time-dependent trends of query words into consideration. Specifically, we categolize most frequent search words in Google into four types according to time-dependent variance of frequency obtained by Google Trends, and propose a newcache replacement algorithm based on categolization. Through numerical examples we show that our method can improve 24% of cache utilization compared to current replacement algorithms.

    CiNii Article

  • Orthogonal Modulation Identification by Clustering Reviewed

    YAMAMOTO Takahiro, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 62 )   65 - 69   2008.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Cognitive radio is expected to realize an efficient use of the radio channel. In the cognitive radio, the cognition takes an important role, and a modulation should be classified correctly at receivers. In this paper an identification of block orthogonal modulations is discussed using general orthogonal modulations. It is necessary to reconstruct a multidimensional hypercube which is composed of transmitted signals to estimate the modulations. We propose clustering and labeling methods to reconstruct any orthogonal modulations by using feature of general orthogonal modulations.

    CiNii Article

  • Modulation classification for QAM by cosine moments of small signals Reviewed

    KITA Masato, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   108 ( 37 )   7 - 10   2008.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In this paper, a new modulation classification method based on cosine moments without small signals is proposed. At the front end of modulation classifier, the small signals are rejected, and only the large signals are fed into the classifier. As the method of small signals rejection, the circular rejection and the rectungular rejection are considered. Numerical results of the classification error probability show the superiority of cosine moment method for QAM classification.

    CiNii Article

  • Support of Multi Attributes in Overlay Networks by Using Index Exchange Reviewed

    MIZO Hiromi, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 423 )   71 - 76   2008.04( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Recently, Peer-to-Peer (P2P) networks have been receiving increasing attention. Many studies on information have done so far, in order to achieve the search efficiency. Especially, it is important for P2P Networks to be optimized based multiple attributes; e.g., similarity of contents, and geometric location of nodes. However, most of literatures have focused on the optimization of overlay network topology based on single attribute, and it is not easy to optimize the topology for another attribute with keeping optimized for the attribute. Since the topology optimized for one attribute is not likely to be optimized for another attribute, there exists a mismatch between overlay topologies optimized by different attribute. In this study, we propose a method to optimize the overlay network with the support of multiple attributes. We focus on the similarity of the property of overlay topologies optimized by different attributes. Based on the similarity we introduce the exchange of indices which supports additional attributes in the overlay topology optimized by single attribute. Through the performance evaluations, we show that the overlay network optimized based on multiple attributes using our proposed method has both of characteristics of the overlay networks optimized based on single attributes, separately. Furthermore, the results show that the amount of the search messages and the message forwarding delay in information retrieval can be reduced by our method.

    CiNii Article

  • Managment of Routing Table in TCAM for Reducing Cost and Power Consumption Reviewed

    ATA Shingo, HWANG Haesung, YAMAMOTO Koji, INOUE Kazunari, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 443 )   7 - 12   2008.04( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    TCAM (Ternary Content Addressable Memory) is widely used for high speed address lookup. However, TCAM has a potential problem on hardware cost and energy consumption, which limits to deploy large amount of capacity in IP routers. In this paper, we propose a new TCAM-based hardware architecture which reduces significantly power consumption. The proposed architecture consists of multiple sub TCAMs and a indexing table. We also propose a method to select appropriate bit posisions used for indexing based on the statistical characteristics of routing table. Our numerical results show that the proposed method can divide the whole routing table neally equal to sub TCAMs.

    CiNii Article

  • QAM classification based on cosine moments with a limited signal constellation Reviewed

    KITA Masato, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 452 )   55 - 60   2008.04( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In this paper, a new modulation classification method based on cosine moments with a constellation limiter is proposed. The cosine moments are derived in a form of the infinite series of elementary functions to analyze classification error probability. Numerical results of the classification error probability show the superiority of the proposed method. Especially, the proposed method is demonstrated to yield better performance than the method based on the amplitude moments.

    CiNii Article

  • The QoE Measurement in Data Download by Psychological Measurement Method Reviewed

    KITANO Shin'ichiro, SATO Yasuhiro, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 545 )   115 - 120   2008.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In recent years, various network services are provided by ISPs, as end users increase because of diffusion of the Internet. ISPs try to provide QoS of network service, however, increase of end users may be cause degradation of quality of network. To ensure user's satisfaction, it is necessary to prevent increase of end-to-end delay and narrowing of bandwidth. However, satisfaction of each user is subjective assessment. It is difficult to understand user's satisfaction from bandwidth and delay. Therefore, QoE (Quality of Experience) is focused recently as a indicator of user's satisfaction. In this paper, we investigate user level QoE by using contant method and verbal rating method which are psychological measuring methods in data downloading. Moreover, we investigate acceptable level of user in degradation of bandwidth of communication link.

    CiNii Article

  • Impacts of Strategies based on Social Behavior Dynamics on Topology Reorganization Reviewed

    SATO Yasuhiro, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 545 )   13 - 18   2008.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Recent studies have shown that the topology of the Internet is categorized as a scale-free network. However, previous studies have not discussed whether the current Internet is optimized in terms of attack tolerance and communication efficiency. Therefore, we showed the topology of the Internet can be reorganized to more appropriate topology for communication by changing individual's connecting strategy. In our previous work, we randomly selected target nodes that are changed connecting strategy. The effect of reorganization by changing strategy on randomly selected nodes may not reflect the effect of reorganization on the current Internet correctly. In this paper, we evaluate the impact of changing strategy to network topology by adopting generic diffusion model instead of selecting target nodes randomly. Moreover, we discuss the feasibility that our strategy can apply to the current Internet.

    CiNii Article

  • A Unified Multiplex Communication Architecture to Intoroduce Specific Service Addresses : Architecture Design Reviewed

    ATA Shingo, KITAMURA Hiroshi, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 525 )   479 - 484   2008.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We propose Unified Multiplex Communication Architecture which can be considered security by using disposable address for services. In this paper, we first analyze the architecture by itself from the technical viewpoint, and describe the detailed design including new concepts needed to realize. We then present the technical descriptions of kernel/userland behavior in the Unified architecture.

    CiNii Article

  • A Unified Multiplex Communication Architecture to Introduce Specific Service Addresses : Privacy Protection Address Generation Reviewed

    FURUTA Shinya, ATA Shingo, KITAMURA Hiroshi, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 525 )   485 - 490   2008.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We propose Unified Multiplex Communication Architecture which can be considered security by using disposable Specific Service Addresses (SSAs). In this architecture, generation of SSA is one of important function-alities to improve the security and the privacy protection. This paper describes a variety of generation techniques for SSA and discusses what kind of SSA generation is suitable for privacy protection.

    CiNii Article

  • A Unified Multiplex Communication Architecture to Intoroduce Specific Service Addresses : Privacy Protection Address Generateion Reviewed

    SAKAKIMA Keiichi, ATA Shingo, KITAMURA Hiroshi

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 525 )   491 - 496   2008.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We propose Unified Multiplex Communication Architecture that can be considered security by using disposable address for services. In this document, we test existing major applications performance on Unified Multiplex Communication Architecture kernel, check whether applications operate or not, and clear up problems on this kernel. Especially, we present legacy nodes and Unified Multiplex nodes can communicate with each other under mixed nodes.

    CiNii Article

  • Harmless IPv6 Address State Extension for Dynamically Generated Addresses Reviewed

    KITAMURA Hiroshi, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 525 )   473 - 478   2008.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We propose a new communication architecture that can provide secure services by introducing disposable SSA (Service Specific Address)s. In the new architecture, a large number of dynamically generated addresses are used. In use of dynamically generated addresses, we face new problems (e.g., newly generated addresses can not be used soon after they are generated and addresses can not be reserved before they are used.) that are not appeared in the current statically generated address usages. This paper proposes a new address state called "Uncertain State" that solves above problems comprehensively without causing bad effects to existing implementations.

    CiNii Article

  • A-6-11 A study on Orthogonal Modulation Identification and Its clustering in General Orthogonal Modulation Reviewed

    YAMAMOTO Takahiro, OKA Ikuo, ATA Shingo, KATAYAMA Tomoya

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2008   2008.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-20-5 Error Probability of Soft Decision Viterbi Decoding in Binary Tree Networks Composed of Binary Symmetric Channels Reviewed

    Tani Shinji, Oka Ikuo, Ata Shingo, Hashimoto Ken

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2008 ( 2 )   2008.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Managing next generation networks and services: A report on APNOMS 2007 Reviewed

    Kuriyama Hiroshi, Lee Kyung-Hyu, Kuo G. S., Ata Shingo, Hong Choong Seon

    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT   16 ( 1 )   113 - 119   2008.03( ISSN:1064-7570

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10922-007-9089-2

  • Error Probability of Soft Decision Viterbi Decoding in Binary Tree Networks Composed of Binary Symmetric Channels Reviewed

    TANI Shinji, OKA Ikuo, ATA Shingo, HASHIMOTO Ken

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 499 )   153 - 157   2008.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    A binary symmetric channel(BSC)is considered in a binary tree network. End-nodes of the network are Connected to a fusion center, which sums up decision data of the end-nodes to make a decision variable When the decision variable is applied to a hard decision, the error probability of the fusion qenter was shown to be almost the same on the BSC crossover probability[1]. In this paper, a probability density of the decision variable is demonstrated, and convolutiollal coding / soft decision Viterbi decoding is applied to the network. The error ptobability is analyzed to show the error probability improvelnent by coding.

    CiNii Article

  • Deployable Overlay Network for Defense against Distributed SYN flood Attack

    Yuichi Ohshita, Masayuki Murata

    IEICE Transactions on Communications   E91-B ( 8 )   2618 - 2630   2008

     More details

    Publishing type:Research paper (scientific journal)  

  • SIP プロキシとの連携によるセッションベーストラヒック制御

    秦剛, 岡育生, 藤原値賀人

    電子情報通信学会論文誌(B)   J91-B ( 4 )   517 - 521   2008

     More details

    Publishing type:Research paper (scientific journal)  

  • Efficient Management of Access Control List by Combining Prefix Expansion and Range Matching Devices Reviewed

    HWANG Haesung, YAMAMOTO Koji, ATA Shingo, INOUE Kazunari, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 378 )   37 - 42   2007.12( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    TCAM (Ternary Content Addressable Memory) is a special type of memory used in routers in order to achieve high speed packet classification. Port numbers are one of the five typical fields in an ACL (Access Control List). Those that are expressed in ranges have been the reason for raising the cost of hardware due to the requirement of multiple entries. In this paper, we suggest a method to reduce the number of entries when expressing ranges in TCAM, using prefix expansion and hardware modification.

    CiNii Article

  • Error performance of network coding by low density parity check codes (衛星通信) Reviewed

    Hashimoto Ken, Oka Ikuo, Ata Shingo

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. SAT, 衛星通信   107 ( 299 )   47 - 50   2007.10( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Network coding realizes the maximum flow in a network by an appropriate coding technique. In this paper, the low density parity check (LDPC) codes are applied to network coding for a multicast network composed of a tree graph. Parts of LDPC codeword are relayed in the network. At each node, received parts of codeword are regarded as punctured codes and restore the data. Numerical results show that a node recovers the data correctly when 63% of codeword is received in a certain network condition. The effects of noise on the block correct rate are also discussed.

    CiNii Article

  • B-14-14 Improving Method of Estimating Row Statistics based on Modeling of Difference Information Reviewed

    Isozaki Hiroomi, Ata Shingo, Oka Ikuo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2007 ( 2 )   2007.08

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-14-15 Influence on Characteristics of Network Topology by changing Construction Strategy Reviewed

    Sato Yasuhiro, Ata Shingo, Oka Ikuo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2007 ( 2 )   2007.08

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Real-Time Identification of Different TCP Versions Reviewed

    OSHIO Junpei, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 135 )   61 - 66   2007.07( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    When multiple flows using different versions of TCP exist together on the network, they are influenced seriously between each other. One of method to overcome this problem is to control such flows individually by identifying the TCP versions of each flow. Thus, this process needs to identify online which TCP version is used in each flow. In this paper, we first focus on the increasing rate of the congestion window in two defferent versions of TCP (TCP Reno and HSTCP (High Speed TCP)). We also show that increasing rate of congestion window has remarkable characteristics in each TCP version. We then propose a method to identify flow by using the characteristics. We show that TCP Reno and HSTCP can be completely identified by using our proposed method.

    CiNii Article

  • Strategic Reconstraction of Network Topology for Improvement of Communication Efficiency and Attack Tolerance Reviewed

    SATO Yasuhiro, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 135 )   55 - 60   2007.07( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Revent works have shown that topologies of various networks are categorized as scale-free networks. However, previous works have focused on investigation of scale-free nature of the Internet. Moreover, they have proposed more appropriate network services and protocols that take advantages of scale-free network. Network topologies which are more suitable for the Internet have not been considered. We previously investigated how node attacks affect scale-free networks with different characteristics. We also showed a possibility that a more appropriate topology for the Internet exists, which topology satisfies in terms of attack tolerance and communication efficiency. In order to change the current Internet to more appropriate topology, no strategies have clarified. If the characteristics of the Internet can be changed by modifying strategies and policies of indivisual ISP for connecting with the Internet, the strategy for more effective network formation can be derived. In this paper, we discuss strategies for obtaining the network which is more appropriate to achive communication efficiency and attack tolerance.

    CiNii Article

  • Environment-Independent Online Real-time Traffic Identification Reviewed

    TAI Masaki, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 88 )   29 - 34   2007.06( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In the current Internet, there is a real need for the online real-time traffic identification technique to provide different services for real-time and bulk applications. Previously, it is easy to identify real-time traffic by checking the protocol/port number in IP header, however, it becomes more difficult due to the existence of real-time traffic over TCP connection, P2P and VPN. To treat these problems, we proposed the identification method. However, the method isn't resistant to changing network environment due to it uses static threshold for identification. In this paper, we propose a new identification method for real-time traffic based on characteristics of packet arrivals without checking the protocol/port number. Our approach is fast, accurate and adaptable to variety of environment compared to previous techniques. Through experiments by using the monitored data, we show that our proposed method cannot only identify real-time traffic accurately.

    CiNii Article

  • Modeling of Difference Information on Packet Sampling by Different Intervals Reviewed

    ISOZAKI Hiroomi, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 30 )   71 - 76   2007.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Packet sampling is one of effective ways to reduce the overhead of the traffic measurement in high speed routers, in which the router collects only a part of whole traffic based on the probabilistic theory. Since the statistic information of uncollected packets may be lost, the accuracy of the statistic information of sampled traffic becomes degraded as the increase of the sampling interval. In this paper, we analyze the difference information from statistics obtained by multiple sub-samplings with different sampling interval in order to model the change in the number of packets of flow by packet sampling. We then propose a new method which improves the accuracy of the estimation of flow length distribution based on derived model. We then apply our method to show that our method can estimate original flow length distributions accurately.

    CiNii Article

  • On the Use of Anonymized Trace Data for Performance Evaluation in IP Routers Reviewed

    TOJI Yusuke, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   107 ( 30 )   37 - 42   2007.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    It is important for realistic performance evaluation of address lookup algorithms to consider both routing table and trace data obtained from target network. However, most of trace data of public domains are published after anonymizing personal information. Thus, the published trace data can't be applied directly to estimate performance of routers. Previously, performance of routers have been evaluated through simulations which use random address genereation, or small amount of trace data. In such way, performance evaluation may be different from actual performance of routers. In this papaer, we propose a methos for predicting more realistic router performance based on anonymized trace data.For our motivation, we analyze correlations of address space between real trace data and routing table.Based on analystic results, we also proposed a mapping method between anonymized trace data and routing table. Moreover, we show that our method can predict near real actual performance with a trace-driven simulator.

    CiNii Article

  • Error Probability Analysis of Majority Decision in Tree Networks Composed of Binary Symmetric Channels Reviewed

    KOYAMA Shunsuke, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 598 )   117 - 122   2007.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Coding and route diversity in networks are attractive for reliable communications in wireless sensor networks. In this paper, we target to demonstrate the fundamental characteristics of route diversity. The error probability is derived for a majority decision in tree networks composed of binary symmetric channel (BSC).

    CiNii Article

  • A-21-24 Error Probability Analysis of Majority Decision in Binary Tree Networks Reviewed

    KOYAMA Shunsuke, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2007   2007.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-7-19 Estimating Original Flows by using Sampling of Different Cycle Reviewed

    ISOZAKI Hiroomi, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2007 ( 2 )   2007.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-7-132 Investigation of Network Topology which satisfies Communication Efficiency and Attack Tolerance Reviewed

    Sato Yasuhiro, Ata Shingo, Oka Ikuo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2007 ( 2 )   2007.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-6-75 Flow Classification on the Edge Router by Using SIP Proxy Reviewed

    Qin Gang, Ata Shingo, Oka Ikuo, Fujiwara Chikato

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2007 ( 2 )   2007.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • B-5-104 Estimation of Modulation in General Orthogonal Modulations Reviewed

    TAKEDA Sohei, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the IEICE General Conference   2007 ( 1 )   2007.03

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Estimation of Block Modulation Using Orthogonality Reviewed

    TAKEDA Sohei, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 567 )   19 - 22   2007.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    General orthogonal modulations produce new flexible modulations by changing modulation parameters which are rotation plane and rotation angle of multidimensional space. The modulation parameters should be transmitted to reciever at the change of modulations. In this paper, we propose a method that we estimate a modulation without side information on the modulation employed. We evaluate the proposed method by simulations in AWGN channel and show the availability of the proposed method.

    CiNii Article

  • A Session-based QoS Control Architecture by Using SIP Proxy and its Evaluation Reviewed

    QIN Gang, ATA Shingo, OKA Ikuo, FUJIWARA Chikato

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 578 )   285 - 290   2007.03( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    With the rapid growth of broadband subscribers and data transmissions, it is predicted the congestion in the access network for the limited trunk bandwidth to the ISPs. In order to provide the QoS control for the applications, the session-based flow control on the edge router is needed. The ISP also faces a challenge of keeping operating costs. In this paper, by using the existing equipments of the ISP fully, we propose a new session-based packet classification algorithm with high granularity for the edge router. Our proposal uses the session information in the SIP proxy to build the session tables on the edge router. We also show the proposal is possible to function effectively by using the limited hardware resource of the router.

    CiNii Article

  • Increasing the accuracy of traffic matrix estimation for gradual reconfiguration of virtual network topologies Reviewed

    OHSITA Yuichi, MIYAMURA Takashi, ARAKAWA Shin'ichi, ATA Shingo, OKI Eiji, SHIOMOTO Kohei, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 546 )   37 - 40   2007.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    We have proposed a VNT (virtual network topology) reconfiguration method with traffic matrix estimation considerations. In this method, by dividing the whole VNT transition sequence into multiple transitions, estimation errors are calibrated at each stage by using network state information of prior stages. However, when some of traffics suddenly change, this method cannot accurately estimate the traffic matrix, because this method uses also network state information before the sudden change of traffics. Therefore, in this paper, we propose an estimation method which can estimate accurately the traffic matrix even in the case of sudden change of traffic. In our proposed method, we eliminate the information of the traffics changing suddenly from the network state information of prior stages. And then, by using the information after the elimination, we can estimate the traffic matrix accurately even in the case of sudden change of traffic. In this paper, we simulate our estimation method and verify that our estimation method can accurately estimate the traffic matrix even in the case of sudden change of traffic.

    CiNii Article

  • Estimation of Original Flow Distribution by using Difference Information from Sampled Flows Reviewed

    ISOZAKI Hiroomi, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 524 )   71 - 76   2007.01( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Packet sampling is one of effective ways to reduce the overhead of the traffic measurement in high speed routers, in which the router collects only a part of whole traffic based on the probabilistic theory. Since the statistic information of uncollected packets may be lost, however, the accuracy of the statistic information of sampled traffic becomes degraded as the increase of the sampling interval. In this paper. A new method which improves the accuracy of the estimation of flow length distribution by utilizing the difference information from statistics obtained by multiple sub-samplings with different sampling interval. Our method use difference information between flow statistics obtained at a different sampling period to estimate original flows. We then apply our method to show that our method can estimate original flow distributions with high accuracy.

    CiNii Article

  • Impacts of Scale Free in the Internet on Attack Tolerance Reviewed

    SATO Yasuhiro, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 462 )   13 - 18   2007.01( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Recent works have shown that the topology of the Internet and the link structure of WWW are scale-free networks. In scale-free networks, the degree distribution follows power law expressed by P (κ) ∝ κ^<-γ>, where the degree κ is number of edges. The network which exhibits power law is more advantageous than the random network in the connectivity between two ends and information retrieval, because the network distance is short. Moreover, scale-free networks show a high degree of error tolerance, because most of the nodes in network have small number of edges. However, these networks are extremely vulnerable to node attacks. In previous works, they have investigated AS-level topology of the Internet and influences of error and node attack. However, no strategies to reduce vulnerability to node attacks have shown and no evaluations whether the network structure such as the Internet is appropriate to communicate have shown. In this paper, we propose metrics to search for the appropriate network structure in aspects of communication efficiency and attack tolerance, and investigate what the network structure such as the Internet should be.

    CiNii Article

  • Automatic selection of Web services based on attributes and ratings Reviewed

    Ata Shingo, Matsunaga Hisae, Oka Ikuo, Fujiwara Chikato

    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART I-COMMUNICATIONS   90 ( 8 )   40 - 49   2007( ISSN:8756-6621

     More details

    Publishing type:Research paper (scientific journal)  

  • マルチユーザ干渉のない一般化直交変調の最適化

    武田壮平, 岡育生

    電子情報通信学会論文誌 (B)   J90-B ( 12 )   1345 - 1348   2007

     More details

    Publishing type:Research paper (scientific journal)  

  • 振幅モーメントによる直交振幅変調方式の識別

    新保大介、岡育生

    電子情報通信学会論文誌 (B)   J90-B ( 12 )   1326 - 1329   2007

     More details

    Publishing type:Research paper (scientific journal)  

  • Identification of Attack Nodes from Traffic Matrix Estimation

    Yuichi Ohshita, Masayuki Murata

    IEICE Transactions on Communications   E90-B ( 10 )   2854 - 2864   2007

     More details

    Publishing type:Research paper (scientific journal)  

  • Effective bit selection methods for improving performance of packet classifications on IP routers

    Gang Qin, Ikuo Oka, Chikato Fujiwara

    IEICE Transactions on Communications   E90-B ( 5 )   1090 - 1097   2007

     More details

    Publishing type:Research paper (scientific journal)  

  • A Unified Multiplex Communication Architecture to Innovate IP Communication Styles Reviewed

    KITAMURA Hiroshi, ATA Shingo, MURATA Masayuki

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 420 )   121 - 126   2006.12( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    It is thought that address info of network layer and port info of transport layer are used to discriminate IP communication sessions. Since this method multiplexes sessions at different two layers, it becomes inefficient and causes problems in security aspect. This paper describes a new communication architecture called "Unified Multiplex" that fix above problems comprehensively with epoch-making ideas. IP communication sessions are multiplexed only by IP address info of network layer in this architecture.

    CiNii Article

  • Performance Evaluation of a Modulation Classification Using Joint Moments With Linear Transform in the Presence of Interference Reviewed

    SHIMBO Daisuke, OKA Ikuo, ATA Shingo

    29 ( 2 )   501 - 504   2006.11

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • An Accurate Identification Method for Real-time Traffic Based on Statistics of Packet Inter-arrival Times Reviewed

    TAI Masaki, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 355 )   73 - 78   2006.11( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In the current Internet, the online real-time traffic identification is a key technology to achieve differentiated service for real-time and bluk applications. Previously it is easy to identify real-time traffic by checking the protocol/port number in IP header, however, it becomes more difficult due to the existence of streaming traffic over TCP connection. Moreover, detection of real-time traffic over a kind of overlay network such as P2P or VPN is neither easy. In this paper, we propose a new identification method for real-time traffic based on not checking the protocol number, but analyzing the statistical characteristics of packet arrivals. Our approach is fast, accurate and lightweight compared to conventional techniques. Through experiments by using the monitored data, we show that our proposed method can not only identify real-time traffic accurately, but also find real-time over HTTP traffics which would not be detected by other methods.

    CiNii Article

  • トラヒックマトリクス推定との協調による段階的なVNT再構成 Reviewed

    大下 裕一, 宮村 崇, 荒川 伸一, 阿多 信吾, 大木 英司, 塩本 公平, 村田 正幸

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. PN, フォトニックネットワーク   106 ( 281 )   67 - 72   2006.10( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    トラヒックを効率的に収容する方法として、IP/光ネットワーク上で、光パスによって構築される論理トポロジ(VNT)を動的に再構成する手法の研究が進められている。しかしながら、VNTを適切に再構成するためには、対地間のトラヒッタ量を把握することが必須であるが、ネットワークの規模が大きくなるとともに、すべての対地間トラヒック量を測定することは困難となる。そのため、リンク負荷などの一部の測定情報から対地間トラヒック量を推定するトラヒックマトリクス推定手法の適用が望まれるが、トラヒックマトリクス推定を考慮に入れていない従来のVNT再構成手法では、推定誤差の影響を大きく受けてしまう。そこで、本稿では、トラヒックマトリクス推定を考慮に入れた新しいVNT再構成の手法を提案する。提案手法では、VNT再構成を複数ステージに分け、前のステージでの測定情報を推定に反映させることにより、推定誤差を削減しつつVNT再構成を行う。また、提案手法では、各ステージで追加・削除される光パスの本数に制約をもうけることにより、推定誤差の影響を受ける範囲を制限したVNT再構成を行う。本稿では、シミュレーションを用い、提案手法が誤差を削減し、トラヒックエンジニアリングへの誤差の影響を緩和できることを示す。

    CiNii Article

  • B-5-4 Performance Improvements of Modulation Classification based on Joint moments Using Linear Transfrom Reviewed

    Shimbo Daisuke, Oka Ikuo, Ata Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2006 ( 1 )   2006.09

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • IP・光マルチレイヤTEにおけるトラヒックマトリクス推定の影響 Reviewed

    大下 裕一, 宮村 崇, 荒川 伸一, 阿多 信吾, 大木 英司, 塩本 公平, 漆谷 重雄, 村田 正幸

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. PN, フォトニックネットワーク   106 ( 208 )   7 - 12   2006.08( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    トラヒックを効率的に収容する方法として、パケットレイヤ網とオプティカルレイヤ網で協調してトラヒック制御をおこなうマルチレイヤトラヒックエンジニアリングの研究が進められている。トラヒック収容効率を高めるためには、対地間トラヒック量を測定することでネットワーク全体のトラヒック発生状況を把握し、その上で最適なトラヒック制御を行うことが必須となる。しかし、ネットワークの規模が大きくなるとともに、すべての対地間トラヒック量を測定することは困難となる。そのため、リンク負荷などの一部の測定情報から対地間トラヒック量を推定するトラヒックマトリクス推定手法の適用が望まれるが、トラヒックマトリクス推定により対地間トラヒック量に推定誤差が生じ、その結果、効率的なトラヒック収容が達成できない可能性がある。本稿では、推定手法により得たトラヒックマトリクスを用いてトラヒックエンジニアリングを行った際に、推定誤差がネットワーク性能にあたえる影響の評価を行う。評価の結果、マルチレイヤトラヒックエンジニアリングを適用した場合、シングルレイヤによるトラヒックエンジニアリングよりも良い性能を示すものの、推定誤差による性能低下が大きくなることが明らかとなった。そこで、推定誤差を減少させることを目的として、トラヒックの経路の変更に基づいたトラヒックマトリクスの再推定手法を提案した。そして提案手法を用いて各対地間トラヒツクの40%の精度を向上することによりネットワークに収容可能なトラヒック量が増加することがわかった。

    CiNii Article

  • Error Probability of General Orthogonal Modulations with Low-Density Parity-Check Codes Reviewed

    HASHIMOTO Ken, TAKEDA Sohei, OKA Ikuo, ATA Shingo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 141 )   19 - 22   2006.06( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In general, the modulation can be classified into the amplitude modulation(AM), the frequency modulation(FM), and the phase modulation(PM). The adaptive modulation system selects an appropriate modulation from these modulations against channel impairments. However, these modulations have a low degree of freedom or a small number of parameters to be optimized. The General Orthogonal Modulation(GOM) defines more flexible modulations [1],[2], with the modulation parameters of rotation plane and angle of a multi-dimentional space. In this paper, the error probability of GOM with Low-Density Parity-Check(LDPC) codes [3] is evaluated in the intersymbol interference(ISI) channel, and the modulation parameters are optimized in the channel.

    CiNii Article

  • A Modulation Classification Analysis for BPSK and QPSK Using Joint Moments with Linear Transform Reviewed

    Shimbo Daisuke, Oka Ikuo, Ata Shingo

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. IT, 情報理論   106 ( 60 )   11 - 15   2006.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In the adaptive modulation systems,a receiver identifies the modulation employed at the transmitter. In this paper, a new modulation classification method based on joint moments and then linear transform is proposed. In the method, the amplitude and phase of the received signal are transformed linearly, and joint moments are measured from the amplitude and phase. The moments depend on the linear transform, and the classification performance improves by some transforms. The joint moments are derived in an infinite series of elementary functions. Using the moments, the classification error probability for BPSK and QPSK is analyzed to discuss the effective linear transform.

    CiNii Article

  • Optimized General Orthogonal Modulations in Multiple Access Systems Reviewed

    Takeda Sohei, Oka Ikuo, Ata Shingo

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. IT, 情報理論   106 ( 60 )   1 - 5   2006.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In this paper, modulation parameters in multiple access systems are discussed to develop new modulations which can be optimized for user-dependent channel. The general orthogonal modulations are used as modulations to be optimized. The general orthogonal modulations are based on orthogonal vectors, which are obtained by multidimensional rotations and have parameters of rotation planes and rotation angles. Each user's transfer matrix of the proposed system is expressed by a Kronecker product of a transfer matrix and a code vector which maintain orthogonality among different users. We find parameters which maximize minimum squared distance for intersymbol interference (ISI).

    CiNii Article

  • A Classification Method for Bulk/Real-Time Traffic based on Flow Statistics Reviewed

    TAI Masaki, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 41 )   29 - 32   2006.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Recently, streaming services to deliver video and voice are increasing rapidly. As for traffic of the Internet, two kinds (bulk/real-time) exist together in the same network now. Therefore, it is difficult to satisfy the communication quality of each traffic individually. One approach is expected that the edge router classifies the kind of traffic and provides different service for each type of traffic. Previously it is easy to identify real-time traffic by checking the protocol/port number in IP header, however, it becomes more difficult due to the existence of streaming traffic over TCP traffic connections. Moreover, detection of real-time traffic over a kind of overlay network such as P2P or VPN is neither easy. In this paper, we propose a new identification method for real-time traffic based on not checking the protocol number, but analyzing the statistical characteristics of packet arrivals. Through experiments by using the monitored data, our proposed method can effectively identify real-time traffics from all of TCP flows.

    CiNii Article

  • Methods for content placement to improve stabilization in content distribution architecture Reviewed

    NAKAMURA Kenji, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   106 ( 41 )   49 - 52   2006.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In the content distribution architecture not only improving the throughput and load balancing but also providing a stable performance independent from location of the end user is important. In this paper, we propose a new content placement method which offers a steady performance regardless of the physical location of the client. More specifically, we approximate physical network topology by using base pointers, and determine the servers which should be hold the content by taking the link's degree of sharing by edge-to-edge paths into account. Through simulation experiments on the dynamic parallel downloading, we show that our proposed method can decrease the number of content placements with achieving a stable performance regardless the location of the user.

    CiNii Article

  • Methods for Improving Performance on Packet Marking by Reducing Marking Duplicates Reviewed

    ISOZAKI Hiroomi, ATA Shingo, OKA Ikuo

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   105 ( 602 )   49 - 54   2006.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    Probabilistic Packet Marking (PPM) is one of the methods on IP traceback. In this method, intermediate router embeds (i.e., marks) the address of itself into the header of the sampled packet. However, because the PPM does not have a mechanism to avoid overrides of marking information, there is a problem that it needs a lot of packets to reconstruct attack route. We previously proposed two marking schmes based on the history of marking. They can reconstruct the attack route with fewer packets than the original PPM, however, they still require some parameter tunings for obtaining the optimal performance. In this paper we analyze factors which cause override of marking information, and propose a new packet marking scheme to minimize the impact of packet overrides. Through simulation results, we show that our proposed method can reduce the required number of packets significantly to reconstruct the attack route without tuning of parameters compared with the original and history-based PPMs.

    CiNii Article

  • On Inferring Network Impact Factors by Decomposition of Mixed Distribution Reviewed

    SATO Yasuhiro, ATA Shingo, OKA Ikuo, FUJIWARA Chikato

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report   105 ( 526 )   37 - 42   2006.01( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    An end-to-end round trip time (RTT) is one of the most important communication characteristics for Internet applications. From the viewpoint of network operators, RTT may also become one of the important variables to understand the network characteristics. For this case, we should know how a factor such as network incident influences RTTs. However, it is obvious that two or more factors may interfere in observed delay characteristics, because characteristics of packet transmission delays in the Internet are strongly dependent on the time-dependent condition of the network. In the previous work we proposed modeling method by using mixed distribution as a method of more accurately expressible to express delay characteristic more accurately in an environment where two or more impact factors exist together. However, no investigations have been shown to infer the network behavior based on modeling results. In this paper, we propose an estimation method of network behavior by decomposition of the mixed distribution. Furthermore, in experimental environment, we investigate the influence that cause by each network impact factor independently which affects the characteristics of the RTT distribution. By applying the proposed method, we also presume the events that occur in network from the measurements of RTTs and its result of decomposition.

    CiNii Article

  • Design and Implementation of Routing Protocols for IPv6 Global Anycast Communications

    Satoshi Doi, Hiroshi Kitamura, Masayuki Murata

    International Journal on Internet Protocol Technology   1 ( 3 )   177 - 188   2006

     More details

    Publishing type:Research paper (scientific journal)  

  • Detecting distributed Denial-of-Service attacks by analyzing TCP SYN packets statistically

    Yuichi Ohshita, Masayuki Murata

    IEICE Transactions on Communications   E89-B ( 10 )   2868 - 2877   2006

     More details

    Publishing type:Research paper (scientific journal)  

  • 結合モーメントを用いた搬送波周波数オフセットのあるディジタル変調方式の識別

    新保大介、岡育生

    電子情報通信学会論文誌 (B)   J89-B ( 10 )   1971 - 1980   2006

     More details

    Publishing type:Research paper (scientific journal)  

  • PIA-SM: Multicast based IPv6 Anycast Routing Protocol

    Satoshi Matsunaga, Hiroshi Kitamura, Masayuki Murata

    International Journal on Internet Protocol Technology   1 ( 3 )   189 - 197   2006

     More details

    Publishing type:Research paper (scientific journal)  

  • A Modulation Classification Using Joint Moments with Linear Transform Reviewed

    SHIMBO Daisuke, OKA Ikuo, ATA Shingo

    28 ( 2 )   745 - 748   2005.11

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • BS-3-1 Traffic matrix estimation for identification of attack sources Reviewed

    Ohsita Yuichi, Ata Shingo, Murata Masayuki

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   2005 ( 2 )   "S - 25"-"S-26"   2005.09

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Modulation Classification Error Analysis with Phase Offset Reviewed

    Shimbo Daisuke, Fukuda Go, Oka Ikubo, Ata Shingo, Fujiwara Chikato

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. IT, 情報理論   105 ( 85 )   23 - 28   2005.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    When a carrier frequency and a phase are not recovered with the sufficient accuracy in a receiver, a signal point rotates in a vector diagram. The signal point rotation causes a phase offset. In this paper, the optimal modulation classification with the phase offset is considered. Two new modulation classification methods based on joint moments of amplitude and phase are proposed with the application to the phase offset. One of the methods uses a difference of a measured moment, and another method uses a shift of signal points. The classification error probability is analyzed to show the superiority of proposed methods.

    CiNii Article

  • Dual-Optimization of General Orthogonal Modulations for Two Channel Impairments Reviewed

    Takeda Sohei, Yasunaga Takashi, Oka Ikuo, ATA Shingo, FUJIWARA Chikato

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. IT, 情報理論   105 ( 83 )   55 - 59   2005.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    In this paper, modulation parameters in a multiple access system are discussed to develop new modulations which realize dual-optimization for two channel impairments. The general orthogonal modulations are used as modulations to be optimized. They are based on orthogonal vectors, which are obtained by multidimensional rotations and have parameters of rotation planes and rotation angles. The transfer matrix in a multiple access system is expressed by a kronecker product of two transfer matrices. We find parameters which maximize minimum squared distance for two channel impairments, rayleigh fading and intersymbol interference (ISI) by the dual-optimization approach.

    CiNii Article

  • Using Mixed Distribution for Modeling End-to-End Delay Characteristics Reviewed

    Sato Yasuhiro, Ata Shingo, Oka Ikuo, FUJIWARA Chikato

    一般社団法人電子情報通信学会 電子情報通信学会技術研究報告. IT, 情報理論   105 ( 83 )   61 - 66   2005.05( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    An end-to-end round trip time (RTT) is one of the most important communication characteristics for Internet applications. In order to meet the quality of service (QoS) for applications such as streaming services, it is important to understand and predict the delay characteristic accurately. Because characteristics of the packet transmission delay in the Internet varies are strongly related to the time-dependent the condition of network. Especially, it is obvious that two or more factors may interfere in observed delay characteristics. In this paper, we express these delay characteristics by using the mixture of two or more probability distributions (especially normal distribution), not by single distribution. By investivation the factor which infects the delay distribution, we presume the events that occur in network from the delay characteristic obtained by the observation in the end host.

    CiNii Article

  • A Distributed Queue Layered Network Suppressing Slot Discarding Reviewed

    ENZAKI Takeshi, ATA Shingo, OKA Ikuo, FUJIWARA Chikato

    The Institute of Electronics, Information and Communication Engineers, The IEICE transactions on communications B   88 ( 5 )   882 - 892   2005.05( ISSN:13444697

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Error Probability Performance of Optical Communication Systems using Low-Density Parity-Check Codes Reviewed

    KONG Fansheng, OKA Ikuo, ATA Shingo, FUJIWARA Chikato

    The Institute of Electronics, Information and Communication Engineers, Technical report of IEICE. SAT   104 ( 671 )   1 - 4   2005.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    When implementing optical satellite communication systems, restriction of transmission power is a major issue, and in order to get high reliability of the channel, using error correcting codes is indispensable. In earlier literatures much attention has been devoted to applying Reed-Solomon codes, BCH codes and convolutional codes, etc. to optical communication systems [1], [2]. In this paper, we focus on the characteristic of Low-Density Parity-Check (LDPC) codes which have the powerful error correcting capability, in optical communication systems. We apply Gaussian approximation of avalanche photodiode (APD) output modeling and three (3, 6)-regular LDPC codes whose codelength N=18 ; 996 ; 4998, respectively, and code rate is 0.5, into the direct detection optical communication system using On-Off-Keying modulation (OOK) and an APD detector, and investigate the relation between error probability performance and system parameters by Monte Carlo simulations.

    CiNii Article

  • Performance Improvement on Probabilistic Packet Marking by using History Caching Reviewed

    ISOZAKI Hiroomi, ATA Shingo, OKA Ikuo

    104 ( 692 )   35 - 40   2005.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • MIPv6-based Global IPv6 Anycasting Architecture Reviewed

    HASHIMOTO Masakazu, ATA Shingo, KITAMURA Hiroshi, MURATA Masayuki

    104 ( 691 )   79 - 84   2005.02( ISSN:09135685

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • Statistical Analysis of End-to-End Delay Characteristics using the Mixed Distribution Reviewed

    SATO Yasuhiro, ATA Shingo, OKA Ikuo, FUJIWARA Chikato

    The Institute of Electronics, Information and Communication Engineers, IEICE technical report. Information networks   104 ( 564 )   49 - 54   2005.01

     More details

    Publishing type:Research paper (scientific journal)  

    An end-to-end round trip time (RTT) is one of the most important communication characteristics for Internet applications. In order to meet the quality of service (QoS) for applications such as streaming services, it is important to understand and predict the delay characteristic accurately. Because characteristics of the packet transmission delay in the Internet varies are strongly related to the time-dependent the condition of network. Especially, it is obvious that two or more factors may interfere in observed delay characteristics. In this paper, we express these delay characteristics by using the mixture of two or more probability distributions (especially normal distribution), not by single distribution. By investivation the factor which infects the delay distribution, we presume the events that occur in network from the delay characteristic obtained by the observation in the end host.

    CiNii Article

  • Design, implementation and evaluation of routing protocols for IPv6 anycast communication

    Satoshi Doi, Hiroshi Kitamura, Masayuki Murata

    Proceedings of IEEE AINA 2005   -   2005

     More details

    Publishing type:Research paper (scientific journal)  

  • A Rating-based Automatic Web Service Selection by Using Attributes

    -   2005

     More details

    Publishing type:Research paper (scientific journal)  

  • Topology-aware Server Selection Method For Dynamic Parallel Downloading

    Yoshinori Higashi, Ikuo Oka, Chikato Fujiwara

    Proceedings of IEEE CCNC 2005   -   2005

     More details

    Publishing type:Research paper (scientific journal)  

  • Design and implementation of IPv6 anycast routing protocol: PIA-SM

    Satoshi Matsunaga, Hiroshi Kitamura, Masayuki Murata

    Proceedings of IEEE AINA 2005   -   2005

     More details

    Publishing type:Research paper (scientific journal)  

  • B-5-5 QAM Classification with Phase Offset Reviewed

    Shimbo Daisuke, Oka Ikuo, Ata Shingo

    The Institute of Electronics, Information and Communication Engineers, Proceedings of the Society Conference of IEICE   404   2005

     More details

    Publishing type:Research paper (scientific journal)  

    CiNii Article

  • 属性およびレーティングに基づくWebサービスの自動選択手法

    阿多 信吾

    電子情報通信学会論文誌(B) J88-B・5   1248 - 1257   2005

  • Detecting Distributed Denial of Service Attacks by Analyzing TCP SYN Packets Statistically

    Yuichi Ohshita, Masayuki Murata

    Proceedings of IEEE GLOBECOM 2004   -   2004

     More details

    Publishing type:Research paper (scientific journal)  

  • Adaptive Playout Buffer Management Algorithm for Enhancing Perceived Quality of Streaming Applications

    Kohei Fujimoto, Masayuki Murata

    Telecommunication Systems Journal   25 ( 42798 )   259 - 271   2004

     More details

    Publishing type:Research paper (scientific journal)  

  • IPv6 Anycast for Simple and Effective Communications

    Satoshi Doi, Hiroshi Kitamura, Masayuki Murata

    IEEE Communications Magazine   ( 42 )   163 - 171   2004

     More details

    Publishing type:Research paper (scientific journal)  

  • Communication Architecture for Providing Stable Streaming Services by Anycasting

    Kimiyoshi Yamazaki, Ikuo Oka, Chikato Fujiwara

    Proceedings of IASTED IMSA 2004   -   2004

     More details

    Publishing type:Research paper (scientific journal)  

  • Protocol Design for Anycast Communication in IPv6 Network

    Satoshi Doi, Hiroshi Kitamura, Masayuki Murata

    Proceedings of IEEE PACRIM 2003   470 - 473   2003

     More details

    Publishing type:Research paper (scientific journal)  

  • Replication Methods for Enhancing Search Performancein Peer-toPeer Services on Power-Law Logical Networks

    Yoshihiro Gotoh, Masayuki Murata

    Proceedings of SPIE ITCom 2004   5244   76 - 85   2003

     More details

    Publishing type:Research paper (scientific journal)  

  • Replication Strategies in Peer-to-Peer Services over Power-Law Overlay Networks

    Yoshihiro Gotoh, Masayuki Murata

    Proceedings of APNOMS 2003   548 - 559   2003

     More details

    Publishing type:Research paper (scientific journal)  

  • On Performance Prediction of Address Lookup Algorithmsof IP Routers through Simulation and Analysis Techniques

    Ryo Kawabe, Masayuki Murata, Masanori Uga, Kohei Shiomoto, Naoaki Yamanaka

    Proceedings of IEEE ICC 2002   4   2146 - 2151   2002

     More details

    Publishing type:Research paper (scientific journal)  

  • Performance Prediction Methods for Address Lookup Algorithms of IP Routers

    Ryo Kawabe, Masayuki Murata

    Proc. of The 16th International Conference on Information Networking   2   6B.3.1-6B.3.10   2002

     More details

    Publishing type:Research paper (scientific journal)  

  • Effective Bit Selection Methods for Improving Performance of Packet Classifications on IP Routers

    Gang Qin, Ikuo Oka, Chikato Fujiwara

    Proceedings of IEEE GLOBECOM 2002   21 ( 1 )   2362 - 2366   2002

     More details

    Publishing type:Research paper (scientific journal)  

  • Performance Prediction Methods for IP Lookup Algorithms

    Ryo Kawabe, Masayuki Murata

    2002 Workshop on High Performance Switching and Routing (to appear)   - ( - )   -   2002

     More details

    Publishing type:Research paper (scientific journal)  

  • Improving Bandwidth Estimation for Internet Links by Statistical Methods

    Kazumine Matoba, Masayuki Murata

    IEICE Transactions on Communications   E84-B ( 6 )   1521 - 1531   2001

     More details

    Publishing type:Research paper (scientific journal)  

  • Performance Improvement of ABT Protocols with Combined Bandwidth / Buffer Reservation

    Tetsuya Takine, Masayuki Murata and Hideo Miyahara

    Performance Evaluation   46 ( 4 )   255 - 274   2001

     More details

    Publishing type:Research paper (scientific journal)  

  • Playout Controls for Streaming Applications by Statistical Delay Analysis

    Kouhei Fujimoto, Masayuki Murata

    Proceedings of IEEE International Conference on Communications   8   2337 - 2342   2001

  • Efficient Cache Structures of IP Routers to Provide Policy-Based Services

    Masayuki Murata, Hideo Miyahara

    Proceedings of IEEE International Conference on Communications   5   1561 - 1565   2001

  • Statistical Analysis of Packet Delays in the Internet and Its Application to Playout Control for Streaming Applications

    Kouhei Fujimoto, Masayuki Murata

    IEICE Transactions on Communications   E84-B ( 6 )   1504 - 1512   2001

     More details

    Publishing type:Research paper (scientific journal)  

  • Capacity dimensioning based on traffic measurement in the Internet

    Kazumine Matoba, Masayuki Murata

    Proc. of IEEE GLOBECOM 2001   4   2532 - 2536   2001

  • Analysis of Network Traffic and its Application to Design of High-Speed Routers

    Masayuki Murata, Hideo Miyaraha

    IEICE Transactions on Information and Systems (D-I)   ( 5 )   988 - 995   2000

     More details

    Publishing type:Research paper (scientific journal)  

  • Improving Bandwidth Estimation for Internet Links by Statistical Methods

    Proceedings of ITC Specialist Seminar on IP Traffic   29.1-29.10   2000

  • Analysis of Network Traffic and its Application to Design of High-Speed Routers

    Masayuki Murata, Hideo Miyahara

    Proceedings of SPIE Symposium on Voice, Video and Data Communications   423 - 433   1999

  • Performance Evaluation of TCP over ABT Protocols

    ( 5 )   951 - 959   1999

     More details

    Publishing type:Research paper (scientific journal)  

  • Performance Improvement of ABT Protocols with Combined Bandwidth/Buffer Reservation

    Tetsuya Takine, Masayuki Murata, Hideo Miyahara

    Proceedings of IEEE ATM"98 Workshop   129 - 136   1998

  • Performance Comparisons of ABT/IT and DT in ATM Networks

    Tetsuya Takine, Masayuki Murata, and Hideo Miyahara

    Journal of Operations Research Society of Japan   41 ( 1 )   35 - 53   1998

     More details

    Publishing type:Research paper (scientific journal)  

  • Performance Evaluation of TCP over ABT Protocols

    Masayuki Murata,Hideo Miyahara

    Proceedings of SPIE Symposium ofVoice, Video, and Data Communications   423 - 433   1998

  • Performance Comparisons of ABT/IT and DT in ATM Networks

    Tetsuya Takine, Masayuki Murata, Hideo Miyahara

    Proceedings of IEEE GLOBECOM"97   1361 - 1366   1997

▼display all

Books and Other Publications

MISC

  • Personalized WBGT計を用いた新しい熱中症対策装置の開発

    島崎 拓則, 阿多 信吾, 川久保 芳文, 安在 大祐

    電子情報通信学会技術研究報告(MEとバイオサイバネティックス)   121 ( 337 )   115 - 120   2022.01( ISSN:0913-5685

     More details

    WBGT(Wet Bulb Globe Temperature)は暑さ指数とも呼ばれ,人体の熱収支に影響を及ぼす気温,輻射熱,湿度などの要素を取り入れることで,ヒトが感じる暑さを定量化したものである.近年,企業や学校などで熱中症対策として広く利用されている.しかし,測定範囲はWBGT計を配置した周辺に限定され,着衣の種類,痩せ型や肥満など,個人による影響は反映されない欠点をもつ.そのため,様々な環境で働く暑熱環境労働者はWBGTを十分に活用できていない現状にある.我々は個人レベルのWBGTを測定するPersonalized WBGT計と,心拍数計と加速度計を搭載したセンサーノドを開発した.無線でこれら生体データと,業務前後に実施した体調に関するアンケート結果をクラウドサーバへ送り,アンケート結果に基づいた生体データをラベル付けした教師あり機械学習で熱中症判定を行った結果,精度は85.2%であった.(著者抄録)

  • A Protocol for Anycast Address Resolving (draft-ata-ipv6-anycast-resolving.txt)

    Hiroshi Kitamura, Masayuki Murata

    Internet Draft (work in progress)   2002

Presentations

  • ICTを用いた活動モニタリングシステムによる後期高齢者の歩行と身体機能の変化

    山下 和彦, 山下 知子, 佐藤 満, 阿多 信吾

    日本早期認知症学会誌  2022.08  日本早期認知症学会

  • 当院における臨床研究基盤整備 FHIRと「REDCap」のデータ連携

    太田 恵子, 岡村 浩史, 吉田 尚生, 下岸 亮祥, 津村 綾子, 下野 直美, 阿多 信吾, 新谷 歩, 木村 映善, 日野 雅之

    医療情報学連合大会論文集  2021.11  (一社)日本医療情報学会

  • アフターコロナに向けたキャンパス情報インフラのあり方について Invited Domestic conference

    阿多 信吾

    電子情報通信学会情報通信マネジメントワークショップ 2020  2021.03 

     More details

    Presentation type:Oral presentation (invited, special)  

  • COVID-19におけるキャンパスシステム・ネットワーク運用 Invited Domestic conference

    阿多 信吾

    電子情報通信学会総合大会(BI-4)  2021.03 

     More details

    Presentation type:Oral presentation (invited, special)  

  • アフターコロナにおけるキャンパスネットワーク技術 Invited Domestic conference

    阿多 信吾

    大学 ICT 推進協議会年次大会  2020.12 

     More details

    Presentation type:Oral presentation (invited, special)  

  • 共創フィールドを実現する連携プラットフォームに向けて Domestic conference

    阿多 信吾

    電子情報通信学会デジタルプラットフォーム研究会  2020.05 

  • 情報指向ネットワークにおけるプログラマビリティ拡張のプロトタイプ作製 Domestic conference

    山澤慶太, 浅井貴大, 阿多信吾

    電子情報通信学会情報指向ネットワーク技術研究会  2019.12 

     More details

    Presentation type:Oral presentation (general)  

  • 低消費電力FPGAによるバッテリー駆動型エッジ不整脈検出システム Domestic conference

    矢野祐二, 岩本久, 吉村拓馬, 有本和民, 阿多信吾

    超知性ネットワーキングに関する分野横断型研究会  2019.11 

     More details

    Presentation type:Oral presentation (general)  

  • データマイニングを用いたオペレーションログの解析による障害対応操作の標準化と再利用可能な頻出パターンの探索手法 Domestic conference

    瓦井太雄, 深澤那月, 中山裕貴, 林經正, 阿多信吾

    超知性ネットワーキングに関する分野横断型研究会  2019.11 

     More details

    Presentation type:Oral presentation (general)  

  • 呼制御プロトコルにおけるエラー自動識別手法 Domestic conference

    兎本圭脩, 阿多信吾, 千村保文, 中村信之, 八百健嗣

    超知性ネットワーキングに関する分野横断型研究会  2019.11 

     More details

    Presentation type:Oral presentation (general)  

  • トラヒックパターンとハニーポットログによるSSH攻撃分類手法 Domestic conference

    深澤那月, 吉田直樹, 阿多信吾, 岡育生

    超知性ネットワーキングに関する分野横断型研究会  2019.11 

     More details

    Presentation type:Oral presentation (general)  

  • 複数の機器同定手法による同定精度向上手法 Domestic conference

    今村裕輝, 中村信之, 八百健嗣, 阿多信吾, 岡育生

    超知性ネットワーキングに関する分野横断型研究会  2019.11 

     More details

    Presentation type:Oral presentation (general)  

  • ネットワーク運用管理における時系列データ予測による異常予兆検知手法 Domestic conference

    正木健太, 阿多信吾

    超知性ネットワーキングに関する分野横断型研究会  2019.11 

     More details

    Presentation type:Oral presentation (general)  

  • 情報指向ネットワークのプログラマビリティを活用したアプリケーション開発 Domestic conference

    阿多信吾

    電子情報通信学会情報指向ネットワーク技術研究会  2019.05 

     More details

    Presentation type:Oral presentation (general)  

  • 情報指向ネットワークを用いた ネットワークプログラマビリティの高度化に関する研究 Domestic conference

    中村真也, 阿多信吾

    電子情報通信学会情報指向ネットワーク技術研究会  2019.03 

     More details

    Presentation type:Oral presentation (general)  

  • 情報指向ネットワークを用いた移動オブジェクトトラッキング Domestic conference

    田中達也, Eum Suyong, 阿多信吾, 村田正幸

    電子情報通信学会情報指向ネットワーク技術研究会  2018.12 

     More details

    Presentation type:Oral presentation (general)  

  • アプリケーションオリエンテッドな情報指向ネットワークの実現に向けて Invited Domestic conference

    阿多信吾

    電子情報通信学会通信方式研究会  2018.09 

     More details

    Presentation type:Oral presentation (general)  

  • Ceforeで制御する移動体ロボット Domestic conference

    中村真也,阿多信吾

    電子情報通信学会情報指向ネットワーク技術研究会  2018.08 

     More details

    Presentation type:Oral presentation (general)  

  • 運用管理の自動化によるパーソナライズネットワークの実現に向けて Invited Domestic conference

    阿多 信吾

    電子情報通信学会情報通信マネジメントワークショップ 2018  2018.03 

     More details

    Presentation type:Symposium, workshop panel (nominated)  

  • キャンパスネットワークのSDN化の実例と課題 Invited Domestic conference

    阿多 信吾

    大学 ICT 推進協議会年次大会  2017.12 

     More details

    Presentation type:Oral presentation (invited, special)  

  • NFDの応用とIoT/M2M通信への展開 Invited Domestic conference

    阿多 信吾

    電子情報通信学会ソサイエティ大会  2017.09 

     More details

    Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  • パーソナライズ制御を実現するキャンパスネットワークの運用管理自動化に向けて Invited Domestic conference

    阿多 信吾

    電子情報通信学会ソサイエティ大会  2017.09 

     More details

    Presentation type:Symposium, workshop panel (nominated)  

  • ICN を用いた移動物体の制御と実演 Domestic conference

    中村真也, 片岡義晶, 阿多 信吾

    電子情報通信学会情報指向ネットワーク技術研究会  2017.08 

     More details

    Presentation type:Oral presentation (general)  

  • 情報指向ネットワークにおけるネーミングスキーマを用いた移動可能ルータの実現 Domestic conference

    高 宇豪, 北川 拓, 阿多 信吾, 村田 正幸

    電子情報通信学会情報指向ネットワーク技術研究会  2017.05 

     More details

    Presentation type:Oral presentation (general)  

  • 情報指向ネットワークにおけるプログラマビリティ実現のための一実装 Domestic conference

    中村真也, 阿多信吾, 岡育生

    電子情報通信学会情報指向ネットワーク技術研究会  2017.05 

     More details

    Presentation type:Oral presentation (general)  

  • [特別講演]CNSM 2016 における研究動向 Domestic conference

    2017.03 

  • 情報指向ネットワークにおけるネーミングスキーマを用いた移 動可能ルータの実現 Domestic conference

    -

    電子情報通信学会総合大会  2017.03 

  • 移動制御可能なFlying Router を用いた情報指向ネット ワーク Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2017.03 

  • 情報指向ネットワークにおける NFD 拡張を用いた柔軟性の高い処理の実現 Domestic conference

    -

    電子情報通信学会総合大会  2017.03 

  • 情報指向ネットワークにおける物理移動を用いたコンテンツ配送 Domestic conference

    -

    電子情報通信学会総合大会  2017.03 

  • ICM研のアクティビティから見る将来のネットワーク像 管理運用の自動化に向けて Domestic conference

    -

    電子情報通信学会総合大会  2017.03 

  • トラヒックとSNR推定による通信路選択に関する一検討 Domestic conference

    -

    電子情報通信学会情報理論研究会  2017.02 

  • 通信および設定履歴にもとづくネットワーク運用の自動化 Domestic conference

    -

    電子情報通信学会情報通信マネジメント研究会  2017.01 

  • 情報指向ネットワークの今後について Domestic conference

    -

    電子情報通信学会情報指向ネットワーク技術研究会  2016.12 

  • Analysis of Popularity Pattern of User Generated Contents and its Application to Content-aware Networking International conference

    IEEE GLOBECOM 2016  2016.12 

  • Maximum Likelihood Estimation for SNR in Nakagami Fading Channels International conference

    ISITA 2016  2016.11 

  • 無線LANにおけるSNR推定に基づいた通信路選択の誤り率解析 Domestic conference

    -

    第39回情報理論とその応用シンポジウム  2016.11 

  • Quantitavely Assess Network Security Risk for Virtual Network's Triage International conference

    APNOMS 2016  2016.10 

  • Statistical Analysis of Network Traffic by Applications of Smart Devices International conference

    APNOMS 2016  2016.10 

  • ユーザー生成コンテンツの視聴数推移パターン分析と人気推移予測 Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2016.07 

  • Retrieving Information with Autonomously- Flying Routers in Information-Centric Network International conference

    IEEE ICC 2016  2016.06 

  • PSK and QAM Classification by Likelihood under Unknown SNR Condition International conference

    RISP 2016  2016.03 

  • モバイル端末におけるアプリケーショントラヒックの統計的分析に関する研究 Domestic conference

    -

    電子情報通信学会総合大会  2016.03 

  • トラヒック予測を用いた間欠動作による省電力センサネットワーク制御に関する研究 Domestic conference

    -

    電子情報通信学会総合大会  2016.03 

  • 木構造ネットワークを用いた受信データ合成における電力最適化 Domestic conference

    -

    電子情報通信学会情報理論研究会  2016.01 

  • Energy-efficient High-speed Search Engine Using a Multi-dimensional TCAM Architecture with Parallel Pipelined Subdivided Structure International conference

    IEEE CCNC 2016  2016.01 

  • Spinal 符号を用いた OFDM 信号の PAPR 削減法 Domestic conference

    -

    電子情報通信学会情報理論研究会  2016.01 

  • Abstract Model of SDN Architectures Enabling Comprehensive Performance Comparisons International conference

    CNSM 2015  2015.11 

  • Analytical Evaluation of Maximum Likelihood Estimation for SNR International conference

    JC-SAT 2015  2015.10 

  • Identification of User Behavior based on Time Variation of Traffic Statistics International conference

    APNOMS 2014  2015.09 

  • Raspberry Piで作る手のひらサイズCCNノートの作成 Domestic conference

    -

    電子情報通信学会ソサイエティ大会  2015.09 

  • Abstract Modeling of SDN Architecture Enabling Comprehensive Performance Evaluation in SDN Architecture International conference

    APNOMS 2014  2015.09 

  • Symbol Counting Bases Threshould Algorithms for Decoding Spinal Codes International conference

    IEEE APWCS2014  2015.08 

  • Error Probability Analysis for Data Fusion of End-Nodes in Tree Networks International conference

    APWiMob 2015  2015.08 

  • 幅広かつ疎な処理規則に適応可能な省電力検索ハードウェアの実装と評価 Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2015.07 

  • Enhancing Immediacy of Identification with Multi-Stage Application Identification International conference

    NTMS 2015  2015.07 

  • 情報指向ネットワークルータにおける実装を考慮したキャッシュ置換方式の提案と評価 Domestic conference

    -

    電子情報通信学会情報指向ネットワーク研究会  2015.07 

  • Design of Communication Architecture to Support Stream Data over Content-centric Networking International conference

    CFI 2015  2015.06 

  • A Database Oriented Management for Asynchronous and Consistent Reconfiguration in Software-Defined Networks International conference

    IEEE NOMS 2014  2015.05 

  • Establishing PDCA Cycles for Agile Network Management in SDN/NFV Infrastructure International conference

    IFIP/IEEE IM 2015  2015.05 

  • Caching Algorithm for Content-Oriented Networks Using Prediction of Popularity of Contents International conference

    ManFI 2015  2015.05 

  • 木構造ネットワークにおける受信データ合成の誤り率解析 Domestic conference

    -

    電子情報通信学会衛星通信研究会  2015.05 

  • 情報指向ネットワークにおける自律移動可能なルータを用いた情報取得 Domestic conference

    -

    電子情報通信学会情報指向ネットワーク研究会  2015.05 

  • 複数フローに着目したユーザビヘイビア分類手法のためのフロー特徴分析 Domestic conference

    -

    電子情報通信学会コミュニケーションクオリティ研究会  2015.04 

  • コンテンツセントリックネットワークのための名前補完機能の設計と実装 Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2015.03 

  • 識別性能を向上させる多段階型アプリケーション識別手法 Domestic conference

    -

    電子情報通信学会情報通信マネジメント研究会  2015.03 

  • Name Completion for Improving Flexibility of Names in Information-Centric Networking International conference

    ICGHIT 2015  2015.02 

  • SDN における自己追従型細粒度ネットワーク管理運用アーキテクチャ Domestic conference

    -

    電子情報通信学会情報通信マネジメント研究会  2015.01 

  • Error Rate Performance of Fixed Rate Spinal Codes International conference

    ISPACS 2014  2014.12 

  • トラヒック統計量の時間変化にもとづくユーザのビヘイビア識別に関する研究 Domestic conference

    -

    電子情報通信学会ソサイエティ大会  2014.09 

  • A Self-Adaptive Approach for Fine-grained Network Operation and Management in Software Defined Networks Domestic conference

    2014.09 

  • IPv6 を活用するコンテンツセントリックネットワークの設計と実装 Domestic conference

    -

    インターネット技術第163委員会 新世代ネットワーク構築のための基盤技術研究分科会ワークショップ (ITRC-NWGN 2014)  2014.08 

  • データベースによるSDNの動的構成手法 Domestic conference

    -

    インターネット技術第163委員会 新世代ネットワーク構築のための基盤技術研究分科会ワークショップ (ITRC-NWGN 2014)  2014.08 

  • 暗号化トラヒックに対応可能なアプリケーション識別のリアルタイム化に向けた検討 Domestic conference

    -

    インターネット技術第163委員会 新世代ネットワーク構築のための基盤技術研究分科会ワークショップ (ITRC-NWGN 2014)  2014.08 

  • 固定レートSpinal符号における誤り率特性 Domestic conference

    -

    電子情報通信学会情報理論研究会  2014.05 

  • 周期定常性を用いた変調信号のブロック長推定 Domestic conference

    -

    電子情報通信学会衛星通信研究会  2014.05 

  • Design of a High-speed Content-centric-networking Router Using Content Addressable Memory International conference

    IEEE INFOCOM 2014 Workshop on Name-Oriented Mobility  2014.04 

  • TCAMの並列パイプライン化により検索エンジンの省電力化を実現する多次元TCAMアーキテクチャの提案 Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2014.04 

  • [奨励講演] コンテンツの需要の予測を利用したキャッシング法 Domestic conference

    -

    電子情報通信学会情報通信マネジメント研究会  2014.03 

  • 符号語分割にもとづくレートレス符号の構成法 Domestic conference

    -

    電子情報通信学会通信方式研究会  2014.03 

  • 2種の振幅モーメントを用いたシンボルタイミング誤差を含むQAM識別 Domestic conference

    -

    電子情報通信学会情報理論研究会  2014.03 

  • Towards Real-time Processing for Application Identification of Encrypted Traffic International conference

    IEEE ICNC 2014  2014.02 

  • フェージング通信路における木構造ネットワークの多数決判定誤り率解析 Domestic conference

    -

    電子情報通信学会情報理論研究会  2014.01 

  • 小信号除去を用いた木構造ネットワークにおける多数決判定誤り率の改善 Domestic conference

    -

    電子情報通信学会通信方式研究会  2014.01 

  • エンドユーザにおけるIPv6 Link-Local Addressの利便性を向上させるZone-ID Free機能の設計と実装 - See more at: http://www.c.info.eng.osaka-cu.ac.jp/staffs/ata/#sthash.kzVEYjtt.dpuf Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2013.12 

  • Information-Centric Communication Architecture for Vehicular Networking International conference

    ICCVE 2013  2013.12 

  • Predicting Time Series of Individual Trends with Resolution Adaptive ARIMA International conference

    IEEE M&N 2013  2013.10 

  • Archery sight-system by magnetic sensors for visually impaired persons International conference

    ATC 2013  2013.10 

  • [招待講演]現実味を帯びてきたICN/CCNの研究動向 Domestic conference

    -

    電子情報通信学会インターネットアーキテクチャ研究会  2013.09 

  • 暗号化トラヒックに対するアプリケーション識別のオンライン化に向けた検討 Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2013.09 

  • エンコードアドレスによるコンテンツ分散配置を実現するコンテンツセントリックネットワーク Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2013.09 

  • データベース定義にもとづく SDN の動的構成手法 Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2013.09 

  • トラヒック量追従型省電力ルータのための細粒度な転送性能予測手法 Domestic conference

    -

    インターネット技術第163委員会 新世代ネットワーク構築のための基盤技術研究分科会ワークショップ  2013.09 

  • RA-ARIMAによる検索クエリのトレンドの時系列予測手法の提案 Domestic conference

    -

    インターネット技術第163委員会 新世代ネットワーク構築のための基盤技術研究分科会ワークショップ  2013.09 

  • トラヒック流量およびバッファ使用率に対する適応的省電力化を実現する二次元スライス化パケットバッファ Domestic conference

    -

    インターネット技術第163委員会 新世代ネットワーク構築のための基盤技術研究分科会ワークショップ  2013.09 

  • 音像定位を用いた方位推定実験 Domestic conference

    -

    電子情報通信学会ソサイエティ大会  2013.09 

  • Majority Decision Sensor Networks Composed of Binary Tree Fading Links International conference

    APCC 2013  2013.08 

  • スライディングブロック復号法によるSpinal符号 Domestic conference

    -

    電子情報通信学会情報理論研究会  2013.07 

  • OpenFlow-based Content-Centric Networking Architecture and Router Implementation International conference

    Future Network and Mobile Summit 2013  2013.07 

  • パラメータ再推定の自動検出による時系列データ変化への追従強化手法 Domestic conference

    -

    電子情報通信学会情報通信マネジメント研究会  2013.07 

  • OpenFlowを用いたCCNアーキテクチャおよびルータの実装 Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2013.05 

  • A Behavior based Policy Management for Adaptive Trustworthiness Assignment in Future Network International conference

    IFIP/IEEE IM 2013  2013.05 

  • Towards early deployable Content-Centric Networking enhanced by using IPv6 International conference

    IEEE/IFIP ManFI 2013  2013.05 

  • Improving Latency in Traffic Prediction Based Energy-aware Routers International conference

    IEEE GreenTech 2013  2013.04 

  • 二次元スライス化パケットバッファにおける電力オーバーヘッドを最小化するスライス化パラメータ Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2013.03 

  • 移動履歴を用いた複数の送信機の位置推定および送信情報の誤り率特性 Domestic conference

    -

    電子情報通信学会情報理論研究会  2013.03 

  • しきい値復号法による Spinal 符号 Domestic conference

    -

    電子情報通信学会情報理論研究会  2013.03 

  • 視覚障がい者のためのアーチェリー支援システムII Domestic conference

    -

    電子情報通信学会総合大会  2013.03 

  • 2D Sliced Packet Buffer with Traffic Volume and Buffer Occupancy Adaptation for Power Saving International conference

    IEEE CCNC 2013  2013.01 

  • AR モデルにおけるパラメータ推定法の比較評価 Domestic conference

    -

    情報理論とその応用シンポジウム  2012.12 

  • 確率密度の適合度検定を用いた変調信号の推定 Domestic conference

    -

    情報理論とその応用シンポジウム  2012.12 

  • [奨励講演] 細粒度トラヒック予測を用いたトラヒック追従型省電力ルータにおけるレイテンシ削減 Domestic conference

    -

    電子情報通信学会ネットワークシステム研究会  2012.11 

  • 干渉に対する修正ビタビ復号における誤り率の厳密解析 Domestic conference

    -

    情報理論とその応用シンポジウム  2012.11 

  • 分布関数を用いた信号検出と変調識別の高速化 Domestic conference

    -

    情報理論とその応用シンポジウム  2012.11 

  • Exact Bit Error Analysis of Soft Decision Viterbi Decoding for Truncated Path History and an Application to Interference Channels International conference

    IEEE ISPACS 2012  2012.11 

  • A High-grained Traffic Prediction for Microseconds Power Control in Energy-aware Routers International conference

    IEEE/ACM UCC 2012  2012.11 

  • MobiCloud: a Geo-distributed Mo- bile Cloud Computing Platform International conference

    CNSM 2012  2012.10 

  • On Comparison of the Efficiency of Auto Regressive Estimation Methods for Predicting Traffic Trends Patterns International conference

    APNOMS 2012  2012.10 

  • Signal Detection and Modulation Classification Using a Goodness of Fit Test International conference

    ISITA 2012  2012.10 

  • トランケーションを考慮した2状態軟判定ビタビ復号におけるビット誤り率の厳密解析 Domestic conference

    -

    電子情報通信学会ソサイエティ大会  2012.09 

  • Towards Social Networking: A Proof-of-Concept Model International conference

    ASE/IEEE SocialCom 2012  2012.09 

  • フェージングのある2分木ネットワークにおける多数決判定の誤り特性解析 Domestic conference

    -

    TCAMの並列パイプライン化により検索エンジンの省電力化を実現する多次元TCAMアーキテクチャの提案  2012.07 

  • Constructing a Virtual Networking Environment in a Geo-Distributed Pro- grammable Layer-2 Networking Environment (G-PLaNE) International conference

    IEEE FutureNet V  2012.06 

  • A Slice Structure Using the Management of Network Traffic Prediction for Green IT International conference

    IEEE HPSR 2012  2012.06 

  • トラヒック流量およびバッファ使用率にもとづく省電力パケットバッファの電力性能評価 Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2012.05 

  • 解像度適応型 ARIMA による個々のトレンドの時系列予測 Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2012.04 

  • SeRViTR: A Framework for Trust and Policy Management for a Secure Internet and Its Proof-of-Concept Implementation International conference

    IEEE/IFIP ManFI 2012  2012.04 

  • Cross-Community Approach for Efficient Information Retrieval in Social Network International conference

    IEEE/IFIP NOMS 2012  2012.04 

  • SeRViTR: A Secure and Resilient Virtual Trust Routing Framework for Future Internet International conference

    GENI Engineering Conference (GEC)  2012.03 

  • Deterministic High Density Packet-Buffer system for Low Cost Network Systems International conference

    IEEE AINA 2012  2012.03 

  • 帯域保証型大容量バッファ制御 Domestic conference

    -

    電子情報通信学会ネットワークシステム研究会  2012.03 

  • 省電力ルータのための高度なメモリコントローラ Domestic conference

    -

    電子情報通信学会ネットワークシステム研究会  2012.03 

  • 周期定常性を用いたブロック直交変調の推定 Domestic conference

    -

    電子情報通信学会情報理論研究会  2012.03 

  • ビタビアルゴリズムを用いた送信機の位置推定および送信情報の誤り率特性 Domestic conference

    -

    電子情報通信学会情報理論研究会  2012.03 

  • 光通信における生体通信路のモデル化 Domestic conference

    -

    電子情報通信学会総合大会  2012.03 

  • 視覚障がい者のためのアーチェリー支援システムの開発 Domestic conference

    -

    電子情報通信学会総合大会  2012.03 

  • トラヒック追従型省電力ルータのための細粒度トラヒック予測手法 Domestic conference

    -

    電子情報通信学会ネットワークシステム研究会  2012.01 

  • Modeling of Flows based on Behavior of Applications International conference

    ICION 2012  2012.01 

  • Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic International conference

    IEEE ICMLA 2011  2011.12 

  • 暗号化トラヒックのアプリケーション識別における推定精度向上手法 Domestic conference

    -

    電子情報通信学会情報ネットワーク研究会  2011.11 

  • 信頼性ルーティングに基づくトラヒック制御手法の実現 Domestic conference

    -

    電子情報通信学会ネットワークシステム研究会  2011.10 

  • 高信頼性ルーティングのためのシステムアーキテクチャの設計 Domestic conference

    -

    電子情報通信学会ネットワークシステム研究会  2011.10 

  • Improvement of Information Retrieval Efficiency by Crossing Multiple Community International conference

    APNOMS 2011  2011.09 

  • Moment Analysis of Decision Variables for MAP Decoding International conference

    IEEE ICCCN 2011  2011.08 

  • Experimental Evaluation of Infrared Data Transmission via Biomedical Tissue Using Infrared Camera International conference

    OECC 2011  2011.07 

  • 分布関数の検定による信号検出と変調識別に関する研究 Domestic conference

    -

    電子情報通信学会情報理論研究会  2011.05 

  • Application Identification from Encrypted Traffic based on Characteristic Changes by Encryption International conference

    IEEE CQR 2011  2011.05 

  • 帯域追従型省電力ルータのためのトラヒック予測手法 Domestic conference

    -

    電子情報通信学会ネットワークシステム研究会  2011.05 

  • 高信頼性通信を実現する柔構造ルーティングフレームワークの構築 Domestic conference

    -

    新世代ネットワークワークショップ  2011.04 

▼display all

Grant-in-Aid for Scientific Research

  • ビヘイビア指向ネットワーク制御を具現化するアジャイルポリシフレームワーク

    Grant-in-Aid for Scientific Research(B)  2015.04

  • ストリームマイニングによるユーザビヘイビア同定とその応用に向けた基礎的検証

    挑戦的萌芽  2013.04

  • Research and Development on Fundamental Technologies of strategic Network Controls for Promoting Paradigm Shift of Network Protocols

    Grant-in-Aid for Young Scientists(A)  2007.04

  • Security Criteria for General Orthogonal Modulations

    Grant-in-Aid for Scientific Research(C)  2007.04

  • ユビキタス環境に適した分散型ファイルシステムの構築

    Grant-in-Aid for Young Scientists(B)  2004.04

  • 高品質エンド間通信のための高速エッジルータの開発

    Grant-in-Aid for Young Scientists(B)  2002.04

▼display all

Contract research

  • 欧州との連携による情報指向ネットワーキングに関する実証的研究開発

    2016.07

  • 情報指向ネットワーク技術を用いた自律移動型ルータによる柔軟性の高いIoTネットワーク実現のための研究開発

    2016.06

  • 先駆的トラヒック制御を実現するトラヒックトレンド分析手法の実践的評価

    2012.11

  • IPv6の広大な空間活用により多様なサービス利用と安全な通信を実現するコンテンツセントリックネットワーキングの研究開発

    2012.09

  • 新世代ネットワーク技術戦略の実現に向けた萌芽的研究

    2010.04

  • ネットワーキングハードウェアの徹底したスライス化に基づく省電力ルータアーキテクチャの研究開発

    2009.08

  • 新世代ネットワークの構築に関する設計・評価手法の研究開発

    2008.11

  • セッション多重化技術の刷新により安心・安全な通信を実現するIPv6 Unified Multiplex通信アーキテクチャの研究開発

    2007.07

▼display all

Other subsidies, etc.

  • 新世代ネットワークに資するトラスタブルネットワークを実現する通信フレームワークの研究開発

    未設定  2011.09

Charge of on-campus class subject

  • プログラミング演習A

    2017     Undergraduate

  • 電気情報工学基礎演習B

    2017     Undergraduate

  • 情報ネットワーク特論

    2017     Graduate school

  • 数理計画

    2017     Undergraduate

  • ネットワーク論

    2017     Undergraduate

  • 数理計画

    2016    

  • 情報ネットワーク特論

    2016     Graduate school

  • 電気情報工学基礎演習B

    2016    

  • プログラミング演習A

    2016    

  • プログラミング演習Ⅴ

    2016    

  • ネットワーク論

    2016    

  • プログラミング言語Ⅲ

    2015    

  • 数理計画

    2015    

  • 大学院特別演習

    2015     Graduate school

  • 情報ネットワーク特論

    2015     Graduate school

  • 電気情報工学基礎演習B

    2015    

  • プログラミング言語Ⅴ

    2015    

  • 情報ネットワーク特論

    2014     Graduate school

  • プログラミング言語Ⅴ

    2014     Undergraduate

  • プログラミング言語Ⅲ

    2014     Undergraduate

  • 大学院特別演習

    2014     Undergraduate

  • ネットワーク論

    2014     Undergraduate

  • 大学院特別演習

    2013     Graduate school

  • プログラミング言語Ⅴ

    2013     Undergraduate

  • プログラミング言語Ⅲ

    2013     Undergraduate

  • ネットワーク論

    2013     Undergraduate

  • 大学院特別演習

    2012     Graduate school

  • プログラミング言語Ⅴ

    2012     Undergraduate

  • プログラミング言語Ⅲ

    2012     Undergraduate

  • ネットワーク論

    2012     Undergraduate

  • 大学院特別演習

    2011     Graduate school

  • プログラミング言語Ⅴ

    2011     Undergraduate

  • プログラミング言語Ⅲ

    2011     Undergraduate

  • ネットワーク論

    2011     Undergraduate

▼display all

Foreigner acceptance

  • 2013

    foreigners accepted :1

    International Students :2

  • 2012

    International Students :1

  • 2011

International exchange activities

  • 米国大学 (The University of Missouri-Kansas City, Arizona State University)との共同研究

    Field category :Research

    2009.04

Job title

  • Manager within the university

    所長  2015.04 - 2022.03

  • Manager within the university

    Osaka Metropolitan University

    学長補佐  2022.04

  • Job title within the department

    Graduate School of Informatics 

    副研究院長  2022.04

  • Job title within the department

    Graduate School of Informatics 

    副研究科長  2022.04

  • Job title within the department

    情報基盤センター 

    センター長  2022.04

Other

  • Job Career

    2013.04

      More details

    Osaka City University

  • Job Career

    2006

      More details

    Osaka City University

  • Job Career

    2003

      More details

    Osaka City University

  • Job Career

    2000

      More details

    Osaka City University