Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kentaro Oda is active.

Publication


Featured researches published by Kentaro Oda.


international conference on advanced applied informatics | 2013

An Inter-Wiki Page Data Processor for a M2M System

Takashi Yamanoue; Kentaro Oda; Koichi Shimozono

A data processor, which inputs data from wiki pages, processes the data, and outputs the processed data on a wiki page, is proposed. This data processor is designed for a Machine-to-Machine (M2M) system, which uses Arduino, Android, and Wiki software. This processor is controlled by the program which is written on a wiki page. This M2M system consists of mobile terminals and web sites with wiki software. A mobile terminal of the system consists of an Android terminal and it may have an Arduino board with sensors and actuators. The mobile terminal can read data from not only the sensors in the Arduino board but also wiki pages on the Internet. The input data may be processed by the data processor of this paper. The processed data may be sent to a wiki page. The mobile terminal can control the actuators of the Arduino board by reading commands on the wiki page or by running the program of the processor. This system realizes an open communication forum for not only people but also for machines.


Advances in Software Engineering | 2012

A simple application program interface for saving java program data on a wiki

Takashi Yamanoue; Kentaro Oda; Koichi Shimozono

A simple application program interface (API) for Java programs running on a wiki is implemented experimentally. A Java program with the API can be running on a wiki, and the Java program can save its data on the wiki. The Java program consists of PukiWiki, which is a popular wiki in Japan, and a plug-in, which starts up Java programs and classes of Java. A Java applet with default access privilege cannot save its data at a local host. We have constructed an API of applets for easy and unified data input and output at a remote host. We also combined the proposed API and the wiki system by introducing a wiki tag for starting Java applets. It is easy to introduce new types of applications using the proposed API. We have embedded programs such as a simple text editor, a simple music editor, a simple drawing program, and programming environments in a PukiWiki system using this API.


international symposium on wikis and open collaboration | 2011

PukiWiki-Java Connector, a simple API for saving data of Java programs on a wiki

Takashi Yamanoue; Kentaro Oda; Koichi Shimozono

Experimental implementation of SDK for Java programs, PukiWiki-Java Connector, which makes an illusion that wiki pages as persistent data store, is shown. A Java program of them can be running on a wiki page and it can save its data on the page. The Java program consists of PukiWiki which is a popular wiki in Japan, the plug-in which starts up Java Applets. A Java Applet with default access privilege cannot store its data at the local host. We have constructed the API for the applets to ease data persistent at a remote host. We also combined the API and the wiki system by introducing a wiki plugin and tags for starting up Java Applets. Applet generated persistent data resides in wiki texts side by side. We have successfully ported useful programs such as a simple text editor, a simple music editor, a simple draw program and programming environments in a PukiWiki system using this connector.


symposium on applications and the internet | 2012

A Casual Network Security Using a Portable Sensor Device and Wiki Software

Takashi Yamanoue; Kentaro Oda; Koichi Shimozono

A casual network security monitoring system is proposed in this paper. The system is easy to deploy without reconfiguring the central network infrastructure, the firewall, and the intrusion detector system (IDS) of an organization. A virus-infected host, which is hidden by the network address translator (NAT) of a sub LAN, can be identified easily by using this monitoring system with the IDS. This monitoring system consists of a portable sensor device and a web site with wiki software. The portable sensor device, which is located on a target LAN that may have virus-infected hosts, is remote-controlled by a network managers commands. The commands and the results are written on a wiki page.


Archive | 2014

Experimental Implementation of a M2M System Controlled by a Wiki Network

Takashi Yamanoue; Kentaro Oda; Koichi Shimozono

Experimental implementation of a M2M system, which is controlled by a wiki network, is discussed. This M2M system consists of mobile terminals at remote places and wiki servers on the Internet. A mobile terminal of the system consists of an Android terminal and it may have an Arduino board with sensors and actuators. The mobile terminal can read data from not only the sensors in the Arduino board but also wiki pages of the wiki servers. The mobile terminal can control the actuators of the Arduino board or can write sensor data to a wiki page. The mobile terminal performs such reading writing and controlling by reading and executing commands on a wiki page, and by reading and running a program on the wiki page, periodically. In order to run the program, the mobile terminal equipped with a data processor. After placing mobile terminals at remote places, the group of users of this system can control the M2M system by writing and updating such commands and programs of the wiki network without going to the places of the mobile terminals. This system realizes an open communication forum for not only people but also for machines .


siguccs: user services conference | 2015

A Wearable LED Matrix Sign System Which Shows a Tweet of Twitter and Its Application to Campus Guiding and Emergency Evacuation

Takashi Yamanoue; Keiichiro Yoshimura; Kentaro Oda; Koichi Shimozono

A Wearable LED matrix sign system which shows a tweet of Twitter is discussed. The wearable LED matrix sign of the system is a mobile sign and it can be located any place any time, if a person wears the sign and goes there at the time. The wearable LED matrix sign can be controlled from a remote place by a manager because its contents can be modified using Twitter. The manager also can know where is the LED matrix sign using the GPS function of the LED matrix sign or calling the person who wears the sign. The LED matrix sign system can be used for special events such as conferences on a campus. It also can be used for emergency evacuation.


computer software and applications conference | 2014

A Technique to Assign an Appropriate Server to a Client, for a CDN Consists of Servers at the Global Internet and Hierarchical Private Networks

Takashi Yamanoue; Yuuri Koarata; Kentaro Oda; Koichi Shimozono

This paper discusses a technique to assign an appropriate server to a client for a content delivery network (CDN). We assume that the CDN consists of not only servers in the global Internet but also servers in hierarchical private networks. To use a common web browser as the client, this technique does not use broadcasting or multicasting. When a client is placed in a private network and a server of the CDN is also placed in the same private network, the client is connected to the server automatically by using this technique. When a client is placed in a private network and no CDN server is in the private network, or when the client is placed in the global network, the client is connected to a server in the global network automatically. This technique could improve the bandwidth between a server and a client when they are placed in the same private network because the TCP bandwidth heavily depends on latency. The CDN user does not need to know the location of a server. This technique does not use DNS because a CDN server in a private network is not always registered in the DNS.


international conference on transport systems telematics | 2011

Safety Driving Assessment Based on Video Image Sequence Analysis

Toyohiro Hayashi; Kentaro Oda; Tomohito Wada; Shuichi Enokida

In this paper, a driving assessment mechanism based on video image sequence analysis techniques, such as traffic signs and road markings detection, and inter-vehicular distance estimation, is proposed. A smart device connected to 3G wireless networks is used to collect and send sensory information. These data are analyzed in a cloud computing infrastructure to evaluate personal driving assessment. The traffic signs detection realized by utilizing SIFT feature descriptor and the inter-vehicular distance estimation technique based on simple geometric constraints, are shown in detail.


siguccs: user services conference | 2013

Enhancing information security of a university using computer ethics video clips, managed security service and an information security management system

Takashi Yamanoue; Tamotsu Furuya; Koichi Shimozono; Masato Masuya; Kentaro Oda; Kunihiko Mori

An experience of enhancing information security for the ICT service department of a Japanese national university corporation is described. Information security is realized by the integration of people, processes, and technology. In order to enhance the peoples side of information security, we have been using digital video clips, which are produced by a group of faculty members of Japanese universities. In order to enhance the technology side of information security, we have been using a managed security service and other means. We could reach 24 hours a day and 365 days a year monitoring at the doorway of the university using the service. However, we had no standard means to enhance the process side of information security until recently. This deficiency became an obstacle to making agreements between other universities on inter-university activities. This need also may be an obstacle to gaining reliance from users. In order to cope with this problem, we have decided to implement an information security management system (ISMS). It takes a lot of time and work to implement the ISMS. However, many parts of the ISMS were processes that we were already doing without any clear rules. The ISMS helps not only enhance information security but also improve daily work and management of the staff.


international conference on transport systems telematics | 2011

Cloud Drive: A Computing Architecture for a Scalable Driving Safety Management System

Kentaro Oda; Toyohiro Hayashi; Shinobu Izumi; Tomohito Wada; Shuichi Enokida

In Japan, taxi, bus, and cargo truck operation companies are required by law to commit to driving safety management. Driving safety management is achieved by a cyclic process consisting of collecting sensory information, assessing driving safety, and improving driving based on the results. At this time, this is performed by transport company personnel. In this paper, an architecture and its implementation for a scalable driving safety management system are proposed. The system consists of smart devices and services provided by a cloud computing infrastructure. The smart devices are connected to 3G wireless networks used to collect and send sensory information such as video image sequences, acceleration, and GPS data. The services available in the cloud computing infrastructure are a time-series sensory data storage service, image analysis service for driving assessment, and real-time feedback service.

Collaboration


Dive into the Kentaro Oda's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shuichi Enokida

Kyushu Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Toyohiro Hayashi

Kyushu Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge