The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An asymmetric secret sharing scheme (A-SSS) can set the number of data servers that hold shares to less than k because it can generate up to k – 1 shares from one key of the secret's owner. Therefore, the secret is not revealed even if all the data servers are attacked. However, if the owner's key is stolen and attacked, the secret may be leaked. Therefore, in this paper, we propose two proactive...
This study focuses on supporting information systems security in the early phase of information systems development. Modeling languages have commonly been used by software developers during the designing of information systems. As an extension of Unified Modeling Language (UML) activity diagrams, Mal-Activity Diagrams (MAD) have also been used to model malicious and risk mitigation processes. Despite...
Application processes like Web applications use not only CPU but also storages like HDD. In our previous studies, the algorithms to select a server in a cluster are proposed to energy efficiently perform processes which use either CPU or storages. In this paper, we consider a more general type of processes which do both the computation and access to storages. In this paper, we propose a computation...
It is critical to reduce the electric energy consumed in server clusters in order to realize eco society. In our previous studies, a server is selected to perform a process by estimating the termination time of every current process and then the electric energy consumption of servers. However, it is not easy and takes time to collect the state of each process and estimate the termination time of each...
Since the Great East Japan Earthquake, We have acknowledged the need for demand response. Therefore, we developed a system of experimental evaluation of fast demand response (fast DR) for small-scale buildings. Using this system, we confirmed that it is possible to achieve more than 10% reduction in energy consumption by controlling the air conditioning. In this paper, we describe outline of the fast...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
This paper describes the proposed system, which is able to control, monitor and record the usage of home electrical devices. The system is designed to overcome the high cost and inflexible of electrical device's installation due to rearrange rooms, and the demand of user to be able to monitor the electrical usage. Here, the system was developed using micro-controllers equipped with WiFi modules, which...
An insider contributes maximum to the leakage ofsensitive information knowingly or unknowingly in an enterprise. Therefore, the need for persistent protection of such informationis critical. At the same time, enterprise friendly features forrights and ownership management are of great importance to adigital rights management (DRM) system considering thedynamism of enterprise workforce in a large enterprise...
Recently, ICN attracts the attention of network researchers. The ICN uses contents name as the ID for recognizing the communication partner instead of the traditional IP network using IP address (terminal location). Nowadays, the NDN which is the one of the network technology realizing the ICN policy, has been proposed. In NDN, routers consisting the backbone network collect the contents recent requested...
This paper proposes a Domain Name System (DNS) Name Autoconfiguration called DNSNAv4 for Internet-of-Things (IoT) Devices in Internet Protocol (IP) version 4 (IPv4). The manual configuration of domain names of devices might be a cumbersome burden for users as the number of devices increases. A legacy scheme called DNS Name Autoconfiguration (DNSNA) for IPv6 networks can be used to register DNS names...
The recent advances in wireless communication techniques have made it possible for fast-moving vehicles to download data from the Internet. For the reliable data upload and download, TCP can be used for vehicular networks. However, TCP requires the connection initialization using three-way handshaking for the data exchange between two end systems over the Internet. Thus, the efficient operation of...
Cloud computing is becoming increasingly popular and can be for used for education purposes. We propose an educational cloud based on the supersaturation method. In cloud computing, the supersaturation method is a method of assigning many more logic resources than physical resources. The cost is more important in a supersaturated cloud than the performance. Linux containers such as LXC have recently...
Recently, Software Defined Network (SDN) technology has become widely used to take advantage of its features, including capabilities for optimization, flexibility, and customization. Many companies and organizations are applying this technology to build SDN networks for testbeds or production networks to address their requirements for optimization and customization. Currently, north bound and south...
The popularization of Long Term Evolution (LTE) leads to the issues of mobile data usage monitoring and prediction. The analyses of these issues can be referred for the deployment of mobile network and the recommendation of customer solutions. However, a great deal of statistical computing power and time is needed for several previous mobile data usage prediction methods. Because large variances may...
Our previous work suggested an interactive learning process, which use the students' study records in order to improve the students' learning motivation and the self-learning time. To improve the progress speed of a lecture and the efficiency of the Self-learning, we proposed an Active Learning System (ALS) using smartphone. In addition, we suggested the group discussion system of ALS. However, the...
Information distribution regarding immediately correlated contents is a big challenge in local communities, such as a university campus. One of the main reasons is that a campus' local network is uncovered by public search engines, and most of the local Web sites in a community operate like information silos. A secondary reason is that the daily activities in a local community are highly dynamic,...
The number of behavior-support services for user activities has been increasing lately. To provide a highly convenient service, it is necessary to recognize detailed activities of users. However, in reality, to provide a service in a real environment, some issues need to be resolved such as developing devices required for recognizing activity, handling the vast workload involved in creating features...
In recent years, large-scale natural disasters frequently occurred in Japan, and each time there occurred physical corruption or failure of the communication infrastructure, congestion of the communication network due to abrupt communication traffic occurred. As a result, it had a great influence on information collection and transmission using the Internet[1]. Also, the information required at the...
In case of large scale disaster, officers of local government will receive a large amount of information related disaster status in order to make decision what to do into first responding tasks. Moreover, there is some problems caused by delaying of report on these information, this delay be an obstacle to take disaster countermeasure activity. In this paper, we describe an operation method for unified...
In this paper, we introduce a road surface conditionunderstanding and sharing system. Traffic accidents and obstructionsdue to bad weather conditions and poor road conditions areserious social problems. It is necessary for drivers to understandweather and road conditions in advance to avoid traffic accidentsand obstructions and it is necessary to alert drivers to weatherand road conditions in order...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.