The search functionality is under construction.

Author Search Result

[Author] Yuki SASAKI(10hit)

1-10hit
  • Analysis and Investigation of Frame Invariance and Particle Behavior for Piecewise-Linear Particle Swarm Optimizer

    Tomoyuki SASAKI  Hidehiro NAKANO  

     
    PAPER-Nonlinear Problems

      Vol:
    E102-A No:12
      Page(s):
    1956-1967

    Particle swarm optimization (PSO) is a swarm intelligence algorithm and has good search performance and simplicity in implementation. Because of its properties, PSO has been applied to various optimization problems. However, the search performance of the classical PSO (CPSO) depends on reference frame of solution spaces for each objective function. CPSO is an invariant algorithm through translation and scale changes to reference frame of solution spaces but is a rotationally variant algorithm. As such, the search performance of CPSO is worse in solving rotated problems than in solving non-rotated problems. In the reference frame invariance, the search performance of an optimization algorithm is independent on rotation, translation, or scale changes to reference frame of solution spaces, which is a property of preferred optimization algorithms. In our previous study, piecewise-linear particle swarm optimizer (PPSO) has been proposed, which is effective in solving rotated problems. Because PPSO particles can move in solution spaces freely without depending on the coordinate systems, PPSO algorithm may have rotational invariance. However, theoretical analysis of reference frame invariance of PPSO has not been done. In addition, although behavior of each particle depends on PPSO parameters, good parameter conditions in solving various optimization problems have not been sufficiently clarified. In this paper, we analyze the reference frame invariance of PPSO theoretically, and investigated whether or not PPSO is invariant under reference frame alteration. We clarify that control parameters of PPSO which affect movement of each particle and performance of PPSO through numerical simulations.

  • Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware

    Koji NAKAO  Katsunari YOSHIOKA  Takayuki SASAKI  Rui TANABE  Xuping HUANG  Takeshi TAKAHASHI  Akira FUJITA  Jun'ichi TAKEUCHI  Noboru MURATA  Junji SHIKATA  Kazuki IWAMOTO  Kazuki TAKADA  Yuki ISHIDA  Masaru TAKEUCHI  Naoto YANAI  

     
    INVITED PAPER

      Pubricized:
    2023/06/08
      Vol:
    E106-D No:9
      Page(s):
    1302-1315

    In this paper, we developed the latest IoT honeypots to capture IoT malware currently on the loose, analyzed IoT malware with new features such as persistent infection, developed malware removal methods to be provided to IoT device users. Furthermore, as attack behaviors using IoT devices become more diverse and sophisticated every year, we conducted research related to various factors involved in understanding the overall picture of attack behaviors from the perspective of incident responders. As the final stage of countermeasures, we also conducted research and development of IoT malware disabling technology to stop only IoT malware activities in IoT devices and IoT system disabling technology to remotely control (including stopping) IoT devices themselves.

  • Observation of Human-Operated Accesses Using Remote Management Device Honeypot

    Takayuki SASAKI  Mami KAWAGUCHI  Takuhiro KUMAGAI  Katsunari YOSHIOKA  Tsutomu MATSUMOTO  

     
    PAPER

      Pubricized:
    2023/09/19
      Vol:
    E107-A No:3
      Page(s):
    291-305

    In recent years, cyber attacks against infrastructure have become more serious. Unfortunately, infrastructures with vulnerable remote management devices, which allow attackers to control the infrastructure, have been reported. Targeted attacks against infrastructure are conducted manually by human attackers rather than automated scripts. Here, open questions are how often the attacks against such infrastructure happen and what attackers do after intrusions. In this empirical study, we observe the accesses, including attacks and security investigation activities, using the customized infrastructure honeypot. The proposed honeypot comprises (1) a platform that easily deploys real devices as honeypots, (2) a mechanism to increase the number of fictional facilities by changing the displayed facility names on the WebUI for each honeypot instance, (3) an interaction mechanism with visitors to infer their purpose, and (4) tracking mechanisms to identify visitors for long-term activities. We implemented and deployed the honeypot for 31 months. Our honeypot observed critical operations, such as changing configurations of a remote management device. We also observed long-term access to WebUI and Telnet service of the honeypot.

  • A Photovoltaic-Assisted CMOS Rectifier for Synergistic Energy Harvesting from Ambient Radio Waves

    Koji KOTANI  Takumi BANDO  Yuki SASAKI  

     
    PAPER

      Vol:
    E97-C No:4
      Page(s):
    245-252

    A photovoltaic (PV)-assisted CMOS rectifier was developed for efficient energy harvesting from ambient radio waves as one example of the synergistic energy harvesting concept. The rectifier operates truly synergistically. A pn junction diode acting as a PV cell converts light energy to DC bias voltage, which compensates the threshold voltage (Vth) of the MOSFETs and enhances the radio frequency (RF) to DC power conversion efficiency (PCE) of the rectifier even under extremely low input power conditions. The indoor illuminance level was sufficient to generate gate bias voltages to compensate Vths. Although the same PV cell structure for biasing nMOS and pMOS transistors was used, photo-generated bias voltages were found to become unbalanced due to the two-layered pn junction structures and parasitic bipolar transistor action. Under typical indoor lighting conditions, a fabricated PV-assisted rectifier achieved a PCE greater than 20% at an RF input power of -20dBm, a frequency of 920MHz, and an output load of 47kΩ. This PCE value is twice the value obtained by a conventional rectifier without PV assistance. In addition, it was experimentally revealed that if symmetric biasing voltages for nMOS and pMOS transistors were available, the PCE would increase even further.

  • Measuring and Display System for a Marathon Program by Realtime Image Processing

    Nobuyuki SASAKI  Iwao NAMIKAWA  

     
    PAPER

      Vol:
    E74-D No:10
      Page(s):
    3467-3473

    The measuring and display system for a merathon TV program employing a realtime image processor and a fast graphic processor has been developed. The system consists of two parts, the step frequency subsystem and the Computer Graphic display subsystem. In the first subsystem, the step frequency for a marathon runner is detected from the image signal by tracking the motion of the runner's face. In the second subsystem, the data for the position of each joint in the runner's leg are prepared beforehand. By applying the step frequency to those prepared data, the runner's motion is drawn out as an animation.

  • Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers Open Access

    Takayuki SASAKI  Carlos HERNANDEZ GAÑÁN  Katsunari YOSHIOKA  Michel VAN EETEN  Tsutomu MATSUMOTO  

     
    PAPER

      Pubricized:
    2019/11/12
      Vol:
    E103-B No:4
      Page(s):
    389-404

    Distributed Denial of Service attacks against the application layer (L7 DDoS) are among the most difficult attacks to defend against because they mimic normal user behavior. Some mitigation techniques against L7 DDoS, e.g., IP blacklisting and load balancing using a content delivery network, have been proposed; unfortunately, these are symptomatic treatments rather than fundamental solutions. In this paper, we propose a novel technique to disincentivize attackers from launching a DDoS attack by increasing attack costs. Assuming financially motivated attackers seeking to gain profit via DDoS attacks, their primary goal is to maximize revenue. On the basis of this assumption, we also propose a mitigation solution that requires mining cryptocurrencies to access servers. To perform a DDoS attack, attackers must mine cryptocurrency as a proof-of-work (PoW), and the victims then obtain a solution to the PoW. Thus, relative to attackers, the attack cost increases, and, in terms of victims, the economic damage is compensated by the value of the mined coins. On the basis of this model, we evaluate attacker strategies in a game theory manner and demonstrate that the proposed solution provides only negative economic benefits to attackers. Moreover, we implement a prototype to evaluate performance, and we show that this prototype demonstrates practical performance.

  • Particle Swarm Optimizer Networks with Stochastic Connection for Improvement of Diversity Search Ability to Solve Multimodal Optimization Problems

    Tomoyuki SASAKI  Hidehiro NAKANO  Arata MIYAUCHI  Akira TAGUCHI  

     
    PAPER-Nonlinear Problems

      Vol:
    E100-A No:4
      Page(s):
    996-1007

    Particle swarm optimizer network (PSON) is one of the multi-swarm PSOs. In PSON, a population is divided into multiple sub-PSOs, each of which searches a solution space independently. Although PSON has a good solving performance, it may be trapped into a local optimum solution. In this paper, we introduce into PSON a dynamic stochastic network topology called “PSON with stochastic connection” (PSON-SC). In PSON-SC, each sub-PSO can be connected to the global best (gbest) information memory and refer to gbest stochastically. We show clearly herein that the diversity of PSON-SC is higher than that of PSON, while confirming the effectiveness of PSON-SC by many numerical simulations.

  • Deterministic Particle Swarm Optimizer with the Convergence and Divergence Dynamics

    Tomoyuki SASAKI  Hidehiro NAKANO  Arata MIYAUCHI  Akira TAGUCHI  

     
    LETTER-Nonlinear Problems

      Vol:
    E100-A No:5
      Page(s):
    1244-1247

    In this paper, we propose a new paradigm of deterministic PSO, named piecewise-linear particle swarm optimizer (PPSO). In PPSO, each particle has two search dynamics, a convergence mode and a divergence mode. The trajectory of each particle is switched between the two dynamics and is controlled by parameters. We analyze convergence condition of each particle and investigate parameter conditions to allow particles to converge to an equilibrium point through numerical experiments. We further compare solving performances of PPSO. As a result, we report here that the solving performances of PPSO are substantially the same as or superior to those of PSO.

  • Improvement of the Solving Performance by the Networking of Particle Swarm Optimization

    Tomoyuki SASAKI  Hidehiro NAKANO  Arata MIYAUCHI  Akira TAGUCHI  

     
    PAPER-Nonlinear Problems

      Vol:
    E98-A No:8
      Page(s):
    1777-1786

    This paper presents a particle swarm optimization network (PSON) to improve the search capability of PSO. In PSON, multi-PSOs are connected for the purpose of communication. A variety of network topology can be realized by varying the number of connected PSOs of each PSO. The solving performance and convergence speed can be controlled by changing the network topology. Furthermore, high parallelism is can be realized by assigning PSO to single processor. The stability condition analysis and performance of PSON are shown.

  • The Measurements of the Complex Permittivities of Blood Samples in Quasi-Millimeter and Millimeter Wave Bands

    Hiroki WAKATSUCHI  Masahiro HANAZAWA  Soichi WATANABE  Atsuhiro NISHIKATA  Masaki KOUZAI  Masami KOJIMA  Yoko YAMASHIRO  Kazuyuki SASAKI  Osamu HASHIMOTO  

     
    LETTER

      Vol:
    E90-B No:6
      Page(s):
    1357-1359

    We measured the complex permittivities of whole blood and blood plasma in quasi millimeter and millimeter wave bands using a coaxial probe method. The validity of these measurements was confirmed by comparing with those of a different measurement method, i.e., a dielectric tube method. It is shown that the complex permittivities of the blood samples are similar to those of water in quasi millimeter and millimeter wave bands. Furthermore, the temperature dependences of the complex permittivities of the samples were measured.