Search Sites

Transactions of the Institute of Systems, Control and Information Engineers Vol. 37 (2024), No. 7

ISIJ International
belloff
ONLINE ISSN: 2185-811X
PRINT ISSN: 1342-5668
Publisher: THE INSTITUTE OF SYSTEMS, CONTROL AND INFORMATION ENGINEERS (ISCIE)

Backnumber

  1. Vol. 37 (2024)

  2. Vol. 36 (2023)

  3. Vol. 35 (2022)

  4. Vol. 34 (2021)

  5. Vol. 33 (2020)

  6. Vol. 32 (2019)

  7. Vol. 31 (2018)

  8. Vol. 30 (2017)

  9. Vol. 29 (2016)

  10. Vol. 28 (2015)

  11. Vol. 27 (2014)

  12. Vol. 26 (2013)

  13. Vol. 25 (2012)

  14. Vol. 24 (2011)

  15. Vol. 23 (2010)

  16. Vol. 22 (2009)

  17. Vol. 21 (2008)

  18. Vol. 20 (2007)

  19. Vol. 19 (2006)

  20. Vol. 18 (2005)

  21. Vol. 17 (2004)

  22. Vol. 16 (2003)

  23. Vol. 15 (2002)

  24. Vol. 14 (2001)

  25. Vol. 13 (2000)

  26. Vol. 12 (1999)

  27. Vol. 11 (1998)

  28. Vol. 10 (1997)

  29. Vol. 9 (1996)

  30. Vol. 8 (1995)

  31. Vol. 7 (1994)

  32. Vol. 6 (1993)

  33. Vol. 5 (1992)

  34. Vol. 4 (1991)

  35. Vol. 3 (1990)

  36. Vol. 2 (1989)

  37. Vol. 1 (1988)

Transactions of the Institute of Systems, Control and Information Engineers Vol. 37 (2024), No. 7

Functional Evaluations of Specific Functional Designs based on the Results of a Survey of the Functions Required in the Tablet-based Procedures

Takashi Matsubara, Akio Gofuku

pp. 175-184

Abstract

For the smooth transition from paper-based procedures used in operations and maintenance to tablet-based procedures, we produced six types of tablet-based procedures that implemented several required functions proposed by users. In this study, Operational experiments had conducted on the functional aspects of six different tablet-based procedures as opposed to the usability of paper-based procedures. As a result, we confirmed five practical effects, including functions such as the following (1) It is easy to use if all procedures displayed on the tablet are loaded together and displayed by sending pages one by one as if they were paper. (2) Materials related to operations should be easy to use by creating and saving folders for each type and displaying them when needed.

Bookmark

Share it with SNS

Article Title

Functional Evaluations of Specific Functional Designs based on the Results of a Survey of the Functions Required in the Tablet-based Procedures

Method for Analyzing Answer Tendency Analysis of e-learning System Answer History Data Using Formal Concept Analysis

Tatsuo Motoyoshi, Yoshiki Asami, Kazutoshi Sakakibara, Masaki Nakamura, Noboru Takagi, Kei Sawai, Hiroyuki Masuta, Hironobu Takano

pp. 185-194

Abstract

We aim to construct a method to apply Formal Concept Analysis to small-scale data and to use the logic of implication obtained from the analysis for statistical analysis. Specifically, we obtain learning history data of e-learning system users in a class of about 40-60 students in a given year, and use Formal Concept Analysis to obtain an implication relation that can be expressed as “a person who answers one question (group) correctly or incorrectly will always answer another question (group) correctly or incorrectly”. We compare the tendency of correct/incorrect answers of the questions (groups) included in the obtained implication relation with the relationships among the questions (groups) obtained from the statistical analysis of the data of multiple years, which is larger than the group to which Formal Concept Analysis was applied.

Bookmark

Share it with SNS

Article Title

Method for Analyzing Answer Tendency Analysis of e-learning System Answer History Data Using Formal Concept Analysis

Controller Design Based on Closed-loop Data of an Encrypted Control System

Kenta Nagao, Natsuki Kawaguchi, Takao Sato

pp. 195-202

Abstract

This paper proposes a controller design methodology for an encrypted control system that prevents data leakage. In previous model-based design studies, there was a risk of information leakage during the design process. Therefore, this study proposes a method to design a controller directly from the encrypted data. By using the proposed method, security can be maintained both during control system design and during control.

Bookmark

Share it with SNS

Article Title

Controller Design Based on Closed-loop Data of an Encrypted Control System

You can use this feature after you logged into the site.
Please click the button below.

Advanced Search

Article Title

Author

Abstract

Journal Title

Year

Please enter the publication date
with Christian era
(4 digits).

Please enter your search criteria.