Size: px
Start display at page:

Download ""

Transcription

1

2

3 LIME i

4

5 Abstract Of Bachelor Thesis Academic Year 2018 Machine Learning models indicating concrete criteria for malware analysis Summary Nowadays, malware has been threatening Internet security. To detect and classify malware, a lot of research and products using machine learning have been proposed, especially for end point detection. Whilst the research and products are arguing that they have high accuracy in various constraints, it is insufficient to give the models result from the perspective of malware analysts, for they want clues of results for further investigation. Especially in case of using complex models, it is much more difficult to know the clues. In this thesis we will present new machine learning models for malware analysis. the models will indicate not only detection result, but also concrete part of feature that are attributed to detection or classification result. To realize that, we will use algorithm called LIME to approximate complex machine learning models. As an examination, we use this models for ransomware classification and make sure that the extracted features are appropriate. By using this models, it is expected that malware analysts can take countermeasure for malware by getting the clues of classification result. Keywords Machine learning, Malware analysis, Data analysis Faculty of Law Keio University Kei Nomaguchi iii

6

7 LIME StackNet (1) (2) (1) API (2) API v

8 21 A 25 B 29 C 31 D 35 vi

9 LIME vii

10 Stacking CryptLocker Kovter Locker Reveton (2) B viii

11 : C2 OS 1

12 1.1.2 [15],

13 [21] 2.1: 2.1 C2 C2 3

14 2.1: CryptoLocker Wannacry Petya Badrabbit UIWIX Reveton Kovter C2 C2 Eternal Blue Windows Petya Wannacry FBI Ranscam [16]?? Wannacry[8] [29] Wannacry UIWIX[30] Petya[22] Badrabbit[7] : 4

15 [3] Khazar [17] Andrea [5] Khazar OS [18] Khazar Cylance [6] Saxe PE Deep Neural Netwoek [26] 5

16 [28] Deep Neural Network Zhou [31] 2017 [13] Deep Neural Network SVC [1] SVC Deep Neural Network [11] [20] [14] [2] 2017 Deep Neural Network [12] GAN [13] [9] 6

17 3 3.1 LIME StackNet : 7

18 3.1.2 LIME LIME[25] LIME : LIME ξ(x) = argmin g G L(f, g, π x ) + Ω(g) (3.1) x G g L x G Ω g g 8

19 : OS Ubuntu LTS LIME RISS 371 StackNet(scikit-learn , xgboost 0.7 ) Imperial College London RISS [27] API 3.2 API 1 3.2: CryptLocker 107 Kovter 64 Locker 97 Reveton StackNet StackNet [24] 1 9

20 Kaggle : Stacking SVC 2 RandomForest 4 Naive Bays 4 XGBoost 7 RandomForest Logistic Regression F (1) SVC w f = w 2 (w T (x p x n )) 2 (3.2) SVC SVC (2) Random Forest Random Forest K g = 1 p 2 (C i t) (3.3) i=1 10

21 (3) Naive Bays P (B A) = P (A B)P (B) P (A) (3.4) P (A) P (A B) N P (A B) = P (x i Y ) (3.5) i=1 (4) XGBoost Random Forest (5) Logistic Regression ϕ(z) = e z (3.6) 11

22

23 : (1) (2) API API (1) (1) Windows API 1 API API API (2) (2) LIME Win32/CTBLocker Win32/TorrentLocker 13

24 4.1: : CertOpenStore CryptAcquireContextA RtlAddVectoredExceptionHandler SetWindowsHookExA NtSetContextThread FindResourceExW CoInitializeSecurity NtTerminateThread NtAllocateVirtualMemory SetFilePointerEx VirtualFreeEx CertOpenSystemStoreA NtCreateMutant RtlDecompressBuffer

25 (1) API 4.3, 4.4, 4.5, : CryptLocker API API API API1 CryptAcquireContextA RtlDecompressBuffer SetFilePointerEx API2 4.4: Kovter API API API API1 CryptAcquireContextA InternetCloseHandle SetFilePointerEx API2 InternetOpenUrlW SetFileAttributesW 4.5: Locker API API API API1 CryptAcquireContextA InternetOpenUrlW GetFileSize API2 SetFileAttributesW 15

26 4.6: Reveton API API API API1 CryptAcquireContextA DnsQuery W SetFilePointerEx API2 CryptGenKey InternetCrackUrlW SetFileAttributesW (2) API : (2) StackNet 28 LIME

27 5 5.1 API 8 LIME

28

29 ,,,, Rodney D. Van Meter III, Sigma ISC Korry Luke Ko You Liang Aaron Tang Andrey Ferrryan Flo Costa SNS 2016 ROP exploitation 19

30 This one s dedicated to all the hackers. 20

31 [1] Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, and Konrad Rieck. Drebin: Effective and explainable detection of android malware in your pocket, [2] Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. Synthesizing robust adversarial examples. CoRR, Vol. abs/ ,, [3] AV-TEST. AV-TEST The Independent IT-security Institute(Cited 12th December 2017). [4] Barun. Reversing the petya ransomware with constraint solvers(cited 12th December 2017). [5] Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, and Federico Maggi. Shieldfs: A self-healing, ransomware-aware filesystem. In Proceedings of the 32nd Annual Computer Security Applications Conference. ACM, [6] Cylance. Cylance PROTECT(Cited 12th December 2017). [7] Endgame. BadRabbit Technical Analysis(Cited 12th December 2017). [8] Endgame. WCry/WanaCry Ransomware Technical Analysis(Cited 12th December 2017). [9] Hyrum Anderson Anant Kharkar Bobby Filar and Phil Roth. Evading machine learning malware detection. BlackHat USA, [10] Joseph Gardiner and Shishir Nagaraja. On the security of machine learning in malware c&c detection: A survey. ACM Comput. Surv., Vol. 49, No. 3, pp. 59:1 59:39, [11] I. Goodfellow, J. Shlens, and C. Szegedy. Explaining and Harnessing Adversarial Examples. ArXiv e-prints, December

32 [12] Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, and Patrick D. McDaniel. Adversarial perturbations against deep neural networks for malware classification. CoRR, Vol. abs/ ,, [13] Weiwei Hu and Ying Tan. Generating adversarial malware examples for black-box attacks based on GAN. CoRR, Vol. abs/ ,, [14] A. Ilyas, L. Engstrom, A. Athalye, and J. Lin. Query-Efficient Black-box Adversarial Examples. ArXiv e-prints, December [15] Heju Jiang, Jasvir Nagra, and Parvez Ahammad. Sok: Applying machine learning in security - A survey. CoRR, Vol. abs/ ,, [16] Kaspersky. Ranscam (Cited 12th December 2017). [17] Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. Unveil: A large-scale, automated approach to detecting ransomware. In 25th USENIX Security Symposium (USENIX Security 16), pp , Austin, TX, USENIX Association. [18] Amin Kharraz and Engin Kirda. Redemption: Real-time protection against ransomware at end-hosts. In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), [19] Youngjoon Ki, Eunjin Kim, and Huy Kang Kim. A novel approach to detect malware based on api call sequence analysis. Int. J. Distrib. Sen. Netw., Vol. 2015, pp. 4:4 4:4, January [20] Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. Adversarial examples in the physical world. CoRR, Vol. abs/ ,, [21] Allan Liska and Timothy Gallo. Ransomware : Defending against digital extortion. O Reilly Media, Incorporated, p. 6, [22] Malwarebytes. Petya Taking Ransomware To The Low Level(Cited 12th December 2017). [23] Micheal Shikorski and Andrew Honig. Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software. No Starch Press, p. 1, [24] Sebastian Raschka. Mlxtend, April [25] Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. why should I trust you? : Explaining the predictions of any classifier. CoRR, Vol. abs/ ,,

33 [26] Joshua Saxe and Konstantin Berlin. Deep neural network based malware detection using two dimensional binary program features. In Proceedings of the th International Conference on Malicious and Unwanted Software (MALWARE), MALWARE 15, pp , Washington, DC, USA, IEEE Computer Society. [27] Daniele Sgandurra, Luis Muñoz-González, Rabih Mohsen, and Emil C. Lupu. Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. CoRR, Vol. abs/ ,, [28] Shun Tobiyama, Yukiko Yamaguchi, Hajime Shimada, Tomonori Ikuse, and Takeshi Yagi. Malware detection with deep neural network using process behavior IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Vol. 2, pp , [29] TrendMicro. WannaCry 2017 (Cited 12th December 2017). [30] TrendMicro. UIWIX WannaCry Wcry (Cited 12th December 2017). [31] Bolei Zhou, David Bau, Aude Oliva, and Antonio Torralba. Interpreting deep visual representations via network dissection. CoRR, Vol. abs/ ,, [32] Bolei Zhou, Aditya Khosla, Agata Lapedriza, Aude Oliva, and Antonio Torralba. Learning deep features for discriminative localization. CoRR, Vol. abs/ ,,

34

35 A label 0 NtDuplicateObject \_ getaddrinfo \_ InternetSetStatusCallback \_ NtReadVirtualMemory \_ LdrUnloadDll \_ VirtualFreeEx \_ GetDiskFreeSpaceExW \_ LookupPrivilegeValueW \_ InternetOpenUrlW \_ SetFilePointerEx \_ LdrLoadDll \_ SetFileAttributesW \_ label 2 CertOpenStore \_ CryptAcqui recontexta \_ RtlAddVectoredExceptionHandler \_ SetWindowsHookExA \_ NtSetContextThread \_ FindResourceExW \_ CoInitiali zesecurity \_ NtTerminateThread \_ NtAllocateVirtualMemory \_ SetFilePointerEx \_ VirtualFreeEx \_ CertOpenSy stemstorea \_ NtCreateMutant \_

36 RtlDecompressBuffer \_ label 5 CreateToolhelp32Snapshot \_ GetVolumePathNamesForVolumeNameW \_ NtGetContextThread \_ CryptAcquireContextA \_ GetShortPathNameW \_ VirtualFreeEx \_ SetFilePointerEx \_ InternetCloseHandle \_ NtDelayExecution \_ ShellExecuteExW \_ InternetOpenUrlW \_ SetFileAttributesW \_ NtFreeVirtualMemory \_ label 6 Process32NextW \_ CreateToolhelp32Snapshot \_ NtReadVirtualMemory \_0. CryptAcquireContextA \_ GetFileSize \_ LoadResource \_ FindResourceExW \_ CoInitializeSecurity \_ GetVolumePathNamesForVolumeNameW \_ NtTerminateThread \_ InternetOpenUrlW \_ NtAllocateVirtualMemory \_ GetComputerNameA \_ CreateDirectoryW \_ NtQue ryat tribu tesf ile \_ GetKeyState \_ MessageBoxTimeoutA \_

37 SetFileAttributesW \_ NtOpenProcess \_ NtGetContextThread \_ label 9 GetVolumePathNamesForVolumeNameW \_ CreateToolhelp32Snapshot \_ SetFilePointerEx \_ RtlAddVectoredExceptionHandler \_ CryptAcqui recontexta \_ LdrUnloadDll \_ CreateServiceA \_ OpenSCManagerW \_ NtSetInfor mationfile \_ InternetCrackUrlW \_ LdrGetProcedureAddress \_ FindResourceW \_ DnsQuery \_W\_ ShellExecuteExW \_ SetFileAttributesW \_ NtOpenProcess \_

38

39 B B.1: CryptLocker 7 Kovter 4 Locker 5 Reveton

40

41 C NtReadVirtualMemorydash , GetFileSizedash , FindResour ceexwdash , NtTerminateThreaddash , CreateDirectoryWdash , NtQueryAttributesFiledash CryptAcquireContextAdash , NtTerminateThreaddash , SetFi lepo inter Exda sh , CertOpenSystemStoreAdash , NtCreateMutantdash , RtlDecompressBufferdash CryptAcquireContextAdash , InternetCrackUrlWdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFilePointerExdash , NtOpenProcessdash NtDuplicateObjectdash , getaddrinfodash , NtReadVirtualMemorydash , VirtualFreeExdash , InternetOpenUrlWdash , SetFileAttributesWdash CryptAcquireContextAdash , InternetCrackUrlWdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFilePointerExdash , NtOpenProcessdash Process32NextWdash , NtGetContextThreaddash , CryptAcquireContextAdash , NtTerminateThreaddash , GetComputerNameAdash , MessageBoxTimeoutAdash CertOpenStoredash , SetWindowsHookExAdash , FindResour ceexwdash , CoInitializeSecuritydash , NtTerminateThreaddash , NtAllocateVirtualMemorydash GetVolumePathNamesForVolumeNameWdash , SetFilePointerExdash , CryptAcquireContextAdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , 31

42 SetFileAttributesWdash CryptAcquireContextAdash , NtTerminateThreaddash , SetFilePointerExdash , CertOpenSystemStoreAdash , NtCreateMutantdash , RtlDecompressBufferdash GetVolumePathNamesForVolumeNameWdash , SetFilePointerExdash , CryptAcquireContextAdash , DnsQuery \ _Wdash , ShellExecuteExWdash , SetFileAttributesWdash CreateToolhelp32Snapshotdash , CryptAcquireContextAdash , FindResourceWdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFi lepo inter Exda sh SetFilePointerExdash , CryptAcquireContextAdash , NtDelayExecutiondash , ShellExecuteExWdash , InternetOpenUrlWdash , SetFileAttributesWdash CreateToolhelp32Snapshotdash , GetVolumePathNamesForVolumeNameWdash , NtReadVirtualMemorydash , CryptAcquireContextAdash , SetFileAttributesWdash , GetKeyStatedash CertOpenStoredash , CryptAcquireContextAdash , SetWindowsHookExAdash , NtTerminateThreaddash , FindResourceExWdash , NtAllocateVirtualMemorydash CryptAcquireContextAdash , InternetCrackUrlWdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFilePointerExdash , NtOpenProcessdash CryptAcquireContextAdash , SetWindowsHookExAdash , NtTerminateThreaddash , CoInitializeSecuritydash , FindResourceExWdash , NtAllocateVirtualMemorydash CryptAcquireContextAdash , RtlAddVectoredExceptionHandlerdash , NtSetContextThreaddash , VirtualFreeExdash , CertOpenSystemStoreAdash , NtCreateMutantdash CryptAcquireContextAdash , 32

43 InternetCrackUrlWdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFilePointerExdash , NtOpenProcessdash NtGetContextThreaddash , CryptAcquireContextAdash , LoadResourcedash , CoInitializeSecuritydash , InternetOpenUrlWdash , MessageBoxTimeoutAdash LdrUnloadDlldash , RtlAddVectoredExceptionHandlerdash , CreateServiceAdash , NtSetInformationFiledash , OpenSCManagerWdash , SetFileAttributesWdash NtGetContextThreaddash , CryptAcquireContextAdash , VirtualFreeExdash , InternetCloseHandledash , ShellExecu teexwdash , NtFreeVirtualMemorydash SetFilePointerExdash , CryptAcquireContextAdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFileAttributesWdash , NtOpenProcessdash NtReadVirtualMemorydash , CryptAcquireContextAdash , GetFileSizedash , CreateDirectoryWdash , NtAllocateVirtualMemorydash , N topenprocessdash LdrUnloadDlldash , InternetSetStatusCallbackdash , GetDiskFreeSpaceExWdash , LookupPrivilegeValueWdash , SetFilePointerExdash , LdrLoadDlldash CertOpenStoredash , SetWindowsHookExAdash , FindResour ceexwdash , CoInitializeSecuritydash , NtTerminateThreaddash , NtAllocateVirtualMemorydash SetFilePointerExdash , CryptAcquireContextAdash , LdrGetProcedureAddressdash , DnsQuery \ _Wdash , SetFileAttributesWdash , N topenprocessdash CreateToolhelp32Snapshotdash , GetVolumePathNamesForVolumeNameWdash , CryptAcquireContextAdash , ShellExecu teexwdash , 33

44 InternetOpenUrlWdash , SetFi lepo inter Exda sh GetShortPathNameWdash , VirtualFreeExdash , ShellExecuteExWdash , CryptAcquireContextAdash , SetFi lepo inter Exda sh

45 D FaceNet Adversarial Examples,

..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i

..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i 25 Feature Selection for Prediction of Stock Price Time Series 1140357 2014 2 28 ..,,,,. 2013 1 1 12 31, ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i Abstract Feature Selection for Prediction of Stock Price Time

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

The Indirect Support to Faculty Advisers of die Individual Learning Support System for Underachieving Student The Indirect Support to Faculty Advisers of the Individual Learning Support System for Underachieving

More information

kut-paper-template.dvi

kut-paper-template.dvi 26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo

More information

,,.,.,,.,.,.,.,,.,..,,,, i

,,.,.,,.,.,.,.,,.,..,,,, i 22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

NO.80 2012.9.30 3

NO.80 2012.9.30 3 Fukuoka Women s University NO.80 2O12.9.30 CONTENTS 2 2 3 3 4 6 7 8 8 8 9 10 11 11 11 12 NO.80 2012.9.30 3 4 Fukuoka Women s University NO.80 2012.9.30 5 My Life in Japan Widchayapon SASISAKULPON (Ing)

More information

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf 1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU 1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale

More information

29 Short-time prediction of time series data for binary option trade

29 Short-time prediction of time series data for binary option trade 29 Short-time prediction of time series data for binary option trade 1180365 2018 2 28 RSI(Relative Strength Index) 3 USD/JPY 1 2001 1 2 4 10 2017 12 29 17 00 1 high low i Abstract Short-time prediction

More information

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System 1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

DOUSHISYA-sports_R12339(高解像度).pdf

DOUSHISYA-sports_R12339(高解像度).pdf Doshisha Journal of Health & Sports Science, 4, 41-50 2012 41 A Case Study of the Comprehensive community sports clubs that People with Disability Participate in. Motoaki Fujita In this study, the interview

More information

17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki

More information

行動経済学 第5巻 (2012) 92-102

行動経済学 第5巻 (2012) 92-102 92 5 (2012) 92 102 * a b c d 要 旨 Web 2 1) 2) 2012 1 30 2012 6 11 キーワード: JEL Classification Numbers: H55, D89 1. はじめに 23 15,020 29 2017 16,900 1 * a e-mail: masato.shikata@gmail.com b e-mail: Komamura@econ.keio.ac.jp

More information

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s 1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene

More information

Core Ethics Vol.

Core Ethics Vol. Core Ethics Vol. Core Ethics Vol. . % % % Core Ethics Vol. %, Core Ethics Vol. % % % -. %. Core Ethics Vol. a b : Core Ethics Vol. pp... pp.. pp... pp. pp.. pp...pp.... pp. pp. pp.. pp.. Vol.. pp... pp..

More information

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering

More information

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

1 3DCG [2] 3DCG CG 3DCG [3] 3DCG 3 3 API 2 3DCG 3 (1) Saito [4] (a) 1920x1080 (b) 1280x720 (c) 640x360 (d) 320x G-Buffer Decaudin[5] G-Buffer D

1 3DCG [2] 3DCG CG 3DCG [3] 3DCG 3 3 API 2 3DCG 3 (1) Saito [4] (a) 1920x1080 (b) 1280x720 (c) 640x360 (d) 320x G-Buffer Decaudin[5] G-Buffer D 3DCG 1) ( ) 2) 2) 1) 2) Real-Time Line Drawing Using Image Processing and Deforming Process Together in 3DCG Takeshi Okuya 1) Katsuaki Tanaka 2) Shigekazu Sakai 2) 1) Department of Intermedia Art and Science,

More information

2 ( ) i

2 ( ) i 25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA

More information

Kyushu Communication Studies 第2号

Kyushu Communication Studies 第2号 Kyushu Communication Studies. 2004. 2:1-11 2004 How College Students Use and Perceive Pictographs in Cell Phone E-mail Messages IGARASHI Noriko (Niigata University of Health and Welfare) ITOI Emi (Bunkyo

More information

評論・社会科学 84号(よこ)(P)/3.金子

評論・社会科学 84号(よこ)(P)/3.金子 1 1 1 23 2 3 3 4 3 5 CP 1 CP 3 1 1 6 2 CP OS Windows Mac Mac Windows SafariWindows Internet Explorer 3 1 1 CP 2 2. 1 1CP MacProMacOS 10.4.7. 9177 J/A 20 2 Epson GT X 900 Canon ip 4300 Fujifilm FinePix

More information

2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou

2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou 情 報 処 理 学 会 インタラクション 2013 IPSJ Interaction 2013 2013-Interaction (3EXB-06) 2013/3/2 ourcam: 1 2 ourcam ourcam: On-Site Programming Environment for Digital Photography RYO OSHIMA 1 YASUAKI KAKEHI 2 In these

More information

2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last

2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last 1 北陸大学 紀要 第33号 2009 pp. 173 186 原著論文 バーチャル世界における呼びかけ語の コミュニケーション機能 ポライトネス理論の観点からの考察 劉 艶 The Communication Function of Vocative Terms in Virtual Communication: from the Viewpoint of Politeness Theory Yan

More information

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis 1,a) 2 2 2 1 2 3 24 Motion Frame Omission for Cartoon-like Effects Abstract: Limited animation is a hand-drawn animation style that holds each drawing for two or three successive frames to make up 24 frames

More information

ron.dvi

ron.dvi 12 Effect of occlusion and perception of shadow in depth perception caused by moving shadow. 1010361 2001 2 5 (Occlusion), i Abstract Effect of occlusion and perception of shadow in depth perception caused

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

soturon.dvi

soturon.dvi 12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm

More information

ディープラーニングとオープンサイエンス ~研究の爆速化が引き起こす摩擦なき情報流通へのシフト~

ディープラーニングとオープンサイエンス ~研究の爆速化が引き起こす摩擦なき情報流通へのシフト~ KITAMOTO Asanobu http://researchmap.jp/kitamoto/ KitamotoAsanob u 1 2 3 4 5 1. 2. 3. 6 Lawrence Lessig (Founder of Creative Commons), Code: And Other Laws of Cyber Space (first edition 1999) 7 NSF Data

More information

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor 独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that

More information

Convolutional Neural Network A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolution

Convolutional Neural Network A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolution Convolutional Neural Network 2014 3 A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolutional Neural Network Fukui Hiroshi 1940 1980 [1] 90 3

More information

Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29

Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29 Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29, No. 8, pp. 4-12, Aug. 1986 Synopsis The pile foundation

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

2015 ( 27 ) RFID RF RFID, 2., 3., 4. i

2015 ( 27 ) RFID RF RFID, 2., 3., 4. i 2015 ( 27 ) 71143204 2015 ( 27 ) RFID RF 1 100 98 20 20 1 19 1. RFID, 2., 3., 4. i Abstract of Bachelor s Thesis Academic Year 2015 Smart Management System of Rechargeable Batteries with Automatic Identification

More information

Title < 論文 > 公立学校における在日韓国 朝鮮人教育の位置に関する社会学的考察 : 大阪と京都における 民族学級 の事例から Author(s) 金, 兌恩 Citation 京都社会学年報 : KJS = Kyoto journal of so 14: 21-41 Issue Date 2006-12-25 URL http://hdl.handle.net/2433/192679 Right

More information

(1) i NGO ii (2) 112

(1) i NGO ii (2) 112 MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 * * 2 * 3 * 4 * 5 * 6 * 7 * 8 Service Learning for Engineering Students Satsuki TASAKA*, Mitsutoshi ISHIMURA* 2, Hikaru MIZUTANI* 3, Naoyuki

More information

OECD Benartzi and Thaler Brown et al. Mottla and Utkus Rooiji et al. Atkinson et al. MacFarland et al. Elton et al. Tang et al. Benartzi and Thaler Br

OECD Benartzi and Thaler Brown et al. Mottla and Utkus Rooiji et al. Atkinson et al. MacFarland et al. Elton et al. Tang et al. Benartzi and Thaler Br IFRS. OECD Benartzi and Thaler Brown et al. Mottla and Utkus Rooiji et al. Atkinson et al. MacFarland et al. Elton et al. Tang et al. Benartzi and Thaler Brown et al. /n Benartzi and Thaler n /n Benartzi

More information

浜松医科大学紀要

浜松医科大学紀要 On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse

More information

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking 23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual

More information

L1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? Well,/ you re very serious person/ so/ I think/ your blood type is A. Wow!/ G

L1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? Well,/ you re very serious person/ so/ I think/ your blood type is A. Wow!/ G L1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? 当ててみて / 私の血液型を Well,/ you re very serious person/ so/ I think/ your blood type is A. えーと / あなたはとっても真面目な人 / だから / 私は ~ と思います / あなたの血液型は

More information

paper.dvi

paper.dvi 23 Study on character extraction from a picture using a gradient-based feature 1120227 2012 3 1 Google Street View Google Street View SIFT 3 SIFT 3 y -80 80-50 30 SIFT i Abstract Study on character extraction

More information

1996. Vol. 16, No. 2, pp The Learning Process in "Tanoshii-Taiiku" Theory through the Spectrum of Teaching Styles Abstract In recent years, the

1996. Vol. 16, No. 2, pp The Learning Process in Tanoshii-Taiiku Theory through the Spectrum of Teaching Styles Abstract In recent years, the 1996. Vol. 16, No. 2, pp. 83-93 The Learning Process in "Tanoshii-Taiiku" Theory through the Spectrum of Teaching Styles Abstract In recent years, the concept of "teaching style", especially Mosston's

More information

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect Using a Human-Shaped Input Device for Remote Pose Instruction Yuki Tayama 1,a) Yoshiaki Ando 2,b) Misaki Hagino 2,c) Ken-ichi Okada 1,d) Abstract: There

More information

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto

More information

* + Cable TV that is closely related to regional societies : Its e#ects on a community A case observed in Yonezawa City Naoko OTANI Akihiko SHIMAZAKI +, +, - - +, -. +, / * +,+ +0,**/ 55 ..-, (,**0 ) +

More information

IPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta

IPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta 1 1 1 1 2 1. Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Takayuki Okatani 1 and Koichiro Deguchi 1 This paper presents a method for recognizing the pose of a wire harness

More information

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website by the author(s) under the agreement with the IPSJ.

More information

fiš„v8.dvi

fiš„v8.dvi (2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp

More information

1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [

1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [ Vol.2, No.x, April 2015, pp.xx-xx ISSN xxxx-xxxx 2015 4 30 2015 5 25 253-8550 1100 Tel 0467-53-2111( ) Fax 0467-54-3734 http://www.bunkyo.ac.jp/faculty/business/ 1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The

More information

8-1.indb

8-1.indb 1 79 1 1 1 2 1 80 A A 81 1 83 1 1 82 2 85 2 3 2 3 264 205 1 1 83 2 2 A A X A B X A C B X A 84 1 1 85 2 3 1 90 91 2 A A B B A A A 3 10 10 401 3 399 86 417 483 534 484 400 415 730 827 659 940 1 1 401 1 401

More information

Building a Culture of Self- Access Learning at a Japanese University An Action Research Project Clair Taylor Gerald Talandis Jr. Michael Stout Keiko Omura Problem Action Research English Central Spring,

More information

産業構造におけるスポーツ産業の範囲に関する研究Ⅰ

産業構造におけるスポーツ産業の範囲に関する研究Ⅰ Abstract This study is emphasizes that the sports industry holds big weight with the economy of our country but tends to be disregarded The study sees it us a peculiar industry which has ports of both

More information

22 1,936, ,115, , , , , , ,

22 1,936, ,115, , , , , , , 21 * 2 3 1 1991 1945 200 60 1944 No. 41 2016 22 1,936,843 1945 1,115,594 1946 647,006 1947 598,507 1 60 2014 501,230 354,503 5 2009 405,571 5 1 2 2009 2014 5 37,285 1 2 1965 10 1975 66 1985 43 10 3 1990

More information

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation

More information

Sobel Canny i

Sobel Canny i 21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been

More information

Microsoft Word - deim2011_new-ichinose-20110325.doc

Microsoft Word - deim2011_new-ichinose-20110325.doc DEIM Forum 2011 B7-4 252-0882 5322 E-mail: {t08099ai, kurabaya, kiyoki}@sfc.keio.ac.jp A Music Search Database System with a Selector for Impressive-Sections of Continuous Data Aya ICHINOSE Shuichi KURABAYASHI

More information

16_.....E...._.I.v2006

16_.....E...._.I.v2006 55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA

More information

II

II No. 19 January 19 2013 19 Regionalism at the 19 th National Assembly Elections Focusing on the Yeongnam and Honam Region Yasurou Mori As the biggest issue of contemporary politics at South Korea, there

More information

A Study on Practical Use of Artificial Intelligence. The purpose of this research paper is to demonstrate the ease of using artificial intelligence in

A Study on Practical Use of Artificial Intelligence. The purpose of this research paper is to demonstrate the ease of using artificial intelligence in A Study on Practical Use of Artificial Intelligence. The purpose of this research paper is to demonstrate the ease of using artificial intelligence in the light of the recent popularity of tertiary artificial

More information

udc-2.dvi

udc-2.dvi 13 0.5 2 0.5 2 1 15 2001 16 2009 12 18 14 No.39, 2010 8 2009b 2009a Web Web Q&A 2006 2007a20082009 2007b200720082009 20072008 2009 2009 15 1 2 2 2.1 18 21 1 4 2 3 1(a) 1(b) 1(c) 1(d) 1) 18 16 17 21 10

More information

165--184 (責)江.indd

165--184 (責)江.indd LD ADHD One Perspective on Supporting Japanese Language Learners with LD/ADHD: An Analysis of Teachers Support in the Japanese in Context Course NAKAGAWA Yasuhiro In recent years, there has been increasing

More information

大学論集第42号本文.indb

大学論集第42号本文.indb 42 2010 2011 3 279 295 COSO 281 COSO 1990 1 internal control 1 19962007, Internal Control Integrated Framework COSO COSO 282 42 2 2) the Committee of Sponsoring Organizations of the Treadway committee

More information

ODA NGO NGO JICA JICA NGO JICA JBIC SCP

ODA NGO NGO JICA JICA NGO JICA JBIC SCP ODA NGO NGO JICA JICA NGO JICA JBIC SCP - - NGO NGO NGO NGO NGO NGO Roger A Hart - Potuvil UGM UGM APU NGO APU APU NGO APU NGO NGO APU APU Matara NGO ODA NGO ODA http://www.jica.go.jp/partner/college/index.html#partnership

More information

05_小田眞幸 様.indd

05_小田眞幸 様.indd 53 2012 pp. 89 100 外国語学習観と 共通知識 としてのディスコース 1 要 約 1992 Common Knowledge キーワード : Ⅰ. はじめに 2010 2 1 2 A B 2013 1 16 89 53 A B A B A B 2 2 Kids 2010.2.27 90 A B B A 1 2012 2010 2011 2009 C 21520596 Ⅱ. パブリック

More information

1 2 1 2012 39 1964 1997 1 p. 65 1 88 2 1 2 2 1 2 5 3 2 1 89 1 2012 Frantzen & Magnan 2005 2010 6 N2 2014 3 3.1 2015 2009 1 2 3 2 90 2 3 2 B1 B1 1 2 1 2 1 2 1 3.2 1 2014 2015 2 2 2014 2015 9 4.1 91 1 2

More information

28 TCG SURF Card recognition using SURF in TCG play video

28 TCG SURF Card recognition using SURF in TCG play video 28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka

More information

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( ) 1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose

More information

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat 1 1 2 1. TF-IDF TDF-IDF TDF-IDF. 3 18 6 Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Satoshi Date, 1 Teruaki Kitasuka, 1 Tsuyoshi Itokawa 2

More information

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,

More information

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus Vol. 48 No. 3 Mar. 2007 PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Industry Collaboration Yoshiaki Matsuzawa and Hajime Ohiwa

More information

On the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new e

On the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new e On the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new electric wave projector is proposed in this paper. The

More information

:- Ofer Feldman,Feldman : -

:- Ofer Feldman,Feldman : - - -- E-mail: nkawano@hiroshima-u.ac.jp : - :- Ofer Feldman,Feldman : - : : : Mueller : - Mueller :.. : ... :........ .. : : : - : Kawano & Matsuo: - : - : - : : No. Feldman, Ofer (), The Political

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

Abstract 1 1 2 Abstract Fig. 1 Fig. 2 Fig. 3 Abstract 1 2 3 4 5 6 7 8 10 9 Abstract 1 1 2 3 4 5 6 7 8 9 Abstract 1 2 3 4 Abstract 1 1 2 2 3 4 5 6 3 7 8 9 4 Abstract 1 2 3 4 5 6 7 8 9 10

More information

SFCJ2-安村

SFCJ2-安村 Communication and Interaction Michiaki Yasumura / Professor, Faculty of Environmental Information, Keio University From the beginning, communication is an action or process conducted by human to human.

More information

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high

More information

<95DB8C9288E397C389C88A E696E6462>

<95DB8C9288E397C389C88A E696E6462> 2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,

More information

22 Google Trends Estimation of Stock Dealing Timing using Google Trends

22 Google Trends Estimation of Stock Dealing Timing using Google Trends 22 Google Trends Estimation of Stock Dealing Timing using Google Trends 1135064 3 1 Google Trends Google Trends Google Google Google Trends Google Trends 2006 Google Google Trend i Abstract Estimation

More information

Kansai University of Welfare Sciences Practical research on the effectiveness of the validation for the elderly with dementia Naoko Tsumura, Tomoko Mi

Kansai University of Welfare Sciences Practical research on the effectiveness of the validation for the elderly with dementia Naoko Tsumura, Tomoko Mi Practical research on the effectiveness of the validation for the elderly with dementia Naoko Tsumura, Tomoko Mitamura and Takeshi Hashino 2 1 Abstract : The present conditions to surround the elderly

More information

Tsuken Technical Information 1

Tsuken Technical Information 1 March 2004 Vol.6 Tsuken Technical Information 1 Since microprocessors (MPUs) first appeared in the 1970s, they have developed at a remarkable pace, and now found in a huge range of devices that we use

More information

NINJAL Research Papers No.8

NINJAL Research Papers No.8 (NINJAL Research Papers) 8: 177 196 (2014) ISSN: 2186-134X print/2186-1358 online 177 3 3 3 1940 3 late adoption real time 3 apparent time * 1. 1 2 3 1.1 3 1 1953 * 2014 3 18 2014 5 13 109 NINJAL 2012

More information

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst 情報処理学会インタラクション 2015 IPSJ Interaction 2015 15INT014 2015/3/7 1,a) 1,b) 1,c) Design and Implementation of a Piano Learning Support System Considering Motivation Fukuya Yuto 1,a) Takegawa Yoshinari 1,b) Yanagi

More information

生研ニュースNo.132

生研ニュースNo.132 No.132 2011.10 REPORTS TOPICS Last year, the Public Relations Committee, General Affairs Section and Professor Tomoki Machida created the IIS introduction video in Japanese. As per the request from Director

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

johnny-paper2nd.dvi

johnny-paper2nd.dvi 13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which

More information

,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i

,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i 23 Experimental investigation of Natural Use Profiles of Pen Pressure, Tilt and Azimuth 1120230 2012 3 1 ,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i Abstract Experimental investigation of Natural Use

More information

Developement of Plastic Collocation Method Extension of Plastic Node Method by Yukio Ueda, Member Masahiko Fujikubo, Member Masahiro Miura, Member Sum

Developement of Plastic Collocation Method Extension of Plastic Node Method by Yukio Ueda, Member Masahiko Fujikubo, Member Masahiro Miura, Member Sum Developement of Plastic Collocation Method Extension of Plastic Node Method by Yukio Ueda, Member Masahiko Fujikubo, Member Masahiro Miura, Member Summary Previously, the authors developed the plastic

More information

16

16 Empirical Analysis of the Efficiency of the Broadcasting Industry: Verification of Regionalism and a Proposal ABSTRACT Reforms in the broadcasting industry have recently been discussed and proposed, and

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke

More information

IPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing

IPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing number of HOG Features based on Real AdaBoost Chika Matsushima, 1 Yuji Yamauchi, 1 Takayoshi Yamashita 1, 2 and

More information

,,.,,.,..,.,,,.,, Aldous,.,,.,,.,,, NPO,,.,,,,,,.,,,,.,,,,..,,,,.,

,,.,,.,..,.,,,.,, Aldous,.,,.,,.,,, NPO,,.,,,,,,.,,,,.,,,,..,,,,., J. of Population Problems. pp.,.,,,.,,..,,..,,,,.,.,,...,.,,..,.,,,. ,,.,,.,..,.,,,.,, Aldous,.,,.,,.,,, NPO,,.,,,,,,.,,,,.,,,,..,,,,., ,,.,,..,,.,.,.,,,,,.,.,.,,,. European Labour Force Survey,,.,,,,,,,

More information