Social Affairs Division

Development of quantitative hospital management method

Development of quantitative hospital management method

To provide safe and reliable medical services in hospitals, a high level of economic efficiency is required in addition to high quality medical treatments. It is difficult to achieve both of them due to the trade-off relationship. Therefore, we have developed methods to manage hospitals quantitatively, and we conduct challenging research aimed at achieving both medical quality and economics.

Development Summarizing and predicting of disease progression

Development Summarizing and predicting of disease progression

It is difficult to predict the progression of chronic diseases, including when and what symptoms occur. If prediction becomes possible, patients and doctors can proactively respond to the disease progression. To that end, we aim to predict disease progression using information processing, such as that obtained from medical information.

Service Engineering Division

3D Security Planning

3D Security Planning

For making a security plan of big events, it needs a lot of times and efforts. 3D Security Planning enables us to make a holistic security plan for big events, combining 3D visualization technology, GIS (Geographic Information System) and BIM (Building Information Modeling).

IFC Model Server

IFC Model Server

For make mass advanced judgements efficiently, taking advantage of 3D building Model Data in BIM (Building Information Modeling) is important. But operating efficiently 3D building model data have some problem. To solve those problems, we research IFC (Industry Foundation Classes) Model Server which is the platform to manage 3D building model data.

Evolution of Human Behavior in Risky Environment

Evolution of Human Behavior in Risky Environment

Why do people behave so irrationally, especially in risky or dangerous situations? We believe that evolution is the key to answer this question. By adopting the concept of life history from biology, we are conducting multi-agent simulation to evolve artificial lives and developing a model of human risk behaviors.

Automated Shift Scheduling Technology and its Application

Automated Shift Scheduling Technology and its Application

In organizations such as hospitals, security companies, and call centers where staff members work in shifts, creating an appropriate roster or worker schedule is a time-consuming and burdensome task. We developed an algorithm which can create a schedule rivaling the quality of one created by a human expert.

Sensing Technology Division

Indoor/outdoor safety monitoring technology with light, radio waves and sound waves

Indoor/outdoor safety monitoring technology with light, radio waves and sound waves

To provide safety monitoring services, a detailed understanding of the situation is necessary. To accomplish this, various sensing technologies that use characteristics such as optical and infrared (O/IR) waves, radio waves, and sound waves are required. Through the combination of these technologies, our monitoring technology can recognize various situations involving occupants and goods, both indoors and outdoors.

SECOM Drone

SECOM Drone

SECOM Drone is a world-first in autonomous crime prevention by air and incorporates technologies developed in ISL such as highly accurate spatial information and sensor fusion technologies to locate and deter trespassing.

Vision Intelligence Division

Obtaining recognition and attributes from facial imagery

Obtaining recognition and attributes from facial imagery

People can recognize each other by looking at each other's faces. Furthermore, the faces include attributes such as age, gender and even emotions. We research the technology obtaining recognition and attributes from facial imagery for security.

Behavior analysis using video recognition

Behavior analysis using video recognition

We research the behavior analysis technology with a combination of localization, tracking and posture estimation. Behavior analysis can preempt crimes and quicken response times to incidents by detecting criminal and unusual behaviors.

Communication Platform Division

Hardware security and encryption technology

Hardware security and encryption technology

As IoT becomes more widespread, more and more devices will be connected and exposed to physically compromised environments. To provide secure and reliable IoT services, IoT devices need hardware security and encryption technologies.

IoT Services Assist Network Technology

IoT Services Assist Network Technology

Due to the increase in high performance IoT devices and the increase in amount of communication data, it will be important to solve communication problems in IoT services in the future. By combining services and communication technologies, we aim to realize next generation network technology that can convert and transmit data of IoT devices according to service scenes.