Kyushu University Academic Staff Educational and Research Activities Database
List of Papers
Eisuke Ito Last modified date:2024.04.12

Associate Professor / Section of Applied Data Science / Research Institute for Information Technology


Papers
1. Development of Mahjong AI Using Supervised Learning and Reinforcement Learning.
2. Feature extraction from user comments on YouTube.
3. A Study of Flaming Comment Detection using Text based machine learning.
4. Estimating the waiting tiles of other players in Mahjong.
5. Emotion Learning from Emotion Tags &Comparative Experience LSTM and GRU
-Heading toward Sublimation from Desktop Mascot to AIAgent-.
6. , [URL].
7. Takuya Kawatani, Eisuke Itoh, Sachio Hirokawa, Tsunenori Mine, Location does not always determine sudden braking, 2019 IEEE Intelligent Transportation Systems Conference (ITSC), 10.1109/ITSC.2019.8917480, 27-30, 2019.11, Understanding conditions and situations causing sudden braking is important for preventing traffic accidents. Previous studies have used probe vehicle data to detect risky positions where sudden braking frequently occurred. However, they have mainly focused on vehicle-related factors. In this paper, we propose a novel method for discriminating sudden braking. Unlike previous studies, the method exhaustively explores probe data including temporal factors, constructs a large number of features combining pairs of feature names and their values, and applies the Support Vector Machine classifier and Feature Selection method to the features. To conduct the experiments, we used probe data provided by the Aizu-Wakamatsu City Open Data Utilization Verification Project. The proposed method discriminated sudden braking quite accurately, with a discrimination performance averaging an F1 measure of 93.2%. We also found that the probability of the occurrence of sudden braking is not always high at locations where sudden braking frequently occurred, but rather, temporal factors such as date and time, or day of week are strongly related to performance in discriminating sudden braking with high probability..
8. Takuya Kawatani, Eisuke Itoh, Sachio Hirokawa, Tsunenori Mine, Machine Learning and Visualization of Sudden Braking using Probe Data, 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), 10.1109/IIAI-AAI.2019.00024, 67-72, 2019.07, This paper presents a novel mining and visualizing tool that detects features to estimate sudden braking. The tool uses a machine learning and feature selection method to find the features exhaustively from combinations of the features which include not only vehicle-related factors, but also outer circumstances or temporal factors. The tool also obtains the locations inferred by the features detected. A normal way would first search for locations where sudden braking behavior frequently occurred, but it is not always true that the occurrence probability of sudden braking at the locations is high. On the other hand, our tool finds the locations related to sudden braking with high probability, more than 98%. Through the visualizing process, the features can be used as clues to find new factors which affect sudden braking..
9. Unusual driving spots discovery from driving probe data using machine learning.
10. Yoshiaki Kasahara, Takao Shimayoshi, Eisuke Ito, Naomi Fujimura, The Past, Current, and Future of our Email Services in Kyushu University, ACM, 10.1145/3235715.3235737, 103-106, 2018.11, In Kyushu University, Information Infrastructure Initiative provides email service for students and staff members. Email services for students and staff members were started separately. For students, an email service was started as Unix accounts of "Computer System for Education'' in 1995. On the other hand, an email service for staff members was started in 2009, and eventually the two mail services were merged into the current "Kyushu University Primary Mail Service'' in 2014. The designs of these mail systems were affected by various operational issues and political decisions at their times. We think that running an in-house mail system is becoming less feasible due to the initial/operational cost, security issues, and our dwindling budget. For the current system, the planned 5-year lifetime ends in this fiscal year. Therefore, we are forced to migrate to a cloud-based mail service. In this presentation, we want to share our past experiences and future plans about our university email services..
11. Kazuhisa Noguchi, Eisuke Ito, Holonomic Function of 2 Parameter Logistic Model Item Response Theory Parameter Estimation, 2018 10th International Conference On Education Technology And Computers (ICETC2018), J113, 2018.10, IRT (Item Response Theory) is a theory for scoring of tests, and it used for some test systems such as TOEFL. IRT's estimation is item parameter for each question, and examinee’s ability parameter. We propose a new method to estimate parameter of IRT using the Holonomic Gradient Method. When we use Holonomic Gradient Method, we check target function is Holonomic Function. Our target function is 2 Parameter Logistic Model IRT's Likelihood Function. In this paper, we show target IRT's Likelihood Function is Holonomic Function..
12. Kazuhisa Noguchi, Eisuke Ito, Holonomic Approach for Item Response Theory Parameter Estimation,, 2018 7th International Congress on Advanced Applied Informatics(AAI2018), 10.1109/IIAI-AAI.2018.00068, 322-326, 2018.07, The IRT (item response theory) is a theory for scoring of tests, and it is used for some test systems such as TOEFL. Classical test scoring is the total of raw scores for each items (questions). On the other hand, IRT can make fine performance finer than the raw score method. IRT is based on the relationship between individual test takers’ performances on a test item (question), and the test takers’ levels of performance. Even with the same number of correct answers, the IRT score may be different depending on the degree of difficulty of item (question). Computational complexity of parameter estimation of IRT is one of important issue. To solve this issue, we propose a parameter estimation method of IRT using the Holonomic approach. Generate differential equations which solve the likelihood function of IRT. By solving this differential equation, it is able to estimate the ability parameter..
13. Eisuke Ito, Yuya Honda, Sachio Hirokawa, Empathy factor mining from reader comments of e-manga, Proc. of eKnow2018 (The Tenth International Conference on Information, Process, and Knowledge Management), 107-112, 2018.03, The digitization of manga (Japanese comics) is currently progressing. In the past, expressions of manga have evolved in a way that is suitable for printing on paper. With the spread of smartphones, the expression of e-manga is developing at present. In this research, we focus on reader comments on e-mangas in Comico. Comico is a popular e-manga service. Similar to other online contents services, such as YouTube, Comico implements a user comments system. Readers can post comments easily, and the comments quickly reach others, including the manga creator. Comico recognizes that reader comments may influence the creator and the story of e-manga. In this research, we try to mine the empathy factor of readers for the story and the characters of e-manga. We collect reader comments and apply feature selection of SVM (Support Vector Machine) to mine empathy factors among readers..
14. Analysis of diversity trend of online novel by clustering.
15. An frequency analysis of characters in reader comments of online manga.
16. Eisuke Ito, Yuya Honda, Keyword diversity trend of consumer generated novels, Proceedings of ICESS2017 (The Third International Conference on Electronics and Software Science), 2017.08, Recent years, CGM (Consumer Generated Me- dia), such as YouTube and nicovideo.jp for movies, syosetu.com for novel stories, become very popu- lar. A lot of contents are posted to CGM sites ev- ery day, and also a large number of users are en- joying posted contents. At present, some articles mentioned decreasing diversity of contents. Some posted new content may be similar with previous posted contents. The authors are afraid that de- creasing diversity of contents causes less energetic cultural activity. In this paper, the authors pro- posed two quantitative metrics of contents diversity, and applied them to the contents in syosetu.com. They focused the keywords which are given to the novel by the novel author, and calculated entropy and similarity of keywords. As the results, they ob- served increase of similarity, and it shows decrease of diversity of contents..
17. Kazuhisa Noguchi, Tomoya Iida, Eisuke Ito, An analysis of CGM contents pageview using SIR Model and GBM, Proceedings of ICCTD2017 (2017 8th International Conference on Computer Technologies and Development), 10.1145/3093241.3093264, 19-21, 2017.03, In consumer generated media (CGM) site, such as YouTube and nicovideo, only few contents are viewed very much, but most contents are only viewed few times. Our research target CGM sites are nicovideo.jp and syosetu.com. Nicovideo.jp is a popular movie CGM site in Japan and syosetu.com is the largest novel CGM site in Japan. We already found that pageview distribution of contents in both CGM sites follow a lognormal distribution. In this paper, we consider user’s content selection model which will lead lognormal distribution. We apply Geometric Brownian Motion model into SIR model. SIR model is used for simulation of population transition process or epidemic process of infection disease. In this paper, we report the results of some simulation..
18. Yoshiaki Kasahara, Takuya Kawatani, Eisuke Ito, Koichi Simozono, An Analysis of Relationship between Storage Usage Distribution and Per-User Quota Value, ACM, 10.1145/2974927.2974936, 153-158, 2016.11, To prevent resource (especially storage) shortage, information systems such as storage services and email services usually impose an upper bound of resource consumption (quota) per user. In a conservative way, an administrator tends to set a quota value such as the storage capacity divided by the expected maximum number of users for safety and fairness, but it tends to leave large unused storage space, because the users' storage usage pattern shows a long-tailed distribution. In this paper, we analyzed storage usage distribution of some email services to approximate the distribution using a power-law distribution, and proposed a method to calculate an optimal quota value from a target size of storage consumption to increase storage utilization. We applied an optimal quota value we calculated to a real email service and analyzed the effect of quota change. Then, we analyzed actual distributions further to find a better model to approximate the distribution, and found that a log-normal distribution explained the distribution better than power-law. We also analyzed two other universities' email service to find similar distribution in these systems..
19. Kyohei Kamihata, Eisuke Ito, A quantitative contents diversity analysis on a consumer generated media site,, International Society of Artificial Life and Robotics, 436-440, 2016.01, Recent years, CGM (Consumer Generated Media) services, such as YouTube and nicovideo, are growing into social contents communication media. A lot of movies are posted to a CGM site, and many users are viewing them every day. Some web news articles mentioned that the diversity of movie contents might decrease in CGM site. The authors believe that contents diversity is necessary to keep CGM site activity, and for cultural sustainability. The authors try to measure diversity of movie contents of a CGM site quantitatively. They propose two quantitative metrics of contents diversity, and apply them to a CGM contents in nicovideo.jp..
20. Analysis of customer reviews for items on a large-scale electric commerce site.
21. An analysis of movie contents diversity based on similarity of movie tags.
22. An analysis of disk usage before and after quota change.
23. Yoshiaki Kasahara, Naomi Fujimura, Eisuke Ito, Masahiro Obana, Introduction of Unchanging Student User ID for Intra-Institutional Information Service, ACM, 10.1145/2815546.2815578, 141-144, 2015.11, In Kyushu University, a traditional "Student ID" based on student number assigned by Student Affairs Department had been used as the user ID of various IT services for a long time. There were some security and usability concerns using Student ID as a user ID. Since Student ID was used as the e-mail address of the student, it was easy to leak outside. Student ID is constructed based on a department code and a serial number, so guessing other ID strings from one ID is easy. Student ID is issued at the day of the entrance ceremony, so it is not usable for pre-entrance education. Student ID will change when the student moves to another department or proceeds from undergraduate to graduate school, so he/she loses personal data when Student ID changes. To solve these problems, Kyushu University decided to introduce another unchanging user ID independent from Student ID. This paper reports the design of new user ID, ID management system we are using, and the effect of introduction of new user ID..
24. Yoshiaki Kasahara, Takuya Kawatani, Eisuke Ito, Koichi Simozono, Naomi Fujimura, Optimization of storage quota based on user’s usage distribution, IEEE, 10.1109/COMPSAC.2015.221, 149-154, 2015.07, To prevent shortage of storage space in a service system, an administrator usually set per-user quota as an upper limit of usable space for each user. To avoid service failure caused by resource exhaustion, the administrator tends to set a conservative quota value such as the storage capacity divided by the expected maximum number of users. In this research, we analyzed long-term storage usage history of our email system and file sharing system in Kyushu University. Mostly through the analyzed period, the usage pattern showed a long-tailed distribution similar to log-normal distribution. Also the overall storage consumption slowly increased during the analyzed period. Based on these analysis, we defined “storage utilization ratio” to evaluate how the storage was effectively used. By approximating a storage utilization pattern as a power-law distribution, we proposed a method to calculate the optimal quota value to maximize the utilization ratio..
25. Kensuke Baba, Toshiro Minami, Eisuke Ito, Modeling Changes in Demands for Books with Elapsed Time from Publication, Computational Science and Its Applications -- ICCSA 2015, 10.1007/978-3-319-21407-8, 9156, 172-181, 2015.06, Book selection in libraries should be conducted on the basis of analyses on circulation data. In addition to the number of loans, the change of the number over time can be a criterion for book selection. This paper proposes a model to represent the change of the number with the time from publication. The proposed model is applied to practical circulation data in a library and is evaluated in terms of the root mean square errors. As a result, the proposed model is suitable compared with the standard one. Additionally, this paper analyzes the differences of the changes between classified books which are obtained by the previous analysis. The information obtained by applying the proposed model to circulation data is expected to be utilized for book selection..
26. A study of disk usage distribution analysis to set optimal quota value.
27. Yoshiaki Kasahara, Eisuke Ito, Naomi Fujimura, Introduction of New Kyushu University Primary Mail Service for Staff Members and Students, ACM, 10.1145/2661172.2662965, 103-106, 2014.11, In the end of fiscal year 2013 (March 2014), Kyushu University Information Infrastructure Initiative introduced new Primary Mail Service for Staff Members and Students. The previous service for staff members had been built using proprietary mail and LDAP appliance, but tight user license and the nature of proprietary system caused several troubles. The previous service for students had been built using open source software (Postfix and Dovecot), but there were some issues with the old implementation of LDAP authentication. With these experiences, we decided to design a new system by merging both system using open source software including Postfix, Dovecot, OpenLDAP, and Squirrelmail. We also extended alias address setting service (previously available for students only) to all the members including staff members. In this paper, we explain the design and implementation, user migration, current status and future works of our new mail service..
28. Zechen Wu, Eisuke Ito, Correlation Analysis between User's Emotional Comments and Popularity Measures, Proceedings of IIAI-AAI 2014/ESKM 2014, 10.1109/IIAI-AAI.2014.65, 280-283, 2014.09, On user generated contents sites, user's comments include the user's impression to the content. The authors believe that user's comments can be used as the data mining resource to evaluate the contents. In this paper, the authors focus on bilibili.tv, a Chinese video sharing site, and analyze user's emotional comments on the site. Toward development of content quality measurement based on emotional comments, they investigate co-relation between emotional comments and popularity measures such as number of replay and bookmark. They pick up the phrase "233", which is a Chinese network jargon which represents lot of laugh, and studied the number of "233" related comments and other popularity measures..
29. Introduction of new student-long user ID for intra-institutional information services.
30. Xiao Lin, Eisuke Ito, Sachio Hirokawa, Chinese Tag analysis for foreign movie contents, 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS2014), 163-166, 2014.06, Consumer Generated Media (CGM) is gaining huge popularity. The authors are particularly interested in the intercultural comprehension of movie contents made in foreign countries. This paper focuses on the website bilibili.tv as a test case to analyze how Japanese movie contents are watched in China. The authors analyze all tags and how foreign tags are introduced and translated into Chinese. They propose a simple statistical method to identify whether a word is a loanword or not, if the word is represented by Chinese characters. They also analyze the trends of tags in bilibili. .
31. Jun Zeng, Brendan Flanagan, Sachio Hirokawa, Eisuke Ito, A Web Page Segmentation Approach Using Visual Semantics, The Institute of Electronics, Information and Communication Engineers (IEICE), E97-D, 2, 223-230, 2014.02, Web page segmentation has a variety of benefits and potential web applications. Early techniques of web page segmentation are mainly based on machine learning algorithms and rule-based heuristics, which cannot be used for large-scale page segmentation. In this paper, we propose a formulated page segmentation method using visual semantics. Instead of analyzing the visual cues of web pages, this method utilizes three measures to formulate the visual semantics: layout tree is used to recognize the visual similar blocks; seam degree is used to describe how neatly the blocks are arranged; content similarity is used to describe the content coherent degree between blocks. A comparison experiment was done using the VIPS algorithm as a baseline. Experiment results show that the proposed method can divide a Web page into appropriate semantic segments..
32. Takuya Kawatani, Eisuke Ito, Kensuke Baba, A prototype of real-time seat usage analysis using smart sensors, IIAI AIT 2013 (Advanced Information Technologies 2013), P32.pdf, 2013.11, The authors consider analyzing real time seats usage of library browsing rooms using smart sensor and cloud computing infrastructure as a library marketing activity. The smart sensor box checks human existence periodically, and sends the sensed data to the sensor cloud through the Internet. We apply information retrieval technology to the accumulated data. This paper shows the research plan of real time seats usage ratio using smart sensor, and roughly shows cloud system architecture and application images..
33. Eisuke Ito, Sachio Hirokawa, Keyword relation analysis using concept graph toward automatic categorization of online novels, IIAI AIT 2013 (Advanced Information Technologies 2013), P24.pdf, P24.pdf, 2013.11, Contents of user-generated media (UGM) such as YouTube are popular in recent years. The authors are interested in online novel services as a UGM on the Web. A large number of novels are being uploaded, and a few novels become major. Because there are no professional editor or no trained librarian concerning to UGM, neither quality evaluation nor categorization of UGM contents is clear. Moreover, the creator of a novel gives keywords without control, and they often generate new words, then it is difficult to use keyword for categorization. Toward automatic categorization, we have to understand relation between keywords. In this paper, we focused on analysis of keywords relation using concept graph. The concept graph is based on statistical analysis of word frequency and co-occurrence. We also show several interesting relations on concept graph..
34. Eisuke Ito, Brendan Flanagan, CHENGJIU YIN, Tetsuya Nakatoh, Sachio Hirokawa, A Private Cloud Environment for Teaching Search Engine Construction, Proc. of ICCE2013 (The 21st International Conference on Computers in Education), 391-397, 2013.11, Kyushu University installed a private cloud system, named “campus cloud system”, using VCL and CloudStack. For a graduate school exercise course on web search engine, the authors prepared a virtual machine on VCL, which had apache web server and GETA indexer preinstalled. This paper introduces an outline of the cloud system, the exercise, and also reports advantages and disadvantages of cloud based education..
35. Eisuke Ito, Yoshiaki Kasahara, Naomi Fujimura, Implementation and operation of the Kyushu university authentication system, Proc. of ACM SIGUCCS 2013, 10.1145/2504776.2504788, 137-142, 2013.11, Nowadays, a university needs to build and maintain a central ID database and authentication system for better ICT (information and communication technology) services. In 2008, the headquarters of Kyushu University had defined medium-range policy of ICT infrastructure preparation, and the policy had indicated construction of a central authentication system. According to the policy, the authors elaborated an installation plan of the Kyu(Q)shu University authentication system (QUAS, for short). Since 2009, Information Infrastructure Initiative of Kyushu University, to which the authors belong, has been issuing ID cards to all employees, and also operating LDAP servers. This paper introduces the action plan and outline of QUAS. This paper also describes two recent topics of QUAS. One is high load of LDAP servers because of rapid increase of mobile devices, and the other one is development of a multifactor authentication Shibboleth Identity Provider (IdP)..
36. Yoshiaki Kasahara, Eisuke Ito, Naomi Fujimura, Gulliver's Toss: Google's Chronic Big Load to University Mail Server and Its Sudden Resolution, Proc. of ACM SIGUCCS 2013, 10.1145/2504776.2504815, 169-174, 2013.11, Traditionally, Kyushu University has been providing email service internally using its own domain name for staff members and students of the university. Around January 2012, we noticed that the high load of the university authentication server, and we realized that one of causes was the access from the mail server for students (called Student Primary Mail Service). Detailed analysis showed that there was chronic big load produced by Gmail's Mail Fetcher, especially toward nonexistent accounts removed due to graduation. In this paper, we explain the situation and reasons of the big load induced by Google, its possible countermeasures, and its sudden resolution by Google's silent change..
37. Yoshiaki Kasahara, Eisuke Ito, A study of network issues for implementing large-scale academic cloud service, IEICE (The Institute of Electrics, Information and Communication Engieers), 113, 240, 35-40, IA2013-32, 2013.10, The virtualization technology of computer resources has matured enough for production services, and cloud services became popular in various fields. Cloud services are also gradually incorporated in universities' research and education activities. There is a demand for cloud infrastructure suitable for academic activities. To implement practical and user-friendly services on private, community, or public cloud services, we need to consider about network design. This paper tries to clarify network issues for implementing cloud services considering use cases, the number of instances, utilization of IP addresses, virtual private network, client access networks, and so on..
38. Tetsuya Oishi, Masao Mori, Toshie Tanaka, Eisuke Ito, Cooperative Development and Individual Operation for Information Systems of IR in a Virtual Environment, AAI2013 (International Conference on Advanced Applied Informatics), 10.1109/IIAI-AAI.2013.68, 235-238, 2013.08, We propose a new method of cooperative development of information systems utilizing virtual machines. This method not only realizes individual operations of systems in each institution, but also is efficient for the institution in shortage of IT-talented staff..
39. Eisuke Ito, Takahiro Urakawa, Brendan Flanagan, Sachio Hirokawa, Keywords frequency trend analysis of online novels, AAI2013 (International Conference on Advanced Applied Informatics), 10.1109/IIAI-AAI.2013.92, 68-73, 2013.08, The authors are interested in online novel services as a user-generated media on the Web. A large number of novels are being uploaded, and a few novels become major. Novel writers like to create novel of current popular genre, then current popular genre words may frequently appear. In this paper, the authors apply the time series analysis to the keywords words given to an online novel by the creator. The authors construct a trend analysis tool. The tool not only shows the trend of posted query word(s), but also shows the trends of similar terms. This paper describes the trend analysis system, the used data, and some interesting analyses..
40. A feasibility study of educational system on IaaS cloud.
41. A Study of search engine practice using VM on a private cloud.
42. A Study of VCL in Graduate School of ICT.
43. Eisuke Ito, Kazunori Shimizu, Sachio Hirokawa, Predicting Future Ranking of Online Novels based on Collective Intelligence, Proc. of ICDIPC2013 (The Third Int'l Conf on Digital Info. Processing and Communications), SDIWC, 261-272, 2013.02, [URL], A large number of novels are being upload- ed as online novels. The present paper pro- poses a ranking algorithm based on the users' favorite lists (bookmarks). Empirical evaluation has been conducted with respect to each genre of novels. In several genres, it is confirmed that the top ranked novels in July are predicted from the bookmarks of May..
44. A study of online novel ranking based on collective intelligence.
45. Eisuke Ito, Kazunori Shimizu, Frequency and link analysis of online novels toward social contents ranking, The 2nd International Conference on Social Computing and its Applications (SCA2012), IEEE, 10.1109/CGC.2012.18, 531-536, 2012.11, User generated contents service is a social service because users not only enjoy contents but also provide feedback on content by commenting, tagging and bookmarking. The authors are interested in social service ranking and categorization methods for online novels. Many readers comment and bookmark there favorite novels in online novel services. Comments and bookmarking are facilitated by readers, and it is possible to use the data as a resource for social ranking and recommendation. In this paper, we focused on an online novel service, and analyzed the frequency of keywords, number of authors, and links from readers to novels. Although the bipartite graph between readers and novels fulfills growth and preferential attachment conditions of scale- free network, distribution of links does not follow power law. The basic idea of social ranking using extracted bookmarked novels and favorite authors is also explored..
46. Naomi Fujimura, Tadatsugu Togawa, Yoshiaki Kasahara, Eisuke Ito, Introduction and Experience with the Primary Mail Service based on their Names for Students, ACM SIGUCCS'12, 10.1145/2382456.2382460, 11-14, 2012.10, [URL], Kyushu University provided mail service based on student IDs such as “1AB10123X” to the university students for many years. Using this model, we had problems communicating with the stu-dents who graduated from the University and enrolled in the grad-uate school. The students received new mail addresses based on their new student IDs such as “2AB12789Y”. Faculty members were forced to change the student mail addresses in the mailing lists and in their mail client address book. Furthermore, students were forced to notify the e-mail address change to all of their existing contacts.
We introduced a new mail system to provide addresses based on the student name, as well as student ID in April 2011. The new naming convention uses the following format: “last-name.firstname.999” where “999” is a random number of 3 digits. Students can select some combination patterns of their first and last names for Japanese. We also consider the middle names for foreign students.
In the system implementation, we did not have the formal infor-mation of alphabetical names for students. We generated alphabet-ical names from Japanese Katakana names. It is not easy for us to get the appropriate name in this manner. We implemented a con-firmation stage of the alphabetical name at first use, and then stu-dents can select their mail addresses for their convenience. We paid much attention to the user interface in the system..
47. Google makes a chronic big load to university mail server.
48. Eisuke Ito, Kazunori Shimizu, Sachio Hirokawa, Development of Facet Analysis System for Diverse Online Novels, DLINE Journal of Data Processing, 2, 3, 113-119, 2012.09, [URL], In recent years, user generated content services have become popular. The authors are interested in user generated online novel services. Classification of online novels is difficult because keywords and genre are assigned by the author of the novel without control. In order to overcome the problem in classifying seaching online novels, faceted views were introduced and a cross tabulation search and analysis system was developed. This system can discover relations between novel genres and keywords, and can find the author's preference..
49. Hiroaki Ninomiya, Eisuke Ito, Brendan Flanagan, Sachio Hirokawa, Near friends communication encouragement system using NFC and SNS, AAI2012 (International Conference on Advanced Applied Informatics), 10.1109/IIAI-AAI.2012.37, 145-148, 2012.09, [URL], The value of an open event is in active communication between participants. However, it is difficult to look for those who have a common interest or a common friend. You would miss an opportunity to speak directly to your SNS friends or to those who have common SNS friends, unless you notice that there are such participants and you recognize them. This paper proposes a participant managerial system for using the human relations in SNS in an actual event site. Each participant makes his registration to an event using his SNS ID. In the event site on the day, the participant only has to touch his mobile terminal to a NFC tag. The participant and his SNS are bound by this action. The organizer as well as the participants can understand the background and the interests of each participant using SNS information. NFC tag provides real time attendance-and-absence status of the participants. It is expectable that the proposed system promotes exchange between participants..
50. Hiroaki Ninomiya, Eisuke Ito, Brendan Flanagan, Sachio Hirokawa, Bridging SNS ID and User Using NFC and SNS, Proc. of IEEE ASID2012 (The sixth IEEE International Conference on Anti-counterfeiting, Security, and Identification), 10.1109/ICASID.2012.6325346, 311-315, 2012.08, [URL], A smart phone and a tablet terminal with a NFC function are spreading by standardization of NFC technology. The authors are interested in the exchange support between the participants in the off-line meeting. The authors focus on participants’ mutual communication in off-line meetings. It is rare to perform exchange in an actual meeting place, although there is a relation called a friend or a follower on on-line. This will be because of gap between identity on SNS and identity in the real world. The authors are interested in bridging the gap between the online identity and the identity in the real world. The authors are developing a system, which matches human on on-line SNS ID and a real person, using a smart phone or a mobile terminal with NFC technology. Our system will display the human relations on the on-line SNS, and connect a meeting and a meeting participant..
51. Eisuke Ito, Sachio Hirokawa, Kazunori Shimizu, Introducing faceted views in diversity of online novels, Proc. of IEEE ICDIM 2012 (Seventh International Conference on Digital Information Management), 10.1109/ICDIM.2012.6360114, 145-148, 2012.08, [URL], In recent years, user generated content services have become popular. The authors are interested in online novel services. Classification of online novels is difficult because keywords and genre are assigned by the author of the novel without control. In order to overcome the problem faced when category classifying and searching online novels, faceted views were introduced and a cross tabulation search and analysis system was developed. This system can discover relations between novel genres and keywords, and can find the author's trend.
52. A study of LDAP load balancing for University ICT services.
53. Video weighting method based on viewer's comments and its evaluation.
54. A study of distributed folksonomy data processing for contents search.
55. Naomichi Murakami, Eisuke Ito, Emotional video ranking based on user comments, Proc. of iiWAS2011 (The 13th International Conference on Information Integration and Web-based Applications & Services), ACM, 499-502, 2011.12.
56. Chengjiu Yin, Eisuke Ito, Tetsuya Nakatoh, Sachio Hirokawa, Classification network of tourism information -- A smart phone-based system for supporting "Petit Trips" --, Proc. of iCAST (3rd International Conference on Awareness Science and Technology), IEEE, 10.1109/ICAwST.2011.6163134, 170-173, 2011.09, [URL].
57. Kensuke Baba, Nami Hoshiko, Eriko Kudo, Naomi Yoshimatsu, Eisuke Ito, Semi-automated Paper-registration System for Institutional Repository, Proc. of iCAST (3rd International Conference on Awareness Science and Technology), IEEE, 10.1109/ICAwST.2011.6163111, 418-421, 2011.09, [URL].
58. Kensuke Baba, Maso Mori, Eisuke Ito, Identification of Scholarly Papers and Authors, Proc. of NDT2011 (Networked Digital Technologies), Springer LNCS CCIS136, 195-202, Springer LNCS CCIS136, 2011.07.
59. Kensuke Baba, Masao Mori, Eisuke Ito, Sachio Hirokawa, A Feedback System on Institutional Repository, Proc. of INTENSIVE 2011, IARIA, 37-42, 2011.05.
60. Kensuke Baba, Eisuke Ito, Sachio Hirokawa, Co-occurrence Analysis of Access Log of Institutional Repository, JCAICT2011 (Japan-Cambodia Joint Symposium on Information Systems and Communication Technology), 25-29, 2011.01.
61. Tag hierarchy analysis in Nicovideo movie service.
62. Kensuke Baba, Masao Mori, and Eisuke Ito, A Synergistic System of Institutional Repository and Researcher Database, Proc. of SERVICE COMPUTATION 2010, IARIA, 184-188, 2010.11.
63. Movie annotation analysis for sympathy based ranking.
64. Shibboleth IdP and the National Authentication Federation - Toward Next Generation Infrastructure for e-Resource Services -.
65. Quantitative Evaluation of QIR - Toward Next Generation Institutional Repository -.
66. A study of attribute control on IdP in national federation.
67. A study of moive ranking method based on viwer's comments.
68. Quantitative effectiveness analysis on institutional repository.
69. Kensuke Baba, Eisuke Ito, Naomi Yoshimatsu, Nami Hoshiko, Kazuaki Murakam, A Model of Publication of Scholarly Papers on Institutional Repositories , DRFIC2009, 2009.12.
70. Masanori NAKAKUNI, Hiroshi DOZONO, Eisulke ITO, Yoshiaki KASAHARA and Hideaki NAKAKUNI, A Method of Personal Authentication by Shape Recognition of the Lips and Front Teeth, Proc. of MACMESE'09 (MATHEMATICAL and COMPUTATIONAL METHODS), 203-207, 2009.11.
71. Introduction of Kyushu University primary mail service.
72. A study of web mash up for protected web resources .
73. A study of information retrieval method to search for medical references, with attention for the relation of technical terms .
74. A study of community based authorization on distributed SSO platform .
75. Private Electronic Notary Service in University .
76. Construction of campus authentication system for online services.
77. Masanori Nakakuni, Eisuke Ito, Yoshiaki Kasahara, Sozo Inoue, Hiroshi Dozono, Construction and Use Examples of Private Electronic Notary Service in Educational Institutions, WSEAS TRANSACTIONS on ADVANCES in ENGINEERING EDUCATION, 5, 10, ISSN: 1790-1979, 2008.10.
78. Masanori Nakakuni, Eisuke Ito, Yoshiaki Kasahara and Hiroshi Dozono , Private Electronic Notary Service in Universities and Its Utilization in Education , EDUTE'08 (The 4th WSEAS/IASME International Conference on EDUCATIONAL TECHNOLOGIES) , 170-175, 2008.08.
79. A Fusion of PKI and OpenID for inter-domain membership services .
80. Masanori Nakakuni, Hiroshi Dozono, and Eisuke Ito , A Method of Automatic User Authentication by Fulltime Monitoring of Keystroke Timings, SAM'08 (The 2008 International Conference on Security and Management) , 58-63, 2008.07.
81. Discovery of Related Items from Word of Mouth.
82. A study of similar item discovery from medial literature.
83. A study of PKI based inter-domain ID-federation.
84. Information discovery based on Social Bookmarks.
85. Eisuke Ito, Yoshiaki Kasahara, Megumi Nogita, Takahiko Suzuki, Institutional authentication platform for trustful inter/intra-institutional ubiquitous services, Proc. of the 2nd International Conference of Ubiquitous Information Technology, pp.103-108, 2007.12.
86. Wireless LAN roaming on ID-Federation environment - A case study for UPKI and eduroam in Kyushu University -.
87. A prototype of music recommendation system based on massive playlists.
88. Group Management System for secure distributed collaborative work.
89. Perfomance evaluation of self-adaptive topic focused crawler.
90. A Study of Identifier Naming Conventions Suitable for User Authentication.
91. Performance evaluation of self-adaptive topic focused crawler.
92. Webroll -- Scroll of Web Pages.
93. Yufeng Dou,, Eisuke Ito, Sachio Hirokawa, Daisuke Ikeda, An Approach to Analyzing Correlation between Songs/Artists Using iTMS Playlists, International Conference on Intelligent Agents, Web Technology andInternet Commerce (IAWTIC'2005), 951-956, 2005.12.
94. Tatsuji Kuboyama, Tetsuhiro Miyahara, Sachio Hirokawa, Eisuke Itoh, Information Extraction from Web Pages Using Semi-structured Data Alighment, Proc. 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol.I, pp.42--47, 2005.07.
95. Intra-school Web Information Integration for University Portal.
96. A Study of distributed authentication mechanism for MO-SRV grid computing sytem.
97. A study for schema integration for Web syllabi.
98. Sachio Hirokawa, Eisuke Ito, Tetsuhiro Miyahara, Semi-Automatic Construction of Metadata from A Series of Web Documents, Lecture Notes in Artificial Intelligence (LNAI 2903), 2903, 942-953, Springer LNAI 2903, pp.942-953, (ISSN 0302-9743, ISBN 3-540-20646-9), 2003.12.
99. S. Yamada, Y. Matsunaga, E. Itoh and S. Hirokawa :
"A study of design for intelligent web syllabus crawling agent",
Trans. of IEICE D-I, Vol.J86, No.8, pp.566-574, 2003. (in Japanese).