Hosei University Repository
Not a member yet
22008 research outputs found
Sort by
BASIC RESEARCH ON DEVELOPMENT OF THE GENE NETWORK SIMULATOR WITH STOCHASTIC NONLINEAR SEQUENTIAL CIRCUIT
In this paper, for the development of a hardware-based gene network simulator, nonlinear stochastic circuit gene network (p53 – Mdm2 network, and Hes1 protein – Hes1 mRNA network) models are proposed. The proposed models can reproduce typical nonlinear phenomena of the target gene network models. Also, theoretical analysis methods of the proposed model are presented. Furthermore, it is then revealed that the proposed models can be implemented with fewer circuit elements and operated with lower energy than the straightforward numerical integration models
Special Issue : How Have Digital Labor Platforms Transformed the Employment Relationship of Existing Industry? : How Have Taxi Companies Responded to the Potential Entry Threat of Ride-hailing? : Regional Case Studies in Japan
File system extension to support secure cloud-based sharing
Cloud storage is a common platform for multiple users to share data over the Internet. It offers a huge storage capacity at low cost and an easy-to-access interface for all users. However, data protection is considered to be an issue, especially for highly secret information. Users usually trust cloud storage providers who do not leak information, but the administrator and tools they use can access arbitrary storage data. One approach against these problems is encrypting files stored in cloud storage. Using encryption, files are kept confidential, but this requires a complicated procedure and understanding of some specific level of cryptography. In this paper, we propose a secure cloud filesystem that enables files to be encrypted and decrypted transparently when storing to or extracting from the filesystem. Each file is protected using a key-based encryption mechanism, and the keys are also stored on the cloud filesystem in secure indexed with the pathname of the target files. This enables users to easily use secure cloud storage that maintains confidentiality and share data using multiple cloud storages without the users needing special knowledge on encryption
The Pursuit of Perfect English : Japanese Ideology Regarding L1-like Pronunciation
The idea of English as an international language has gained a refreshed momentum in the discussions around English education policy in Japan. To detect a shift in learners’ attitudes towards Japanese English (JE), and to elucidate the ideology they embrace regarding their motivation for improving their proficiency, a questionnaire survey and semi-structured interviews were conducted with 112 advanced-level learners of English from a university in Tokyo. It was revealed that they (1) display a lingering preference for US English, despite increased exposure to World Englishes; (2) evaluate JE less favourably in competence and status dimensions than other Asian Englishes; and (3) are not content with simply achieving a high level of proficiency, but are still dedicated to acquiring L1-like speech as their ultimate goal. This quintessentially Japanese perfectionism is reflected in the word eigodo, or ‘the way of English’, where do (/doː/) is a stoic value system in the process of mastering artistic skills. The findings demonstrate how culture-specific ideology serves as an underlying mechanism that ensures a reconciliation between a preference for L1 English and an inferiority to other L2 Englishes
Malware Attack Objective Evaluation Based on API Calls Sequence Information
Cyber-attacks are increasing every year, and the scale of damage is also growing. Since malware is commonly used in cyber attacks, the number of malware detections is also on the rise. Since it is impossible to respond to malware by analyzing them one by one, many research efforts are being made to develop detection and classification methods that require as little manpower as possible. Malware analysis methods can be broadly classified into dynamic analysis and static analysis. In this study, we focus on dynamic analysis, which requires a relatively short analysis time and is suitable for processing a large number of malware compared to static analysis. We believe that if the purpose of an attack can be estimated using information on the names of API functions invoked by dynamic analysis, it can be used for damage assessment and recovery. In this study, we analyze the order information of API calls obtained from dynamic analysis to estimate the purpose of malware attacks. As a result, we show that the relationship between the order information of API calls and the attack objectives is characteristic
A Study on the Formation and Development of Compact City Policies in Basic Local Governments in the Period of Population Decline : Focusing on Policy Responses to Urban Consolidation Based on Location Optimization Plans of the Four Municipalities in the Tokyo Metropolitan Area
博士(公共政策学)法政大学 (Hosei University
A NEURAL NETWORK MODEL THAT EXPLAINS THE OCCURRENCE AND DISAPPEARANCE OF OPTICAL ILLUSIONS IN LATTICE FIGURES
The principle of the Herman lattice illusion can explain this illusion phenomenon in the most powerful model at present. (It is a circular receptive field consisting of two regions, a concentric on-region, and an off-region.) However, although the most powerful visual model can explain the principle of the Herman lattice, it cannot explain the reason why the illusion disappears when the Herman lattice is distorted in a wave shape. And until now, the reason remains unexplained. In addition, the illusion of scintillating grid has not been elucidated, nor has the disappearance of the illusion of wavy figures of scintillating grids been clarified. Focusing on this, I decided to study. We will explain the occurrence and disappearance of optical illusions in these lattice figures, and also consider the neural network model
Special Issue : How Have Digital Labor Platforms Transformed the Employment Relationship of Existing Industry? : The Impact of Ride-sharing on the Taxi Industry in Japan
Development of Navigation Environment Recognition Algorithm for Stable Autonomous Mobile Robot using 3D-Lidar Considering Rain Conditions
For autonomous mobile robots to move safely, it is important that they have a stable recognition of their environment. Most autonomous mobile robots use LiDAR (Light Detection and Ranging) to sense the environment. Under normal weather circumstances, this LiDAR can assess the environment stably and accurately. However, in rainy weather, it has the problem of recognizing raindrops as objects. When an autonomous mobile robot uses LiDAR to detect obstacles in rainy weather, the laser emitted from LiDAR may hit raindrops and misdetect them. In this paper, 3D LiDAR is used to investigate the effect of rain on sensors and how the robot can navigate autonomously in the rain to enable an autonomous mobile robot in a rainy environment