Hiroki Nogawa

Learn More
Real-time video pictures can be transmitted inexpensively via a broadband connection using the DVTS (digital video transport system). However, the degradation of video pictures transmitted by DVTS has not been sufficiently evaluated. We examined the application of DVTS to remote consultation by using images of laparoscopic and endoscopic surgeries. A(More)
BACKGROUND Starting in the late 1980s, the Japanese government decreased the number of students accepted into medical school each year in order to reduce healthcare spending. The result of this policy is a serious shortage of doctors in Japan today, which has become a social problem in recent years. In an attempt to solve this problem, the Japanese(More)
The nature of data exchanged between DNS (domain naming system) servers and resolvers has been changed since the introduction of IPv6 (Internet protocol version 6) because of the increased address length and other technical enhancements. These changes and recent security concerns raise questions against fundamental design principles of the DNS protocols,(More)
This paper describes the Visible Human (VH) part of the Trans-Pacific Demonstrations of the G7 Information Society-Global Interoperability for Broadband Network (GIBN) Projects. Aiming at a world-wide Visible Human Anatomical Co-laboratory, an application (VHP Viewer) was developed, which was used for data transmission testing (Trans-Pacific Demonstration(More)
A method of evaluating brain function using the metacomputer concept of the Globus system combined with the Message Passing Interface (MPI) is described. The proposed method has the ability to exploit various geographically distributed resources and parallel computing linked to a high-technology medical instrumentation system (magnetoencephalography) to(More)
In this paper, we propose a method for snooping AES encryption key on Virtual Machine Monitor (VMM), and we present countermeasures against this attack. Recently, virtualization technology has rapidly emerged as a key technology for cloud computing. In general, the virtualization technology composes two software parts: one is virtual machine (VM) management(More)
Domain Name System (DNS) is a major target for the network security attacks due to the weak authentication. A security extension DNSSEC has been proposed to introduce the public-key authentication, but it is still on the deployment phase. DNSSEC assumes IP fragmentation allowance for exchange of its messages over UDP large payloads. IP fragments are often(More)