Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Masahiko Sano is active.

Publication


Featured researches published by Masahiko Sano.


ieee international conference on high performance computing data and analytics | 1997

Design of a processing element of a SIMD computer for genetic algorithms

Tomio Inoue; Masahiko Sano; Yoshizo Takahashi

We have been investigating the efficiency of genetic algorithms (GA) for solving for a variety of real problems. During our investigations we have concluded that the large amount of computational time required to find GA based solutions on conventional computers is restrictive. We are therefore developing an innovative new computer architecture, suitable for the solution of large scale problems using GAs. In this paper we introduce the SIMD-GA (Single Instruction stream Multiple Data stream Genetic Algorithm), and discuss its hardware design and implementation. By taking advantage of the recent advances is HDLs (Hardware Description Language) and FPGAs (Field Programmable Gate Array) we have been able to quickly develop and prototype a PE (Processing Element) for a SIMD-GA. This approach allows us to build a cost-effective parallel processing architecture to overcome the problem of the computational time required for traditional sequential GA implementation.


international symposium on computing and networking | 2014

Design and Implementation of Organizational Authorization for a Network Monitoring System

Kenji Matsuura; Yosuke Seki; Masahiko Sano; Tetsushi Ueta

This paper describes a new proposal on the flexible authorization function based on the organizational hierarchy. We apply the function to a network monitoring system, which we have installed. Todays organization for the network administration at an institute has the hierarchical nature of a tree structure according to the inheriting responsibility of the role and its associated privilege. The administrative hierarchy is well associated to the structure of the network segments when they belong to a sub-organizational unit. Therefore, we design the authorization function with an unified authentication and deploy it for the network monitoring system based on the hierarchy.


international conference on advanced applied informatics | 2017

Improving Document Availability in Storage

Hiroki Tanioka; Takafumi Bando; Kenji Matsuura; Kenji Ohira; Masahiko Sano; Tetsushi Ueta

This paper provides a case study of improving availability for searching documents in an academic facility. Every day some documents are needed for our business and academic activities in the Center for Administration of Information Technology (AIT) in Tokushima University. AIT has been employing and operating Information Security Management System (ISMS) since 2014. ISMS requires to maintain Confidentiality, Integrity and Availability. Particularly, AIT places importance on Availability. However, time-consuming is a problem to find documents in the daily operation. A case study was conducted to put a full-text search engine in the facility, considering the objective and efficiency about finding documents in the file-server. In the process, it was found out that document freshness is important to academic office workers for their job. Then, the effectiveness of a score of TF-IDF with document freshness was assessed. Therefore, availability for finding documents was significantly improved using a full-text search engine with document freshness.


computer software and applications conference | 2017

Research on Integrated Authentication Using Passwordless Authentication Method

Michitomo Morii; Hiroki Tanioka; Kenji Ohira; Masahiko Sano; Yosuke Seki; Kenji Matsuura; Tetsushi Ueta

Currently, authentication methods using ID and password are widely used and fulfilled central roles in various information systems and services. Our university also uses ID and password for authentication of most services. However, passwords have various problems such as reuse, phishing and leakage. This research is a practical experiment in order to implement an integrated authentication system without password. Shibboleth is introduced to our university, providing capabilities of web single sign-on and attribute exchange framework for organizational services. The Fast IDentity Online (FIDO) is adopted into Shibboleth as an external authentication, to realize passwordless authentication. Furthermore, we held a feasibility test of an integrated authentication system without password, and considered problems of the passwordless authentication method using FIDO.


ieee global conference on consumer electronics | 2016

A route navigation system for reducing risk of traffic accidents

Ryo Takeno; Yosuke Seki; Masahiko Sano; Kenji Matsuura; Kenji Ohira; Tetsushi Ueta

We develop a navigation system considering traffic accident risk. After putting the start and goal points by a user, the system suggests a detour; a better route contains low risk against traffic accidents. Users can also contribute to register risk values to the dangerous points. We define cost functions to generate reasonable and safer route paths within the given geometrical area. The system was evaluated by examinees with field tests, then marginal reputations from them.


asia pacific network operations and management symposium | 2015

Providing flexible authorization for shared group spaces by the attribute registration system

Yosuke Seki; Kenji Matsuura; Masahiko Sano; Tetsushi Ueta

We add flexibility to the authorization with Shibboleth by featuring a system managing additional attributes. The system offers an interface and a database to privileged administrators. When any temporary groups or projects are created, a proper set of users are assigned to them without modifying the IdP backends.


parallel computing | 1998

An Enhancement of SIMD Machine for Executing SPMD Programs

Yoshizo Takahashi; Masahiko Sano; Tornio Inoue

While SIMD machine is appraised because of simplicity in structure that fits the massively parallel systems, its programming is limited to depend on inflexible data-parallel paradigm. In order to adapt SIMD machine to more flexible SPMD paradigm for MIMD machine, a new branching mechanism is introduced.


E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education | 2006

Construction and Operation of a Portal System at Tokushima University

Kazuhide Kanenishi; Kenji Matsuura; Takahiro Oie; Yasuo Miyoshi; Masahiko Sano; Yone Yano


Ieej Transactions on Electrical and Electronic Engineering | 2018

A questionnaire system with an authentication framework considering online activities of users: QUESTIONNAIRE SYSTEM WITH AN AUTHENTICATION FRAMEWORK

Yosuke Seki; Kenji Matsuura; Masahiko Sano; Tetsushi Ueta


B - Abstracts of IEICE TRANSACTIONS on Communications (Japanese Edition) | 2018

A Method to Detect Rogue Access Points in a Campus without Decrypting WLAN Frames

Tomohiro Takeda; Kenji Ohira; Hiroki Tanioka; Masahiko Sano; Kenji Matsuura; Tetsushi Ueta

Collaboration


Dive into the Masahiko Sano's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yosuke Seki

University of Tokushima

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tomio Inoue

University of Tokushima

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ryo Takeno

University of Tokushima

View shared research outputs
Top Co-Authors

Avatar

Takahiro Oie

University of Tokushima

View shared research outputs
Top Co-Authors

Avatar

Tornio Inoue

University of Tokushima

View shared research outputs
Researchain Logo
Decentralizing Knowledge