Okayama University

MENU

Theory of Programming and Artificial Intelligence

 

We conduct a wide range of research on basic theory and applications of computational intelligence, mathematical informatics, and software engineering. Specifically, we promote research on machine learning algorithms, mathematical programming, distributed algorithms, software measurement and analytics, mining software repositories, human behavior analysis, human-machine interaction, computer vision and so on.

  • Prof. TAKAHASHI Norikazu
  • E-mail: takahashi@(okayama-u.ac.jp)
  • information and mathematical engineering

Directory of Researchers  Link to homepage 

Development of distributed algorithms for multiagent systems

I am studying methods for multiple agents to solve problems in a distributed and cooperative manner. Specifically, I design distributed algorithms for agents to solve given large-scale problems efficiently under the situation that each agent can communicate only with a small number of neighboring agents, and apply them to principal component analysis, nonnegative matrix factorization, and federated learning.

 

  • Prof. MONDEN Akito
  • E-mail: monden@(okayama-u.ac.jp)
  • empirical software engineering

 

Directory of Researchers  Link to group homepage

Development of software project management simulator

In this study, we are developing a simulator for learning quantitative software development management (https://www.okayama-u.ac.jp/user/salab/spm/). The simulator enables us to learn effort estimation, developer assignment considering their skills, schedule and cost management considering productivity factors, and engineer skill development through on-the-job training.

 

  • Prof. NAKAGAWA Hiroyuki
  • E-mail: h-nakagawa@(okayama-u.ac.jp)
  • autonomous software, self-adaptive software, agents, software engineering, requirements engineering, software design

 

Directory of Researchers  Link to group homepage

 

 

We aim to realize self-adaptive systems and multi-agent systems that autonomously monitor and analyze the current situation, consider the next strategy to take, and change their own behavior to achieve their goals. We are also studying next-generation technologies for designing and implementing autonomous software, such as technologies for automating software development and automatically discovering user requirements.

 

  • Assoc. Prof. Zeynep Yücel
  • E-mail: zeynep@(okayama-u.ac.jp)
  • human behavior analysis

 

Directory of Researchers  Link to homepage

Human behavior analysis

Today, artificial intelligence systems are becoming more and more pervasive in our daily lives. In that respect, the ultimate goal of this laboratory is to promote human-machine interaction and develop human-friendly technology by understanding human behavior. To this end, we are conducting research in various research areas of artificial intelligence, such as head pose estimation, eye detection and tracking, joint attention, and robot learning.

 

 

  • Asst. Prof. MIGITA Tsuyoshi
  • E-mail: migita-t@(okayama-u.ac.jp)
  • computer vision

 

Directory of Researchers 

Image understanding via inverse rendering

Computer graphics algorithms generate 2D images from 3D parameters, such as shape and pose of each object in a 3D scene, considering laws of optics and geometry. Its inverse problems analyze 2D images to reconstruct 3D parameters, which enables computers to understand or accurately measure objects in a 2D image. I am studying efficient numerical optimization methods required for such inverse problems.

 

  • Asst. Prof. INAYOSHI Hiroki
  • E-mail: inayoshi@(okayama-u.ac.jp)
  • computer security, privacy leakage detection

 

Directory of Researchers  

 

Our goal is to understand and solve challenges in computer security and privacy leakage. We collect and analyze released software without source code. In recent years, we have focused on Android applications. We study various analysis techniques, such as static and dynamic taint analyses, native code analysis, and network traffic analysis. We aim to improve these analysis techniques and also utilize them to investigate privacy leakage in real-world Android applications.