Saitama, Japan
Saitama, Japan

Rissho University , one of the oldest universities in Japan, was founded in 1580, when a seminary was established as a learning center for young monks of the Nichiren shu.The university's name came from the Rissho Ankoku Ron, a thesis written by Nichiren, a prominent Buddhist priest of the Kamakura period. Rissho University enrolls approximately 11,900 students. It has 14 undergraduate departments and 6 graduate school research departments on two separate campuses. Wikipedia.

SEARCH FILTERS
Time filter
Source Type

Shinoda H.,Rissho University | Skrandies W.,Justus Liebig University
NeuroReport | Year: 2013

Japanese Kanji constitutes meaningful logograms, and its processing shows interhemispheric features. In the present study, human semantic learning of Kanji characters in 18 healthy native German adults was examined. Twenty Kanji characters were presented before and after a learning phase of about 20 min, and the electroencephalographic activity was recorded from 30 electrodes and averaged for each condition. Twenty different Kanji characters served as control stimuli. Successful learning was observed in all participants. The evoked potential maps showed the largest component occurring over occipital areas at latencies between 100 and 130 ms. Significant differences in the field strength (global field power) were observed for this component before and after learning. After learning, the distribution between the left and the right hemispheres significantly changed the negative centroid location from the left to the right hemisphere and from the posterior to the anterior area in each hemisphere. These effects were observed only after successful learning, and our findings suggest that the acquisition of meaning of Kanji characters following intensive short-term learning is related to neurophysiological changes at an early stage of processing. The topographical changes in electrical brain activity reflect plasticity presumably in primary sensory areas during learning of meaningful materials that is related to top-down information processing. © 2013 Wolters Kluwer Health | Lippincott Williams & Wilkins.


Noriyuki S.,Tohoku University | Noriyuki S.,Rissho University
Population Ecology | Year: 2015

In nature, closely related species often utilize different host species, but it is still unclear what factors contribute to the evolution and maintenance of such diversified host selection. In this review, I describe how negative interspecific mating interactions (reproductive interference) can shape host selection by animals, focusing mainly on phytophagous and predatory insects. First, I explain an important premise of this hypothesis, which is that the adult reproductive site is the same as the feeding site for the offspring. Next, I describe several mathematical models and well-studied empirical systems to show that reproductive interference can sufficiently drive and maintain different host selection between phylogenetically related species. Then, I argue for the first time that reproductive interference can cause an oviposition preference in insects that is not optimal for the survival and development of the offspring, as a result of maternal adaptive behavior that maximizes the mother’s own fitness. Furthermore, I argue that in insects, reproductive interference probably shapes oviposition behavior before the female alights on the host (e.g., habitat preference), without affecting post-alighting decision making. I would like to emphasize that these two arguments represent the novel approach to clarify the unrevealed pattern of complex insect oviposition behavior. © 2015, The Society of Population Ecology and Springer Japan.


Enokido T.,Rissho University | Takizawa M.,Seikei University
Proceedings - International Conference on Advanced Information Networking and Applications, AINA | Year: 2012

The power consumption of information systems, especially servers has to be reduced to realize green eco-society. A client first selects a server in a collection of possible servers and issues a request to the server. The request is performed as a process in the server. In this paper, we consider a computation type of application where CPU resource is mainly used in a server. It is critical to discuss how to select a server for each request from clients in order to reduce the total power consumption. The power consumption laxity based (PCLB)algorithm for selecting a server is discussed in this paper, where a server to consume the minimum power to perform a process is selected. In a server, cooling devices like CPU fans consume the electronic power in addition to CPU and other devices. In our previous studies, we assume the cooling devices consume the constant power and propose the simple power consumption model. In the simple power consumption model, if at least one application process is performed on a server, the electric power is maximally consumed on the server. Otherwise, the electric power consumption is minimum. The rotation speed of a fan is controlled in servers based on the temperature of CPU and in the server's case. Thus, the total power consumption of a server depends on not only the power consumption of computational devices like CPU but also the power consumption of cooling devices like fans. In this paper, we extend the simple power consumption model to take into account the power consumption of cooling devices. We improve the PCLB algorithm based on the extended simple power consumption model. © 2012 IEEE.


Enokido T.,Rissho University | Aikebaier A.,Seikei University | Takizawa M.,Seikei University
IEEE Transactions on Industrial Electronics | Year: 2011

Information systems are composed of various types of computers interconnected in networks. In addition, information systems are being shifted from the traditional clientserver model to the peer-to-peer (P2P) model. P2P systems are scalable and fully distributed without any centralized coordinator. Here, it is getting more significant to discuss how to reduce the total electric power consumption of computers in addition to developing distributed algorithms to minimize the computation time and memory space. In this paper, we do not discuss microlevel models like the hardware specifications of computers like low-energy CPUs. We rather discuss a macrolevel model to show the relation of the amount of computation and the total power consumption of multiple peer computers to perform Web types of application processes. We also discuss algorithms for allocating a process to a computer so that the deadline constraint is satisfied and the total power consumption is reduced. © 2010 IEEE.


Enokido T.,Rissho University | Takizawa M.,Seikei University
IEEE Transactions on Industrial Electronics | Year: 2011

Cyber engineering is getting more significant in not only manufacturing but also business applications. Information management technologies play a key role in cyber engineering. In order to realize the cyber engineering, objects in information systems are required to be not only secure but also consistent in the presence of security threats and multiple conflicting transactions. There are so far many discussions on each of the security management and concurrence control. However, there is no discussion on synchronization mechanisms to realize both of them. In this paper, we discuss a novel synchronization protocol to make an information system not only secure but also consistent. In the role-based access control model, authorized access requests are specified in roles which are collections of access rights. A transaction issued by a subject is assigned with a subfamily of the roles granted to the subjects, which are named purpose. We first define legal information flow relations among purposes. Based on the legal information flow relations, we discuss a purpose-marking (PM) protocol to prevent illegal information flow to occur by performing conflicting transactions in a serializable way. We evaluate the PM protocol in terms of the number of transactions to be aborted. © 2010 IEEE.


Enokido T.,Rissho University | Takizawa M.,Seikei University
IEEE Transactions on Industrial Electronics | Year: 2013

In order to realize green ecosocieties, the total electric power consumption of computers and networks is required to be reduced. In applications on distributed systems, clients issue service requests to servers and then servers send replies to clients. Here, we discuss how much electric power a server consumes since the power consumption of a client is neglectable compared with a server. We classify applications into transaction- and communication-based ones. A server mainly consumes CPU resources to perform the transaction-based applications. On the other hand, a server consumes communication resources to transmit a large volume of data to a client in communication-based applications. In our previous studies, the power consumption laxity-based and extended power consumption-based algorithms are proposed to select one of servers so that the total power consumption of servers is reduced for transaction- and communication-based applications, respectively. However, most applications are mixed types, i.e., composed of both the transaction and communication processing modules. Hence, we consider the mixed types of applications in this paper. First, we integrate the power consumption models of transaction- and communication-based applications into a modified simple power consumption (MSPC) model of a server. Based on the MSPC model, we propose an algorithm to select one of servers for mixed types of applications so that the total power consumption of servers can be reduced. We show the power consumption of servers can be reduced in the algorithm through the simulation. © 2012 IEEE.


Okada I.,Soka University | Yamamoto H.,Rissho University
ACM Transactions on Intelligent Systems and Technology | Year: 2013

Which risk should one choose when facing alternatives with different levels of risk?We discuss here adaptive processes in such risk choice behavior by generalizing the study of Roos et al. [2010].We deal with an n-choice game in which every player sequentially chooses n times of lotteries of which there are two types: a safe lottery and a risky lottery. We analyze this model in more detail by elaborating the game. Based on the results of mathematical analysis, replicator dynamics analysis, and numerical simulations, we derived some salient features of risk choice behavior. We show that all the risk strategies can be divided into two groups: persistence and nonpersistence. We also proved that the dynamics with perturbation in which a mutation is installed is globally asymptotically stable to a unique equilibrium point for any initial population. The numerical simulations clarify that the number of persistent strategies seldom increases regardless of the increase in n, and suggest that a rarity of dominant choice strategies is widely observed in many social contexts. These facts not only go hand-in-hand with some well-known insights from prospect theory, but may also provide some theoretical hypotheses for various fields such as behavioral economics, ecology, sociology, and consumer behavioral theory. © 2013 ACM.


Since the 1980s, giant bamboo groves consisting mainly of naturalized Phyllostachys pubescens have been expanding in Japanese rural landscapes (satoyama). Using aerial photographs, I evaluated changes in bamboo grove distribution between 1947 and 2006 at Mount Hachiman, Ohmi-hachiman City in western Japan, where there is an area of satoyama landscape adjacent to the suburbs. I also quantitatively determined the natural and artificial factors that accelerated bamboo grove expansion using a multiple logistic regression analysis with stepwise procedure. I attempted to describe the positions of bamboo groves in Japanese satoyama landscapes. The area of bamboo groves in the survey area expanded after 1967. The bamboo groves are located at the base of mountain slopes and on alluvial fans adjacent to residential areas, where they are most susceptible to human interferences (mainly disturbance). They mark the boundary between agricultural fields and secondary forests. The model analysis indicated that the abandonment of lands adjacent to bamboo groves caused bamboo-grove expansion. As forests and agricultural land were abandoned, bamboo, mainly P. pubescens, invaded these areas by rhizomatous clonal growth. Bamboo grove expansion in Japanese satoyama landscapes is dependent on the type of land use, topography, and existing vegetation as well as the invasive life-history traits of P.pubescens. I determined the natural and artificial factors that accelerated bamboo grove expansion between 1947 and 2006 using a multiple logistic regression analysis. As forests and agricultural land were abandoned, giant bamboo invaded these areas. The expansion of bamboo groves can be used as an index phenomenon for satoyama landscape abandonment. Copyright © 2015 The Society for the Study of Species Biology.


This study focuses on "kyaba-cula hostesses" as women who engage in Japan's commercial sex industry. Their commoditized service is primarily not physical but consists of communication with male customers while offering food and drinks. This study analyzes the different types of kyaba-cula hostesses, their varying professional circumstances, and the effectiveness of their respective cognitive coping strategies for maintaining self-esteem and personal adjustment. The original research took the form of a questionnaire survey interviewing women working as kyaba-cula hostesses in Tokyo, Japan (N = 92), about their work. About 80 % of the participants were in their 20s, and about 40 % had been working there for less than 1 year. Twenty-two percent were students, and about 30 % were married or had children. The questionnaire results revealed the following: (1) kyaba-cula hostesses demonstrated a higher perceived occupational stigma than workers in general Japanese society; (2) their most effective coping strategies were Social Comparison and Social Value Added for maintaining self-esteem and Family Value Added for reducing their sense of maladjustment; (3) ultimately, in this study, the Disengagement strategy was revealed to be unsuccessful, as it decreased occupational self-esteem and increased their sense of maladjustment; and (4) kyaba-cula hostesses can be grouped into four types (Long-term Low Income, Child-Rearing, High Income, and Part-time) according to the job and demographic characteristics, and the perceived occupational stigma or coping strategies differed among these types. © 2013 Springer Science+Business Media New York.


I report for the first time the parasitization of overwintering gynes of Parapolybia species by the entomogenous nematode Sphaerularia sp. (Tylenchidae). The nematode was found in 42% of the overwintering wasp clusters examined but occurred in only 6% of individual wasps. The prevalence of parasitic nematodes among group hibernating hymenoptera is briefly discussed and compared with that in solitary hibernating hymenopterans.Copyright Helmuth Aguirre et al.

Loading Rissho University collaborators
Loading Rissho University collaborators