Social Affairs Division

Development of quantitative hospital management method

Development of a Quantitative Hospital Management Methodology

To provide safe and reliable medical services, it is important to have high economic efficiency in addition to high quality of care. However, the quality and economy of medical services are in a trade-off relationship, so we research to quantitatively capture treatment outcomes and apply them to hospital management.

Development Summarizing and predicting of disease progression

Development Summarizing and Predicting of Disease Progression

It is difficult to predict the progression of chronic diseases, including when and what symptoms will occur. If prediction becomes possible, patients and doctors can respond proactively to the disease progression. To this end, we aim to predict disease progression using information processing, such as that derived from medical information.

Service Engineering Division

3D Security Planning

3D Security Planning

3D Security Planning is software that enables us to provide a holistic security plan for major events by combining 3D visualisation technology, GIS (Geographic Information System) and BIM (Building Information Modelling).

IFC Model Server

IFC Model Server

For making mass advanced judgments efficiently, taking advantage of 3D building model data in BIM (Building Information Modeling) is important. But efficient operation of 3D building model data have some problem. To solve this problem, we explore IFC (Industry Foundation Classes) Model Server, which is the platform to manage 3D building model data.

Evolution of Human Behavior in Risky Environment

Evolution of Human Behavior in Risky Environment

Why do people behave so irrationally, especially in risky or dangerous situations? We believe that evolution is the key to answer this question. By adopting the concept of life history from biology, we are conducting multi-agent simulation to evolve artificial lives and developing a model of human risk behaviors.

Sensing Technology Division

Indoor/outdoor safety monitoring technology with light, radio waves and sound waves

Indoor/outdoor safety monitoring technology with light, radio waves and sound waves

To provide safety monitoring services, a detailed understanding of the situation is necessary. To accomplish this, various sensing technologies that use characteristics such as optical and infrared (O/IR) waves, radio waves, and sound waves are required. Through the combination of these technologies, our monitoring technology can recognize various situations involving occupants and goods, both indoors and outdoors.

SECOM Drone

SECOM Drone

SECOM Drone is a world-first in autonomous crime prevention by air and incorporates technologies developed in ISL such as highly accurate spatial information and sensor fusion technologies to locate and deter trespassing.

Vision Intelligence Division

Recognizing attributes from facial imagery

Recognizing attributes from facial imagery

People can recognize each other by looking at each other's faces. In addition to recognizing a person, faces include attribute information such as age, gender and even emotions. we are developing technologies for secure and convenient services using facial attributes.

Behavior analysis using video recognition

Behavior analysis using video recognition

We research the behavior analysis technology with a combination of localization, tracking and posture estimation. Behavior analysis can preempt crimes and quicken response times to incidents by detecting criminal and unusual behaviors.

Digital Platform Division

Hardware security and encryption technology

Hardware security and encryption technology

As IoT becomes more widespread, more and more devices will be connected and exposed to physically compromised environments. To provide secure and reliable IoT services, IoT devices need hardware security and encryption technologies.

IoT Services Assist Network Technology

IoT Services Assist Network Technology

Due to the increase in high performance IoT devices and the increase in amount of communication data, it will be important to solve communication problems in IoT services in the future. By combining services and communication technologies, we aim to realize next generation network technology that can convert and transmit data of IoT devices according to service scenes.

IoT Device Lifecycle Management

IoT Device Lifecycle Management

Traditional device management cannot easily scale to the massive number of IoT devices and deliver consistent quality, increasing security risk. We are therefore exploring device management technology that delivers efficiency without manual processes and trustworthiness of the entire system.

Zero-knowledge proofs

Privacy-Preserving Attribute Authentication Scheme by Using Zero-knowledge Proofs

Protecting privacy is one of the major challenges in recent years. We are focusing on building an authentication scheme to prove the authenticity of user attributes and enhance privacy preservation. Zero-knowledge Proofs is one of the promising technologies.