Skip to main content


Corporate InformationResearch and Development

Update History

Yokohama Research Laboratory

February 2, 2015
Simulation Technology for Resin Impregnation Molding
January 27, 2015
A File Cache Method to Achieve Fast Virtual Machine Boot and a Highly Efficient Method to Balance Availability and Replica Amounts
January 22, 2015
System in Package Technology for High Bandwidth Transfer in Information and Communication Technology Systems
January 8, 2015
Achieving Both Brightness and Energy Savings with Development of LED Ceiling Lights that Widely Disperse Light
December 19, 2014
"Smartly" Connecting People and Home Appliances: Development of Remote Control Systems and Wireless LAN Connection Adapters for Air Conditioners
December 4, 2014
Decoupling Direct Tracking Control for Multilayer Disk with a Separated Guide Layer
December 1, 2014
Rotationally Symmetric Wavefront Coding for Extended Depth of Focus with Annular Phase Mask
November 4, 2014
Automatic Route-Planning System for Crane Transportation of Large Components in Large-Scale Plants
October 31, 2014
Malware Analysis System Designed for Quick Network Environment Protection
October 21, 2014
Influence of Roller Shape on Deformation Behavior in Roll Bending of Structural Channels
September 24, 2014
Forward Wave Analysis (FWA)
September 5, 2014
Model-Based Analysis of Screw Locations to Reduce Radiation from a PCB-Chassis Structure
August 21, 2014
Incrementally Executable Signcryptions
August 5, 2014
"Assembly-navigation System" that Supports Manufacturing around the World
July 28, 2014
High Bandwidth Optical Backplane for Information and Communication Technology Systems
July 4, 2014
Blu-ray Disc Archive System: Safe, Reliable Storage of Data for More Than 50 Years
July 2, 2014
Water Quality Evaluation Method for Desalination System
June 25, 2014
Study on Prediction about Residual Position of Void Generated by Resin Flow
June 11, 2014
High-throughput Messaging Technology to Support the Smart Society
June 10, 2014
Use of Rough Image Analysis in Smartphone Application for Video Watermark Detection
June 4, 2014
Wide Area Tentative Scaling (WATS) for Quick Response in Distributed Cloud Computing
May 26, 2014
—Public Biometric Infrastructure— Aiming for "Empty-handed" Safety and Security
April 1, 2014
Recycling Process for Rare Earth Magnets in End of Life Electric Products
February 5, 2014
Development of visibility enhancement for projector display in bright rooms
January 9, 2014
Flash Storage Technologies Give New Value to Storage Solutions by Hitachi
December 19, 2013
Establishment of Cryptographic Protocol Evaluation Toward Long-Lived Outstanding Security (CELLOS) Consortium
December 18, 2013
Microscopic World Defect Detection using "iPQ"—a Semiconductor Inspection Application
December 6, 2013
Risk-aware Data Replication against Widespread Disasters
December 3, 2013
High Visibility Projector Developed with Visibility Enhancement Technology Applying Human "Eye" Characteristics
November 29, 2013
Evaluation of SSD Tier Method and SSD Cache Method in Tiered Storage System
November 18, 2013
Business Dynamics: To Guide Businesses to Success
November 14, 2013
Secure ID-Management for Social Security and Tax Number System
October 1, 2013
Effect of Clearance between Roller and Chucks on Formability in Tube Spinning without Mandrel for Convex Shape
September 9, 2013
SDD: Selective De-Duplication with Index by File Size for Primary File Servers
September 6, 2013
Lead-free-solder Joint Technology Applicable to Power-electronics Products
September 3, 2013
Double Position-Signal-Difference Method for Electric Near-Field Measurements
August 21, 2013
Data Location Optimization Method to Improve Tiered Storage Performance
August 8, 2013
Flow Control for Higher Resiliency in Wide Area Distributed Cloud Computing
August 2, 2013
Renovation Technology for Reforming Public-infrastructure Systems by Finding Fundamental Principles and General Rules
July 24, 2013
Intelligent System of the EV Smart Charging based on PV Curve Analysis
July 18, 2013
Service-level-monitoring Function and Operation-automation Function of Job Management Partner 1
July 11, 2013
Static Validation of Network Device Configurations in Virtualized Multi-tenant Datacenters
June 27, 2013
Visibility Enhancement Technology for Cameras
June 3, 2013
LSI Noise Model Extraction with the Printed Reverberation Board
May 29, 2013
Development and Future Efforts regarding a Cloud-based Information Network Service for Cars—"Smart Access"
May 13, 2013
Image Processing Hardware Design Framework and FPGA Implementation by Hierarchical Models
March 27, 2013
"Information Security" page was updated.
March 22, 2013
A Method for Detecting Watermarks in Print using Smart Phone
February 26, 2013
High-picture-quality Technology for Surveillance Camera
February 18, 2013
Successful development of biometric digital signature technology
February 12, 2013
Release of highly reliable and efficient software development technology for social infrastructure
January 25, 2013
A Wireless-network Technology for AMI—Contributing to Smart Grids
January 16, 2012
Proposal of Batch Verification Techniques Suitable for Efficiently Verifying a Limited Number of Signatures
January 11, 2013
Searchable Encryption: A Technology for Supporting Secure Application
December 26, 2012
Upper Bound of The Shortest Vector Coefficients and Its Applications
December 20, 2012
Hitachi and Hitachi Plant Technologies initiate Joint Research with King Abdulaziz University, Saudi Arabia on Water Quality Monitoring Technology for Seawater Desalination Facilities
December 19, 2012
Desktop Work Load Characteristics and Their Utility in Optimizing Virtual Machine Placement in Cloud
December 12, 2012
Proposal of Secure Lattice-based Cryptosystem against Lattice Reductions
December 7, 2012
Multi-parametric Process Control Model Building by Data Fusion Using a Markov Chain Monte Carlo Method
December 4, 2012
A Method for Eliminating Metadata Cache De-allocation Latency in Enterprise File Servers
November 29, 2012
Event-notification-based Inactive File Search for Large-scale File Systems
November 13, 2012
Technology for Measuring the Electromagnetic Noise that Encompasses the Electronics Society
November 1, 2012
Qualification of Security Status Suitable for Cloud Computing System
October 30, 2012
Towards Optimal Countermeasures against Wolves and Lambs in Biometrics
October 23, 2012
Rescheduling Algorithm Using Operational Patterns for Rolling Stock Operation at Train Depots
October 17, 2012
The Printed Reverberation Board and Its Characterization
October 11, 2012
Perfect Keyword Privacy for PEKS Systems
October 1, 2012
Hitachi's light-weight "Enocoro" stream cipher adopted as an ISO/IEC standard
August 31, 2012
Reliability Prediction System using Bayesian Network
August 2, 2012
Production-control Technology that Contributes to a Robust Supply Chain
July 26, 2012
Visualizing Code Clone Outbreak: An Industrial Case Study
July 9, 2012
"Hitachi Suggested Programs"—A Function for Recommending Your Favorite TV Programs
June 18, 2012
Average Transmission Cross Section of Aperture Arrays in Electrically Large Complex Enclosures
June 5, 2012
"Cloud on-ramp" Function for Broadening the Capability of NAS
May 10, 2012
Cloud Management on the Assumption of Failure of Resource Demand Prediction
April 24, 2012
High-picture-quality Technology for 3D Images
April 4, 2012
Next Generation Network Management for Optimizing Time and Spatial Distribution of Network Resources
February 24, 2012
Development of Software for Detecting Communications by P2P File Sharing Software
February 9, 2012
New Video Processing Methods to Improve Apparent Gloss
January 30, 2012
Standardization and Disc Drive Development of Next-generation Blu-ray Discs
January 12, 2012
An Authentication System using Smart Phones as Secure Storage
December 26, 2011
Application of Economical Evaluation Method of Rare-earth Magnets Recycling to Compressors
December 22, 2011
Global Telematics Service Platform for Electric Vehicles
December 13, 2011
Simulation Technology for Resin Foam Molding
November 22, 2011
Storage Tier Virtualization Technology
November 17, 2011
Unconditionally Provably Secure Cancelable Biometrics Based on a Quotient Polynomial Ring
November 8, 2011
Fast and Accurate Biometric Identification Using Score Level Indexing and Fusion
October 27, 2011
Symmetric Key Distribution for Car-to-Car/Infrastructure Communication Systems
October 19, 2011
Automatically Detecting and Removing Malware using Dynamic Analysis Systems
October 7, 2011
Key Activities for Introducing Software Product Lines into Multiple Divisions
October 4, 2011
Proposal of Symmetric Searchable Encryption for Search Service on Cloud System
September 14, 2011
High-Density Recording Method for Holographic Memory System
August 25, 2011
Maintaining Image Quality when Watermarking Grayscale Comic Images for Electronic Books
August 19, 2011
Security evaluation result on Luffa v2
June 29, 2011
A Route Search Method for Electric Vehicles in Consideration of Range and Locations of Charging Stations
June 27, 2011
Memory-management Technology for Supporting Stable Operation of Java Systems
June 8, 2011
Development of a Distributed Print-Out Monitoring System for Efficient Forensic Investigation
May 27, 2011
A Model-driven System Development Platform for Achieving Rapid System Development
April 12, 2011
CD-gap-free Contour Extraction Technique for OPC Model Calibration
January 31, 2011
A Proposal of Lightweight Methodology from GUI Prototypes
January 14, 2011
Development of Root Cause Analysis (RCA) Function for Rapidly Identifying the Root Cause of Failure
November 11, 2010
Information History Management Technology for Tracking Down to Paper Media
September 17, 2010
A Metric of Information Gained through Biometric Systems
September 6, 2010
Supporting Green IT: Energy-saving Technology of Storage
July 15, 2010
Highly Accurate Biometric Identification with High Convenience
July 1, 2010
Stable Disk Performance with Non-Sequential Data Block Placement
April 22, 2010
ID Federation Technology Between Terminals
April 15, 2010
Development of Digital Watermarking Application Technologies for Newspapers
April 5, 2010
Autostereoscopic Live 3D TV System
March 23, 2010
Higher Order Differential Attack on Step-Reduced Variants of Luffa v1
March 3, 2010
Indoor GPS Transmitter Module—Aiming to provide a seamless location-based service
January 22, 2010
Second Preimage Attack on SHAMATA-512
January 12, 2010
High-Accuracy Text Search of Hardcopy Logs
November 13, 2009
Generating Provably Secure Cancelable Fingerprint Templates Based on Correlation-invariant Random Filtering
November 6, 2009
Multipath Data Transmission for Wireless Thin Clients
November 4, 2009
A Study on Read/Write Protection of a Digital Document by Cryptographic Techniques
October 6, 2009
Massive and High-speed Data Processing Technology for the "Information Explosion" Era
August 26, 2009
Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching
August 11, 2009
Architectural Evolution of the Autonomous Decentralized Systems
August 4, 2009
A Study on Multi-Recipient Encryption for Selective Disclosure
June 30, 2009
Digital Signatures on Stand-alone Memory Chips without CPUs
June 1, 2009
Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients
May 21, 2009
A Method of Water Supply Planning for a Large-scale City
March 30, 2009
Sensor Network Web Service System for Collecting, Managing, and Providing Various Sensor Information
March 16, 2009
High-performance Compiler Technology for Handling a Wide Range of Systems from Supercomputers to Embedded Systems
February 17, 2009
Btrax - an automated coverage test tool
February 6, 2009
Virtualization of Network Attached Storage (NAS) for Cutting Management Costs
January 20, 2009
Estimation of the New Feature Extracting Method for Tamper Detection in Printed Documents
December 22, 2008
Third-party approach to controlling digital copiers
November 18, 2008
A Study on User Authentication Infrastructure for Next Generation Telematics
October 27, 2008
 An Approach of Knowledge Sharing via Empirical Knowledge in Project Management
October 21, 2008
Pre-allocation Size Adjusting Methods for Preventing File Fragmentation
October 10, 2008
A Black Hen Lays White Eggs: Bipartite Multiplier out of Montgomery One for On-Line RSA Verification
September 19, 2008
 RFID Password Management Methods for Falsification Prevention in Bookstore Management using Secure RFID tags
September 3, 2008
A Feature Extracting Method for Tamper Detection in Printed Documents
August 27, 2008
VESPER (Virtual Embraced Space ProbER)
August 4, 2008
 Cast Elimination for Containers in Java
June 19, 2008
 Server Virtualization Technology for Mission-critical Systems