Pub Date : 2014-12-01DOI: 10.1109/IIAI-AAI.2014.24
R. Inoue, Shun Shiramatsu, Tadachika Ozono, T. Shintani
An interactive presentation is intended to support lecturers that need to enhance presentation expressions and gather real-time feedback from audiences while delivering their presentations. Our objective is to improve the efficiency of bi-directional communication between a lecturer and a large audience in presentations using a real-time questionnaire that the result is displayed on a shared screen in real-time while gathering answers. The real-time questionnaire is based on a hybrid interactive presentation system that is collaboration between the traditional presentation supporting system and a web application. To gather feedback from audiences at presentations, our system provides the web application that delivers presentation slides to audiences and provides a feature of creating annotations and answering the questions on delivered presentation slides. The result of an experiment for evaluating performance of our system showed that the features of the real-time questionnaire have high performance scalability.
{"title":"Visualizing Real-Time Questionnaire Results to Promote Participation in Interactive Presentations","authors":"R. Inoue, Shun Shiramatsu, Tadachika Ozono, T. Shintani","doi":"10.1109/IIAI-AAI.2014.24","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.24","url":null,"abstract":"An interactive presentation is intended to support lecturers that need to enhance presentation expressions and gather real-time feedback from audiences while delivering their presentations. Our objective is to improve the efficiency of bi-directional communication between a lecturer and a large audience in presentations using a real-time questionnaire that the result is displayed on a shared screen in real-time while gathering answers. The real-time questionnaire is based on a hybrid interactive presentation system that is collaboration between the traditional presentation supporting system and a web application. To gather feedback from audiences at presentations, our system provides the web application that delivers presentation slides to audiences and provides a feature of creating annotations and answering the questions on delivered presentation slides. The result of an experiment for evaluating performance of our system showed that the features of the real-time questionnaire have high performance scalability.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128701602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/IIAI-AAI.2014.141
A. Yamada, O. Mizuno
Approaches to detect fault-prone modules have been studied for a long time. As one of these approaches, we proposed a technique using a text filtering technique. We assume that bugs relate to words and context that are contained in a software module. Our technique treats a module as text information. Based on the dictionary which was learned by classifying modules which induce bugs, the bug inducing probability over a target module is calculated, and it judges whether the given module is a fault-prone module. The predictive granularity of this technique is a module. In this study, we aimed at prediction with the finer granularity of the portion which induces a bug. Specifically, we tried to predict bug inducing changes by using source code differences of bug inducing changes and previous changes and a text filtering technique. Similarly, we tried to bug fixing predict by using source code differences of bug fixing changes and previous changes and a text filtering technique. To show the effectiveness of our approach, we conducted two experiments and compared our approach with fault-prone filtering by applying it to two open source projects, and obtained higher accuracy.
{"title":"A Text Filtering Based Approach to Classify Bug Injected and Fixed Changes","authors":"A. Yamada, O. Mizuno","doi":"10.1109/IIAI-AAI.2014.141","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.141","url":null,"abstract":"Approaches to detect fault-prone modules have been studied for a long time. As one of these approaches, we proposed a technique using a text filtering technique. We assume that bugs relate to words and context that are contained in a software module. Our technique treats a module as text information. Based on the dictionary which was learned by classifying modules which induce bugs, the bug inducing probability over a target module is calculated, and it judges whether the given module is a fault-prone module. The predictive granularity of this technique is a module. In this study, we aimed at prediction with the finer granularity of the portion which induces a bug. Specifically, we tried to predict bug inducing changes by using source code differences of bug inducing changes and previous changes and a text filtering technique. Similarly, we tried to bug fixing predict by using source code differences of bug fixing changes and previous changes and a text filtering technique. To show the effectiveness of our approach, we conducted two experiments and compared our approach with fault-prone filtering by applying it to two open source projects, and obtained higher accuracy.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130485495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/IIAI-AAI.2014.124
Ghaith Khalil, B. Ray, M. Chowdhury
In the RFID system a tag is attached to an object which might own by a number of people during its life cycle. As a result, the RFID system requires to transfer ownership of the tag. The ownership transfer has to protect privacy of current and new owner. There are number of ownership transfer protocol proposed to achieve secure ownership transfer. However, most of them are impractical or insecure to implement on current passive RFID tags. We are presenting an ownership transfer protocol using timer based shared secret for closed loop RFID systems. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.
{"title":"RFID Tag Ownership Transfer Protocol for a Closed Loop System","authors":"Ghaith Khalil, B. Ray, M. Chowdhury","doi":"10.1109/IIAI-AAI.2014.124","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.124","url":null,"abstract":"In the RFID system a tag is attached to an object which might own by a number of people during its life cycle. As a result, the RFID system requires to transfer ownership of the tag. The ownership transfer has to protect privacy of current and new owner. There are number of ownership transfer protocol proposed to achieve secure ownership transfer. However, most of them are impractical or insecure to implement on current passive RFID tags. We are presenting an ownership transfer protocol using timer based shared secret for closed loop RFID systems. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131836487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/IIAI-AAI.2014.189
Ryoya Fujimoto, Ryosuke Yamanishi, Y. Iwahori, Kohichi Toshioka, Jun-ichi Fukumoto
Preparation of a training image dataset used for the genetic object recognition system needs a lot of costs. Some datasets were recently created from Web image sharing services like Flickr, but examples which utilize a semantic classification or information of tags given to photos are quite few. This paper proposes an automatic generation method of an image dataset by introducing semantics of each label given to images, where the images are positioned in a semantic stratification according to the meaning of labels. Here the semantic stratification consists of IS-A relations, where "Animal" locates in a upper concept of "Dog" and "Cat". By using an image dataset with conceptual information like this, a computer will be able to recognize objects pictured in photos from a wide concept like "Animal" or "Vehicle" to narrower concepts gradually. In experiments, 47,910 photos were automatically classified into 183 classes which were aligned in a stratified tree. An evaluation test of the labels was performed manually for the generated image dataset and it was confirmed that most of labeling were reasonably collected.
{"title":"Generation of Stratified Image Database with Web Image Sharing Service and Ontology","authors":"Ryoya Fujimoto, Ryosuke Yamanishi, Y. Iwahori, Kohichi Toshioka, Jun-ichi Fukumoto","doi":"10.1109/IIAI-AAI.2014.189","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.189","url":null,"abstract":"Preparation of a training image dataset used for the genetic object recognition system needs a lot of costs. Some datasets were recently created from Web image sharing services like Flickr, but examples which utilize a semantic classification or information of tags given to photos are quite few. This paper proposes an automatic generation method of an image dataset by introducing semantics of each label given to images, where the images are positioned in a semantic stratification according to the meaning of labels. Here the semantic stratification consists of IS-A relations, where \"Animal\" locates in a upper concept of \"Dog\" and \"Cat\". By using an image dataset with conceptual information like this, a computer will be able to recognize objects pictured in photos from a wide concept like \"Animal\" or \"Vehicle\" to narrower concepts gradually. In experiments, 47,910 photos were automatically classified into 183 classes which were aligned in a stratified tree. An evaluation test of the labels was performed manually for the generated image dataset and it was confirmed that most of labeling were reasonably collected.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132624642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/IIAI-AAI.2014.184
M. Kawaguchi, M. Umeno, N. Ishii
In the neural network field, many application models have been proposed. A neuro chip and an artificial retina chip are developed to comprise the neural network model and simulate the biomedical vision system. Previous analog neural network models were composed of the operational amplifier and fixed resistance. It is difficult to change the connection coefficient. In this study, we used analog electronic multiple and sample hold circuits. The connecting weights describe the input voltage. It is easy to change the connection coefficient. This model works only on analog electronic circuits. It can finish the learning process in a very short time and this model will enable more flexible learning.
{"title":"The Two-Stage Analog Neural Network Model and Hardware Implementation","authors":"M. Kawaguchi, M. Umeno, N. Ishii","doi":"10.1109/IIAI-AAI.2014.184","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.184","url":null,"abstract":"In the neural network field, many application models have been proposed. A neuro chip and an artificial retina chip are developed to comprise the neural network model and simulate the biomedical vision system. Previous analog neural network models were composed of the operational amplifier and fixed resistance. It is difficult to change the connection coefficient. In this study, we used analog electronic multiple and sample hold circuits. The connecting weights describe the input voltage. It is easy to change the connection coefficient. This model works only on analog electronic circuits. It can finish the learning process in a very short time and this model will enable more flexible learning.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114447590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/IIAI-AAI.2014.151
Naoyuki Miyamoto, K. Higuchi, T. Tsuji
Nowadays, with the spread of database systems and network systems in every field, a demand for sharing existent database systems grows. On the other hand, it is difficult to stop existent databases to reorganize into one large database system because database systems usually are mission-critical system. Thus, some kind of distributed database is necessary to solve this problem. The multi-database system is a kind of the distributed database system. It is a cluster of independent database systems. However, the distributed database system including the multi-database system has some problems. One of these problems is data migration between individual database systems in the multi-database system. Many reorganization techniques for distributed database systems are already proposed, but these techniques are not always adaptive to the data migration in the multi-database system. Incremental data migration is one of the solutions for this problem and it is easy to implement in the multi-database system. In this method, a large data migration is divided into small data migrations and other operations are inserted between these small data migrations. In this paper, the incremental data migration technique is evaluated in the multidatabase system based on MySQL with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this multi-database system.
{"title":"Incremental Data Migration for Multi-database Systems Based on MySQL with Spider Storage Engine","authors":"Naoyuki Miyamoto, K. Higuchi, T. Tsuji","doi":"10.1109/IIAI-AAI.2014.151","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.151","url":null,"abstract":"Nowadays, with the spread of database systems and network systems in every field, a demand for sharing existent database systems grows. On the other hand, it is difficult to stop existent databases to reorganize into one large database system because database systems usually are mission-critical system. Thus, some kind of distributed database is necessary to solve this problem. The multi-database system is a kind of the distributed database system. It is a cluster of independent database systems. However, the distributed database system including the multi-database system has some problems. One of these problems is data migration between individual database systems in the multi-database system. Many reorganization techniques for distributed database systems are already proposed, but these techniques are not always adaptive to the data migration in the multi-database system. Incremental data migration is one of the solutions for this problem and it is easy to implement in the multi-database system. In this method, a large data migration is divided into small data migrations and other operations are inserted between these small data migrations. In this paper, the incremental data migration technique is evaluated in the multidatabase system based on MySQL with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this multi-database system.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/IIAI-AAI.2014.142
Norshazrul Azman Bin Sulaiman, Hideo Masuda
Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration data which has not been considered in most cases up until now. This paper considers performing live migration under an IPsec implemented transmission channel to achieve a secured transmission of migration data between servers. IPsec is proven to be secure and can be implemented for live migration but due to the excessive amount of overhead produced by IPsec, proposed sophisticated tuning of MTU and MSS values resulted in a better migration performance.
{"title":"Evaluation of a Secure Live Migration of Virtual Machines Using Ipsec Implementation","authors":"Norshazrul Azman Bin Sulaiman, Hideo Masuda","doi":"10.1109/IIAI-AAI.2014.142","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.142","url":null,"abstract":"Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration data which has not been considered in most cases up until now. This paper considers performing live migration under an IPsec implemented transmission channel to achieve a secured transmission of migration data between servers. IPsec is proven to be secure and can be implemented for live migration but due to the excessive amount of overhead produced by IPsec, proposed sophisticated tuning of MTU and MSS values resulted in a better migration performance.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/IIAI-AAI.2014.57
Sheau-Hwa Chen, Kuo-Hsun Liao
Mimetic isomorphic theory explains the process through which organizations in the same environment imitate each other's actions to become more similar to each other. This article makes the potential contribution that institutional theory can make to understanding the success of marketing practices. Based on the concept of mimetic isomorphic, expectation theory and self-determination theory, we apply these insights to investigate the relationship between automobile sales corporations' mimetic behaviors and customer expectation. The research demonstrates the use of a two-level hierarchical linear modeling (HLM) to examine the relationships.
{"title":"Impacts of Firm's Mimetic Isomorphic Behaviors on Customer Satisfaction from the Perspectives of Expectation Theory and Self-Determination Theory: An Approach of Hierarchical Linear Modeling","authors":"Sheau-Hwa Chen, Kuo-Hsun Liao","doi":"10.1109/IIAI-AAI.2014.57","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.57","url":null,"abstract":"Mimetic isomorphic theory explains the process through which organizations in the same environment imitate each other's actions to become more similar to each other. This article makes the potential contribution that institutional theory can make to understanding the success of marketing practices. Based on the concept of mimetic isomorphic, expectation theory and self-determination theory, we apply these insights to investigate the relationship between automobile sales corporations' mimetic behaviors and customer expectation. The research demonstrates the use of a two-level hierarchical linear modeling (HLM) to examine the relationships.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"59 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113936771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-24DOI: 10.1109/IIAI-AAI.2014.67
H. Abdelaziz
The objective of this paper was to develop an immersive Web-based learning model to assure the quality of learning through the flipped classrooms. The proposed model was guided theoretically by the flipped classroom as a new Web-based learning trend. It was also guided pedagogically by active and reflective learning principles that support transforming the teaching and learning practices from content engagement to cognitive engagement. The targeted immersive learning model encompasses of four reciprocal phases: Pro-act, Act, Reflect, and Re-act (PARR). To validate the suggested model, a convenience sample of graduate students studying an advanced statistics course was selected from the Distance Teaching and Training Program at the Arabian Gulf University After designing and applying this new immersive Web-based learning model (PARR), findings revealed that using the flipped classroom through this immersive Web-based learning model has a statistical and practical impact on developing achievement and self-study skills among graduate students. The contribution of this research is that it qualifies the Web-based instructional practices to shift from content acquisition act to knowledge expression and creation act. In addition, the paper will be of benefit to people looking for pedagogical applications of virtual and blended learning environments for developing multiple ways to express what learners know and be able to do.
{"title":"Immersive Learning Design (ILD): A New Model to Assure the Quality of Learning through Flipped Classrooms","authors":"H. Abdelaziz","doi":"10.1109/IIAI-AAI.2014.67","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.67","url":null,"abstract":"The objective of this paper was to develop an immersive Web-based learning model to assure the quality of learning through the flipped classrooms. The proposed model was guided theoretically by the flipped classroom as a new Web-based learning trend. It was also guided pedagogically by active and reflective learning principles that support transforming the teaching and learning practices from content engagement to cognitive engagement. The targeted immersive learning model encompasses of four reciprocal phases: Pro-act, Act, Reflect, and Re-act (PARR). To validate the suggested model, a convenience sample of graduate students studying an advanced statistics course was selected from the Distance Teaching and Training Program at the Arabian Gulf University After designing and applying this new immersive Web-based learning model (PARR), findings revealed that using the flipped classroom through this immersive Web-based learning model has a statistical and practical impact on developing achievement and self-study skills among graduate students. The contribution of this research is that it qualifies the Web-based instructional practices to shift from content acquisition act to knowledge expression and creation act. In addition, the paper will be of benefit to people looking for pedagogical applications of virtual and blended learning environments for developing multiple ways to express what learners know and be able to do.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128661283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-29DOI: 10.1109/IIAI-AAI.2014.119
Kenta Kaneko, M. Mori
International students have been noted as the driving force behind the development of the economy and higher education institutions of the sending country. After graduation, it is assumed that graduates who work in their home countries give a positive effect to the alma mater through joint researches. In fact, international student support has been actively carried out in several universities. On the other hand, there is a finding that foreign students who returned to their original countries, left low performance. Therefore, the effect of international fame improvement through international students has not been demonstrated. Previous studies to measure the joint research after returning to original countries does not exist. First of all, I designed a system for extracting laboratory with many international joint research from a database in the university. Subsequently it is scheduled to analyze whether research networks are maintained by graduates of the laboratory after returning. I designed the system for extracting international joint research from university researchers information database. In the current scheme, it is not able to extract the student who graduated without co-authored papers with faculty. It is the task of the future.
{"title":"A Research Design for Observing of the International Joint Research Activities by Graduates","authors":"Kenta Kaneko, M. Mori","doi":"10.1109/IIAI-AAI.2014.119","DOIUrl":"https://doi.org/10.1109/IIAI-AAI.2014.119","url":null,"abstract":"International students have been noted as the driving force behind the development of the economy and higher education institutions of the sending country. After graduation, it is assumed that graduates who work in their home countries give a positive effect to the alma mater through joint researches. In fact, international student support has been actively carried out in several universities. On the other hand, there is a finding that foreign students who returned to their original countries, left low performance. Therefore, the effect of international fame improvement through international students has not been demonstrated. Previous studies to measure the joint research after returning to original countries does not exist. First of all, I designed a system for extracting laboratory with many international joint research from a database in the university. Subsequently it is scheduled to analyze whether research networks are maintained by graduates of the laboratory after returning. I designed the system for extracting international joint research from university researchers information database. In the current scheme, it is not able to extract the student who graduated without co-authored papers with faculty. It is the task of the future.","PeriodicalId":432222,"journal":{"name":"2014 IIAI 3rd International Conference on Advanced Applied Informatics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114269452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}