Hosei University Repository
Not a member yet
    22008 research outputs found

    曜村充利教授 経歎・研究業瞟

    Get PDF

    BASIC RESEARCH ON DEVELOPMENT OF THE GENE NETWORK SIMULATOR WITH STOCHASTIC NONLINEAR SEQUENTIAL CIRCUIT

    Get PDF
    In this paper, for the development of a hardware-based gene network simulator, nonlinear stochastic circuit gene network (p53 – Mdm2 network, and Hes1 protein – Hes1 mRNA network) models are proposed. The proposed models can reproduce typical nonlinear phenomena of the target gene network models. Also, theoretical analysis methods of the proposed model are presented. Furthermore, it is then revealed that the proposed models can be implemented with fewer circuit elements and operated with lower energy than the straightforward numerical integration models

    File system extension to support secure cloud-based sharing

    Get PDF
    Cloud storage is a common platform for multiple users to share data over the Internet. It offers a huge storage capacity at low cost and an easy-to-access interface for all users. However, data protection is considered to be an issue, especially for highly secret information. Users usually trust cloud storage providers who do not leak information, but the administrator and tools they use can access arbitrary storage data. One approach against these problems is encrypting files stored in cloud storage. Using encryption, files are kept confidential, but this requires a complicated procedure and understanding of some specific level of cryptography. In this paper, we propose a secure cloud filesystem that enables files to be encrypted and decrypted transparently when storing to or extracting from the filesystem. Each file is protected using a key-based encryption mechanism, and the keys are also stored on the cloud filesystem in secure indexed with the pathname of the target files. This enables users to easily use secure cloud storage that maintains confidentiality and share data using multiple cloud storages without the users needing special knowledge on encryption

    The Pursuit of Perfect English : Japanese Ideology Regarding L1-like Pronunciation

    Get PDF
    The idea of English as an international language has gained a refreshed momentum in the discussions around English education policy in Japan. To detect a shift in learners’ attitudes towards Japanese English (JE), and to elucidate the ideology they embrace regarding their motivation for improving their proficiency, a questionnaire survey and semi-structured interviews were conducted with 112 advanced-level learners of English from a university in Tokyo. It was revealed that they (1) display a lingering preference for US English, despite increased exposure to World Englishes; (2) evaluate JE less favourably in competence and status dimensions than other Asian Englishes; and (3) are not content with simply achieving a high level of proficiency, but are still dedicated to acquiring L1-like speech as their ultimate goal. This quintessentially Japanese perfectionism is reflected in the word eigodo, or ‘the way of English’, where do (/doː/) is a stoic value system in the process of mastering artistic skills. The findings demonstrate how culture-specific ideology serves as an underlying mechanism that ensures a reconciliation between a preference for L1 English and an inferiority to other L2 Englishes

    Malware Attack Objective Evaluation Based on API Calls Sequence Information

    Get PDF
    Cyber-attacks are increasing every year, and the scale of damage is also growing. Since malware is commonly used in cyber attacks, the number of malware detections is also on the rise. Since it is impossible to respond to malware by analyzing them one by one, many research efforts are being made to develop detection and classification methods that require as little manpower as possible. Malware analysis methods can be broadly classified into dynamic analysis and static analysis. In this study, we focus on dynamic analysis, which requires a relatively short analysis time and is suitable for processing a large number of malware compared to static analysis. We believe that if the purpose of an attack can be estimated using information on the names of API functions invoked by dynamic analysis, it can be used for damage assessment and recovery. In this study, we analyze the order information of API calls obtained from dynamic analysis to estimate the purpose of malware attacks. As a result, we show that the relationship between the order information of API calls and the attack objectives is characteristic

    A NEURAL NETWORK MODEL THAT EXPLAINS THE OCCURRENCE AND DISAPPEARANCE OF OPTICAL ILLUSIONS IN LATTICE FIGURES

    Get PDF
    The principle of the Herman lattice illusion can explain this illusion phenomenon in the most powerful model at present. (It is a circular receptive field consisting of two regions, a concentric on-region, and an off-region.) However, although the most powerful visual model can explain the principle of the Herman lattice, it cannot explain the reason why the illusion disappears when the Herman lattice is distorted in a wave shape. And until now, the reason remains unexplained. In addition, the illusion of scintillating grid has not been elucidated, nor has the disappearance of the illusion of wavy figures of scintillating grids been clarified. Focusing on this, I decided to study. We will explain the occurrence and disappearance of optical illusions in these lattice figures, and also consider the neural network model

    Special Issue : How Have Digital Labor Platforms Transformed the Employment Relationship of Existing Industry? : The Impact of Ride-sharing on the Taxi Industry in Japan

    Get PDF

    Development of Navigation Environment Recognition Algorithm for Stable Autonomous Mobile Robot using 3D-Lidar Considering Rain Conditions

    Get PDF
    For autonomous mobile robots to move safely, it is important that they have a stable recognition of their environment. Most autonomous mobile robots use LiDAR (Light Detection and Ranging) to sense the environment. Under normal weather circumstances, this LiDAR can assess the environment stably and accurately. However, in rainy weather, it has the problem of recognizing raindrops as objects. When an autonomous mobile robot uses LiDAR to detect obstacles in rainy weather, the laser emitted from LiDAR may hit raindrops and misdetect them. In this paper, 3D LiDAR is used to investigate the effect of rain on sensors and how the robot can navigate autonomously in the rain to enable an autonomous mobile robot in a rainy environment

    21,883

    full texts

    22,008

    metadata records
    Updated in last 30 days.
    Hosei University Repository is based in Japan
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇