Journal of Robotics, Networking and Artificial Life
Volume 11, Issue 1, May 2025
Research Article
1.The Intrusion Detection Solution for Isolated Industrial Control Environments
I-Hsien Liu, Nai-Yu Chen, Pei-Wen Chou, Jung-Shian Li
This study explores the implementation of intrusion detection solutions,
specifically Snort, in industrial control environments that use network
segregation as a security measure. Unlike traditional deployments at gateway
ports, our research integrates Snort directly within isolated networks,
customized with specific operational technology (OT) rules. The effectiveness
of this system was tested using the TWISC@NCKU Critical Infrastructure
cybersecurity testbed in Taiwan. This findings indicate that this strategic
approach can successfully detect anomalies in network traffic, effectively
addressing the common challenge of limited monitoring in segregated network
environments.
Pages: 1–5
Download article (PDF)
Research Article
2.Q-learning approach for Nurse Rostering: Addressing Variations in Work
Patterns and Visualization of Results
Masato Nagayoshi, Hisashi Tamaki
Creating a duty roster that meets all the various requirements of nurse
rostering is extremely challenging. Consequently, many researchers have
studied nurse rostering. Despite these efforts, the shift schedules generated
by these studies are often not practical in their initial form, as they
require adjustments to accommodate various constraints and evaluation criteria.
Thus, we have proposed a method for revising duty roster using Q-learning
in a constructive nurse rostering. This paper explores the potential for
developing a practical duty roster that accommodates nurses with varying
duty plan valuations. This involves considering each nurse's lifestyle.
Additionally, we visualize the duty plan valuations of the revised rosters
we obtain.
Pages: 6-10
Download article (PDF)
Research Article
3.Framework of a Disinformation Game Based on the Narrative Warfare in Russo-Ukrainian
War
Jumpei Ono, Takashi Ogata
Since Russia invaded Ukraine in 2022, information related to the invasion
has increased. This information is spread through social networking services
and TV programs. This study proposes a framework for a disinformation game
system. In the game, a player spreads disinformation. In particular, we
discuss topics related to the Russo–Ukrainian War in February 2022. The
game systemprovides players with mental immunity to disinformation by simulating its
spread. Three experiments were conducted in this game. In experiments on
the proposed game, people gradually lost their resistance to disinformation
by repeatedly receiving disinformation.
Pages: 11-19
Download article (PDF)
Research Article
4.Programming Education Using Maze Exploration for Junior High School Student
Kenji Kimura, Youta Takano
With the recent emergence of Amazon warehouses and service robots at airports
and hotels, it is believed that we will enter an era in which humans and
robots will struggle to coexist. Elementary and junior high school students
need robotics education, which sparks their interest at an early stage.
In response, higher education institutions are actively working on robot
education, but most of them focus on online tracing using microcomputers.
In this study, students from a technical college organized a workshop for
third-year junior high school students to teach robotics about maze exploration.
The lecture was evaluated by means of a questionnaire.
Pages: 20-25
Download article (PDF)
Research Article
5.Design and Implementation of an Automated Shopping Companion for Elderly
Support and Mobility Enhancement
Dina Koushek, Mastaneh Mokayef, MHD Amen Summakieh, M.K.A Ahamed Khan,
Abdul Qayyum, Sivajothi A/L Paramasivam
The proposed system utilizes facial recognition technology to detect and
track the user, eliminating the need for physical effort in pushing a shopping
cart. Additionally, the robotic trolley is equipped with an ultrasonic
sensor that estimates the distance walked by the user, providing them with
valuable information about their physical activity levels during the shopping
trip. The implementation of this system leverages the OpenCV computer vision
library within the Python programming framework, enabling the integration
of the facial recognition and distance estimation capabilities. Evaluation
of the developed prototype has demonstrated significant improvements in
the quality of life and independence of elderly individuals, as they can
now navigate the shopping environment with greater comfort and ease. This
innovative robotic shopping companion represents a promising solution to
enhance the shopping experience for the aging population, addressing their
unique needs and empowering them to maintain their autonomy, well-being,
and public health during their daily activities.
Pages: 26-33
Download article (PDF)
Research Article
6.Enhancing Tourism in Takachiho through VR and AR Technologies: A Case Study
on Virtual Scenic Experiences and Interactive Features
Satoshi Ikeda, Makoto Sakamoto, Amane Takei, Takao Ito
Miyazaki Prefecture faces several challenges in its tourism industry and
has adopted various strategies to address them. In 2016, technologies like
VR and AR gained attention. In response, our company developed a new smartphone
app leveraging virtual technology, offering unique features to attract
more tourists and encourage repeat visits.
Pages: 34-37
Download article (PDF)
Research Article
7.Trigger Circuit Board Design for Coordinated EEG, Motion, and Eye Gazing
Recording in Two Person: A System Integration Approach
Masayuki Fujiwara, Phan Hoang Huu Duc, Laurent Bougrain, Patrick Hénaff,
Hiroaki Wagatsuma
Integrative data analysis, which involves the simultaneous recording of
EEG, motion, and eye gazing in humans, is increasingly recognized for its
potential to yield new scientific insights. To establish these simultaneous
measurements, signal synchronization of multiple time courses is necessary,
time data from different measurement instruments must be managed finely,
and time offsets must be corrected. However, such accurate time management
from the triggers requires a fine design of circuit boards with the integrated
transistor-transistor logic signal voltage. This study presents a design
concept and mechanism for a trigger circuit, demonstrating that the proposed
experimental system effectively addresses these challenges. A custom trigger
circuit board, combined with a microcontroller, was developed to handle
voltage signals and ensure seamless synchronization between different devices.
The trigger signal output from the circuit board can be controlled and
demonstrated through system integration across multiple measurement instruments.
It should be noted that the accuracy of trigger signal output may be influenced
in part by the system clock of the operating system, but the integrated
trigger circuit board and the measurement system enable precise and reliable
synchronous measurements, with the potential for further synchronous analysis.
Pages: 38-43
Download article (PDF)
Research Article
8.Adapting the DeepInsight Method for Non-Image Data in Stock Analysis
Satoshi Ikeda, Toyoaki Tomioka, Makoto Sakamoto, Takao Ito
This research addresses the challenges posed by the "curse of dimensionality"
in machine learning, particularly in the context of non-image data. As
the number of features increases, the complexity and computational costs
escalate, making accurate model construction difficult. Two primary strategies
are employed to mitigate this issue: dimensionality reduction techniques
and methods that restrict feature combinations. This study aims to develop
a generic DeepInsight framework that systematically transforms variable
configuration, feature extraction, and model building processes. By applying
this framework to stock price prediction, we seek to enhance the predictive
accuracy and validate the effectiveness of Deep Learning approaches in
non-image data analysis.
Pages: 44-48
Download article (PDF)
Research Article
9.A Comparative Study on Long-term Cryptocurrency Price Prediction Using
LSTM, GRU, and Bi-LSTM
Satoshi Ikeda, Tsutomu Ito, Kodai Hasebe, Fumito Hamakawa, Bidesh Biswas
Biki, Amane Takei, Makoto Sakamoto, Md Riajuliislam, Sabrina Bari Shital,
Takao Ito
Cryptocurrency price fluctuations, though widely studied, remain unpredictable,
posing risks for investors. While many aspire to profit, the volatility
makes accurate prediction challenging. Deep learning has recently gained
traction as a promising approach for cryptocurrency price forecasting.
This study focuses on long-term price prediction for Bitcoin, Ethereum,
Litecoin, and Cardano using LSTM, GRU, and Bi-LSTM models. The performance
of these models is evaluated and compared with findings from previous studies.
Pages: 49-53
Download article (PDF)
Research Article
10. A High-Speed Estimation Method of Parameters in Impulse Response for
Compartment Models
Toshiki Tanaka, Ivan Tanev, Tetsuo Hattori
This paper proposes a high-speed parameters estimation method for compartment
model where output function is described by the convolution between input
function and impulse response, which is like a time-invariant linear system.
The proposed method uses linear regression analysis based on the equivalently
transformed equation that can be obtained using the processing of Differentiation
of Convolution with Exponential function (DCE). In this paper, taking the
issue of parameters estimation in PET (Positron Emission Tomography) inspection
system and RLC series electrical circuit for examples, we reveal that the
method can estimate parameters of those impulse responses in high speed,
by showing the experimental results. Moreover, we explain the advantage
of our method comparing to the conventional standard method such as conjugate
gradient method and the extended Newton one.
Pages: 54-60
Download article (PDF)
Research Article
11. Parallel Finite Element Subdivision Method for Electromagnetic Analysis
of a Large Interior Space
Nanako Mizoguchi, Kento Ohnaka, Hironobu Sugiyama, Shouichi Fujimoto, Sota
Goto, Toshio Murayama, Amane Takei
In high-frequency electromagnetic field analysis, it is necessary to divide
the waveform into elements whose maximum side length is 1/10 to 1/20 of
the wavelength so that the waveform can be expressed with low error when
a space is divided. Therefore, in many cases, it becomes a large-scale
problem. In this study, due to the need for electromagnetic compatibility
(EMC) evaluation of the surrounding electromagnetic field generated when
a microwave scalpel is used in surgery, a large-scale electromagnetic analysis
method for the microwave region inside the operating room has been developed.
In this paper, the introduced parallel mesh subdivision function enables
high-speed mesh generation with hundreds of millions of elements. In addition,
this method provided a successful analysis.
Pages:61-68
Download article (PDF)
Research Article
12. DamChain: A Dam Warning System Based on Blockchain
I-Hsien Liu, YingCheng Wu, Chu-Fen Li, Jung-Shian Li
Ensuring the data integrity and safety of dam infrastructure is a major
challenge. In recent years, numerous cyberattacks have targeted critical
infrastructure, underscoring the importance of security systems. To address
this challenge, we propose DamChain, a warning system designed to improve
the data integrity and security of dam infrastructure based on blockchain
technology. The decentralized ledger of blockchain records data in a transparent
and immutable manner, which is important for ensuring the integrity of
data and preventing unauthorized modification. This system aims to provide
a solution that maintains the data integrity and is designed to provide
a warning mechanism about water levels, improving the security and data
integrity of dams.
Pages: 69-72
Download article (PDF)
Research Article
13. MiniDAM: A Comprehensive Toolkit for Dam Cybersecurity
I-Hsien Liu, Tzu-En Peng, Meng-Wei Chang, Yun-Hao Chang, Jung-Shian Li
Testbeds play a crucial role in cybersecurity research for critical infrastructure
by simulating realistic environments. This paper presents an in-depth examination
of the MiniDAM toolkit and our developed testbed, which is modeled on actual
dam operation standards. We provide a detailed overview of its functionalities.
Additionally, a comparative study is conducted between MiniDAM, our testbed,
MiniCPS, and the Secure Water Treatment (SWaT) testbed. This work further
discusses the process of generating datasets and incorporating additional
features. The capabilities of MiniDAM are demonstrated as a robust platform,
significantly contributing to the advancement of research in dam cybersecurity.
Pages: 73-77
Download article (PDF)
Research Article
14. Blockchain-Based Monitoring of Industrial Control System
I-Hsien Liu, Yun-Hao Chang, Tzu-En Peng, Jung-Shian Li
This paper describes an innovative design by using blockchain to improve
the verification and security of data in industrial control systems. Combining
the decentralized-blockchain, the Programmable Logic Controller, and Human
Machine Interface. The design strengthens the overall data security. With
the immutable recording function of blockchain, PLC can manage data interactions
and conduct real-time monitoring. After testing and simulation, the practicability
and effect of this innovative design were proved, and shows the potential
of this work.
Pages: 78-82
Download article (PDF)
Research Article
15. Recognition of Guqin Music Notation of Jianzi Pu by Deep Learning Methods
Takashi Kuremoto, Kazuma Fujino, Hirokazu Takahashi, Shun Kuremoto, Mamiko
Koshiba, Hiroo Hieda, Shingo Mabu
The music notation of Guqin (“古琴”, Chinese seven-string zither) named “Jianzi
Pu (減字譜, simplified music notation of Guqin)” was invented at the Middle
of A.D. 700, and Guqin music remained more than 600, however, only about
100 of them are played in nowadays. The reason is that the handwritten
“Jianzi Pu” is hard to be understood even for experts or professional Guqin
players. In this study, we applied deep learning methods such as VGG16
and YOLOv5 to the recognition of a Guqin notation “Sen-O-So” (仙翁操, Melody
of the Immortal Elder). Firstly, we created a dataset including 55 kinds
of single characters of Sen-O-So in 4,951 images from 23 versions found
on the Internet and obtained by data augmentation, i.e., image processing
such as rotation, enlargement (zoom-in), reduce (zoom-out), various filtering,
etc. Secondly, we compared the recognition rates of VGG16 and YOLOv5 in
the experiment. The average accuracies of 55 classes images by VGG16 and
YOLOv5 were 87.50% and 88.47% respectively for the test data. Additionally,
we created a dataset of Sen-O-So video clips to match the recognition results
of single characters by YOLOv5 and realized an online ancient music restoration
system development.
Pages:83-88
Download article (PDF)