Search Results - "Takizawa, Makoto"
-
1
The hidden charm pentaquarks are the hidden color-octet uud baryons?
Published in Physics letters. B (10-01-2017)“…The I(JP)=12(12−), 12(32−), and 12(52−)uudcc‾ pentaquarks are investigated by the quark cluster model. This model, which reproduces the mass spectra of the…”
Get full text
Journal Article -
2
Implementation and evaluation of the information flow control for the Internet of Things
Published in Concurrency and computation (10-10-2021)“…In the Internet of Things, the CBAC (capability‐based access control) model is proposed to make devices securely accessed. Here, an owner of a device issues a…”
Get full text
Journal Article -
3
Time‐based legality of information flow in the capability‐based access control model for the Internet of Things
Published in Concurrency and computation (10-12-2021)“…Summary The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the…”
Get full text
Journal Article -
4
Special issue on intelligent Edge, Fog, Cloud and Internet of Things (IoT)-based services
Published in Computing (01-03-2021)Get full text
Journal Article -
5
X(3872) Revisited: The Roles of OPEP and the Quark Degrees of Freedom
Published in Few-body systems (01-12-2021)“…The X (3872) is investigated by employing the quark-hadron hybrid model, that consists of the c c ¯ core, D ( ∗ ) D ¯ ∗ , J / ψ ω , and J / ψ ρ two-meson…”
Get full text
Journal Article -
6
Information Flow Control Based on Capability Token Validity for Secure IoT: Implementation and Evaluation
Published in Internet of things (Amsterdam. Online) (01-09-2021)“…In the CBAC (Capability-Based Access Control) model proposed for realizing the secure IoT (Internet of Things), authorizers issue subjects capability tokens,…”
Get full text
Journal Article -
7
Purpose-Based Information Flow Control for Cyber Engineering
Published in IEEE transactions on industrial electronics (1982) (01-06-2011)“…Cyber engineering is getting more significant in not only manufacturing but also business applications. Information management technologies play a key role in…”
Get full text
Journal Article -
8
The Redundant Energy Consumption Laxity Based Algorithm to Perform Computation Processes for IoT Services
Published in Internet of things (Amsterdam. Online) (01-03-2020)“…There are various kinds of Internet of Things (IoT) services like home management services. In the IoT services, a large volume of data is gathered from…”
Get full text
Journal Article -
9
Special issue on Intelligent Fog and Internet of Things (IoT)-Based Services
Published in World wide web (Bussum) (01-05-2021)Get full text
Journal Article -
10
Read-abortion (RA) based synchronization protocols to prevent illegal information flow
Published in Journal of computer and system sciences (01-12-2015)“…In information systems, data in an object may illegally flow into another object through manipulations of the objects. First, we define a legal information…”
Get full text
Journal Article -
11
Simple estimation and energy‐aware migration models of virtual machines in a server cluster
Published in Concurrency and computation (10-11-2018)“…Summary In order to realize green society, it is critical to reduce electric energy consumed by servers in clusters. In our previous studies, these types of…”
Get full text
Journal Article -
12
Capability token selection algorithms to implement lightweight protocols
Published in Internet of things (Amsterdam. Online) (01-08-2022)“…The IoT (Internet of Things) is now one of the most significant infrastructure and has to be secure against malicious accesses. Especially, it is critical to…”
Get full text
Journal Article -
13
Energy-Efficient Delay Time-Based Process Allocation Algorithm for Heterogeneous Server Clusters
Published in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (01-03-2015)“…Various types of scalable and high performance computing systems are developed to realize distributed applications. In order to realize not only scalable but…”
Get full text
Conference Proceeding Journal Article -
14
Energy-efficient dynamic clusters of servers
Published in The Journal of supercomputing (01-05-2015)“…Electric power consumed by servers has to be reduced in order to realize green societies. We consider computation (CP) and storage (ST) types of application…”
Get full text
Journal Article -
15
Visual CAPTCHA application in linguistic cryptography
Published in Concurrency and computation (25-01-2018)“…Summary This paper presents an idea of linguistic cryptography and linguistic techniques for data analysis. The main aspects are using parts of divided…”
Get full text
Journal Article -
16
Energy consumption laxity-based quorum selection for distributed object-based systems
Published in Evolutionary intelligence (01-03-2020)“…In object based systems, an object is an unit of computation resource. Distributed applications are composed of multiple objects. Objects in an application are…”
Get full text
Journal Article -
17
Evaluation of struggle strategy in Genetic Algorithms for ground stations scheduling problem
Published in Journal of computer and system sciences (01-11-2013)“…Ground station scheduling problem arises in spacecraft operations and aims to allocate ground stations to spacecraft to make possible the communication between…”
Get full text
Journal Article Publication -
18
Power consumption and processing models of servers in computation and storage based applications
Published in Mathematical and computer modelling (01-09-2013)“…The electric power consumption of information systems has to be reduced in addition to increasing the performance and fault tolerance in order to realize green…”
Get full text
Journal Article -
19
Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments
Published in Journal of computer and system sciences (01-11-2012)“…In a decentralised system like P2P where each individual peers are considerably autonomous, the notion of mutual trust between peers is critical. In addition,…”
Get full text
Journal Article -
20
Application of fuzzy logic for IoT node elimination and selection in opportunistic networks: performance evaluation of two fuzzy-based systems
Published in World wide web (Bussum) (01-05-2021)“…Opportunistic Networks (OppNets) are a sub-class of DTN, designed as a specialized ad hoc network suitable for applications such as emergency responses. Unlike…”
Get full text
Journal Article