{"id":2541,"date":"2014-11-10T17:19:21","date_gmt":"2014-11-10T08:19:21","guid":{"rendered":"http:\/\/www.is.doshisha.ac.jp\/news\/?p=2541"},"modified":"2014-11-10T17:19:21","modified_gmt":"2014-11-10T08:19:21","slug":"%e3%80%90%e9%80%9f%e5%a0%b1%e3%80%91%e3%80%80ies-2014","status":"publish","type":"post","link":"https:\/\/is.doshisha.ac.jp\/news\/?p=2541","title":{"rendered":"\u3010\u901f\u5831\u3011\u3000IES 2014"},"content":{"rendered":"<p>\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u3067\u958b\u50ac\u3055\u308c\u3066\u3044\u308b\u300018th Asia Pacific\u3000Symposium on Intelligent and Evolutionary Systems (IES 2014)\u3000\u306b\u53c2\u52a0\u3057\u3066\u3044\u307e\u3059\u3002<br \/>\n\u53c2\u52a0\u3057\u3066\u3044\u308b\u306e\u306f\u3000\u5ee3\u5b89\u3001\u95a2\u8c37\uff08M2),\u897f\u6751\uff08M2)\u3001\u5c0f\u6df5\uff08M1)\u3067\u3059\u3002<br \/>\n\u4e0b\u8a18\u306e\u767a\u8868\u3092\u3059\u308b\u4e88\u5b9a\u3067\u3059\u3002<br \/>\nCell Segmentation using Binarization and Growing Neural Gas<br \/>\nTomoyuki Hiroyasu, Shunsuke Sekiya, Noriko Koizumi, Naoki Okumura and Utako Yamamoto<br \/>\nWorking Memory Training Strategies and their Influence on Changes in Brain Activity<br \/>\nandWhite Matter<br \/>\nTomoyuki Hiroyasu, Shogo Obuchi, Misato Tanaka, Tatsuya Okamura and Utako Yamamoto<br \/>\nMedical Image Management System with Automatic Image Feature Tag Adding<br \/>\nFunctions<br \/>\nTomoyuki Hiroyasu, Yuji Nishimura and Utako Yamamoto<br \/>\n<!--more--><br \/>\n<strong>\u5b66\u4f1a\u53c2\u52a0\u5831\u544a\u66f8<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"147\"><strong>\u00a0<\/strong><strong>\u5831\u544a\u8005\u6c0f\u540d<\/strong><\/td>\n<td width=\"373\">\u95a2\u8c37\u99ff\u4ecb<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u767a\u8868\u8ad6\u6587\u30bf\u30a4\u30c8\u30eb<\/strong><\/td>\n<td width=\"373\">2\u5024\u5316\u3068\u6210\u9577\u578b\u30cb\u30e5\u30fc\u30e9\u30eb\u30ac\u30b9\u306b\u3088\u308b\u7d30\u80de\u9818\u57df\u5206\u5272<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u767a\u8868\u8ad6\u6587\u82f1\u30bf\u30a4\u30c8\u30eb<\/strong><\/td>\n<td width=\"373\">Cell Segmentation Using Binarization and Growing Neural Gas<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u8457\u8005<\/strong><\/td>\n<td width=\"373\">Tomoyuki Hiroyasu, Shunsuke Sekiya, Noriko Koizumi, Naoki Okumura, Utako Yamamoto<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u4e3b\u50ac<\/strong><\/td>\n<td width=\"373\">Memetic Computing Society, The International Neural Network Society<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u8b1b\u6f14\u4f1a\u540d<\/strong><\/td>\n<td width=\"373\">The 18<sup>th<\/sup> Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES2014)<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u4f1a\u5834<\/strong><\/td>\n<td width=\"373\">Nanyang Executive Centre, Nanyang Technological University, Singapore<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u958b\u50ac\u65e5\u7a0b<\/strong><\/td>\n<td width=\"373\">2014\/11\/10-2014\/11\/12<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<br \/>\n&nbsp;<\/p>\n<ol>\n<li>\u8b1b\u6f14\u4f1a\u306e\u8a73\u7d30<\/li>\n<\/ol>\n<p>2014\/11\/10\u304b\u30892014\/11\/12\u306b\u304b\u3051\u3066\uff0c\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u306eNanyang Technological University \u306eNanyang Executive Centre\u306b\u3066\u958b\u50ac\u3055\u308c\u307e\u3057\u305fThe 18<sup>th<\/sup> Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES2014)<sup>1)<\/sup>\u306b\u53c2\u52a0\u3044\u305f\u3057\u307e\u3057\u305f\uff0e\u3053\u306eIES2014\u306f\uff0cMemetic Computing Society, The International Neural Network Society\u306b\u3088\u3063\u3066\u4e3b\u50ac\u3055\u308c\u305f\u56fd\u969b\u4f1a\u8b70\u3067\uff0c\u30a2\u30b8\u30a2\u74b0\u592a\u5e73\u6d0b\u5730\u57df\u306e\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8\u30b7\u30b9\u30c6\u30e0\u3084\u9032\u5316\u7684\u8a08\u7b97\u306e\u5206\u91ce\u306e\u7814\u7a76\u8005\u304c\u96c6\u3044\uff0c\u30a2\u30a4\u30c7\u30a3\u30a2\u3084\u7814\u7a76\u7d50\u679c\u4ea4\u63db\u3057\uff0c\u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3\u3092\u8b70\u8ad6\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u306b\u958b\u50ac\u3055\u308c\u3066\u3044\u307e\u3059\uff0e<br \/>\n\u79c1\u306f\u5168\u65e5\u7a0b\u53c2\u52a0\u3044\u305f\u3057\u307e\u3057\u305f\uff0e\u672c\u7814\u7a76\u5ba4\u304b\u3089\u306f\u4ed6\u306b\u5ee3\u5b89\u5148\u751f\uff0c\u897f\u6751\uff0c\u5c0f\u6df5\u304c\u53c2\u52a0\u3057\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<ol start=\"2\">\n<li>\u7814\u7a76\u767a\u8868\n<ul>\n<li>\u767a\u8868\u6982\u8981<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>\u79c1\u306f11\u65e5\u306e\u5348\u5f8c\u306e\u30bb\u30c3\u30b7\u30e7\u30f3\u300cComputational Intelligent Algorithms and Techniques and Its Application to Real World Problems 1\u300d\u306b\u53c2\u52a0\u3044\u305f\u3057\u307e\u3057\u305f\uff0e\u767a\u8868\u306e\u5f62\u5f0f\u306f\u53e3\u982d\u767a\u8868\u3067\uff0c15\u5206\u306e\u8b1b\u6f14\u6642\u9593\u30684\u5206\u306e\u8cea\u7591\u5fdc\u7b54\u6642\u9593,1\u5206\u306e\u4ea4\u4ee3\u6642\u9593\u3068\u306a\u3063\u3066\u304a\u308a\u307e\u3057\u305f\uff0e<br \/>\n\u4eca\u56de\u306e\u767a\u8868\u306f\uff0c\u65e2\u5b58\u306e\u7d30\u80de\u753b\u50cf\u89e3\u6790\u30bd\u30d5\u30c8\u3068\u6559\u5e2b\u3042\u308a\u5b66\u7fd2\u306b\u3088\u308b\u7d30\u80de\u9818\u57df\u5206\u5272\u624b\u6cd5\u306e\u554f\u984c\u3092\u89e3\u6c7a\u3059\u308b\u305f\u3081\u306b\uff0c\u6559\u5e2b\u306a\u3057\u5b66\u7fd2\u306b\u3088\u308b\u7d30\u80de\u9818\u57df\u5206\u5272\u624b\u6cd5\u3092\u63d0\u6848\u3057\u307e\u3057\u305f\uff0e\u4ee5\u4e0b\u306b\u6284\u9332\u3092\u8a18\u8f09\u81f4\u3057\u307e\u3059\uff0e<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">\u89d2\u819c\u5185\u76ae\u518d\u751f\u533b\u7642\u306b\u304a\u3044\u3066\uff0c\u57f9\u990a\u7d30\u80de\u304c\u79fb\u690d\u53ef\u80fd\u304b\u3092\u6c7a\u5b9a\u3059\u308b\u305f\u3081\u306e\u81ea\u52d5\u5224\u65ad\u306f\u91cd\u8981\u3067\u3042\u308b\uff0e\u305d\u3057\u3066\u305d\u306e\u5224\u65ad\u306f\u7d30\u80de\u753b\u50cf\u304b\u3089\u6307\u6a19\u3092\u8a08\u6e2c\u3059\u308b\u3053\u3068\u306b\u3088\u3063\u3066\u53ef\u80fd\u3068\u306a\u308b\uff0e\u6211\u3005\u306f\u904e\u53bb\u306b\u907a\u4f1d\u7684\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u3092\u7528\u3044\u3066\u5358\u7d14\u306a\u753b\u50cf\u51e6\u7406\u30d5\u30a3\u30eb\u30bf\u3092\u9069\u5207\u306b\u7d44\u307f\u5408\u308f\u305b\u308b\u30b7\u30b9\u30c6\u30e0\u3092\u63d0\u6848\u3057\u305f\uff0e\u3057\u304b\u3057\u306a\u304c\u3089\uff0c\u904e\u5b66\u7fd2\u306e\u305f\u3081\u9ad8\u3044\u5206\u5272\u7cbe\u5ea6\u3092\u5f97\u308b\u3053\u3068\u304c\u56f0\u96e3\u3067\u3042\u3063\u305f\uff0e\u305d\u308c\u3086\u3048\uff0c\u6559\u5e2b\u306a\u3057\u5b66\u7fd2\u306b\u3088\u308b\u5206\u5272\u624b\u6cd5\u306e\u9054\u6210\u306f\uff0c\u69d8\u3005\u306a\u7a2e\u985e\u306e\u753b\u50cf\u306b\u5bfe\u3059\u308b\u5fc5\u9808\u306e\u8981\u4ef6\u3067\u3042\u308b\uff0e\u672c\u7a3f\u3067\u306f\uff0c2\u5024\u5316\u3068\u6210\u9577\u578b\u30cb\u30e5\u30fc\u30e9\u30eb\u30ac\u30b9\u3092\u7528\u3044\u305f\u6559\u5e2b\u306a\u3057\u5b66\u7fd2\u5206\u5272\u624b\u6cd5\u3092\u63d0\u6848\u3059\u308b\uff0e\u672c\u624b\u6cd5\u3067\u306f\uff0c\u7d30\u80de\u5883\u754c\u306e\u30d9\u30af\u30c8\u30eb\u91cf\u5b50\u5316\u3068\u30e6\u30cb\u30c3\u30c8\u306e\u7d50\u5408\u306b\u3088\u308a\u7d30\u80de\u9818\u57df\u3092\u5206\u5272\u3059\u308b\uff0e\u307e\u305f\uff0c\u672c\u624b\u6cd5\u3092\u65e2\u5b58\u624b\u6cd5\u3068\u6bd4\u8f03\u3057\u305f\u7d50\u679c\uff0c\u63d0\u6848\u624b\u6cd5\u306f\u512a\u308c\u305f\u7cbe\u5ea6\u3092\u6709\u3057\u3066\u3044\u308b\u3053\u3068\u304c\u793a\u3055\u308c\u305f\uff0e<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<ul>\n<li>\u8cea\u7591\u5fdc\u7b54<\/li>\n<\/ul>\n<p>\u4eca\u56de\u306e\u8b1b\u6f14\u767a\u8868\u3067\u306f\uff0c\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u8cea\u7591\u3092\u53d7\u3051\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<br \/>\n<strong>\u30fb\u8cea\u554f\u5185\u5bb9<\/strong><strong>1<\/strong><br \/>\n\u30de\u30ec\u30fc\u30b7\u30a2\u306e\u30da\u30c8\u30ed\u30ca\u30b9\u5de5\u79d1\u5927\u5b66\u6240\u5c5e\u306eIrraivan Elamvazuthi\u3055\u3093\u304b\u3089\u306e\u8cea\u554f\u3067\u3059\uff0e\u3053\u3061\u3089\u306e\u8cea\u554f\u306f\u3069\u306e\u3088\u3046\u306bGP\u306e\u30d1\u30e9\u30e1\u30fc\u30bf\u3092\u6c7a\u5b9a\u3057\u305f\u306e\u304b\u3068\u3044\u3046\u3082\u306e\u3067\u3057\u305f\uff0e\u3053\u306e\u8cea\u554f\u306b\u5bfe\u3059\u308b\u79c1\u306e\u56de\u7b54\u306f\u904e\u53bb\u306e\u6587\u732e\u53c2\u8003\u306b\u3057\uff0c\u5b9f\u9a13\u3092\u7e70\u308a\u8fd4\u3057\u81ea\u3089\u6c7a\u5b9a\u3057\u305f\uff0c\u3067\u3057\u305f\uff0e<br \/>\n&nbsp;<br \/>\n<strong>\u30fb\u8cea\u554f\u5185\u5bb9<\/strong><strong>2<\/strong><br \/>\n\u30de\u30ec\u30fc\u30b7\u30a2\u306e\u30da\u30c8\u30ed\u30ca\u30b9\u5de5\u79d1\u5927\u5b66\u6240\u5c5e\u306eIrraivan Elamvazuthi\u3055\u3093\u304b\u3089\u306e\u8cea\u554f\u3067\u3059\uff0e\u3053\u3061\u3089\u306e\u8cea\u554f\u306f\u305d\u308c\u305e\u308c\u306e\u624b\u6cd5\u306e\u8a08\u7b97\u6642\u9593\u306f\u3069\u306e\u304f\u3089\u3044\u304b\u3068\u3044\u3046\u3082\u306e\u3067\u3057\u305f\uff0e\u3053\u306e\u8cea\u554f\u306b\u5bfe\u3059\u308b\u79c1\u306e\u56de\u7b54\u306f\uff0c\u65e2\u5b58\u624b\u6cd5\u306f\u7d0430~40\u5206\u3067\u63d0\u6848\u624b\u6cd5\u306f1\u3064\u306eGNG\u306e\u7d50\u679c\u3042\u305f\u308a\u7d043\u79d2\u3067\u3042\u308b\uff0c\u3067\u3057\u305f\uff0e<br \/>\n&nbsp;<br \/>\n<strong>\u30fb\u8cea\u554f\u5185\u5bb9<\/strong><strong>3<\/strong><br \/>\n\u30de\u30ec\u30fc\u30b7\u30a2\u306e\u30da\u30c8\u30ed\u30ca\u30b9\u5de5\u79d1\u5927\u5b66\u6240\u5c5e\u306eIrraivan Elamvazuthi\u3055\u3093\u304b\u3089\u306e\u8cea\u554f\u3067\u3059\uff0e\u3053\u3061\u3089\u306e\u8cea\u554f\u306fGP\u3068GNG\u306e\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u304c\u3069\u306e\u3088\u3046\u306b\u5206\u5272\u7cbe\u5ea6\u306b\u5f71\u97ff\u3057\u3066\u3044\u308b\u306e\u304b\u3068\u3044\u3046\u3082\u306e\u3067\u3057\u305f\uff0e\u3053\u306e\u8cea\u554f\u306b\u5bfe\u3059\u308b\u79c1\u306e\u56de\u7b54\u306f\uff0c\u65e2\u5b58\u624b\u6cd5\u306eGP\u306fImageJ\u306b\u3082\u3042\u308b\u5f37\u529b\u306a\u8ddd\u96e2\u5909\u63db\u306eWateshed\u30d5\u30a3\u30eb\u30bf\u304c\u9078\u629e\u3055\u308c\u3066\u3044\u308b\u304c\uff0c\u305d\u308c\u306f\u6728\u69cb\u9020\u306e\u4e2d\u9593\u306b\u3042\u308b\uff0e\u305d\u3057\u3066\u524d\u51e6\u7406\u3068\u5f8c\u51e6\u7406\u3068\u3057\u3066\u5b66\u7fd2\u9818\u57df\u306b\u9069\u3057\u305f\u8907\u96d1\u306a\u30d5\u30a3\u30eb\u30bf\u306e\u7d44\u307f\u5408\u308f\u305b\u69cb\u7bc9\u3055\u308c\u3066\u3044\u308b\u305f\u3081\u904e\u5b66\u7fd2\u304c\u8d77\u3053\u308a\uff0c\u5206\u5272\u7cbe\u5ea6\u304c\u60aa\u304f\u306a\u308b\u3068\u8003\u3048\u3066\u3044\u308b\uff0c\u3067\u3057\u305f\uff0e<br \/>\n&nbsp;<br \/>\n&nbsp;<\/p>\n<ul>\n<li>\u611f\u60f3<\/li>\n<\/ul>\n<p>\u7279\u306b3\u3064\u76ee\u306e\u8cea\u554f\u5185\u5bb9\u306b\u5bfe\u3057\uff0c\u63d0\u6848\u624b\u6cd5\u306b\u95a2\u3059\u308b\u8003\u5bdf\u3092\u52a0\u3048\u308b\u3053\u3068\u3092\u5931\u5ff5\u3057\u305f\u306e\u304c\u5fc3\u6b8b\u308a\u3067\u3057\u305f\uff0e\u3057\u304b\u3057\uff0c2\u56de\u76ee\u306e\u56fd\u969b\u4f1a\u8b70\u3068\u3044\u3046\u3053\u3068\u3082\u3042\u308a\u5168\u4f53\u7684\u306b\u306f\u843d\u3061\u7740\u3044\u3066\u767a\u8868\u3067\u304d\u305f\u3068\u611f\u3058\u3066\u304a\u308a\u307e\u3059\uff0e\u3053\u306e\u7d4c\u9a13\u3092\u4fee\u8ad6\u767a\u8868\u306b\u6d3b\u304b\u3057\u3066\u3044\u304d\u305f\u3044\u3068\u601d\u3044\u307e\u3059\uff0e<\/p>\n<ol start=\"3\">\n<li>\u8074\u8b1b<\/li>\n<\/ol>\n<p>\u4eca\u56de\u306e\u8b1b\u6f14\u4f1a\u3067\u306f\uff0c\u4e0b\u8a18\u306e2\u4ef6\u306e\u767a\u8868\u3092\u8074\u8b1b\u3057\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">\u767a\u8868\u30bf\u30a4\u30c8\u30eb\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a\u3000Evolving, Training and Designing Neural Network Ensembles\u8457\u8005\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Professor Xin Yao<br \/>\n\u30bb\u30c3\u30b7\u30e7\u30f3\u540d\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Keynote Speech \u2160<br \/>\nAbstruct\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a \u3053\u308c\u307e\u3067\u306e\u9032\u5316\u7684\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u7814\u7a76\u306f\uff0c\u5358\u4e00\u306e\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u7126\u70b9\u3092\u5f53\u3066\u3066\u304d\u305f\uff0e\u3057\u304b\u3057\u306a\u304c\u3089\uff0c\u5927\u898f\u6a21\u3067\u8907\u96d1\u306a\u554f\u984c\u306b\u5bfe\u3057\u3066\uff0c\u4e00\u3064\u306e\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u304c\u8a13\u7df4\u3057\u9032\u5316\u3059\u308b\u306b\u306f\u3042\u307e\u308a\u306b\u3082\u8907\u96d1\u306b\u306a\u3063\u3066\u304d\u3066\u3044\u308b\uff0e\u5927\u898f\u6a21\u3067\u8907\u96d1\u306a\u554f\u984c\u3092\u89e3\u6c7a\u3059\u308b\u305f\u3081\u306b\u306f\u307e\u3068\u307e\u3063\u3066\u5354\u529b\u3057\u306a\u304c\u3089\u6a5f\u80fd\u3059\u308b\u5358\u7d14\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u96c6\u5408\u3092\u8a2d\u8a08\u3059\u308b\u65b9\u304c\u826f\u3044\u3053\u3068\u304c\u591a\u304f\u3042\u308b\uff0e\u3053\u3053\u3067\u91cd\u8981\u306a\u554f\u984c\u306f\uff0c\u6700\u9ad8\u306e\u6c4e\u5316\u80fd\u529b\u3092\u6709\u3059\u308b\u3088\u3046\u306b\u96c6\u5408\uff0c\u3064\u307e\u308a\u30a2\u30f3\u30b5\u30f3\u30d6\u30eb\u3092\u81ea\u52d5\u7684\u306b\u8a2d\u8a08\u3059\u308b\u65b9\u6cd5\u3067\u3042\u308b\uff0e\u3053\u308c\u306f\u9032\u5316\u7684\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u95a2\u3059\u308b\u521d\u671f\u306e\u7814\u7a76\u306b\u5bfe\u3059\u308b\u30ec\u30d3\u30e5\u30fc\u3092\u8a71\u3057\u3066\u3044\u308b\uff0e\u305d\u3057\u3066\uff0c\u904e\u53bb\u306e\u30a2\u30f3\u30b5\u30f3\u30d6\u30eb\u8a2d\u8a08\uff0c\u8ca0\u306e\u76f8\u95a2\u5b66\u7fd2\u306e\u30a2\u30a4\u30c7\u30a3\u30a2\u3092\u8aac\u660e\u3059\u308b\uff0e\u6700\u5f8c\u306b\u3044\u304f\u3064\u304b\u306e\u6700\u8fd1\u306e\u7814\u7a76\u3092\u7d39\u4ecb\u3059\u308b\uff0e\u305d\u306e\u7814\u7a76\u3067\u306f\uff0c\u30de\u30eb\u30c1\u30af\u30e9\u30b9\u306e\u30af\u30e9\u30b9\u4e0d\u5747\u8861\u5b66\u7fd2\u306b\u95a2\u3059\u308b\u30aa\u30f3\u30e9\u30a4\u30f3\u30a2\u30f3\u30b5\u30f3\u30d6\u30eb\u5b66\u7fd2\u306b\u304a\u3051\u308b\u591a\u69d8\u6027\u306e\u5f71\u97ff\u306b\u3064\u3044\u3066\u5206\u6790\u3057\u3066\u3044\u308b\uff0e\u30aa\u30f3\u30e9\u30a4\u30f3\u5b66\u7fd2\u30af\u30e9\u30b9\u4e0d\u5747\u8861\u5b66\u7fd2\u3068\u30aa\u30f3\u30e9\u30a4\u30f3\u30af\u30e9\u30b9\u4e0d\u5747\u8861\u5b66\u7fd2\u306b\u5bfe\u3059\u308b\u65b0\u305f\u306a\u30a2\u30f3\u30b5\u30f3\u30d6\u30eb\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306e\u80cc\u666f\u306b\u3042\u308b\u8003\u3048\u65b9\u304c\u793a\u3055\u308c\u3066\u3044\u308b\uff0e\u305d\u306e\u3088\u3046\u306a\u65b0\u305f\u306a\u30a2\u30f3\u30b5\u30f3\u30d6\u30eb\u5b66\u7fd2\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3082\u8a00\u53ca\u3055\u308c\u3001\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u3082\u8b70\u8ad6\u3055\u308c\u308b\uff0e<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u3053\u306e\u767a\u8868\u306f\u30a2\u30f3\u30b5\u30f3\u30d6\u30eb\u5b66\u7fd2\u306e\u8003\u3048\u65b9\u306e\u8aac\u660e\u3084\u6700\u8fd1\u306e\u7814\u7a76\u306b\u95a2\u3059\u308b\u3082\u306e\u3067\u3057\u305f\uff0e\u7279\u306b\u30a2\u30f3\u30b5\u30f3\u30d6\u30eb\u5b66\u7fd2\u306b\u306f\u500b\u4f53\u306e\u591a\u69d8\u6027\u304c\u30ad\u30fc\u30dd\u30a4\u30f3\u30c8\u3068\u3044\u3046\u3053\u3068\u3067\u3057\u305f\uff0e\u79c1\u304c\u7814\u7a76\u3057\u3066\u3044\u308b\u753b\u50cf\u51e6\u7406GP\u3064\u3044\u3066\u3082\u591a\u69d8\u6027\u306e\u7dad\u6301\u304c\u91cd\u8981\u306a\u30dd\u30a4\u30f3\u30c8\u3068\u3044\u3046\u7d50\u8ad6\u304c\u51fa\u3066\u304a\u308a\uff0c\u30a2\u30f3\u30b5\u30f3\u30d6\u30eb\u5b66\u7fd2\u3092\u7528\u3044\u305f\u753b\u50cf\u51e6\u7406GP\u306e\u624b\u6cd5\u3082\u904e\u53bb\u306b\u63d0\u6848\u3055\u308c\u3066\u3044\u308b\u305f\u3081\uff0c\u81ea\u8eab\u306e\u7814\u7a76\u3078\u306e\u30d2\u30f3\u30c8\u306b\u306a\u308b\u3068\u611f\u3058\u3089\u308c\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">\u767a\u8868\u30bf\u30a4\u30c8\u30eb\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aSingle Frame Super Resolution: A Fuzzy Rule-Based Approach\u8457\u8005\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Professor Nikhil R. Pal<br \/>\n\u30bb\u30c3\u30b7\u30e7\u30f3\u540d\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Keynote Speech \u2161<br \/>\nAbstruct\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a \u9ad8\u753b\u8cea\u30ba\u30fc\u30e0\u306f\u91cd\u8981\u306a\u8ab2\u984c\u3067\u3042\u308b\uff0e\u9ad8\u5206\u89e3\u80fd(HR)\u753b\u50cf\u3092\u751f\u6210\u3059\u308b\u305f\u3081\u306e\u5165\u529b\u3068\u3057\u3066\uff0c\u7570\u306a\u308b\u30b5\u30d6\u30d4\u30af\u30bb\u30eb\u30b7\u30d5\u30c8\u3092\u6709\u3059\u308b\u540c\u30b7\u30fc\u30f3\u306e\u8907\u6570\u306e\u4f4e\u89e3\u50cf\u5ea6(LR)\u30d5\u30ec\u30fc\u30e0\u3092\u4f7f\u7528\u3059\u308b\u624b\u6cd5\u304c\u591a\u304f\u3042\u308b\uff0eHR\u753b\u50cf\u3092\u5f97\u308b\u305f\u3081\u306b\u4e00\u3064\u306eLR\u753b\u50cf\u3060\u3051\u3092\u7528\u3044\u308b\u5358\u4e00\u30d5\u30ec\u30fc\u30e0\u306e\u8d85\u89e3\u50cf(SR)\u6cd5\u304c\u4eca\u65e5\u4eba\u6c17\u3092\u96c6\u3081\u3066\u3044\u308b\uff0e\u672c\u8b1b\u6f14\u3067\u6211\u3005\u306f\uff0c\u65b0\u898f\u306e\u30d5\u30a1\u30b8\u30a3\u30eb\u30fc\u30eb\u30d9\u30fc\u30b9\u306e\u30b7\u30f3\u30b0\u30eb\u30d5\u30ec\u30fc\u30e0\u8d85\u89e3\u50cf\u65b9\u5f0f\u3092\u8b70\u8ad6\u3059\u308b\uff0e\u3053\u308c\u306f\uff0c\u305d\u308c\u305e\u308c\u306eLR\u30d1\u30c3\u30c1\u304cTakagi-Sugeno\u30bf\u30a4\u30d7\u306e\u30d5\u30a1\u30b8\u30a3\u30eb\u30fc\u30eb\u306b\u3088\u3063\u3066\u751f\u6210\u3055\u308c\u305fHR\u30d1\u30c3\u30c1\u3067\u7f6e\u63db\u3055\u308c\u308b\u30d1\u30c3\u30c1\u30d9\u30fc\u30b9\u306e\u624b\u6cd5\u3067\u3042\u308b\uff0e\u6211\u3005\u306f\u8a13\u7df4\u30c7\u30fc\u30bf\uff0c\u30d5\u30a1\u30b8\u30a3\u30eb\u30fc\u30eb\u306e\u521d\u671f\u4e16\u4ee3\u3068\u305d\u308c\u3089\u306e\u6d17\u7df4\uff0cSR\u753b\u50cf\u751f\u6210\u306e\u305f\u3081\u306e\u30eb\u30fc\u30eb\u306e\u4f7f\u3044\u65b9\u3092\u8b70\u8ad6\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff0e\u3053\u306e\u6587\u8108\u306b\u304a\u3044\u3066\uff0c\u6211\u3005\u306f\u307e\u305f\u540c\u3058\u554f\u984c\u306e\u305f\u3081\u306e\u30ac\u30a6\u30b9\u6df7\u5408\u56de\u5e30(GMR)\u30e2\u30c7\u30eb\u3092\u958b\u767a\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff0e5\u3064\u306e\u65e2\u5b58\u624b\u6cd5\u3068\u540c\u69d8\u306e\u54c1\u8cea\u57fa\u6e96\u89b3\u70b9\u306eGMR\u30e2\u30c7\u30eb\u3068\u306e\u30d1\u30d5\u30a9\u30fc\u30de\u30f3\u30b9\u306e\u6bd4\u8f03\u306f\uff0c\u30d5\u30a1\u30b8\u30a3\u30eb\u30fc\u30eb\u30d9\u30fc\u30b9\u30b7\u30b9\u30c6\u30e0\u306e\u512a\u308c\u305f\u6027\u80fd\u3092\u5b9f\u8a3c\u3059\u308b\uff0e<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u6fc3\u6de1\u753b\u50cf\u3092\u30d5\u30a1\u30b8\u30a3\u96c6\u5408\u3068\u8003\u3048\u308b\u753b\u50cf\u51e6\u7406\u624b\u6cd5\u3082\u4eca\u5f8c\u52c9\u5f37\u3059\u308b\u3079\u304d\u4e8b\u9805\u3067\u3042\u308b\u3068\u601d\u3044\u307e\u3057\u305f\uff0e\u307e\u305f\uff0c\u753b\u50cf\u306e\u88dc\u5b8c\u65b9\u6cd5\u3068\u3057\u3066\uff0cNearest Neighbor\u6cd5\u3084Bicubic\u6cd5\u306a\u3069\u306f\u7406\u89e3\u3057\u3066\u3044\u307e\u3057\u305f\u304c\uff0c\u305d\u308c\u3089\u3092\u4e0a\u56de\u308bSuper Resolution\u3068\u3044\u3046\u6280\u8853\u3092\u77e5\u308c\u305f\u306e\u304c\u53ce\u7a6b\u3067\u3057\u305f\uff0e<br \/>\n&nbsp;<br \/>\n&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">\u767a\u8868\u30bf\u30a4\u30c8\u30eb\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aResearch Topics in Evolutionary Many-Objective Optimization\u8457\u8005\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Yasumasa Tamura, Hiroyuki Iizuka and\u3000Masahito Yamamoto<br \/>\n\u30bb\u30c3\u30b7\u30e7\u30f3\u540d\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Professor Hisao Ishibuchi<br \/>\nAbstruct\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a \u672c\u8b1b\u6f14\u3067\u306f\uff0c\u9032\u5316\u7684\u591a\u76ee\u7684\u6700\u9069\u5316(EMO)\u306e\u7c21\u5358\u306a\u7d39\u4ecb\u3067\u59cb\u307e\u308b\uff0e\u826f\u304f\u77e5\u3089\u308c\u305f\u30d1\u30ec\u30fc\u30c8\u652f\u914d\u30d9\u30fc\u30b9\u306eEMO\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306e\u57fa\u672c\u7684\u306a\u67a0\u7d44\u307f\u306b\u3064\u3044\u3066\u3082\u8aac\u660e\u3059\u308b\uff0e\u6b21\u306b\uff0c\u306a\u305cEMO\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306b\u3068\u3063\u3066\u591a\u76ee\u7684\u6700\u9069\u5316\u554f\u984c\u304c\u96e3\u3057\u3044\u306e\u304b\u3092\u8ff0\u3079\u308b\uff0e\u3053\u308c\u306f\u6b21\u306e6\u3064\u306b\u5206\u985e\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\uff0e(\u2170)\u30d1\u30ec\u30fc\u30c8\u6700\u9069\u89e3\u306e\u63a2\u7d22\u306e\u96e3\u3057\u3055\uff0c(\u2171)\u5168\u4f53\u30d1\u30ec\u30fc\u30c8\u30d5\u30ed\u30f3\u30c8\u306e\u8fd1\u4f3c\u306e\u96e3\u3057\u3055\uff0c(\u2172)\u5f97\u3089\u308c\u305f\u89e3\u306e\u63d0\u793a\u306e\u96e3\u3057\u3055\uff0c(\u2173)\u6700\u7d42\u89e3\u306e\u9078\u629e\u306e\u96e3\u3057\u3055(\u2174)\u89e3\u30bb\u30c3\u30c8\u306e\u8a55\u4fa1\u306e\u96e3\u3057\u3055\uff0c(\u2175)\u63a2\u7d22\u52d5\u614b\u306e\u89b3\u6e2c\u306e\u96e3\u3057\u3055\u3067\u3042\u308b\uff0e\u3053\u308c\u3089\u306e\u56f0\u96e3\u306b\u5bfe\u51e6\u3059\u308b\u305f\u3081\u306b\u69d8\u3005\u306a\u30a2\u30a4\u30c7\u30a3\u30a2\u304c\u9032\u5316\u7684\u591a\u76ee\u7684\u6700\u9069\u5316\u306e\u5206\u91ce\u3067\u63d0\u6848\u3055\u308c\u3066\u3044\u308b\uff0e\u305d\u308c\u305e\u308c\u306e\u56f0\u96e3\u306b\u3064\u3044\u3066\u8aac\u660e\u3057\u305f\u5f8c\uff0c\u3044\u304f\u3064\u304b\u306e\u8a71\u984c\u3068\u306a\u308b\u7814\u7a76\u30c6\u30fc\u30de\u3092\u5c06\u6765\u306e\u65b9\u5411\u6027\u3068\u4e00\u7dd2\u306b\u8a73\u7d30\u306b\u793a\u3059\uff0e<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u3053\u306e\u767a\u8868\u3067\u7740\u76ee\u3057\u305f\u306e\u306f\u591a\u76ee\u7684\u6700\u9069\u5316\u306b\u304a\u3051\u308b\u63a2\u7d22\u7d50\u679c\u306e\u898b\u305b\u65b9\u3068\u30d1\u30ec\u30fc\u30c8\u89e3\u306e\u8a55\u4fa1\u65b9\u6cd5\u3067\u3042\u308b\uff0e3\u76ee\u7684\u3088\u308a\u591a\u3044\u76ee\u7684\u306b\u304a\u3051\u308b\u63a2\u7d22\u7d50\u679c\u306e\u8868\u793a\u65b9\u6cd5\u3084\u63a2\u7d22\u7d50\u679c\u306e\u4ee3\u8868\u70b9\u3092\u793a\u3059\u624b\u6cd5\uff0c\u63a2\u7d22\u3057\u305f\u30d1\u30ec\u30fc\u30c8\u30d5\u30ed\u30f3\u30c8\u3068\u6700\u9069\u30d5\u30ed\u30f3\u30c8\u3068\u306e\u985e\u4f3c\u5ea6\u306b\u3088\u308b\u8a55\u4fa1\u624b\u6cd5\u306a\u3069\uff0c\u6700\u65b0\u306e\u52d5\u5411\u3092\u77e5\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3057\u305f\uff0e\u307e\u305f\uff0c\u521d\u3081\u3066\u591a\u76ee\u7684\u6700\u9069\u5316\u3092\u805e\u304f\u4eba\u3067\u3082\u5206\u304b\u308a\u3084\u3059\u3044\u8b1b\u6f14\u3068\u306a\u3063\u3066\u304a\u308a\u767a\u8868\u306e\u4ed5\u65b9\u306e\u53c2\u8003\u306b\u3082\u306a\u308a\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<br \/>\n&nbsp;<br \/>\n\u53c2\u8003\u6587\u732e<\/p>\n<ul>\n<li>IES2014, http:\/\/www.ies-2014.org<\/li>\n<\/ul>\n<p><strong>\u5b66\u4f1a\u53c2\u52a0\u5831\u544a\u66f8<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"147\"><strong>\u00a0<\/strong><strong>\u5831\u544a\u8005\u6c0f\u540d<\/strong><\/td>\n<td width=\"373\">\u5c0f\u6df5\u5c06\u543e<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u767a\u8868\u8ad6\u6587\u30bf\u30a4\u30c8\u30eb<\/strong><\/td>\n<td width=\"373\">Working memory training strategies and their influence on changes in brain activity and white matter<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u767a\u8868\u8ad6\u6587\u82f1\u30bf\u30a4\u30c8\u30eb<\/strong><\/td>\n<td width=\"373\">Working memory training strategies and their influence on changes in brain activity and white matter<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u8457\u8005<\/strong><\/td>\n<td width=\"373\">Tomoyuki Hiroyasu, Shogo Obuchi, Misato Tanaka, Tastuya Okamura, Utako Yamamoto<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u4e3b\u50ac<\/strong><\/td>\n<td width=\"373\">The Memetic Computing Society and co-sponsoredby the SIMTECH-NTU Joint Lab, and the Computational Intelligence Research Laboratory at the School<br \/>\nof Computer Engineering, Nanyang Technological University, and the National University of<br \/>\nSingapore and Nanyang Technological University.<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u8b1b\u6f14\u4f1a\u540d<\/strong><\/td>\n<td width=\"373\">The 18<sup>th<\/sup> Asia Pacific Symposium on Intelligent and Evolutionary Systems<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u4f1a\u5834<\/strong><\/td>\n<td width=\"373\">Nanyang Executive Centre, NTU, Singapore<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u958b\u50ac\u65e5\u7a0b<\/strong><\/td>\n<td width=\"373\">2014\/11\/10-2014\/11\/12<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<br \/>\n&nbsp;<\/p>\n<ol>\n<li>\u8b1b\u6f14\u4f1a\u306e\u8a73\u7d30<\/li>\n<\/ol>\n<p>2014\/11\/10\u304b\u30892014\/11\/12\u306b\u304b\u3051\u3066\uff0cNanyang Executive Centre\u306b\u3066\u958b\u50ac\u3055\u308c\u307e\u3057\u305fThe 18<sup>th<\/sup> Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES2014) \u306b\u53c2\u52a0\u3044\u305f\u3057\u307e\u3057\u305f\uff0e\u3053\u306e\u5927\u4f1a\u306f\uff0cThe Memetic Computing Society\u3092\u306f\u3058\u3081\uff0c\u591a\u304f\u306e\u30b9\u30dd\u30f3\u30b5\u30fc\u306b\u3088\u3063\u3066\u4e3b\u50ac\u3055\u308c\uff0c\u4eba\u5de5\u77e5\u80fd\u3084\u9032\u5316\u8a08\u7b97\u3092\u4e2d\u5fc3\u3068\u3057\u305f\u5206\u91ce\u306e\u767a\u5c55\u3092\u76ee\u7684\u306b\u958b\u50ac\u3055\u308c\u307e\u3057\u305f\uff0e<br \/>\n\u79c1\u306f\u5168\u65e5\u53c2\u52a0\u3044\u305f\u3057\u307e\u3057\u305f\uff0e\u672c\u7814\u7a76\u5ba4\u304b\u3089\u306f\u4ed6\u306b\u5ee3\u5b89\u5148\u751f\uff0c\u897f\u6751\u3055\u3093\uff0c\u95a2\u8c37\u3055\u3093\u304c\u53c2\u52a0\u3057\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<ol start=\"2\">\n<li>\u7814\u7a76\u767a\u8868\n<ul>\n<li>\u767a\u8868\u6982\u8981<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>\u79c1\u306f11\u65e5\u306e\u5348\u5f8c\u306e\u30bb\u30c3\u30b7\u30e7\u30f3Complex Structure and System2\u306b\u53c2\u52a0\u3044\u305f\u3057\u307e\u3057\u305f\uff0e\u767a\u8868\u306e\u5f62\u5f0f\u306f\u53e3\u982d\u767a\u8868\u3067\uff0c15\u5206\u306e\u8b1b\u6f14\u6642\u9593\u30684\u5206\u306e\u8cea\u7591\u5fdc\u7b54\u6642\u9593\u3068\u306a\u3063\u3066\u304a\u308a\u307e\u3057\u305f\uff0e<br \/>\n\u4eca\u56de\u306e\u767a\u8868\u306f\uff0c\u201dWorking Memory Training Strategies and their Influence on Changes in Brain Activity and White Matter\u201d \u3068\u3044\u3046\u30bf\u30a4\u30c8\u30eb\u3067\u767a\u8868\u3044\u305f\u3057\u307e\u3057\u305f\uff0e\u4ee5\u4e0b\u306b\u6284\u9332\u3092\u8a18\u8f09\u81f4\u3057\u307e\u3059\uff0e<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">In this study, we investigated whether different working memory training tasks influence brain activity and white matter changes. Thirteen participants were involved in our interventional study over a period of one month. During pre- and post-training, brain activity and structural integrity were measured using functional magnetic resonance imaging and diffusion tensor imaging. The reading span task was used to measure working memory capacity in participants performing different strategies. Participants were classified into a training group (10 participants) and a control group (4 participants). The training group was further divided into the imagery strategy group and rehearsal strategy group. Only the imagery strategy group improved working memory capacity, showing significantly increased activation in the anterior cingulate cortex and fractional anisotropy adjacent to the right temporal gyrus. Consequently, adopting the appropriate strategy is important for improving working memory capacity as different strategies affect brain activity and white matter to different degrees.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<ul>\n<li>\u8cea\u7591\u5fdc\u7b54<\/li>\n<\/ul>\n<p>\u4eca\u56de\u306e\u8b1b\u6f14\u767a\u8868\u3067\u306f\uff0c\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u8cea\u7591\u3092\u53d7\u3051\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<br \/>\n<strong>\u30fb\u8cea\u554f\u5185\u5bb9<\/strong><strong>1<\/strong><br \/>\n\u8cea\u554f\u8005\u306e\u6c0f\u540d\u3092\u63a7\u3048\u640d\u306d\u3066\u3057\u307e\u3044\u307e\u3057\u305f\uff0e\u3053\u3061\u3089\u306e\u8cea\u554f\u306ffMRI\u306e\u8133\u306e\u8ce6\u6d3b\u90e8\u4f4d\u306e\u7d50\u679c\u306f\u5e74\u9f62\u306b\u3088\u308b\u5f71\u97ff\u3067\u306f\u306a\u3044\u306e\u304b\u3068\u3044\u3046\u8cea\u554f\u3067\u3057\u305f\uff0e\u3053\u306e\u8cea\u554f\u306b\u5bfe\u3059\u308b\u56de\u7b54\u3067\u3059\u304c\uff0c\u78ba\u304b\u306b\u8133\u306e\u6d3b\u52d5\u306f\u5e74\u9f62\u306b\u3088\u3063\u3066\u7570\u306a\u308b\u53ef\u80fd\u6027\u304c\u5148\u884c\u7814\u7a76\u3067\u793a\u3055\u308c\u3066\u3044\u307e\u3059\u304c\uff0c\u4eca\u56de\u306f\u88ab\u9a13\u8005\u306e\u5168\u3066\u304c\u5927\u5b66\u751f\u306b\u3088\u308b\u3082\u306e\u306a\u306e\u3067\uff0c\u5c11\u306a\u304f\u3068\u308220\u4ee3\u306e\u5065\u5e38\u8005\u306b\u304a\u3044\u3066\u306f\u3053\u306e\u7d50\u679c\u304c\u5f53\u3066\u306f\u307e\u308b\u3068\u56de\u7b54\u3057\u307e\u3057\u305f\uff0e<br \/>\n<strong>\u00a0<\/strong><br \/>\n<strong>\u30fb\u8cea\u554f\u5185\u5bb9<\/strong><strong>2<\/strong><br \/>\n\u8cea\u554f\u8005\u306e\u6c0f\u540d\u3092\u63a7\u3048\u640d\u306d\u3066\u3057\u307e\u3044\u307e\u3057\u305f\uff0e\u3053\u306e\u8cea\u554f\u306f\u306a\u305c\u884c\u52d5\u30c7\u30fc\u30bf\u306e\u7d50\u679c\u306epre\u6761\u4ef6\u3067\uff0c\u30b0\u30eb\u30fc\u30d7\u306b\u3088\u3063\u3066\u6b63\u7b54\u7387\u304c\u7570\u306a\u308b\u306e\u304b\u3068\u3044\u3046\u8cea\u554f\u3067\u3057\u305f\uff0e\u3053\u306e\u8cea\u554f\u306b\u5bfe\u3057\u3066\u306f\uff0c\u500b\u4eba\u306e\u5dee\u306b\u3088\u308b\u3082\u306e\u3067\u3042\u308b\u304c\uff0c\u30b0\u30eb\u30fc\u30d7\u3067\u6b63\u7b54\u7387\u3092\u63c3\u3048\u308b\u5fc5\u8981\u304c\u3042\u308a\uff0c\u4eca\u5f8c\u6c17\u3092\u4ed8\u3051\u305f\u3044\u3068\u56de\u7b54\u3057\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<br \/>\n<strong>\u30fb\u8cea\u554f\u5185\u5bb9<\/strong><strong>3<\/strong><br \/>\n\u8cea\u554f\u8005\u306e\u6c0f\u540d\u3092\u63a7\u3048\u640d\u306d\u3066\u3057\u307e\u3044\u307e\u3057\u305f\uff0e\u3053\u306e\u8cea\u554f\u306f\u7d50\u679c\u306f\u7d71\u8a08\u7684\u306b\u6709\u610f\u306a\u5dee\u304c\u3042\u3063\u305f\u3068\u793a\u3057\u3066\u3044\u308b\u304c\uff0c\u3069\u306e\u3088\u3046\u306a\u7d71\u8a08\u3092\u884c\u3063\u305f\u306e\u304b\u3068\u3044\u3046\u8cea\u554f\u3067\u3057\u305f\uff0e\u3053\u306e\u8cea\u554f\u306b\u5bfe\u3059\u308b\u56de\u7b54\u306f\uff0c\u7d71\u8a08\u7684\u306b\u6709\u610f\u3068\u3044\u3046\u5dee\u309210\u4eba\u4ee5\u4e0b\u306e\u88ab\u9a13\u8005\u3067\u8a00\u3046\u306e\u306f\u96e3\u3057\u3044\u304c\uff0cMRI\u89e3\u6790\u306b\u304a\u3044\u3066\u4e00\u822c\u7684\u306b\u7528\u3044\u3089\u308c\u3066\u3044\u308bSPM\u3068\u3044\u3046\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u7528\u3044\u3066\u3044\u308b\u305f\u3081\uff0c\u7d50\u679c\u3068\u3057\u3066\u306f\u6b63\u3057\u3044\u3082\u306e\u3067\u3042\u308b\u3068\u56de\u7b54\u3057\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<ul>\n<li>\u611f\u60f3<\/li>\n<\/ul>\n<p>\u82f1\u8a9e\u306e\u53e3\u982d\u767a\u8868\u304c2\u56de\u76ee\u3068\u3044\u3046\u3053\u3068\u3082\u3042\u308a\uff0c\u50b2\u308a\u304c\u3042\u3063\u305f\u3088\u3046\u306a\u6c17\u304c\u3057\u307e\u3059\uff0e\u767a\u8868\u3082\u5341\u5206\u7df4\u7fd2\u3067\u304d\u306a\u3044\u307e\u307e\u81e8\u307f\uff0c\u8cea\u7591\u5fdc\u7b54\u3082\u5148\u751f\u306e\u304a\u529b\u3092\u501f\u308a\u3066\u3057\u307e\u3044\u307e\u3057\u305f\uff0e\u4e00\u65b9\u3067\uff0c\u8133\u753b\u50cf\u89e3\u6790\u3068\u306f\u5168\u304f\u7121\u7e01\u306e\u65b9\u9054\u306b\u3069\u306e\u3088\u3046\u306b\u767a\u8868\u3092\u884c\u3048\u3070\u8208\u5473\u3092\u3082\u3063\u3066\u3082\u3089\u3048\u308b\u306e\u304b\u306b\u3064\u3044\u3066\u8003\u3048\u3055\u305b\u3089\u308c\u307e\u3057\u305f\uff0e\u7d50\u679c\uff0c\u8cea\u554f\u3092\u591a\u304f\u9802\u304d\u672c\u767a\u8868\u3092\u901a\u3058\u3066\u805e\u3044\u3066\u9802\u3044\u3066\u3044\u308b\u304b\u305f\u306b\u8133\u306b\u8208\u5473\u3092\u6301\u3063\u3066\u3082\u3089\u3046\u3068\u3044\u3046\u76ee\u6a19\u306f\u9054\u6210\u3067\u304d\u305f\u3068\u611f\u3058\u3066\u304a\u308a\u307e\u3059\uff0e<br \/>\n&nbsp;<\/p>\n<ol start=\"3\">\n<li>\u8074\u8b1b<\/li>\n<\/ol>\n<p>\u4eca\u56de\u306e\u8b1b\u6f14\u4f1a\u3067\u306f\uff0c\u4e0b\u8a18\u306e3\u4ef6\u306e\u767a\u8868\u3092\u8074\u8b1b\u3057\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">\u767a\u8868\u30bf\u30a4\u30c8\u30eb\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aReal-time Computational Red Teaming of Human Cognition using Encephalographic (EEG) Data\u8457\u8005\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aHussein A. Abbass<br \/>\n\u30bb\u30c3\u30b7\u30e7\u30f3\u540d\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aKeynote Speech 3<br \/>\nAbstruct \uff1aThe field of Artificial Intelligence (AI) has seen stages of stagnation followed by tipping points all over its history. Be it in natural language processing\/understanding, neural networks, fuzzy systems, or evolutionary computation, these tipping points marked real advances in AI. Today, AI is getting closer and closer to a new tipping point. However, it is a tipping point of a different kind; one with orders of magnitude more significance than any previous one. The age of the human brain project, the era of big data and models, the advances in computational science, the revolution in hardware and sensors and the success stories made by computational intelligence researchers are all converging to generate this tipping point. In this presentation, the audience will get to see some early signs of the next generation AI systems. Red teaming is the science and art of role-playing an opponent. In this talk, the first of its kind Computational Red Teaming (CRT) system that was able to autonomously red team against humans will be demonstrated. The system integrates Encephalographic (EEG) data (brain signals) with performance metrics and the operational environment to red team with humans. The talk will demonstrate that the next generation AI system, where the biological brain is seamlessly integrated with in-Silicon brain, is just at our doorsteps!<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u3053\u306e\u767a\u8868\u306fAI\u306e\u8133\u3078\u306e\u5fdc\u7528\u306e\u53ef\u80fd\u6027\u306b\u3064\u3044\u3066\u306e\u8b1b\u6f14\u3067\u3057\u305f\uff0e\u8b1b\u6f14\u5185\u5bb9\u3088\u308a\u3082\uff0c\u3044\u304b\u306b\u5206\u91ce\u5916\u306e\u4eba\u306b\u8133\u306e\u9762\u767d\u3055\u3092\u4f1d\u3048\u308b\u306e\u304b\u3068\u3044\u3046\u70b9\u3067\u52c9\u5f37\u306b\u306a\u3063\u305f\uff0e\u6642\u9593\u306e\u90fd\u5408\u4e0a\uff0c\u89e3\u6790\u624b\u6cd5\u3084\u7814\u7a76\u5185\u5bb9\u306b\u3064\u3044\u3066\u306f\u591a\u304f\u3092\u8074\u304f\u3053\u3068\u304c\u3067\u304d\u306a\u304b\u3063\u305f\u304c\uff0cComputational Red Teaming \u30b7\u30b9\u30c6\u30e0\u3068\u751f\u4f53\u60c5\u5831\u306e\u878d\u5408\u306b\u3064\u3044\u3066\u52c9\u5f37\u3057\u305f\u3044\u3068\u611f\u3058\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">\u767a\u8868\u30bf\u30a4\u30c8\u30eb\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aMulti-agent based Bus Route Optimization for Restricting Passenger Traffic Bottlenecks in Disaster Situations\u8457\u8005\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aSayaka Morimoto, Takahiro Jinba, Hiroto Kitagawa, Keiki Takadama, Takahiro Majima, DaisukeWatanabe and Mitsujiro Katsuhara5<br \/>\n\u30bb\u30c3\u30b7\u30e7\u30f3\u540d\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aComplex Structure and System2<br \/>\nAbstruct\u00a0 \uff1aThis paper focuses on the passenger traffic <em>bottlenecks <\/em>occurred in the bus route network in disaster situations and proposes the multi-agent based bus route optimization method to resolve such bottlenecks by generating the networks which can effectively transport many stranded persons including ones who wait around the station as the passenger traffic bottlenecks. For this purpose, the proposed method modifies the bus route networks generated as usual conditions to suitably pass many bus lines to and redistribute the buses among the bus lines according to the number of passengers. The intensive simulations have revealed the following implications: (1) the proposed bus route network optimization method generates the route network which is suitable for passenger traffic bottlenecks; (2) the proposed method decreases a risk of the bottle-necks; and (3) our method transports the passengers faster than those by the conventional one in various virtual disaster situations.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u3053\u306e\u767a\u8868\u306f\u707d\u5bb3\u6642\u306e\u30d0\u30b9\u306e\u30eb\u30fc\u30c8\u5909\u66f4\u3092\u6700\u9069\u5316\u306b\u3088\u3063\u3066\u89e3\u6c7a\u3059\u308b\u3068\u3044\u3046\u767a\u8868\u3067\u3057\u305f\uff0e\u30ce\u30fc\u30c9\u306b\u304a\u3051\u308bpassenger\u306e\u91cd\u307f\u3065\u3051\u3068\u30d0\u30b9\u306e\u5897\u4fbf\u306b\u4f34\u3046\u8def\u7dda\u5909\u66f4\u3092\u65b0\u305f\u306b\u884c\u3063\u3066\u3044\u305f\uff0e\u3082\u3063\u3068\u3082\u52b9\u7387\u306e\u3088\u3044\u30d0\u30b9\u30eb\u30fc\u30c8\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u5f62\u6210\u3059\u308b\u3068\u3044\u3046\u70b9\u306b\u304a\u3044\u3066\uff0c\u8133\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u9023\u60f3\u3055\u305b\u3089\u308c\u305f\uff0e\u3053\u306e\u3088\u3046\u306a\u5909\u5316\u304c\u8133\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u3082\u751f\u3058\u308b\u306e\u3060\u308d\u3046\u304b\u3068\u7591\u554f\u306b\u601d\u3063\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">\u767a\u8868\u30bf\u30a4\u30c8\u30eb\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aA Spiking Neural Network Model for Associative Memory using Temporal Codes\u8457\u8005\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aJun Hu, Huajin Tang, K. C. Tan, and Sen Bong Gee<br \/>\n\u30bb\u30c3\u30b7\u30e7\u30f3\u540d\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1aSubspace Learning and Neural Network 1<br \/>\nAbstruct \uff1a Associative memory is defined as the ability to map input patterns to output patterns. Understanding how human brain performs association between unrelated patterns and stores this knowledge is one of the most important goals in computational intelligence. Although this problem has been widely studied using conventional neural networks, increasing biological findings suggest that spiking neural network can be an alternative. The proposed model encodes different memories using different subsets of encoding neurons with temporal codes. A spike- timing based learning algorithm and spike-timing-dependent plasticity (STDP) are used to form associative memory. Simulation results show that hetero-associative memory and auto-associative memory are achievable by the synaptic modification of connections between input layer and hidden layers, and recurrent connections of hidden layers, respectively.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u3053\u306e\u767a\u8868\u306fAssociative memory\u306e\u305f\u3081\u306e\u6642\u9593\u7684\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u3092\u7528\u3044\u305f\u65b0\u3057\u3044\u30b9\u30d1\u30a4\u30ad\u30f3\u30b0\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30e2\u30c7\u30eb\u63d0\u6848\u3092\u884c\u3063\u3066\u3044\u307e\u3057\u305f\uff0e\u5f93\u6765\u306e\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3067\u306f\u306a\u304f\uff0c\u6642\u9593\u60c5\u5831\u3092\u4ed8\u52a0\u3059\u308b\u3053\u3068\u3067\uff0c\u3088\u308a\u8133\u306b\u8fd1\u3044\u51e6\u7406\u3092\u884c\u3046\u3088\u3046\u306a\u30e2\u30c7\u30eb\u306f\u3068\u3066\u3082\u8208\u5473\u6df1\u304b\u3063\u305f\uff0e\u3055\u3089\u306b\u7d50\u679c\u306b\u304a\u3044\u3066\uff0c\u91cd\u307f\u3065\u3051\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u3092\u7528\u3044\u3066\u691c\u8a0e\u3057\u3066\u3044\u305f\u305f\u3081\uff0c\u305d\u306e\u624b\u6cd5\u3092\u5229\u7528\u3057\u305f\u3044\u3068\u611f\u3058\u305f\uff0e<br \/>\n&nbsp;<br \/>\n\u53c2\u8003\u6587\u732e<\/p>\n<ul>\n<li>Handa, H. Ishibuchi, Y. Ong, and K. C. Tan, Proceedings of the 18<sup>th<\/sup> Asia Pacific Symposium on Intelligent and Evolutionary Systems, 2014<\/li>\n<\/ul>\n<p><strong>\u5b66\u4f1a\u53c2\u52a0\u5831\u544a\u66f8<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"147\"><strong>\u00a0<\/strong><br \/>\n<strong>\u5831\u544a\u8005\u6c0f\u540d<\/strong><\/td>\n<td width=\"373\">&nbsp;<br \/>\n\u897f\u6751\u7950\u4e8c<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u767a\u8868\u8ad6\u6587\u30bf\u30a4\u30c8\u30eb<\/strong><\/td>\n<td width=\"373\">\u81ea\u52d5\u7684\u306b\u753b\u50cf\u30bf\u30b0\u3078\u306e\u60c5\u5831\u4ed8\u52a0\u6a5f\u80fd\u3092\u6301\u3064\u533b\u7528\u753b\u50cf\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u767a\u8868\u8ad6\u6587\u82f1\u30bf\u30a4\u30c8\u30eb<\/strong><\/td>\n<td width=\"373\">Medical Image Management System with Automatic Image Feature Tag Adding Functions<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u8457\u8005<\/strong><\/td>\n<td width=\"373\">Tomoyuki Hiroyasu\uff0cYuji Nishimura\uff0cUtako Yamamoto<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u4e3b\u50ac<\/strong><\/td>\n<td width=\"373\">Memetic Computing Society<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u8b1b\u6f14\u4f1a\u540d<\/strong><\/td>\n<td width=\"373\">18th Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES2014)<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u4f1a\u5834<\/strong><\/td>\n<td width=\"373\">Nanyang Executive Centre<\/td>\n<\/tr>\n<tr>\n<td width=\"147\"><strong>\u958b\u50ac\u65e5\u7a0b<\/strong><\/td>\n<td width=\"373\">2014\/11\/10-2014\/11\/12<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<br \/>\n&nbsp;<\/p>\n<ol>\n<li>\u8b1b\u6f14\u4f1a\u306e\u8a73\u7d30<\/li>\n<\/ol>\n<p>2014\/11\/10\u304b\u30892014\/11\/12\u306b\u304b\u3051\u3066\uff0c\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u306b\u3042\u308bNanyang Executive Centre\u306b\u3066\u958b\u50ac\u3055\u308c\u307e\u3057\u305fIES2014(http:\/\/www.ies-2014.org\/)\u306b\u53c2\u52a0\u3044\u305f\u3057\u307e\u3057\u305f\uff0e<br \/>\n\u3053\u306e\u5b66\u4f1a\u306f\u30a2\u30b8\u30a2\u74b0\u592a\u5e73\u6d0b\u306e\u56fd\u304b\u3089\u7814\u7a76\u8005\u3092\u3042\u3064\u3081\uff0c\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30b7\u30b9\u30c6\u30e0\u3084\u9032\u5316\u8a08\u7b97\u306b\u95a2\u3059\u308b\u6700\u8fd1\u306e\u7d50\u679c\u3084\u610f\u898b\u3092\u4ea4\u63db\u3059\u308b\u3053\u3068\uff0c\u5171\u540c\u7814\u7a76\u304c\u53ef\u80fd\u304b\u8b70\u8ad6\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u3066\u3044\u307e\u3059\uff0e<br \/>\n\u79c1\u306f10,11\u65e5\u306b\u516c\u8074\u3057\uff0c12\u65e5\u767a\u8868\u3044\u305f\u3057\u307e\u3057\u305f\uff0e\u672c\u7814\u7a76\u5ba4\u304b\u3089\u306f\u4ed6\u306b\u5ee3\u5b89\u5148\u751f\uff0c\u95a2\u8c37\uff0c\u5c0f\u6df5\uff0c\u304c\u53c2\u52a0\u3057\u307e\u3057\u305f\uff0e<\/p>\n<ol start=\"2\">\n<li>\u7814\u7a76\u767a\u8868\n<ul>\n<li>\u767a\u8868\u6982\u8981<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>\u79c1\u306f12\u65e5\u306e\u5348\u524d\u306e\u30bb\u30c3\u30b7\u30e7\u30f3\u300cIntelligent Systems\u300d\u306b\u53c2\u52a0\u3044\u305f\u3057\u307e\u3057\u305f\uff0e\u767a\u8868\u306e\u5f62\u5f0f\u306f15\u5206\u306e\u82f1\u8a9e\u306b\u3088\u308b\u53e3\u982d\u767a\u8868\u3068\u306a\u3063\u3066\u304a\u308a\u307e\u3057\u305f\uff0e<br \/>\n\u4ee5\u4e0b\u306b\u6284\u9332\u3092\u8a18\u8f09\u81f4\u3057\u307e\u3059\uff0e<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">In this paper, the new medical image management system is proposed.<br \/>\nIn this system, the system saves image data at any time and extracts feature quantity of each image automatically.<br \/>\nAt the same time, the information on feature quantity is stored in the metadata of the image.<br \/>\nSince image processing is performed automatically, the users do not have burdens for adding feature information.<br \/>\nTo examine the validity of the proposed system, jpeg pictures which have Exchangeable image file format (Exif) data are stored and the image features are extracted.<br \/>\nIn the evaluation experiment, the experiment of system of operation is conducted and it is checked whether the system operates normally. At the same time, required time to extract features and write to the metadata is measure and evaluated.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<ul>\n<li>\u8cea\u7591\u5fdc\u7b54<\/li>\n<\/ul>\n<p>\u4eca\u56de\u306e\u8b1b\u6f14\u767a\u8868\u3067\u306f\uff0c\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u8cea\u7591\u3092\u53d7\u3051\u307e\u3057\u305f\uff0e<br \/>\n<strong>\u30fb\u8cea\u554f\u5185\u5bb9<\/strong><strong>1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><br \/>\n\u62d3\u6b96\u5927\u5b66\u306e\u6c34\u91ce\u4e00\u5fb3\u6559\u6388\u304b\u3089\u306e\u8cea\u554f\u3067\u3059\uff0e\u3053\u3061\u3089\u306e\u8cea\u554f\u306f\u3069\u306e\u3050\u3089\u3044\u306e\u7cbe\u5ea6\u306e\u8a3a\u65ad\u304c\u3067\u304d\u308b\u306e\u304b\uff1f\u3068\u3044\u3046\u3082\u306e\u3067\u3057\u305f\uff0e\u3053\u306e\u8cea\u554f\u306b\u5bfe\u3057\u3066\u79c1\u304c\u56de\u7b54\u3057\u305f\u304b\u3063\u305f\u3053\u3068\u306f\uff0c\u300c\u5b9f\u969b\u306e\u75c5\u6c17\u304c\u3042\u308b\u753b\u50cf\u3092\u5f97\u308b\u3053\u3068\u304c\u96e3\u3057\u304f\uff0c\u30b7\u30b9\u30c6\u30e0\u306b\u9069\u7528\u3057\u3066\u7cbe\u5ea6\u3092\u691c\u8a3c\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u3066\u3044\u306a\u3044\uff0e\u4eca\u5f8c\uff0c\u8272\u3005\u691c\u8a0e\u3057\u306a\u3044\u3068\u3044\u3051\u306a\u3044.\u300d\u3068\u8fd4\u7b54\u3057\u305f\u304b\u3063\u305f\u306e\u3067\u3059\u304c\uff0c\u82f1\u8a9e\u529b\u304c\u8db3\u308a\u305a\uff0c\u5ee3\u5b89\u5148\u751f\u8fd4\u7b54\u3057\u3066\u3044\u305f\u3060\u304d\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<br \/>\n<strong>\u30fb\u8cea\u554f\u5185\u5bb9<\/strong><strong>2<\/strong><br \/>\n2\u3064\u76ee\u306e\u8cea\u554f\u3082\u62d3\u6b96\u5927\u5b66\u306e\u6c34\u91ce\u4e00\u5fb3\u6559\u6388\u304b\u3089\u3044\u305f\u3060\u304d\u307e\u3057\u305f\uff0e\u3053\u3061\u3089\u306e\u8cea\u554f\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff0c\u30b3\u30b9\u30c8\uff0c\u30e1\u30f3\u30c6\u30ca\u30f3\u30b9\u306a\u3069\uff0c\u904b\u7528\u9762\u3067\u306e\u8ab2\u984c\u306f\uff1f \u3068\u3044\u3046\u3082\u306e\u3067\u3057\u305f\uff0e\u3053\u306e\u8cea\u554f\u306b\u5bfe\u3057\u3066\u79c1\u304c\u56de\u7b54\u3057\u305f\u304b\u3063\u305f\u3053\u3068\u306f\u300c web\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306a\u306e\u3067\uff0c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306a\u3069\u306e\u554f\u984c\u304c\u3042\u308b\u304cVPN\u3068\u3044\u3046\u6697\u53f7\u5316\u3057\u305f\u63a5\u7d9a\u65b9\u6cd5\u3092\u8003\u3048\u3066\u3044\u308b\uff0e\u30b5\u30fc\u30d0\u306a\u3069\u306e\u30b3\u30b9\u30c8\u3084\u30e1\u30f3\u30c6\u30ca\u30f3\u30b9\u306a\u3069\u306fweb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u305f\u3081\u30e6\u30fc\u30b6\u306e\u8ca0\u62c5\u306f\u307b\u3068\u3093\u3069\u306a\u3044\u300d\u3068\u8fd4\u7b54\u3057\u305f\u304b\u3063\u305f\u306e\u3067\u3059\u304c\uff0c\u82f1\u8a9e\u529b\u304c\u8db3\u308a\u305a\uff0c\u5ee3\u5b89\u5148\u751f\u8fd4\u7b54\u3057\u3066\u3044\u305f\u3060\u304d\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<ul>\n<li>\u611f\u60f3<\/li>\n<\/ul>\n<p>\u307b\u3068\u3093\u3069\u306e\u4eba\u304c\u4ed6\u5206\u91ce\u306e\u7814\u7a76\u3092\u306a\u3055\u308c\u3066\u3044\u308b\u4eba\u3070\u304b\u308a\u3067\uff0c\u3068\u3066\u3082\u52c9\u5f37\u306b\u306a\u308b\u5b66\u4f1a\u3067\u3042\u3063\u305f\uff0e\u307e\u305f\uff0c\u901a\u5e38\u77e5\u308a\u5408\u3046\u3053\u3068\u306e\u3067\u304d\u306a\u3044\u4ed6\u5927\u5b66\u306e\u4eba\u3084\u5916\u56fd\u306e\u4eba\u3068\u5408\u3046\u3053\u3068\u304c\u3067\u304d\u305f\uff0e\u305f\u3060\uff0c\u82f1\u8a9e\u529b\u4e0d\u8db3\u3067\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u304c\u3042\u307e\u308a\u3068\u308c\u305a\uff0c\u3082\u3069\u304b\u3057\u304b\u3063\u305f\uff0e\u82f1\u8a9e\u304c\u8a71\u305b\u305f\u3089\u3082\u3063\u3068\u697d\u3057\u304f\u904e\u3054\u305b\u305f\u3068\u601d\u3046\uff0e\u767a\u8868\u306b\u95a2\u3057\u3066\u3082\u82f1\u8a9e\u304c\u308f\u304b\u3089\u305a\u81ea\u5206\u3067\u8cea\u554f\u306b\u7b54\u3048\u308b\u3053\u3068\u304c\u3067\u304d\u305a\u6094\u3057\u3044\u601d\u3044\u3092\u3057\u305f\uff0e\u3053\u308c\u3092\u30d0\u30cd\u306b\u82f1\u8a9e\u3092\u3082\u3063\u3068\u52c9\u5f37\u3057\uff0c\u5916\u56fd\u306e\u4eba\u3068\u3067\u3082\u81ea\u7136\u306b\u610f\u601d\u758e\u901a\u304c\u3067\u304d\u308b\u3088\u3046\u306b\u9811\u5f35\u3063\u3066\u3044\u304d\u305f\u3044\uff0e<\/p>\n<ol start=\"3\">\n<li>\u8074\u8b1b<\/li>\n<\/ol>\n<p>\u4eca\u56de\u306e\u8b1b\u6f14\u4f1a\u3067\u306f\uff0c\u4e0b\u8a18\u306e3\u4ef6\u306e\u767a\u8868\u3092\u8074\u8b1b\u3057\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<br \/>\n&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">\u767a\u8868\u30bf\u30a4\u30c8\u30eb\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a\u3000C2: Adaptive Load Balancing for Metadata Server Cluster in Cloud-Scale Storage Systems<br \/>\n\u8457\u8005\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Quanqing Xu, Rajesh Vellore Arumugam, Khai Leong Yong, Yonggang Wen, and Yew-Soon Ong<br \/>\n\u30bb\u30c3\u30b7\u30e7\u30f3\u540d\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Intelligent Systems<br \/>\nAbstruct\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Big data is an emerging term in the storage industry, and it is data analytics on big storage, i.e., Cloud-scale storage. In Cloud-scale storage systems, load balancing in request workloads across a metadata server cluster is critical for avoiding performance bottlenecks and improving quality of services. Many good approaches have been proposed for load balancing in distributed storage systems. Some of them pay attention to global namespace balancing, making metadata distribution across metadata servers as uniform as possible. However, they do not work well in skew request distributions, which impair load balancing but simultaneously increase the effectiveness of caching and replication. In this paper, we propose Cloud Cache (C2), an adaptive load balancing scheme for metadata server cluster in Cloud-scale storage systems. It combines adaptive cache diffu- sion and replication scheme to cope with the request load balancing problem, and it can be integrated into existing distributed metadata management approaches to efficiently improve their load balancing performance. By conducting a performance evaluation in trace-driven simulations, experimental results demonstrate the efficiency and scalability of C2.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u3053\u306e\u767a\u8868\u306f\u81a8\u5927\u306a\u30c7\u30fc\u30bf\u3092\u4fdd\u5b58\u3059\u308b\u305f\u3081\u306e\u30b7\u30b9\u30c6\u30e0\u3092\u69cb\u7bc9\u3059\u308b\u7814\u7a76\u3067\u3057\u305f\uff0e\u3053\u306e\u767a\u8868\u3067\u306f\u30b9\u30c8\u30ec\u30fc\u30b8\u30b5\u30fc\u30d0\u3092\u5206\u6563\u3057\uff0c\u3069\u3053\u306b\u4f55\u304c\u4fdd\u5b58\u3055\u308c\u3066\u3044\u308b\u306e\u304b\u3092\u7ba1\u7406\u3059\u308b\u30e1\u30bf\u30c7\u30fc\u30bf\u30b5\u30fc\u30d0\u306e\u30ed\u30fc\u30c9\u30d0\u30e9\u30f3\u30b7\u30f3\u30b0\u306b\u3064\u3044\u3066\u306e\u767a\u8868\u3067\u3057\u305f\uff0e\u5352\u696d\u3055\u308c\u305f\u5357\u8c37\u3055\u3093\uff0c\u85e4\u4e95\u3055\u3093\u306e\u7814\u7a76\u3092\u5f77\u5f7f\u3068\u3055\u305b\u308b\u7814\u7a76\u3067\u3068\u3066\u3082\u8208\u5473\u6df1\u304b\u3063\u305f\u3067\u3059\uff0e\u307e\u305f\uff0cceph\u3068\u3044\u3046\u81ea\u5206\u304c\u77e5\u3089\u306a\u3044\u30b5\u30fc\u30d0\u3092\u4f7f\u3063\u3066\u3044\u308b\u3068\u3044\u3046\u3053\u3068\u3067\uff0c\u3068\u3066\u3082\u52c9\u5f37\u306b\u306a\u308a\u307e\u3057\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"529\">\u767a\u8868\u30bf\u30a4\u30c8\u30eb\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Data Analytics for Engineering Big Data Application<br \/>\n\u8457\u8005\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a Dr. Partha Dutta, Rolls-Royce Singapore Pte Ltd, SG<br \/>\n\u30bb\u30c3\u30b7\u30e7\u30f3\u540d\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a IES Plenary<br \/>\nAbstruct\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \uff1a While not as mainstream as the Internet and Social Media, engineering and manufacturing applications are some of the most significant contributors of Big Data. With phenomenal advancements in computing, digitization of industrial processes and sensor based monitoring, modern industries generate large volumes of data that help to generate business-critical insights about products, processes and markets to make high value added decisions. In this presentation, examples of such Big Data applications will be shared along with how advancements made in Data Analytics technology are enabling the effective analysis of engineering Big Data.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u3053\u306e\u767a\u8868\u3067\u306f\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u89e3\u6790\u306b\u3064\u3044\u3066\u767a\u8868\u304c\u884c\u308f\u308c\u308b\u3068\u671f\u5f85\u3057\u3066\u3044\u305f\u306e\u3067\u3059\u304c\uff0c\u89e3\u6790\u624b\u6cd5\u306b\u3064\u3044\u3066\u306e\u767a\u8868\u3067\u306f\u306a\u304f\uff0c\u767a\u8868\u8005\u304c\u53c2\u52a0\u3057\u3066\u3044\u308b\u30b8\u30a7\u30c3\u30c8\u30a8\u30f3\u30b8\u30f3\u306e\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306b\u95a2\u3059\u308b\u767a\u8868\u304c\u307b\u3068\u3093\u3069\u3067\u3057\u305f\uff0e\u3053\u306e\u30d7\u30ed\u30b8\u30a7\u30af\u3067\u306f\uff0c\u3069\u3093\u306a\u30c7\u30fc\u30bf\u3092\u53d6\u5f97\u3067\u304d\u308b\u306e\u304b\uff0c\u305d\u306e\u305f\u3081\u306b\u3069\u3046\u3057\u3066\u6765\u305f\u306a\u3069\uff0c\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306e\u8ecc\u8de1\u306e\u3088\u3046\u306a\u767a\u8868\u3067\u3057\u305f\uff0e\u500b\u4eba\u7684\u306b\u306f\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u89e3\u6790\u306b\u3064\u3044\u3066\u3082\u3063\u3068\u8a71\u3057\u304c\u8074\u304d\u305f\u304b\u3063\u305f\u306e\u3067\u6b8b\u5ff5\u3067\u3057\u305f\uff0e<br \/>\n&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"581\">\u767a\u8868\u30bf\u30a4\u30c8\u30eb\uff1a Real-time Computational Red Teaming of Human Cognition using Encephalographic (EEG) Data<br \/>\n\u8457\u8005\uff1a Professor Hussein A. Abbass<br \/>\n\u30bb\u30c3\u30b7\u30e7\u30f3\u540d\uff1a IES Keynote \u2162<br \/>\nAbstruct\uff1a The field of Artificial Intelligence (AI) has seen stages of stagnation followed by tipping points all over its history.<br \/>\nBe it in natural language processing\/understanding, neural networks, fuzzy systems, or evolutionary computation, these tipping points marked real advances in AI. Today, AI is getting closer and closer to a new tipping point. However, it is a tipping point of a different kind; one with orders of magnitude more significance than any previous one. The age of the human brain project, the era of big data and models, the advances in computational science, the revolution in hardware and sensors and the success stories made by computational intelligence researchers are all converging to generate this tipping point.<br \/>\nIn this presentation, the audience will get to see some early signs of the next generation AI systems. Red teaming is the science and art of role-playing an opponent. In this talk, the first of its kind Computational Red Teaming (CRT) system that was able to autonomously red team against humans will be demonstrated. The system integrates Encephalographic (EEG) data (brain signals) with performance metrics and the operational environment to red team with humans. The talk will demonstrate that the next generation AI system, where the biological brain is seamlessly integrated with in-Silico brain, is just at our doorsteps!<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u3053\u306e\u767a\u8868\u3067\u306f\u8133\u6ce2\u30c7\u30fc\u30bf\u3092\u7528\u3044\u3066\u4eba\u9593\u306e\u8a8d\u77e5\u306e\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u8a08\u7b97\u3092\u884c\u3046\u7814\u7a76\u3067\u3057\u305f\uff0e\u30a4\u30f3\u30c8\u30ed\u90e8\u5206\u306f\u8133\u306e\u3053\u3068\u304c\u308f\u304b\u3089\u306a\u3044\u4eba\u3067\u3082\u308f\u304b\u308a\u3084\u3059\u3044\u3088\u3046\u306b\uff0c\u8aac\u660e\u3057\u3066\u304a\u308a\uff0c\u3068\u3066\u3082\u53c2\u8003\u306b\u306a\u308b\u767a\u8868\u3067\u3057\u305f\uff0e\u307e\u305f\uff0c\u81ea\u7136\u8a00\u8a9e\u51e6\u7406\u3084\u30cb\u30e5\u30fc\u30e9\u30eb\u30fb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\uff0c\u30d5\u30a1\u30b8\u30a3\u30b7\u30b9\u30c6\u30e0\u306a\u3069\u3044\u307e\u6ce8\u76ee\u3055\u308c\u3066\u3044\u308b\u5206\u91ce\u306e\u5185\u5bb9\u3082\u76db\u308a\u8fbc\u3093\u3067\u304a\u308a\uff0c\u3068\u3066\u3082\u308f\u304f\u308f\u304f\u3059\u308b\u3088\u3046\u306a\u767a\u8868\u3067\u3057\u305f\uff0e\u7814\u7a76\u5ba4\u3067\u3082EEG\u3092\u4f7f\u3063\u305f\u7814\u7a76\u3092\u884c\u3063\u3066\u3044\u308b\u306e\u3067\uff0c\u305d\u306e\u30e1\u30f3\u30d0\u30fc\u306b\u3069\u3093\u306a\u767a\u8868\u3060\u3063\u305f\u304b\u4f1d\u3048\u305f\u3044\u3068\u601d\u3044\u307e\u3059\uff0e<br \/>\n&nbsp;<br \/>\n\u53c2\u8003\u6587\u732e<\/p>\n<ul>\n<li>IES2014, http:\/\/www.ies-2014.org\/<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u3067\u958b\u50ac\u3055\u308c\u3066\u3044\u308b\u300018th Asia Pacific\u3000Symposium on Intelligent and Evolutionary Systems (IES 2014)\u3000\u306b\u53c2\u52a0\u3057\u3066\u3044\u307e\u3059\u3002 \u53c2\u52a0\u3057\u3066\u3044\u308b &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/is.doshisha.ac.jp\/news\/?p=2541\" class=\"more-link\"><span class=\"screen-reader-text\">&#8220;\u3010\u901f\u5831\u3011\u3000IES 2014&#8221; \u306e<\/span>\u7d9a\u304d\u3092\u8aad\u3080<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-2541","post","type-post","status-publish","format-standard","hentry","category-6"],"_links":{"self":[{"href":"https:\/\/is.doshisha.ac.jp\/news\/index.php?rest_route=\/wp\/v2\/posts\/2541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/is.doshisha.ac.jp\/news\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/is.doshisha.ac.jp\/news\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/is.doshisha.ac.jp\/news\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/is.doshisha.ac.jp\/news\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2541"}],"version-history":[{"count":0,"href":"https:\/\/is.doshisha.ac.jp\/news\/index.php?rest_route=\/wp\/v2\/posts\/2541\/revisions"}],"wp:attachment":[{"href":"https:\/\/is.doshisha.ac.jp\/news\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/is.doshisha.ac.jp\/news\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/is.doshisha.ac.jp\/news\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}