Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Tatsuji MUNAKA"'
Autor:
Nobuyuki Tanaka, Tatsuji Munaka, Joao Filipe Papel, Shun-ichi Hattori, Toshiya Iwamatsu, Teruhisa Miura, Fujio Tsutsumi
Publikováno v:
Asian Journal of Atmospheric Environment, Vol 17, Iss 1, Pp 1-15 (2023)
Abstract In Japan, the number of elderly people in need of nursing care is increasing while the population of young people is decreasing, and the potential for labor shortages in the field of elder care is of great concern. This study aimed to estima
Externí odkaz:
https://doaj.org/article/cd9fa3eeda9745beb6717f1f414a155b
Autor:
Nobuyuki Tanaka, Tatsuji Munaka
Publikováno v:
Asian Journal of Atmospheric Environment, Vol 15, Iss 4, Pp 1-11 (2021)
Abstract Volatile organic compounds (VOCs), CO2, temperature, and humidity in a private room in a care facility for the elderly were measured and the behavior of a resident and staff were recorded in order to clarify the effects of the resident’s b
Externí odkaz:
https://doaj.org/article/476d978d1fe94ac29e6586e4cc8064b6
Autor:
João Filipe PAPEL, Tatsuji MUNAKA
Publikováno v:
IEICE Transactions on Information and Systems. :450-458
Autor:
Tatsuji Munaka, Nobuyuki Tanaka
Publikováno v:
Asian Journal of Atmospheric Environment, Vol 15, Iss 4, Pp 1-11 (2021)
Volatile organic compounds (VOCs), CO2, temperature, and humidity in a private room in a care facility for the elderly were measured and the behavior of a resident and staff were recorded in order to clarify the effects of the resident’s behavior,
Publikováno v:
Journal of Information Processing. 28:658-665
Publikováno v:
IEEJ Transactions on Electronics, Information and Systems. 134:156-167
Publikováno v:
ICUFN
recently, utilizing ICT is a key of success in every field of industries, and its importance is growing more and more. Typical example is introducing ERP software which assists decision making of stakeholders by providing data regarding running busin
Autor:
Yusuke Sakai, Mitsugu Iwamoto, Mitsuhiro Hattori, Kazuo Ohta, Nori Matsuda, Takato Hirano, Yutaka Kawai, Tatsuji Munaka
Publikováno v:
Advances in Information and Computer Security ISBN: 9783319445236
IWSEC
IWSEC
In searchable symmetric encryption (SSE), adding documents to a database is an indispensable functionality in real situations, and there are two approaches for executing the process: One approach is to update the encrypted index, and the other is to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::07653e231c440f086354b9043b5c3af4
https://doi.org/10.1007/978-3-319-44524-3_6
https://doi.org/10.1007/978-3-319-44524-3_6
Publikováno v:
Cryptology and Network Security ISBN: 9783319268224
CANS
CANS
Searchable encryption (SE) in the public key setting is that anyone can encrypt data by using a public key and store this ciphertext on a server, and a client who has the corresponding secret key can generate search queries (say, trapdoor) in order t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e4e9abc953f2d86cbd2fbd8e06954455
https://doi.org/10.1007/978-3-319-26823-1_6
https://doi.org/10.1007/978-3-319-26823-1_6
Publikováno v:
IPSJ Digital Courier. 2:57-69
A link layer protocol based on SR (Selective-Repeat) ARQ (Automatic Repeat reQuest) is required to achieve high performance over a lossy and large delay link. In spite of its effectiveness, SR ARQ has problems of large resequencing delay and bursty p