JSAI Technical Report, Type 2 SIG
Online ISSN : 2436-5556
Volume 2023, Issue KSN-033
The 33rd SIG-KSN
Displaying 1-8 of 8 articles from this issue
  • Takashi TAKASHIMA
    Article type: SIG paper
    2023 Volume 2023 Issue KSN-033 Pages 01-
    Published: September 15, 2023
    Released on J-STAGE: September 15, 2023
    RESEARCH REPORT / TECHNICAL REPORT FREE ACCESS
    Download PDF (682K)
  • Yuki YATO, Keita MAEGAWA, Ryosuke KAI, Shuichiro YAMAMOTO
    Article type: SIG paper
    2023 Volume 2023 Issue KSN-033 Pages 02-
    Published: September 15, 2023
    Released on J-STAGE: September 15, 2023
    RESEARCH REPORT / TECHNICAL REPORT FREE ACCESS

    The automotive industry needs to develop cyber security measures. For this reason, the Japan Automobile Manufacturers Association and the Japan Auto Parts Industries Association have formulated the cyber security guideline. This guideline covers the enterprise field, which is based on the entire company, and clarifies the items that should be prioritized by the entire automobile industry, the items that should be standardized according to the information handled, and the items that should be aimed as the final goal.In this paper, we propose a method of expressing cyber security guidelines using ArchiMate, a modeling language for enterprise architecture. In addition, the effectiveness of the proposed method is clarified by exemplifying the description of the cyber security guideline using this method. Furthermore, future issues are described.

    Download PDF (555K)
  • Hironori TAKEUCHI, Katsuya OGAWA, Shunsuke EGASHIRA, Shinpei OGATA, Sh ...
    Article type: SIG paper
    2023 Volume 2023 Issue KSN-033 Pages 03-
    Published: September 15, 2023
    Released on J-STAGE: September 15, 2023
    RESEARCH REPORT / TECHNICAL REPORT FREE ACCESS

    The rapid evolution of generative AI using large language model such as ChatGPT, has led to its application in a variety of business domains.On the other hand, due to the characteristics of generative AI, there are some application areas where its use should be restricted.Therefore, various guidelines have been proposed for the business application of generative AI.In this study, we propose a knowledge acquisition model using enterprise architecture, and a method to analyze the business application of generative AI through the model. We will confirm the effectiveness of the method by analyzing some example cases.

    Download PDF (641K)
  • Shinnosuke FUWA, Nobuhide KOBAYASHI
    Article type: SIG paper
    2023 Volume 2023 Issue KSN-033 Pages 04-
    Published: September 15, 2023
    Released on J-STAGE: September 15, 2023
    RESEARCH REPORT / TECHNICAL REPORT FREE ACCESS

    In order to promote digital transformation in the software development industry, it is necessary to analyze development documents from the view of automating a development process, and to digitize descriptions at an appropriate granularity.Additionally, in order to maximize the effect of digitization, it is necessary to get many engineers in software development fields to use DX promotion tools.This paper proposes a process for efficiently building DX promotion tools that can digitalize descriptions of development documents with views equivalent to conventional development documents.

    Download PDF (604K)
  • Kenshin KAWADE, Shuichiro YAMAMOTO
    Article type: SIG paper
    2023 Volume 2023 Issue KSN-033 Pages 05-
    Published: September 15, 2023
    Released on J-STAGE: September 15, 2023
    RESEARCH REPORT / TECHNICAL REPORT FREE ACCESS

    In the automotive industry, advancements in cybersecurity measures have become essential. Consequently, the Japan Automobile Manufacturers Association and the Japan Auto Parts Industries Association have formulated cybersecurity guidelines. These guidelines specify items the entire automotive industry should prioritize based on the enterprise-wide perspective, standard objectives based on the information being handled, and ultimate goals to be achieved.In this paper, we propose a method to analyze the approach aimed at by the cybersecurity guidelines from a systems thinking perspective. Systems thinking allows for a systematic analysis of who conducts the activities of a system, for what purpose, and by what means. Through an illustrative analysis of the cybersecurity guidelines using this method, we will demonstrate its efficacy. Furthermore, we will discuss future prospects.

    Download PDF (824K)
  • Yoshitaka KUWATA, Toru ISHIZAKA, Yoshinobu MASATANI, Shigetoshi YOKOYA ...
    Article type: SIG paper
    2023 Volume 2023 Issue KSN-033 Pages 06-
    Published: September 15, 2023
    Released on J-STAGE: September 15, 2023
    RESEARCH REPORT / TECHNICAL REPORT FREE ACCESS
  • Masaru KITANO, Shuichiro YAMAMOTO
    Article type: SIG paper
    2023 Volume 2023 Issue KSN-033 Pages 07-
    Published: September 15, 2023
    Released on J-STAGE: September 15, 2023
    RESEARCH REPORT / TECHNICAL REPORT FREE ACCESS

    Add flavor elements to the previously proposed game elements. Define and propose characters and objects that appear in the game as layers.

    Download PDF (433K)
  • Shuichiro YAMAMOTO, Hideo FUJIMOTO
    Article type: SIG paper
    2023 Volume 2023 Issue KSN-033 Pages 08-
    Published: September 15, 2023
    Released on J-STAGE: September 15, 2023
    RESEARCH REPORT / TECHNICAL REPORT FREE ACCESS

    In the design of production processes in the manufacturing industry, it is necessary to transfer the defect investigation knowledge, which is the empirical knowledge of experienced workers, to beginners. Leonard and Swap pointed out the importance of acquiring empirical knowledge through experimental learning. However, they have not clarified the explicit empirical knowledge representation method and the experimental learning method. If the experimental learning process cannot be clarified, the knowledge transfer from experts to beginners is difficult.In this paper, we propose a double loop experimental knowledge transfer (DLEKT) method consists of trial experience of novices and advises of experts for investigating defects in the production process. In addition, we clarify the effectiveness of the proposed method by describing a sample learning process with DLEKT. In addition, we will discuss future research.

    Download PDF (520K)
feedback
Top