Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Toshihiro Uchibayashi is active.

Publication


Featured researches published by Toshihiro Uchibayashi.


international conference on computational science and its applications | 2013

A Framework of an Agent-Based Support System for IaaS Service Discovery

Toshihiro Uchibayashi; Bernady O. Apduhan; Norio Shiratori

Hybrid cloud has been considered a viable option to address the unavailability and/or limited resources of an inhouse private cloud as per users requirements or at runtime. The approach is poised to highly benefit the user in terms of procuring the required resources and/or the time element. With many companies offering different features of public cloud services, even if such service is of the same type, the quest to discover and select the suitable public cloud service provider is of utmost importance. This paper proposed anagent-based support system to discover the most suitable public cloud service provider based on the users requirements. Agents and ontologies were used to implement the proposed model. Verification test results demonstrates the viability and usefulness of the system.


Journal of Multimedia | 2008

Navilite: a lightweight indoor location-aware mobile navigation service for the handicapped and the elderly

Toshihiro Uchibayashi; Bernady O. Apduhan; Itsujiro Arita

In visual secret sharing (VSS) schemes, a secret image can be visually revealed from overlapping shadow images without additional computations. However, the contrast of reconstructed image is much lost. Employing reversing operation to reverse black and white pixels as well as increasing encoding runs is an effective way to improve the contrast. A novel VSS scheme with reversing is presented in this paper. It achieves really ideal contrast within only [m/h] encoding runs (where m and h are the number of the total columns and the number of the wholewhite columns in the basis matrix to encode white pixels, respectively) and no pixel expansion occurs. It encodes the secret image block by block. A block consists of m pixels, which means that m pixels together join into each encoding step. It is suitable for all access structures and can be applied to encrypt black-white, gray-scale and chromatic images. The experimental results, analyses and comparisons show that the proposed scheme is optimal among those schemes with reversing in encoding runs, pixel expansion, complexity, system capacity and encoding efficiency.


international conference on computational science and its applications | 2015

Towards a Cloud Ontology Clustering Mechanism to Enhance IaaS Service Discovery and Selection

Toshihiro Uchibayashi; Bernady O. Apduhan; Norio Shiratori

The continuing advances in cloud computing technology, infrastructures, applications, and hybrid cloud have led to provide solutions to challenges in big data and high performance computing applications. The increasing number of cloud service providers offering cloud services with non-uniform descriptions has made it time consuming to find the best match service with the user’s requirements.


international conference on computational science and its applications | 2014

Towards a Resilient Hybrid IaaS Cloud with Ontology and Agents

Toshihiro Uchibayashi; Bernady O. Apduhan; Norio Shiratori

The cloud computing paradigm with its pay-as-you-use business model is envisioned to provide immense benefits and promising returns. Hybrid cloud computing deployment model offers a viable solution of in-house private cloud with limited or unavailable resources on hand to meet the application requirements or at runtime. However, due to the large-scale, widely distributed and complexity of the underlying infrastructure, the cloud system is vulnerable to failures which are of great concern to users which may jeopardize the reliability and availability of cloud services. This paper describes our work-in-progress on using ontology and agents to provide support to achieve resiliency in hybrid cloud computing. Preliminary experimental evaluation provided promising results and insights on some important issues for future research directions.


Telecommunication Systems | 2014

A domain specific sub-ontology derivation end-user tool for the Semantic Grid

Toshihiro Uchibayashi; Bernady O. Apduhan; Norio Shiratori

Sub-ontology, as the name implies, is a subset of an ontology tailored for a specific domain. Large-scale ontology data can be optimized by extracting the required sub-ontology. Sub-ontology extraction that reflects the user requirements is one method of addressing the issue. Here, sub-ontology extraction methods are called sub-ontology optimization schemes. In this paper, we develop a visual view for users to adopt sub-ontology extraction methods with a particular aim of providing users a front-end tool to perform a particular sub-ontology extraction. Likewise, we construct a Semantic Grid prototype environment to extract the sub-ontology and conducted preliminary evaluation through illustrations using the UMLS Semantic Network. Functional evaluations provided promising results to pursue further experiments and studies on the problem issue.


International Journal of Web Information Systems | 2013

An ontology update mechanism in IaaS service discovery system

Toshihiro Uchibayashi; Bernady O. Apduhan; Norio Shiratori

Purpose – Hybrid cloud computing is considered a viable and cost-effective approach to satisfy the inability of a private cloud to meet the user requirements. The information status of the selected public cloud service may change at runtime which should be reflected at the broker server database. This research illustrates a mechanism to assist the IaaS discovery system to assess the status change of the selected public cloud service and to update the broker server database. The paper aims to discuss these issues. Design/methodology/approach – A prototype was developed with the broker server as the main component in the service discovery system containing the status information of the selected public cloud service. The merge-ontology and patch-update methods were proposed, the processing cost details of each were measured, and the methods were evaluated. Findings – Experimental results showed that in the merge update, the merging process incurred much longer time than its required communication, contributi...


acm symposium on applied computing | 2009

Designing of a system model for web 3D disabled access GIS on web 2.0

Shinobu Izumi; Toshihiro Uchibayashi; Takaichi Yoshida

This paper aims to propose our study of system model design for a Web 3D disabled access GIS. The disabled access GIS provides the disabled with information on barriers and barrier-free modifications in consideration of their abilities and psychologies. We model the system for web-based accesses. It enhances its reusability and mash-up capability. Our model clearly divides database access, server-side service and client-side user interface. We implemented desktop client and mobile phone client to examine the model.


international conference on computational science and its applications | 2017

A Control Mechanism for Live Migration with Data Regulations Preservation

Toshihiro Uchibayashi; Yuichi Hashi; Seira Hidano; Shinsaku Kiyomoto; Bernady O. Apduhan; Toru Abe; Takuo Suganuma; Masahiro Hiji

In this paper, we propose a data protection mechanism for live migration process. The proposed data protection mechanism verifies whether it is permitted to copy the data of from the migration source application to the migration destination based on the contents of the regulations concerning the use of the data issued by the organization and the country at the time of during the live migration procedures. This mechanism performs live migration only when copying is permitted. By applying this mechanism, it is possible to use appropriate data while protecting privacy during the live migration process. Detailed explanation and implementation evaluation of the data protection mechanism were carried out. As a result, we observed that the mechanism did not exhibit adverse effects on the live migration process.


international symposium on computing and networking | 2016

Data Protection for Cross-Border Live Migration in Multi-cloud Environment

Yuichi Hashi; Toshihiro Uchibayashi; Seira Hidano; Shinsaku Kiyomoto; Abdur Rahim; Takuo Suganuma; Masahiro Hiji

This paper presents a data protection mechanism for a live migration process. The proposed data protection mechanism verifies whether it is permissible for the data of an application of a movement source to be duplicated to a movement destination based on the contents of regulations related to data use issued by organizations and countries at the start of a live migration process. The mechanism executes live migration only when duplication is permitted. This mechanism makes appropriate data use possible while protecting privacy during a live migration process.


international symposium mobile internet security | 2016

Access Control for Cross-Border Transfer of Sensor Data

Seira Hidano; Shinsaku Kiyomoto; Abdur Rahim Biswas; Toshihiro Uchibayashi; Takuo Suganuma

The iKaaS (intelligent Knowledge-as-a-Service) platform unitarily manages the data on existing cloud systems, which allows applications to access their desired data scattered all over the world transparently. Hidano et al. have proposed an access control mechanism suitable for the iKaaS platform to resolve privacy issues on the transfer of personal data to the applications in different countries. They introduced the concept of a privacy certificate authority (CA) to provide support for confirming the validity of the application. The privacy CA is established for each country as the executive agency responsible for the national regulations governing the handling of personal data. In this paper, we design a hierarchical model of multiple privacy CAs responsible for regulations where the areas governed by these regulations are different. The data transfer can be thereby controlled not only for different countries, but also for different economic or political blocs (e.g., European Union) or cities. In addition, focusing on a town management application as a use case of the iKaaS platform, we present how our access control mechanism works.

Collaboration


Dive into the Toshihiro Uchibayashi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Itsujiro Arita

Kyushu Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge