The search functionality is under construction.

Author Search Result

[Author] Satoshi MATSUURA(5hit)

1-5hit
  • Dynamic Strain Measurement with Bandwidth Allocation by Using Random Accessibility of BOCDR

    Osamu FURUKAWA  Hideo SHIDA  Shin-ichiro TEZUKA  Satoshi MATSUURA  Shoji ADACHI  

     
    PAPER-Sensing

      Pubricized:
    2018/11/13
      Vol:
    E102-B No:5
      Page(s):
    1069-1076

    A Brillouin optical correlation domain reflectometry (BOCDR) system, which can set measuring point to arbitrary distance that is aligned in a random order along an optical fiber (i.e., random accessibility), is proposed to measure dynamic strain and experimentally evaluated. This random-access system can allocate measurement bandwidth to measuring point by assigning the measurement times at each measuring point of the total number of strain measurements. This assigned number is not always equally but as necessary for plural objects with different natural frequencies. To verify the system, strain of two vibrating objects with different natural frequencies was measured by one optical fiber which is attached to those objects. The system allocated appropriate measurement bandwidth to each object and simultaneously measured dynamic strain corresponding to the vibrating objects.

  • Mill: A Geographical Location Oriented Overlay Network Managing Data of Ubiquitous Sensors

    Satoshi MATSUURA  Kazutoshi FUJIKAWA  Hideki SUNAHARA  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2720-2728

    With the rapid rise in the demand for location related service, communication devices such as PDAs or cellar phones must be able to search and manage information related to the geographical location. To leverage location-related information is useful to get an in-depth perspective on environmental circumstances, such as traffic conditions or weather information. To handle the large number of information and queries communication devices generate in the current ubiquitous environment, some scalable mechanism must be required. DHTs and some overlay networks supporting range search are proposed. However, these overlay networks can not process queries of geographical region search. In this paper, we propose a overlay network called "Mill" which can efficiently manage information related to the geographical location. In DHT based overlay networks, each node has responsibility to manage a part of the whole hash table. DHTs provide scalable systems and support fast search. However, DHTs are not good at solving geographical search (range search), because hash function only supports exact match. In the Mill network, each node manages a part of ID-space calculated by "Z-ordering," which represents squire surface of the earth. This structure of ID-space enables to process region queries easily and fast. And Mill supports any scale of region search. We evaluate proposed system by using traffic infomation generator called "HAKONIWA." Simulation results show that the performance of Mill is good as well as other DHT systems. In addtion, Mill provedes more efficient region search than other overlay networks supporting range search.

  • Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    Satoru NOGUCHI  Satoshi MATSUURA  Atsuo INOMATA  Kazutoshi FUJIKAWA  Hideki SUNAHARA  

     
    PAPER

      Vol:
    E96-B No:7
      Page(s):
    1706-1715

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile resources in the Internet raises a scalability issue due to the mobility of vehicles. In this paper, we design a solution to wide area geographical mobile resource discovery in heterogeneous networks composed of numerous mobile networks possibly connected to the Internet. The proposed system relies on a hierarchical publish-subscribe architecture and geographic routing so that users can locate resources according to geographical coordinates without scalability issue. Furthermore we propose a location management mechanism for mobile resources, which enables to reduce periodic updates of geographical location. Numerical analysis and simulation results show that our system can discover mobile resources without overloading both mobile network and the Internet.

  • A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices

    Yong JIN  Masahiko TOMOISHI  Satoshi MATSUURA  Yoshiaki KITAGUCHI  

     
    PAPER-Mobile Application and Web Security

      Pubricized:
    2018/08/22
      Vol:
    E101-D No:11
      Page(s):
    2612-2621

    Data breach and data destruction attack have become the critical security threats for the ICT (Information and Communication Technology) infrastructure. Both the Internet service providers and users are suffering from the cyber threats especially those to confidential data and private information. The requirements of human social activities make people move carrying confidential data and data breach always happens during the transportation. The Internet connectivity and cryptographic technology have made the usage of confidential data much secure. However, even with the high deployment rate of the Internet infrastructure, the concerns for lack of the Internet connectivity make people carry data with their mobile devices. In this paper, we describe the main patterns of data breach occur on mobile devices and propose a secure in-depth file system concealed by GPS-based mounting authentication to mitigate data breach on mobile devices. In the proposed in-depth file system, data can be stored based on the level of credential with corresponding authentication policy and the mounting operation will be only successful on designated locations. We implemented a prototype system using Veracrypt and Perl language and confirmed that the in-depth file system worked exactly as we expected by evaluations on two locations. The contribution of this paper includes the clarification that GPS-based mounting authentication for a file system can reduce the risk of data breach for mobile devices and a realization of prototype system.

  • Living Will for Resilient Structured Overlay Networks

    Kimihiro MIZUTANI  Takeru INOUE  Toru MANO  Osamu AKASHI  Satoshi MATSUURA  Kazutoshi FUJIKAWA  

     
    PAPER

      Vol:
    E99-B No:4
      Page(s):
    830-840

    The routing efficiency of structured overlay networks depends on the consistency of pointers between nodes, where a pointer maps a node identifier to the corresponding address. This consistency can, however, break temporarily when some overlay nodes fail, since it takes time to repair the broken pointers in a distributed manner. Conventional solutions utilize “backpointers” to quickly discover any failure among the pointing nodes, which allow them to fix the pointers in a short time. Overlay nodes are, however, required to maintain backpointers for every pointing node, which incurs significant memory and consistency check overhead. This paper proposes a novel light-weight protocol; an overlay node gives a “living will” containing its acquaintances (backpointers) only to its successor, thus other nodes are freed from the need to maintain it. Our carefully-designed protocol guarantees that all acquaintances are registered via the living will, even in the presence of churn, and the successor notifies the acquaintances for the deceased. Even if the successor passes away and the living will is lost, the successor to the successor can identify the acquaintances with a high success ratio. Simulations show that our protocol greatly reduces memory overhead as well as the detection time for node failure with the cost being a slight increase in messaging load.