Toshihiro Uchibayashi
Kyushu Sangyo University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Toshihiro Uchibayashi.
international conference on computational science and its applications | 2013
Toshihiro Uchibayashi; Bernady O. Apduhan; Norio Shiratori
Hybrid cloud has been considered a viable option to address the unavailability and/or limited resources of an inhouse private cloud as per users requirements or at runtime. The approach is poised to highly benefit the user in terms of procuring the required resources and/or the time element. With many companies offering different features of public cloud services, even if such service is of the same type, the quest to discover and select the suitable public cloud service provider is of utmost importance. This paper proposed anagent-based support system to discover the most suitable public cloud service provider based on the users requirements. Agents and ontologies were used to implement the proposed model. Verification test results demonstrates the viability and usefulness of the system.
Journal of Multimedia | 2008
Toshihiro Uchibayashi; Bernady O. Apduhan; Itsujiro Arita
In visual secret sharing (VSS) schemes, a secret image can be visually revealed from overlapping shadow images without additional computations. However, the contrast of reconstructed image is much lost. Employing reversing operation to reverse black and white pixels as well as increasing encoding runs is an effective way to improve the contrast. A novel VSS scheme with reversing is presented in this paper. It achieves really ideal contrast within only [m/h] encoding runs (where m and h are the number of the total columns and the number of the wholewhite columns in the basis matrix to encode white pixels, respectively) and no pixel expansion occurs. It encodes the secret image block by block. A block consists of m pixels, which means that m pixels together join into each encoding step. It is suitable for all access structures and can be applied to encrypt black-white, gray-scale and chromatic images. The experimental results, analyses and comparisons show that the proposed scheme is optimal among those schemes with reversing in encoding runs, pixel expansion, complexity, system capacity and encoding efficiency.
international conference on computational science and its applications | 2015
Toshihiro Uchibayashi; Bernady O. Apduhan; Norio Shiratori
The continuing advances in cloud computing technology, infrastructures, applications, and hybrid cloud have led to provide solutions to challenges in big data and high performance computing applications. The increasing number of cloud service providers offering cloud services with non-uniform descriptions has made it time consuming to find the best match service with the user’s requirements.
international conference on computational science and its applications | 2014
Toshihiro Uchibayashi; Bernady O. Apduhan; Norio Shiratori
The cloud computing paradigm with its pay-as-you-use business model is envisioned to provide immense benefits and promising returns. Hybrid cloud computing deployment model offers a viable solution of in-house private cloud with limited or unavailable resources on hand to meet the application requirements or at runtime. However, due to the large-scale, widely distributed and complexity of the underlying infrastructure, the cloud system is vulnerable to failures which are of great concern to users which may jeopardize the reliability and availability of cloud services. This paper describes our work-in-progress on using ontology and agents to provide support to achieve resiliency in hybrid cloud computing. Preliminary experimental evaluation provided promising results and insights on some important issues for future research directions.
Telecommunication Systems | 2014
Toshihiro Uchibayashi; Bernady O. Apduhan; Norio Shiratori
Sub-ontology, as the name implies, is a subset of an ontology tailored for a specific domain. Large-scale ontology data can be optimized by extracting the required sub-ontology. Sub-ontology extraction that reflects the user requirements is one method of addressing the issue. Here, sub-ontology extraction methods are called sub-ontology optimization schemes. In this paper, we develop a visual view for users to adopt sub-ontology extraction methods with a particular aim of providing users a front-end tool to perform a particular sub-ontology extraction. Likewise, we construct a Semantic Grid prototype environment to extract the sub-ontology and conducted preliminary evaluation through illustrations using the UMLS Semantic Network. Functional evaluations provided promising results to pursue further experiments and studies on the problem issue.
International Journal of Web Information Systems | 2013
Toshihiro Uchibayashi; Bernady O. Apduhan; Norio Shiratori
Purpose – Hybrid cloud computing is considered a viable and cost-effective approach to satisfy the inability of a private cloud to meet the user requirements. The information status of the selected public cloud service may change at runtime which should be reflected at the broker server database. This research illustrates a mechanism to assist the IaaS discovery system to assess the status change of the selected public cloud service and to update the broker server database. The paper aims to discuss these issues. Design/methodology/approach – A prototype was developed with the broker server as the main component in the service discovery system containing the status information of the selected public cloud service. The merge-ontology and patch-update methods were proposed, the processing cost details of each were measured, and the methods were evaluated. Findings – Experimental results showed that in the merge update, the merging process incurred much longer time than its required communication, contributi...
acm symposium on applied computing | 2009
Shinobu Izumi; Toshihiro Uchibayashi; Takaichi Yoshida
This paper aims to propose our study of system model design for a Web 3D disabled access GIS. The disabled access GIS provides the disabled with information on barriers and barrier-free modifications in consideration of their abilities and psychologies. We model the system for web-based accesses. It enhances its reusability and mash-up capability. Our model clearly divides database access, server-side service and client-side user interface. We implemented desktop client and mobile phone client to examine the model.
international conference on computational science and its applications | 2017
Toshihiro Uchibayashi; Yuichi Hashi; Seira Hidano; Shinsaku Kiyomoto; Bernady O. Apduhan; Toru Abe; Takuo Suganuma; Masahiro Hiji
In this paper, we propose a data protection mechanism for live migration process. The proposed data protection mechanism verifies whether it is permitted to copy the data of from the migration source application to the migration destination based on the contents of the regulations concerning the use of the data issued by the organization and the country at the time of during the live migration procedures. This mechanism performs live migration only when copying is permitted. By applying this mechanism, it is possible to use appropriate data while protecting privacy during the live migration process. Detailed explanation and implementation evaluation of the data protection mechanism were carried out. As a result, we observed that the mechanism did not exhibit adverse effects on the live migration process.
international symposium on computing and networking | 2016
Yuichi Hashi; Toshihiro Uchibayashi; Seira Hidano; Shinsaku Kiyomoto; Abdur Rahim; Takuo Suganuma; Masahiro Hiji
This paper presents a data protection mechanism for a live migration process. The proposed data protection mechanism verifies whether it is permissible for the data of an application of a movement source to be duplicated to a movement destination based on the contents of regulations related to data use issued by organizations and countries at the start of a live migration process. The mechanism executes live migration only when duplication is permitted. This mechanism makes appropriate data use possible while protecting privacy during a live migration process.
international symposium mobile internet security | 2016
Seira Hidano; Shinsaku Kiyomoto; Abdur Rahim Biswas; Toshihiro Uchibayashi; Takuo Suganuma
The iKaaS (intelligent Knowledge-as-a-Service) platform unitarily manages the data on existing cloud systems, which allows applications to access their desired data scattered all over the world transparently. Hidano et al. have proposed an access control mechanism suitable for the iKaaS platform to resolve privacy issues on the transfer of personal data to the applications in different countries. They introduced the concept of a privacy certificate authority (CA) to provide support for confirming the validity of the application. The privacy CA is established for each country as the executive agency responsible for the national regulations governing the handling of personal data. In this paper, we design a hierarchical model of multiple privacy CAs responsible for regulations where the areas governed by these regulations are different. The data transfer can be thereby controlled not only for different countries, but also for different economic or political blocs (e.g., European Union) or cities. In addition, focusing on a town management application as a use case of the iKaaS platform, we present how our access control mechanism works.