Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ayako Hiramatsu is active.

Publication


Featured researches published by Ayako Hiramatsu.


systems man and cybernetics | 1995

Scenario generator for qualitative simulation system

Ayako Hiramatsu; Shinya Hata; Takenao Ohkawa; Norihisa Komoda

A qualitative simulation system has been developed for understanding the behavior of a system modeled by a structural model. In decision making, it is necessary to understand the influence flow, namely how the model derives the behavior of the concerning node in the model rather than the behavior of each node. This paper presents a mechanism of scenario generating for explaining the influence flow to the concerning node. The mechanism consists of the following processes: 1) by tracing the structural model, all paths from the input node, which triggers the initial change of the system, to the concerning node are derived, and using similarity of behavior, the influence flow to the concerning node is selected out of all paths; 2) important nodes are selected according to the type of nodes; and 3) the scenario document is generated along the selected flow using the sentence template and the word dictionary.


international conference on computational cybernetics | 2004

Customer analysis of monthly-charged mobile content aiming at prolonging subscription period

Yuji Shono; Yohei Takada; Norihisa Komoda; Hiroaki Oiso; Ayako Hiramatsu; Kiyoyuki Fukaya

Retention of customers is a critical challenge for mobile content providers. This paper presents a customer analysis result aiming at prolonging users subscription. Based on users score information, the access log, and so on, customers who are likely to unsubscribe in near future are identified. Regularity is discovered from the unsubscribed users data using the C4.5 algorithm and a module library is prepared to easily formulate the character sets for the prediction from the users access log. By using various character sets, the prediction of the users subscription period was tested by using 6,000 real users data. We predicted whether a user would unsubscribe within two months, with results showing 72% recall and 65% precision


systems man and cybernetics | 2001

A support system for requirement extraction from BBS using hierarchical fish-eye user interface

Hiroshi Shibata; Takafumi Nozaki; Ayako Hiramatsu; Norihisa Komoda

The paper presents an information compressing 3-dimensional user interface on the support system of requirement extraction from a BBS (Bulletin Board System). To correspond to users viewpoints, the Fish-Eye is applied. With the Fish-Eye, a size of an object on the output screen is decided according to the users attention. This function is realized in topic groups, opinion cards and text in cards respectively. A way of applying Fish-Eye with regards to the topic groups and opinion cards is to show the objects on the inclined coordinates from viewpoints. To realize the Fish-Eye for letters, the priority is set on each sentence in the opinion. The priority is decided from the character of conversational structure, which has a tree structure. With this structure, the attention of the user is specified and is reflected in selecting which sentences should be written in the opinion cards.


systems man and cybernetics | 1997

Case based function tree generator for client-server systems configuration design

Ayako Hiramatsu; A. Naito; Yoshitomo Ikkai; Takenao Ohkawa; Norihisa Komoda

In the requirement analysis part of CIDAC (Case based Integrated Design Assist system for CSS) for system engineering (SE) support, inputed ambiguous requirement data are transformed into concrete requirement data which are forwarded to the design generation function. One type of concrete requirement data is a set of function trees. This tree represents business system structure and helps SE to decide a framework for the target computer system. This paper presents a method that can generate function trees using several already generated function trees. In this method, suitable parts that are chosen by the SE from other cases are automatically merged in order to complete the set of target function trees. Adding the partial cases to the foundation case, a set of target function trees can be combined without duplicate nodes.


systems man and cybernetics | 2000

Adaptive genetic algorithm for on-ramp traffic control

Ayako Hiramatsu; N. Kazuo; H. Shimoura; K. Tenmoku

This paper provides a method that calculates the optimal control of on-ramp traffic density from the basis of the dynamic estimate of traffic density. The on-ramp traffic control problem is formulated as follows. The problem is being able to find the optimal inflow of each on-ramp, based on the evaluation of an on-ramp and main line traffic density. We consider the on-ramp traffic density as the decision variable, and treat this control problem as the nonlinear optimization problem that maximizes the evaluation function under restrictions. To maximize the evaluation function under the restrictions, we propose an adaptive Genetic Algorithm. The solution candidates for on-ramp traffic density have inequality restrictions. Therefore, we consider gene values as ratio of the inflow traffic density within the limit of inequality restrictions. Moreover, in the proposed method, genetic operations are not performed in series, but they are performed in parallel and are adaptive. As numerical examples, we adapt statistical data (the on-ramp traffic density) and examine whether the proposed method can control the traffic jam.


systems man and cybernetics | 1998

A training program for building client server systems and its evaluation using WWW browser

Shingo Honda; Ayako Hiramatsu; Hiroko Yamamatsu; Hiroshi Morihisa; Yoshitomo Ikkai

Describes a training program for building client-server systems (CSSs) which uses intranet technology in particular for novice software engineers (SEs). This program is a part of a seminar about techniques for building CSSs. The training program contains a target system and manuals. An order management system is selected as the target application. One exercise in this program is to program part of the target system, which contains many techniques for developing CSSs. The training manuals are given as HTML documents. Six experimental examinees used the training program in order to evaluate it. References logs for manuals, programming logs and compiling logs were recorded. The training process was divided into three phases: understanding, programming and debugging. The duration of each phase was calculated. The results showed that students could be trained in a limited amount of time, efficiently and easily.


Electrical Engineering in Japan | 1998

An explanation of a composition method for client server system configuration design based on significant judgment

Ayako Hiramatsu; Yoshitomo Ikkai; Takenao Ohkawa; Norihisa Komoda

In regard to the design of client server systems (CSS), rapid progress in technology prevents an individual system engineer (SE) from utilizing effective cases. The numerous combinations of hardware and software and complexity in requirement analysis make it difficult for an SE to acquire CSS design technique and it is therefore necessary to support CSS design. n n n nIn this paper, we propose a CSS configuration design support system that consists of the following four functions: a conversational requirement analysis function, a case based configuration planning function, a plan analysis-explanation function, and an adaptable knowledge learning function. In particular, plan analysis-explanation gives educational support to SEs for CSS design. This explanation is written in natural scenario language which shows how the proposed CSS is designed and how the designed CSS satisfies requirements. The scenario is generated based on structural models that show the processes of requirement analysis and design assumptions. Effective information is selected from nodes in the models in order to generate concise scenarios.


Ieej Transactions on Electronics, Information and Systems | 2005

Method for Atypical Opinion Extraction from Ungrammatical Answers in Open-ended Questions

Ayako Hiramatsu; Shingo Tamura; Hiroaki Oiso; Norihisa Komoda


Ieej Transactions on Electronics, Information and Systems | 1996

Scenario Generator for Qualitative Simulation System by Extracting Causality Based on Similarity of Behavior

Ayako Hiramatsu; Shinya Hata; Takenao Ohkawa; Norihisa Komoda


Ieej Transactions on Electronics, Information and Systems | 2008

Prediction of Travel Time in Urban District Based on State Equation

Ayako Hiramatsu; Kazuo Nose; Kenji Tenmoku; Takeshi Morita

Collaboration


Dive into the Ayako Hiramatsu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kazuo Nose

Osaka Sangyo University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kenji Tenmoku

Sumitomo Electric Industries

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Takeshi Morita

Sumitomo Electric Industries

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge