Kyushu University Academic Staff Educational and Research Activities Database
Researcher information (To researchers) Need Help? How to update
Eisuke Ito Last modified date:2024.04.12



Graduate School
Undergraduate School
Other Organization


E-Mail *Since the e-mail address is not displayed in Internet Explorer, please use another web browser:Google Chrome, safari.
Homepage
https://kyushu-u.elsevierpure.com/en/persons/eisuke-ito
 Reseacher Profiling Tool Kyushu University Pure
http://ri2t.kyushu-u.ac.jp/~itou/index-e.html
Research Institute for Information Technology .
Academic Degree
Ph.D (Information Science)
Country of degree conferring institution (Overseas)
No
Field of Specialization
Information Science, Distributed System, Information search, Web service, Digital Authenticaion and Authorization
ORCID(Open Researcher and Contributor ID)
https://orcid.org/0000-0002-2045-2704
Total Priod of education and research career in the foreign country
00years00months
Outline Activities
* Research
- Information retrieval/recommendation/extraction/integraion/mining
- Cloud computing
- Development for web based services
- Research and development of digital library and e-library
- Research and Development of Certification and Authentication system
* Education
- Graduate school of ISEE , Kyushu University.
- Research with master course students, master thesis.
- Lecture: Information security and cryptography.
- Programing 1 (C Language) for undergraduate students.
* Jobs
- Works at Research Institute for IT and i-Cube( Information Infrastructure Initiative).
- Administration of campus cloud, campus authentication platform, and e-mail service.
- Co-researcher of library's research and development section.
Research
Research Interests
  • Implementation of verifiable credential based student/staff ID
    keyword : verifiable credential, Shibboleth distributed web authentication
    2023.04~2025.03.
  • Big data analysis
    keyword : big data, document data, distributed system, statistics, cloud computing
    2012.06.
  • Trend Analysis of online contents
    keyword : Net contents, online contents, movie, novel, tweet, trend analysis, sentiment analysis
    2018.04.
  • Diversity analysis of contents in consumer generated media
    keyword : content, consumer generated media, diversity, entropy, contents selection model
    2014.04~2018.03.
  • High quality content search based on collective intelligence
    keyword : collective intelligence, user generataed contents
    2011.04~2015.03.
  • Distributed authentication platform and authentication federation
    keyword : Certification, Authentication, Authorization, PKI, Federation, Network, Distributed system, SSO Single Sign-On
    2005.04~2012.03Development of flexible certification and authorization system for secure distributed information systems. I consider a federation framework for inter-domain services, and con-federation for global service. I also consider a flexible user authorization system using XML database..
  • e-resource business infrastructure with user authentication
    keyword : User authentication platform, protected e-resource, access control
    2009.04~2011.03.
  • Information retrieval/recommendation/extraction/integraion/mining
    keyword : Information retrieval, intelligence extraction, information integraion, web mining, recommendation
    2000.04Information retrieval/extraction/integration.
  • Similar item discovery from massive lists
    keyword : data mining, item list, web data
    2005.04~2006.03Data mining from massive item lists.
  • secure and controlled information sharing for tele-work
    keyword : secure information sharing
    2007.01~2009.03secure and controled information sharing.
Current and Past Project
  • High quality contents search based on collective intelligence
Academic Activities
Reports
1. Toward Next Generation Library Services -An Inspection of Advanced Libraries in Korea-.
Papers
1. Takuya Kawatani, Eisuke Itoh, Sachio Hirokawa, Tsunenori Mine, Location does not always determine sudden braking, 2019 IEEE Intelligent Transportation Systems Conference (ITSC), 10.1109/ITSC.2019.8917480, 27-30, 2019.11, Understanding conditions and situations causing sudden braking is important for preventing traffic accidents. Previous studies have used probe vehicle data to detect risky positions where sudden braking frequently occurred. However, they have mainly focused on vehicle-related factors. In this paper, we propose a novel method for discriminating sudden braking. Unlike previous studies, the method exhaustively explores probe data including temporal factors, constructs a large number of features combining pairs of feature names and their values, and applies the Support Vector Machine classifier and Feature Selection method to the features. To conduct the experiments, we used probe data provided by the Aizu-Wakamatsu City Open Data Utilization Verification Project. The proposed method discriminated sudden braking quite accurately, with a discrimination performance averaging an F1 measure of 93.2%. We also found that the probability of the occurrence of sudden braking is not always high at locations where sudden braking frequently occurred, but rather, temporal factors such as date and time, or day of week are strongly related to performance in discriminating sudden braking with high probability..
2. Takuya Kawatani, Eisuke Itoh, Sachio Hirokawa, Tsunenori Mine, Machine Learning and Visualization of Sudden Braking using Probe Data, 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), 10.1109/IIAI-AAI.2019.00024, 67-72, 2019.07, This paper presents a novel mining and visualizing tool that detects features to estimate sudden braking. The tool uses a machine learning and feature selection method to find the features exhaustively from combinations of the features which include not only vehicle-related factors, but also outer circumstances or temporal factors. The tool also obtains the locations inferred by the features detected. A normal way would first search for locations where sudden braking behavior frequently occurred, but it is not always true that the occurrence probability of sudden braking at the locations is high. On the other hand, our tool finds the locations related to sudden braking with high probability, more than 98%. Through the visualizing process, the features can be used as clues to find new factors which affect sudden braking..
3. Eisuke Ito, Yuya Honda, Sachio Hirokawa, Empathy factor mining from reader comments of e-manga, Proc. of eKnow2018 (The Tenth International Conference on Information, Process, and Knowledge Management), 107-112, 2018.03, The digitization of manga (Japanese comics) is currently progressing. In the past, expressions of manga have evolved in a way that is suitable for printing on paper. With the spread of smartphones, the expression of e-manga is developing at present. In this research, we focus on reader comments on e-mangas in Comico. Comico is a popular e-manga service. Similar to other online contents services, such as YouTube, Comico implements a user comments system. Readers can post comments easily, and the comments quickly reach others, including the manga creator. Comico recognizes that reader comments may influence the creator and the story of e-manga. In this research, we try to mine the empathy factor of readers for the story and the characters of e-manga. We collect reader comments and apply feature selection of SVM (Support Vector Machine) to mine empathy factors among readers..
4. Eisuke Ito, Yuya Honda, Keyword diversity trend of consumer generated novels, Proceedings of ICESS2017 (The Third International Conference on Electronics and Software Science), 2017.08, Recent years, CGM (Consumer Generated Me- dia), such as YouTube and nicovideo.jp for movies, syosetu.com for novel stories, become very popu- lar. A lot of contents are posted to CGM sites ev- ery day, and also a large number of users are en- joying posted contents. At present, some articles mentioned decreasing diversity of contents. Some posted new content may be similar with previous posted contents. The authors are afraid that de- creasing diversity of contents causes less energetic cultural activity. In this paper, the authors pro- posed two quantitative metrics of contents diversity, and applied them to the contents in syosetu.com. They focused the keywords which are given to the novel by the novel author, and calculated entropy and similarity of keywords. As the results, they ob- served increase of similarity, and it shows decrease of diversity of contents..
5. Kazuhisa Noguchi, Tomoya Iida, Eisuke Ito, An analysis of CGM contents pageview using SIR Model and GBM, Proceedings of ICCTD2017 (2017 8th International Conference on Computer Technologies and Development), 10.1145/3093241.3093264, 19-21, 2017.03, In consumer generated media (CGM) site, such as YouTube and nicovideo, only few contents are viewed very much, but most contents are only viewed few times. Our research target CGM sites are nicovideo.jp and syosetu.com. Nicovideo.jp is a popular movie CGM site in Japan and syosetu.com is the largest novel CGM site in Japan. We already found that pageview distribution of contents in both CGM sites follow a lognormal distribution. In this paper, we consider user’s content selection model which will lead lognormal distribution. We apply Geometric Brownian Motion model into SIR model. SIR model is used for simulation of population transition process or epidemic process of infection disease. In this paper, we report the results of some simulation..
6. Yoshiaki Kasahara, Takuya Kawatani, Eisuke Ito, Koichi Simozono, An Analysis of Relationship between Storage Usage Distribution and Per-User Quota Value, ACM, 10.1145/2974927.2974936, 153-158, 2016.11, To prevent resource (especially storage) shortage, information systems such as storage services and email services usually impose an upper bound of resource consumption (quota) per user. In a conservative way, an administrator tends to set a quota value such as the storage capacity divided by the expected maximum number of users for safety and fairness, but it tends to leave large unused storage space, because the users' storage usage pattern shows a long-tailed distribution. In this paper, we analyzed storage usage distribution of some email services to approximate the distribution using a power-law distribution, and proposed a method to calculate an optimal quota value from a target size of storage consumption to increase storage utilization. We applied an optimal quota value we calculated to a real email service and analyzed the effect of quota change. Then, we analyzed actual distributions further to find a better model to approximate the distribution, and found that a log-normal distribution explained the distribution better than power-law. We also analyzed two other universities' email service to find similar distribution in these systems..
7. Kyohei Kamihata, Eisuke Ito, A quantitative contents diversity analysis on a consumer generated media site,, International Society of Artificial Life and Robotics, 436-440, 2016.01, Recent years, CGM (Consumer Generated Media) services, such as YouTube and nicovideo, are growing into social contents communication media. A lot of movies are posted to a CGM site, and many users are viewing them every day. Some web news articles mentioned that the diversity of movie contents might decrease in CGM site. The authors believe that contents diversity is necessary to keep CGM site activity, and for cultural sustainability. The authors try to measure diversity of movie contents of a CGM site quantitatively. They propose two quantitative metrics of contents diversity, and apply them to a CGM contents in nicovideo.jp..
8. An analysis of disk usage before and after quota change.
9. Yoshiaki Kasahara, Naomi Fujimura, Eisuke Ito, Masahiro Obana, Introduction of Unchanging Student User ID for Intra-Institutional Information Service, ACM, 10.1145/2815546.2815578, 141-144, 2015.11, In Kyushu University, a traditional "Student ID" based on student number assigned by Student Affairs Department had been used as the user ID of various IT services for a long time. There were some security and usability concerns using Student ID as a user ID. Since Student ID was used as the e-mail address of the student, it was easy to leak outside. Student ID is constructed based on a department code and a serial number, so guessing other ID strings from one ID is easy. Student ID is issued at the day of the entrance ceremony, so it is not usable for pre-entrance education. Student ID will change when the student moves to another department or proceeds from undergraduate to graduate school, so he/she loses personal data when Student ID changes. To solve these problems, Kyushu University decided to introduce another unchanging user ID independent from Student ID. This paper reports the design of new user ID, ID management system we are using, and the effect of introduction of new user ID..
10. Yoshiaki Kasahara, Takuya Kawatani, Eisuke Ito, Koichi Simozono, Naomi Fujimura, Optimization of storage quota based on user’s usage distribution, IEEE, 10.1109/COMPSAC.2015.221, 149-154, 2015.07, To prevent shortage of storage space in a service system, an administrator usually set per-user quota as an upper limit of usable space for each user. To avoid service failure caused by resource exhaustion, the administrator tends to set a conservative quota value such as the storage capacity divided by the expected maximum number of users. In this research, we analyzed long-term storage usage history of our email system and file sharing system in Kyushu University. Mostly through the analyzed period, the usage pattern showed a long-tailed distribution similar to log-normal distribution. Also the overall storage consumption slowly increased during the analyzed period. Based on these analysis, we defined “storage utilization ratio” to evaluate how the storage was effectively used. By approximating a storage utilization pattern as a power-law distribution, we proposed a method to calculate the optimal quota value to maximize the utilization ratio..
11. Kensuke Baba, Toshiro Minami, Eisuke Ito, Modeling Changes in Demands for Books with Elapsed Time from Publication, Computational Science and Its Applications -- ICCSA 2015, 10.1007/978-3-319-21407-8, 9156, 172-181, 2015.06, Book selection in libraries should be conducted on the basis of analyses on circulation data. In addition to the number of loans, the change of the number over time can be a criterion for book selection. This paper proposes a model to represent the change of the number with the time from publication. The proposed model is applied to practical circulation data in a library and is evaluated in terms of the root mean square errors. As a result, the proposed model is suitable compared with the standard one. Additionally, this paper analyzes the differences of the changes between classified books which are obtained by the previous analysis. The information obtained by applying the proposed model to circulation data is expected to be utilized for book selection..
12. Jun Zeng, Brendan Flanagan, Sachio Hirokawa, Eisuke Ito, A Web Page Segmentation Approach Using Visual Semantics, The Institute of Electronics, Information and Communication Engineers (IEICE), E97-D, 2, 223-230, 2014.02, Web page segmentation has a variety of benefits and potential web applications. Early techniques of web page segmentation are mainly based on machine learning algorithms and rule-based heuristics, which cannot be used for large-scale page segmentation. In this paper, we propose a formulated page segmentation method using visual semantics. Instead of analyzing the visual cues of web pages, this method utilizes three measures to formulate the visual semantics: layout tree is used to recognize the visual similar blocks; seam degree is used to describe how neatly the blocks are arranged; content similarity is used to describe the content coherent degree between blocks. A comparison experiment was done using the VIPS algorithm as a baseline. Experiment results show that the proposed method can divide a Web page into appropriate semantic segments..
13. Eisuke Ito, Brendan Flanagan, CHENGJIU YIN, Tetsuya Nakatoh, Sachio Hirokawa, A Private Cloud Environment for Teaching Search Engine Construction, Proc. of ICCE2013 (The 21st International Conference on Computers in Education), 391-397, 2013.11, Kyushu University installed a private cloud system, named “campus cloud system”, using VCL and CloudStack. For a graduate school exercise course on web search engine, the authors prepared a virtual machine on VCL, which had apache web server and GETA indexer preinstalled. This paper introduces an outline of the cloud system, the exercise, and also reports advantages and disadvantages of cloud based education..
14. Eisuke Ito, Yoshiaki Kasahara, Naomi Fujimura, Implementation and operation of the Kyushu university authentication system, Proc. of ACM SIGUCCS 2013, 10.1145/2504776.2504788, 137-142, 2013.11, Nowadays, a university needs to build and maintain a central ID database and authentication system for better ICT (information and communication technology) services. In 2008, the headquarters of Kyushu University had defined medium-range policy of ICT infrastructure preparation, and the policy had indicated construction of a central authentication system. According to the policy, the authors elaborated an installation plan of the Kyu(Q)shu University authentication system (QUAS, for short). Since 2009, Information Infrastructure Initiative of Kyushu University, to which the authors belong, has been issuing ID cards to all employees, and also operating LDAP servers. This paper introduces the action plan and outline of QUAS. This paper also describes two recent topics of QUAS. One is high load of LDAP servers because of rapid increase of mobile devices, and the other one is development of a multifactor authentication Shibboleth Identity Provider (IdP)..
15. Eisuke Ito, Kazunori Shimizu, Sachio Hirokawa, Predicting Future Ranking of Online Novels based on Collective Intelligence, Proc. of ICDIPC2013 (The Third Int'l Conf on Digital Info. Processing and Communications), SDIWC, 261-272, 2013.02, [URL], A large number of novels are being upload- ed as online novels. The present paper pro- poses a ranking algorithm based on the users' favorite lists (bookmarks). Empirical evaluation has been conducted with respect to each genre of novels. In several genres, it is confirmed that the top ranked novels in July are predicted from the bookmarks of May..
16. Eisuke Ito, Kazunori Shimizu, Frequency and link analysis of online novels toward social contents ranking, The 2nd International Conference on Social Computing and its Applications (SCA2012), IEEE, 10.1109/CGC.2012.18, 531-536, 2012.11, User generated contents service is a social service because users not only enjoy contents but also provide feedback on content by commenting, tagging and bookmarking. The authors are interested in social service ranking and categorization methods for online novels. Many readers comment and bookmark there favorite novels in online novel services. Comments and bookmarking are facilitated by readers, and it is possible to use the data as a resource for social ranking and recommendation. In this paper, we focused on an online novel service, and analyzed the frequency of keywords, number of authors, and links from readers to novels. Although the bipartite graph between readers and novels fulfills growth and preferential attachment conditions of scale- free network, distribution of links does not follow power law. The basic idea of social ranking using extracted bookmarked novels and favorite authors is also explored..
17. Eisuke Ito, Kazunori Shimizu, Sachio Hirokawa, Development of Facet Analysis System for Diverse Online Novels, DLINE Journal of Data Processing, 2, 3, 113-119, 2012.09, [URL], In recent years, user generated content services have become popular. The authors are interested in user generated online novel services. Classification of online novels is difficult because keywords and genre are assigned by the author of the novel without control. In order to overcome the problem in classifying seaching online novels, faceted views were introduced and a cross tabulation search and analysis system was developed. This system can discover relations between novel genres and keywords, and can find the author's preference..
18. Naomichi Murakami, Eisuke Ito, Emotional video ranking based on user comments, Proc. of iiWAS2011 (The 13th International Conference on Information Integration and Web-based Applications & Services), ACM, 499-502, 2011.12.
19. Kensuke Baba, Masao Mori, Eisuke Ito, Sachio Hirokawa, A Feedback System on Institutional Repository, Proc. of INTENSIVE 2011, IARIA, 37-42, 2011.05.
20. Kensuke Baba, Eisuke Ito, Sachio Hirokawa, Co-occurrence Analysis of Access Log of Institutional Repository, JCAICT2011 (Japan-Cambodia Joint Symposium on Information Systems and Communication Technology), 25-29, 2011.01.
21. Kensuke Baba, Masao Mori, and Eisuke Ito, A Synergistic System of Institutional Repository and Researcher Database, Proc. of SERVICE COMPUTATION 2010, IARIA, 184-188, 2010.11.
22. S. Yamada, Y. Matsunaga, E. Itoh and S. Hirokawa :
"A study of design for intelligent web syllabus crawling agent",
Trans. of IEICE D-I, Vol.J86, No.8, pp.566-574, 2003. (in Japanese).
Presentations
1. Design and Implementation of Campus Cloud System in Kyushu University, [URL].
2. Case study of Kyushu University.
3. Eisuke Ito, Eiji Abe, Yoshiaki Kasahara, SP / IdP cases, 29th APAN meeting, 2010.02.
4. Eisuke Ito, ID-Federation in Japan for trustfull inter-domain ubiquitous services, 2nd International Conference of Ubiquitous Information Technology, 2007.12.
Membership in Academic Society
  • Information Processing Society of Japan
  • The Institute of Electronics, Information and Communication Engineering
  • The society of law and management
Awards
  • "Interactive award" of DEWS2008 (Data Engineerinng Workshop 2008) by The Database Society of Japan (DBSJ)
    Makoto Momota and Eisuke Ito : "Information discovery based on Social Bookmarks", DEWS 2008, I1-15, Mar.,2008. (in Japanese)
Educational
Educational Activities
[Lectures]
2016--2020: Artificial Intelligence (Faculty of Engineering, Elec. eng. and comp. sci. course)
2011--2020:Programing 1 (Faculty of Engineering, Elec. eng. and comp. sci. course)
2009--2017: Cryptography and Information Security (Graduate School of ISEE)
2010: Information Science (Common lectures of under graduate school)
2002--2007: Distributed System Software (Graduate School of ISEE)
2004--2007: Operating System (Faculty of Science, Dep. of Physics, Informatics course)
2004: Frontier of Physics (Faculty of Science, Dep. of Physics)
2003: Computer Literacy (Common lectures of under graduate school)