著者
佐藤 諒 西村 夏夫 保木 邦仁
出版者
一般社団法人情報処理学会
雑誌
研究報告ゲーム情報学(GI) (ISSN:09196072)
巻号頁・発行日
vol.2014, no.11, pp.1-6, 2014-03-10

本研究では,シャンテン数が下がるような牌を有効牌とし,数手先の有効牌を数え上げることによって牌効率を向上させた麻雀 AI の性能を評価することを目的とした.簡単のために副露や降りをしない面前全ツッパに麻雀AIの戦略を制限した.性能評価は,インターネット雀荘 「東風荘」 で人間のプレイヤーと対局させ,安定レートや他の統計情報を利用して行った.In this work, we analyze the performance of Mahjong AI programs that count the number of effective legal moves. Here, an effective legal move decreases Shanten numbers (the number of tiles away from tempai). For the sake of simplicity, we limit the strategy of AI programs to Menzen-Zentsupa strategy (no open melds by calling and no defense by discarding safe tiles). The performance is measured in the internet Mahjong server, Tonpu-So, with human players and it is analyzed in terms of rating and other statistic information.
著者
吉本 公則 佐藤 諒 石原 佑彌 山口 明彦 吉川 雅博 池田 篤俊 高松 淳 小笠原 司
出版者
一般社団法人 日本機械学会
雑誌
ロボティクス・メカトロニクス講演会講演概要集 2014 (ISSN:24243124)
巻号頁・発行日
pp._3P1-S03_1-_3P1-S03_4, 2014-05-24 (Released:2017-06-19)

It is important to realize the robot handling soft objects. In this paper, we treat a string as an example of soft objects. Humans can create various figures with a string; we aim to develop a robot system that can do such a thing. We employ the string figures as the task. We propose a framework with which a robot can play string figures with a human. Concretely, we develop a description method that can represent a variety of procedures of string figures to be played by a robot and a human pair. In order to implement this framework on a dual-arm robot, we also develop a method to decide centers of loops to be picked up using camera images. This paper demonstrates the experimental results with a dual-arm robot Hiro-NX.
著者
佐藤 諒
出版者
日本幼稚園協会
雑誌
幼児の教育
巻号頁・発行日
vol.65, no.3, pp.27-30, 1966-03-01
著者
石沢 千佳子 佐藤 諒 西田 眞
出版者
The Institute of Image Information and Television Engineers
雑誌
映像情報メディア学会誌 (ISSN:13426907)
巻号頁・発行日
vol.67, no.8, pp.J319-J322, 2013

Portable storage media, such as universal serial bus (USB) ash drives, are used to carry digital data. However, a great deal of data leaks as a result of users forgetting to delete data copied to a personal computer from portable storage media. We propose a technique to detect the remains of copy content files by analyzing the clipboard and directory logs obtained from a personal computer. Our experimental result suggests that the technique can be used to accurately detect files containing copy left behind.