Division of Information Science, NAIST
NAIST Spring Seminar 2025
Feb 25 (Tue)–Feb 27 (Thur), 2025
NAIST Spring Seminar 2025 will be held on the Division of Information Science, NAIST, from February 25 (Tue) to February 27 (Thur). You can experience the cutting-edge research on Information Science during this Spring Seminar.
We are looking forward to your application!
Date |
2 days course: Feb 25 (Tue) –Feb 26 (Wed), 2025
3 days course: Feb 25 (Tue) –Feb 27 (Thur), 2025
(Depends on the topics)
|
Venue |
Depending on topic, you can either:
- Connect to the online system designated by the theme lecturers (Online case)
- Come to classroom L1, Division of Information Science, NAIST, Takayama 8916-5, Ikoma, Nara 630-0192, Japan (Online-Offline hybrid)
|
Intended audience |
Education higher than undergraduate including non-academic applicants who are planning to become IS students.
If you are not a candidate, please apply for the Lab tour
|
Capacity |
Depends on each theme (please check the table below).
If the number of applicants exceeds the capacity, a selection process will be done by the corresponding laboratory.
|
Admission fee |
FREE! However, we don't cover any travel or accommodation costs. We also don't issue any documents for applying visa etc.
|
Application form |
Please click the following "Apply Now!" button and submit your application form.
Deadline: Jan 24, 2025
Apply Now!
|
Contact us |
Spring Seminar Committee
ss2502[at]ml.naist.ac.jp
|
- 2024.12.10 Application form has been open.
- 2024.12.10 We uploaded the theme list.
-
Feb 25 Tue, 2025
09:20–09:30 Registration(AI, Inc. Seminar Hall)
09:30–10:00 Introduction of NAIST and the entrance examination(AI, Inc. Seminar Hall and Online)
10:00–17:00 Seminar(Lab. or Online)
-
Feb 26 Wed, 2025
09:30–17:00 Seminar(Lab. or Online)
-
Feb 27 Thur, 2025
09:30–17:00 Seminar(Lab. or Online)
- Let's try the graph counting contest!
Laboratory: |
Large-Scale Systems Management Laboratory |
Method: |
Face-to-face |
Summary: |
Graphs are used to model various real-world concepts, such as human relationships, transportation networks, and information networks. In graph theory, examining paths between two specified vertices is a fundamental problem. In this topic, you will take on the International Contest on Graph Counting Algorithms (ICGCA), which is based on such problems. Using the sample code provided, you are encouraged to apply your own ideas and innovations to improve solver performance on actual datasets. This theme is especially recommended for those interested in competitive programming or algorithms.
|
Period: |
2 Days |
Capacity: |
2 |
Prerequisite: |
Programming experience in Python or C/C++ is preferred. |
Materials: |
https://afsa.jp/icgca2024/ |
- Bottleneck Analysis of Federated Learning and Split Learning
Laboratory: |
Large-Scale Systems Management Laboratory |
Method: |
Face-to-face |
Summary: |
In this seminar, we will conduct a bottleneck analysis of Federated Learning (FL) and Split Learning (SL), two representative distributed learning methods. These methods enable learning on individual devices without aggregating data on a central server, thereby ensuring privacy and data security. However, the presence of nodes with insufficient computational or communication capabilities, referred to as "stragglers," can significantly increase learning latency. In this seminar, we will analyze the impact of stragglers on learning latency in FL and SL from the perspective of communication and explore methods to mitigate this impact.
|
Period: |
3 Days |
Capacity: |
2 |
Prerequisite: |
Programming experience in Python or C/C++ is preferred. |
Materials: |
|
- A simulated experience of developing a super-efficient computing platform from idea to implementation
Laboratory: |
Computing Architecture Laboratory |
Method: |
Face-to-face |
Summary: |
This is a mental training session that will teach participants how to come up with ideas for ultra-efficient computing platforms that surpass GPGPUs and then implement them. Depending on the skills of the participants, it may even be possible to implement them on FPGAs.
|
Period: |
3 Days |
Capacity: |
4 |
Prerequisite: |
None in particular. No programming experience required. |
Materials: |
https://www.youtube.com/playlist?list=PLWpSsjc1mY7M5v3LPPyHG5BIeqik-jAu7 |
- Let's decrypt strong encryption by exploiting implementation vulnerabilities!
Laboratory: |
Information security engineering |
Method: |
Face-to-face |
Summary: |
Side-channel attacks, which exploit unintended information such as power consumption or electromagnetic radiation emitted during the operation of cryptographic modules, have emerged as a significant new threat for extracting secret keys. In this seminar, we will implement cryptographic algorithms in both software and hardware, measure the side-channel information generated during cryptographic processing, and learn techniques for decrypting encryption using this information. Additionally, we will cover the fundamental concepts of countermeasures to defend against such attacks.
|
Period: |
2 Days |
Capacity: |
6 |
Prerequisite: |
Programming experience in Python preferred. |
Materials: |
|
- Physical and psychological state recognition using biological signals
Laboratory: |
Cybernetics and Reality Engineering Laboratory |
Method: |
Face-to-face |
Summary: |
You will develop an application that recognizes a user's physical or psychological state using a myoelectric sensor. On the first day, you will learn basic development procedures and check sample programs. On the second day, you will work with other participants to implement an improvement to the application according to what you learned on the first day. On the third day, you will complete the application and present it to the lab members. Let’s develop an application to detect user intention before it happens with the game paper-rock-scissors in mind!
|
Period: |
3 Days |
Capacity: |
5 |
Prerequisite: |
|
Materials: |
|
- Implementing and experiencing Pseudo-haptics
Laboratory: |
Cybernetics and Reality Engineering Laboratory |
Method: |
Face-to-face |
Summary: |
Pseudo-haptics technique is a technique that manipulates haptic perception like force and texture primarily through visual and auditory information. For example, you may have experienced a sense of "heaviness" when your character's movements became slower in a game. In this program, we will understand the principles of Pseudo-haptics, brainstorm new ideas for Pseudo-haptics technique together with the instructor, and implement those ideas using Unity. On the first day, we will have a brief lecture on Pseudo-haptics techniques, learn the basics of how to use Unity, test sample programs for a Pseudo-haptics technique, and brainstorm ideas. On the second day, we will consult with the instructor to implement your original Pseudo-haptics technique. On the third day, we will finalize our systems and present them for the instructor and laboratory members. If you are interested in haptic experiences in games or VR, cognitive science and psychology, or illusions, please join us!
|
Period: |
3 Days |
Capacity: |
5 |
Prerequisite: |
|
Materials: |
|
- Development of AR applications for smartphones
Laboratory: |
Cybernetics and Reality Engineering Laboratory |
Method: |
Face-to-face |
Summary: |
Let's develop an AR application that recognizes the real environment with a camera such as Pokémon Go or SNOW. You will develop the application on a laptop computer using Unity and AR Foundation as smartphone application development (Don't worry, we will lend you the development equipment if necessary). On the first day, you will learn basic development procedures, check some sample programs, and generate your own ideas. On the second day, you will implement the application based on object recognition, face recognition, gesture input, etc., according to your own interests. On the third day, you will complete the application and give the presentation for the lab members. Let’s come up with various applications such as placing virtual vases or furniture in the room, changing the age of the face, or using voice to notify the recognized objects.
|
Period: |
3 Days |
Capacity: |
5 |
Prerequisite: |
|
Materials: |
|
- Wireless localization using UWB
Laboratory: |
Network Systems Laboratory |
Method: |
Face-to-face |
Summary: |
"In this seminar, wireless localization using the Ultra Wide Band impulse radio is demonstrated. The Gauss-Newton algorithm and the Kalman filtering are applied to the Tag localization based on the Time of Flight (ToF) and
Time Difference of Arrival (TDoA)."
|
Period: |
2 Days |
Capacity: |
4 |
Prerequisite: |
Programming experience in Python preferred. |
Materials: |
infonet.naist.jp |
- Free-Viewpoint Video Generation Using Generative AI
Laboratory: |
Optical Media Interface Lab |
Method: |
Face-to-face |
Summary: |
Generative AI has been gaining academic and societal attention. One exciting application is the generation of free-viewpoint videos based on multiple images captured from different viewpoints. This technology has promising applications in fields like VR and digital twins. In this seminar, we will introduce the latest advancements in video generation using generative AI and provide hands-on experience with “Nerfstudio,” a library for creating free-viewpoint videos.
|
Period: |
2 Days |
Capacity: |
4 |
Prerequisite: |
|
Materials: |
|
- Designing Machine Learning Systems for Robot Control
Laboratory: |
Robot Learning laboratory |
Method: |
Online + face-to-face |
Summary: |
Applying machine learning to robot control requires system design that integrates both machine learning techniques and robot control principles. In this seminar, we will explore how to design such systems and tackle challenges by tuning machine learning methods and robot tasks.
|
Period: |
2 Days |
Capacity: |
4 |
Prerequisite: |
Programming experience in Python preferred. |
Materials: |
|
- Learning Cybersecurity Through Hands-On Practice
Laboratory: |
Laboratory for Cyber Resilience |
Method: |
Face-to-face |
Summary: |
This course will develop your security skills through comprehensive lectures. Specifically, topics will include secure software development techniques, automatic methods for identifying vulnerabilities in software, and attack techniques for exploiting vulnerabilities. We will explain basic commands and tools, so individuals with no experience in software development are welcome to participate in this seminar. The lectures and exercises will be conducted in Japanese.
|
Period: |
2 Days |
Capacity: |
5 |
Prerequisite: |
Ability to understand Japanese |
Materials: |
|
- Representation Learning: The Key to the Generalizability of Deep Learning
Laboratory: |
Mathematical Informatics Lab |
Method: |
Face-to-face |
Summary: |
The impressive performance of deep learning across diverse tasks can be attributed to the power of "representation learning." However, the fundamental principles and mechanisms that make deep learning representations generalizable across different domains and tasks remain only partially understood. In this seminar, we will focus primarily on contrastive learning and nonlinear independent component analysis, delving into what kind of representations is generalizable.
|
Period: |
2 Days |
Capacity: |
4 |
Prerequisite: |
Programming experience in Python preferred. |
Materials: |
|
- Let's think about the human-friendly interaction of an agent (robot)
Laboratory: |
Interactive Media Design Laboratory |
Method: |
Online + face-to-face |
Summary: |
How would a dialogue agent (character) running within a smartphone application or PC behave when interacting with people? Together, we will explore the differences in the way the agent looks and the impact that changes in behavior have on people. On the first day, we will share basic knowledge and learn about cutting-edge research. Next, we will develop ideas based on what we have learned and think about and create agent behavior. We will also experience the measurement of human emotions by using sensors to visualize the impressions that the agent gives to people in this process. Finally, as a summary, we will create a presentation of what we have learned and present a demonstration. This two-day seminar is designed to provide a short, intensive experience of the fascinating study of human-robot interaction.
|
Period: |
2 Days |
Capacity: |
4 |
Prerequisite: |
Not specified. |
Materials: |
https://imdl.naist.jp/ja/subresearchlist/ |
- Let's try a simple AR experience using OpenCV!
Laboratory: |
Interactive Media Design Laboratory |
Method: |
Online + face-to-face |
Summary: |
Let's learn the basics of computer vision to begin developing Augmented Reality (AR), which involves overlaying computer-generated information onto the real world. On the first day, we will explore how to use OpenCV and its basic functions for image processing. On the second day, you will brainstorm ideas for a simple AR application and implement them using the concepts learned on the first day. On the third day, we will hold a demo and presentation of the AR application you created. The goal of this activity is to inspire curiosity and creativity while providing practical skills that contribute to advancements in immersive technologies.
|
Period: |
2 Days |
Capacity: |
4 |
Prerequisite: |
Python or C++ experience, AR or OpenCV experience is preferred. |
Materials: |
https://imdl.naist.jp/ja/subresearchlist/ |
- Basics of Computer Vision for Augmented Reality
Laboratory: |
Interactive Media Design Laboratory |
Method: |
Online + face-to-face |
Summary: |
Let's learn the basics of computer vision to begin developing Augmented Reality (AR), which involves overlaying computer-generated information onto the real world. On the first day, we will explore how to use OpenCV and its basic functions for image processing. On the second day, you will brainstorm ideas for a simple AR application and implement them using the concepts learned on the first day. On the third day, we will hold a demo and presentation of the AR application you created. The goal of this activity is to inspire curiosity and creativity while providing practical skills that contribute to advancements in immersive technologies.
|
Period: |
3 Days |
Capacity: |
5 |
Prerequisite: |
(Not required) Prior experience with Python programming is preferred. |
Materials: |
|
- The Path to Safety and Trust: Designing New Interactions Between Pedestrians and Small Autonomous Vehicles
Laboratory: |
Human Robotics Laboratory |
Method: |
Face-to-face |
Summary: |
The aging population has led to a significant increase in individuals with mobility challenges. At the same time, following the end of the COVID-19 pandemic, urban areas have seen a surge in personal mobility needs, driving rapid growth in demand for innovative mobility solutions that enable greater freedom of movement. Recent advancements in autonomous driving technology and AI have brought Autonomous Personal Mobility Vehicles (APMVs) into the spotlight. APMVs are expected to serve as accessible, short-distance transportation solutions in shared spaces such as sidewalks, shopping centers, train stations, and school campuses. However, since APMVs rely entirely on autonomous driving systems, their communication capabilities with pedestrians remain limited. This can result in pedestrians misunderstanding the APMV’s intentions, potentially leading to collision risks. If such issues are not addressed, public acceptance of APMVs may decline. This project aims to explore and develop new “considerate” interactions between pedestrians and vehicles based on "safety" and "trust." By experiencing interactions with APMVs firsthand, we will brainstorm potential solutions and conduct experimental evaluations to validate their effectiveness.
|
Period: |
2 Days |
Capacity: |
15 |
Prerequisite: |
|
Materials: |
|
- Let's learn how to control robots for Human-Robot Interaction
Laboratory: |
Human Robotics Laboratory |
Method: |
Face-to-face |
Summary: |
Human-robot interaction (HRI), in which humans and robots work together, taking advantage of their respective strengths, has been attracting attention. However, because robots are much stronger than humans, how to control them is important for safe interaction. In this theme, you will learn about control technology for human-robot cooperation through the implementation of simulations, etc.
|
Period: |
3 Days |
Capacity: |
3 |
Prerequisite: |
Programming experience is desirable. |
Materials: |
|
- Automated driving of a personal mobility
Laboratory: |
Human Robotics Laboratory |
Method: |
Face-to-face |
Summary: |
Automated driving technology is applied not only to cars but also to agricultural robots, service robots and many other fields. Let’s learn about automated driving technology at NAIST! In this seminar, we aim to control a personal mobility with an accuracy of less than 3 cm from the planned path. Automated driving systems involve many elemental technologies. Among them, we will learn about “path planning” and “control”. You will then implement the theory you have learned in an actual personal mobility vehicle and drive it in an outdoor environment. This is a good opportunity to deepen your experiential understanding of automated driving system by coming into touch with the actual vehicle and sensors.
|
Period: |
3 Days |
Capacity: |
4 |
Prerequisite: |
Interest in robotics, mobility, and automated driving. |
Materials: |
|
- Let's Develop Your Own AI for Software Development
Laboratory: |
ソフトウェア設計学 |
Method: |
Online + face-to-face |
Summary: |
The emergence of generative AI, such as ChatGPT, has enabled us to generate not only text but also source code and test code with outstanding performance. For example, it has been reported that GitHub Copilot improves software development productivity by 55%. Coexistence and collaboration with generative AI will be inevitable in the near future. In this seminar, participants will experience the acceleration and efficiency of software development by integrating AI into modern software development processes, especially DevOps. In particular, they will create their own software development AI through a tutorial. Additionally, this seminar will introduce the challenges that current general-purpose AIs have not yet solved.
|
Period: |
2 Days |
Capacity: |
5 |
Prerequisite: |
This seminar will be conducted in a tutorial format, so advanced programming skills are not required for participants, but it is desirable to have a basic understanding of Python code. |
Materials: |
|
- Let's consider security/privacy vulnerabilities in AI
Laboratory: |
Dependable System Laboratory |
Method: |
Face-to-face |
Summary: |
This seminar explores AI security and privacy challenges using real-world examples. We'll study poisoning attacks exploiting AI system vulnerabilities, using familiar examples like images and GPS data. We'll also cover protective measures like differential privacy to prevent information leaks from AI.
|
Period: |
2 Days |
Capacity: |
5 |
Prerequisite: |
Python programming experience is required. |
Materials: |
|
- Graph Exploration and related problem in mobile agent systems
Laboratory: |
Dependable System Laboratory |
Method: |
Online + face-to-face |
Summary: |
In this seminar, the participants will try to design distributed algorithms using mobile agents, which are virtual computing entities in the distributed systems. In online settings, we will use a simulation software for the mobile agents.
|
Period: |
2 Days |
Capacity: |
3 |
Prerequisite: |
Programming experience (e.g., in C, Java, Python) |
Materials: |
|
- Introduction to quantum cryptography
Laboratory: |
Dependable System Laboratory |
Method: |
Online + face-to-face |
Summary: |
Quantum cryptography, especially quantum key distribution (QKD), has attracted worldwide attention in the past 40 years due to its heightened security that can protect one from even hackers with quantum computers. In this seminar we will introduce the history, fundamentals, and state-of-the-art of QKD protocols. Students will also be provided with simple test codes to simulate the working of the popular BB84 protocol hands-on.
|
Period: |
2 Days |
Capacity: |
5 |
Prerequisite: |
The seminar will be given in English, and anyone with an engineering or science background is welcome to join. No prior knowledge of quantum mechanics is required, while some basic programming knowledge is encouraged. |
Materials: |
https://sites.google.com/view/dependablesyslab/research/security-of-quantum-systems |
- Software Development with Generative AI and its Verification
Laboratory: |
Software Engineering Laboratory |
Method: |
Face-to-face |
Summary: |
In recent years, software development using ChatGPT and GitHub Copilot has become common. The speed of software development has been greatly increased by using these methods, and it is said that the use of generative AI will become essential for software development in the future. On the other hand, it is essential to verify the generated code through software testing to ensure the validity. In this seminar, we have exercises in programming and software development using these generative AI and testing methods. We also introduce recent research about generative AI in software engineering. |
Period: |
2 Days |
Capacity: |
5 |
Prerequisite: |
Programming experience |
Materials: |
|
- IoT Programming with ChatGPT
Laboratory: |
Internet Architecture and Systems Laboratory |
Method: |
Face-to-face |
Summary: |
Dive into the fascinating world of IoT and AI! No prior programming experience is required. On the first day, we’ll start with the basics of IoT, covering the types of sensors, methods for data collection, and how to utilize this information effectively. You’ll also participate in interactive programming sessions using ChatGPT4, where you’ll learn practical coding techniques and problem-solving approaches. With ChatGPT4’s support, the barriers to programming are significantly lowered, making it easy for beginners to write code. The second day will focus on hands-on applications, with projects centered around Raspberry Pi. Using various electronic components such as temperature sensors, light sensors, and motion sensors, you’ll develop your own IoT applications. For example, you can build an application that collects data from a temperature sensor, processes it, and visualizes room temperature changes on a graph. Alternatively, you can create a system using a light sensor that monitors indoor brightness and automatically turns on the lights when it falls below a certain threshold. Experiment with how to ask ChatGPT4 for the best support on generating IoT app ideas and implementing them. Let’s explore the possibilities together!
|
Period: |
2 Days |
Capacity: |
4 |
Prerequisite: |
Basic programming experience is preferred. |
Materials: |
|
Lab tour
Please visit Lab Tour.
Please visit Access Map.
Please visit FAQ (in Japanese).
Handling of the Seminar when public transport services are suspended, etc.
1. Handling of the Seminar when public transport services are suspended
The Seminar will be cancelled when the services of the Kintetsu lines (Keihanna, Nara, and Kyoto) and/or Nara Kotsu Bus lines (routes serving Gakken Kita-Ikoma Sta., Gakuenmae Sta., and Takanohara Sta.) are suspended due to a major disaster, accident, etc. The table below shows the handling of the seminar when public transport services are restored.
2. Handling of the seminar when a weather warning is issued
The Seminar will be cancelled when an Emergency Warning and a storm(or snowstorm) warning is issued in Ikoma City, Nara City and the area including those cities. The table below shows the handling of the seminar when the warning is cancelled.
Status at 7:00 a.m./10:00 a.m. |
Handling of the seminar |
Public transport services are restored and the warning is cancelled at or before 7:00 a.m. |
The Seminar are held for the whole day |
Public transport services are restored and the warning is cancelled at or before 10:00 a.m. |
The Seminar are held in the afternoon |
Public transport services remain suspended and the warning remains in effect after 10:00 a.m. |
The Seminar are cancelled for the whole day |
Note: Information on the TV, Internet, etc. is used to check if public transport services are suspended/restored or a warning is issued/cancelled.