Updated on 2024/03/30

写真a

 
KOBAYASHI,Takashi
 
Organization
Faculty of Informatics Associate Professor
Title
Associate Professor
Contact information
メールアドレス
External link

Degree

  • Master of Engineering ( 1994.3 )

Research Areas

  • Informatics / Information security

  • Manufacturing Technology (Mechanical Engineering, Electrical and Electronic Engineering, Chemical Engineering) / Communication and network engineering

  • Informatics / Computer system

  • Informatics / Intelligent informatics

Education

  • Nara Institute of Science and Technology   Graduate School, Division of Information Science   Information Processing

    2010.4 - 2015.3

      More details

  • Kansai University   Graduate School, Division of Engineering

    1994

      More details

    Country: Japan

    researchmap

  • Kansai University   Faculty of Engineering

    - 1992

      More details

    Country: Japan

    researchmap

Research History

  • Lecturer, Kansai University (Faculty of Informatics)

    1997.4 - 2004.3

      More details

  • Assistant, Kansai University (Faculty of Informatics)

    1994.4 - 1997.3

      More details

Professional Memberships

  • Institute of Electoronics, Information and Communication Engineering

      More details

  • 日本計算工学会

      More details

  • 人工知能学会

      More details

  • Information Processing Society of Japan

      More details

  • Institute of Electorical and Electronics Engineers

      More details

Papers

  • DOM-Based XSS Detection System for Developers

    Ryosuke NATORI, Takashi NAKAHARA, Yusuke HATA, Tatsuya MAEDA, Yuto ONISI, Takashi KOBAYASHI

    IPSJ SIG Technical Report   2023-CSEC-102 ( 16 )   1 - 6   2023.7

     More details

    Authorship:Last author  

    researchmap

  • Proposal for a Dataset to Evaluate the Detection Accuracy of DOM-Based XSS Vulnerability Detection Systems

    Yusuke HATA, Takashi NAKAHARA, Ryosuke NATORI, Tatsuya MAEDA, Takashi KOBAYASHI

    IPSJ SIG Technical Report   2023-CSEC-102 ( 15 )   1 - 6   2023.7

     More details

    Authorship:Last author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • A Lightweight Method for Convolutional Neural Networks for DDoS Detection

    Zhao Yumbo, Takashi KOBAYASHI

    IPSJ SIG Technical Report   2023-IOT-60 ( 21 )   1 - 6   2023.3

     More details

    Authorship:Last author  

    researchmap

  • The Effectiveness of Authentication Time in Detecting the SSH Bruteforce Attacks

    Takashi KOBAYASHI, Koki SHIMADA, Hideyuki OTOSHI, Shingo ISA, Mizuki TAKEDA

    IPSJ SIG Technical Report   2022-IOT-58 ( 11 )   1 - 6   2022.7

     More details

    Authorship:Lead author  

    researchmap

  • Proposal of integrated management and real-time visualization system for SSH server logs based on graph theory

    Hideyuki OTOSHI, Takashi NAKAHARA, Yusuke HATA, Tatsuya MAEDA, Takashi KOBAYASHI

    IPSJ SIG Technical Report   2022-IOT-58 ( 8 )   1 - 8   2022.7

     More details

    Authorship:Last author  

    researchmap

  • DOM-Based XSS Prevention Support System for Developers Using Abstract Syntax Tree Analysis

    KOBAYASHI,Takashi, NAKAHARA, Takashi, IDE, Shuta, MAEDA, Tatsuya, HATA, Yusuke

    IEICE Technical Report   vol. 121, no. 410, ICSS2021-72, pp. 78-86,   2022.3

     More details

    XSSvulnerabilityisavulnerabilitythatallowsanattackertoexecutearbitraryJavaScriptviathe vulnerable implementation of a web application, and developers are required to reduce software vulnerabili- ties. In this paper, we propose a system that warns developers of DOM-Based XSS during the development stage. In the detection of DOM-Based XSS, flow analysis using abstract parse trees improves the detection rate and performance compared to existing dynamic analysis systems using taint propagation.

    researchmap

  • The building and operation of SSH server for collecting password authentication information and the attack detection method using the system

    KOBAYASHI,Takashi, SHIMAOKA, Shuya, TANG, Xinyue, SHIMADA, Koki, OGAWA, Ryoga

    IPSJ SIG Technical Report   Vol.2021-IOT-53 No.16   2021.5

     More details

    SSH protocol is widely applied to UNIX-like operating systems because of the remote access method’s capability with authentication and encryption technology. However, its purpose is to operate the shell of the server directly, so the servers tend to become the target for the attackers who the company’s confidential information. To observe the SSH accesses with password authentication, we build the recording system for the authentication user name, password, RTT, authentication time, IP addresses and operate it in our laboratory. In this paper, we describe the system structure and operational thing. We also propose the attack detection method with this system under clearing the attacks’ characteristics for the SSH servers.

    researchmap

  • 機械学習を用いたスマートフォンのモーションセンサによる個人認証方式の提案

    小林 孝史, 播磨 尚希, 平松 耕輔

    情報科学技術フォーラム講演論文集2019   M-035   2019.9

     More details

  • A proposal of the detecting method of IoT bot based on analysis of process structure

    KONISHI, Tatsuya, KOBAYASHI,Takashi

    Proceedings of 17th Forum on Information Technology   L-023   2018.9

     More details

  • A Proposal of the backup system with Cloud Storage System for ransomware countermeasure

    HARIKO, Naoki, KOBAYASHI,Takashi

    Proceedings of 17th Forum on Information Technology   L-016   2018.9

     More details

  • The development of Drive-by Download attack prevention system using Proxy and ICAP

    YAMAZAKI, Masato, KOBAYASHI,Takashi

    Proceedings of 17th Forum on Information Technology   L-021   2018.9

     More details

  • Analysis of SSH attack tendency based on Darknet analysis

    KOBAYASHI,Takashi, MATANO, Tsuyoshi, BANDO, Tsubasa

    IPSJ SIG Technical Report   Vol. 2018-IOT-41, No.17   2018.5

     More details

    The number of devices that can be accessed from the Internet is on the rise, and the possibility of being attacked / damaged is increasing. It seems that servers that are not well managed and devices operating with the default ID and password are speci cally targeted, and the administrator can grasp the trend as soon as possible and change the operation method of the server Measures are necessary. Our laboratory operates SSH honeypot, and we are working on research to prevent password brute force attack etc. In order to grasp a more detailed attack tendency, we analyzed the access log to Darknet and analyzed the correlation between access to Darknet and SSH honeypot. As a result, access to the SSH honeypot occurred within about 1 day after accessing Darknet, and most of it was found to be concentrated within 14 hours.

    researchmap

  • Proposal to support analysis of Drive-by Download attack by highlighting malicious URL

    OZAKI, Kouya, UEYAMA, Shinya, KONISHI, Tatsuya, YAMAZAKI, Masato, BANDO, Tsubasa, KOBAYASHI, Takashi

    Proceedings of Computer Security Symposium 2017   2B4-2   2017.10

     More details

    Nowadays, it is difficult to analyze attacks on web applications due to the attacker's identity camouflage and the obfuscation of JavaScript. So far, we have developed an application to visualize the multistage redirecting caused by Drive-by Download attacks, as a tree. In this research, we add a function to highlight URLs with malignant quantities obtained by decision tree learning. We aim support for a more efficient analysis to by highlighting malignant URLs.

    researchmap

  • 認証時間に基づいたSSHパスワードクラッキング攻撃検知手法の提案

    坂東 翼, 上原 拓也, 小林 孝史

    第16回情報科学技術フォーラム   L-015   2017.9

     More details

    パスワードリスト攻撃やブルートフォース攻撃などによるSSHサーバへのパスワードクラッキング攻撃を検知する手法として,キーボードによるパスワード入力が伴う通常の認証試行と,認証に必要な処理を自動化したツールによる認証試行との間に生じる認証時間の差異に基づいた検知手法を提案する.また,本提案手法による認証時間計測機能を実装したOpenSSHサーバを実際に運用し,その有効性を検証する.本提案手法では,単位時間あたりにおける認証試行数や,1コネクションにおけるパケット送受信回数を指標とした従来の検知手法では対応できない,分散型の攻撃の検知が可能である.

    researchmap

  • 加速度センサーメトリクスとその応用に関する研究

    小林 孝史, 平松 耕輔

    第16回情報科学技術フォーラム   CL-003   2017.9

     More details

  • Artificial Metrics of Electric Devices and Their Applications

    KOBAYASHI,Takashi, KUWAKADO, Hidenori, HORII, Yasushi, KAMBARA, Tomoya

    第46号, pp.1-22 ( 46 )   1 - 22   2017.7

     More details

  • Development and Evaluation of Analytical Support Application for Drive-by Download Attacks

    AOYAMA,Yuhei, YOSHII,Akira, OHKRA,Kaho, OZAKI, Koya, BANDO,Tsubasa, KOBAYASHI, Takashi

    Computer Security Symposium 2016   Vol.2016, No.2, pp.819 - 825   2016.10

     More details

    The automatic download of malware by Drive-by Download attacks becomes a big problem.It is necessary to clear the attack flow, however the analyzing work flow needsprofessional knowledges and massive time.We develop the application to support the analyzing workflows of Drive-by Download attacks,and all over the attack can be easier to understand by visualizing the relationshipamong the data as tree structure.We use the D3M datasets to evaluate the performance of this application.We can show the relationship of 80% traffic data of D3M datasets correctly.

    researchmap

  • Development of Personal Authentication Application Using the Motion Sensor of a Smartphone

    KOSAKA,Kensuke, KOSUKE,Hiramatsu, KOBAYASHI, Takashi

    L-020   2016.9

     More details

  • ピュアP2P型分散ファイルシステムにおける均一なデータ配置の実装と提案

    平松 謙隆, 小林 孝史

    第15回情報科学技術フォーラム   C-038   2016.9

     More details

  • An approach for controling IRCbot's activity using IPS

    SAKAI,Ryosuke, KOBAYASHI,Takashi

    Proceedings of Computer Security Symposium 2015   3E4-3   2015.10

     More details

    Nowadays, damage from a malware is increasing and cracker’s purpose is changing from pleasure to profit from attacking the computer. In such a situation, it seems that malware’s threat will become more serious. Hence we focus on the bot that is a kind of malware and IRC that is often used when bot communicate with C&C server. In this study, we propose the method to distinguish the command of legitimate IRC client from IRCbots by attaching an identifer to IRC client’s connection. Further, we show that the activities of IRCbots can be controlled by obstructing the bot’s connection using IPS.

    researchmap

  • Analysis of SSH Access on Kansai University

    NAKATA,Kyohei, YOSHII,Akira, SAKAMOTO,Kaname, KOBAYASHI,Takashi

    IPSJ SIG Technical Report   Vol.2015-IOT-31, No.8   2015.9

     More details

    The remote login is essential to take advantage of computer resources deployoed at remote locations. SSH is the protocol which is generally used by the remote login. But it may be targeted in attackers because who can connect to computer if only to make authentication succeed for once. Accordingly, providing SSH service should carry out with the regorous security rules and it is always necessary to monitor access attempts logs. We analyzed attacker's features by analyzing attackers' access attempted date, IP address, hosted country and user name from access attempt log which attempted to IP address assigned to Kansai University. Moreover, we had observed attacker's activity and strategy by setting up honeypot. In this paper, we report the results of experimental and analysis.

    researchmap

  • システムの状態に基づく強制アクセス制御の設計と実装

    赤坂 翔太, 小林 孝史

    第14回情報科学技術フォーラム講演論文集   L-015   2015.9

     More details

    強制アクセス制御機能を含む従来のセキュアOSは,システム内部がどのような状態にあっても常に同一のアクセス制御を行なう.これはシステムが乗っ取られた場合には非常に有効に働くが,一般的なOS環境では,システムが安定している状態や高負荷にある状態等といった多種多様な状態を定義することができる.従来のセキュアOSは,これらの状態に着目した強制アクセス制御を行なう術を持たない.そこで本稿は,システムの状態が多様に変遷する場合において,それぞれの状態に適応可能な強制アクセス制御手法を提案する.そして,Linuxカーネル上に独自の強制アクセス制御システムを実装し,それの性能評価の結果を報告する.

    researchmap

  • 画像の劣化を用いた認証システムの開発と検証

    中野 翔太, 小林 孝史

    第13回情報科学技術フォーラム講演論文集   L-015   2014.9

     More details

    Web上の数多くのサービスは利用するためにパスワードが必要なことが多い.しかし,数多くのサービスですべて異なるパスワードにすることは難しく,パスワードの使いまわしが発生し,ユーザアカウントが乗っ取られたときの被害は大きくなりがちである. 本研究では,コンピュータについての高度な知識を有していないユーザでも利用でき,なおかつ人間が記憶しやすい"画像"を鍵として認証方式を提案し,その画像を認証のたびに劣化させることで鍵情報が認証のたびに変更されるようにした.また,提案手法の検証を行った結果,利用者はパスワードと比較してより多くの認証情報を記憶できることを確認した.

    researchmap

  • The implementation and its evaluation of the filesystem using P2P technology Reviewed

    Takashi Kobayashi, Fumihisa Shigekane, Hideaki Tanaka

    Proceedings of the 26th Annual Conference of JSAI, 2012   1A3-OS-17b-3   2012.6

     More details

  • Proposal and Implementation of remote support live migration

    Koutarou Yamada, Takashi Kobayashi

    IEICE Technical Report   Vol.111, No.468, pp.129-132 (NS2011-202)   2012.3

     More details

  • On the automatic adjustment of therewall's rules

    Yuu Nishida, Takashi Kobayashi

    IEICE Technical Report   IN2011-88, pp.53-56   2011.10

     More details

    Although the administrator checked the log of IDS and has added a new rule to therewall in theconventional system, the administrator's burden increases as the log of IDS becomes huge. So, in this research,the log of IDS is checked instead of an administrator, the system which rewrites the con gurationle of arewallautomatically is proposed, and the evaluation is performed. The keyword which expresses the danger of an IPaddress and an attack with the system to propose from the log of IDS is extracted, and the program which adds arule for it to origin automatically at arewall is mounted.

    researchmap

  • Keystroke Authentication Using the Neural Network

    Kosuke Kimata, Takashi Kobayashi

    IEICE Technical Report   IN2011-87, pp.49-52   2011.10

     More details

    The keystroke dynamics use time to need it for key input such as time from pushing to separating thekey as a characteristic to identify an individual. However, the keystroke dynamics is behavioral characteristics, andthe value input everytrial is not constant. Therefore, when uses this technique for a personal identi cation system,it becomes important to appropriate characteristic extraction, and personal identi cation to realize higher precisioncerti cation. In this study, We pay atention at time from pushing to separating one key said to that unevenness ishard to occur even the person that key input is unripe in keystroke dynamics, and let a neural network learn thischaracteristic, and suggest certi cation technique extracting a characteristic, and show the evaluation result by theexperiment.

    researchmap

  • Research on the load-balancing System for a contents-based flexible configuration

    Kazunori Yuki, Takashi Kobayashi

    IEICE Technical Report   NS2011-101, pp.105-108   2011.10

     More details

    The number of servers is decided depending on the amount of the loads of services in the case of tradi-tional load balancing system, then the distributed system is con gured. However, the administrator have to adjustthe number of servers depending on the assumed amount of the loads, and it is not able to treat immediately againstthe varying or unexpected loads. In addition, if the system is con gured so as to treat the maximum load of theservice, it will cause the extra, unnecessary resources. Currently, in the cloud environment, there is the systemthat increase or decrease the number of instances depending on the varying loads. However, such cloud system isnot able to increase or decrease the number of instances based on the load of the each contents. In this paper, weimplement the dynamic load balancing system based on the load status of each contents and propose the methodfor maintaining the load balance of the whole system.

    researchmap

  • Implementation of the distributed file system using P2P technology

    Hideaki Tanaka, Takashi Kobayashi

    IEICE Technical Report   NS2011-100, pp.99-104   2011.10

     More details

    Distributed File System is one of the system that consist of many computers. In a Distributed File System, it is possible to use total amount of storage which each computer has as one storage. In this system, storage capacity can be changed by perfoming an addition and removal of a computer. A Distributed File System implemented in this research dose not have a management computer which becomes a single failure point in a system. Distributed File System implemented in this research,form a P2P network between computers. Therefore the system dose not have a single failure point. And the system could keep runnning, even if a computer drops out from the network.

    researchmap

  • Toward Time-Sensitive Structure Analysis for SPAM Filtering: A Data Mining Approach Reviewed

    Atsushi Inoue, Isao Hayashi, Toshiyuki Maeda, Yoshinori Arai, Takashi Kobayashi

    2011.5

     More details

    The rapid growth of the Internet has caused issues concerning SPAM messages. As a result of this being a widespread social problem, many Mail User Agents (MUAs) are facilitated with SPAM filters. Unfortunately, the most of those filters use probability-based methods that concern only their contents such as word frequencies, thus do not properly perform SPAM filtering based on their intrinsic structure. Moreover, hardly any SPAM filters are sensitive to change in attributes over time. This paper introduces our anticipation toward their time-sensitive structure analysis. Taking a data miningapproach on both headers and contents of mail messages, we analyze significance, validity and utility for SPAM filtering. Attributes are selected from their header fields as well as various summarization of their contents. Such a data mining approach is then taken in consecutive time periods in order to study timesensitivity, i.e. change of significant attributes over time. Some cross validation is conducted in order to show validity. Decision Tree Learning (DTL) is currently deployed for its advantage of identifying significance based on Information Entropy. Finally, we present results throughout experiments using mail messages sent to an actual site.

    researchmap

  • A proposal of structure analysis method for spam filtering Reviewed

    Takashi KOBAYASHI, Ayane TSUJINO, Rie SASAKI, Toshiyuki MAEDA, Yoshinori ARAI, Atsushi INOUE, Isao HAYASHI

    pp.587-592   2010.9

     More details

    The development of the Internet has become a widespread social problem of spam. As a result, many mail user agent software are developed that have the function of spam filtering. However, in these filters, they only have the probabilistic selection methods, and the distinction methods are not based on the kind and structure of spam mail.In this paper, we propose an analysis model that estimate the distinction class of spam mail by various input properties. These properties are picked out by extracting the header fields and body text of spam mails. Then, we classify time-seriesed mail dataset by using data mining methods, and verify the classification by n-fold cross validation method. Finally, we make a study of its usefulness by actually received mail.

    researchmap

  • Implementation of load balancing for Hybrid Node In Mobile IPv6 Reviewed

    Takahisa Yamada, Takashi Kobayashi

    2009.3

     More details

    In MIP6, that is a mobile technology for IPv6, the mobile nodes (MNs) can continue their communications after moving, so that MNs use the triangle route through Home Agent (HA). On the communications of triangle route if the number of MNs managed by HA, the load of HA will increase. And when some troubles of HA will happen, MNs cannot continue their connections, so the redundant system of HAs is needed. We proposed the Hybrid node that has the functions of both of MN and HA, and inspected the usefulness of it to achieve the efficiently redundant system. And the redundant system by Hybrid nodes achieves to reduce the unnecessary resources and the cost of new HAs deployment. However, HA and Hybrid nodes cannot distinguish from other nodes because the Hybrid nodes use Anycast Address same as HA. Therefore, there is a possibility of increasing the MNs managed by Hybrid nodes, and the Hybrid node itself may not be able to communicate using mobile connection. In this paper, we will discuss the implementation of the function of load balancing of when the imbalance of load among Hybrid nodes and HA exceeds the threshold value.

    researchmap

  • Optimal location of wireless LAN access points using fuzzy ID3

    Isao Hayashi, Takashi Kobayashi, Yoshinori Arai, Toshiyuki Maeda, Atsushi Inoue

    Journal of Advanced Computational Intelligence and Intelligent Informatics   13 ( 2 )   128 - 134   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Fuji Technology Press  

    Although wireless LAN is useful in its small size and mobility, the connection region of transmitted radio wave is strongly affected by other electric devices, consumer products, and differences in size and type of the room. Besides, wireless LAN points (APs) must exclude a personal computers without permitting to connect to the Internet. Therefore, how optimally APs are located is important. In this paper, we propose the APs' optimal location method. The proposed algorithm integrates fuzzy rules acquired by fuzzy ID3 with knowledge of security experts, and estimates the connection region for AP. We discuss how to formulate the method for setting AP optimal location and show the effectiveness of this method by illustrating the examples of AP optimal locations.

    DOI: 10.20965/jaciii.2009.p0128

    Scopus

    researchmap

  • An Evaluation of Hybrid node of Mobile IPv6

    Takahisa Yamada, Takashi Kobayashi

    IEICE Technical Report   Vol. 108, No. 136, pp.77-82   2008.7

     More details

    It accompanies the spread of the internet, and a lot of service use internet. Not only the computer but also a lot of terminals use internet. Many terminal that can move especially comes to participate in the internet, and the technology of mobility becomes important. However, there is problem in the technology of Mobile IPv6 developed for mobile communications. The home agent concentrates the load easily in Mobile IPv6. Moreover, if the home agent doesn't function due to accident, the mobile node cannot be mobile communicated. Therefore, the maintenance of home agent's function is important in Mobile IPv6. If more home agent is aranged in the home network, and it achieves the redundancy of home agents but it costs to maintain more home agents.In this paper, we propose hybrid node for redundancy of home agent and effectiveness is evaluted.

    researchmap

  • Optimization for Overly Network over IPv6

    Youhei Tajima, Takashi Kobayashi

    IEICE Technical Report   Vol. 108, No. 136, pp.13-16   2008.7

     More details

    Recently, the ubiquitous society for using IPv6 next-generation network (NGN) is attracting much attention. It is necessary to improve the information management function of every terminal of P2P networks because a variety of multimedia services is expected to deploy on an NGN. In this study, Chord algorithm is used, that is one of the distributed hash algorithms which is the most popular algorithms on P2P systems. The number of hop to the following node in the node list is investigated using the hop limit in the header of IPv6, and the route optimization in Chord based on the number of hop is performed.

    researchmap

  • multihoming using anycast address

    Takahisa Yamada, Takashi Kobayashi

    M-058, pp.271-272   2007.9

     More details

  • Encrypted Multicast Transport in JXTA

    Youhei Tajima, Takashi Kobayashi

    L-029, pp.67-68   2007.9

     More details

  • Prototyping and Evaluation of P2P Grid Platform with Resource Management Mechanism Reviewed

    Hiroki KATO, Masato MIZUE, Masaki HIROKAWA, Takashi KOBAYASHI, Shinichi UESHIMA

    DBJS Letters   Vol. 6, No.1 ( 1 )   17 - 20   2007.6

     More details

    Language:Japanese  

    Researches on Grid computing and P2P systems are gaining focuses recently. This paper proposes a PC grid platform in P2P settings. In this platform, PC's are managed distributively in a P2P manner by the resource management mechanism proposed in this paper. Peers on the platform register their resource information to this mechanism, and share their resources. We consider Processing Grid and Distributed Storage as services in this platform. When the services request the resources, the resource managemtn mechanism assigns the services to peers according to the registered information. The authors have constructed a prototype, and have simulated to observe the effects on the resource management mechanism.

    CiNii Books

    researchmap

    Other Link: http://hdl.handle.net/10112/2247

  • Voronoi Diagram Algorithm on the Grid Environment Reviewed

    KOBAYASHI Takashi, Masato Mizue, Shinichi Ueshima

    A分冊A-023, pp.55-56   2005.9

     More details

  • Laboratory Syllabi of Computer Security for an IT moral Education

    Yoshinori Ezawa, Takashi Kobayashi

    No. 21, pp.59-77   2004.10

     More details

    What should be the nature of moral education in information technology (IT) ? In this paper, we discuss it from the view poitn of the philosophy of social morals. It is shown that the scientific comprehension of IT constitutes the fundamentals. Then, the reason why a laboratory session for IT education might be required is discussed. Finally, the laboratory syllabi of computer security education at the Department of Informatics is explained as it is a unique precedent among Japanese colleges.

    researchmap

  • A self-confirming engine for preventing man-in-the-middle attack

    M Kanamori, T Kobayashi, S Yamaguchi

    IEICE TRANSACTIONS ON COMMUNICATIONS   E87B ( 3 )   530 - 538   2004.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    In this paper, we focus on how to correct address mapping violation, in which an attacker rewrites the address mapping table of a victim to perform a Man-in-the-Middle (MITM) attack. We propose a technique for preventing MITM attacks in which a malicious user intercepts and possibly alters the data transmitted between two hosts. MITM attack is hard for legitimate users to notice during their normal communication, because each user believes they are communicating directly. Address mapping violation can occur because of vulnerability of address resolution protocols, Address Resolution Protocol (ARP) in IPv4 and Neighbor Discovery (ND) protocol in IPv6. Accordingly, a good method to prevent MITM attack by address mapping violation is essential for both current and future communications, i.e. wireless networks with roaming users and an interconnected world. Hence, our proposal mainly aims to have high usability in future applications such as embedded devices.

    Web of Science

    researchmap

  • A Forensic Analysis with Records of Address Mapping Reviewed

    KOBAYASHI Takashi, M. Kanamori, S. Yamaguchi

    Proceedings of The Third International Symposium on Communications and Information Technologies   Vol. 1, pp.59-64   2003.9

     More details

  • The Implementation of Intrusion Detection System Focused on Port Violation Reviewed

    KOBAYASHI Takashi, M. Kanamori, S. Yamaguchi

    Proceedings of The Third International Symposium on Communications and Information Technologies   Vol. 1, pp.79-83   2003.9

     More details

  • Infrastructure for Computer Moral Education in a University

    Yoshinori Ezawa, Takashi Kobayashi, Yoshiyuki Nakashiba

    No. 19, pp.1-10   2003.8

     More details

    Computer moral education is one of the biggest problems in IT educational courses for university students. This paper includes the report of annual construction plans of computer network infrastructure by the Information Processing Center of Kansai University. Moreover, we discuss about the implementation of a digital identification method that was introduced in the Faculty of Informatics in 2001. The biometrics used in this new tool might be unusual for university student, but it is now a common tool in business applications. The abuse of computers by novice students with cracking software was dramatically decreased since this finger print identification tool had been implemented.

    researchmap

  • The Implementation of Instrusion Detection System focused on Port Violation

    KOBAYASHI Takashi

    第19号43-57頁   2003.8

     More details

  • A Proposed Method of Avoiding Address Mapping Violation Reviewed

    KOBAYASHI Takashi, M. Kanamori, S. Yamaguchi

    1st International Forum on Internet and Computer Technology   88-93頁   2003.1

     More details

  • Management policy and technique to achieve safely and authorized IP connectivity

    KOBAYASHI Takashi

    第18号11-23頁 ( 18 )   11 - 26   2002.12

     More details

    Language:Japanese  

    Kansai University Special Research Fund 20020401-20030331

    CiNii Books

    researchmap

  • ディジタルキャンパスのアメニティ管理とIPv6インターネットを用いた講義の宅配環境 Reviewed

    小林 孝史, 日裏博之, 西出 亮, 北村悟史, 大西真晶, 森田典樹, 上島紳一

    データベースとWebインターフェイスに関するシンポジウム(DBWeb2002)   19号113-120頁   2002.12

     More details

    Web上の仮想共有空間として実現されているディジタルキャンパスは、個人ごとに空間をカスタマイズし情報を共有したり、仮想空間への個人情報の蓄積、既存の教育情報資源やアプリケーションの組み込み利用等が可能である。本論文では、このディジタルキャンパスの構成と特徴、プロトタイプシステムを示し、IPv6ブロードバンドインターネットを基盤とした遠隔授業について述べる。

    researchmap

  • Experiments on Real-time Streaming of Moving Images and its Technical Background : Streaming the Linar Eclipse for the Internet

    Kobayashi Takashi

    Journal of informatics   第14号35-48頁   35 - 48   2000.12

     More details

    Language:Japanese   Publisher:Kansai University  

    CiNii Books

    researchmap

    Other Link: http://hdl.handle.net/10112/6722

  • GMDHを用いた災害予測とそのパラメータ推定

    小林 孝史, 古田 均, 広兼道幸, 田中成典, 野村泰稔

    電気学会情報・システムソサイエティ大会講演論文集   2000.9

     More details

    人々の生活への脅威である自然災害を予測のためには、さまざまな要素を考慮する必要がある。しかし、どれだけの要素を考慮すれば良いかという問題には、それぞれの要素の貢献度を考慮する必要がある。そこで、考慮する必要があると考えられている要素と災害の発生のレベルの間に写像関係があると考え、写像関係を実現できるGMDHネットワークにより考慮すべき要素を選択することができることを示す。

    researchmap

  • Evaluation of rule-type knowledge extracted by rough set theory from diagnostic cases of slope-failure danger levels Reviewed

    H Furuta, M Hirokane, S Tanaka, T Kobayashi

    ARTIFICIAL INTELLIGENCE AND MATHEMATICAL METHODS IN PAVEMENT AND GEOMECHANICAL SYSTEMS   99 - 107   1998

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:A A BALKEMA PUBLISHERS  

    Slope-failure is caused by complex working of various factors such as geology, topography, ground, vegetation, rainfall, etc. If the fuzzy theory is applied to all of these factors, results will often be of short reliability. In this paper, we present a method to acquire, removing inconsistencies, the minimum knowledge necessary to deduce reliable results from actual cases where engineers of long experience diagnosed the danger levels of slope-failure. Next comes a method of constructing a knowledge base for an expert system, such acquired knowledge used. Then, described is a method to check the accuracy and reliability of acquired knowledge and evaluate the knowledge base.

    Web of Science

    researchmap

  • The Estimation of Landslide Risk by Neural Networks Reviewed

    KOBAYASHI Takashi, H.Furuta, M.Hirokane, I.Tatekawa

    World Wide European Council of Civil Engineers Symposium, Symposium Report   1997.9

     More details

  • The Decision Support System for Body Color of Car Using Genetic Algorithm and Rough Sets Reviewed

    KOBAYASHI Takashi

    International Symposium on Optimization and Innovative Design, Extended Abstract&CD-ROM Proceedings   19-20頁(#114)   1997.7

     More details

  • 消費者の購入意欲をかきたてる自動車設計支援システムの構想 Reviewed

    小林 孝史, 古田 均, 広兼道幸, 田中成典, 三雲是宏

    日本計算工学会計算工学講演論文集   pp.31-34   1996.5

     More details

    消費者が自動車を購入する場合には、燃費、安全性、デザインなど多数の項目を評価基準として購入するかどうかの意思決定がなされるが、これらのうちデザイン、安全性などは燃費のように定量的に把握することが難しい。本研究ではデザインの問題を検討し、ラフ集合論、遺伝的アルゴリズム、ファジィ理論を適用した自動車ボディの色の決定支援システムの構想を立案した。

    researchmap

  • The Decision Support System for Body Color of Car Using Genetic Algorithm and Rough Sets Reviewed

    KOBAYASHI Takashi

    1996.5

     More details

  • Aesthetic Design System of Structures Using Neural Network and Image Database Reviewed

    KOBAYASHI Takashi, H.Furuta, K.Yasuda

    115-120頁   1995.9

     More details

  • 土木構造物のエコ・フレンドリー設計のための基本構想 Reviewed

    小林 孝史, 古田均, 広兼道幸, 田中成典, 三雲是宏

    『第20回土木情報システム講演集』(ISSN-0915-5333)   pp.99-102   1995

     More details

    社会のインフラストラクチャである土木構造物は、モニュメント性を度外視した中小規模のものがほとんどである。そのため中小規模の土木構造物は、人間が生活する周辺の環境と調和するように設計することが望ましい。そこで本研究では周辺の環境に土木構造物が調和するといった様相を”エコ・フレンドリー”という用語で議論する。この概念を明確にするためにラフ集合論、遺伝的アルゴリズムを適用する。

    researchmap

▼display all

Books

  • Python教科書

    小林 孝史, 田中 成典( Role: Joint editor)

    工学社  2022.3  ( ISBN:9784777521876

     More details

  • コンピュータ・ネットワーク入門 第2版

    小林 孝史( Role: Sole author)

    ムイスリ出版  2021.9  ( ISBN:9784896413052

     More details

  • コンピュータ・ネットワーク入門【改訂版】

    小林 孝史( Role: Sole author)

    ムイスリ出版  2017.9 

     More details

  • コンピュータ・ネットワーク入門

    小林孝史

    ムイスリ出版  2011.2  ( ISBN:9784896411751

     More details

  • C PROGRAMMING(1999-2009)

    KOBAYASHI Takashi, C. Aoyama, T. Kimura, S. Tanaka, M. Hirokane, Y. Horii, F. Miyashita, S. Kimura( Role: Joint author)

    KANSAI UNIVERSITY PRESS  2009.4 

     More details

  • Linuxアプリケーション入門

    小林 孝史, 田中成典, 吉田充宏, 物部寛太郎, Dimitorios Valmas, 三浦 卓, 宮脇由起, 中山浩太郎( Role: Joint author)

    森北出版  2002.4 

     More details

    本書では、WindowsやMacintoshなどのGUI環境に慣れたユーザを対象に、Linux入門者に一番の難関である「OSインストール後の環境整備と活用」を徹底的にサポートしている。WindowsやMacintoshで使用されているアプリケーションと比べても遜色のないアプリケーションを紹介することで、他のOSと比べても見劣りしないデスクトップ環境を整えることを目的としている。

    researchmap

  • プログラミング言語

    鯵坂恒夫, 小林孝史, 堀井康史, 田中成典, 広兼道幸( Role: Joint author)

    オーム社  2000.7 

     More details

    大学学部生を主対象にしたプログラミングの教科書として執筆した。言語としてC言語を取り上げて、各種演算子、ポインタ、構造体、ライブラリなどのプログラムを構成する要素技術、およびそれらを集約した実用的な応用プログラムであるCGプログラミングについて解説している。セメスタ制に対応した構成と、基本的なポイントを的確におさえた分かりやすい内容を特徴としている。

    researchmap

  • Javaの達人

    小林 孝史, 田中成典, 阪口良史, 北川悦司, 南 佳孝, 堀 正人, 物部寛太郎, 吉田充宏( Role: Joint author)

    森北出版  1999.12 

     More details

    プログラミング言語Javaは1台のコンピュータで動かすことはもちろん、インターネット上のWebページに埋め込まれてこそ、その威力を発揮する言語である。この言語について本書では、12時間を目処に学習を行うことができるような構成で、言語の文法、機能の解説、プログラム例を掲載する。最終章には、本文中で利用した関数、パッケージなどの簡単な説明も掲載している。本文中で使用するJava開発環境はJava2(jdk1.2)である。

    researchmap

  • VRMLの達人

    小林 孝史, 田中成典, 南 佳孝, 内野幸生, 松岡園実, 吉田博載, 渡辺由美( Role: Joint author)

    森北出版  1999.12 

     More details

    VRMLは、こういったハードウェア・プラットフォームを意識することなく、普通のパーソナル・コンピュータ上で利用することができる、コンピュータ・グラフィックス用の言語である。この言語は、コンピュータ・グラフィックスの構成要素とその値の組み合わせによって、1つのモデルを構成する非常にポータビリティの高い言語である。 本書では、VRML 2.0規格について、基本的な部品の作成から大規模な仮想空間の作成まで順を追って掲載している。後半部分ではWebページに埋め込むための基本的な記述方法についても解説しているので、本書の理解のみでWebページに仮想空間を構築することも可能である。

    researchmap

  • Perlの達人

    小林 孝史, 田中成典, 岩井雅治, 阪口良史, 朝長英樹, 中山浩太郎, 松原更志( Role: Joint author)

    森北出版  1999.12 

     More details

    スクリプト型言語Perlについて、12時間で本書の内容を理解できるような構成をとっており、この範囲内で言語の文法、機能の解説、プログラム例を掲載している。最終章では、本文中で利用した関数の簡単な機能解説も掲載している。本書は単なるリファレンス解説書という位置づけではなく、実用レベルにある例題を掲載することで、より深い理解を得ることができるようになっている。

    researchmap

  • わかりやすいFORTRANプログラミング

    小林 孝史, 堀井康史, 田中成典, 広兼道幸, 木村壽夫, 黒葛裕之, 宮下文彬, 日高由布子( Role: Joint author)

    オーム社  1998.10 

     More details

    数多くあるプログラミング言語の中から、最も歴史が古く、ソフトウェア資産も多く存在するFORTRAN言語について、従来からの文法書のような難解なものではなく、例題、演習を交えながら、プログラミング初心者にとって学びやすい解説書を目指している。12回分の内容としており、理解に時間を要する箇所は2回分に分割して、より深い理解を得られるような配慮を行っている。

    researchmap

  • C PROGRAMMING(1995-1998)

    KOBAYASHI Takashi, C. Aoyama, T. Kimura, S. Tanaka, M. Hirokane, Y. Horii, F. Miyashita, S. Kimura( Role: Joint author)

    KANSAI UNIVERSITY PRESS  1998.4 

     More details

▼display all

MISC

  • On the Building Methods of e-Local Government and Grid Computing

    Takashi Kobayashi

    RCSS Discussion Paper Series   No. 45   2006.9

     More details

    The migration processes of legacy systems and/or applications are going for the building e-local government. However, taking advantage of open systems is only making the optimization of each service, and it is far way from the optimization for whole of services. It is needed to achieve the apropriate level of information security countermeasure, and the person who take charge of information systems will be responsible for the countermeasure of every systems.The aim of this paper is to show the availability of the grid computing and the guideline on the future system of e-local government in case of building e-local government while solving above problems.

    researchmap

  • Pattern Recognition by Neural Network with the non-reaction element

    Kobayashi Takashi

    Proceedings of the IEICE General Conference   1997 ( 1 )   29 - 29   1997.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

Presentations

  • Drive-by Download攻撃解析における支援アプリケーションの開発

    YOSHII,Akira, KOBAYASHI,Takashi

    Computer Security Symposium 2015 in Nagasaki  2015.10 

     More details

    Venue:Nagasaki Brick Hall  

    researchmap

  • Drive-by Download攻撃を防御するProxyの実装

    YOSHII,Akira, KOBAYASHI,Takashi

    Computer Security Symposium 2014 in Sapporo  2014.10 

     More details

    Venue:Sapporo  

    researchmap

  • Port Violation and Intrusion Detection System

    KOBAYASHI Takashi

    Freedom and Security in Computer Networks - The 3rd RCSS International Conference, The 1st PG Lab International Conference  2006.1 

     More details

  • 平成12年度関西大学大学院-京都大学大学院マルチメディア遠隔共同セミナーの概要

    小林 孝史, 上島伸一, 黒葛裕之, 矢島脩三

    関西大学情報処理センターフォーラム2000  2001.4 

     More details

    2000年12月25日、20世紀最後のクリスマスの日に、関西大学大学院総合情報学研究科と京都大学大学院情報学研究科の間で、衛星、インターネット、ISDN、CATVなどのマルチメディア技術を総合的に利用した遠隔共同セミナーを行った。本稿では、このマルチメディア遠隔共同セミナーの概要とシステムの構成等についても述べる。

    researchmap

  • 高槻キャンパスATM-LAN高速ネットワーク―KTEN計画 さあこれから―

    小林 孝史, 辻 光宏, 青山千彰, 矢島脩三, 川邉 剛, 木村作朗

    関西大学情報処理センターフォーラム1999  2000.4 

     More details

    本稿では、高槻キャンパスへのATM-LAN導入の経緯について報告するとともに、KTEN(Kandai Triangular Educational Network)計画の中でのATM-LAN導入の位置付けを明確にし、ネットワーク計画の今後の課題についても触れる。3キャンパスを仮想的に接続するネットワーク構想は、将来の多方向通信への発展が見込まれるので、これからのネットワーク社会に貢献する基盤として期待されているものである。

    researchmap

  • ポリ・エージェントによる制御

    小林 孝史, 岡部康平, 古田 均

    人工知能学会全国大会(第13回)  1999.7 

     More details

    道路交通を制御している交通信号は、従来から時間帯・交通量を集中管理し、ある一定のスケジュールに従って行われてきた。しかし、慢性的な渋滞が日常的に発生し、突発的な渋滞への対応も満足のいくものではない。本論文では、交通信号群をエージェントの集まり、すなわちポリ・エージェントと考えて、それぞれのエージェントの自律的な行動によって渋滞を回避する手法について述べる。

    researchmap

  • 不応期のある処理要素を持った神経回路網によるパターン認識

    小林 孝史

    電子情報通信学会  1997.3 

     More details

    一般的に用いられる階層型ニューラルネットワークでは、中間層のすべての処理要素は入力および出力層の処理要素と完全結合している構成となっている。本論文では計算モデルとして、ある処理要素が不応期に入っている状態を想定しながら、ネットワークの応答出力の計算および学習を行うモデルを構築した。対象とする問題をパターン認識とすることによって、このモデルの性能を測定して従来のモデルとの比較を行った。

    researchmap

  • 総合情報学部における教育支援システム――ワークステーション環境について――

    小林 孝史, 北尾匡史, 宮下文彬

    情報科学研究会講演集?(ISSN-0914-1316)  1995.3 

     More details

    関西大学総合情報学部では、入学当初より”コンピュータ・リテラシー”を修得できる教育を行っており、学部内にコンピュータネットワーク(KUTC-NET)を設置してそれを支援している。このネットワークは高性能ワークステーション群とそれらを接続するコンピュータ・ネットワークであり、教育・研究用の分散処理環境を構築したものである。この教育支援システムの概要および利用できるソフトウェア等について、ワークステーション環境を中心に解説する。

    researchmap

  • 演奏者情報を加味したピアノの自動演奏システムの構築―ニューラルネットワークによる演奏者情報の抽出・認識・再生―

    小林 孝史, 小田安彦, 白川健一, 梶川嘉延, 野村康雄

    日本音響学会平成6年秋季研究発表会  1994.10 

     More details

    これまで演奏者独自の解釈及び演奏者の無意識な弾き癖等の演奏者独自の特徴を演奏者情報として抽出し自動演奏システムに組み込むことを試みてきた。具体的には前者をエキスパートシステムにより処理し、後者をニューラルネットワークにより処理し特徴を抽出している。本稿では演奏者の個人的弾き癖抽出の従来方法を改良した改良抽出法による効果的な抽出について報告する。

    researchmap

  • 特定演奏者の弾き癖を考慮した演奏情報の構成法

    小林 孝史, 日垣文寿, 松本和紀, 北尾匡史, 野村康雄, 森 大輔, 河本欣士

    平成5年電気関係学会関西支部連合大会  1993.11 

     More details

    人間的な演奏を特徴づける要素として、リズムの揺らぎ及び音の変化を「局所メトロノーム速度」、「ベロシティ」として捉えている。人間らしい演奏の基になる「揺らぎ」には「一般的または個人的解釈による揺らぎ」と「弾き癖などの演奏者の意志に依らない揺らぎ」に大別できる。本研究では後者の揺らぎの要素に関して「ベロシティ」について検討し,ニューラルネットワークを用いて抽出・学習を行った。

    researchmap

  • 楽譜の認識―ニューラルネットワークによる五線の消去―

    小林 孝史, 松本和紀, 北尾匡史, 野村康雄

    日本音響学会平成5年秋季研究発表会  1993.10 

     More details

    コンピュータによる自動演奏において、楽譜を自動認識し、音楽情報を抽出することは、用意に音楽データベースを構築できるという意味で有用であり、従来から種々の方法が考案されている。一方、五線は他の記号と重なっており、記号認識の際にノイズ成分となり認識に影響を与えるため、ニューラルネットワークを用いて、記号の分断を極力減らした五線の消去について実験を行った。

    researchmap

  • 階層型ニューラルネットワークにおける中間層ユニット数最適化アルゴリズムに関する一考察

    小林 孝史, 澤辺大一, 北尾匡史, 野村康雄

    平成4年電気関係学会関西支部連合大会  1992.11 

     More details

    BP型学習法を用いた階層型ニューラルネットワークの学習法には、ローカルミニマムが多数存在し、また中間層ユニット数をいくつに設定すればよいかある程度のシミュレーションを行わないと解らないといった問題を抱えている。本報告では松永のモデルと比較しながら、中間層ユニット数を学習時に動的に変化させてネットワークの規模の縮小、及びローカルミニマムを回避する学習法を提案する。

    researchmap

▼display all

Research Projects

  • 低計算資源で実現可能なセンサ機器認証技術の研究開発

    2018 - 2021

      More details

  • Development of Structural Design System friendly to Environments Using Artificial Life Technology

    Grant number:10650474  1998 - 2000

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    FURUTA Hitoshi, KOBAYASHI Takashi, TANAKA Shigenori, HIROKANE Michiyuki

      More details

    Grant amount:\3500000 ( Direct Cost: \3500000 )

    In this study, some researches were made on the definition of eco-design of structures. In order to develop a practical design system for eco-structures, advanced technologies such as so called "soft computing", i.e., chaos, neural network, genetic algorithm, artificial life, fractal theories were studied and attempted to combine them so as to obtain a more useful method.
    This year, the following topics were investigated to establish a basic concept and method of realizing eco-structural design :
    1 A drawing system was developed. Allocating several categorical parts in the 2-dimensional space, a useful drawing system was realized. As an example, A prototype system for drawing bridge structures was developed, which can use CG library.
    2 A system that can creates 3-dimensional data using 2-dimensional data was developed. Especially, the system employed digital photo systems for the creation of 3-dimensional data.
    3 Standardized data system was studied for common use of various data, where data exchange base and information protocol were quite important.
    4 To establish a design system for eco-structures, CALS technology was useful. As a basic technology, a translator between STEP/AP203 and VRML information was developed.

    researchmap

  • Study on Fuzzy Control of Structural Vibration by Genetic Algorithms and Chaos Theory

    Grant number:08455214  1996 - 1997

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    FURUTA Hitoshi, KOBAYASHI Takashi, TANAKA Shigenori, HIROKANE Michiyuki, EZAWA Yoshinori

      More details

    Grant amount:\2400000 ( Direct Cost: \2400000 )

    The main content of the present study is the development of a new method of active control. Active control features very short processing times consumed in evaluating the inputs of detected data and calculating the controlling force, quite simple programming of calculation, wide applicability, good adaptability to the irregular vibration by wind and seismic loads, and so on. Besides, the uncertainty in the natural vibration characteristics of actual structures can be dealt with by using fuzzy control. In general, in the optimal control theory, the controlling force theoretically determined in accordance with the condition of a structure at every moment is applied to it to achieve the optimal control effect. With some actuators, however, it is difficult to regulate such controlling force to the exact value theoretically correct. The fuzzy control allows up to pertform an efficient control even with controlling force in an vague form.
    In the present study, wind loads on a structure were taken up as its external force, and the accuracy of the fuzzy active control was improved by making the short-term prediction of wind velocity. In concrete terms, the wind velocity was considered time-series data in chaotic behavior, and the velocity in the next time period was predicted based on the time-series data by using the local fuzzy reconstruction method. The controlling force was determined based on the predicted wind velocity by applying fuzzy control rules. Upon the advent of the actual wind velocity, the controlling force was applied to the structure to curb its amplitude and acceleration. By solving the vibration equation by the Runge-Kutta method, numerical simulation was performed to verify the effectivity of this method.

    researchmap

  • Application of Fuzzy Finite Element Method to Bridge Construction Management

    Grant number:05650453  1993 - 1994

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for General Scientific Research (C)

    FURUTA Hitoshi, AKIYAMA Takamasa, KOBAYASHI Takashi, TANAKA Shigenori, HIROKANE Michiyuki

      More details

    Grant amount:\2300000 ( Direct Cost: \2300000 )

    In the construction of bridges, construction management is very important. Reliability or safety is dependent on the accuracy of construction even though design is done precisely. In this syudy, an attempt is made to introduce the fuzzy set theory into the finite element analysis in order to improve the accuracy of the analysis. It is also attempted to develop a practical method for system identification of errors involved during construction and optimal adjustment of cable tension forces and cambers.
    The formulation of the fuzzy finite element analysis was done and its efficiency was validated through a simple numerical example of simply supported plate. For the construction management of bridges, a new practical method was developed based upon fuzzy regression analysis and fuzzy mathematical programming. Comparing the usual adjusting methods based on nonlinear optimization technique, this method can improve the convergency reaching the optimal solution and reduce the computation load and time.

    researchmap

Social Activities

  • 社会情報基盤情報標準化委員会小委員会委員

    一般財団法人日本建設情報総合センター  点群データ等の3次元情報のオープン化に関わる標準化検討小委員会  2023.8 - 2025.6

     More details

    Type:Other

    researchmap

  • 機構処理事務特定個人情報等保護委員会委員

    地方公共団体情報システム機構  2023.6 - 2025.6

     More details

  • 尼崎市情報公開・個人情報保護審査委員会委員

    尼崎市  2023.4 - 2025.4

     More details

    Type:Other

    researchmap

  • 宝塚市個人情報保護・情報公開審議会委員

    宝塚市  2023.4 - 2025.3

     More details

    Type:Other

    researchmap

  • 尼崎市USBメモリー紛失事案調査委員会

    尼崎市  2022.7 - 2023.3

     More details

    Type:Investigation, survey

    researchmap

  • 吹田市個人情報保護審議会委員

    2014.7

     More details

  • Ashiya city's CIO aide

    2011.10 - 2012.9

     More details

  • 高槻市個人情報保護審議会委員

    2011.4 - 2012.8

     More details

  • Takatsuki city's CIO aide

    2005.9 - Present

     More details

  • 高槻市電子自治体推進員

    2002.10 - Present

     More details

▼display all

Devising educational methods

  • 「コンピュータネットワークの基礎」「ネットワークコンピューティング実習」「システムプログラミング実習」「情報通信ネットワークシステム実習」(学部):授業支援システム、CEASシステム等を利用し、学生によって授業資料・課題・出席状況などが分かるように配慮している。 「コンピュータネットワークの基礎」(学部):講義終了後、CEAS/Sakaiシステム上で復習の小テストを実施し、その日の講義内容を振り返るきっかけ作りを行っている。 「ネットワークコンピューティング実習」(学部):実習課題の添削を行い、実習内容の理解を深めることができるようにしている。 「システムプログラミング実習」(学部):実習課題の添削を行い、実習内容の理解を深めることができるようにしている。 「情報通信ネットワークシステム実習」(学部):実習資料にほぼ全てのコマンド等を掲載しており、欠席した回のものもフォローアップができるようにしている。また、実習の進度をできるだけ全ての受講生で合わせるようにし、トラブルはその場で解決していくように努めている。 「Mネットワークコンピューティング」(大学院):講義期間中に複数回の復習もかねたプログラミングレポートを課し、机上での知識だけでなく、実際の知識も身につけられるように配慮している。 「専門演習」(学部):ゼミ用のホームページを運営しながら、各自の研究内容等について逐次確認できるようにし、ゼミの授業時間外でも指導ができるような体制を録っている。また、長期休暇中には合宿形式での勉強会・発表会を開催し、まとまった発表ができるようにしている。

Teaching materials

  • 「コンピュータネットワークの基礎」(学部):小林『コンピュータ・ネットワーク入門』、ムイスリ出版、2011。 「ネットワークコンピューティング実習」(学部):江澤、小林、林、村田:『ネットワークコンピューティング実習テキスト』、2005〜2011。 「プログラミング実習(C)」(学部):青山、木村、小林、田中、広兼、宮下:『C Programming 2006〜2011』、関西大学出版部、2006〜2011。 「システムプログラミング実習」(学部):小林『システムプログラミング実習テキスト』及び『実習用ソフトウェア(オープンソースソフトウェア)の開発・提供』、2003〜2011。 「情報通信ネットワークシステム実習」(学部):小林『情報通信ネットワークシステム実習テキスト』、2011。

Teaching method presentations

  •  特になし

Special notes on other educational activities

  • 2009年8月27日:KanDai-1セミナー@西宮高校・100分 2009年12月9日:KanDai-1セミナーミニ講義(京都すばる高校)・1時間 2011年9月10日:KanDai-1セミナー@関西大学北陽高校・1時間