SQL Web Web SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL i
|
|
- めぐの いなくら
- 5 years ago
- Views:
Transcription
1 28 SQL Proposal of attack detection method based on appearance frequency of symbols included in SQL injection attack and its relevance
2 SQL Web Web SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL i
3 SQL SQL ii
4 Abstract Proposal of attack detection method based on appearance frequency of symbols included in SQL injection attack and its relevance Cyber attacks targeting Web applications are a great threat to not only those who operate and manage Web applications but also their users. Among them, there are many attacks aimed at vulnerability of SQL injection attack, and it is pointed out that countermeasures have not kept up despite being a previously known vulnerability. SQL injection attack tends to include many symbols. Therefore, as an existing method, attack detection method focusing on symbols included in SQL injection attack has been proposed. However, while the existing method shows a high detection rate in detection of normal data, the detection rate of attack data is not higher than other detection methods. In order to prevent damage caused by SQL injection attack, it is necessary to improve attack detection rate without lowering performance against normal data. It is shown that the SQL injection attack has the following features. SQL statements inserted into SQL injection attacks differ according to the purpose of the attacker. In addition, in order to establish an SQL injection attack and obtain target information, information related to the database is required, and a method called blind SQL injection is used. In this paper, we propose an attack detection method that exploits the relationship between the attacker s purpose and the occurrence frequency of symbols included in blind SQL injection attack. The proposed method improves the attack detection rate iii
5 without lowering the detection rate of normal data by using the relationship between the purpose of the attacker and the information of the symbol included in the attack data. Moreover, by using blind SQL injection attack data for attack data, it is possible to block requests to collect database related information, which is considered to be a useful attack detection even in actual SQL injection attack. key words attack detection SQL injection machine learning iv
6 SQL SQL SQL SQL SQL SQL Web ( ) Web ( ) (WAF) SQL SVM (Support Vector Machine) SQL v
7 SQL vi
8 2.1 SQL SQL WAF vii
9 2.1 SQL (x ) ( ) (ModSecurity) (SVM) (x ) (x ) viii
10 1 1.1 ICT Web Web Web [1] Web OWASP (Open Web Application Security Project) Web SQL [2] SQL Web SQL Web SQL SQL [3] Web Web (WAF) WAF L7 L4 HTTP 1
11 1.1 [4] WAF SVM (Support Vector Machine) WAF SQL SQL [1] SQL ( ) ModSecurity SVM ModSecurity SVM [1] SQL SQL [11] SQL SQL SQL SQL SQL 2
12 1.2 SQL t 2 SQL 3 SQL 4 3 SQL 5 6 3
13 2 SQL SQL 2.1 SQL SQL (RDMS) RDBMS Oracle Database Microsoft SQL Server MySQL PostgreSQL SQL SQL 2.1 [3] SQL SQL users user admin id password SELECT id, password FROM users WHERE user = admin ; 2.1 SQL ( ) SELECT FROM WHERE AND = >=, a b c table name age YAMADA 20 4
14 2.2 SQL 2.2 SQL SQL (CWE-89: Improper Neutralization of Special Elements used in an SQL Command SQL Injection ) Web SQL [5] SQL Web SQL SQL [3] 2.1 SQL SQL [3] SQL SQL $username $password 5
15 2.3 SQL SELECT * FROM users WHERE user= $username AND password= $password SQL $username $password 1 or 1 = 1 SQL 1 = 1 OR SELECT * FROM users WHERE user= 1 OR 1 = 1 AND password= 1 OR 1 = 1 SQL SQL SQL SQL SQL SQL SQL 1 SQL 2.3 SQL SQL [6] 6
16 2.3 SQL Web ( ) SQL [3]? SQL SQL Web ( ) SQL SQL ( ; % + ) SQL [3] (WAF) WAF (Web Applicatioln Firewall) Web Web WAF 7 4 HTTP [4] WAF SVM (Support Vector Machine) WAF [1] 7
17 2.4 SQL 2.4 SQL SQL SQL SQL SQL SQL sqlmap sqlmap SQL sqlmap SQL [13] Boolean-based blind WHERE HAVING SQL AND 4908=2320 AND TFah = TFah Time-based blind SQL AND SLEEP(5) AND ybnw = ybnw Error-based SQL SELECT CAST(x FFFFFFFFFFFFFFFF AS UNSIGNED)+1; UNION query-based SQL UNION 8
18 2.4 SQL ) UNION ALL SELECT NULL,NULL,NULL# Stacked queries 1 SQL ; SELECT SLEEP(5) 9
19 3 SQL SQL SVM 3.1 SQL Apache ModSecurity SVM SQL 10
20 3.2 SVM (Support Vector Machine) [1] SQL [1] 3.2 SVM (Support Vector Machine) SVM 2 SVM (margin) ( ) (support vector) [12] SVM [9] ( ) 11
21 3.4 [8] 3.4 SQL 1 I A I N 2 ( J A J N ) s 1, s 2,..., s j 3 3 R 3 (x, y, t) 1 X x s 1, s 2,..., s x x 1 X 1 = s 1 2 = s 2... x = s x s j (j = 1, 2,..., x) R 3 X (j, 0, 0) 2 y 1 j s j y j (l i ) = z i(s j ) l i l i l i l i 12
22 3.5 z i (s x ) l i s x l s j1 s j2 (j 1, y j1 (l)) (j 2, y j2 (l)) 3 t t = 1 t = y = a 0 + a 1 x + a 2 x a 0 = b 00 + b 10 t + 2 a 1 = b 01 + b 11 t + 3 a 2 = b 02 + b 12 t + 4 i (i = 1, 2, 3, 4) SQL y = a 0 + a 1 x + a 2 x 2 5 y = a 0 + a 1 x + a 2 x 2 y SQL s jk (k = 1, 2,..., K) T N = (j k, y jk, 0) K k=1 T A = (j k, y jk, 0) K k=1 s j y j 13
23 3.6 SQL 2 T A = (j k, y jk, 0) K k=1 e(t A) T N = (j k, y jk, 0) K k=1 e(t N) 3.6 SQL SQL [10] 2,779 (J A = 2779) Wiki 444 (J A = 444) 3.1 2, SQL 3.1 (x ) 5 Space ; ) ( x
24 [1] 3.3 Apache ModSecurity 3.4 SVM ModSecurity SVM ModSecurity 3.2 ( ) 2, % 100% 3.3 (ModSecurity) % 38% 3.8 ModSecurity SVM 15
25 (SVM) 2, % 0% 2 SQL SQL Web 16
26 4 ModSecurity SVM SQL SQL 4.1 SQL SQL SQL SQL SQL SQL 17
27 4.2 SQL SQL SQL SQL SQL 4.2 SQL 4.2 SQL Web PHP/MySQL Web DVWA (Damn Vulnerable Web Application) VirtualBox Linux DVWA sqlmap $./sqlmap.py -o -u cookie= Cookie ; security=impossible dump-all 4.3 SQL 3 SQL 18
28 4.3 SQL 4.1 VirtualBox OS Web CentOS 6.7 (64bit) DVWA (Damn Vulnerable Web Application) DBMS mysql Ver Distrib , for Linux (x86 64) 4.2 OS OS X El Capitan sqlmap SQL sqlmap Web 1,924 (I A = 1924) Web 268 (I N = 268) 2 1, (x = 5)
29 4.3 SQL y = a 0 + a 1 x + a 2 x (2 ) (x ) y = a 0 + a 1 x + a 2 x (x ) 5 Space ( ), x
30 SP ( ), _ =. * > - `! " # $ & + / : ; [ ] ^ { } ~ DEL 4.2 SQL SQL 21
31 Space ( ), x (x ) 5 x Space ( ), Space ; ) ( 4.6 Space ; ) (
32 y = (b 00 + b 10 t) + (b 01 + b 11 t)x + (b 02 + b 12 t)x 2 b 00 = b 10 = b 01 = b 11 = b 02 = b 12 =
33 4.4 y = (b 00 + b 10 t) + (b 01 + b 11 t)x + (b 02 + b 12 t)x 2 b 00 = b 10 = b 01 = b 11 = b 02 = b 12 = t = 1 t = sqlmap SQL % 100% 94% 100% 24
34 SQL SQl SQL 2 Boolean-based blind Time-based blind Error-based UNION query-based Stacked queries SQL SQL SQL SQL sqlmap SQL 25
35 Web Space Space Space 5.3 SQL Web Web WAF [4] 5.3 SQL WAF WAF 26
36 5.3 課題 複数 WAF インターネット WAF 選択装置 図 5.1 最適 WAF 選択 27 サーバ
37 6 SQL SQL ModSecurity SVM SQL SQL [11] SQL SQL SQL SQL SQL SQL Web Web 28
38 29
39 30
40 [1] : WAF Vol.56 No.9 pp (2015) [2] Web SQL : http: // ( ) [3] IPA SQL : pdf( ) [4] : WAF Vol.77 Issue 3 pp (2015) [5] MITRE Common Weakness Enumeration definitions/89.html ( ) [6] : pp.50-54( ) [7] Web SQL : News/column_g/ /Cobs_ html ( ) [8] : research/application/gasshuku02/lca.pdf( ) [9], : SVM WAF 74 pp (2012) [10] Testing for SQL Injection (OTG-INPVAL-005) : index.php/testing_for_sql_injection_(otg-inpval-006) ( ) [11] : SQL 76 pp (2014) 31
41 [12] Sebastian Raschka : Python pp.66-67( ). [13] SlideShare Web : abend_cve_9999_0001/websqlm ( ) 32
29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More information..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i
25 Feature Selection for Prediction of Stock Price Time Series 1140357 2014 2 28 ..,,,,. 2013 1 1 12 31, ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i Abstract Feature Selection for Prediction of Stock Price Time
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationWeb Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
More informationpaper.dvi
28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret
More informationWeb Web ID Web 16 Web Web i
24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro
More information25 Removal of the fricative sounds that occur in the electronic stethoscope
25 Removal of the fricative sounds that occur in the electronic stethoscope 1140311 2014 3 7 ,.,.,.,.,.,.,.,,.,.,.,.,,. i Abstract Removal of the fricative sounds that occur in the electronic stethoscope
More informationkut-paper-template.dvi
26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More informationVirtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking
23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual
More information, IT.,.,..,.. i
25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More information2 10 The Bulletin of Meiji University of Integrative Medicine 1,2 II 1 Web PubMed elbow pain baseball elbow little leaguer s elbow acupun
10 1-14 2014 1 2 3 4 2 1 2 3 4 Web PubMed elbow pain baseball elbow little leaguer s elbow acupuncture electric acupuncture 2003 2012 10 39 32 Web PubMed Key words growth stage elbow pain baseball elbow
More informationII
No. 19 January 19 2013 19 Regionalism at the 19 th National Assembly Elections Focusing on the Yeongnam and Honam Region Yasurou Mori As the biggest issue of contemporary politics at South Korea, there
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More information22 Google Trends Estimation of Stock Dealing Timing using Google Trends
22 Google Trends Estimation of Stock Dealing Timing using Google Trends 1135064 3 1 Google Trends Google Trends Google Google Google Trends Google Trends 2006 Google Google Trend i Abstract Estimation
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More informationSOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i
20 SOM Development of Syllabus Vsualization System using Spherical Self-Organizing Maps 1090366 2009 3 5 SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i Abstract Development of Syllabus Vsualization
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More information17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
More informationkut-paper-template2.dvi
19 A Proposal of Text Classification using Formal Concept Analysis 1080418 2008 3 7 ( ) Hasse Web Reuters 21578 Concept Explorer 2 4 said i Abstract A Proposal of Text Classification using Formal Concept
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More informationA5 PDF.pwd
DV DV DV DV DV DV 67 1 2016 5 383 DV DV DV DV DV DV DV DV DV 384 67 1 2016 5 DV DV DV NPO DV NPO NPO 67 1 2016 5 385 DV DV DV 386 67 1 2016 5 DV DV DV DV DV WHO Edleson, J. L. 1999. The overlap between
More information29 Short-time prediction of time series data for binary option trade
29 Short-time prediction of time series data for binary option trade 1180365 2018 2 28 RSI(Relative Strength Index) 3 USD/JPY 1 2001 1 2 4 10 2017 12 29 17 00 1 high low i Abstract Short-time prediction
More information24 Region-Based Image Retrieval using Fuzzy Clustering
24 Region-Based Image Retrieval using Fuzzy Clustering 1130323 2013 3 9 Visual-key Image Retrieval(VKIR) k-means Fuzzy C-means 2 200 2 2 20 VKIR 5 18% 54% 7 30 Fuzzy C-means i Abstract Region-Based Image
More informationPC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i
21 The private mailers synchronization operation for plural terminals 1125083 2010 3 1 PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i Abstract The private mailers synchronization operation for plural terminals
More informationCA HP,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,,.,,,,,.,,,,,,.,,,,,.,,,,,.,,,,,,.,,,,,,.,,
Ritsumeikan Alumni Program CA HP,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,.,,,,,,.,,,,,.,,,,,,.,,,,,.,,,,,.,,,,,,.,,,,,,.,,,,,.,,,,,. ,,, :,, :,,,
More information220 28;29) 30 35) 26;27) % 8.0% 9 36) 8) 14) 37) O O 13 2 E S % % 2 6 1fl 2fl 3fl 3 4
Vol. 12 No. 2 2002 219 239 Λ1 Λ1 729 1 2 29 4 3 4 5 1) 2) 3) 4 6) 7 27) Λ1 701-0193 288 219 220 28;29) 30 35) 26;27) 0 6 7 12 13 18 59.9% 8.0% 9 36) 8) 14) 37) 1 1 1 13 6 7 O O 13 2 E S 1 1 17 0 6 1 585
More information2 ( ) i
25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA
More informationIT,, i
22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki
More information九州大学学術情報リポジトリ Kyushu University Institutional Repository 看護師の勤務体制による睡眠実態についての調査 岩下, 智香九州大学医学部保健学科看護学専攻 出版情報 : 九州大学医学部保健学
九州大学学術情報リポジトリ Kyushu University Institutional Repository 看護師の勤務体制による睡眠実態についての調査 岩下, 智香九州大学医学部保健学科看護学専攻 https://doi.org/10.15017/4055 出版情報 : 九州大学医学部保健学科紀要. 8, pp.59-68, 2007-03-12. 九州大学医学部保健学科バージョン : 権利関係
More informationuntitled
JAIS 1 2 1 2 In this paper, we focus on the pauses that partly characterize the utterances of simultaneous interpreters, and attempt to analyze the results of experiments conducted using human subjects
More informationKyushu Communication Studies 第2号
Kyushu Communication Studies. 2004. 2:1-11 2004 How College Students Use and Perceive Pictographs in Cell Phone E-mail Messages IGARASHI Noriko (Niigata University of Health and Welfare) ITOI Emi (Bunkyo
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More informationTitle 社 会 化 教 育 における 公 民 的 資 質 : 法 教 育 における 憲 法 的 価 値 原 理 ( fulltext ) Author(s) 中 平, 一 義 Citation 学 校 教 育 学 研 究 論 集 (21): 113-126 Issue Date 2010-03 URL http://hdl.handle.net/2309/107543 Publisher 東 京
More information大学における原価計算教育の現状と課題
1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012
More information卒業論文2.dvi
15 GUI A study on the system to transfer a GUI sub-picture to the enlarging viewer for operational support 1040270 2004 2 27 GUI PC PC GUI Graphical User Interface PC GUI GUI PC GUI PC PC GUI i Abstract
More information4.1 % 7.5 %
2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel
More information1 Web Web 1,,,, Web, Web : - i -
2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.
More information三税協力の実質化 : 住民税の所得税閲覧に関する国税連携の効果
Kwansei Gakuin University Rep Title 三 税 協 力 の 実 質 化 : 住 民 税 の 所 得 税 閲 覧 に 関 する 国 税 連 携 の 効 果 Author(s) Suzuki, Ushio, 鈴 木, 潮 Citation 経 済 学 論 究, 65(4): 175-197 Issue Date 2012-03-20 URL http://hdl.handle.net/10236/9133
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information202
201 Presenteeism 202 203 204 Table 1. Name Elements of Work Productivity Targeted Populations Measurement items of Presenteeism (Number of Items) Reliability Validity α α 205 α ä 206 Table 2. Factors of
More informationIT i
27 The automatic extract of know-how search tag using a thesaurus 1160374 2016 2 26 IT i Abstract The automatic extract of know-how search tag using a thesaurus In recent years, a number of organizational
More informationWebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More information1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More informationDTN DTN DTN DTN i
28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee
More information21 e-learning Development of Real-time Learner Detection System for e-learning
21 e-learning Development of Real-time Learner Detection System for e-learning 1100349 2010 3 1 e-learning WBT (Web Based training) e-learning LMS (Learning Management System) LMS WBT e-learning e-learning
More informationABSTRACT The Social Function of Boys' Secondary Schools in Modern Japan: From the Perspectives of Repeating and Withdrawal TERASAKI, Satomi (Graduate School, Ochanomizu University) 1-4-29-13-212, Miyamaedaira,
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More information(1) i NGO ii (2) 112
MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 * * 2 * 3 * 4 * 5 * 6 * 7 * 8 Service Learning for Engineering Students Satsuki TASAKA*, Mitsutoshi ISHIMURA* 2, Hikaru MIZUTANI* 3, Naoyuki
More information07_伊藤由香_様.indd
A 1 A A 4 1 85 14 A 2 2006 A B 2 A 3 4 86 3 4 2 1 87 14 1 1 A 2010 2010 3 5 2 1 15 1 15 20 2010 88 2 3 5 2 1 2010 14 2011 15 4 1 3 1 3 15 3 16 3 1 6 COP10 89 14 4 1 7 1 2 3 4 5 1 2 3 3 5 90 4 1 3 300 5
More information陶 磁 器 デ ー タ ベ ー ス ソ リ ュ ー シ ョ ン 図1 中世 陶 磁 器 デ ー タベ ー ス 109 A Database Solution for Ceramic Data OGINO Shigeharu Abstract This paper describes various aspects of the development of a database
More information社会学部紀要 114号☆/22.松村
March 2012 1 1 1 2005 : 261 1 100 2 22 15.1 41.8 10.3 100 3 2008 : 282 23 34 70 3 114 30 4 1 2 1 2 2 1 1998 1999 2004 N 3 4 7 9 3 100 1970 March 2012 15900 42 10 15000 4 K 40 2 2 2 3 5 100 DVD 6 http :
More information〈論文〉英語学習辞書における二重母音と三重母音の発音表記の異同
Abstract For learners who aim at a clear and logical understanding of the English pronunciation system, phonetic symbols provided in learners' English dictionaries can be a powerful tool if they are properly
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More information,,.,.,,.,.,.,.,,.,..,,,, i
22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of
More informationVol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L
Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP
More information,,.,,.,..,.,,,.,, Aldous,.,,.,,.,,, NPO,,.,,,,,,.,,,,.,,,,..,,,,.,
J. of Population Problems. pp.,.,,,.,,..,,..,,,,.,.,,...,.,,..,.,,,. ,,.,,.,..,.,,,.,, Aldous,.,,.,,.,,, NPO,,.,,,,,,.,,,,.,,,,..,,,,., ,,.,,..,,.,.,.,,,,,.,.,.,,,. European Labour Force Survey,,.,,,,,,,
More information52-2.indb
Jpn. J. Health Phys., 52 (2) 55 60 (2017) DOI: 10.5453/jhps.52.55 * 1 * 2 * 2 * 3 * 3 2016 10 28 2017 3 8 Enhancement of Knowledge on Radiation Risk Yukihiko KASAI,* 1 Hiromi KUDO,* 2 Masahiro HOSODA,*
More information28 TCG SURF Card recognition using SURF in TCG play video
28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka
More informationStudies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth
Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth and Foot Breadth Akiko Yamamoto Fukuoka Women's University,
More informationTF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat
1 1 2 1. TF-IDF TDF-IDF TDF-IDF. 3 18 6 Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Satoshi Date, 1 Teruaki Kitasuka, 1 Tsuyoshi Itokawa 2
More informationSobel Canny i
21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been
More informationCore Ethics Vol.
Core Ethics Vol. Core Ethics Vol. . % % % Core Ethics Vol. %, Core Ethics Vol. % % % -. %. Core Ethics Vol. a b : Core Ethics Vol. pp... pp.. pp... pp. pp.. pp...pp.... pp. pp. pp.. pp.. Vol.. pp... pp..
More informationThe Indirect Support to Faculty Advisers of die Individual Learning Support System for Underachieving Student The Indirect Support to Faculty Advisers of the Individual Learning Support System for Underachieving
More information2007-Kanai-paper.dvi
19 Estimation of Sound Source Zone using The Arrival Time Interval 1080351 2008 3 7 S/N 2 2 2 i Abstract Estimation of Sound Source Zone using The Arrival Time Interval Koichiro Kanai The microphone array
More information58 10
57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have
More information23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones
23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones 1120220 2012 3 1 iphone..,. 2 (, ) 3 (,, ),,,.,..,. HCI i Abstract A Comparison of Flick and Ring Document Scrolling in
More information20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow
20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering
More information屋内ロケーション管理技術
Technology to Manage Indoor Locations 奥山敏 森信一郎 小川晃弘 あらまし ICT GPS GPS Abstract Smart devices and wireless networks have become widespread and an environment is gradually being put in place in which information
More informationn 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i
15 Comparison and Evaluation of Dynamic Programming and Genetic Algorithm for a Knapsack Problem 1040277 2004 2 25 n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i Abstract Comparison and
More informationWebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i
28 WebRTC Design of multi-platform file sharing system using WebRTC 1170336 2017 2 28 WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i Abstract Design of multi-platform file sharing system using WebRTC Harumi
More information1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,
More information<95DB8C9288E397C389C88A E696E6462>
2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,
More information17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
More information1. 1 DBMS Unix (USP ) ( )[3] 20 UNIX [2] KISS UNIX 1. 2 (Tukubai ) Unix OS Unix USP Tukubai Tukubai 1. 3 Unix SQL Tukubai usp Tukubai Open usp Tukubai
34 (2017 ) Unix UNIX 20 RDBMS RDBMS Java Unix Unix Unix Unicage is a system development method based on UNIX philosophy and has been applied on business system integration for 20 years. In these days,
More informationA Contrastive Study of Japanese and Korean by Analyzing Mistranslation from Japanese into Korean Yukitoshi YUTANI Japanese, Korean, contrastive study, mistranslation, Japanese-Korean dictionary It is already
More information2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last
1 北陸大学 紀要 第33号 2009 pp. 173 186 原著論文 バーチャル世界における呼びかけ語の コミュニケーション機能 ポライトネス理論の観点からの考察 劉 艶 The Communication Function of Vocative Terms in Virtual Communication: from the Viewpoint of Politeness Theory Yan
More informationuntitled
i ii iii iv v 43 43 vi 43 vii T+1 T+2 1 viii 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 a) ( ) b) ( ) 51
More information2
1 2 3 4 5 6 7 8 9 10 I II III 11 IV 12 V 13 VI VII 14 VIII. 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 _ 33 _ 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 VII 51 52 53 54 55 56 57 58 59
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More informationP2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i
26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More informationWeb [1] [2] [3] [4] [5] SupportVectorMachine SVM [6] [7] Google [11] Web
DEIM Forum 2009 E5-6 112-8610 2-1-1 112-8610 2-1-1 E-mail: {asami y,koba}@koba.is.ocha.ac.jp Web AJINOMOTO Easy Cooking Recipe Recommendation Considering User s Conditions Asami YAJIMA and Ichiro KOBAYASHI
More informationChapter 1 1-1 2
Chapter 1 1-1 2 create table ( date, weather ); create table ( date, ); 1 weather, 2 weather, 3 weather, : : 31 weather -- 1 -- 2 -- 3 -- 31 create table ( date, ); weather[] -- 3 Chapter 1 weather[] create
More information;~ (Summary) The Study on the Effects of Foot Bathing on Urination Kumiko Toyoda School of Human Nursing, University of Shiga Prefecture Background Foot bathing is one of the important nursing care for
More information43 38 2000 6 1980 2004 8 24 2 8 26 9 2
No.6, 42-53 (2005) One peculiar aspect of the military in North Korea MIYATA Atsushi Nihon University, Graduate school of Social and Cultural Studies North Korea is well-known for having one of the largest
More information2017 (413812)
2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has
More information,, 2024 2024 Web ,, ID ID. ID. ID. ID. must ID. ID. . ... BETWEENNo., - ESPNo. Works Impact of the Recruitment System of New Graduates as Temporary Staff on Transition from College to Work Naoyuki
More information51 Historical study of the process of change from Kenjutsu to Kendo Hideaki Kinoshita Abstract This paper attempts to clarify the process of change from Gekiken and Kenjutsu to Kendo at the beginning of
More informationBull. of Nippon Sport Sci. Univ. 47 (1) Devising musical expression in teaching methods for elementary music An attempt at shared teaching
Bull. of Nippon Sport Sci. Univ. 47 (1) 45 70 2017 Devising musical expression in teaching methods for elementary music An attempt at shared teaching materials for singing and arrangements for piano accompaniment
More information21 A contents organization method for information sharing systems
21 A contents organization method for information sharing systems 1125140 2010 3 4 IT i Abstract A contents organization method for information sharing systems Aoki, Wataru Organizations to share information,
More information外部SQLソース入門
Introduction to External SQL Sources 外部 SQL ソース入門 3 ESS 3 ESS : 4 ESS : 4 5 ESS 5 Step 1:... 6 Step 2: DSN... 6 Step 3: FileMaker Pro... 6 Step 4: FileMaker Pro 1. 6 Step 5:... 6 Step 6: FileMaker Pro...
More informationEQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju
EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo
More information