Minami-rinkan, Japan
Minami-rinkan, Japan

Osaka Gakuin University , also known as Osaka Graduate University , is a mid-sized, mid-level private liberal arts university located in Suita, Osaka Prefecture, Japan. The university focuses on law, economics, and international studies, but still provides a wide array of other subjects for study. Wikipedia.

Time filter

Source Type

Xiang D.,Tsinghua University | Liu G.,Tsinghua University | Chakrabarty K.,Duke University | Fujiwara H.,Osaka Gakuin University
IEEE/IFIP International Conference on VLSI and System-on-Chip, VLSI-SoC | Year: 2013

A 3D stacked network-on-chip (NOC) promises the integration of a large number of cores in a many-core system-on-chip (SOC). The NOC can be used to test the embedded cores in such SOCs, whereby the added cost of dedicated test-Access hardware can be avoided. However, a potential problem associated with a 3D NOC-based test access is the emergence of hotspots due to stacking and the high toggle rates associated with structural test patterns used for manufacturing test. High temperatures and hotspots can lead to the failure of good parts, resulting in yield loss. We describe a thermal-driven test scheduling method to avoid hotspots, whereby the full NOC bandwidth is used to deliver test packets. Test delivery is carried out using a new unicast-based multicast scheme. Experimental results highlight the effectiveness of the proposed method in reducing test time under thermal constraints. © 2013 IEEE.

Murakami Y.,Osaka Electro-Communication University | Hamasho S.,Osaka Electro-Communication University | Kasahara M.,Osaka Gakuin University
2012 International Symposium on Information Theory and Its Applications, ISITA 2012 | Year: 2012

The decision version and the computational version of the subset sum problem are known to be NPcomplete and NPhard, respectively. The conventional knapsack schemes are based on the difficulty of the computational version of the subset sum problem. In this paper, we shall propose a new knapsack scheme which is based on not computational version but on decision version of the subset sum problem. In the proposed scheme, the public sequence would be indistinguishable from uniformly distributed sequence. We shall discuss on the security of the proposed scheme and show that the proposed scheme is secure against the conventional attacks. © 2012 IEICE Institute of Electronics Informati.

Kirjavainen M.,Osaka Gakuin University | Lieven E.V.M.,University of Manchester | Theakston A.L.,University of Manchester
Cognitive Science | Year: 2016

An experimental study was conducted on children aged 2;6-3;0 and 3;6-4;0 investigating the priming effect of two WANT-constructions to establish whether constructional competition contributes to English-speaking children's infinitival to omission errors (e.g., *I want ___ jump now). In two between-participant groups, children either just heard or heard and repeated WANT-to, WANT-X, and control prime sentences after which to-infinitival constructions were elicited. We found that both age groups were primed, but in different ways. In the 2;6-3;0 year olds, WANT-to primes facilitated the provision of to in target utterances relative to the control contexts, but no significant effect was found for WANT-X primes. In the 3;6-4;0 year olds, both WANT-to and WANT-X primes showed a priming effect, namely WANT-to primes facilitated and WANT-X primes inhibited provision of to. We argue that these effects reflect developmental differences in the level of proficiency in and preference for the two constructions, and they are broadly consistent with "priming as implicit learning" accounts. The current study shows that (a) children as young as 2;6-3;0 years of age can be primed when they have only heard (not repeated) particular constructions, (b) children are acquiring at least two constructions for the matrix verb WANT, and (c) that these two WANT-constructions compete for production. © 2016 Cognitive Science Society, Inc.

Nakagawa T.,Osaka Gakuin University
Procedia Engineering | Year: 2011

Experiences of teaching under-graduate students and training industrial engineers on how to think creatively in problem solving are reported. The contents are based on the TRIZ methodology but have been further reorganized and unified into USIT (Unified Structured Inventive Thinking) for easier to learn and apply. Case studies, published by engineers in technologies and obtained by students for everyday-life problems, are found useful in both teaching/training situations. © 2011 Published by Elsevier Ltd.

Kosaki T.,Hiroshima City University | Sano M.,Osaka Gakuin University
IEEE International Conference on Automation Science and Engineering | Year: 2014

Parallel-link robots, in general, possess high power and high precision owing to the parallel arrangement of actuators; however, their workspace is smaller than that of serial-link robots. In this paper, we develop a parallel-link robot prototype with pneumatic actuators in which a mechanism for varying the actuator inclination is incorporated for the purpose of enlarging the workspace. Our parallel-link robot realizes the rotational and translational motions of the end effector principally by the linear reciprocating motions of pneumatic linear drives mounted on the base. Auxiliary pneumatic actuators are used to adjust the inclination angles of those main pneumatic linear drives. The use of pneumatic actuators to realize the proposed parallel-link robot results in lightweight, compact, and low-cost construction. The workspace and motion transmissibility of our parallel-link robot are analyzed through simulations based on kinematics; then, experimental investigations are carried out using the prototype. © 2014 IEEE.

Fujiwara H.,Osaka Gakuin University | Fujiwara K.,Akita University
IEICE Transactions on Information and Systems | Year: 2016

We reported a secure scan design approach using shift register equivalents (SR-equivalents, for short) that are functionally equivalent but not structurally equivalent to shift registers [10] and also introduced generalized shift registers (GSRs, for short) to apply them to secure scan design [11]-[13]. In this paper, we combine both concepts of SR-equivalents and GSRs and consider the synthesis problem of SR-equivalent GSRs, i.e., how to modify a given GSR to an SR-equivalent GSR. We also consider the enumeration problem of SR-equivalent GFSRs, i.e., the cardinality of the class of SR-equivalent GSRs to clarify the security level of the secure scan architecture. Copyright © 2016 The Institute of Electronics, Information and Communication Engineers.

Thus far, peoples attitudes toward biotechnology and genetically modified (GM) crops have been investigated in the European Union, USA, Japan, and other nations. However, direct comparisons between peoples attitudes toward conventional plant breeding crops and their attitudes toward GM crops will show the characteristics of peoples attitudes toward GM crops more clearly, and this will bring about valuable suggestions considering risk communication about GM crops. The first purpose of this study was to show attitude gaps between conventional plant breeding crops and GM crops. Referring to preceding studies related to the acceptance of biotechnology, a causal model was constructed to predict the acceptance of GM crops and plant breeding crops. Four factors-perceived risk, perceived benefit, trust, and sense of bioethics-were set up as important psychological factors determining the acceptance of GM crops and plant breeding crops in the structural equation models. The second purpose of this study was to verify the validity of these causal models. A social survey was administered in Tokyo, Japan, with a sample of 600 men and women aged 20 years or older who participated. The results showed that people have a more negative attitude toward GM crops than toward conventional plant breeding crops in every factor, that is, perceived risk, perceived benefit, trust, sense of bioethics, and acceptance. The plausibility of the causal models was tested by using structural equation modeling, and the results indicated that the four factors explain the acceptance very well in both models. Moreover, although perceived risk is the most important factor in the acceptance of GM crops, trust is the most important factor in the acceptance of conventional plant breeding crops. © 2013 Taylor and Francis Group, LLC.

Ohtani A.,Osaka Gakuin University
27th Pacific Asia Conference on Language, Information, and Computation, PACLIC 27 | Year: 2013

This paper proposes two syntax-semantics correspondence rules which consistently ac- count for the distribution of Japanese locative postpositions ni and de. We demonstrate how to adapt the machinery of the occurrence of the postpositions based on the assumption of Conceptual Semantics (Jackendoff, 1983; 1990; 1991) to fit the organization of Japanese grammar. The correspondence rules correlate with semantic distinction of verb classes: the semantic field distinction between Spatial and Temporal with respect to the BE-function encoded in the lexical conceptual structure of several verbs. As a result, this paper elucidates the mechanism of locative alternation of the verb aru ‘be’, which has not been fully explicated. © 2013 by Akira Ohtani.

Ohtani A.,Osaka Gakuin University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2011

This paper presents a new analysis of the discourse functions of Japanese particles wa and ga. Such functions are integrated with information structures into the constraint-based grammar under the HPSG framework. We examine the distribution of these particles and demonstrate how the thematic-rhematic dichotomy of the constituent can be determined by the informational status of one or more of its daughter constituents through various linguistic constraints. We show that the relation between syntactic constituency and information structure of a sentence is not a one-to-one mapping as a purely syntax-based analysis assumes, and then propose the multi-dimensional grammar which expresses mutual constraints on the thematic-rhematic interpretation, syntax and phonology. © 2011 Springer-Verlag.

Fujiwara H.,Osaka Gakuin University | Fujiwara K.,Akita University
IEICE Transactions on Information and Systems | Year: 2016

In our previous work [12], [13], we introduced generalized feed-forward shift registers (GF2SR, for short) to apply them to secure and testable scan design. In this paper, we introduce another class of generalized shift registers called generalized feedback shift registers (GFSR, for short), and consider the properties of GFSR that are useful for secure scan design. We present how to control/observe GFSR to guarantee scan-in and scan-out operations that can be overlapped in the same way as the conventional scan testing. Testability and security of scan design using GFSR are considered. The cardinality of each class is clarified. We also present how to design strongly secure GFSR as well as GF2SR considered in [13]. Copyright © 2016 The Institute of Electronics, Information and Communication Engineers.

Loading Osaka Gakuin University collaborators
Loading Osaka Gakuin University collaborators