Takahiro Matsuo

Learn More
The reliability of the HHV-6B LAMP using the dry-reagent method was evaluated using serum samples obtained from febrile children. The sensitivity of the original and dry-reagent methods was 10 copies/reaction and 100 copies/reaction, respectively. The dry-reagent LAMP method was highly sensitive (94.0%) and specific (96.0%) for the detection of HHV-6B.
We investigate the performance of TCP under three representatives of packet scheduling algorithms at the router. Our main focus is to investigate how fair service can be provided for elastic applications sharing the link. Packet scheduling algorithms that we consider are FIFO (First In First Out), RED (Random Early Detection), and DRR (Deficit Round Robin).(More)
Organic rechargeable batteries have received significant research interest from the viewpoints of structural diversity and sustainability of electrode materials. We designed core structures of organic cathode materials for lithium-ion (Li-ion) batteries based on density functional theory (DFT) calculations, which indicated that six-membered cyclic(More)
Although many research efforts have been devoted to the network congestion against an increase of network traffic in the Internet, only a few discussions are recently made on the performance improvement of the endhosts. In this paper, we focus on TCP buffer tuning to provide high performance and fair service for many TCP connections at Internet endhosts. We(More)
Designing a lithium ion battery (LIB) with a three-dimensional device structure is crucial for increasing the practical energy storage density by avoiding unnecessary supporting parts of the cell modules. Here, we describe the superior secondary battery performance of the bulk all-solid-state LIB cell and a multilayered stacked bipolar cell with doubled(More)
Most of the researches have been concentrated on how to avoid and dissolve the network congestion, and only a few discussions on the performance improvement of the endhosts are recently made. In this paper, we focus on data transfer using TCP and analyze the details of TCP data transfer at the endhost. Through the analysis, we have found that memory access(More)
  • 1