Updated on 2026/03/05

写真a

 
MIYATA SUMIKO
 
Organization
School of Engineering Associate Professor
Title
Associate Professor
External link

Degree

  • 博士(工学) ( 東京工業大学 )

Research Interests

  • Smart City

  • traffic analysis

  • Information communication network

  • 情報セキュリティ

Research Areas

  • Informatics / Information security

  • Informatics / Information network

Committee Memberships

  • 総務省   情報通信行政・郵政行政審議会 専門委員  

    2025.7   

      More details

    Committee type:Government

    researchmap

  • 電子情報通信学会 複雑コミュニケーションサイエンス研究専門委員会   専門委員  

    2024.6   

      More details

  • 総務省   電気通信紛争処理委員会 特別委員  

    2023.11   

      More details

    Committee type:Government

    researchmap

  • 総務省   デジタルビジネス拡大に向けた電波政策懇談会 構成員  

    2023.11 - 2024.7   

      More details

    Committee type:Government

    researchmap

  • 電子情報通信学会 情報ネットワーク研究会   専門委員  

    2023.6   

      More details

  • 電子情報通信学会 NOLTAソサイエティ   運営委員  

    2023.6 - 2024.5   

      More details

    Committee type:Academic society

    researchmap

  • 総務省   情報通信審議会 専門委員  

    2023.1   

      More details

    Committee type:Government

    researchmap

  • IEICE NOLTA Society KJCCS2024   Finance Chair  

    2023 - 2024   

      More details

    Committee type:Academic society

    researchmap

  • IEICE NOLTA Society JKCCS2023   General Co-Secretaries  

    2023   

      More details

    Committee type:Academic society

    researchmap

  • 東京都デジタルサービス局   業務技術審査委員会  

    2022.12 - 2025.3   

      More details

    Committee type:Municipal

    researchmap

  • 電子情報通信学会 複雑コミュニケーションサイエンス研究専門委員会   幹事  

    2022.6 - 2024.5   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 倫理委員会 倫理綱領検討小委員会委員   幹事  

    2021.8 - 2023.3   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 複雑コミュニケーションサイエンス研究専門委員会   幹事補佐  

    2021.6 - 2022.6   

      More details

    Committee type:Academic society

    researchmap

  • IEEE CTSoc Machine learning, Deep learning and AI in CE (MDA)   Technical Committee (TC)  

    2020.7   

      More details

  • 電子情報通信学会 技術と社会・倫理研究専門委員会   専門委員  

    2016.6   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 通信方式研究専門委員会   専門委員  

    2015.6 - 2021.6   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 倫理委員会 事例集検討小委員会WG   幹事  

    2015.2 - 2016.4   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 技術と社会・倫理研究専門委員会   幹事  

    2014.6 - 2016.6   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 技術と社会・倫理研究専門委員会   幹事補佐  

    2012.5 - 2014.6   

      More details

    Committee type:Academic society

    researchmap

▼display all

Papers

▼display all

Books

  • 20年継続会員として思うこと

    電子情報通信学会誌  2025.9 

     More details

    Responsible for pages:2  

    researchmap

  • Detection of secret information in the processing of multimedia information (Chap.2) Reviewed

    Sumiko Miyata( Role: Joint author)

    2023.12 

     More details

  • 電子情報流通に不可欠な著作権保護技術とブロックチェーン技術の倫理的観点からの考察

    宮田純子, 岡田仁志, 木下宏揚

    電子情報通信学会学会誌,vol.106 No.3 pp.207-210 2023年3月.  2023.3 

     More details

  • ユーザ行動を考慮したネットワーク制御方式とは?

    宮田純子

    電子情報通信学会学会誌,vol.100 No.6, pp.493-498, 2017年6月.  2017.6 

     More details

  • 利他的行動は複雑なシステムを攻略するカギになるか?

    宮田純子

    非文字資料研究, 研究エッセイ, pp.38--39, 2014年2月.  2014.2 

     More details

MISC

  • 持続可能な点群データ収集のためのインセンティブ機構 Invited

    宮田純子

    CS研究会(To appear)   2025.11

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • 切り取り・合成加工を考慮したCNNによる知覚ハッシュに関する基礎検討

    細野海人, 宮田純子, 宮田高道, 木下宏揚

    NLP研究会(To appear)   2025.10

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • Web3における非集中型ストレージを活用したデータ流通機構

    金光 永煥, 宮田 純子, 峯 荒夢, 江川 和隆

    2025.9

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • 4G/5G異種混合ネットワークにおける垂直ハンドオーバ発生頻度の近似解析

    菊地将太, 宮田純子, 会田雅樹

    信学技報, vol. 125, no. 173, IN2025-31, pp. 42-47, 2025年9月.   2025.9

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • トラヒックデマンド分布の時空間変動におけるセル内周波数再利用を考慮したドローン基地局の軌道最適化

    小崎満稀, 平井健士, 宮田純子, 若宮直紀

    信学技報, vol. 125, no. 182, CQ2025-43, pp. 1-6, 2025年9月   2025.9

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • 進化ゲーム理論を用いたUAVの接続台数解析に基づくAP間距離に対する性能評価

    小泉香奈, 宮田純子, 平井健士, 黒川 瞬

    信学技報, vol. 125, no. 182, CQ2025-44, pp. 7-12, 2025年9月   2025.9

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • A Characteristics of Call Admission Control in VPS Settings Considering Changes in Speech Patterns

    成清壮太, 和氣智慶, 宮田純子, 馬場健一, 山岡克式

    電子情報通信学会技術研究報告(Web)   124 ( 420(IN2024 80-140) )   2025

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

  • Finite-State VoIP Traffic Model for Arbitrary Payload Sizes Utilizing Approximating Probabilities

    和氣智慶, 宮田純子, 北口善明, 馬場健一, 山岡克式

    電子情報通信学会技術研究報告(Web)   124 ( 420(IN2024 80-140) )   2025

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

  • 非選択率を考慮した持続可能な参加型センシングにおけるユーザ選択メカニズムの検討

    宮川悠太, 宮田純子, 山崎 託, 上岡英史

    信学技報, vol. 124, no. 139, IN2024-26, pp. 95-100, 2024年7月   2024.7

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • A basic study on the construction of a DDoS detection system for a variety of IoT devices

    福田智樹, 宮田純子, 北口善明, 山岡克式, 行田弘一

    電子情報通信学会技術研究報告(Web)   124 ( 234(CS2024 46-67) )   2024

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

  • Basic Study of Emergency Ternary Call Admission Control Considering Waiting

    成清壮太, 宮田純子, 馬場健一, 山岡克式

    電子情報通信学会大会講演論文集(CD-ROM)   2024   2024

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

  • Mean Sojourn Time in the Priority Bundle of DTN Considering RTT

    松尾文佳, 宮田純子, 山岡克式, 上岡英史

    電子情報通信学会技術研究報告(Web)   124 ( 234(CS2024 46-67) )   2024

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

  • Characteristic Analysis of Emergency Ternary Call Admission Control with Waiting Queue

    成清壮太, 宮田純子, 馬場健一, 山岡克式

    電子情報通信学会技術研究報告(Web)   123 ( 421(SITE2023 68-113) )   2024

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

  • Derivation of a VoIP Traffic Model with Variable Payload Sizes for Bandwidth Reduction

    和氣智慶, 宮田純子, 北口善明, 馬場健一, 山岡克式

    電子情報通信学会大会講演論文集(CD-ROM)   2024   2024

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

  • ゲーム理論に基づくスループット最大化のための異なる電波環境ユーザの最適AP接続移動

    加藤祐, 謝済全, 村瀬勉, 宮田純子

    ソサイエティ大会、BS-4-10、2023年9月.   2023.9

     More details

  • 共創型デジタルツイン実現に向けた点群データの特性を考慮したデータ取引モデル

    渡部仁, 宮田純子, 金井謙治

    ソサイエティ大会、N-2-3、2023年9月.   2023.9

     More details

  • 異種高密度ネットワークにおけるセル滞在時間に基づく垂直ハンドオーバ数の削減

    福原健太, 宮田純子

    ソサイエティ大会、N-2-7、2023年9月.   2023.9

     More details

  • CSM を使用した OLT のエネルギー効率考慮した NGPON2 波長割当システムの定式化

    山形大智, 宮田純子

    電子情報通信学会CCS研究会   2023.8

     More details

  • ゲーム理論を用いた共創型デジタルツイン実現に向けたデータ取引モデル Invited

    宮田純子, 金井謙治, 山崎 託

    信学技報, vol. 123, no. 32, CS2023-11, pp. 31-31, 2023年5月.   2023.5

     More details

  • 都市低空域を想定した自立型スマートポールによる実機実験環境 Invited

    山崎 託, 宮田純子, 新熊亮一, 三好 匠

    信学技報, vol. 123, no. 32, CS2023-12, pp. 32-32, 2023年5月.   2023.5

     More details

  • 基地局ネットワークにおけるジョブの遅延の偏りを抑えるエッジサーバ配置選択法

    柴田航季, 宮田純子

    信学技報, vol. 123, no. 51, IN2023-2, pp. 5-10, 2023年5月   2023.5

     More details

  • D2EcoSys:共創型デジタルツインの実現に向けて Invited

    金井謙治, 中里秀則, 山崎 託, 宮田純子, 金光永煥, 峯 荒夢, 森 慎太郎, 今村博宣

    信学技報, vol. 123, no. 32, CS2023-6, pp. 26-26, 2023年5月.   2023.5

     More details

  • トラヒック混雑時におけるRTTの分散を考慮したEvil-Twin攻撃検知

    上田智之, 宮田純子

    信学技報, vol. 122, no. 453, CCS2022-81, pp. 101-106, 2023年3月   2023.3

     More details

  • 共創型デジタルツイン実現に向けた提携形ゲームによるデータ取引のモデル化とその数値解析

    保戸山英俊, 渡部 仁, 宮田純子, 金井謙治, 山崎 託

    信学技報, vol. 122, no. 407, IN2022-116, pp. 299-304, 2023年3月   2023.3

     More details

  • K-means++による転送確率低下のためのエッジサーバ初期配置決定法

    小川晃平, 宮田純子

    信学技報, vol. 122, no. 407, IN2022-85, pp. 115-120, 2023年3月   2023.3

     More details

  • トラヒック負荷を考慮したEvil-Twin 攻撃検知手法の提案

    上田智之, 宮田純子

    電子情報通信学会総合大会   N-2-9   2023.3

     More details

  • 異種超高密度ネットワークにおけるセル滞在時間に基づくセル選択法

    金澤宏哉, 宮田純子

    電子情報通信学会総合大会   N-2-10   2023.3

     More details

  • 異種エッジサーバ環境におけるK-means++を用いたサーバ初期配置決定法

    小川晃平, 宮田純子

    B-7-37   2023.3

     More details

  • 利用率のばらつきおよび距離に着目したエッジサーバ配置選択法

    柴田航季, 宮田純子

    電子情報通信学会総合大会   B-7-36   2023.3

     More details

  • 確率進化ゲーム理論によるAP選択法を用いたUAVトラヒックの予測

    高梨怜音, 宮田純子

    電子情報通信学会総合大会   N-2-12   2023.3

     More details

  • 共創型デジタルツイン実現に向けた提携形ゲームに基づくデータ取引モデル

    保戸山英俊, 渡部 仁, 宮田純子, 金井謙治, 山崎 託

    電子情報通信学会総合大会   B-7-30   2023.3

     More details

  • 非協力ゲーム理論を用いたクラウドレット間のオフローディングによる負荷分散法

    横田侑紀, 宮田純子

    電子情報通信学会総合大会   N-2-5   2023.3

     More details

  • 相関型ステガノグラフィにおけるJPEG圧縮耐性の検証

    相川 真莉子, 宮田純子, 木下宏揚

    電子情報通信学会総合大会   N-2-8   2023.3

     More details

  • 音声ペイロードサイズがトラヒックに及ぼす影響

    和氣智慶, 宮田純子, 北口善明, 馬場健一, 山岡克式

    総合大会, N-2-17, 2023年3月.   2023.3

     More details

  • セルの異種超高密度配置における滞在時間に基づくハンドオーバ制御

    金澤宏哉, 宮田純子

    信学技報, vol. 122, no. 453, CCS2022-64, pp. 7-12, 2023年3月.   2023.3

     More details

  • 確率進化ゲーム理論を用いたUAVトラヒックの特性解析

    高梨怜音, 宮田純子

    信学技報, vol. 122, no. 453, CCS2022-63, pp. 1-6, 2023年3月.   2023.3

     More details

  • M/M/1待ち行列モデルにおける非協力ゲーム理論を用いたクラウドレットの負荷分散法

    横田侑紀, 宮田純子

    信学技報, vol. 122, no. 453, CCS2022-65, pp. 13-18, 2023年3月.   2023.3

     More details

  • SDNトラヒックに基づく条件付きエントロピーを用いたDDoS 攻撃検知法

    田 啓文, 宮田純子

    信学技報, vol. 122, no. 453, CCS2022-65, pp. 13-18, 2023年3月.   2023.3

     More details

  • 可変ペイロードサイズに対する有限状態数VoIPトラヒックモデル

    和氣智慶, 宮田純子, 北口善明, 馬場健一, 山岡克式

    信学技報, vol. 122, no. 305, IN2022-49, pp. 32-38, 2022年12月   2022.12

     More details

  • 非常時三元呼受付閾値制御における平均パケットロス率特性

    成清壮太, 宮田純子, 馬場健一, 山岡克式

    信学技報, vol. 122, no. 305, IN2022-44, pp. 7-12, 2022年12月.   2022.12

     More details

  • Beyond 5G実現を加速させるWeb3に基づく共創型デジタルツインに関する研究開発—Research and Development of Co-creating Digital Twins using Web3 Technologies to Accelerate Beyond 5G—放送技術

    金井 謙治, 山崎 託, 宮田 純子, 金光 永煥, 峯 荒夢, 森 慎太郎, 中里 秀則

    映像情報メディア学会技術報告 = ITE technical report   46 ( 36 )   1 - 6   2022.11

     More details

    Language:Japanese   Publisher:映像情報メディア学会  

    CiNii Books

    CiNii Research

    researchmap

  • 協力行動を基とする全ユーザの到着位置を考慮したAPのシステムスループット特性

    加藤 祐, 謝 済全, 村瀬 勉, 宮田純子

    信学技報, vol. 122, no. 255, CCS2022-50, pp. 36-41, 2022年11月.   2022.11

     More details

  • 利用率の分散および離心中心性を用いたエッジサーバ配置決定法

    柴田航季, 宮田純子

    信学技報, vol. 122, no. 255, CCS2022-61, pp. 91-96, 2022年11月.   2022.11

     More details

  • 異種エッジサーバ間の転送確率を考慮したジョブ集中回避法

    小川晃平, 宮田純子

    信学技報, vol. 122, no. 255, CCS2022-62, pp. 97-102, 2022年11月.   2022.11

     More details

  • 相関型ステガノグラフィにおけるJPEG圧縮耐性の検証

    相川 真莉子, 宮田純子, 木下宏揚

    PCSJ2022, P2-20, 11月   2022.11

     More details

  • パケットバースト性を考慮した緊急通信受付制御におけるパケットロス率の解析

    成清壮太, 宮田純子, 馬場健一, 山岡克式

    N-2-6   2022.9

     More details

  • 全ユーザの伝送レートを考慮したシステムスループット特性

    加藤 祐, 宮田純子, 謝 済全, 村瀬 勉

    電子情報通信学会ソサイエティ大会   N-2-3   2022.9

     More details

  • エッジコンピューティングにおけるサーバの利用率のばらつきを考慮した配置決定およびタスク割り当て

    柴田航季, 宮田純子

    N-2-5   2022.9

     More details

  • 緊急音声通話のマルコフ変調ポワソン過程を考慮したパケットロス率の特性解析

    成清壮太, 宮田純子, 馬場健一, 山岡克式

    信学技報, vol. 122, no. 145, CCS2022-28, pp. 10-15, 2022年8月.   2022.8

     More details

  • DCTブロックに適応的にゲインを乗じる周波数領域利用型ステガノグラフィの検討

    大沼海仁, 宮田純子

    信学技報, vol. 121, no. 119, SITE2021-31, pp. 167-173, 2021年7月   2022.7

     More details

  • ユーザ行動のモデル化とトラヒック制御の融合による高満足な通信ネットワーク制御 Invited

    宮田純子

    信学技報, vol. 122, no. 146, IN2022-21, pp. 33-38, 2022年8月.   2022.6

     More details

  • 条件付きエントロピーを用いたSDNにおけるDDoS攻撃検知法

    田 啓文, 宮田純子

    信学技報, vol. 122, no. 66, CCS2022-1, pp. 1-6, 2022年6月.   2022.6

     More details

  • 多元トラヒックを収容するEPONのDRMPCPにおける平均待ち時間の近似式

    回, 待ち行列研究部会

    宮田 純子,滝根哲哉   2022.6

     More details

  • ユーザ間干渉を考慮したシステムスループット最大化AP接続法

    加藤 祐, 謝 済全, 村瀬勉, 宮田純子

    信学技報, IN研究会,2022年3月.   2022.3

     More details

  • 共有ボトルネックリンクを考慮したDASHのセグメント長選択手法の改善

    沼上 翔貴, 宮田純子

    電子情報通信学会総合大会   2022.3

     More details

  • ユーザ間の干渉を考慮したユーザの最適位置の導出

    加藤 祐, 宮田純子, 謝 済全, 村瀬勉

    電子情報通信学会総合大会   2022.3

     More details

  • 協力ゲーム理論を考慮したDASHマルチサーバにおけるユーザ割当方式

    猪又 一真, 宮田純子

    電子情報通信学会総合大会   2022.3

     More details

  • 提携構造形成問題を考慮したDASHマルチサーバにおけるユーザ割当方式

    猪又 一真, 宮田純子

    信学技報, IN研究会,2022年3月.   2022.3

     More details

  • 偏好性を考慮するDASHレート決定法におけるユーザの離脱とQoE評価

    柳沢 拓実, 宮田純子

    信学技報, vol. 121, no. 253, CCS2021-27, pp. 55-60, 2021年11月.   2021.11

     More details

  • MMORPGにおける領域内ノード数変更による負荷分散手法

    神戸 怜, 宮田純子

    電子情報通信学会ソサイエティ大会,B-7-15,2021年9月.   2021.9

     More details

  • 確率進化ゲーム理論を用いたフロー受付制御による満足度評価

    小島 汰一, 宮田純子

    電子情報通信学会ソサイエティ大会,N-2-8,2021年9月.   2021.9

     More details

  • ナッシュ均衡を用いた動画への偏好性を考慮するDASHレート決定

    柳沢 拓実, 宮田純子

    電子情報通信学会ソサイエティ大会,N-2-9,2020年9月.   2021.9

     More details

  • 動画への偏好性を考慮したゲーム理論によるDASHレート決定法

    柳沢 拓実, 宮田純子

    信学技報, vol. 121, no. 113, CS2021-28, pp. 61-62, 2021年7月.   2021.7

     More details

  • ユーザの選択ミスを考慮したフロー受付制御における満足度評価

    小島 汰一, 宮田純子

    信学技報, vol. 121, no. 113, CS2021-30, pp. 69-70, 2021年7月.   2021.7

     More details

  • エッジサーバ待機ジョブ数を用いたトラヒック負荷軽減を実現するジョブ割り当て方式

    山本芹香, 宮田純子

    信学技報, vol. 121, no. 14, CS2021-7, pp. 19-24, 2021年5月.   2021.5

     More details

  • 利得関数を用いた複数到着ユーザのためのアクセスポイント選択手法

    笹森淳志, 宮田純子

    信学技報, vol. 121, no. 14, CS2021-6, pp. 13-18, 2021年5月.   2021.5

     More details

  • シーク操作に伴う占有帯域を考慮した受付制御方式の提案

    大出啓介, 宮田純子

    信学技報, vol. 120, no. 414, IN2020-94, pp. 238-243, 2021年3月.   2021.3

     More details

  • 偏好性を考慮したDASHレート選択におけるQoE評価

    柳沢 拓実, 宮田純子

    信学技報, vol. 120, no. 414, IN2020-91, pp. 220-225, 2021年3月.   2021.3

     More details

  • 確率進化ゲーム理論を用いた二元トラヒック受付制御の提案

    小島 汰一, 宮田純子

    信学技報, vol. 120, no. 414, IN2020-58, pp. 25-30, 2021年3月.   2021.3

     More details

  • P2P型MMORPGにおけるk-means++を用いた負荷の軽減

    神戸 怜, 宮田純子

    信学技報, vol. 120, no. 414, IN2020-59, pp. 31-36, 2021年3月.   2021.3

     More details

  • 飛ばし見ユーザ占有帯域を加えた三元受付制御方式への拡張

    大出啓介, 宮田純子

    電子情報通信学会総合大会,B-7-25,2020年3月.   2021.3

     More details

  • 偏好性を考慮したゲーム理論によるDASHレート選択法

    柳沢 拓実, 宮田純子

    電子情報通信学会総合大会,B-7-26,2020年3月.   2021.3

     More details

  • ユーザの選択ミスを考慮した二元トラヒック受付制御の提案

    小島 汰一, 宮田純子

    電子情報通信学会総合大会,B-7-2,2021年3月.   2021.3

     More details

  • MMORPGにおけるK-means++を用いた負荷分散手法

    神戸 怜, 宮田純子

    電子情報通信学会総合大会,B-7-17,2021年3月.   2021.3

     More details

  • 非常時における拠点連携を考慮した音声通信トラフィック制御手法—A Call Traffic Control Method considering Control Area Cooperation in Emergency Situation

    馬場 健一, 宮田 純子, 山岡 克式

    工学院大学総合研究所年報 / 工学院大学総合研究所 [編]   ( 29 )   37 - 44   2021

     More details

    Language:Japanese   Publisher:工学院大学総合研究所  

    CiNii Books

    CiNii Research

    researchmap

  • 誤り訂正符号と秘密分散法に基づくステガノグラフィの検討

    大沼海仁, 宮田純子

    信学技報, vol. 120, no. 164, CS2020-44, pp. 47-52, 2020年9月.   2020.9

     More details

  • 動的上限呼損率を用いた緊急時受付制御における被災地呼呼損率の改善

    川瀬達也, 宮田純子, 馬場健一, 山岡克式

    信学技報, vol. 120, no. 75, CS2020-3, pp. 11-16, 2020年6月.   2020.6

     More details

  • シャミアの秘密分散法とスペクトル拡散法を用いた変換領域利用型ステガノグラフィの提案

    大沼海仁, 宮田純子

    信学技報, vol. 119, no. 461, IN2019-143, pp. 387-392, 2020年3月.   2020.3

     More details

  • 許容遅延時間を考慮した二種Webコンテンツアクセス制御方式の提案

    渡辺康佑, 宮田純子

    信学技報, vol. 119, no. 461, IN2019-146, pp. 405-410, 2020年3月.   2020.3

     More details

  • シーク操作を考慮した全ユーザ満足度最大化の受付制御方式

    大出啓介, 宮田純子

    信学技報, vol. 119, no. 461, IN2019-145, pp. 399-404, 2020年3月.   2020.3

     More details

  • (k, n) 閾値秘密分散法を想定した変換領域利用型ステガノグラフィの検討

    大沼海仁, 宮田純子

    電子情報通信学会総合大会,A-12-1,2020年3月.   2020.3

     More details

  • コンテンツ簡易化と許容遅延時間を考慮したWebアクセス制御の提案

    渡邉康佑, 宮田純子

    電子情報通信学会総合大会,B-7-36,2020年3月.   2020.3

     More details

  • 飛ばし見ユーザを考慮した二元トラヒック受付制御方式の提案

    大出啓介, 宮田純子

    電子情報通信学会総合大会,B-7-42,2020年3月.   2020.3

     More details

  • 非常時における拠点連携を考慮した音声通信トラフィック制御手法—A Call Traffic Control Method considering Control Area Cooperation in Emergency Situation

    馬場 健一, 宮田 純子, 山岡 克式

    工学院大学総合研究所年報 / 工学院大学総合研究所 [編]   ( 28 )   71 - 80   2020

     More details

    Language:Japanese   Publisher:工学院大学総合研究所  

    CiNii Books

    CiNii Research

    researchmap

  • 非決定論的変動を含むカオス的トラヒックの予測方式

    鈴木奈保人, 宮田純子

    信学技報, vol. 119, no. 342, IN2019-48, pp. 19-24, 2019年12月.   2019.12

     More details

  • A Scheme of Digital Copyright Management System Based on Blockchain and Digital Watermarking -- Research on Improvement Method of Perceptual Hashing based on Machine Learning -

    Zhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Hirotsugu Kinoshita

    信学技報, vol. 119, no. 329, SITE2019-83, pp. 21-27, 2019年12月.   2019.12

     More details

  • MPEG-DASHにおけるバッファアンダーランとセグメントロスを考慮したQoE特性評価

    糟谷大祐, 宮田純子

    信学技報, vol. 119, no. 342, IN2019-56, pp. 63-68, 2019年12月.   2019.12

     More details

  • 緊急時三元トラヒックにおける上限呼損率の特性解析

    川瀬達也, 宮田純子, 馬場健一, 山岡克式

    信学技報, vol. 119, no. 342, IN2019-49, pp. 25-30, 2019年12月.   2019.12

     More details

  • スペクトル拡散法と(k,n) 閾値秘密分散法を用いた画像ステガノグラフィ の検討

    大沼海仁, 宮田純子

    電子情報通信学会ソサイエティ大会,A-12-1,2019年9月.   2019.9

     More details

  • M/G/1モデルを用いた光アクセスネットワークの平均遅延時間の解析

    宮田純子

    待ち行列部会   2019.4

     More details

  • 局所再構成法による短期的トラヒック予測の特性解析

    鈴木奈保人, 宮田純子

    信学技報, vol. 118, no. 466, IN2018-130, pp. 277-282, 2019年3月.   2019.3

     More details

  • 待ち行列理論によるバッファ占有量とセグメントロス率を考慮したMPEG-DASH画質選択法

    糟谷大祐, 宮田純子

    信学技報, vol. 118, no. 466, IN2018-144, pp. 361-366, 2019年3月.   2019.3

     More details

  • 緊急呼及び被災地呼を優先しつつ被災地外呼を最大限収容する受付制御の提案

    川瀬達也, 宮田純子

    信学技報, vol. 118, no. 466, IN2018-115, pp. 187-192, 2019年3月.   2019.3

     More details

  • 非常時における拠点連携を考慮した音声通信トラフィック制御手法—A Call Traffic Control Method considering Control Area Cooperation in Emergency Situation

    馬場 健一, 宮田 純子, 山岡 克式

    工学院大学総合研究所年報 / 工学院大学総合研究所 [編]   ( 27 )   133 - 143   2019

     More details

    Language:Japanese   Publisher:工学院大学総合研究所  

    CiNii Books

    CiNii Research

    researchmap

  • 悪意ユーザのトラヒックを制限するDR-MPCP方式におけるパケット平均遅延時間の特性解析

    上村智子, 宮田純子

    信学技報, vol. 118, no. 378, MoNA2018-42, pp. 19-24, 2018年12月.   2018.12

     More details

  • 実環境のストリーミング配信によるネットワーク負荷特性評価

    佐藤隼人, 宮田純子

    信学技報, vol. 118, no. 378, MoNA2018-53, pp. 85-90, 2018年12月.   2018.12

     More details

  • 待ち行列理論を用いたMPEG-DASHのバッファ占有量が画質変化に及ぼす影響

    糟谷大祐, 宮田純子

    信学技報, vol. 118, no. 378, MoNA2018-52, pp. 79-84, 2018年12月.   2018.12

     More details

  • 帯域変動を考慮した全ユーザ満足度最大化の二元トラヒック受付制御,

    豊島裕也, 宮田純子

    信学技報, vol. 118, no. 378, MoNA2018-51, pp. 73-78, 2018年12月.   2018.12

     More details

  • 呼損率から推測されたユーザ満足度を用いた受付制御方式の特性解析

    芝山拓志, 宮田純子

    信学技報, vol. 118, no. 378, MoNA2018-44, pp. 31-36, 2018年12月.   2018.12

     More details

  • カオス理論によるTCP/UDP混在環境におけるトラヒック予測方式

    鈴木奈保人, 宮田純子

    信学技報, vol. 118, no. 378, MoNA2018-43, pp. 25-30, 2018年12月.   2018.12

     More details

  • ユーザの不満を考慮したフロー受付制御の効用効果に関する検討

    芝山拓志, 宮田純子

    信学技報, vol. 118, no. 207, IN2018-42, pp. 119-124, 2018年9月.   2018.9

     More details

  • 仮想マシンを用いたフロー間対等二元受付制御における負荷特性解析

    佐藤隼人, 宮田純子

    信学技報, vol. 118, no. 207, IN2018-41, pp. 113-118, 2018年9月.   2018.9

     More details

  • レプリケータダイナミクスを用いた2元トラヒック受付制御の特性解析

    芝山拓志, 宮田純子

    信学技報, vol. 118, no. 7, CS2018-9, pp. 47-52, 2018年4月.   2018.4

     More details

  • 多種間のIoTボットネット拡散モデルの解析

    佐藤, 隼人, 宮田, 純子

    第80回全国大会講演論文集   2018 ( 1 )   477 - 478   2018.3

     More details

    Language:Japanese  

    近年、IoT機器の普及率は年々増加しているが、セキュリティの意識が追いついていないのが現状である。そして2016年9月にIoTボットネットによる大規模なDDoS攻撃が注目を浴び、複数のWebサイトや企業が歴史上類を見ない規模の被害を受けた。現在でも様々なIoTボットネットの亜種が存在しており、研究が必要とされている。そこで本研究では、IoTボットネットの拡散状況について、感染SEIRモデルを用いてエンデミックとなる閾値を表す基本再生算数を導出し、解析を行った。

    CiNii Books

    CiNii Research

    researchmap

  • ウィンドウサイズを考慮したDR-MPCP方式におけるパケット平均遅延時間の特性解析—Characteristic analysis for mean packet delay of DR-MPCP considering window size—技術と社会・倫理

    上村 智子, 宮田 純子

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 340 )   5 - 10   2017.12

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • DR-MPCPのlimitedサービス解析のための簡易モデルの提案

    上村智子, 宮田純子

    電子情報通信学会ソサイエティ大会, B-8-29, 2017年9月.   2017.9

     More details

  • ソウリツ 100シュウネン キネン トクシュウ 「 キソ ・ キョウカイ 」 ガ ササエタ 100ネン,コレカラ ノ 100ネン ; ミライ 100ネン オ ススム ワタクシ ガ メザス モノ

    ミヤタ スミコ

    100 ( 6 )   493 - 498   2017.6

     More details

  • 第7班 共同研究 『インターネット・エコミュージアムのためのデータマイニングとユーザインタフェース等の基盤技術に関する研究』—Research on Basic Technologies, Including Data Mining and a User Interface, for the Internet Eco-Museum

    木下, 宏揚, Kinoshita, Hirotsugu, 佐野, 賢治, Sano, Kenji, 能登, 正人, Noto, Masato, 森住, 哲也, Morizumi, Tetsuya, 宮田, 純子, Miyata, Sumiko, 小松, 大介, Komatsu, Daisuke

    非文字資料研究 = The study of nonwritten cultural materials   14   35 - 100   2017.3

     More details

    Language:Japanese   Publisher:神奈川大学日本常民文化研究所 非文字資料研究センター  

    type:Departmental Bulletin Paper
    第三期共同研究活動報告

    CiNii Books

    CiNii Research

    researchmap

  • Research on Basic Technologies, Including Data Mining and a User Interface, for the Internet Eco-Museum

    14   29 - 33   2017.3

     More details

  • パケット送出量の制限を考慮したEPONにおけるDR-MPCP方式の提案

    上村智子, 宮田純子, 加島宜雄

    電子情報通信学会総合大会, B-8-17, 2017年3月.   2017.3

     More details

  • 非常時における音声通話確保を目的とした新しい通信受付制御方式—A Call Admission Control Method for Accepting More Voice Calls in Emergency Situation

    馬場 健一, 宮田 純子, 山岡 克式

    工学院大学総合研究所年報 / 工学院大学総合研究所 [編]   ( 25 )   28 - 35   2017

     More details

    Language:Japanese   Publisher:工学院大学総合研究所  

    CiNii Books

    CiNii Research

    researchmap

  • RTTの分散を考慮した中間者攻撃検知手法の提案—A detection method of man-in-the-middle attack based on the variance of the RTT—技術と社会・倫理

    佐藤 隼人, 宮田 純子, 加島 宜雄

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 71 )   23 - 28   2016.6

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • B-7-65 The Effectiveness of Accepting New General Calls by Rejecting General Retry calls under Emergency Trunk Reservation Control

    Tanabe Kazuki, Miyata Sumiko, Baba Ken-ichi, Yamaoka Katsunori

    Proceedings of the IEICE General Conference   2016 ( 2 )   198 - 198   2016.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • 非常時における音声通話確保を目的とした新しい通信受付制御方式—A Call Admission Control Method for Accepting More Voice Calls in Emergency Situation

    馬場 健一, 宮田 純子, 山岡 克式

    工学院大学総合研究所年報 / 工学院大学総合研究所 [編]   ( 24 )   68 - 74   2016

     More details

    Language:Japanese   Publisher:工学院大学総合研究所  

    CiNii Books

    CiNii Research

    researchmap

  • Development of the folk implements database using the relational model and thesaurus for the digital archive

    HANYU Toshihide, MIYATA Sumiko, MORIZUMI Tetsuya, KINOSHITA Hirotsugu

    IEICE technical report. Internet Architecture   114 ( 495 )   215 - 220   2015.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In recent years, digitization of museum material information has been promoted. Some museums provide digital material information at online. However, digital archives and museum databases are not unified in each museum. Since folk implements are basic materials for understanding the ordinary people's production activities and daily lives, there are many classification methods for these materials. Thus, it is difficult to search the folk implements adequately. In this paper, we propose a folk implements classification method. This method can effectively classify the folk implements by normalized relational model, and avoid the database redundancy.

    CiNii Books

    researchmap

  • Management of information resources using the Swarm Intelligence expressing the attraction and repulsion by similarity Guide to the Technical Report and Template

    ISHIDA Katsunori, KOIZUMI Shun, MIYATA Sumiko, MORIZUMI Tetsuya, KINOSHITA Hirotsugu

    IEICE technical report. Internet Architecture   114 ( 495 )   233 - 238   2015.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In recently, the amount of information resources and files has increased by personal information terminal as a smart phone and a large computer as the Cloud Computing and the Big Data. Moreover, their management is ever complicated. Today, treat the multiple attributes because the tree structure has only an attribute. Moreover, it is difficult for us to visually understand. Therefore, the management by directory structure is not suitable to manage enormous information. In this papar, we propose the file management system which enable to manage the multiple attributes. This propose system is realized by using a Swarm Intelligence. Moreover, we show the effectiveness of our method by using simulation.

    CiNii Books

    researchmap

  • A search scheme considering the search process using ACO and search history

    KOIZUMI Shun, MIYATA Sumiko, MORIZUMI tetsuya, KINOSHITA Hirotsugu

    IEICE technical report. Internet Architecture   114 ( 495 )   221 - 226   2015.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recent years, the spread of Internet reveals that we can search information easily. However, it is difficult to find accurately their useful information because there are many information obtained from this search. Furthermore, if you are trying to better understand the information, it is necessary to consider both own search history and other user's search history. This is because that it is useful for a search user to refer to the other users who are able to search information with accuracy. In this paper, we suggest a new search method reflected the search history and the past search process which means the search trace that the user selects the information. The proposed search system can be realized by using the recommended system for selecting the appropriate reference user and ACO (Ant Colony Optimization) for getting the search process of the reference user. Moreover, we show the effectiveness of our method by combination of the recommended system and ACO.

    CiNii Books

    researchmap

  • B-8-53 Derivation of the exact mean packet delay for LR-PON considering the existence of idle interval

    MIYATA Sumiko, BABA Ken-ichi, YAMAOKA Katsunori, KINOSHITA Hirotsugu

    Proceedings of the IEICE General Conference   2015 ( 2 )   297 - 297   2015.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • フロー間対等二元受付制御の閾値導入による多元トラヒック環境への適用—Applying Flow Admission Control Based on Equality to this Situation that Flows Have Multi Requested Bandwidth by Using the Threshold

    須加 拓, 宮田 純子, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   114 ( 477 )   601 - 606   2015.3

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • A search scheme considering the search process using ACO and search history

    2015 ( 37 )   1 - 6   2015.2

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Management of information resources using the Swarm Intelligence expressing the attraction and repulsion by similarity Guide to the Technical Report and Template

    2015 ( 39 )   1 - 6   2015.2

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Development of the folk implements database using the relational model and thesaurus for the digital archive

    2015 ( 36 )   1 - 6   2015.2

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • B-7-12 Configuring Appropriate Threshold Considering Arriving Traffic Intensity in Emergency Situations

    Tanabe Kazuki, Miyata Sumiko, Baba Ken-ichi, Yamaoka Katsunori

    Proceedings of the IEICE General Conference   2015 ( 2 )   162 - 162   2015.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • B-7-54 Applying Flow Admission Control Based on Equality of Two Types of Traffic to Heterogeneous Traffic Environment by Introducing a Threshold

    Suka Hiroshi, Miyata Sumiko, Yamaoka Katsunori

    Proceedings of the IEICE General Conference   2015 ( 2 )   204   2015.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • LR-PON環境における平均遅延時間低減アルゴリズムの研究

    宮田 純子

    特別教育・研究報告集   63 - 66   2015

     More details

    Language:Japanese   Publisher:芝浦工業大学連携推進部  

    CiNii Research

    researchmap

  • 非常時における音声通話確保を目的とした新しい通信受付制御方式—A Call Admission Control Method for Accepting More Voice Calls in Emergency Situation

    馬場 健一, 宮田 純子, 山岡 克式

    工学院大学総合研究所年報 / 工学院大学総合研究所 [編]   ( 23 )   98 - 104   2015

     More details

    Language:Japanese   Publisher:工学院大学総合研究所  

    CiNii Books

    CiNii Research

    researchmap

  • A Threshold Configuration Method of Emergency Trunk Reservation Control Considering Arriving Traffic Intensity

    TANABE Kazuki, MIYATA Sumiko, BABA Ken-ichi, YAMAOKA Katsunori

    Technical report of IEICE. CQ   114 ( 298 )   83 - 88   2014.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We propose a threshold configuration and holding time limitation for general telephone calls under trunk reservation control in emergency situations. Our proposed method aims to accept more general calls while required emergency calls are still accepted. With our method, the threshold is configured in consideration of the ratio of traffic intensities which are estimated in advance. Computer simulation with a queueing system model of a telephone exchange showed that the general call-blocking rate was much lower than that without threshold relaxation or trunk reservation, while the emergency call-blocking rate was reduced to almost zero unless the sum of estimated traffic intensity was nearly equal to the number of lines. Moreover, we confirmed that the threshold was appropriately configured by using the proposed method, from the comparison between the result of the proposed method and that obtained by using the fixed value of a threshold.

    CiNii Books

    researchmap

  • Derivation of the mean packet delay using M/G/1 model in LR-PON

    MIYATA Sumiko, BABA Ken-ichi, YAMAOKA Katsunori, KINOSHITA Hirotsugu

    IEICE technical report. Communication systems   114 ( 289 )   55 - 60   2014.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, LR-PON (Long Reach-Passive Optical Networks), in which the distance between OLT and ONUs is long, may become widely used. In LR-PON, Dynamic Bandwidth Allocation (DBA) method is required because Round Trip Time (RTT) is large and the idle interval occurs. However, almost conventional studies assume that RTT is small. Moreover, the derived mean packet delay in LR-PON is approximation formula. In this paper, we propose the derivation of the mean packet delay for LR-PON. First, we derive the mean packet delay for IPACT without RTT, more simply compared to the conventional derivation. Then, we derive the mean packet delay for LR-PON by using M/G/1 model. We compare the numerical result with simulation result and confirm the effectiveness of our derivation.

    CiNii Books

    researchmap

  • Control scheme for network environment considering the unselfish users' behavior Invited

    Miyata Sumiko

    Proceedings of the Japan Joint Automatic Control Conference   57   1062 - 1067   2014.11

     More details

    Language:Japanese   Publisher:The Japan Joint Automatic Control Conference  

    DOI: 10.11511/jacc.57.0_1062

    CiNii Research

    researchmap

  • 緊急時の回線留保制御における到着呼量に基づく閾値設定法

    田辺和輝, 宮田純子, 馬場健一, 山岡克式

    信学技報, vol. 114, no. 298, CQ2014-85, pp. 83-88, 2014年11月.   2014.11

     More details

  • EPON reservation interval allocation method for decreasing mean delay time

    MIYATA Sumiko, BABA Ken-ichi, YAMAOKA Katsunori, KINOSHITA Hirotsugu

    IEICE technical report. Communication systems   114 ( 208 )   67 - 72   2014.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The packet transmission of upstream in EPON can be divided into data interval and reservation interval. In reservation interval, each ONU requests transmission time to OLT by using REPORT message. The OLT receiving REPORT message calculates transmission time for each ONU. Then, each ONU can reserve the resources by receiving GATE message from OLT. The traditional method is a kind of this reservation method. However, if the RTT is large, GATE message may not arrive within a cycle time. In this situation, resource efficiency decreases because the occurrence of idle time. In order to solve this problem, IPACT has been proposed. In IPACT, a reservation interval is allocated after own ONU' data interval. However, waiting time of packets may be large depending on the arriving timing of the packets. In this paper, we propose DR-MPCP method which delay the transmission timing of the REPORT message. We model our DR-MPCP by using M/G/1 queue model and show the effectiveness of our method.

    CiNii Books

    researchmap

  • B-7-31 THE EFFECTIVENESS OF THRESHOLD RELAXATION UNDER EMERGENCY TRUNK RESERVATION CONTROL

    Tanabe Kazuki, Miyata Sumiko, Baba Ken-ichi, Yamaoka Katsnori

    Proceedings of the Society Conference of IEICE   2014 ( 2 )   88 - 88   2014.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • B-8-43 Derivation of average delay of a novel reservation interval allocation method on EPON by delaying request

    MIYATA Sumiko, BABA Ken-ichi, YAMAOKA Katsunori, KINOSHITA Hirotsugu

    Proceedings of the Society Conference of IEICE   2014 ( 2 )   153 - 153   2014.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • 緊急時の一般電話収容数向上を目的とした閾値緩和方式—A Threshold Relaxation Method for Accepting More General Telephone Calls in Emergency Situation—モバイルネットワークとアプリケーション

    田辺 和輝, 宮田 純子, 馬場 健一

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   114 ( 210 )   13 - 18   2014.9

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • Retrieval for the nonwritten-materials using Ontology

    HANYU Toshihide, MIYATA Sumiko, MORIZUMI Tetsuya, KINOSHITA Hirotsugu

    IEICE technical report. Social Implications of Technology and Information Ethics   114 ( 25 )   53 - 58   2014.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In order to look for the material, we had to go to the museum directly. In recent years, Digitization of the material is advanced in many museums. However, museum material is a huge amount. Therefore, to sort out the digital resources, it is necessary to efficient retrieval. Some museum material are being published on the Internet. Tadamimachi Internet Eco-museum is also one of them, these museum materials are being displayed on the Internet. However, there is a problem that does not output the correct information when users retrieve information by some key words. In this paper, we propose a database system which combines the hierarchical structure and the Uniform Resource Identifier (URI) structure of each object. Moreover, we show the effectiveness of our system by increasing the information of vocabulary.

    CiNii Books

    researchmap

  • 非文字資料の効率的な検索と安全な流通

    木下, 宏揚, Kinoshita, Hirotsugu, 佐野, 賢治, Sano, Kenji, 能登, 正人, Noto, Masato, 松澤, 和光, Matsuzawa, Kazumitsu, 宮田, 純子, Miyata, Sumiko, 小松, 大介, Komatsu, Daisuke, 鈴木, 一弘, Suzuki, Kazuhiro

    年報 非文字資料研究   10   161 - 215   2014.3

     More details

    Language:Japanese   Publisher:神奈川大学日本常民文化研究所 非文字資料研究センター  

    type:Departmental Bulletin Paper
    共同研究非文字資料の効率的な検索と安全な流通

    CiNii Books

    CiNii Research

    researchmap

    Other Link: http://hdl.handle.net/10487/13030

  • Optimal cost sharing for the mobile tethering and coalition condition

    MIYATA Sumiko, KINOSHITA Hirotsugu

    IEICE technical report. Information networks   113 ( 473 )   355 - 360   2014.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A tethering function allows phones or tablets to share their Internet connections (bandwidth) with other devices such as laptops. In order to improve total utility in all users who share such connections, a cost sharing method for tethering environments has been proposed. Since this method only improve the total utility, there is no guarantee that all users satisfy their shared cost decided by the method in [2]. Moreover, the pricing boundary that divides the parameter space into tethering or roaming areas has not been analyzed yet. In this paper, we propose an optimal cost sharing scheme that uses cooperative game theory to ensure all users are satisfied when they choose a tethering connection. Moreover, we analyze the costs of users when an overhead exists. These analyses theoretically describe the boundary of appropriate prices.

    CiNii Books

    researchmap

  • BS-6-6 Cost sharing of the mobile tethering using coalitional game

    MIYATA Sumiko, KINOSHITA Hirotsugu

    Proceedings of the IEICE General Conference   2014 ( 2 )   "S - 198"-"S-199"   2014.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • B-7-90 THE EFFICIENCY OF LIMITING HOLDING TIME OF GENERAL TELEPHONE CALLS UNDER EMERGENCY TRUNK RESERVATION CONTROL

    Tanabe Kazuki, Miyata Sumiko, Yamaoka Katsunori

    Proceedings of the IEICE General Conference   2014 ( 2 )   265   2014.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • 第5班 非文字資料の効率的な検索と安全な流通—Joint Research on Effective Retrieval and Secure Distribution of Nonwritten Cultural Materials—第二期共同研究活動報告 ; 第5班 非文字資料の効率的な検索と安全な流通

    木下 宏揚, 佐野 賢治, 能登 正人, 松澤 和光, 宮田 純子, 小松 大介, 鈴木 一弘

    年報非文字資料研究 = The annual report, the study of nonwritten cultural materials / 神奈川大学日本常民文化研究所非文字資料研究センター 編   ( 10 )   153 - 159   2014.3

     More details

    Language:Japanese   Publisher:神奈川大学日本常民文化研究所非文字資料研究センター  

    CiNii Books

    CiNii Research

    researchmap

    Other Link: http://hdl.handle.net/10487/13030

  • 利他的行動は複雑なシステムを攻略するカギになるだろうか?—News Letter

    宮田, 純子, Miyata, Sumiko

    非文字資料研究   31   38 - 39   2014.1

     More details

    Language:Japanese   Publisher:神奈川大学日本常民文化研究所 非文字資料研究センター  

    type:Departmental Bulletin Paper
    研究エッセイ

    CiNii Research

    researchmap

  • 自然言語処理におけるオントロジ応用についての考察

    宮田 純子, 木下 宏揚

    人工知能学会第47回ことば工学研究会   SIG-LSE-B402   13 - 19   2014

  • Dynamic Hybrid System of Honeypot and IDS for Network Security Analysis

    Li Chao, Miyata Sumiko, Kinoshita Hirotsugu

    IEICE technical report. Social Implications of Technology and Information Ethics   113 ( 355 )   157 - 161   2013.12

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The development of information technology has come hand-in-hand with various security problems that are becoming increasingly serious. Many types of security systems have been developed in response. For example, an intrusion detection system (IDS) can help us detect attacks in the network, and honeypots are an effective way to observe illegal access. We can also use these systems to obtain statistical information in a network and learn the hacking skills the attackers used to then strengthen our own system. However, there are some ethical issues associated with the usage of honeypot due to the fact that attackers can potentially use its vulnerability to make the honeypot a springboard to launch additional system attacks. In this research, we discuss the technical details of honeypot and IDS and propose an approach that dynamically combines them. Depending on the IDS's detection result, all packets from an attacker are redirected automatically to the honeypot network over a period of time to protect the hosts in the production network. With our approach, the honeypot is only allowed to interact with specified attackers and unreachable for other hosts on the Internet, which prevents additional attacks and avoids the related ethical issues.

    CiNii Books

    researchmap

  • A search scheme with an emphasis on the search process using ACO

    KOIZUMI Shun, ISHIDA Katsunori, MIYATA Sumiko, MORIZUMI tetsuya, KINOSHITA Hirotsugu

    IEICE technical report. Social Implications of Technology and Information Ethics   113 ( 355 )   169 - 173   2013.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    When somebody tries to search some objects on the Internet, some level of results are got easily. But the qualities of retrieve are not always sufficient. If he wants to know about the objects in more detail, he have to survey many information around the objects. At that time, if he/she makes use of the results or the processes of retrieval of the others who are the expert of the fields, he/she gets many information in detail in the process of the search. In this paper, a new search method consideration with the quality of the process of search. The swarm intelligences are applied in our scheme. We suggest two of the method using a system called "recommendation system" and the method using the ACO of swarm intelligence.

    CiNii Books

    researchmap

  • A self-organizing management system for the information resources with the swarm intelligence

    ISHIDA Katsunori, KOIZUMI Shun, MIYATA Sumiko, MORIZUMI Tetsuya, KINOSHITA Hirotsugu

    IEICE technical report. Social Implications of Technology and Information Ethics   113 ( 355 )   163 - 168   2013.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Many kinds of information resource, such as Big data or Cloud data, cause the complexity of the management of files because these files have many attributes. Although a tree structure is used as the mainstream of file management, it is difficult to understand the position of files intuitively. If many files are classified according to similar type data, we can treat these data files intuitively. In this paper, we assume that each file is self-organizing file by using swarm intelligence, and we propose the self-organizing management system which means that these self-organizing files are visually managed. This proposed system can apply the self-organizing method according to the state of data management.

    CiNii Books

    researchmap

  • Dynamic Hybrid System of Honeypot and IDS for Network Security Analysis

    Chao Li, Sumiko Miyata, Hirotsugu Kinoshita

    IPSJ SIG Notes   2013 ( 26 )   1 - 5   2013.12

     More details

    Language:English   Publisher:Information Processing Society of Japan (IPSJ)  

    The development of information technology has come hand-in-hand with various security problems that are becoming increasingly serious. Many types of security systems have been developed in response. For example, an intrusion detection system (IDS) can help us detect attacks in the network, and honeypots are an effective way to observe illegal access. We can also use these systems to obtain statistical information in a network and learn the hacking skills the attackers used to then strengthen our own system. However, there are some ethical issues associated with the usage of honeypot due to the fact that attackers can potentially use its vulnerability to make the honeypot a springboard to launch additional system attacks. In this research, we discuss the technical details of honeypot and IDS and propose an approach that dynamically combines them. Depending on the IDS's detection result, all packets from an attacker are redirected automatically to the honeypot network over a period of time to protect the hosts in the production network. With our approach, the honeypot is only allowed to interact with specified attackers and unreachable for other hosts on the Internet, which prevents additional attacks and avoids the related ethical issues.

    CiNii Books

    researchmap

  • A self-organizing management system for the information resources with the swarm intelligence

    Katsunori Ishida, Shun Koizumi, Sumiko Miyata, Tetsuya Morizumi, Hirotsugu Kinoshita

    IPSJ SIG Notes   2013 ( 27 )   1 - 6   2013.12

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Many kinds of information resource, such as Big data or Cloud data, cause the complexity of the man agement of files because these files have many attributes. Although a tree structure is used as the mainstream of file management, it is difficult to understand the position of files intuitively. If many files are classified according to similar type data, we can treat these data files intuitively. In this paper, we assume that each file is self-organizing file by using swarm intelligence, and we propose the self-organizing management system which means that these self-organizing files are visually managed. This proposed system can apply the self-organizing method according to the state of data management.

    CiNii Books

    researchmap

  • A search scheme with an emphasis on the search process using ACO

    Shun koizumi, Katsunori Ishida, Sumiko Miyata, Tetsuya Morizumi, Hirotsugu Kinoshita

    IPSJ SIG Notes   2013 ( 28 )   1 - 5   2013.12

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    When somebody tries to search some objects on the Internet, some level of results are got easily. But the qualities of retrieve are not always sufficient. If he wants to know about the objects in more detail, he have to survey many information around the objects. At that time, if he/she makes use of the results or the processes of retrieval of the others who are the expert of the fields, he/she gets many information in detail in the process of the search. In this paper, a new search method consideration with the quality of the process of search. The swarm intelligences are applied in our scheme. We suggest two of the method using a system called "recommendation system" and the method using the ACO of swarm intelligence.

    CiNii Books

    researchmap

  • 緊急時における一般電話通話時間制限と回線閾値制御に関する検討—A Study of Limiting Holding Time of General Telephone Calls and Threshold Control under Emergency Condition—情報ネットワーク

    田辺 和輝, 宮田 純子, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   113 ( 363 )   59 - 64   2013.12

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • An Analysis of Endemic Threshold and Steady State for Multi-Virus Propagation Model for Multi Devices

    2013 ( 4 )   854 - 861   2013.10

     More details

    Language:English  

    researchmap

  • A watermarking method for the bezier curve

    KUDO Takafumi, MIYATA Sumiko, MORIZUMI Tetuya, KINOSITA Hirotugu

    IEICE technical report. Internet Architecture   112 ( 489 )   243 - 248   2013.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    E-book that can read on your computer or mobile device began to come into wide use in the market. The comics have been digitized as well as the novels. There are also various types of image posting sites on the Internet. It has also been posted by amateur painters. Furthermore, comics are sometimes created on PC and some professional painter have created in that way. Digital data can be copy, save, and processed easily. And you can trace easily by using the painting program. So some digital contents may be exploited against the willing of the copyright holder. Watermarking techniques are studied to solve such problems. Most of watermarking methods are not suitable for the cartoons and the illustrations with bilevel lines. As the illustrations such as cartoons are consist of bi-level lines, it is difficult to embedding the required information while keeping the quality of the original illustrations. The information embedded into the hand writing trace is hard to decode with conventional methods which embed the information into the value of the pixels directly. To solve these problems, we propose a water- marking implementation for the bi-level traced images which embeds the watermark into the bezier curves which compose the illustration. We will not be able to recover the information in the existing methods of embedding the information in the pixel value. Therefore, we propose a watermarking implementation which embedded into the bilevel traced images to solve problems mentioned above.

    CiNii Books

    researchmap

  • Game theoretic analysis of the value exchange system

    TAJIMA Yoshiaki, MIYATA Sumiko, MORIZUMI Tetsuya, KINOSHITA Hirotsugu

    IEICE technical report. Internet Architecture   112 ( 489 )   201 - 206   2013.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, a local currency has been attracting attention for the purpose of circulating a thing and ser- vice in local community. However, if users have variety of values some in the same community, things and services may be not circulate. Thus, the value exchange systems-using the value of the local currency have been proposed. This concept of the variety of values is discussed and introduced in the system which exchanges the services and the values. Trading in the community becomes more active applying these systems. However, it was assumed that there are only two users in a community. Moreover, each user may not be satisfied by the proposed our system. In this paper, we extend our system to n users by using game theory. Moreover, we show the condition to satisfy all users in a community by using core of game theory.

    CiNii Books

    researchmap

  • A watermarking method for the bezier curve

    KUDO Takafumi, MIYATA Sumiko, MORIZUMI Tetuya, KINOSITA Hirotugu

    IEICE technical report. Social Implications of Technology and Information Ethics   112 ( 488 )   243 - 248   2013.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    E-book that can read on your computer or mobile device began to come into wide use in the market. The comics have been digitized as well as the novels. There are also various types of image posting sites on the Internet. It has also been posted by amateur painters. Furthermore, comics are sometimes created on PC and some professional painter have created in that way. Digital data can be copy, save, and processed easily. And you can trace easily by using the painting program. So some digital contents may be exploited against the willing of the copyright holder. Watermarking techniques are studied to solve such problems. Most of watermarking methods are not suitable for the cartoons and the illustrations with bilevel lines. As the illustrations such as cartoons are consist of bi-level lines, it is difficult to embedding the required information while keeping the quality of the original illustrations. The information embedded into the hand writing trace is hard to decode with conventional methods which embed the information into the value of the pixels directly. To solve these problems, we propose a water-marking implementation for the bi-level traced images which embeds the watermark into the bezier curves which compose the illustration. We will not be able to recover the information in the existing methods of embedding the information in the pixel value. Therefore, we propose a watermarking implementation which embedded into the bilevel traced images to solve problems mentioned above.

    CiNii Books

    researchmap

  • Game theoretic analysis of the value exchange system

    TAJIMA Yoshiaki, MIYATA Sumiko, MORIZUMI Tetsuya, KINOSHITA Hirotsugu

    IEICE technical report. Social Implications of Technology and Information Ethics   112 ( 488 )   201 - 206   2013.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, a local currency has been attracting attention for the purpose of circulating a thing and ser-vice in local community. However, if users have variety of values some in the same community, things and services may be not circulate. Thus, the value exchange systems-using the value of the local currency have been proposed. This concept of the variety of values is discussed and introduced in the system which exchanges the services and the values. Trading in the community becomes more active applying these systems. However, it was assumed that there are only two users in a community. Moreover, each user may not be satisfied by the proposed our system. In this paper, we extend our system to n users by using game theory. Moreover, we show the condition to satisfy all users in a community by using core of game theory.

    CiNii Books

    researchmap

  • Application of an RDF to an Ontology-Based Database for Nonwritten Materials Reviewed

    9   69 - 77   2013.3

  • A model of the value exchange system in the university with the big boss game Reviewed

    宮田 純子, 木下 宏揚, 森住 哲也

    In Proc. of ICEC2013   なし   2013

  • A watermarking method for the free form curve

    KUDO Takafumi, MIYATA Sumiko, MORIZUMI etuya, KINOSITA Hirotugu

    IEICE technical report. Social Implications of Technology and Information Ethics   112 ( 343 )   7 - 11   2012.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The number of sites on the Internet that are used to post cartoons and illustrations has been increased.A lot of techniques of the digital watermark for the color images such as photographs has been studied. Most of watermarking methods are not suitable for the cartoons and the illustrations with bilevel lines.In addition, plagiarism for the commercial purposes has been occured. Therefore, we propose a watermarking implementation which embedded into the bilevel traced images to solve problems mentioned above.

    CiNii Books

    researchmap

  • A value exchange system using the local currency value

    TAJIMA Yoshiaki, MIYATA Sumiko, MORIZUMI Tetsuya, KINOSHITA Hirotsugu

    IEICE technical report. Social Implications of Technology and Information Ethics   112 ( 343 )   1 - 6   2012.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The value exchange systems-using the value of the local currency have been studied. A local currency has been attracting attention for the purpose of circulating a thing and service in local community. The concept of the variety of values is discussed and introduced in the system which exchanges the services and the values. Trading in the community becomes more active applying these systems. Difficulties of discover of trading partners and the efficient circulation among inter-communities are serious problems. This paper surveys the trend of the local currency systems based on the variety of values. Furthermore, we propose a value exchange system which realizes transactions among inter-communities.

    CiNii Books

    researchmap

  • Trend and ethical problem of the honeypot

    LI Chao, MIYATA Sumiko, KINISHITA Hirotsugu

    IEICE technical report. Social Implications of Technology and Information Ethics   112 ( 343 )   13 - 18   2012.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With the development of the information technology, the security problem in many aspects become more andmore serious. The honeypot is an effective way to observe the network illegal access in such circumstances. Furthermore, we can learn the hacking skills and get some statistical information from the attackers to find the way to strengthen our system. In this paper, we introduce the technical details and the recent researches about honeypot, and then discussion the ethical issue from the aspect of the privacy problem, social impacts and the rules in research institutes.

    CiNii Books

    researchmap

  • 1-E-1 ユーザーによる干渉を考慮したセルラネットワークの幾何確率モデル(特別セッション 待ち行列と確率モデル(1))

    小林 拓矢, 三好 直人, 宮田 純子

    日本オペレーションズ・リサーチ学会秋季研究発表会アブストラクト集   2012   74 - 75   2012.9

     More details

    Language:Japanese   Publisher:公益社団法人日本オペレーションズ・リサーチ学会  

    CiNii Books

    CiNii Research

    researchmap

  • [Back cover]

    森住 哲也, 宮田 純子

    2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet   2012.7

  • Improvement of total call blocking rate with equality based CAC when cooperative users exist

    MIYATA Sumiko, YAMAOKA Katsunori, KINOSHITA Hirotsugu

    IEICE technical report   112 ( 85 )   85 - 90   2012.6

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We have proposed a novel Call Admission Control (CAC) to maximize total user satisfaction in a heterogeneous traffic network and showed the effectiveness of our CAC by using optimal-threshold from numerical analysis[1]. This CAC assumed that only such selfish users exist in the network. However, we need to consider the possibility that some cooperative users exist who would agree to reduce his requested bandwidth in order to improve another user's QoS/QoE. Under this assumption, the conventional CAC may not be optimal control. Moreover, if there are cooperative users in the network, we need some controls that encourage such user cooperation. However, these "encourage" controls have not yet have proposed. Therefore in this paper, we propose a novel CAC for cooperative user by using queueing theory. Moreover, numerical analyses show the effectiveness of our proposed CAC.

    CiNii Books

    researchmap

  • B-7-81 Increase of Accomodating General Telephone Calls by Holding Time Reduction under Emergency Condition

    Katagiri Hironori, Miyata Sumiko, Baba Ken-ichi, Yamaoka Katsunori

    Proceedings of the IEICE General Conference   2012 ( 2 )   242 - 242   2012.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • B-7-64 Relationship between average burst holding time and packet loss probability for two types of traffic

    MATSUOKA Shirou, MIYATA Sumiko, YAMAOKA Katsunori

    Proceedings of the IEICE General Conference   2012 ( 2 )   225   2012.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • B-7-50 An applicable method for equality based flow admission control when cooperative users exist

    MIYATA Sumiko, YAMAOKA Katsunori

    Proceedings of the IEICE General Conference   2012 ( 2 )   211   2012.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • Call Admission Control for Increasing the Number of Accommodated General Telephone Calls under Emergency Condition

    KATAGIRI Hironori, MIYATA Sumiko, BABA Ken-ichi, YAMAOKA Katsunori

    IEICE technical report. Information networks   111 ( 469 )   181 - 186   2012.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Under emergency condition, call admission control is required to accommodate more general telephone calls while accommodating the minimum necessary number of emergency telephone calls. Moreover, in order to increase the number of accommodated general telephone calls, it is important to encourage general telephone users to reduce holding time. In this paper, we propose the optimal trunk reservation method which maximizes the number of accommodated general telephone calls, while accommodating the minimum necessary number of emergency telephone calls. Then, we compare the blocking rate by using the proposed method with one by using the conventional method, and analyze the characteristic of blocking rate when the holding time reduce. By this comparison, we show that the number of general telephone calls can be increased, or guarantee the minimum necessary number of accommodated emergency telephone calls can be achieved by using our method. Moreover, by this characteristic analysis, we can reveal the effective traffic conditions that the blocking rate of general telephone calls decrease by reducing the holding time.

    CiNii Books

    researchmap

  • 二元トラヒック環境におけるパケットロス率の特性解析—Characteristic analysis of packet loss probability for two types of traffic—情報ネットワーク

    松岡 史朗, 宮田 純子, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   111 ( 469 )   205 - 210   2012.3

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • B-7-30 Improvement of individual call-blocking rate and resource utilization with CAC by introducing short waiting time

    MIYATA Sumiko, YAMAOKA Katsunori

    Proceedings of the Society Conference of IEICE   2011 ( 2 )   123   2011.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • ユーザ協力によりユーザQoSとシステム最適を実現するアクセスポイント選択法の特性解析—Characteristic analysis of an access-point selection algorithm for user QoS and system optimization by user cooperative moving—情報ネットワーク

    宮田 純子, 村瀬 勉, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   111 ( 146 )   23 - 28   2011.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • ユーザの移動協力によりユーザQoSとシステム最適を同時に満足するアクセスポイント選択アルゴリズムの提案—An access-point selection algorithm for user QoS and system optimization by user cooperative moving—モバイルマルチメディア通信

    宮田 純子, 村瀬 勉, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   111 ( 75 )   75 - 80   2011.6

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • An access-point selection algorithm for user QoS and system optimization by user cooperative moving

    2011 ( 13 )   1 - 6   2011.5

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • 要求帯域が分布に従う環境でのフロー間対等二元受付制御特性—Characteristic analysis of flow admission control based on equality when requested bandwidth follows some distribution—情報ネットワーク

    木村 拓人, 宮田 純子, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   110 ( 449 )   79 - 84   2011.3

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • B-7-9 Applicable area and improvement rate of total call blocking rate of CAC with mixed delay and loss system

    MIYATA Sumiko, YAMAOKA Katsunori

    Proceedings of the IEICE General Conference   2011 ( 2 )   173   2011.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • B-7-8 Effect of variation of required bandwidth for flow-admission control based on equality of heterogeneous traffic

    KIMURA Takuto, MIYATA Sumiko, YAMAOKA Katsunori

    Proceedings of the IEICE General Conference   2011 ( 2 )   172   2011.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • 即時待時混合二元受付制御のトータル呼損率特性解析—Characteristic analysis of total call blocking rate of CAC with mixed delay and loss system—情報ネットワーク

    宮田 純子, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   110 ( 341 )   69 - 74   2010.12

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • B-7-63 Improvement of total call-blocking rate of CAC with two type of flows by introducing short waiting time

    MIYATA Sumiko, YAMAOKA Katsunori

    Proceedings of the Society Conference of IEICE   2010 ( 2 )   140   2010.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • 少量のバッファ導入による二元受付制御のトータル呼損率改善効果—Improvement of total call-blocking rate of CAC with two type of flows by introducing small buffer—情報ネットワーク

    宮田 純子, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   110 ( 116 )   1 - 6   2010.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • B-7-28 A basic study of the flow admission control of mixed loss and delay system to reduce the total call-blocking rate

    MIYATA Sumiko, YAMAOKA Katsunori

    Proceedings of the IEICE General Conference   2010 ( 2 )   179   2010.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • B-7-66 Servers Sharing Method for Maximizing Download Users on Video Distribution Site

    YAMAMOTO Takayuki, MIYATA Sumiko, YAMAOKA Katsunori

    Proceedings of the IEICE General Conference   2010 ( 2 )   217   2010.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    CiNii Research

    researchmap

  • 視聴者数最大化を目的とした動画配信サイトのサーバ振分け方式

    山本, 誉之, Yamamoto, Takayuki, 宮田, 純子, Miyata, sumiko, 山岡, 克式, YAMAOKA, KATSUNORI

    電子情報通信学会 2010総合大会   2010.3

     More details

    Language:Japanese  

    identifier:oai:t2r2.star.titech.ac.jp:50156198

    CiNii Research

    researchmap

  • つばめ会の意義とは(東京工業大学,学生ブランチから,各支部・学生ブランチ学生員の感想)

    宮田 純子

    電子情報通信学会誌   93 ( 2 )   185   2010.2

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • SMDP最適多元受付制御を再現する定性的分析に基づいたクラス別呼損曲線—Class-based call-blocking curve to simulate SMDP optimum admission control based on characteristic analysis—情報ネットワーク

    河野 将弘, 宮田 純子, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   109 ( 411 )   81 - 86   2010.2

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • トータル呼損率低減フロー受付制御の待時即時混合モデルへの拡張—An extension of flow admission control for reducing total call-blocking rates to mixed loss and delay system—モバイルマルチメディア通信

    宮田 純子, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   109 ( 122 )   1 - 6   2009.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

  • 多元トラヒックの対等性を考慮したフロー受付制御の特性解析(二元モデル)—Characteristic analysis of flow admission control based on equality of heterogeneous traffic (two types of flows model)—情報ネットワーク

    白田 純子, 宮田 高道, 山岡 克式

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   108 ( 92 )   11 - 16   2008.6

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Books

    CiNii Research

    researchmap

▼display all

Presentations

  • Cost Sharing Method for a Mobile Tethering with a Coalitional Game Theory (Invited paper) Invited

     More details

    Language:English   Presentation type:Oral presentation (invited, special)  

    researchmap

  • 軌道誤り確率を考慮したスマートシティのためのUAVネットワーク構築

    宮田純子

    TIRIクロスミーティング  2023.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    researchmap

  • ユーザの誤り行動も加味した長期安定戦略を考慮した定常状態トラヒック制御

    宮田純子

    電子情報通信学会総合大会企画セッション  2022.3 

     More details

    Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    researchmap

  • Network Infrastructure to Realize City as a Service Invited

    Sumiko Miyata

    2024.9 

     More details

    Language:English   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    researchmap

  • Network Infrastructure to Realize City as a Service Invited

    Sumiko Miyata

    2024.6 

     More details

    Language:English   Presentation type:Oral presentation (invited, special)  

    researchmap

  • Accuracy based Rewarding for Sensors in Noisy Collaborative Point Cloud Acquisition Environments Invited

    Sumiko Miyata

    2025.2 

     More details

    Language:English   Presentation type:Oral presentation (invited, special)  

    researchmap

▼display all

Awards

  • 優秀発表賞

    2025.9   電子情報通信学会CQ研究会  

    小崎満稀, 平井健士, 宮田純子, 若宮直紀

     More details

  • 優秀発表賞

    2025.9   電子情報通信学会CQ研究会  

    小泉香奈, 宮田純子, 平井健士, 黒川 瞬

     More details

  • 優秀発表賞

    2025.9   電子情報通信学会IN研究会   4G/5G異種混合ネットワークにおける垂直ハンドオーバ発生頻度の近似解析

    菊地将太, 宮田純子, 会田雅樹

     More details

  • Best Tutorial Paper Award

    2025.5   D2EcoSys: Decentralized Digital Twin EcoSystem Empower Co-Creation City-level Digital Twins Date of Evaluation

    Kenji Kanai, Hidehiro Kanemitsu, Taku Yamazaki, Shintaro Mori, Aram Mine, Sumiko Miyata, Hironobu Imamura, Hidenori Nakazato

     More details

  • IEEE Best Workshop Paper Award

    2024.11   IEEE DASC 2024   Bertrand's Paradox in Vertical Handover: A Probabilistic Analysis

    Kenta Fukuhara, Sumiko Miyata, Masaki Aida

     More details

  • 優秀発表賞

    2024.7   電子情報通信学会IN研究会  

    宮川悠太, 宮田純子, 上岡英史

     More details

  • 学術奨励賞

    2024.3   電子情報通信学会SITE研究会  

    成清壮太, 宮田純子, 馬場健一, 山岡克式

     More details

  • 若手研究奨励賞

    2023.6   電子情報通信学会 NOLTAソサイエティ CCS研究会  

    田啓文, 宮田純子

     More details

  • 優秀発表賞

    2023.3   電子情報通信学会 情報ネットワーク研究会  

    小川晃平, 宮田純子

     More details

  • キャタピラーSTEM賞 一般部門 最優秀賞

    2023.2   キャタピラージャパン  

    宮田純子

     More details

  • 学術奨励賞

    2021.7   電子情報通信学会 SITE研究会  

    大沼 海仁, 宮田純子

     More details

  • 学術奨励賞

    2017.12   電子情報通信学会 SITE研究会  

    上村智子, 宮田純子

     More details

  • 学術奨励賞

    2016.6   電子情報通信学会SITE研究会   RTTの分散を考慮した中間者攻撃検知手法の提案

    佐藤隼人, 宮田純子, 加島宜雄

     More details

  • 貢献賞(研究専門委員会運営)

    2016   電子情報通信学会  

    宮田純子

     More details

  • モバイルマルチメディア通信研究若手研究奨励

    2011   電子情報通信学会 Momuc 研究会  

    宮田純子、山岡克式

     More details

  • 情報ネットワーク研究会研究賞

    2011   電子情報通信学会 IN研究会  

    宮田純子、山岡克式

     More details

  • 学生ブランチ・サービスアワード

    2010   電子情報通信学会 東京支部  

     More details

  • 第24回テレコムシステム技術学生賞

    2009   電気通信普及財団  

    宮田純子, 山岡克式

     More details

  • 学生ブランチ・サービスアワード

    2009   電子情報通信学会東京支部  

     More details

  • 学生ブランチ・サービスアワード

    2008   電子情報通信学会 東京支部  

     More details

▼display all

Research Projects

  • 非常時に様々な安心感の交換を実現する防災音声通信システム制御技術の研究

    Grant number:25H00778  2025.4 - 2029.3

    日本学術振興会  科学研究費助成事業  基盤研究(A)

    山岡 克式, 飯干 諒祐, 大江 朋子, 北口 善明, 大西 仁, 馬場 健一, 望月 要, 宮田 純子

      More details

    Grant amount:\46150000 ( Direct Cost: \35500000 、 Indirect Cost:\10650000 )

    researchmap

  • 点群データ認識における説明可能AIとゲーム理論を応用したネットワーク基盤の実現

    2025.4 - 2026.3

    マイクロン財団 

      More details

    Authorship:Principal investigator 

    researchmap

  • ヒューマンファクターを考慮した安全なスマートシティ実現に向けたネットワーク基盤の構築

    2024.11 - 2026.3

    電気通信普及財団長期海外研究援助  長期海外研究援助 

      More details

    Authorship:Principal investigator 

    researchmap

  • ストリーミング品質制御も考慮した確率幾何学的手法によるハンドオーバ制御手法の提案

    2024.4 - 2026.3

    電気通信普及財団  研究調査助成 

      More details

    Authorship:Principal investigator 

    researchmap

  • 社会に学び、社会に貢献する芝浦発スタートアップモデルの構築

    2024.1 - 2025.3

    東京都、大学発スタートアップ創出支援事業 

      More details

  • 空と陸のネットワーク基盤における高品質通信制御方式の提案

    2023.4 - 2025.3

    マツダ財団  マツダ研究助成 

      More details

    Authorship:Principal investigator 

    researchmap

  • Processing and Editing-Resistant Message Digest based on the deep learning and its applicatioin to copyright management

    Grant number:22K12036  2022.4 - 2027.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C)  Grant-in-Aid for Scientific Research (C)

      More details

    Grant amount:\4030000 ( Direct Cost: \3100000 、 Indirect Cost:\930000 )

    researchmap

  • 非常時により多くのユーザに安心を与える防災音声通信システム制御技術の研究

    Grant number:22H00247  2022.4 - 2026.3

    日本学術振興会  科学研究費助成事業 基盤研究(A)  基盤研究(A)

    山岡 克式, 望月 要, 馬場 健一, 大西 仁, 北口 善明, 大江 朋子, 宮田 純子

      More details

    Grant amount:\41990000 ( Direct Cost: \32300000 、 Indirect Cost:\9690000 )

    researchmap

  • 誤りをおかしたユーザ行動を考慮しながら超低遅延を実現する帯域割当方式

    Grant number:22K12015  2022.4 - 2025.3

    日本学術振興会  科学研究費助成事業 基盤研究(C)  基盤研究(C)

    宮田 純子

      More details

    Grant amount:\4160000 ( Direct Cost: \3200000 、 Indirect Cost:\960000 )

    researchmap

  • デジタルツインによるサイバー・フィジカル連携型セキュリティ基盤

    Grant number:05201  2022 - 2026.3

    Beyond 5G研究開発促進事業 

      More details

    Authorship:Coinvestigator(s) 

    researchmap

  • City as a Serviceを支えるデジタルツインを持続可能な状態で自己成長させるエコシステム

    Grant number:05601  2022 - 2025.3

    NICT  Beyond 5G研究開発促進事業 

      More details

    Authorship:Coinvestigator(s) 

    researchmap

  • カオス理論と待ち行列理論を融合した超長距離伝送の低遅延を実現する動的資源割当方式

    Grant number:19K11947  2019.4 - 2023.3

    日本学術振興会  科学研究費助成事業 基盤研究(C)  基盤研究(C)

    宮田 純子

      More details

    Grant amount:\4290000 ( Direct Cost: \3300000 、 Indirect Cost:\990000 )

    本研究の目的は,カオス理論を用いてLR-PONにおけるトラヒックの負荷の推定し,待ち行列理論を用いて,推定されたトラヒックに対して使用効率をあげつつ, 平均遅延時間を減少させる新たなパケット新たな帯域割当方式を期間内に実現することである. このEPONを用いた大規模システムであるLR-PONは,海外の住宅があまり密集していない地域でも使用できるため,国際的 に今後活用が注目されている.しかし,システムが大規模になればなるほど,システム構築を最適化するパラメータを決定するのは複雑な問題となる.近年盛ん に研究されている機械学習の利用では,一般に,長期的な予測しかできないため,実システムにそのまま応用するのは難しい. 本研究では,このような大規模かつ複雑なシステムに対して,(1) カオス理論を用いて規則性を発見し,その規則性により短期的なトラヒック予測を行いながら,(2) パケットの遅延時間が最小となるネットワーク資源割当の最適値を待ち行列理論を用いて導出する. (1)におけるトラヒック推定は,近年盛んに研究が進められている分野である機械学習とは異なり,超短期的な予測が可能となる.このような新たな観点からの LR-PON資源割当方式を設計するアプローチは,他に類を見ず極めて独創的な研究である.さらに,LR-PON特有の問題である,伝搬遅延が大きくなることが原因で生じる遊休区間に着目することで,待ち行列理論のポーリングモデルにうまく適用することができることを用いて解析を進める予定であり,LR-PONの大枠を大きく変えずに実現可能である.
    <BR>
    本年度は,カオス理論を用いるための基礎検討として,トラヒック密度がユーザの行動によってどう変化するのか解析を行った.さらに,トラヒックが変動する一因となる,ストリーミング通信のビットレートの解析についても行った.

    researchmap

  • High Speed Communications in Wide Area Covered with Massive Running Vehicles Equipped with Wireless LAN Access Point

    Grant number:19H04093  2019.4 - 2022.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B)  Grant-in-Aid for Scientific Research (B)

    MURASE TUTOMU

      More details

    Grant amount:\17030000 ( Direct Cost: \13100000 、 Indirect Cost:\3930000 )

    Currently, wireless LAN is provided on a spot basis, limiting the number of locations where it can be used. In contrast, the basic idea of this research is to install a wireless LAN access point (AP) in almost every vehicle running, and to select a vehicle's travel route so that it passes through the demand point without a break. We developed a technology to provide areal WiFi service by realizing issue 1 of this path control and issue 3 of high-speed communication at the moment the APs pass by. Furthermore, the interference problem was examined as Issue 2 to take into account that if the APs are too close to each other, radio wave interference may cause a problem that conversely degrades communication performance. The research results revealed that it is possible to provide a "high-speed, large capacity" network over a wide area.

    researchmap

  • Voice Communication CAC methods for emergency environments

    Grant number:17H01728  2017.4 - 2020.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B)  Grant-in-Aid for Scientific Research (B)

    Katsunori YAMAOKA

      More details

    Grant amount:\18590000 ( Direct Cost: \14300000 、 Indirect Cost:\4290000 )

    Both general calls and emergency calls are rushed to network when emergency events are happened such as disasters or incidents. Because many both calls are arrived at network and emergency calls are admitted preferentially, most of general call are not admitted and rejected.
    This research realizes new general voice communications call admission control methods for emergency situation. Target networks includes fixed or cellular public switched telecommunication network, NGN, and the Internet. More general calls can be
    admitted at networks by our proposed CAC methods, though the number of admitted emergency calls is not reduced.

    researchmap

  • 利他的および利己的ユーザの行動を考慮した長距離光アクセス網の動的帯域割当方式

    Grant number:16K16050  2017.2 - 2023.3

    日本学術振興会  科学研究費助成事業 若手研究(B)  若手研究(B)

    宮田 純子

      More details

    Grant amount:\4030000 ( Direct Cost: \3100000 、 Indirect Cost:\930000 )

    パーソナルコンピュータに加えてスマートフォンやタブレット端末の爆発的な普及により,増加するトラヒックを効率的に伝送するためには,高速なアクセス ネットワークを実現する光アクセスネットワークであるPONでの効率的な運用が必要となる.PONは,OLTが接続された単一のファイバに光スプリッタを接続し, 光信号を分岐・結合することで,低コストで光ネットワークを構築する技術である.このPON技術において,OLTと終端装置であるONUとの距離が100 km規模とな る大規模光アクセスネットワークを実現させる LR-PONに注目が集まっている.LR-PONを用いることで,装置を配置する局舎数や局舎内の装置数を削減しつつ, 収容ユーザ数を大幅に増加可能であることから,効率的な運用を求められる次世代光アクセスネットワークの基盤になると考えられている. 局側装置であるOLT (Optical Line Terminal)と終端装置であるONU (Optical Network Unit)との距離が100km規模となることを想定した光アクセス網のLRPON( Long Reach-Passive Optical Network)の上り通信では,パケット送出不可能となる遊休区間が発生するため平均遅延時間を減らすために効率的な帯域割当 方式が必要となる. そこで,まず基礎検討とし,EPONにおける平均遅延時間を減少させる新たな帯域割当方式を提案し,その厳密解を導出し各ONUが一度に送出可能なパケット送出量を制限させた方式も待ち行列理論を用いて解析を行った.これらの知見をもとに,ストリーミング通信を行うユーザ同士の行動がトラヒックにどう影響するかについて解析も行った.この特性解析結果を,本年度は帯域割当て制御に応用していく予定である.

    researchmap

  • Rational Admission Control by Consideing Irrational Behavior of Users

    Grant number:26730053  2014.4 - 2016.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B)  Grant-in-Aid for Young Scientists (B)

    Miyata Sumiko

      More details

    Grant amount:\3770000 ( Direct Cost: \2900000 、 Indirect Cost:\870000 )

    In this study, main purpose is modeling a call admission control scheme according to a new point of view to consider the irrational behavior of users. As the irrational behavior of users, we assumed that users abandon the requesting the streaming communication. These behaviors look like irrational. However, this model considering the irrational users revealed that the total user's satisfactions can be increased. Moreover, we analyzed a call admission control scheme under the optical access network. As a result, we could derive an exact solution for evaluation formula as a foundation for rational admission control with irrational behavior of users.

    researchmap

  • Call admission control considering both cooperative users and selfish users

    Grant number:24800067  2012.8 - 2014.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Research Activity Start-up  Grant-in-Aid for Research Activity Start-up

    MIYATA Sumiko

      More details

    Grant amount:\2990000 ( Direct Cost: \2300000 、 Indirect Cost:\690000 )

    We have proposed a novel call admission control (CAC) method for maximizing total user satisfaction in a heterogeneous traffic network and showed their effectiveness by using the optimal threshold from numerical analysis. With these CAC methods, it is assumed that only selfish users exist in a network.
    However, we need to consider the possibility that some cooperative users exist who would agree to reduce their requested bandwidth to improve another user's Quality of Service (QoS). Under this assumption, conventional CAC may not be optimal. If there are cooperative users in the network, we need control methods that encourage such user cooperation. However, such "encourage" control methods have not yet been proposed. Therefore, in this paper, we propose novel CAC methods for cooperative users by using queueing theory. Numerical analyses show their effectiveness. We also analyze the characteristics of the optimal control parameter of the threshold.

    researchmap

  • The value exchange systems which circulates information resources and services smoothly under the variety of values

    Grant number:23500135  2011.4 - 2016.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C)  Grant-in-Aid for Scientific Research (C)

    KINOSHITA Hirotsugu, MORIZUMI TETSUYA, MIYATA SUMIKO, SUZUKI KAZUHIRO

      More details

    Grant amount:\5200000 ( Direct Cost: \4000000 、 Indirect Cost:\1200000 )

    We construct a system that circulates goods, information and services safely among users who belong to the communities which have various sense of values. We propose a local currency system which represents not only the monetary price but also the volunteer like sense of values based on the game theory, digital rights management systems with the information capsules, detection schemes for the inconsistencies of settings of the access rights and the cloud file system which indicates information users suitable for the contexts.

    researchmap

  • ユーザ満足度に基づいた多元トラヒック受付制御方式の研究

    Grant number:11J08086  2011 - 2013.3

    日本学術振興会  科学研究費助成事業 特別研究員奨励費  特別研究員奨励費

    宮田 純子

      More details

    Grant amount:\1300000 ( Direct Cost: \1300000 )

    定額制通信サービスにおいては,利用帯域の大小にかかわらず,各ユーザの網への収容可否そのものがユーザの満足度に大きく影響を及ぼす.そこで,異なる帯域の通信を対等とみなす新しい考え方に基づいた,網への収容によりユーザ全体で得られる満足度を最大化する受付制御方式の実現を目指した.
    本研究では,二種類のフローが到着する状況において,制御パラメータに基づいて広帯域フローを適切に呼損とする場合の即時モデルにおける理論解析と特性解析,さらに,動画像などの広帯域フローに待機を許容した場合の待時モデルにおける理論解析をすでに遂行済みであった.そのため,まず,待時モデルの特性解析を完成させ,制御パラメータに基づいて広帯域フローを適切に呼損とする即時モデルとの特性比較を行った.続いて,要求帯域に応じたユーザ満足度の考慮や,様々な種類の要求帯域のフロー到着への対応は必要不可欠であるため,ユーザ満足度と要求帯域の関係を考慮した受付制御方式への拡張を行った.しかし,実ネットワークにおいては,利己的なユーザとは異なり,他のユーザのために協力的な行動をとる利他的なユーザも存在する可能性がある.そこで,このような協力的なユーザが存在する場合にも適用可能な新たな受付制御方式を提案し,理論解析および数値解析を行うことで提案方式の有効性を示した.以上,二種類のフローが存在する場合を対象として,網が現在おかれている状況を考慮しながら適切に到着フローを収容することで全ユーザ満足度を向上させる新しい受付制御方式が,研究時間内に実現した.

    researchmap

  • Security of multi-agent, which is a knowledge sharing type, using the relationship map of people and information

    Grant number:22500139  2010.4 - 2015.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C)  Grant-in-Aid for Scientific Research (C)

    MORIZUMI Tetsuya, SUZUKI Kazuhiro, KINOSHITA Hirotsugu, NOTO Masato, MIYATA Sumiko

      More details

    Grant amount:\4420000 ( Direct Cost: \3400000 、 Indirect Cost:\1020000 )

    We have proposed a new security concept and system of the cloud. It is not a concept to accept uncritically the principles and rules. And nor a concept that protect the individual entities. It is a concept that protect the behavior of oneself and others. For this purpose, it is defined as a local relative interaction behavior of oneself and others. Behavior of oneself and others gathered by the interaction of local relative swarm intelligence, swarm of behaviors are formed, and the behaviors are visualized. System rather than the detection of logical contradiction, is the evolutionary creation of a system that directs the coexistence of logical conflict. In other words, the system proposed is a pattern language rather than principle.

    researchmap

▼display all