-
[in Japanese]
2019 Volume 36 Issue 1 Pages
1
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
-
Michiko OBA, Kei ITOU, Norihiro YOSHIDA, Hiroshi IGAKI, Takao OKUBO, F ...
2019 Volume 36 Issue 1 Pages
2
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
-
Hisashi ICHIKAWA, Yusuke GOTO, Koichi MATSUDA, Jun HAKURA
2019 Volume 36 Issue 1 Pages
3-13
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
In this paper, we describe the results of our PBL practice for undergraduate students. Our PBL course is characterized by three grades of students proceeding with the project together and students taking it repeatedly for three years. As a result of the evaluation, by repeatedly taking courses, the gradual growth of the students was confirmed. It became clear that students gradually played a core role from peripheral participation. Furthermore, a favorable acceptance by students about the mixed grade was revealed, and many advantages such as being able to touch various values, and promoting exchange among grade were revealed. Meanwhile, the problem unique to mixed grade, such as the complexity of the role of the second grade, became clear.
View full abstract
-
Hiroyuki CHISHIRO, Yoshihide CHUBACHI
2019 Volume 36 Issue 1 Pages
14-23
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
Project Based Learning (PBL) is a teaching and learning method in which students actively solve real-world problems and gain knowledge and skills. The teaching experiences, materials, and methods for PBL have diversity and are not shared with universities. The Faculty Development – Working Group (FD-WG) performs to share them with universities but the sharing method does not mainly use active learning. We present the Faculty Development (FD) camp for PBL, in order to share them with active learning for reducing education costs. The FD camp provides the place of discussing the PBL to the participants, in order to solve problems of PBL. We hold four FD camps with Open Space Technology (OST), which was a simple way to run productive meetings. Evaluations in questionnaires showed that almost all participants had good impressions in the FD camp with OST. We learned five lessons from four FD camps.
View full abstract
-
Nobuyuki TACHI, Mizue KAYAMA
2019 Volume 36 Issue 1 Pages
24-29
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
“Practice power”. It is a word that we often see at the educational site of information technology. In the software development field, what kind of power is this “practical power” specifically? What do the new employee do, can we say that he is active? In this research, we aim to investigate the practical ability in the field of software development technology, to guide hypotheses from the results obtained, to propose a method to learn practical skills efficiently by experimenting trial materials in practice. We are conducting an interview with people who are active in society and demonstrating their practical skills and the practical skills that are currently required in the field of development are not generic said generic skills, We are gaining overwhelming opinion that it is a technical force to solve the problem. In this paper, we report the results of the survey and future prospects.
View full abstract
-
Kengo IOKIBE, Yoshinori UETAKE, Toshiaki TESHIMA, Akihiro SANADA, Yasu ...
2019 Volume 36 Issue 1 Pages
30-36
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
The authors developed a practicum in the cryptographic technology, an indispensable technology to guarantee information security in the upcoming IoT era. The practicum is composed of a lecture in a part of algebra and discrete mathematics that founds modern cryptography, hardware implementation of cryptographic algorithms, and the side-channel attack on cryptographic hardware. It aimed not only that students learned textbook knowledge of cryptographic algorithms but also they developed their knowledge of implementing cryptographic algorithms considering the threat of the side-channel attack through their experience implementing the algorithms on a commercial hardware and attacking them. The practicum was offered to the third- and fourth-year students, and most of them achieved the required goal of the practicum. They also realized improving their practical skills in the cryptographic technology according to their responses to the questionnaire.
View full abstract
-
Fuyuki ISHIKAWA, Tomoharu UGAWA, Seiji UMATANI, Tsuneyasu KOMIYA, Shin ...
2019 Volume 36 Issue 1 Pages
37
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
-
Kyohei UEMURA, Keitaro NAKASAI, Katuya OGAMI, Hideaki HATA, Tomohiro I ...
2019 Volume 36 Issue 1 Pages
38-47
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
Software analytics aims at helping practitioners make decision making based on evidence from various software development data by analyzing and visualizing various software development data, and it has been attracting practitioners and software engineering researchers. However, since newly developed research tools and methodologies are presented separately, it is difficult to use those techniques together. To tackle this problem, we are developing a Web service, Codosseum to provide preprocessed data and various visualization services. Currently, we provide method-level history visualization and repositories, software development community population pyramid visualization, and city-like code visualization. By implementing these techniques as SaaS (software as a service), they can be used by practitioners and researchers freely and easily.
View full abstract
-
Shinya YOSHIDA, Hiroaki KUWABARA, Yoshitoshi KUNIEDA
2019 Volume 36 Issue 1 Pages
48-65
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
In this paper, we introduce a parametric polymorphism of secrecy for information flow analysis to an object-oriented programming language. Information flow analysis is useful to detect invalid information leaks. However, it is difficult to define classes having any secrecy of data such as Collection Framework, since type-based information flow analysis requires specifying a secrecy of each data as a type in the program. We propose a way to declare classes parameterized over secrecy and a structure of secrecy as a type. We also propose typing rules to ensure that typable programs do not leak confidential information even if any secrecy is substituted for the secrecy parameter. We prove proposed type system is sound for noninterfering.
View full abstract
-
Nobukazu YOSHIOKA, Naoyasu UBAYASHI, Fuyuki ISHIKAWA, Kenji TEI, Hiron ...
2019 Volume 36 Issue 1 Pages
66-73
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
-
Tatsuhiro CHIBA
2019 Volume 36 Issue 1 Pages
74-78
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
-
Shohei KATAKURA
2019 Volume 36 Issue 1 Pages
79-82
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
-
[in Japanese]
2019 Volume 36 Issue 1 Pages
85-87
Published: January 25, 2019
Released on J-STAGE: March 26, 2019
JOURNAL
FREE ACCESS
-
Yasuyuki NOGAMI, Takuya KUSAKA, Kazuya KOBAYASHI, Yuta HASHIMOTO
2019 Volume 36 Issue 1 Pages
95-100
Published: January 25, 2019
Released on J-STAGE: February 26, 2019
JOURNAL
FREE ACCESS
In the IoT era when a device is connected via the Internet, we can enjoy a great deal of convenience with the use of such devices, but a large number of users are not concerned about the attack from a third party. It is also meaningful for the user to have such a consciousness, but the person providing devices needs more specialized knowledge and awareness of the security. For such demands, a special education program called enPiT is held to provide an opportunity for undergraduate students to learn about cutting-edge information technologies and aims to cultivate human resources who have acquired the ability to solve specific problems in society. In this paper, we introduce the contents of “enPiT-Security advanced PBL exercise G” held in Okayama University and describe the helpfulness of the exercise and room for improvement based on the students' comments.
View full abstract
-
Satoshi MUNAKATA, Ryuichi UMEKAWA, Tadahiro UEHARA
2019 Volume 36 Issue 1 Pages
101-118
Published: January 25, 2019
Released on J-STAGE: February 26, 2019
JOURNAL
FREE ACCESS
When a runtime exception occurs during the operation or performance test of a Java Web application, it can not be confirmed detailed behavior and values until the occurrence of an exception from the limited log, therefore it takes time to isolate the problem. With the Selective Capture/Replay method, it is possible to reproduce and investigate the behavior and values of the modules at an arbitrary point in time, based on the execution history collected from the previously selected modules. However, due to the large load of externally outputting all the inputs of the modules, it need to select a small number of modules to be reproduced before the application runs, therefore it is not suitable for investigating unexpected runtime exceptions. In this paper, we propose “Replayable Stack Trace" as a low load capture method of execution history which can reproduce and investigate behavior and values up to exception occurrence for more modules. In the proposed method, the recent execution result of partial codes in a selected module is stored in a memory during executing the module,and when an exception occures, a stack trace with the stored values is externally outputted as execution history. By reproducing and showing the recent execution results of all the codes in each module based on the execution history, it is possible to confirm detailed behavior and values up to the occurrence of exception straddling the call hierarchy.
View full abstract
-
Yukihiko SHIGESADA
2019 Volume 36 Issue 1 Pages
119-151
Published: January 25, 2019
Released on J-STAGE: February 26, 2019
JOURNAL
FREE ACCESS
IPSJ (Information Processing Society of Japan) conducts international artificial intelligence programming contests every year since 2012. I participated this contest in 2015 and 2016, and won the second prize in the 2015 contest and won the first prize in the 2016 contest. The subject of the 2015th and 2016th contests was a game with incomplete information. Basic rules of two contests were common, but features of the game were different. This paper introduces and evaluates four software methods of the 2016 champion software in comparison with those of the 2015 contest and related works. Four software methods are as follows: a method to construct a game tree for game with incomplete information by introducing concepts of meta node and meta action, a method for speedup bitmap computing by using SIMD (Single Instruction Multiple Data) and BMI (Bit Manipulation Instruction sets), a method to analyze incomplete information precisely, and a method to calculate evaluation value of the game by introducing concepts such as meta evaluation value. This paper also presents several findings gained by participating two contests.
View full abstract