Makoto Takizawa

Makoto Takizawa
Hosei University · Research Center for Computing and Multimedia Studies

Dr. of Engineering

About

1,152
Publications
41,487
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,400
Citations
Citations since 2016
372 Research Items
4244 Citations
20162017201820192020202120220200400600800
20162017201820192020202120220200400600800
20162017201820192020202120220200400600800
20162017201820192020202120220200400600800
Introduction
Makoto Takizawa received D.E.(1984) in Computer Science from Tohoku Univ. Japan. He was a professor of Advanced Sciences (-2021) and is now working for the Research Center for Computing and Multimedia Studies, Hosei Univ. He was on the Board of Governors of IEEE Computer Society(2003-2005). He was a program chair (1998) and general chair (2002) of IEEE ICDCS. He received the distinguished service award from IEEE Computer Society TCDP (2019). His research interest includes distributed systems.
Additional affiliations
April 2013 - present
Hosei University
Position
  • Professor (Full)
April 2008 - March 2013
Seikei University
Position
  • Professor (Full)
April 1990 - August 1990
Keele University
Position
  • Professor
Description
  • Professor S. Misbah Deen

Publications

Publications (1,152)
Chapter
In this paper a human-centered protocol will be presented for efficient and secure information management in distributed systems. Such techniques will be used in creation new security applications oriented on application of personal features in security solutions. Human-centered information management allow to facilitate data distribution in cloud...
Chapter
Wireless Mesh Networks (WMNs) are low-cost and have easy maintenance. However, WMNs have some problems such as node placement problem, security, transmission power and so on. In this work, we deal with node placement problem. In our previous work, we implemented a hybrid simulation system based on Particle Swarm Optimization (PSO) and Hill Climbing...
Chapter
It is critical to reduce the energy consumption of information systems to realize green societies. The IoT (Internet of Things) is so scalable that millions to billions of computers and devices are interconnected in types of networks and accordingly huge amount of energy is consumed. In our previous studies, the TBFC (Tree-Based Fog Computing) mode...
Chapter
The MVCC (Multi-Version Concurrency Control) is so far proposed to increase the concurrency of multiple conflicting transactions and the scalability of a distributed system. However, the larger number of transactions are concurrently performed, the larger amount of electric energy is consumed by servers in a system. In our previous studies, the EEM...
Chapter
Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost, and high robustness. However, designing a robust WMN at low cost requires the use of the least possible mesh routers but still interconnected and able to offer full coverage. Therefore, the placement of m...
Chapter
Wireless Mesh Networks (WMNs) have many advantages such as easy maintenance, low up-front cost, high robustness. However, WMNs have some problems such as node placement problem, security, transmission power and so on. In this work, we deal with node placement problem. In our previous work, we implemented a hybrid simulation system based on Particle...
Chapter
In the IoT (Internet of Things), data are exchanged among subjects and objects in devices through manipulating objects. Even if subjects manipulate objects in accordance with the CBAC (Capability-Based Access Control) model, the subjects can get data which are not allowed to be gotten by the subjects, i.e. illegal information flow and late informat...
Chapter
It is critical to reduce the electric energy consumption of information systems to realize green societies. Here, each server has to negotiate with other servers to decide on which virtual machine to migrate to and from which servers. In this paper, we newly propose an NM (Negotiation for Migration of virtual machines) protocol for servers to negot...
Chapter
In this paper a hybrid i.e. human-AI procedures will be defined for intelligent and secure data management in the Cloud. Such procedures will be useful in creation a new solution oriented on application of personal features in security technologies. User oriented data management can facilitate the secure information distribution over hierarchical s...
Article
In current information systems, a huge number of IoT (Internet of Things) devices are interconnected with various kinds of networks like WiFi and 5G networks. A large volume of data is gathered into servers from a huge number of IoT devices and is manipulated to provide application services. Gathered data is encapsulated along with methods to manip...
Article
The IoT (Internet of Things) is now one of the most significant infrastructure and has to be secure against malicious accesses. Especially, it is critical to make devices secure in the IoT. In the CBAC (Capability-Based Access Control) model adopted to the IoT, device owners issue subjects capability tokens, i.e. a set of access rights on objects i...
Chapter
It is critical to reduce the electric energy consumption of information systems to realize green societies. In this paper, we discuss the migration approach to reducing the energy consumption of servers by taking advantage of live migration technologies of virtual machines. We propose a VM (Virtual machine Migration) algorithm to make virtual machi...
Chapter
In object-based systems, applications are composed of multiple objects and transactions created on clients issue methods to manipulate the objects. Multiple conflicting transactions have to be serialize to keep all the objects mutually consistent. If the more number of transactions are concurrently performed in a system, the throughput of a system...
Chapter
In the IoT (Internet of Things), data are exchanged among subjects and objects in devices through manipulating objects. Here, even if subjects manipulate objects according to the CBAC (Capability-Based Access Control) model, the subjects can get data which the subjects are not allowed to get, i.e. illegal information flow and late information flow...
Chapter
In this paper, new approaches for secure data management will be described. Presented methods will be a semantic-based procedures, which for data handling use a semantic content and meaning. Such methods are designed for efficient data protection in cloud or distributed systems. Application of such procedures allow to significantly increase the sec...
Chapter
Wireless Mesh Networks (WMNs) have many advantages such as: easy maintenance, low upfront cost and high robustness. The connectivity and stability affect directly the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous work, we implemented a simulation system to so...
Chapter
Currently, data analysis processes based on individual, personalized recording techniques are used more and more. Such processes allow for intelligent data analysis considering only those elements that are of significant importance to a specific recipient. In addition, they provide the possibility of applying individual analysis results to deep dat...
Chapter
Wireless Mesh Networks (WMNs) have many advantages such as: easy maintenance, low upfront cost and high robustness. The connectivity and stability affect directly the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous work, we implemented a simulation system to so...
Chapter
This paper will discuss modern cognitive solutions dedicated to information processing. Cognitive processes, as the most individual methods of information processing, are characteristic of every human being, and thus transferred to the ground of machine solutions, they offer the possibility of deep, meaningful data analysis. Their distinguishing fe...
Chapter
In this paper, new data protection techniques based on fusion technology will be proposed. This method is designed to protect data with personalized protection protocols. Personalization is dedicated to precisely defined participants of the entire data protection protocols, without the possibility of changing or deleting them. The use of fusion tec...
Chapter
It is critical to reduce the energy consumption of clusters of servers. Through virtual machines, applications can take advantage of virtual services independent of heterogeneity and locations of servers. Here, we have to select a host server and a virtual machine on the server to perform an application process so that the total energy consumption...
Chapter
Process replication approaches using a server cluster system are widely used to provide reliable and available distributed application services. However, a server cluster system consumes a large amount of electric energy compared with process non-replication approaches. In this paper, an RATB-DSTPR (Redundant Active Time-Based algorithm with Differ...
Chapter
In the CBAC (Capability-Based Access Control) model for the IoT (Internet of Things), subjects are issued capability tokens, i.e. a set of access rights on objects in devices, by device owners. Objects are data resource in a device which are used to store sensor data and action data. Through manipulating objects of devices, data are exchanged among...
Chapter
In the CBAC (Capability-Based Access Control) model to make the IoT (Internet of Things) secure, subjects are issued capability tokens, i.e. a set of access rights on objects in devices, by device owners. Objects are data resource in a device which are used to store sensor data and action data. Through manipulating objects of devices, data are exch...
Chapter
Applications can take advantage of virtual computation services independently of heterogeneity and locations of servers by using virtual machines in clusters. Here, a virtual machine on an energy-efficient host server has to be selected to perform an application process. In this paper, we propose an SMI (Simple MI) algorithm to estimate the energy...
Chapter
The Blockchain is now used in various applications like Bitcoin. Here, a database named ledger is fully replicated on every node, which is a chain of blocks. Each block is composed of transactions and is appended to the ledger at each node. Nodes may tamper with transactions, i.e. nodes suffer from Byzantine faults. Consensus protocols tolerant to...
Chapter
In server cluster systems like cloud computing systems, process replication approaches are widely used to provide available and reliable distributed application services. However, process replication approaches imply the large amount of electric energy consumption than non-replication approaches. In this paper, an RATB-DSTFMRT (Redundant Active Tim...
Chapter
In this paper we’ll describe the possibilities of using Predictive Intelligence approaches in creation of thematic-based visual security protocols, oriented for user authentication. Such protocols will use human perception abilities and cognition thresholds features evaluated for particular authorized persons.KeywordsCryptographic protocolsUser-ori...
Chapter
In this paper, new approaches for secure information management will be presented. Such approaches use the hybrid human-AI methods oriented for security technologies. Such paradigm support management processes proposed for particular persons, thanks to the involvement of AI approaches. Such methods are designed for efficient data protection in dist...
Chapter
Wireless Mesh Networks (WMNs) have many advantages compared with the conventional Wireless Local Area Networks (WLANs) such as system resiliency, low cost, flexible coverage areas, rapid deployment, easy deployment, easy maintenance and high robustness. However, WMNs have some problems related with the node placement that effect the network connect...
Chapter
Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost, and high robustness. However, designing a robust WMN at low cost requires the use of the least possible mesh routers but still interconnected and able to offer full coverage. Therefore, the placement of m...
Chapter
It is critical to reduce the electric energy consumption of information systems to realize green societies. In this paper, we take the live virtual machine migration approach to reducing the energy consumption of servers. In our previous studies, each server is assumed to be able to obtain the local state of every other server like the number of ac...
Chapter
In current information systems like the IoT, a huge volume of data is gathered from various types of devices and is encapsulated along with methods as an object. An application is composed of multiple objects allocated to servers. Multiple conflicting transactions issued by clients have to be serialized to keep every object mutually consistent. How...
Chapter
Wireless Mesh Networks (WMNs) have many advantages such as easy maintenance, low upfront cost and high robustness. However, WMNs have some problems such as node placement problem, security, transmission power and so on. In our previous work, we implemented a hybrid simulation system based on Particle Swarm Optimization (PSO) and Hill Climbing (HC)...
Chapter
In the IoT (Internet of Things), objects in devices are manipulated by subjects. Here, data are exchanged among subjects and objects. Even if subjects manipulate objects according to the CBAC (Capability-Based Access Control) model, the subjects can get data which the subjects are not allowed to get, i.e. illegal information flow and late informati...
Chapter
The MVCC (Multi-Version Concurrency Control) is proposed to increase the concurrency of multiple conflicting transactions and the scalability of a distributed computing system. On the other hand, the larger number of transactions are concurrently performed in a system, the larger amount of electric energy is consumed on servers. In this paper, the...
Chapter
Wireless Mesh Networks (WMNs) have many advantages such as easy maintenance, low up-front cost and high robustness. However, WMNs have some problems such as node placement problem, security, transmission power and so on. In our previous work, we implemented a hybrid simulation system based on Particle Swarm Optimization (PSO) and Hill Climbing (HC)...
Chapter
Designing a robust Wireless Mesh Network (WMN) at low cost requires the use of the least possible mesh routers but still interconnected and able to offer full coverage. Therefore, the placement of mesh routers over the area of interest is a problem that entails thorough planning. In our previous work, we implemented a simulation system that deals w...
Chapter
Wireless Mesh Networks (WMNs) have many advantages compared with the conventional Wireless Local Area Networks (WLANs) such as system resiliency, low cost, flexible coverage areas, rapid deployment, easy deployment, easy maintenance and high robustness. However, WMNs have some problems related with the node placement that effect the network connect...
Article
Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost and high robustness. Connectivity and stability directly affect the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous...
Chapter
In data protection processes, security is increasingly being used, which is to some extent related to the creator of a given solution. Data security techniques based on the use of personal methods of securing information are increasingly used. Such solutions guarantee full data protection. This paper presents personalized data security techniques d...
Chapter
In server cluster systems, process replication approaches are widely used to provide reliable and available distributed application services. However, in process replication approaches, a large amount of electric energy is consumed by a server cluster since multiple replicas of each application process are performed on multiple virtual machines in...
Chapter
It is critical to reduce the electric energy consumption of information systems, especially clusters of servers. In order to reduce the energy consumption, we have to select a virtual machine on an energy-efficient server to perform an application process so that total energy consumption of servers can be reduced. Here, we have to estimate how much...
Chapter
The CBAC (Capability-Based Access Control) model where device owners issue subjects capability tokens, i.e., a set of access rights on objects in devices, is adopted to the IoT (Internet of Things). Objects are data resource in a device which are used to store sensor data and action data. A subject sbi can get data of an object omk in a device dk b...
Chapter
Reliable and available distributed application services can be provided by redundantly performing each application process. However, multiple replicas of each application process are performed on multiple virtual machines in a server cluster system. As a result, a server cluster consumes a large amount of electric energy to provide application serv...
Chapter
Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost, and high robustness. Connectivity and stability directly affect the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous...
Article
In the fog computing (FC) models, a fog node supports not only routing functions but also application processes. By the application processes, output data are calculated on input data from sensors and other nodes and sent to target fog nodes which can calculate on the output data. In this article, we consider the mobile topic‐based publish/subscrib...
Article
In the CBAC (Capability-Based Access Control) model proposed for realizing the secure IoT (Internet of Things), authorizers issue subjects capability tokens, i.e. sets of access rights on objects in devices. Objects are data resources which are used to store sensor data and action data. Data of an object may be stored in another object through comm...
Article
Full-text available
Networks of today are going through a rapid evolution. Diferent kinds of networks with diferent characteristics are emerging and they are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at diferent levels in the hardware and software design of communicating entities and communication...
Article
Full-text available
Opportunistic Networks (OppNets) are a sub-class of DTN, designed as a specialized ad hoc network suitable for applications such as emergency responses. Unlike traditional networks, in OppNets communication opportunities are intermittent, so an end-to-end path between the source and the destination may never exist. Existing networks have already br...
Article
In the Internet of Things, the CBAC (capability‐based access control) model is proposed to make devices securely accessed. Here, an owner of a device issues a capability token, that is, a set of access rights, to a subject. The subject is allowed to manipulate ROs (resource objects) in the device according to access rights in the capability token....
Chapter
Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost, and high robustness. Connectivity and stability directly affect the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous...
Chapter
Full-text available
Process replication can provide reliable and available distributed application services. On the other hand, a large amount of electric energy is consumed to provide replicated processes since multiple replicas of each application process have to be performed on multiple virtual machines in a server cluster system like cloud computing systems. In th...
Chapter
In the CBAC (Capability-Based Access Control) model proposed for the IoT (Internet of Things), authorizers, e.g. device owners, issue capability tokens, i.e. a set of access rights on resource objects in devices, to subjects. Since data of a device are stored in another device through communication among subjects and devices, a subject sb can get d...
Chapter
This paper presents new protocols dedicated to transformative computing technology. The main idea is based on human centered solutions characteristic for individual human perceptual and decision-making processes. Proposed solutions will be based on perception, recording and description processes leading to the meaningful data analysis. Evaluation o...
Chapter
Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost, and high robustness. Connectivity and stability directly affect the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous...
Chapter
Full-text available
In order to provide scalable and high performance distributed application services, an energy-efficient server cluster system equipped with virtual machines like cloud computing systems are required. Here, processing load of virtual machines has to balance with one another to not only achieve performance objectives but also reduce the total electri...
Chapter
Full-text available
The IoT (Internet of Things) consumes huge amount of electric energy since millions to billions of device nodes are interconnected. In order to decrease the energy consumption of the IoT, the TBFC (Tree-based Fog Computing) model is proposed in our previous studies. Here, fog nodes are hierarchically structured where a root node shows a cloud of se...
Chapter
The Fifth Generation (5G) network is expected to be flexible to satisfy user requirements and the Software-Defined Network (SDN) with Network Slicing is a good approach for admission control. In this paper, we consider the effect of Slice Overloading Cost on Admission Control for 5G Wireless Networks. We present a Fuzzy-based system for admission d...
Chapter
In this paper, we present a fuzzy-based driving-support system for real-time risk management in Vehicular Ad hoc Networks (VANETs) considering vehicle technical condition as a new parameter. The proposed system, called Fuzzy-based Simulation System for Driving Risk Management (FSSDRM), considers the current condition of different parameters which h...
Chapter
Full-text available
In the fog computing (FC) models, a fog node supports not only routing functions but also application processes. By the application processes, output data is calculated on input data from sensors and other fog nodes and sent to target fog nodes which can calculate on the output data. In this paper, we consider the MPSFC (Mobile topic-based PS (publ...
Chapter
Wireless Mesh Networks (WMNs) are an important networking infrastructure and they have many advantages such as low cost and high-speed wireless Internet connectivity. However, they have some problems such as router placement, covering of mesh clients and load balancing. To deal with these problems, in our previous work, we implemented a Particle Sw...
Chapter
Full-text available
We have to decrease electric energy consumption of information systems, especially servers to realize green societies. Information systems are composed of servers. One server is selected to perform an application process issued by a client so as to not only increase the performance but also reduce the energy consumption of the servers. In our previ...
Chapter
Full-text available
In the IoT (Internet of Things), the CBAC (Capability-Based Access Control) model is proposed to make sensor and actuator devices secure. Here, an owner of a device issues a capability token, i.e. a set of access rights to a subject. The subject is then allowed to manipulate resource objects in the device according to the access rights in the capab...
Chapter
Full-text available
It is critical to reduce electric energy consumed in information systems, especially servers in clusters to realize green society. By making a virtual machine migrate from a host server to a guest server, the energy consumption of the host server can be reduced since application processes on the virtual machine leave the host server. On the other h...
Chapter
Traditional Vehicular Ad hoc Networks (VANETs) experience several challenges in deployment and management due to poor scalability, low flexibility, bad connectivity and lack of intelligence. The integration of Cloud, Fog and Edge Computing in VANETs together with the use of Software Defined Networking (SDN) are seen as a way to deal with these comm...
Chapter
In this work, we implement two Fuzzy-Based Systems: Node Elimination System (NES) and Node Selection System (NSS) for IoT node elimination and selection in OppNets. We use three input parameters for NES: Node’s Distance to Event (NDE), Node’s Battery Level (NBL), Node’s Free Buffer Space (NFBS) and four input parameters for NSS: Node’s Number of Pa...
Chapter
In this paper, we propose an intelligent Fuzzy-based Simulation System for Driver Risk Management in Vehicular Ad hoc Networks (VANETs). The proposed system considers Vehicle’s Environment Condition (VEC), Weather Condition (WC), Vehicle Speed (VS) and Driver’s Health Condition (DHC) to assess the risk level. The input parameters’ data can come fro...
Chapter
The Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure because they have many advantages such as low cost and increased high speed wireless Internet connectivity. In our previous work, we implemented a simulation system considering Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Distributed Genetic Alg...
Chapter
Full-text available
Wireless ad-hoc networks are getting more important in various applications like V2V (vehicle-to-vehicle) networks and opportunistic networks. Here, it is critical to reduce the electric energy consumption of nodes in networks. Each node consumes more energy to perform software processes to send and receive messages than the wireless communication...
Chapter
Full-text available
In order to reduce the traffic of networks and servers in the IoT, types of the fog computing (FC) models are proposed, which are composed of fog nodes. A fog node supports application processes to calculate output data on sensor data and forward the output data to servers. A topic-based PS (publish/subscribe) model is a new contents-aware, event-d...
Chapter
The Software-Defined Network (SDN) will be the key function for efficient management and control in Fifth Generation (5G) networks. In this paper, we propose an Admission Control System for 5G Wireless Networks by considering Fuzzy Logic and SDN approaches. We use 4 input parameters: Grade of Service (GS), Slice Utility (SU), User Request Delay Tim...
Chapter
Full-text available
In object-based information systems, an application is composed of multiple objects and each object is replicated on multiple virtual machines installed in multiple physical servers to make an application service reliable and available. On the other hand, the total amount of electric energy consumed in physical servers is larger than non-replicatio...
Chapter
Full-text available
In order to make a system tolerant of faults, an application process is replicated on multiple servers. Application processes more easily get faulty due to bugs and security attacks like virus than servers according to the advances of hard- ware and architecture technologies. Even if a replica sends a proper reply, the replica may not do proper com...
Chapter
Vehicular Ad hoc Networks (VANETs) face several technical challenges in deployment and management due to poor scalability, flexibility, connectivity and lack of intelligence. The integration of Cloud, Fog and Edge Computing in VANETs together with the use of Software Defined Networking (SDN) are seen as a way to cope with these communication challe...
Chapter
Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure because they have many advantages such as low cost and increased high-speed wireless Internet connectivity. In our previous work, we implemented a Particle Swarm Optimization (PSO) based simulation system (called WMN-PSO), and a simulation system based on Genetic Algo...
Chapter
The growth in sensor networks and importance of active devices in the physical world has led to the development of Wireless Sensor and Actor Networks (WSANs). WSANs consist of a large number of sensors and also a smaller number of actors. Whenever there is any emergency situation i.e., fire, earthquake, flood or enemy attack in the area, sensor nod...