
16071 items found.
This course offers an introduction to the rapidly-growing field of probabilistic computing, which brings together probabilistic modeling and inference techniques with symbolic computation and neural networks. Students will see a broad range of probabilistic computing applications, and will gain familiarity with how to frame artificial intelligence tasks as the problem of probabilistic inference in a generative model. Students will also learn about several inference techniques, and understand the distinctions between probabilistic computing and other machine learning methods.
Multicellular organisms like us have very complex and elaborate morphologies. We can use it to do a variety of things, and interestingly, people can seriously consider the question of what they are. However, even such a complex organism is just a single sphere called an egg at the beginning of its life. The ultimate simple form automatically changes over time into the complex form described above. If you were to use clay to create an image of a "thinking person," many would first determine the proportion of clay to be allocated to the head, torso, and feet.
In fact, the design style (body plan) used by living organisms to create the body does exactly the same way. By repeating simple rules, complex things can be created. In this class, you will learn the body plan that creatures actually use.
Multicellular organisms like us have very complex and elaborate morphologies. We can use it to do a variety of things, and interestingly, people can seriously consider the question of what they are. However, even such a complex organism is just a single sphere called an egg at the beginning of its life. The ultimate simple form automatically changes over time into the complex form described above. If you were to use clay to create an image of a "thinking person," many would first determine the proportion of clay to be allocated to the head, torso, and feet.
In fact, the design style (body plan) used by living organisms to create the body does exactly the same way. By repeating simple rules, complex things can be created. In this class, you will learn the body plan that creatures actually use.
Multicellular organisms like us have very complex and elaborate morphologies. We can use it to do a variety of things, and interestingly, people can seriously consider the question of what they are. However, even such a complex organism is just a single sphere called an egg at the beginning of its life. The ultimate simple form automatically changes over time into the complex form described above. If you were to use clay to create an image of a "thinking person," many would first determine the proportion of clay to be allocated to the head, torso, and feet.
In fact, the design style (body plan) used by living organisms to create the body does exactly the same way. By repeating simple rules, complex things can be created. In this class, you will learn the body plan that creatures actually use.
This is the training course to enhance your research ability to understand and strengthen our neural communication between the brain and body, related to various functions such as thinking, feeling, learning, sensing, and moving. You will learn various methodologies such as neurophysiological wave recordings (EEG and/or EMG), neural stimulations (TMS, tDCS, tACS), neural imaging (fMRI), and computational neuroscience, and consider how to apply them for your own research.
We will have this class online by using Zoom.
Cyber security is becoming more important as a foundation to support the information society and the IoT society in the future. In practicing cyber security, not only technical knowledge but also comprehensive efforts on various matters such as organizational management, ergonomics, law, and policy are required.
This course takes up cases such as various cyber security incidents that actually occurred, analyzes them from various aspects, what kind of advance measures were necessary, and technical measures to prevent such cases. , Discuss cyber security initiatives that will be required in the future, such as policy measures. In addition, through these analyzes, we will deepen our understanding of the knowledge, skills, and sense required of cyber security personnel.
In this course, we will take up cases that represent various aspects of cyber security, bring the results of each analysis, and discuss them. Through this process, you will deepen your understanding of realistic cyber security issues and use various knowledge about complex issues to experience the process of problem solving and decision making in a simulated manner and acquire the abilities necessary for problem solving in the real world.
This lecture explains knowledge and methodologies of computer incident response and digital forensic. The information system in enterprise environment is an important factor of business continuity. Due to the current trend of business diversification and supply-chain manufacturing structure, the information system results in being complicated. Meanwhile cyber attacks against the information system in enterprise environment continues to get sophisticated. This lecture aims for development of cyber security experts who can practically handle such information security issues in the enterprise environment.
This lecture systematically discusses the issues of ordinary (in peacetime) security operations and emergency responses to computer security incidents from the technical and institutional view points. The emergency responses include matters of digital forensic technology.
This class will be held as a part of the Cyber Security course. Of course you can take this class even you don't join to the Cyber Security course. In this class, we investigate how to secure your software. It might be bug of library, your coding skill. Penetration testing is important too.
Cyber security is becoming more important as a foundation to support the information society and the IoT society in the future. In practicing cyber security, not only technical knowledge but also comprehensive efforts on various matters such as organizational management, ergonomics, law, and policy are required.
This course takes up cases such as various cyber security incidents that actually occurred, analyzes them from various aspects, what kind of advance measures were necessary, and technical measures to prevent such cases. , Discuss cyber security initiatives that will be required in the future, such as policy measures. In addition, through these analyzes, we will deepen our understanding of the knowledge, skills, and sense required of cyber security personnel.
In this course, we will take up cases that represent various aspects of cyber security, bring the results of each analysis, and discuss them. Through this process, you will deepen your understanding of realistic cyber security issues and use various knowledge about complex issues to experience the process of problem solving and decision making in a simulated manner and acquire the abilities necessary for problem solving in the real world.
This lecture explains knowledge and methodologies of computer incident response and digital forensic. The information system in enterprise environment is an important factor of business continuity. Due to the current trend of business diversification and supply-chain manufacturing structure, the information system results in being complicated. Meanwhile cyber attacks against the information system in enterprise environment continues to get sophisticated. This lecture aims for development of cyber security experts who can practically handle such information security issues in the enterprise environment.
This lecture systematically discusses the issues of ordinary (in peacetime) security operations and emergency responses to computer security incidents from the technical and institutional view points. The emergency responses include matters of digital forensic technology.
This class will be held as a part of the Cyber Security course. Of course you can take this class even you don't join to the Cyber Security course. In this class, we investigate how to secure your software. It might be bug of library, your coding skill. Penetration testing is important too.
This class will be held as a part of the Cyber Security course. Of course you can take this class even you don't join to the Cyber Security course. In this class, we investigate how to secure your software. It might be bug of library, your coding skill. Penetration testing is important too.
Cyber security is becoming more important as a foundation to support the information society and the IoT society in the future. In practicing cyber security, not only technical knowledge but also comprehensive efforts on various matters such as organizational management, ergonomics, law, and policy are required.
This course takes up cases such as various cyber security incidents that actually occurred, analyzes them from various aspects, what kind of advance measures were necessary, and technical measures to prevent such cases. , Discuss cyber security initiatives that will be required in the future, such as policy measures. In addition, through these analyzes, we will deepen our understanding of the knowledge, skills, and sense required of cyber security personnel.
In this course, we will take up cases that represent various aspects of cyber security, bring the results of each analysis, and discuss them. Through this process, you will deepen your understanding of realistic cyber security issues and use various knowledge about complex issues to experience the process of problem solving and decision making in a simulated manner and acquire the abilities necessary for problem solving in the real world.
The purpose of this class is to acquire knowledge about the various laws and policies related to information security.
Information security measures are important issues for information management, and in order to implement the information security management measures stipulated by these laws and regulations, a high level knowledge of the law and its interpretation as well as related policies is required. It is essential that we introduce organisational, human, technical and physical security measures in order to properly implement the technical measures. However, it is appropriate to understand the standards necessary to achieve this purpose. This is a prerequisite for implementing and introducing various information security measures. In addition, these information security measures are not limited to those people who respond professionally in companies but also, in the current situation, where computers and networks are widely used in everyday life. It is equally important to understand the laws and systems related to information security in the current network society.
We need to make a critical shift away from the industrial paradigm of Product-in Trash-out (PiTo), to a Data-in Data-out (DiDo) model through digital design and locally-based manufacturing. We embrace strategies in circular systems in economy and supply-chain, and digital innovation in 3D+ design and manufacturing. We foster collaboration between the global fab-city network and many actors, sectors and creators, in Japan and beyond.
We need to make a critical shift away from the industrial paradigm of Product-in Trash-out (PiTo), to a Data-in Data-out (DiDo) model through digital design and locally-based manufacturing. We embrace strategies in circular systems in economy and supply-chain, and digital innovation in 3D+ design and manufacturing. We foster collaboration between the global fab-city network and many actors, sectors and creators, in Japan and beyond.
It is human nature to "make things," but excessive "industry" (manufacturing) has been destroying the earth and causing global warming and climate change. While we can reduce the burden on the earth by promoting digitalization of the parts that can be digitally replaced, the part that requires "materials" for human survival cannot be reduced to zero. In this context, this lecture will first learn about the globally emerging "Circular Design" concept in order to shift away from "mass-production, mass-consumption, mass-disposal" manufacturing and toward a new type of manufacturing based on resource recycling, while applying the power of digital technology. The goal of this course is to envision a new circulatory system that is suited to cultural and regional characteristics, while also taking into consideration Japan's unique culture and processing system.
This course is offered in collaboration with the Center for Circular Design and Digital Manufacturing Creation, Global Research Institute, Keio University.
https://www.kgri.keio.ac.jp/project/2020/C20-09.html
Translated with DeepL.com (free version)
Course Description/Summary:
This course is divided into two parts. PART I: Issues and Opportunities in Contemporary Cities; and PART II: Research Methods for Environmental and Urban Challenges.
Today, better research skills and methods are urgently needed to enhance research-informed decision-making for urban development. This course includes a survey of research methods in environmental design; quantitative and qualitative methods used in researching design, social/behavioral, and technical problems in urban development and cities. It deals with models of urbanisation and concepts of sustainable cities. This course is particularly suitable for students with an interest in environmental design and concepts of urbanisation.
This graduate seminar course is for mature students and is based on self-directed learning. The students will develop an understanding of issues and methods of research in environmental design. Students will work through a series of online lectures, conduct research projects and share their findings in joined online reviews. A significant part of the weekly meeting is devoted to lectures. Specifically, this course aims to address and synthesize: Investigative Skills; Research, and Innovation in Urban Development.
Students will apply methods of design research to explore the urban development of different cities and regions across the world. The seminar provides students with an understanding of the key challenges facing both mature and rapidly-developing metropolitan areas. Dealing with large-scale change in cities, students will explore research that focuses on applied methods and new knowledge that is shaping the urban world, analyzing urban sustainability projects and city policies from design, social, and environmental perspectives. There are two assignments.
Course Description/Summary:
This course is divided into two parts. PART I: Issues and Opportunities in Contemporary Cities; and PART II: Research Methods for Environmental and Urban Challenges.
Today, better research skills and methods are urgently needed to enhance research-informed decision-making for urban development. This course includes a survey of research methods in environmental design; quantitative and qualitative methods used in researching design, social/behavioral, and technical problems in urban development and cities. It deals with models of urbanisation and concepts of sustainable cities. This course is particularly suitable for students with an interest in environmental design and concepts of urbanisation.
This graduate seminar course is for mature students and is based on self-directed learning. The students will develop an understanding of issues and methods of research in environmental design. Students will work through a series of online lectures, conduct research projects and share their findings in joined online reviews. A significant part of the weekly meeting is devoted to lectures. Specifically, this course aims to address and synthesize: Investigative Skills; Research, and Innovation in Urban Development.
Students will apply methods of design research to explore the urban development of different cities and regions across the world. The seminar provides students with an understanding of the key challenges facing both mature and rapidly-developing metropolitan areas. Dealing with large-scale change in cities, students will explore research that focuses on applied methods and new knowledge that is shaping the urban world, analyzing urban sustainability projects and city policies from design, social, and environmental perspectives. There are two assignments.
In this course, students will study methodology for building several environmental information systems, based on the concept of "Cyber-Physical spaces(CPS)". This course focuses on a new research area that combines the environmental field and the information-communication technology, evolving independently. By acquiring large-scale environmental data from the “real environmental space” and by measuring the cause and effect of changes in the “environmental information space” with regard to people flow data, large-scale image data, and natural environment data, students will learn several methods for designing and building environmental information systems. This system will equip them with (1) the ability to respond to medium- and long-term environmental changes by detecting changes that are taking place gradually during normal times, and (2) the capability to respond quickly to changes that occur due to sudden disruptions of the environment in an emergency. In recent years, with the development of sensors and faster storage devices with larger capacities, resized environmental data are being handled much more frequently than before. As a result, large-scale data processing technology has become essential for the understanding and scientific analysis of environmental data. In this course, the student will learn the construction of an environmental measurement, analysis, and information delivery system using ICT technology. Then, having acquired the capability to analyze actual environmental data, students will develop a scientific perspective that will enable them to consider both environmental data and constructive approaches to solutions. In particular, using hardware technologies that target the monitoring and control of the real environmental space, students will learn about environmental database systems, ubiquitous environment systems, and environmental video data processing. This study will include the technology for the control of sensors in the real environment, and an ICT technique to measure the cause and effect of environmental changes that occur in the environmental information space. The students will also learn about environmental modeling based on the results obtained from Cyber-Physical spaces.
While information technologies including Cyber Physical System (CPS), Internet/World Wide Web, and AI are evolving day by day, the environmental burden and sustainability of this technological era are becoming increasingly clear as an issue. On the other hand, in the 21st century, problems surrounding the global environment, such as climate warming, air pollution, and oceanic pollution, are becoming increasingly serious. Solving these problems is a critical issue for human society, and research for this purpose has made progress in each area. In this course, we will discuss both of these two fields, which have developed independently, and focus on a new research area that integrates them.
In this course, various technologies will be discussed from two main aspects: (a) greening and sustainability of information technology itself, and (b) technologies focusing on individual topics of environmental issues and their utilization/social implementation, and the discussion will be deepened through actual system construction.
This course will be an omnibus course, with lecturers specializing in each topic giving classes throughout the semester. The course consists of two types of lectures: lectures that are completed in one class each, and lectures and group work that are scheduled for three to four consecutive weeks.
This course will be led by Tadashi Okoshi, along with following guest lecturers from inside and outside Keio University
- Jin Mitsugi, Faculty of Environment and Information Studies, Keio University
- Masaki Yamabe, Graduate School of Social Data Science, Hitotsubashi University
- Jin Nakazawa, Faculty of Environment and Information Studies, Keio University
- Shuri Marui, Graduate School of Media and Governance, Keio University
- Shun Kawakubo, Department of System Design Engineering, Faculty of Science and Technology, Keio University
- Kei Hiroi, Disaster Prevention Research Institute Kyoto University
- Shoko Miyagawa, Faculty of Nursing and Medical Care, Keio University
- Kenji Yasuoka, Department of Mechanical Engineering, Faculty of Science and Technology, Keio University
- Linyu Peng, Department of Mechanical Engineering, Faculty of Science and Technology, Keio University
This course is intended to convey investigative analysis methods about environmental technoscience and environmental policy. Environmental issues are vast and span the natural and social sciences fields. In this course, students gain the ability to approach interdisciplinary subjects while dealing with practical environmental issues. The key significance of this study lies not in acquiring individual techniques or methods as much as in reaching the final objective―gaining a comprehensive ability to resolve environmental problems by gaining a comprehensive understanding of an issue, knowing how to create a framework while under time and resource constraints, and understanding which issues must be dealt with first. A specialist can't tackle a complex environmental problem on his or her own. It is necessary to meet challenges through collaboration with a variety of specialists and stakeholders. This course aims to nurture environmental leaders, who must understand the core and scope of the problems and understand the output provided by specialists. They must manage their teams comprehensively to execute practical measures to resolve problems. Students understand the relevant methods in this course and develop comprehensive abilities by taking on projects as a form of practical training.
In this course, students will study methodology for building several environmental information systems. This course focuses on a new area that combines the environmental field and the information technology field, evolving independently. By acquiring large-scale environmental data from the “real environmental space” and by measuring the cause and effect of changes in the “environmental information space” with regard to people flow data, large-scale image data, and natural environment data, students will learn a method for designing and building an environmental information system. This system will equip them with (1) the ability to respond to medium- and long-term environmental changes by detecting changes that are taking place gradually during normal times, and (2) the capability to respond quickly to changes that occur due to sudden disruptions of the environment in an emergency. In recent years, with the development of sensors and faster storage devices with larger capacities, resized environmental data are being handled much more frequently than before. As a result, large-scale data processing technology has become essential for the understanding and scientific analysis of environmental data. In this course, the student will learn the construction of an environmental measurement, analysis, and information delivery system using ICT technology. Then, having acquired the capability to analyze actual environmental data, students will develop a scientific perspective that will enable them to consider both environmental data and constructive approaches to solutions. In particular, using hardware technologies that target the monitoring and control of the real environmental space, students will learn about environmental database systems, ubiquitous environment systems, and environmental video data processing. This study will include the technology for the control of sensors in the real environment, and an ICT technique to measure the cause and effect of environmental changes that occur in the environmental information space. The students will also learn about environmental modeling based on the results obtained from the information space. They will study the solving to ordinary differential equations and partial differential equations, which are fundamental to modeling, and will perform modeling exercises.
This course gives an overview of the present status and future perspectives of global environment, resources, and energy problems. To obtain simultaneous solution for both environment and energy problems, we will consider and propose what is the optimum energy mix in the future.
The overall aspects, i.e., technical consistency/feasibility and social acceptability/policy making will be discussed by all of the participants in this course. To study technical aspects intensively, we will conduct 6
weeks exercise under close contact with advisory members of this course.
This course aims to provide students with foundational knowledge and techniques to engage in the formulation and implementation of international environmental policy.
This class will enable students to acquire literacy in international environmental policy, which is indispensable for future work in international institutions and organizations in the environmental field. With a view to solving environmental problems that are emerging in various parts of the world, the class will cultivate students’ knowledge using typical and representative examples related to basic points such as “why must we resort to international systems?” and “through what means and methods can the international society support the resolution of specific problems?” At the same time,the class will provide students with basic environmental management tools for handling the environment on a macroscale that they can understand as international environmental policy professionals.
Finally, simulations of international environmental policy negotiations will be conducted so that students can understand the basics, grasp the mechanics of multilateral environmental negotiations, and cultivate practical communication and negotiation skills. Furthermore, an experiential practicum with environmental measurement technology will also be conducted to help students develop a fundamental technological skill set that can be used to formulate and implement data-driven environmental policies.