Papers by SDIWC Organization

Proceedings of the Sixth International Conference on Electronics and Software Science ICESS2020, Japan, 2020
This paper proposes a two-sided method for STEM (Science, Technology, Engineering and Mathematics... more This paper proposes a two-sided method for STEM (Science, Technology, Engineering and Mathematics) education, based on the display of virtual simulation and real experiments utilizing free 3DCG (Three-Dimensional Computer Graphics) modeling design software such as "Blender", and 3D printer. We consider that Blender is very useful not only as a simulation visualization tool, but also a modeling design one that we need in real experimentation. This paper also presents two examples of the visualization of simulations for physics and computer algorithm education, in which one simulates for Faraday's world's first motor and another for well-known "Tower of Hanoi". The problem of "Tower of Hanoi" and it's solution program is one of the best examples to understand the notion of recursive procedure in programming. We consider that the utilization of Blender will be very effective for the proposed two-sided method of STEM education.

Proceedings of the Sixth International Conference on Electronics and Software Science ICESS2020, Japan, 2020
Today’s society is undergoing a major transformation, known as the Fourth Industrial Revolution, ... more Today’s society is undergoing a major transformation, known as the Fourth Industrial Revolution, with various technological innovations such as AI, IoT, and Virtual Reality. In preparation for the coming Society 5.0, Japan is reforming its education system to develop human resources who can think and judge by themselves to open up new fields. One of these reforms is the promotion of active learning such as group discussions among students. However, the teachers who are responsible for these activities have been trained by the old passive education system, and it is difficult to implement them. In this paper, we report our attempt to quantitatively represent the depth of students’ learning based on Bloom’s taxonomy as an initial trial of research to estimate the depth of students’ learning based on the original content extracted from the conversations in group discussions.

Proceedings of the Sixth International Conference on Electronics and Software Science ICESS2020, Japan, 2020
This paper proposes an educational tool, which can visualize the internal processing of the compi... more This paper proposes an educational tool, which can visualize the internal processing of the compiler. One of the purposes of this tool is to promote understanding of language processing and behavior of compiler from high-level programming language such as C into machine language (in our case, pseudo assembly language). This tool can run on major browsers of various operating systems because it is implemented in HTML5 and JavaScript. The internal structure is composed of the following four parts: input part for high-level programming language codes, lexical analyzing part, syntax analyzing part, and code generating part. With this visual compiler, we propose a model of computer literacy, which consists of 1) how to compile high-level language into related assembly code graphically , and 2) how to execute each assembly instruction by CPU simulator. We have demonstrated example lecture of computer literacy with our compiler and carried out questionnaire about lecture with compiler. And we report tentative results of questionnaire about our compiler.

Proceedings of the Sixth International Conference on Electronics and Software Science ICESS2020, Japan, 2020
The paper presents a typical setup needed for machine-vision-based industrial applications of a r... more The paper presents a typical setup needed for machine-vision-based industrial applications of a robotic manipulator. Several components and different programs need to operate in accordance to accomplish the desired task. In this paper the main emphasis is given on the description of a RoboRe-alm software, which can be used to conveniently execute various machine vision algorithms. Several algorithms, which are implemented as procedures or modules within the program, are presented together with the result they have on an input image. As a consequence this paper can be of great use to anyone, who is trying to develop a complex industrial application of this type, but lacks sufficient knowledge in machine vision to write a special purpose program in some common computer language such as C++, C# or Python.

Proceedings of the Sixth International Conference on Electronics and Software Science ICESS2020, Japan, 2020
Over the years, many studies have been conducted with the objective of facilitating the working o... more Over the years, many studies have been conducted with the objective of facilitating the working of robots in dynamic environments. Various robots have been developed to assist humans in workspaces, such as a house or factory. In general, robots are required to work effectively and safely in a dynamic environment to achieve their tasks. In addition, the robots should recognize state as similar as Human. However, it is not easy to make a robot behave like a human in dynamic environments. In this study, the person watching robot system will be developed. In detail, in this paper, the flexible-analyze system of the robot will be focused on. In this study, it is used that Deep Q-Network (DQN) of convolutional neural network to estimate the Q-value itself, so that it can obtain an approximate function of the Q-values. However, it seems to the following of multitasking and moving goal point tracking that Q-Learning was not good at has been inherited by DQN. In this paper, to upcome the weak points of DQN by changing the exploration ratio as known as ε dynamically , has been tried. In addition, the authors had been tuned the network layers of DQN for generalize to the given environment. In the proposed algorithm, a resident-tracking task and an energy-saving task are holding. The whole tasks are working based on DQN. Thus, the behavior algorithm of the person watching robot system will be developed. From the verification experiment, the simulation results showed the proposed method has been acquired actions to switch the desired task.

Proceedings of the Sixth International Conference on Electronics and Software Science ICESS2020, Japan, 2020
Functional programming is recognised as a major and most promising programming paradigm. Several ... more Functional programming is recognised as a major and most promising programming paradigm. Several approaches to this paradigm have been devised over time: pure functional languages such as Haskell proscribe side effects, intransigence which, for practical reasons, makes multi-paradigm approaches such as that of the Lisp, Scheme and Racket languages popular as well. Nonetheless, tracking the execution of such a program remains difficult for the programmer. In this paper, a solution to this issue is proposed by combining the instruction sequence approach of imperative programming with the pure functions of functional programming in order to retain their respective advantages ; this is the sequence of functions (SOF) approach. The applicability and contribution of the proposal is shown by comparing it to the conventional approaches.
The 8th International Conference on Informatics and Applications (ICIA2019), 2019
This case study examines the process of revitalizing the once almost stagnated partnership betwee... more This case study examines the process of revitalizing the once almost stagnated partnership between two universities in Japan and France. ERASMUS+ICM program has a great impact on the activating process, not only due to its financial support, but also the incentive stimulated by it. Once the mobility starts rolling, good communication among the staffs inside the university is indispensable to keep the chain reaction continue.

The 8th International Conference on Informatics and Applications (ICIA2019), 2019
The Cloud computing has facilities that allow users to share their data, storage units, and even ... more The Cloud computing has facilities that allow users to share their data, storage units, and even resources. It has many advantages such as high scalability and availability with affordable price because the users can be accessed to the remote resources and lower the organization costs for servers, storage units, and other equipment. However, when data are transmitted from any networks to cloud computing these data no longer are under directed management and control of the owners and the cloud providers also have some type of access on the user's data. The privacy reduction and security problems are fundamental issues in cloud computing. One way to protect our data during the transmission and the time in which data are stored in cloud storage units is to encrypt data before transmission. The method of Cipher Plain-Text-Attribute-Based Encryption (CPT-ABE) able to be utilized as the cryptographic tool for solving the problems. Also, the users can decrypt their data when they have pleased, but yet the access control policy attributes created. Same attribute-based encryption is CP-ABE, where the policies are related to data which is encrypted, when attributes are related to keys. Now, we utilize the Cipher-text Policy ABE for controlling access to the data of cloud based on the credentials/attributes of owner. The article indicates cloud-based network data access utilization based on Cipher-text Policy ABE, in order to analyze for exploring the method efficiency to use in networks based on the cloud. Moreover, for analyzing set of attributes for improving access control schema performance.

The 8th International Conference on Informatics and Applications (ICIA2019), 2019
This paper explains the liveness detection of the biometric system using the Face-Iris Images and... more This paper explains the liveness detection of the biometric system using the Face-Iris Images and deep learning classification. We have proposed novel hybrid algorithms for Face-Iris Liveness Recognition which can be used in cyber security authentication.In proposed model the individual identification is obtained from the extracted features that captured from face-Iris Images. Iris recognition is one of the most important biometric traits in which the iris image will be processed by some type of reliable, robust, and fast algorithm to capture the unique features embedded in iris. The camera system in which is used to capture the iris image will register depicts changes and variations in size of Iris as exposed to the light during the checkup and individual identification. This information will be used to verify the liveness of the iris image and distinguish the real lived iris image from the faked iris image. The recognition system based on the iris images are costly and required high resolution optical sensors and camera system beside the presence of the individual at the time of authentication and verification. The face image may change in certain degree such as appearance but shape and structure of face skeleton , location of eyes, mouth, and nose are remain unchanged. Due to this remarkable characteristic and ability to generate the face image features with near perfect identifiers and lack of requirement for physical contact with recognition system has made the facial recognition system remarkable. Our proposed face-iris feature extraction has been used to detect the fake face or iris from the real one and genuine live iris from the printed iris information by using the cosmetic lens. Our proposed model is based on the iris and face images in which high resolution camera and sensors are required at site to distinguish liveness Iris from fake one along with the high resolution algorithms that use combinations of DWT and SVD. The findings and results have shown the superiority our method,DWT-SVD, compared with hybrid of DCT, HT, MT with SVD, respectively. Our algorithm could be used to identify the fake Iris and face and greatly improve the cyber security. The extracted features can be obtained from videos or face images which have been captured from the scene even without individual physical contract. Our proposed model has been used for authentication and identification of the individuals based on the extracted features obtained from a new hybrid algorithm using both SVD and DWT.In proposed algorithm the face-iris features have been extracted and they are saved in the face-iris feature vectors for recognition. The Euclidian Distance vector has been used to classify the feature vectors extracted from live and fake face-iris images. The result and comparison of the proposed face-Iris recognition based on DWT-SVD with other technique has shown. Our method not only has higher speed of operation compared with other techniques but its rate of recognition is also good s as shown in the tabulated results.Experimental results also have shown that the hybrid methods of MT-SVD and HT-SVD have a better recognition results compared with DWT-SVD but their complex computation and extra time requirements for real time systems make them less important that DWT-SVD.

The 8th International Conference on Informatics and Applications (ICIA2019), 2019
This case study focuses on the establishment of a new cooperative effort to accept a student enro... more This case study focuses on the establishment of a new cooperative effort to accept a student enrolled at Middle East Technical University, Turkey who was nominated to Kagawa University, Japan under the Erasmus+ International Credit Mobility Program. At the time the student was nominated, Kagawa University did not have a suitable program in which to accept the student, but arrangements were made to be able to host the student. From this particular case, demands for inbound programs for international students became clear including the needs for the flexibility of arranging existing programs, the ability of providing content in English, the strong consideration towards student satisfaction, and the utilization of the Internet resources to share information. Close cooperation from the stakeholders was the key to the success of the initiative.
The 8th International Conference on Informatics and Applications (ICIA2019), 2019
In this paper some possible solutions of graphi-cal user interfaces (GUIs) within Python programm... more In this paper some possible solutions of graphi-cal user interfaces (GUIs) within Python programming language are presented. GUIs are becoming increasingly important, because human beings are more and more involved in dealing with computers for every day life. GUIs are however part of computer systems that presents the border between computer and human being. It is therefore very important for any serious programming language to offer easy to use solutions in the area of GUI development. In this paper a few possible GUI libraries for Python are presented. A very basic examples of their application are also given in order to give a sense of their complexity. Two examples which can be useful in educational environment are also presented at the end of the paper.

The Fifth International Conference on Electronics and Software Science (ICESS2019), 2019
Design is very important for specification of products and its education will be essential not on... more Design is very important for specification of products and its education will be essential not only for artistic course but also for other productive (or creative) courses in higher educational institutions. Design education usually needs how to distinguish one specific target as being different from other alittle-bit-similar ones concerning the focused reason(s), for example, regarding some aspects, or based on sense of value. It is sometimes very difficult to explain, illustrate and demonstrate efficiently for students and learners with less experiences. In order to improve such situation for design education, the authors have developed Webbased questionnaire system to provide a suitable Web page and receive the answers from several users who play roles of examinee of questionnaire efficiently. The paper presents the system configuration of questionnaire system and its application to Design Education. With the system, design education and evaluation have been efficiently performed and effectively visualized.

The Fifth International Conference on Electronics and Software Science (ICESS2019), 2019
In this study, the reinforcement learning agent under the situation of communicable as multi-agen... more In this study, the reinforcement learning agent under the situation of communicable as multi-agent system will be improved efficiency. In reinforcement learning, this method will be supposed that agent is able to observe the environment, completely. However, there is a limit on the information of the sensors. Moreover, it is hard to learn the reinforcement learning agent in the actual environment cause of some noise of actual environment or source device. In addition, a time per a episode will enlarge because an agent will be explored in a given area. In this study, the proposed method has been using two type agents that communicate as information exchange on the location to settle this problem, moreover, the noise will be mixed with knowledge space in the situation of the knowledge sharing. In addition, sometimes the any information won’t be transmitted in the situation of knowledge sharing. From this viewpoint, in this study aims to improve maze-solving technique, efficiency by which to the multi-agent reinforcement learning’s agents under the situation. As a result, the proposed method has been confirmed that is provided suitable solution for an approach to the goal for the agents.
The Fifth International Conference on Electronics and Software Science (ICESS2019), 2019
This paper describes a line simplification algorithm combining self-organization and auto-regress... more This paper describes a line simplification algorithm combining self-organization and auto-regression, and the algorithm keeps a quality for drawing simplified lines even when scaled. Self-organization enables us a microscopic autonomous behavior to produce macro structures, and plays a coordination which reflects to every two neighbor vertices. On the other hand, auto-regression maintains the shape of original lines, so the regression tries to track the original features as much as possible by considering lines locally as time series. Our contributions are to show that the two models work well together and give us positive results by complementing each other without losing the original essential features. Finally, we present some experimental results showing our usefulness.

The Fifth International Conference on Electronics and Software Science (ICESS2019), 2019
We have proposed a life model of our residential sections. This paper proposes the reformulation ... more We have proposed a life model of our residential sections. This paper proposes the reformulation of town street model based on selforganization of rectangle sections. The model is quit easy to handle the residential sections under asset, since merging two regions into one or splitting one section into two, which are based on rectangle sections, become easy to manipulate them, and also they are amenable to actual transactions in large development areas. We employ new operations to model the residential sections, and the features are partly fit into real town areas. Their operators locally play an interaction with two simple operators merge and join, and globally fitted into residential rectangle sections working as a selforganization. Finally, we compare two: theoretical simulation results and real town statistics in the world.
The Fifth International Conference on Electronics and Software Science (ICESS2019), 2019
This paper presents some experimental results on Axelrod model of culture dissemination. In this ... more This paper presents some experimental results on Axelrod model of culture dissemination. In this work, we will examine how the cultures spread over networks including small world networks, and finally how cultures end to evolve in the networks. The cultures refer individual features, each individual plays a role of culture dissemination with some probabilities and high similarities in the neighbors, and the behavior of dissemination just works as agents in the networks, where the agents are placed and fixed at the network verteces. We use three kinds of network graphs including random graphs, Watts-Strogatz graphs and Barab´asi-Albert graphs. Our experimental results show that the evolve processes to the ends of cultures are different and depending on the structures of networks.

The Fifth International Conference on Electronics and Software Science (ICESS2019), 2019
Photovoltaic power generations (PVG) have been used generally and spread broadly. Various power c... more Photovoltaic power generations (PVG) have been used generally and spread broadly. Various power conditioning systems used in those have been also studied by many researchers. In addition to usual utilization, such PVG is often equipped for the time of disaster. Usually such solar panels having limited power are almost installed in limited area such as on top of the roof of the building. Some medical institutions have fairly desire to keep such PVG since they must avoid the medical service interruption. The generating power in such case is fair limited, so the system construction should balance the reduced power. Thus, it is necessary to improve the construction toward simple one. In usual PCS, power is converted by two stages, that is boost converter and normal inverter. In first stage, the dc power is adjusted to appropriate value. The conversion methods are presented in many strategies. In this paper, in order to pursue an ideal one, simple and concise power converter, especially novel boost chopper is proposed. Considering fair reduced power and narrow space of installation, the system constructions should be compact. The circuit which gratifies their operating characteristic is presented and analytically discussed about circuit construction as a novel boost converter. The circuit operation is confirmed by using the circuit software and a few experiments.
The Fifth International Conference on Electronics and Software Science (ICESS2019), 2019
Security cameras are increasing in public facilities. The main reason is improvement of security.... more Security cameras are increasing in public facilities. The main reason is improvement of security. Furthermore, security cameras help quick arrest of criminals. It is, therefore, important that we install security cameras. However, we expect to obtain too much data of movie by increasing the number of cameras too. Security guard cannot watch all movie of all cameras always. For these reasons, we thought not only getting data but also security improvement. If humans have dangerous objects, the movie’s situation should define them as dangerous. First, we detect humans in camera’s images. Second, if we detect dangerous objects in human detection area, we think that there are dangerous humans. We use SSD to detect humans and dangerous objects.

The Fifth International Conference on Electronics and Software Science (ICESS2019), 2019
Since the invention of smartphones, touch has always been the primary interface for humans to int... more Since the invention of smartphones, touch has always been the primary interface for humans to interact with smartphones and tablets. As technology advances, researchers have been exploring other forms of interfaces such as voice control, virtual reality, handwriting digitizers, etc. One of the least explored and potential human-computer interfaces is eye gaze tracking which is the method of measuring the point of gaze. Studies of eye movement and eye tracking has been attracting interests from researchers and has progressed from eye-attached tracking to optical tracking and currently machine learning based tracking. In this paper, we proposed two ResNet-based convolutional neural network (CNN) models for card prediction which is a classification problem. Eye gazes are categorized into 32 areas whereby each eye gaze corresponds to an area on the mobile device’s display. The experimental results show that we can achieve accuracy as high as 81%.
The Fifth International Conference on Electronics and Software Science (ICESS2019), 2019
Muscles can cause injury by training to improve physical performance. However, there are few ways... more Muscles can cause injury by training to improve physical performance. However, there are few ways to assess muscle fatigue currently. Therefore, in this paper, muscle fatigue is evaluated using surface EMG(ElectroMyoGram). The proposed method in this research consists of 4 parts: Measurement, Pre-processing, Feature extraction, and Learning identification parts. The effectiveness of the proposed method is demonstrated in two ways, classification and regression analysis, and comparative verification is conducted.
Uploads
Papers by SDIWC Organization