{"title":"Robust control design of arm exoskeleton based on sliding mode control","authors":"C. Silawatchananai, S. Howimanporn","doi":"10.1109/IIAI-AAI50415.2020.00113","DOIUrl":"https://doi.org/10.1109/IIAI-AAI50415.2020.00113","url":null,"abstract":"This paper describes the design of nonlinear control based sliding mode control for the upper-limb rehabilitation exoskeleton. The proposed controller has robustness against uncertainties of dynamic parameters. The control law provides robustness against disturbances with unknown bounds. To investigate the performance of the proposed control method, simulations are conducted for a nonlinear upper-limb exoskeleton comparing with a computed torque control method. STM32F4Discovery was implemented as the main controller either a traditional controller or a sliding mode control. In the experiment, trajectory tracking in joint space were conducted to evaluate the performance of the developed robot and the controller. Experimental results show that the robot can effectively track the desired S-curve trajectories corresponding to passive arm movement.","PeriodicalId":188870,"journal":{"name":"2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116487352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling of inventory routing problem considering collaborative strategy and change of minimum delivery unit constraint in emergency logistics","authors":"Tomoki Oshima, A. Ishigaki, Takumi Ito, K. Mori","doi":"10.1109/IIAI-AAI50415.2020.00146","DOIUrl":"https://doi.org/10.1109/IIAI-AAI50415.2020.00146","url":null,"abstract":"This study focuses on the emergency logistics of building members for the purpose of early restoration of damaged building. Building members are assumed to be delivered out of the affected area in an unprocessed state and processed during the delivery plan. Therefore, it is necessary to consider the changes in minimum delivery unit constraints. This study formulated three delivery strategies, including a collaborative strategy, to minimize delays in delivery. Comparing each strategy using numerical experiments, it was shown that the use of a secondary storage facility with processing capability is most effective in reducing delays in delivery. In addition, it was shown that the use of planned transshipment, one of the collaborative strategies, can reduce delivery delays without using additional equipment.","PeriodicalId":188870,"journal":{"name":"2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128026978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning Attitude Analysis based on Operation Logs of Fill-in Workbook System","authors":"Kousuke Abe, Tetsuo Tanaka, Kazunori Matsumoto","doi":"10.1109/IIAI-AAI50415.2020.00043","DOIUrl":"https://doi.org/10.1109/IIAI-AAI50415.2020.00043","url":null,"abstract":"The authors are developing a fill-in workbook system that allows faculty members to ascertain the attitude of all students to classes including those who are not active, and improve lectures through well-timed and appropriate actions. To support the actions of teachers to improve lessons and teaching materials, we analyzed the operation logs of students using our Fill-in Workbook System in multiple lessons. The transition of learning attitudes for each lesson and for each time / each slide in the lesson for the entire class is extracted. In addition, to support the student's retrospective review of the lessons, the transition in the attitude of each student to the class is extracted. The results confirmed that lessons in which the class attitude became worse could be detected by analyzing the system focus time and the degree of synchronization between the page explained by the teacher and the page referenced by the student, and that the difference in learning attitudes increased when there were few blanks. In addition, we analyzed the degree of asynchrony (jumping ahead, falling behind) with the teacher's explanation and clarified the relationship between the time taken to explain one page and learning attitude. Furthermore, it was confirmed that the student's individual learning state could be divided into three separate conditions.","PeriodicalId":188870,"journal":{"name":"2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an Intrusion Detection System Using a Botnet with the R Statistical Computing System","authors":"Takashi Yamanoue, Junya Murakami","doi":"10.1109/IIAI-AAI50415.2020.00022","DOIUrl":"https://doi.org/10.1109/IIAI-AAI50415.2020.00022","url":null,"abstract":"Development of an intrusion detection system, which tries to detect signs of technology of malware, is discussed. The system can detect signs of technology of malware such as peer to peer (P2P) communication, DDoS attack, Domain Generation Algorithm (DGA), and network scanning. The system consists of beneficial botnet and the R statistical computing system. The beneficial botnet is a group of Wiki servers, agent bots and analyzing bots. The script in a Wiki page of the Wiki server controls an agent bot or an analyzing bot. An agent bot is placed between a LAN and its gateway. It can capture every packet between hosts in the LAN and hosts behind the gateway from the LAN. An analyzing bot can be placed anywhere in the LAN or WAN if it can communicate with the Wiki server for controlling the analyzing bot. The analyzing bot has R statistical computing system and it can analyze data which is collected by agent bots.","PeriodicalId":188870,"journal":{"name":"2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126002597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Student Activities in Blended Information Literacy Lectures","authors":"Shinnosuke Yamaguchi, Hideki Kondo, Yoshimasa Ohnishi, Kazunori Nishino","doi":"10.1109/IIAI-AAI50415.2020.00052","DOIUrl":"https://doi.org/10.1109/IIAI-AAI50415.2020.00052","url":null,"abstract":"Many educational institutions implement blended lectures using an LMS. In addition, an analysis of learning activities using LMS learning records has been attempted by many educational institutions. In this paper, we analyzed students' learning activities and learning effects by using basic log data from an LMS on blended information literacy lectures to evaluate the lectures. In addition, we divided students into groups and analyzed their differences by the number of learning effects and learning activities. Additionally, in order to confirm which teaching materials were useful, this paper compared each group’s usage of teaching materials and conducted a questionnaire with the students about lecture contents and teaching materials. As a result, we saw that there were variations in the use of teaching materials even among students with many learning activities. We report the details of these differences and make suggestions for improving lectures.","PeriodicalId":188870,"journal":{"name":"2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127972201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ohata, Kenji Hagiwara, Mika Konuma, Yuji Mizukami
{"title":"What is the Optimal Environment for a Postdoctoral Researcher?","authors":"A. Ohata, Kenji Hagiwara, Mika Konuma, Yuji Mizukami","doi":"10.1109/IIAI-AAI50415.2020.00080","DOIUrl":"https://doi.org/10.1109/IIAI-AAI50415.2020.00080","url":null,"abstract":"We examine the research papers produced by postdoctoral researchers in reference to their postdoctoral systems. We find a difference among papers where the target postdoctoral researcher is not the first author. In particular, the number of papers in which the first author belongs to other institutes from the target postdoctoral researchers is quite different. Furthermore, coauthored papers correlate with a difference in the H-index of the postdoctoral researchers. This indicates that collaboration during postdoctoral research may affect the future career of those researchers.","PeriodicalId":188870,"journal":{"name":"2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115936417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning Analytics with Multi-faced Data for Cybersecurity Education","authors":"Kosuke Kaneko, Toshie Igarashi, Kosetsu Kayama, Takuya Takeuchi, Takuya Suzuki, Atsushi Kawase, Tomoyuki Sunaga, Masayuki Okuhara, K. Okamura","doi":"10.1109/IIAI-AAI50415.2020.00055","DOIUrl":"https://doi.org/10.1109/IIAI-AAI50415.2020.00055","url":null,"abstract":"This paper presents several learning analytics results for cybersecurity education. The results were obtained by analyzing multi-faced data; pre-/post-test data, personality data, operation logs, behavior logs, learning motivation data and free described questionnaires. These data were collected throughout a cybersecurity intensive course. This paper explains the contents of the intensive course and the analysis results. Also, this paper discusses effective instructional designs in consideration with the analysis results.","PeriodicalId":188870,"journal":{"name":"2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Piyanun Ruangurai, C. Silawatchananai, S. Howimanporn
{"title":"PSO based Fictitious Reference Iterative Tuning of air dryer for fruit drying process","authors":"Piyanun Ruangurai, C. Silawatchananai, S. Howimanporn","doi":"10.1109/IIAI-AAI50415.2020.00114","DOIUrl":"https://doi.org/10.1109/IIAI-AAI50415.2020.00114","url":null,"abstract":"This paper proposed on a tuning method for temperature control for fruit drying process by using fictitious reference iterative tuning (FRIT). The objective is to maintain the temperature inside the chamber matching with the desired response. The prototype of air dryer had been designed and developed as the test bench. The experimental result of tuning shows that the PSO based FRIT method is able to enhance effectiveness of tuning controller parameters.","PeriodicalId":188870,"journal":{"name":"2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133831739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extraction of Genes Associated with Liver Cancer Using Machine Learning","authors":"Koshiro Sekine, T. Hochin, Hiroki Nomiya","doi":"10.1109/IIAI-AAI50415.2020.00012","DOIUrl":"https://doi.org/10.1109/IIAI-AAI50415.2020.00012","url":null,"abstract":"In this paper, using the liver cancer dataset of NBDC, genes and transcripts extracted by using statistical hypothesis tests were given to the random forest. The genes and transcripts which are considered to be pathogenic are extracted. As a result, we obtained the genes and transcripts thought to be associated with liver cancer.","PeriodicalId":188870,"journal":{"name":"2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating decentralized P2P trading methods of local renewable energy for local consumption","authors":"K. Fukuda, Miki Saito, Hisashi Hayashi","doi":"10.1109/IIAI-AAI50415.2020.00162","DOIUrl":"https://doi.org/10.1109/IIAI-AAI50415.2020.00162","url":null,"abstract":"The liberalization of electricity buying and selling and regional decentralization have progressed with respect to the stable use of electricity, and the use of renewable energy is being promoted for global warming countermeasures. However, renewable energy has large fluctuations in output, depending on time and place, so the amount of power can be either too large or too small, preventing a stable regional power system from being formed. We propose new decentralized peer-to-peer (P2P) negotiation methods for optimizing the surplus and shortage of power within a region by sharing local renewable energy, and we evaluate the methods by multi-agent simulation.","PeriodicalId":188870,"journal":{"name":"2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}