The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To resist the growth of abnormal traffic such as P2P, DDoS and Internet worms, this paper discusses a circuit design to realize real-time abnormal traffic detection from broadband networks. Real-time counting of cardinality is the key of the circuit. Although our previous study showed the effectiveness of cardinality counting to detect various abnormal traffic, the slowness of DRAM access prevented...
The Domain Name System (DNS) is a key part of the infrastructure of the Internet. Recent discussions have centered on the removal of the shared DNS resolver and the use of a local full-service resolver instead. From the viewpoint of the cache mechanism, these discussions involve removing the shared DNS cache from the Internet. Although the removal of unnecessary parts from a total system tends to...
As centralized social networking services (SNSs) or online social networks (OSNs) have inherent privacy concerns, researchers are working on decentralized SNSs as alternatives for addressing these problems. However, it is very difficult to decentralize all the functions of centralized SNSs. This paper describes a decentralized SNS using social virtual private networks (VPNs) that work together with...
The brain is the ultimate genetic system to which a large number of genes are devoted. To extract and visualize biological information from such large data sets accumulated in the post-sequencing era, the use of bioinformatics would be a very powerful means. To understand the genetic basis of mouse cerebellar postnatal development, we have analyzed the whole transcription or gene expression (transcriptome)...
Cardinality in network flow data gives useful information for network administrators about suspicious communication on their network. Such communication tends to present abnormal number of source and/or destination network address. Our research group reported that cardinality presented in TCP/IP packet header can be used to detect malware propagation and P2P software usage in small size network. However...
Heart disease has the second highest mortality rate in Japan. In particular, the ischemic heart disease such as the myocardial infarction and the heart failure requires emergency treatment. Although their symptoms emerge as an elevation or depression of the ST segment in ECG (electrocardiogram) waveform, it is very difficult to detect it because the S and T waves are quite small as compared with the...
Since centralized Social Networking Services (SNSs) inherently have privacy concerns, researchers are working on decentralized SNSs for solving them. However, it is very difficult to replace all the roles of the centralized SNSs with decentralize ones. This paper describes the Friend News System, a messaging system that works together with a centralized SNS while maintaining a necessary level of privacy...
Yamaha Motor's RMAX industrial use unmanned helicopter is used for crop dusting rice paddies and there are presently more than 2,500 unmanned helicopters being used in Japan's agriculture industry. Autonomous flight control type unmanned helicopters based on the agricultural use RMAX ones have been developed and were used for observation over Hokkaido's Mt. Usu volcano during its 2000 eruption. Since...
Network-booting is widely adopted in universities that have to maintain many client computers. In conventional network-booting systems, the primary bottleneck is the disk image distribution servers and the network to these servers. To eliminate this bottleneck, peer-to-peer (P2P) methods must work. However, existing P2P methods, including BitTorrent, do not work well for network-booting because they...
We demonstrate the holographic position measurement of a nanoparticle held in optical tweezers in water by using an in-line low-coherence digital holographic microscope with the pattern matching method and the three-dimensional sub-pixel estimation. The axial sub-pixel estimation allowed a step length in the diffraction calculation of a hologram to ∼20 nm while keeping the axial resolution of a single...
Heart disease has the second high mortality rate behind cancer in Japan, and requires quick treatment. To take a part in emerging mHealth, we developed a wearable heart disease monitoring and alerting system “Dentan”. Dentan continuously monitors patient's ECG in his/her daily activities and issues an alert to the patient as well as surrounding people if it detects abnormal heart behavior. Dentan...
We demonstrate the three-dimensional position measurement of a 100nm-gold nanoparticle held in optical tweezers in solution using an in-line low-coherence digital holographic microscope. The trapped gold nanoparticle had the axial movement of 4.5nm in the standard deviation when a 300mW laser beam was focused with an 1.25NA objective lens.
The Domain Name System (DNS) is a key naming system used in the Internet. Recently, the deployment of IPv6 and the DNS pre-fetch function in web browsers has significantly changed DNS usage. Furthermore, content delivery networks (CDNs) use complicated DNS configurations together with small TTL values to control their traffic. These three factors significantly increase DNS traffic. Thus, the importance...
Modern authentication mechanisms, including Shibboleth and OAuth, provide user attributes such as affiliations and e-mail addresses. Conventional collaborative methods have problems using such attributes in egress access control for the Web. This paper proposes a new collaborative method using Web browsers, proxy servers, and authentication servers. The proposed method simplifies communications among...
We propose a process of stress-free self-alignment of an ultra-small, ultra-thin (75×75×5 μm) radio frequency identification (RFID) chip (called a “powder chip”) on an antenna film. The process consists of only two simple steps: dispensing a micro-liter liquid droplet with a semispherical diameter of about 1 mm onto a hydrophilic/hydrophobic patterned surface on the antenna film and then releasing...
Most existing collaborative applications on the Web require centralized servers for storing shared data and relaying communication messages among browsers. This means that users of these applications must fully trust centralized servers that hold and relay potentially sensitive and important data. Furthermore, users can lose access to their data if centralized servers go out of service.
Recently, the variety and vastness in networks have increased rapidly. To keep networks stable and reliable, network administrators have to understand the nature of network traffic flows. In this paper, we propose a method to analyze network traffic using firewall logs. The characteristics of our method are 1) the use of the aggregate flow information, and 2) the use of cardinality information of...
This paper describes how users can collaborate through sharing personal protected Web resources. Personal protected Web resources are Web pages and services that are typically password-protected. One example is a personal page on an auction site. This paper introduces capability-based access control to the World Wide Web without modifying existing servers and clients. Access rights for personal protected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.