Information
Theory |
Information volume, entropy, Source encoding,
image compression, JPEG, MPEG |
Theory
of Computation I |
In this lecture, we will present some of the fundamental issues about finite automata and Turing machines. These knowledge should be essential to study computer science. |
Theory
of Commputation II |
Parallel Algorithms solve larger-size problems very fast using multiple processors and distributed algorithms efficiently make multiple computers or processors work cooperative. Therefore, these algorithms need different design paradigms or design measures from those developed for the sequential computation theory. In this lecture, we can study the computation theory for parallel and distributed algorithms, and learn computation models, algorithm designs and analyses for these algorithms. |
Theory
of Commputation III |
Part I: We will present some of the fundamental issues about context-free languages.
Part II: Basics of computational complexity theory are given including the theory of NP-completeness and random computation. |
Safe and Secure Engineering |
This course focuses on how to design a safe and secure system.
In the first part, principles of model checking that automatically verifies the safety of a given finite-state system are explained. Furthermore, tree automata are introduced as an extension of finite-state systems.
In the second part, information and computer security is discussed. Especially, modern cryptography and its application to secure protocol, database security and access control are explained. |
Hardware
Design I |
A main goal of this course is to learn basic knowledge of how to design LSI, through learning logical conception and algorithm which are used in LSI design. A large part of the computer architecture is implemented as LSI so that the knowledge about LSI mechanisms and design methods seem essential knowledge even if you aim to be a software engineer. Also, to design high-quality LSI, it requires basic knowledge about LSI design methods even if we can use today\'s high-performance LSI design tool. Furthermore, the contents of this course contains not only LSI design method but also contains basic operation of logical functions which is fundamental to data processing specialists. |
Hardware
Design II |
Course objectives are to understand how to design digital systems, to understand testing methodologies, and to learn relevant fundamental knowledge.
|
High Performance Computer Architecture |
This lecture gives variety of efficient techniques and tradeoffs including speed, power, compatibility, security, and so on for executing programs. The wide and profound knowledge is helpful for students that have main interest in not only hardware but also software. |
Distributed Systems and Middleware |
In this lecture, we study software and networking technologies to realize distributed systems.
|
Software Design |
Software computational model, Programming paradigm, Programming for interprocess communication. |
Software
Engineering I |
Software
design language, Object-oriented software analysis
and design, Interaction design, Software process |
Software
Engineering II |
Software
maintenance, code analysis, measurement of utilized
process, Planning of software development control |
Data
Engineering I |
In this lecture, we will present some of the fundamental issues about relational databases and then how to ensure data integrity when a database is used concurrently by multiple users. |
Data
Engineering II |
The objective of this lecture is to learn the concepts and technologies of advanced and important data engineering systems and information retrieval systems in recent years. Focusing mainly on the technologies used for large scale information infrastructures, their principles and applications are introduced. |
Sensory
Information Processing I |
Introduction, Basic Mathematics, Echorocation,
Computed Tomography, Doppler Flowmetry, Test, Q & A, Image Sensing, Image Processing, 3D Sensing, Immersive Environment, Presentation
|
Sensory
Information Processing II |
Visual Feature & Characteristic of Image, Photodetector, Camera Tube & Solid-State Image Sensor, Structure and Characteristic of CCD, Color Measurement and Processing, Camera Calibration, Distance and 3D Shape Measurement |
Speech
Processing I |
Speech and acoustics, Speech analysis and synthesis, Speech recognition, HMM based genome analysis |
Speech
Processing II |
Speech
recognition in real environment, Speech analysis and
synthesis, Speech synthesis by rule, Multi-modal interface |
Fundations
of Artificial Intelligence |
Knowledge
representation, Predicate logic, Inductive learning |
Artificial
Intelligence |
This course provides foundations of the Artificial Intelligence (AI) such as
knowledge representations, search and inference algorithms.
These techniques can be utilized to achieve human-like intelligent systems. |
Ambient Intelligence |
|
Intelligent System Design |
|
Computational
Linguistics |
Morphological
and syntactic analysis of natural language, Grammatical
theory, Semantics |
Human-Computer
Interaction |
User
interface, Computer interaction, Virtual reality. |
Computer Graphics |
Computer Graphics is one of the most important functional element in computer systems. This course aims to introduce to the principles on computer graphics. Students will be able to obtain elementary skills for making computer graphics applications. |
Digital
Image Processing |
This lecture aims at giving fundamentals of image analysis and recognition techniques for automatic recognition of real worlds and media-oriented applications. Topics include pattern recognition, digital image processing, computer vision and some applications such as mixed and augmented reality. |
Information
Network I |
Computer network, Hierarchical protocol, Data linking technology, Communication protocol. |
Information
Network II |
Overview of Layered Protocol, Datalink Technology, Internet Protocol
,
Transport Protocol,
Network Applications, Security Technology, Internet Protocol version 6, High Speed Internet Technology, Multimedia Communication, Quality of Service, Mobile Communication, Standardization Process. |
Communication
Systems I |
This course gives overview of the wireless communications systems. This course first introduces the principle of fixed wireless system such as satellite communication systems and microwave radio relay systems and provides the basics of digital modulation and demodulation techniques. Then, the course gives principles of mobile communication systems, such as cellular systems, wireless LAN (local area network), digital broadcasting, and navigation systems.
|
Communication
Systems II |
-No class this year. |
Systems
Engineering I |
In this lecture we study optimization, which is a fundamental method in system engineering. By learning basic theory, application, and numerical solution, etc, we master systematic approaches. Various engineering problems are generalized systematically and formulated as a mathematical model, hence can be analyzed transparently and synthesized optimally. We mainly treat continuous optimization. |
Systems
Engineering II |
In this lecture, we study mathematical backgrounds of networks and systems control theory. The course objective is to describe basic approaches for solving various optimization problems. Exercises with numerical computation are employed to emphasize the practical aspect.
|
Systems
Control I |
This course covers linear system analysis for grasping the background of analyzing and controlling dynamical systems as well as fundamental theory for designing linear control systems on the basis of the state-equation approach. Classical control theory based on the transfer function and linear robust control are also covered. |
Systems
Control II |
Nonlinear
system control theory, H-infinite control theory, Regulator
optimization |
Robotics
I |
Sensing,
Maanipulation Mobile Robot, Planning, Robot Programming. |
Robotics
II |
Realtime
Control, Realtime Vision, Interaction, Humanoid Robot,
Digital Human. |
Bioinformatics
I |
To understand the basics of information science and biological sequence analysis. |
Bioinformatics
II |
The aim is to lecture methodologies for analysis and measurement of biological molecular systems. |
Practice
of Bioinformatics |
An approach using information science has become indispensable to molecular biology. In this lecture, we will study more about bioinformatics, which we learn in "Bioinformatics I" and "Bioinformatics II", by exercises using computers. |
Theoretical
Life Science |
In order to learn the mathematical methods for understanding life or intelligence, we show the statistical and dynamical approaches in constructing mathematical models, such as statistical learning theory and system biology.
|
Computational
Neuroscience |
Introduction to Computational Neuroscience, Computational Theory of Motor Control, System Biology of Learning and Plasticity, Computational Theory of Perception, Reward Prediction and Behavioral Learning, Computatioal Theory of Oculomotor Control, Computatioal Theory of Attention Control, Bayesian Estimation and Its Application to Computational Neuroscience, Neural Decoding and Brain-Machine Interface |
Bio-Imaging |
Bio-imaging,
Molecular/cellular imaging(Introduction to Biosensing and Bioimaging, Basics on Molecular Detection, DNA Sequencing, Bio Chip, Imaging Technology and Optical Microscope, Fluorescence Microscopy and Bioimaging, Single Molecular Imaging and Nanobiology Related Technology) |
Structural
Genomics |
Fundamentals of protein structures and physical properties are provided for understanding their basic actions as logic elements in the intermolecular interaction network. |
Functional
Genomics |
Genome sequences of various organisms are rapidly accumulating. In order to understand how biological processes of cells and organisms work based on the information encoded in genome sequence, the large scale experimental analysis of full complement of RNAs, proteins and metabolites in cells is indispensable. Functional genomics towards understanding cellular processes as networks of genes and proteins will be de introduced. In addition, the bioinformatics to understand structure and functions of proteins using genome sequence information will be explained.
|
Comparative
Genomics |
Genomic
evolution, Human genomics, Biological system analysis |
Advanced Interdisciplinary Science I |
|
Advanced Interdisciplinary Science II |
The aim is to lecture interdisciplinary research field including bio-inspired science, synthetic biology, and systems biology. |
Project
Practice I-IV |
The
latest subject related to the basis/application of
information science. The project will be taken
place on this campus or private research centers. |
Practice of Academic Volunteer I |
|
Practice of Academic Volunteer II |
|
Exercise in Programming |
Exercise to get C programming skills. |
Advanced Information Science I-IV |
Advanced and timely theme of information science. |
Current Topics in Information Science A |
Security Technology. - No class this year. |
Current Topics in Information Science B |
Security Management for Internet Infrastructure |
Current Topics in Information Science C |
Image Processing. - No class this year. |
Current
Topics in Information Science D |
Quantum information science opens up a new route to cope with some inherent difficulties in classical information processing and provides a novel framework for us to capture a classical information processing. This is an elementaly course of quantum information science for any student who is not specialized in physics. |
Current Topics in Information Science E |
Ubiquitous computing |
Advanced Software Engineering I |
|
Advanced Software Engineering II |
This lecture gives a principle of computer hardware and software for developing embedded systems. This lecture also introduces the use of GNU software for developing embedded systems.
*This lecture is a part of IT-Spiral Program. Students who join this program must complete the lecture.
|
Introduction to Advanced Robot Technology |
This course provides the introduction to the fundamental robot technology.
EPEER students are required to take this course. |
Advanced Robot Design |
This course provides foundations of robot design and development.
EPEER students are required to take this course.
In order to take this course, students have to get in touch with the instructor in charge of the course topic you would like to take before beginning the course. |
Advanced Robot Development I |
This course provides research/development literacy in the robotics field.
EPEER students are required to take this course |
Advanced Robot Development II |
This course provides practice and exercise of robot design and development.
EPEER students are required to take this course.
In order to take this course, students have to get in touch with the instructor in charge of the course topic you would like to take before beginning the course.
|
Literacy in Information Security Management |
In this courseware, we describe and give some kind of risk and problem for the literacy in information security management. Especially this is focused on security management system, cryptography risk, security policy, security governance, management of organization. So learner studies how to manage on these risks for our life and social infrastructure.
This courseware is based on [IT specialist program to promote Key Engineers as security specialists program] by the ministry of education, culture, sports, and technology (MEXT) Japan. |
Current Topics in Information Security |
We give just up-to-date technologies and theories for information security and social infrastructure.
<Part of Techonlogy>
IDS, Digital forensic, Wireless LAN and its authentication, P2P, SPAM, Buffer overflow, Penetration test, Quarantine network etc.
<Part of Theory>
Cryptography theory (from Integer algebra to Public Key Infrastructur e such RSA and Elliptic curve cryptography), recent research trend for cryptography, etc.
This courseware is based on [IT specialist program to promote Key Engineers as security specialists program] by the ministry of education, culture, sports, and technology (MEXT) Japan. |
Exercise in Information Security I |
|
Exercise in Information Security II |
|
Exercise in Information Security III |
|