|
|
- しほこ ことじ
- 5 years ago
- Views:
Transcription
1
2
3 LIME i
4
5 Abstract Of Bachelor Thesis Academic Year 2018 Machine Learning models indicating concrete criteria for malware analysis Summary Nowadays, malware has been threatening Internet security. To detect and classify malware, a lot of research and products using machine learning have been proposed, especially for end point detection. Whilst the research and products are arguing that they have high accuracy in various constraints, it is insufficient to give the models result from the perspective of malware analysts, for they want clues of results for further investigation. Especially in case of using complex models, it is much more difficult to know the clues. In this thesis we will present new machine learning models for malware analysis. the models will indicate not only detection result, but also concrete part of feature that are attributed to detection or classification result. To realize that, we will use algorithm called LIME to approximate complex machine learning models. As an examination, we use this models for ransomware classification and make sure that the extracted features are appropriate. By using this models, it is expected that malware analysts can take countermeasure for malware by getting the clues of classification result. Keywords Machine learning, Malware analysis, Data analysis Faculty of Law Keio University Kei Nomaguchi iii
6
7 LIME StackNet (1) (2) (1) API (2) API v
8 21 A 25 B 29 C 31 D 35 vi
9 LIME vii
10 Stacking CryptLocker Kovter Locker Reveton (2) B viii
11 : C2 OS 1
12 1.1.2 [15],
13 [21] 2.1: 2.1 C2 C2 3
14 2.1: CryptoLocker Wannacry Petya Badrabbit UIWIX Reveton Kovter C2 C2 Eternal Blue Windows Petya Wannacry FBI Ranscam [16]?? Wannacry[8] [29] Wannacry UIWIX[30] Petya[22] Badrabbit[7] : 4
15 [3] Khazar [17] Andrea [5] Khazar OS [18] Khazar Cylance [6] Saxe PE Deep Neural Netwoek [26] 5
16 [28] Deep Neural Network Zhou [31] 2017 [13] Deep Neural Network SVC [1] SVC Deep Neural Network [11] [20] [14] [2] 2017 Deep Neural Network [12] GAN [13] [9] 6
17 3 3.1 LIME StackNet : 7
18 3.1.2 LIME LIME[25] LIME : LIME ξ(x) = argmin g G L(f, g, π x ) + Ω(g) (3.1) x G g L x G Ω g g 8
19 : OS Ubuntu LTS LIME RISS 371 StackNet(scikit-learn , xgboost 0.7 ) Imperial College London RISS [27] API 3.2 API 1 3.2: CryptLocker 107 Kovter 64 Locker 97 Reveton StackNet StackNet [24] 1 9
20 Kaggle : Stacking SVC 2 RandomForest 4 Naive Bays 4 XGBoost 7 RandomForest Logistic Regression F (1) SVC w f = w 2 (w T (x p x n )) 2 (3.2) SVC SVC (2) Random Forest Random Forest K g = 1 p 2 (C i t) (3.3) i=1 10
21 (3) Naive Bays P (B A) = P (A B)P (B) P (A) (3.4) P (A) P (A B) N P (A B) = P (x i Y ) (3.5) i=1 (4) XGBoost Random Forest (5) Logistic Regression ϕ(z) = e z (3.6) 11
22
23 : (1) (2) API API (1) (1) Windows API 1 API API API (2) (2) LIME Win32/CTBLocker Win32/TorrentLocker 13
24 4.1: : CertOpenStore CryptAcquireContextA RtlAddVectoredExceptionHandler SetWindowsHookExA NtSetContextThread FindResourceExW CoInitializeSecurity NtTerminateThread NtAllocateVirtualMemory SetFilePointerEx VirtualFreeEx CertOpenSystemStoreA NtCreateMutant RtlDecompressBuffer
25 (1) API 4.3, 4.4, 4.5, : CryptLocker API API API API1 CryptAcquireContextA RtlDecompressBuffer SetFilePointerEx API2 4.4: Kovter API API API API1 CryptAcquireContextA InternetCloseHandle SetFilePointerEx API2 InternetOpenUrlW SetFileAttributesW 4.5: Locker API API API API1 CryptAcquireContextA InternetOpenUrlW GetFileSize API2 SetFileAttributesW 15
26 4.6: Reveton API API API API1 CryptAcquireContextA DnsQuery W SetFilePointerEx API2 CryptGenKey InternetCrackUrlW SetFileAttributesW (2) API : (2) StackNet 28 LIME
27 5 5.1 API 8 LIME
28
29 ,,,, Rodney D. Van Meter III, Sigma ISC Korry Luke Ko You Liang Aaron Tang Andrey Ferrryan Flo Costa SNS 2016 ROP exploitation 19
30 This one s dedicated to all the hackers. 20
31 [1] Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, and Konrad Rieck. Drebin: Effective and explainable detection of android malware in your pocket, [2] Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. Synthesizing robust adversarial examples. CoRR, Vol. abs/ ,, [3] AV-TEST. AV-TEST The Independent IT-security Institute(Cited 12th December 2017). [4] Barun. Reversing the petya ransomware with constraint solvers(cited 12th December 2017). [5] Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, and Federico Maggi. Shieldfs: A self-healing, ransomware-aware filesystem. In Proceedings of the 32nd Annual Computer Security Applications Conference. ACM, [6] Cylance. Cylance PROTECT(Cited 12th December 2017). [7] Endgame. BadRabbit Technical Analysis(Cited 12th December 2017). [8] Endgame. WCry/WanaCry Ransomware Technical Analysis(Cited 12th December 2017). [9] Hyrum Anderson Anant Kharkar Bobby Filar and Phil Roth. Evading machine learning malware detection. BlackHat USA, [10] Joseph Gardiner and Shishir Nagaraja. On the security of machine learning in malware c&c detection: A survey. ACM Comput. Surv., Vol. 49, No. 3, pp. 59:1 59:39, [11] I. Goodfellow, J. Shlens, and C. Szegedy. Explaining and Harnessing Adversarial Examples. ArXiv e-prints, December
32 [12] Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, and Patrick D. McDaniel. Adversarial perturbations against deep neural networks for malware classification. CoRR, Vol. abs/ ,, [13] Weiwei Hu and Ying Tan. Generating adversarial malware examples for black-box attacks based on GAN. CoRR, Vol. abs/ ,, [14] A. Ilyas, L. Engstrom, A. Athalye, and J. Lin. Query-Efficient Black-box Adversarial Examples. ArXiv e-prints, December [15] Heju Jiang, Jasvir Nagra, and Parvez Ahammad. Sok: Applying machine learning in security - A survey. CoRR, Vol. abs/ ,, [16] Kaspersky. Ranscam (Cited 12th December 2017). [17] Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. Unveil: A large-scale, automated approach to detecting ransomware. In 25th USENIX Security Symposium (USENIX Security 16), pp , Austin, TX, USENIX Association. [18] Amin Kharraz and Engin Kirda. Redemption: Real-time protection against ransomware at end-hosts. In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), [19] Youngjoon Ki, Eunjin Kim, and Huy Kang Kim. A novel approach to detect malware based on api call sequence analysis. Int. J. Distrib. Sen. Netw., Vol. 2015, pp. 4:4 4:4, January [20] Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. Adversarial examples in the physical world. CoRR, Vol. abs/ ,, [21] Allan Liska and Timothy Gallo. Ransomware : Defending against digital extortion. O Reilly Media, Incorporated, p. 6, [22] Malwarebytes. Petya Taking Ransomware To The Low Level(Cited 12th December 2017). [23] Micheal Shikorski and Andrew Honig. Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software. No Starch Press, p. 1, [24] Sebastian Raschka. Mlxtend, April [25] Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. why should I trust you? : Explaining the predictions of any classifier. CoRR, Vol. abs/ ,,
33 [26] Joshua Saxe and Konstantin Berlin. Deep neural network based malware detection using two dimensional binary program features. In Proceedings of the th International Conference on Malicious and Unwanted Software (MALWARE), MALWARE 15, pp , Washington, DC, USA, IEEE Computer Society. [27] Daniele Sgandurra, Luis Muñoz-González, Rabih Mohsen, and Emil C. Lupu. Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. CoRR, Vol. abs/ ,, [28] Shun Tobiyama, Yukiko Yamaguchi, Hajime Shimada, Tomonori Ikuse, and Takeshi Yagi. Malware detection with deep neural network using process behavior IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Vol. 2, pp , [29] TrendMicro. WannaCry 2017 (Cited 12th December 2017). [30] TrendMicro. UIWIX WannaCry Wcry (Cited 12th December 2017). [31] Bolei Zhou, David Bau, Aude Oliva, and Antonio Torralba. Interpreting deep visual representations via network dissection. CoRR, Vol. abs/ ,, [32] Bolei Zhou, Aditya Khosla, Agata Lapedriza, Aude Oliva, and Antonio Torralba. Learning deep features for discriminative localization. CoRR, Vol. abs/ ,,
34
35 A label 0 NtDuplicateObject \_ getaddrinfo \_ InternetSetStatusCallback \_ NtReadVirtualMemory \_ LdrUnloadDll \_ VirtualFreeEx \_ GetDiskFreeSpaceExW \_ LookupPrivilegeValueW \_ InternetOpenUrlW \_ SetFilePointerEx \_ LdrLoadDll \_ SetFileAttributesW \_ label 2 CertOpenStore \_ CryptAcqui recontexta \_ RtlAddVectoredExceptionHandler \_ SetWindowsHookExA \_ NtSetContextThread \_ FindResourceExW \_ CoInitiali zesecurity \_ NtTerminateThread \_ NtAllocateVirtualMemory \_ SetFilePointerEx \_ VirtualFreeEx \_ CertOpenSy stemstorea \_ NtCreateMutant \_
36 RtlDecompressBuffer \_ label 5 CreateToolhelp32Snapshot \_ GetVolumePathNamesForVolumeNameW \_ NtGetContextThread \_ CryptAcquireContextA \_ GetShortPathNameW \_ VirtualFreeEx \_ SetFilePointerEx \_ InternetCloseHandle \_ NtDelayExecution \_ ShellExecuteExW \_ InternetOpenUrlW \_ SetFileAttributesW \_ NtFreeVirtualMemory \_ label 6 Process32NextW \_ CreateToolhelp32Snapshot \_ NtReadVirtualMemory \_0. CryptAcquireContextA \_ GetFileSize \_ LoadResource \_ FindResourceExW \_ CoInitializeSecurity \_ GetVolumePathNamesForVolumeNameW \_ NtTerminateThread \_ InternetOpenUrlW \_ NtAllocateVirtualMemory \_ GetComputerNameA \_ CreateDirectoryW \_ NtQue ryat tribu tesf ile \_ GetKeyState \_ MessageBoxTimeoutA \_
37 SetFileAttributesW \_ NtOpenProcess \_ NtGetContextThread \_ label 9 GetVolumePathNamesForVolumeNameW \_ CreateToolhelp32Snapshot \_ SetFilePointerEx \_ RtlAddVectoredExceptionHandler \_ CryptAcqui recontexta \_ LdrUnloadDll \_ CreateServiceA \_ OpenSCManagerW \_ NtSetInfor mationfile \_ InternetCrackUrlW \_ LdrGetProcedureAddress \_ FindResourceW \_ DnsQuery \_W\_ ShellExecuteExW \_ SetFileAttributesW \_ NtOpenProcess \_
38
39 B B.1: CryptLocker 7 Kovter 4 Locker 5 Reveton
40
41 C NtReadVirtualMemorydash , GetFileSizedash , FindResour ceexwdash , NtTerminateThreaddash , CreateDirectoryWdash , NtQueryAttributesFiledash CryptAcquireContextAdash , NtTerminateThreaddash , SetFi lepo inter Exda sh , CertOpenSystemStoreAdash , NtCreateMutantdash , RtlDecompressBufferdash CryptAcquireContextAdash , InternetCrackUrlWdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFilePointerExdash , NtOpenProcessdash NtDuplicateObjectdash , getaddrinfodash , NtReadVirtualMemorydash , VirtualFreeExdash , InternetOpenUrlWdash , SetFileAttributesWdash CryptAcquireContextAdash , InternetCrackUrlWdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFilePointerExdash , NtOpenProcessdash Process32NextWdash , NtGetContextThreaddash , CryptAcquireContextAdash , NtTerminateThreaddash , GetComputerNameAdash , MessageBoxTimeoutAdash CertOpenStoredash , SetWindowsHookExAdash , FindResour ceexwdash , CoInitializeSecuritydash , NtTerminateThreaddash , NtAllocateVirtualMemorydash GetVolumePathNamesForVolumeNameWdash , SetFilePointerExdash , CryptAcquireContextAdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , 31
42 SetFileAttributesWdash CryptAcquireContextAdash , NtTerminateThreaddash , SetFilePointerExdash , CertOpenSystemStoreAdash , NtCreateMutantdash , RtlDecompressBufferdash GetVolumePathNamesForVolumeNameWdash , SetFilePointerExdash , CryptAcquireContextAdash , DnsQuery \ _Wdash , ShellExecuteExWdash , SetFileAttributesWdash CreateToolhelp32Snapshotdash , CryptAcquireContextAdash , FindResourceWdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFi lepo inter Exda sh SetFilePointerExdash , CryptAcquireContextAdash , NtDelayExecutiondash , ShellExecuteExWdash , InternetOpenUrlWdash , SetFileAttributesWdash CreateToolhelp32Snapshotdash , GetVolumePathNamesForVolumeNameWdash , NtReadVirtualMemorydash , CryptAcquireContextAdash , SetFileAttributesWdash , GetKeyStatedash CertOpenStoredash , CryptAcquireContextAdash , SetWindowsHookExAdash , NtTerminateThreaddash , FindResourceExWdash , NtAllocateVirtualMemorydash CryptAcquireContextAdash , InternetCrackUrlWdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFilePointerExdash , NtOpenProcessdash CryptAcquireContextAdash , SetWindowsHookExAdash , NtTerminateThreaddash , CoInitializeSecuritydash , FindResourceExWdash , NtAllocateVirtualMemorydash CryptAcquireContextAdash , RtlAddVectoredExceptionHandlerdash , NtSetContextThreaddash , VirtualFreeExdash , CertOpenSystemStoreAdash , NtCreateMutantdash CryptAcquireContextAdash , 32
43 InternetCrackUrlWdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFilePointerExdash , NtOpenProcessdash NtGetContextThreaddash , CryptAcquireContextAdash , LoadResourcedash , CoInitializeSecuritydash , InternetOpenUrlWdash , MessageBoxTimeoutAdash LdrUnloadDlldash , RtlAddVectoredExceptionHandlerdash , CreateServiceAdash , NtSetInformationFiledash , OpenSCManagerWdash , SetFileAttributesWdash NtGetContextThreaddash , CryptAcquireContextAdash , VirtualFreeExdash , InternetCloseHandledash , ShellExecu teexwdash , NtFreeVirtualMemorydash SetFilePointerExdash , CryptAcquireContextAdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFileAttributesWdash , NtOpenProcessdash NtReadVirtualMemorydash , CryptAcquireContextAdash , GetFileSizedash , CreateDirectoryWdash , NtAllocateVirtualMemorydash , N topenprocessdash LdrUnloadDlldash , InternetSetStatusCallbackdash , GetDiskFreeSpaceExWdash , LookupPrivilegeValueWdash , SetFilePointerExdash , LdrLoadDlldash CertOpenStoredash , SetWindowsHookExAdash , FindResour ceexwdash , CoInitializeSecuritydash , NtTerminateThreaddash , NtAllocateVirtualMemorydash SetFilePointerExdash , CryptAcquireContextAdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFileAttributesWdash , N topenprocessdash CreateToolhelp32Snapshotdash , GetVolumePathNamesForVolumeNameWdash , CryptAcquireContextAdash , ShellExecu teexwdash , 33
44 InternetOpenUrlWdash , SetFi lepo inter Exda sh GetShortPathNameWdash , VirtualFreeExdash , ShellExecuteExWdash , CryptAcquireContextAdash , SetFi lepo inter Exda sh
45 D FaceNet Adversarial Examples,
..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i
25 Feature Selection for Prediction of Stock Price Time Series 1140357 2014 2 28 ..,,,,. 2013 1 1 12 31, ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i Abstract Feature Selection for Prediction of Stock Price Time
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More information1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationThe Indirect Support to Faculty Advisers of die Individual Learning Support System for Underachieving Student The Indirect Support to Faculty Advisers of the Individual Learning Support System for Underachieving
More informationkut-paper-template.dvi
26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo
More information,,.,.,,.,.,.,.,,.,..,,,, i
22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More informationEQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju
EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More informationNO.80 2012.9.30 3
Fukuoka Women s University NO.80 2O12.9.30 CONTENTS 2 2 3 3 4 6 7 8 8 8 9 10 11 11 11 12 NO.80 2012.9.30 3 4 Fukuoka Women s University NO.80 2012.9.30 5 My Life in Japan Widchayapon SASISAKULPON (Ing)
More information1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf
1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationIPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU
1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale
More information29 Short-time prediction of time series data for binary option trade
29 Short-time prediction of time series data for binary option trade 1180365 2018 2 28 RSI(Relative Strength Index) 3 USD/JPY 1 2001 1 2 4 10 2017 12 29 17 00 1 high low i Abstract Short-time prediction
More information17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More informationDOUSHISYA-sports_R12339(高解像度).pdf
Doshisha Journal of Health & Sports Science, 4, 41-50 2012 41 A Case Study of the Comprehensive community sports clubs that People with Disability Participate in. Motoaki Fujita In this study, the interview
More information17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
More information行動経済学 第5巻 (2012) 92-102
92 5 (2012) 92 102 * a b c d 要 旨 Web 2 1) 2) 2012 1 30 2012 6 11 キーワード: JEL Classification Numbers: H55, D89 1. はじめに 23 15,020 29 2017 16,900 1 * a e-mail: masato.shikata@gmail.com b e-mail: Komamura@econ.keio.ac.jp
More information(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s
1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene
More informationCore Ethics Vol.
Core Ethics Vol. Core Ethics Vol. . % % % Core Ethics Vol. %, Core Ethics Vol. % % % -. %. Core Ethics Vol. a b : Core Ethics Vol. pp... pp.. pp... pp. pp.. pp...pp.... pp. pp. pp.. pp.. Vol.. pp... pp..
More information20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow
20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering
More informationVol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L
Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP
More information258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System
Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.
More information1 3DCG [2] 3DCG CG 3DCG [3] 3DCG 3 3 API 2 3DCG 3 (1) Saito [4] (a) 1920x1080 (b) 1280x720 (c) 640x360 (d) 320x G-Buffer Decaudin[5] G-Buffer D
3DCG 1) ( ) 2) 2) 1) 2) Real-Time Line Drawing Using Image Processing and Deforming Process Together in 3DCG Takeshi Okuya 1) Katsuaki Tanaka 2) Shigekazu Sakai 2) 1) Department of Intermedia Art and Science,
More information2 ( ) i
25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA
More informationKyushu Communication Studies 第2号
Kyushu Communication Studies. 2004. 2:1-11 2004 How College Students Use and Perceive Pictographs in Cell Phone E-mail Messages IGARASHI Noriko (Niigata University of Health and Welfare) ITOI Emi (Bunkyo
More information評論・社会科学 84号(よこ)(P)/3.金子
1 1 1 23 2 3 3 4 3 5 CP 1 CP 3 1 1 6 2 CP OS Windows Mac Mac Windows SafariWindows Internet Explorer 3 1 1 CP 2 2. 1 1CP MacProMacOS 10.4.7. 9177 J/A 20 2 Epson GT X 900 Canon ip 4300 Fujifilm FinePix
More information2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou
情 報 処 理 学 会 インタラクション 2013 IPSJ Interaction 2013 2013-Interaction (3EXB-06) 2013/3/2 ourcam: 1 2 ourcam ourcam: On-Site Programming Environment for Digital Photography RYO OSHIMA 1 YASUAKI KAKEHI 2 In these
More information2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last
1 北陸大学 紀要 第33号 2009 pp. 173 186 原著論文 バーチャル世界における呼びかけ語の コミュニケーション機能 ポライトネス理論の観点からの考察 劉 艶 The Communication Function of Vocative Terms in Virtual Communication: from the Viewpoint of Politeness Theory Yan
More information[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis
1,a) 2 2 2 1 2 3 24 Motion Frame Omission for Cartoon-like Effects Abstract: Limited animation is a hand-drawn animation style that holds each drawing for two or three successive frames to make up 24 frames
More informationron.dvi
12 Effect of occlusion and perception of shadow in depth perception caused by moving shadow. 1010361 2001 2 5 (Occlusion), i Abstract Effect of occlusion and perception of shadow in depth perception caused
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More informationディープラーニングとオープンサイエンス ~研究の爆速化が引き起こす摩擦なき情報流通へのシフト~
KITAMOTO Asanobu http://researchmap.jp/kitamoto/ KitamotoAsanob u 1 2 3 4 5 1. 2. 3. 6 Lawrence Lessig (Founder of Creative Commons), Code: And Other Laws of Cyber Space (first edition 1999) 7 NSF Data
More information独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor
独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that
More informationConvolutional Neural Network A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolution
Convolutional Neural Network 2014 3 A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolutional Neural Network Fukui Hiroshi 1940 1980 [1] 90 3
More informationPresent Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29
Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29, No. 8, pp. 4-12, Aug. 1986 Synopsis The pile foundation
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe
1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,
More information2015 ( 27 ) RFID RF RFID, 2., 3., 4. i
2015 ( 27 ) 71143204 2015 ( 27 ) RFID RF 1 100 98 20 20 1 19 1. RFID, 2., 3., 4. i Abstract of Bachelor s Thesis Academic Year 2015 Smart Management System of Rechargeable Batteries with Automatic Identification
More informationTitle < 論文 > 公立学校における在日韓国 朝鮮人教育の位置に関する社会学的考察 : 大阪と京都における 民族学級 の事例から Author(s) 金, 兌恩 Citation 京都社会学年報 : KJS = Kyoto journal of so 14: 21-41 Issue Date 2006-12-25 URL http://hdl.handle.net/2433/192679 Right
More information(1) i NGO ii (2) 112
MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 * * 2 * 3 * 4 * 5 * 6 * 7 * 8 Service Learning for Engineering Students Satsuki TASAKA*, Mitsutoshi ISHIMURA* 2, Hikaru MIZUTANI* 3, Naoyuki
More informationOECD Benartzi and Thaler Brown et al. Mottla and Utkus Rooiji et al. Atkinson et al. MacFarland et al. Elton et al. Tang et al. Benartzi and Thaler Br
IFRS. OECD Benartzi and Thaler Brown et al. Mottla and Utkus Rooiji et al. Atkinson et al. MacFarland et al. Elton et al. Tang et al. Benartzi and Thaler Brown et al. /n Benartzi and Thaler n /n Benartzi
More information浜松医科大学紀要
On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse
More informationVirtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking
23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual
More informationL1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? Well,/ you re very serious person/ so/ I think/ your blood type is A. Wow!/ G
L1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? 当ててみて / 私の血液型を Well,/ you re very serious person/ so/ I think/ your blood type is A. えーと / あなたはとっても真面目な人 / だから / 私は ~ と思います / あなたの血液型は
More informationpaper.dvi
23 Study on character extraction from a picture using a gradient-based feature 1120227 2012 3 1 Google Street View Google Street View SIFT 3 SIFT 3 y -80 80-50 30 SIFT i Abstract Study on character extraction
More information1996. Vol. 16, No. 2, pp The Learning Process in "Tanoshii-Taiiku" Theory through the Spectrum of Teaching Styles Abstract In recent years, the
1996. Vol. 16, No. 2, pp. 83-93 The Learning Process in "Tanoshii-Taiiku" Theory through the Spectrum of Teaching Styles Abstract In recent years, the concept of "teaching style", especially Mosston's
More informationIPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect
1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect Using a Human-Shaped Input Device for Remote Pose Instruction Yuki Tayama 1,a) Yoshiaki Ando 2,b) Misaki Hagino 2,c) Ken-ichi Okada 1,d) Abstract: There
More informationIPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc
iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto
More information* + Cable TV that is closely related to regional societies : Its e#ects on a community A case observed in Yonezawa City Naoko OTANI Akihiko SHIMAZAKI +, +, - - +, -. +, / * +,+ +0,**/ 55 ..-, (,**0 ) +
More informationIPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta
1 1 1 1 2 1. Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Takayuki Okatani 1 and Koichiro Deguchi 1 This paper presents a method for recognizing the pose of a wire harness
More informationThe copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website
The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website by the author(s) under the agreement with the IPSJ.
More informationfiš„v8.dvi
(2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp
More information1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [
Vol.2, No.x, April 2015, pp.xx-xx ISSN xxxx-xxxx 2015 4 30 2015 5 25 253-8550 1100 Tel 0467-53-2111( ) Fax 0467-54-3734 http://www.bunkyo.ac.jp/faculty/business/ 1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The
More information8-1.indb
1 79 1 1 1 2 1 80 A A 81 1 83 1 1 82 2 85 2 3 2 3 264 205 1 1 83 2 2 A A X A B X A C B X A 84 1 1 85 2 3 1 90 91 2 A A B B A A A 3 10 10 401 3 399 86 417 483 534 484 400 415 730 827 659 940 1 1 401 1 401
More informationBuilding a Culture of Self- Access Learning at a Japanese University An Action Research Project Clair Taylor Gerald Talandis Jr. Michael Stout Keiko Omura Problem Action Research English Central Spring,
More information産業構造におけるスポーツ産業の範囲に関する研究Ⅰ
Abstract This study is emphasizes that the sports industry holds big weight with the economy of our country but tends to be disregarded The study sees it us a peculiar industry which has ports of both
More information22 1,936, ,115, , , , , , ,
21 * 2 3 1 1991 1945 200 60 1944 No. 41 2016 22 1,936,843 1945 1,115,594 1946 647,006 1947 598,507 1 60 2014 501,230 354,503 5 2009 405,571 5 1 2 2009 2014 5 37,285 1 2 1965 10 1975 66 1985 43 10 3 1990
More informationFig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).
Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation
More informationSobel Canny i
21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been
More informationMicrosoft Word - deim2011_new-ichinose-20110325.doc
DEIM Forum 2011 B7-4 252-0882 5322 E-mail: {t08099ai, kurabaya, kiyoki}@sfc.keio.ac.jp A Music Search Database System with a Selector for Impressive-Sections of Continuous Data Aya ICHINOSE Shuichi KURABAYASHI
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More informationII
No. 19 January 19 2013 19 Regionalism at the 19 th National Assembly Elections Focusing on the Yeongnam and Honam Region Yasurou Mori As the biggest issue of contemporary politics at South Korea, there
More informationA Study on Practical Use of Artificial Intelligence. The purpose of this research paper is to demonstrate the ease of using artificial intelligence in
A Study on Practical Use of Artificial Intelligence. The purpose of this research paper is to demonstrate the ease of using artificial intelligence in the light of the recent popularity of tertiary artificial
More informationudc-2.dvi
13 0.5 2 0.5 2 1 15 2001 16 2009 12 18 14 No.39, 2010 8 2009b 2009a Web Web Q&A 2006 2007a20082009 2007b200720082009 20072008 2009 2009 15 1 2 2 2.1 18 21 1 4 2 3 1(a) 1(b) 1(c) 1(d) 1) 18 16 17 21 10
More information165--184 (責)江.indd
LD ADHD One Perspective on Supporting Japanese Language Learners with LD/ADHD: An Analysis of Teachers Support in the Japanese in Context Course NAKAGAWA Yasuhiro In recent years, there has been increasing
More information大学論集第42号本文.indb
42 2010 2011 3 279 295 COSO 281 COSO 1990 1 internal control 1 19962007, Internal Control Integrated Framework COSO COSO 282 42 2 2) the Committee of Sponsoring Organizations of the Treadway committee
More informationODA NGO NGO JICA JICA NGO JICA JBIC SCP
ODA NGO NGO JICA JICA NGO JICA JBIC SCP - - NGO NGO NGO NGO NGO NGO Roger A Hart - Potuvil UGM UGM APU NGO APU APU NGO APU NGO NGO APU APU Matara NGO ODA NGO ODA http://www.jica.go.jp/partner/college/index.html#partnership
More information05_小田眞幸 様.indd
53 2012 pp. 89 100 外国語学習観と 共通知識 としてのディスコース 1 要 約 1992 Common Knowledge キーワード : Ⅰ. はじめに 2010 2 1 2 A B 2013 1 16 89 53 A B A B A B 2 2 Kids 2010.2.27 90 A B B A 1 2012 2010 2011 2009 C 21520596 Ⅱ. パブリック
More information1 2 1 2012 39 1964 1997 1 p. 65 1 88 2 1 2 2 1 2 5 3 2 1 89 1 2012 Frantzen & Magnan 2005 2010 6 N2 2014 3 3.1 2015 2009 1 2 3 2 90 2 3 2 B1 B1 1 2 1 2 1 2 1 3.2 1 2014 2015 2 2 2014 2015 9 4.1 91 1 2
More information28 TCG SURF Card recognition using SURF in TCG play video
28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka
More information2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )
1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose
More informationTF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat
1 1 2 1. TF-IDF TDF-IDF TDF-IDF. 3 18 6 Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Satoshi Date, 1 Teruaki Kitasuka, 1 Tsuyoshi Itokawa 2
More informationA Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi
A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,
More informationVol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus
Vol. 48 No. 3 Mar. 2007 PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Industry Collaboration Yoshiaki Matsuzawa and Hajime Ohiwa
More informationOn the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new e
On the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new electric wave projector is proposed in this paper. The
More information:- Ofer Feldman,Feldman : -
- -- E-mail: nkawano@hiroshima-u.ac.jp : - :- Ofer Feldman,Feldman : - : : : Mueller : - Mueller :.. : ... :........ .. : : : - : Kawano & Matsuo: - : - : - : : No. Feldman, Ofer (), The Political
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationAbstract 1 1 2 Abstract Fig. 1 Fig. 2 Fig. 3 Abstract 1 2 3 4 5 6 7 8 10 9 Abstract 1 1 2 3 4 5 6 7 8 9 Abstract 1 2 3 4 Abstract 1 1 2 2 3 4 5 6 3 7 8 9 4 Abstract 1 2 3 4 5 6 7 8 9 10
More informationSFCJ2-安村
Communication and Interaction Michiaki Yasumura / Professor, Faculty of Environmental Information, Keio University From the beginning, communication is an action or process conducted by human to human.
More informationIPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS
1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high
More information<95DB8C9288E397C389C88A E696E6462>
2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,
More information22 Google Trends Estimation of Stock Dealing Timing using Google Trends
22 Google Trends Estimation of Stock Dealing Timing using Google Trends 1135064 3 1 Google Trends Google Trends Google Google Google Trends Google Trends 2006 Google Google Trend i Abstract Estimation
More informationKansai University of Welfare Sciences Practical research on the effectiveness of the validation for the elderly with dementia Naoko Tsumura, Tomoko Mi
Practical research on the effectiveness of the validation for the elderly with dementia Naoko Tsumura, Tomoko Mitamura and Takeshi Hashino 2 1 Abstract : The present conditions to surround the elderly
More informationTsuken Technical Information 1
March 2004 Vol.6 Tsuken Technical Information 1 Since microprocessors (MPUs) first appeared in the 1970s, they have developed at a remarkable pace, and now found in a huge range of devices that we use
More informationNINJAL Research Papers No.8
(NINJAL Research Papers) 8: 177 196 (2014) ISSN: 2186-134X print/2186-1358 online 177 3 3 3 1940 3 late adoption real time 3 apparent time * 1. 1 2 3 1.1 3 1 1953 * 2014 3 18 2014 5 13 109 NINJAL 2012
More information( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst
情報処理学会インタラクション 2015 IPSJ Interaction 2015 15INT014 2015/3/7 1,a) 1,b) 1,c) Design and Implementation of a Piano Learning Support System Considering Motivation Fukuya Yuto 1,a) Takegawa Yoshinari 1,b) Yanagi
More information生研ニュースNo.132
No.132 2011.10 REPORTS TOPICS Last year, the Public Relations Committee, General Affairs Section and Professor Tomoki Machida created the IIS introduction video in Japanese. As per the request from Director
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More informationjohnny-paper2nd.dvi
13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which
More information01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六
*1 2 PR ( ) 1. 1 1.1. 2 1 2.2 3. 4. 5. 6. *1 Graduate School for Creative Cities, Osaka City University 1.2. Vol.6 (March, 2006) 3. 01) 02) ( ) 03) 04) 05) 06) 07) 08) 5.2.1. 09) 10),11) 2. 2.1. 2 1 2
More information,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i
23 Experimental investigation of Natural Use Profiles of Pen Pressure, Tilt and Azimuth 1120230 2012 3 1 ,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i Abstract Experimental investigation of Natural Use
More informationDevelopement of Plastic Collocation Method Extension of Plastic Node Method by Yukio Ueda, Member Masahiko Fujikubo, Member Masahiro Miura, Member Sum
Developement of Plastic Collocation Method Extension of Plastic Node Method by Yukio Ueda, Member Masahiko Fujikubo, Member Masahiro Miura, Member Summary Previously, the authors developed the plastic
More information16
Empirical Analysis of the Efficiency of the Broadcasting Industry: Verification of Regionalism and a Proposal ABSTRACT Reforms in the broadcasting industry have recently been discussed and proposed, and
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More information4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q
x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke
More informationIPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing
Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing number of HOG Features based on Real AdaBoost Chika Matsushima, 1 Yuji Yamauchi, 1 Takayoshi Yamashita 1, 2 and
More information,,.,,.,..,.,,,.,, Aldous,.,,.,,.,,, NPO,,.,,,,,,.,,,,.,,,,..,,,,.,
J. of Population Problems. pp.,.,,,.,,..,,..,,,,.,.,,...,.,,..,.,,,. ,,.,,.,..,.,,,.,, Aldous,.,,.,,.,,, NPO,,.,,,,,,.,,,,.,,,,..,,,,., ,,.,,..,,.,.,.,,,,,.,.,.,,,. European Labour Force Survey,,.,,,,,,,
More information