Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yoshimichi Watanabe is active.

Publication


Featured researches published by Yoshimichi Watanabe.


society of instrument and control engineers of japan | 2016

A method of program refactoring based on code clone detection and impact analysis

Masakazu Takahashi; Reiji Nanba; Yunarso Anang; Tatsuya Uchiyama; Yoshimichi Watanabe

This paper proposes a method that aggregates similar portions in a program into one common portion and redesigns current program structure to appropriate program structure. When a new function is added to an existing program, the function tends to be developed by copying & pasting a portion in the program and modifying its portion. As a result, it becomes to exist many similar portions in the program. In the case that error modifications or changes occurs in the similar portion, appropriate modifications are required to the all similar portions. It would be considered that the quality and efficiency of those tasks are decreased. So that, this paper proposes a method that detect similar portions with minor modifications and a method that aggregates those similar portions to one appropriate common portion with well-defined program structure. As a result, current program becomes to be refined to the program that can accommodate future modification or changes properly.


Complex Systems Informatics and Modeling Quarterly | 2016

A Method for Software Requirement Volatility Analysis Using QFD

Yunarso Anang; Masakazu Takahashi; Yoshimichi Watanabe

Changes of software requirements are inevitable during the development life cycle. Rather than avoiding the circumstance, it is easier to just accept it and find a way to anticipate those changes. This paper proposes a method to analyze the volatility of requirement by using the Quality Function Deployment (QFD) method and the introduced degree of volatility. Customer requirements are deployed to software functions and subsequently to architectural design elements. And then, after determining the potential for changes of the design elements, the degree of volatility of the software requirements is calculated. In this paper the method is described using a flow diagram and illustrated using a simple example, and is evaluated using a case study.


ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues | 2006

Maintaining data consistency of XML databases using verification techniques

Khandoker Asadul Islam; Yoshimichi Watanabe

XML document is a very popular way to transfer data between databases because of its simplicity of structure and text based data storage. In some typical implementation scenarios where XML document is used to transfer data as XML database, it is necessary to check the consistency of the data at destination. If users are responsible for storing and transferring the document, there is a possibility of data manipulation. In this paper, we propose to apply data verification techniques including checksum and hash algorithms for data verification of XML document. As an advantage, we show that we not only can check the documents authenticity, but also we can identify the specific modified portions of the document. We discuss many popular checksum techniques and secured hash algorithms applied to XML document and compare their efficiency on data verification in the scenarios of the XML data transfer.


Archive | 2008

Confidential communication method

Haruaki Yamazaki; Hidetoshi Mino; Yoshimichi Watanabe


Archive | 2008

Steganographic communication method

Hidetoshi Mino; Yoshimichi Watanabe; Haruaki Yamazaki; 晴明 山崎; 喜道 渡辺; 英俊 美濃


sice journal of control, measurement, and system integration | 2017

An Improvement Method for Program Structure Using Code Clone Detection, Impact Analysis, and Refactoring Formats

Masakazu Takahashi; Reiji Nanba; Yunarso Anang; Yoshimichi Watanabe


ieee/sice international symposium on system integration | 2016

A study of methodology for securing control software based FMEA-FTA coordination

Masakazu Takahashi; Riki Kosaka; Reiji Nanba; Yunarso Anang; Yoshimichi Watanabe


REFSQ Workshops | 2016

Applying Layering Concept to the Software Requirements Analysis and Architectural Design.

Yunarso Anang; Yoshimichi Watanabe


Archive | 2010

An Approach of Query Request Authorization Process for the Access Control System to XML Documents

Khandoker Asadul Islam; Yoshimichi Watanabe


Archive | 2008

Verfahren für vertrauliche kommunikation

Haruaki Yamazaki; Hidetoshi Mino; Yoshimichi Watanabe

Collaboration


Dive into the Yoshimichi Watanabe's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Reiji Nanba

Daiichi Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Riki Kosaka

University of Yamanashi

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge