To provide safe and reliable medical services in hospitals, a high level of economic efficiency is required in addition to high quality medical treatments. It is difficult to achieve both of them due to the trade-off relationship. Therefore, we have developed methods to manage hospitals quantitatively, and we conduct challenging research aimed at achieving both medical quality and economics.
It is difficult to predict the progression of chronic diseases, including when and what symptoms occur. If prediction becomes possible, patients and doctors can proactively respond to the disease progression. To that end, we aim to predict disease progression using information processing, such as that obtained from medical information.
For making a security plan of big events, it needs a lot of times and efforts. 3D Security Planning enables us to make a holistic security plan for big events, combining 3D visualization technology, GIS (Geographic Information System) and BIM (Building Information Modeling).
For make mass advanced judgements efficiently, taking advantage of 3D building Model Data in BIM (Building Information Modeling) is important. But operating efficiently 3D building model data have some problem. To solve those problems, we research IFC (Industry Foundation Classes) Model Server which is the platform to manage 3D building model data.
Why do people behave so irrationally, especially in risky or dangerous situations? We believe that evolution is the key to answer this question. By adopting the concept of life history from biology, we are conducting multi-agent simulation to evolve artificial lives and developing a model of human risk behaviors.
In organizations such as hospitals, security companies, and call centers where staff members work in shifts, creating an appropriate roster or worker schedule is a time-consuming and burdensome task. We developed an algorithm which can create a schedule rivaling the quality of one created by a human expert.
To provide safety monitoring services, a detailed understanding of the situation is necessary. To accomplish this, various sensing technologies that use characteristics such as optical and infrared (O/IR) waves, radio waves, and sound waves are required. Through the combination of these technologies, our monitoring technology can recognize various situations involving occupants and goods, both indoors and outdoors.
SECOM Drone is a world-first in autonomous crime prevention by air and incorporates technologies developed in ISL such as highly accurate spatial information and sensor fusion technologies to locate and deter trespassing.
People can recognize each other by looking at each other's faces. Furthermore, the faces include attributes such as age, gender and even emotions. We research the technology obtaining recognition and attributes from facial imagery for security.
We research the behavior analysis technology with a combination of localization, tracking and posture estimation. Behavior analysis can preempt crimes and quicken response times to incidents by detecting criminal and unusual behaviors.
As IoT becomes more widespread, more and more devices will be connected and exposed to physically compromised environments. To provide secure and reliable IoT services, IoT devices need hardware security and encryption technologies.
Due to the increase in high performance IoT devices and the increase in amount of communication data, it will be important to solve communication problems in IoT services in the future. By combining services and communication technologies, we aim to realize next generation network technology that can convert and transmit data of IoT devices according to service scenes.