4_3.dvi

Size: px
Start display at page:

Download "4_3.dvi"

Transcription

1 Vol. 49 No (Apr. 2008) Malware 1, DDoS Herder Malware Malware Malware A Development of the Malware Dynamic Behavior Analyzing System and BOTNET Monitoring Keiichi Horiai, 1, 2 Takafumi Imaizumi 1 and Hidehiko Tanaka 2 Today, BOTNET activities such as massive spam spreading, DDoS attacks and stealing information from exploited PCs are major concern regarding to the internet security. Since, spreading the infection of the bots is controlled by so called HERDER via command and control mechanism, and not spreading autonomously like conventional worm, it is not easy task to understand the behavior of the malwares of the botnets. We developed a Malware dynamic behavior analyzing system which is coupled to internet monitoring sites and provide useful information to understand the BOTNET characteristics. This system is intended to provide not only overall trend information but also drilling down to detailed information of each event including the result of the Malware behavior analysis. 1. DDoS PC IRC Internet Relay Chat IP 2% 2.5% 1) DDoS Herder Malware Malware Malware Malware Malware Malware Malware 1 Electronic Systems Research Center, Technical Research & Development Institute, Ministry of Defense 2 INSTITUTE of INFORMATION SECURITY 1680 c 2008 Information Processing Society of Japan

2 1681 Malware ) 3) 2) JPCERT/CC ISP 3) Malware BOX IRC IRC Malware 4) 7) 4) Windows 5) API CALL 6) DLL / 7) Worm Lion/Slapper Worm Malware PC Malware FQDN PC Malware hosts PC 8) 10) 8) 9) IP 2 IP Malware IP IDS 11) JPCERT/CC ISDA Internet Scan Data Acquisition System 12) (1) IP Malware (2) IP IP IP (3) (4) Malware Malware (5) (6)

3 1682 Malware (1) (4) (5) (6) Malware Windows XP PC (5) (6) nimda 13) blaster 14) Malware Malware FQDN DNS FQDN IP Malware DNS IRC IRC HTTP 15) IRC HTTP SMTP Malware Malware Malware 1 Malware FQDN IP Malware 8 agobot 29) IRC 2) Malware PC PC Malware Windows Malware ID PC 1 Fig. 1 An over view of proposed system. Malware 3.2 (1) (2) Malware DB (3) Malware (4) DB (5) VMWare 16) PC 2 PC OS Linux IP VMWare 1 Nepenthes 17) IDS Snort 18) Nepenthes Windows Malware Nepenthes Malware UNIX RSYNC

4 1683 Malware SSH 3.4 OS { IP IP Malware } 10 IP Malware IP 7 IP N N Malware 10 IP IP Malware Malware Malware ClamAV 19) Malware Malware *unknown* 3.5 Web HTML PHP 20) PHP JpGraph 21) 10 Malware 3.6 Malware 3.4 HTML IP 1 10 HTML 10 2 Fig. 2 An overview of the overall monitoring display.

5 1684 Malware 2 IP 5 IP 6 IP 7 NSLOOKUP WHOIS IP IP Malware 2 Malware 5 Malware 8 Malware Malware 3.6 Malware Malware Windows XP Windows Malware VMWare Windows XP Linux iptables DNS IRC SMTP Truman 22) Malware tcpdump FQDN IP IRC Malware Windows Malware Malware ID Malware Windows XP VMWare Snapshot Malware Malware Malware OS VMWare Server Malware Windows XP VictimPC 1 PC VMWare VictimPC VictimPC OS VictimPC scloader scvictim VictimPC scvictim VictimPC software tool Malware 3 Malware Fig. 3 Structure of the Malware execution environment. Malware Malware Malware VictimPC host-only TCP/IP ftp http Malware VictimPC VMWare OS OS I/O OS OS VictimPC DB scrscchg Malware HTML Web Malware 4 Malware Malware 1 Malware Windows Malware 1 1 * Function VictimPC VictimPC OS PC VictimPC

6 1685 Malware Fig. 4 4 Malware Malware Execution macro flow chart. 1 Table 1 Software tools utilized. Fig. 5 5 An example of tools and checking items definition. 4. VictimPC VictimPC scloader scloader scvictim 5 VictimPC scloader 5 tool d inspection Malware Malware 180 md5sum WEB IP 6 Site:all Malware IP Malware IP 8 IP IP

7 1686 Malware Fig. 8 8 IP A screenshot of the attacking history from specified IP address. 6 Fig. 6 A screenshot of overall situational display Fig. 7 A screenshot of the timelines and Top-10 display. 9 IP Fig. 9 An example of the IP address s user information. IP 1 Malware Malware IP IP whois nslookup 9 IP Malware Malware 7 10 Malware 10 Trojan.Sdbot-3012

8 1687 Malware Fig Malware A screenshot of the searching behavioral analysis report by Malware hash value. Malware Trojan.Sdbot Malware Trojan.Sdbot Malware AGOBOT 1f0e458c6852dc7e031cc1e005daf6 b4:pe AGOBOT.AQM f7f1e7c55fe828dcf27ef04f9adaedbf PE BOBAX.AH 2 Malware PE AGOBOT.AQM PE AGOBOT.AQM Back door.sdbot W32/Mytob Win32.Agobot 25) MS RPC/DCOM 26) MS RPC/Locator 27) WebDAV MS ) AGOBOT Gaobot Phatbot Polybot 11 PE AGOBOT Fig. 11 A screenshot of the analysis report: PE AGOBOT. 8 Sdbot Gaobot 29) 11 2 HKLMY=SOFTWAREY=MicrosoftY=Windows Y=CurrentVersionY=Run C:Y=windowsY=system32 2 firewall.exe svchost.exe ID, PATH TCP/UDP Malware PC OS

9 1688 Malware Windows hosts hosts PC C&C FQDN C&C PC IP XXX DNS IP PE BOBAX.AH PE BOBAX.AH 2005/09/07 MS LSASS 30) Malware hosts 31) 12 2 HKLMY=SOFTWAREY=MicrosoftY=Windows Y=CurrentVersionY=Run C:Y=windowsY=system32 2 WINAMP.EXE OIOEKZZECLPY.EXE hosts OS ) 3) FQDN 4) http Malware 5) FQDN 6) 8) http C&C 11) Malware FQDN http 4.3 Malware 5,000 Malware Malware ClamAV 2 Malware 15% Malware snort Malware Windows Fig PE BOBAX.AH A screenshot of the analysis report: PE BOBAX.AH. 2 Malware Table 2 Malware classification by clamav.

10 1689 Malware 3 Table 3 Port used for attacks. 4 5 Table 4 Top 5 of files that is created. 13 Malware Fig. 13 Changes of Malware ratio that modifies system files. Table 5 5 KEY 5 Top 5 of Windows Registry KEY that is modified. 14 Fig. 14 Changes of ports that are used by bot. C&C 25 SMTP Malware KEY 5 PC Windows KEY 13 Malware Windows hosts Malware Malware Malware 70% hosts Malware WindowsOS Malware Malware IRC 80 HTTP Malware Malware 1 32),33) 14 http smtp Malware IRC 2) IP PC C&C herder C&C 4.4 Malware Malware

11 1690 Malware 6 PC Malware 5 Table 6 Top 5 of Malware that could not get data from PC. Malware 5,000 Malware VictimPC Malware PC PC Malware 2007 Trend Flex Security 5 6 (A) PC Malware (B) WORM RBOT PE PARITE Malware Malware 5,158 4,964 PC 5. Malware Malware Malware C&C FQDN Windows hosts Malware Malware Malware Windows Malware Malware Malware Malware IRC 1) Honeynet project: Know your Enemy: Tracking Botnets. 2) Vol.47, No.8 (2006). 3) Rajab, M.A., Zarfoss, J., Monrose, F. and Terzis, A.: A Multifaceted Approach to Understanding the Botnet Phenomenon, IMC 06, October (2006). 4) Vol.46, No.8 (2005). 5) Macro-Micro Correlation Analysis for Binding Darknet Traffic and Malwares, SCIS2007 (2007). 6) Micro Analysis for Analyzing Malware Code and its Behavior on NICTER, SCIS2007 (2007). 7) Jiang, X., Xu, D., Wang, H.J. and Spafford, E.H.: Virtual Playgrounds For Worm Behavior Investigation, Microsoft Research. 8) Vol.47, No.4 (2006). 9) IP Matrix Vol.47, No.4 (2006). 10) Ball, R., Fink, G.A. and North, C.: Home-Centric Visualization of Network Traffic for Security Administration, ACM (2004). 11)

12 1691 Malware 12) JPCERT/CC. 13) Nimda. 14) Blaster. 15) botnet.pdf 16) VMWare. 17) Nepenthes. 18) snort. 19) ClamAV AntiVirus. 20) PHP. 21) JpGraph. 22) Stewar, T.J.: Truman, The Reusable Unknown Malware Analysis Net. 23) 24) 25) default5.asp?vname=pe%5fagobot%2eaqm 26) 27) 28) 29) 30) 31) default5.asp?vname=pe%5fbobax%2eah&vsect=p 32) 33) bot analysis report.pdf ( ) ( ) Parallel Inference Engine IEEE

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

3_23.dvi

3_23.dvi Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems

More information

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2 Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service

More information

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP

More information

分析レポート2_Gaobot

分析レポート2_Gaobot Distributed via http://www.cyberpolice.go.jp/ @police - 1 - - 2 - IRC Gaobot IRC IRC DDoS IRC IRC IRC - 3 - Gaobot IRC IRC TCP6660 6669 IRC - 4 - IRC IP IRC IRC Gaobot - 5 - IRC IP 10.1.1.1 IRC - 6 - -

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

スライド 1

スライド 1 IBM Global Technology Services PCI DSS ITS IAS. IAS. 2I/T 1PCIDSS 2 2 PCI DSS QSA PCIDSS Fi Gap IBM PCIDSS IBM PCIDSS QSA QSA PCIDSS ROC* 1/ * ROC: Report on Compliance 3 PCI DSS 4 PCIDSS PCIDSS 1. PCIDSS

More information

3_39.dvi

3_39.dvi Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar

More information

今企業が取るべきセキュリティ対策とは策

今企業が取るべきセキュリティ対策とは策 AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.

More information

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking 23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual

More information

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2

More information

特集_02-03.Q3C

特集_02-03.Q3C 2-3 A Development of Experimental Environments "SIOS" and "VM Nebula" for Reproducing Internet Security Incidents MIWA Shinsuke and OHNO Hiroyuki Security incidents are growing significantly on a daily

More information

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google Drive-by Download 1,a) 1,b) Web Drive-by Download(DbD) DbD Web DbD HTTP DbD Web DbD, Drive-by Download The Network Visualization Tool for detecting the Drive-by Download attacks. Amako Katsuhiro 1,a) Takada

More information

2-20030509.PDF

2-20030509.PDF JPCERT/CC 1 Firewall 2 Security Incident 3 Cgi-bin Cross Site Scripting (CSS) 4 Statistics@JPCERT/CC 3,000 2,500 2,000 1,500 1,000 500 0 1996Q4 1997 1998 1999 2000 2001 2002 Number of Reports 5 2002 JPCERT/CC

More information

IP IP DHCP..

IP IP DHCP.. NICE 2008 4 14 1 NICE 2 1.1.................... 2 2 3 2.1........................................ 3 2.2....................................... 5 2.3.................................... 6 2.4...................................

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

IPSJ SIG Technical Report Vol.2013-GN-86 No.35 Vol.2013-CDS-6 No /1/17 1,a) 2,b) (1) (2) (3) Development of Mobile Multilingual Medical

IPSJ SIG Technical Report Vol.2013-GN-86 No.35 Vol.2013-CDS-6 No /1/17 1,a) 2,b) (1) (2) (3) Development of Mobile Multilingual Medical 1,a) 2,b) 3 24 3 (1) (2) (3) Development of Mobile Multilingual Medical Communication Support System and Its Introduction for Medical Field Shun Ozaki 1,a) Takashi Yoshino 2,b) Aguri Shigeno 3 Abstract:

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

1. 2

1. 2 2004 1. 2. 1. 2 Web 3 4 5 6 PDA 7 USB CD DVD 8 9 10 11 LAN 12 13 14 P2P Web USB CD,DVD PDA 15 CD,DVD USB 16 17 18 19 VPN 20 PC 21 LAN 22 23 24 ISO/IEC17799 25 26 27 28 29 DDoS DoS DoS DDoS DoS ( ) ( )

More information

IW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN

IW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN 1 Internet Week 2002 20021218() 9:3012:30 () kuma@isid.co.jp ADSLFTTH 24 IP LAN LAN LAN 2 1 ? 3? 4 e-japan 20053000 20051000 2 IP»» 5 CATV DSL FTTH LAN 6 620(20029) CATV 180DSL 422FTTH 12 14 3 MP3CD CM

More information

IPSJ SIG Technical Report Vol.2009-CSEC-46 No /7/2 nicter Conficker nicter Conficker nicter Network Observation and Analysis Re

IPSJ SIG Technical Report Vol.2009-CSEC-46 No /7/2 nicter Conficker nicter Conficker nicter Network Observation and Analysis Re nicter Conficker 1 1 2 1 nicter 28 11 Conficker nicter Network Observation and Analysis Report on nicter Continuous Observaion of Conficker and a Primary Example of Maco-Micro Correlation Analysis Junji

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

Systemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows

Systemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows Systemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows Systemwalker IT Service Management Systemwalker Centric Manager IT Service

More information

Vol. 28 No. 2 Apr. 2011 173 1. 1 Web Twitter/Facebook UI 4 1. 2. 3. 4. Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2

Vol. 28 No. 2 Apr. 2011 173 1. 1 Web Twitter/Facebook UI 4 1. 2. 3. 4. Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2 172 SNS Web Web As social web sites such as blog and SNS(Social Network System) became popular, many people have communicated with their friends on the Web. Meanwhile, several problems of social web sites

More information

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append

More information

1_26.dvi

1_26.dvi C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

189 2015 1 80

189 2015 1 80 189 2015 1 A Design and Implementation of the Digital Annotation Basis on an Image Resource for a Touch Operation TSUDA Mitsuhiro 79 189 2015 1 80 81 189 2015 1 82 83 189 2015 1 84 85 189 2015 1 86 87

More information

2

2 0. 92a --------------------------------------------------------- ---------------------------------------------------- 1. 1-1. 1-2. 1-3. 2. 2-5. 1 2 a ---------------------------------------------------------

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

集中講義 インターネットテクノロジー 第5回

集中講義 インターネットテクノロジー 第5回 5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of

More information

1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student

1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student LAN 0000000000 6/6, 6/13, 6/20 1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari studentd even kumabari 1: LAN

More information

1 UD Fig. 1 Concept of UD tourist information system. 1 ()KDDI UD 7) ) UD c 2010 Information Processing S

1 UD Fig. 1 Concept of UD tourist information system. 1 ()KDDI UD 7) ) UD c 2010 Information Processing S UD 1 2 3 4 1 UD UD UD 2008 2009 Development and Evaluation of UD Tourist Information System Using Mobile Phone to Heritage Park HISASHI ICHIKAWA, 1 HIROYUKI FUKUOKA, 2 YASUNORI OSHIDA, 3 TORU KANO 4 and

More information

untitled

untitled 2 1 Web 3 4 2 5 6 3 7 Internet = Inter Network 8 4 B B A B C A B C D D 9 A G D G F A B C D F D C D E F E F G H 10 5 11 Internet = Inter Network PC 12 6 1986 NSFNET 1995 1991 World Wide Web 1995 Windows95

More information

2004 SYN/ACK SYN Flood G01P014-6

2004 SYN/ACK SYN Flood G01P014-6 2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................

More information

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

橡最新卒論

橡最新卒論 Research of improving of recognition ability in Face recognition system Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint,

More information

NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for

NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for SIP utilizing NAT-f Kenkichi Miura, 1 Hidekazu Suzuki

More information

解説 29 1 PINET 2 Virtual Library Quick Reference 2. 1) 2)

解説 29 1 PINET 2 Virtual Library Quick Reference 2. 1) 2) 解説 インターネット無料情報源の有効活用について 医薬情報ネット 21 1 21 PINET21PINET Virtual Library PINET Virtual Library Effective use of the Internet free source PINET21 1 Author Abstract: The recent spread-out of the Internet is

More information

The Japanese economy in FY2015 suffered from sluggish growth in individual consumption, while the foreign exchange market remained unstable with high volatility. Even in such an economic environment, MSF

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

worm hoihoi

worm hoihoi true@sfc.wide.ad.jp / (IDS, Honeypot), Web / : Darknet AS65531 10.0.0.0/8 Prefix longest match next hop AS Internet Customer A 10.1.0.0/16 AS 65531 10.0.0.0/8 Customer B 10.2.0.0/16 ( ) The Team Cymru

More information

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus Vol. 48 No. 3 Mar. 2007 PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Industry Collaboration Yoshiaki Matsuzawa and Hajime Ohiwa

More information

NKK NEWS 2012

NKK NEWS 2012 2012Spring 42 CONTROLS SINGLE POINT OF CONTROL (S.P.O.C.) Introduction / Index INDEX Module Versions: C / D BECAUSE CONTROL IS LOGIC! www.42controls.com Introduction... 2 Console Desktop Version... 3

More information

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification

More information

Lite 2 45 ECHONET Lite ECHONET Lite [2], [3], [4], [5], [6], [7] IoT WoT Web [8] HEMS [9] ECHONET Lite ECHONET Lite ECHONET Lite ECHONET Lite ECHONET

Lite 2 45 ECHONET Lite ECHONET Lite [2], [3], [4], [5], [6], [7] IoT WoT Web [8] HEMS [9] ECHONET Lite ECHONET Lite ECHONET Lite ECHONET Lite ECHONET ECHONET Lite,a),b),c) 2,d) 2,e) 2,f),g),2,h) IoT WoT Web 20 2 6 HEMS ECHONET Lite ECHONET Lite 4 ECHONET Lite ECHONET Lite Arduino Raspberry Pi JavaScript Ruby HEMS,,,, ECHONET Lite Development of Educational

More information

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows ActionScript3.0 1 1 YouTube Flash ActionScript3.0 Face detection and hiding using ActionScript3.0 for streaming video on the Internet Ryouta Tanaka 1 and Masanao Koeda 1 Recently, video streaming and video

More information

評論・社会科学 84号(よこ)(P)/3.金子

評論・社会科学 84号(よこ)(P)/3.金子 1 1 1 23 2 3 3 4 3 5 CP 1 CP 3 1 1 6 2 CP OS Windows Mac Mac Windows SafariWindows Internet Explorer 3 1 1 CP 2 2. 1 1CP MacProMacOS 10.4.7. 9177 J/A 20 2 Epson GT X 900 Canon ip 4300 Fujifilm FinePix

More information

johokiso-internet

johokiso-internet 1 2 (Internet) : ( internet) : IP (The Internet) = Web? Internet, 1960 ARPAnet (Advanced Research Project Agency) : 1988 1989 + 1992 IIJ () 3 4 = (etc.) + = 1 () A B: A3 defaut: A2 A1 A3 B1 defaut: A2

More information

CCC DATAset 2009 によるマルウェア配布元の可視化

CCC DATAset 2009 によるマルウェア配布元の可視化 CCC DATAset 2009 105-0001 4-1-17 3F CCC DATAset 2009 1 URL Visualization of the Malware distribution by CCC DATAset 2009 Takahiro Matsuki Yuu Arai Risk Research Institute of Cyber Space, Little earth Corporation

More information

Web-ATMによる店舗向けトータルATMサービス

Web-ATMによる店舗向けトータルATMサービス Web- Total Service for Stores by Web- 土田敬之 阿久津和弘 山本耕司 高木晋作 川端正吾 幾見典計 あらまし Automated Teller Machine 2002 2004 Web- 2013 3 5 4400 Web- Abstract Automated teller machines (s) for financial institutions have

More information

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055 1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free

More information

IPSJ SIG Technical Report Vol.2014-CE-127 No /12/7 1,a) 2,3 2,3 3 Development of the ethological recording application for the understanding of

IPSJ SIG Technical Report Vol.2014-CE-127 No /12/7 1,a) 2,3 2,3 3 Development of the ethological recording application for the understanding of 1,a) 2,3 2,3 3 Development of the ethological recording application for the understanding of the zoo animals behavior Yoshida Nobuaki 1,a) Tanaka Masayuki 2,3 Wada Seitaro 2,3 Abstract: The authors are

More information

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights 1 Internet Week 2001 ( ) kuma@isid.co.jp 2 CodeRed 1 3 (EXCEED ) se cu ri ty? 4? 2 5 Web IP Web MP3 6 3 7 1.5Mbps8Mbps 500 MP3 CM VoD 8 4 ADSL (Asymmetric Digital Subscriber Line) () CATV FWA (Fixed Wireless

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL 1. Twitter 1 2 3 3 3 Twitter Twitter ( ) Twitter (trendspotter) Twitter 5277 24 trendspotter TRENDSPOTTER DETECTION SYSTEM FOR TWITTER Wataru Shirakihara, 1 Tetsuya Oishi, 2 Ryuzo Hasegawa, 3 Hiroshi Hujita

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

システム開発プロセスへのデザイン技術適用の取組み~HCDからUXデザインへ~

システム開発プロセスへのデザイン技術適用の取組み~HCDからUXデザインへ~ HCDUX Approach of Applying Design Technology to System Development Process: From HCD to UX Design 善方日出夫 小川俊雄 あらまし HCDHuman Centered Design SE SDEMHCDUIUser Interface RIARich Internet ApplicationUXUser

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:

More information

1 Web Web 1,,,, Web, Web : - i -

1 Web Web 1,,,, Web, Web : - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.

More information

24 LED A visual programming environment for art work using a LED matrix

24 LED A visual programming environment for art work using a LED matrix 24 LED A visual programming environment for art work using a LED matrix 1130302 2013 3 1 LED,,,.,. Arduino. Arduino,,,., Arduino,.,, LED,., Arduino, LED, i Abstract A visual programming environment for

More information

IPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f

IPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f 1,a) 2 zabbix Consideration of a system to support understanding of fault occurrences based on the similarity of the time series Miyaza Nao 1,a) Masuda Hideo 2 Abstract: With the development of network

More information

82801pdf.pqxp

82801pdf.pqxp PC Contents Chapter 1 PC / Chapter 2/ 1 2 SMS WAN BITS Chapter 3 SMS 2003 SMS SMS SMS 2003 2 6 8 9 9 10 11 12 13 14 16 17 17 18 19 19 20 20 21 22 24 24 25 25 26 26 27 28 PC PC PC PC PC IT 1 1 PC PC PC

More information

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake

More information

imai@eng.kagawa-u.ac.jp (phishing) URL HP web URL URL Phishing Phishing "fishing" "sophisticated" WikiPedia http://en.wikipedia.org/wiki/phishing "fishing" "phreaking" phreak http://www.atmarkit.co.jp/fsecurity/special/83phishing/phishing00.html

More information

100 SDAM SDAM Windows2000/XP 4) SDAM TIN ESDA K G G GWR SDAM GUI

100 SDAM SDAM Windows2000/XP 4) SDAM TIN ESDA K G G GWR SDAM GUI 30 99 112 2006 SDAM SDAM SDAM SDAM 1950 1960 1970 SPSS SAS Microsoft Excel ArcView GIS 2002 ArcExplorer 1) MANDARA 2) GIS 2000 TNTLite 3) GIS 100 SDAM SDAM Windows2000/XP 4) SDAM TIN ESDA K G G GWR SDAM

More information

1: ( 1) 3 : 1 2 4

1: ( 1) 3 : 1 2 4 RippleDesk Using Ripples to Represent Conversational Noise on Internet Shigaku Iwabuchi Takaomi Hisamatsu Shin Takahashi Buntarou Shizuki Kazuo Misue Jiro Tanaka Department of Comupter Science, University

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral

Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Parallel Computer Ships1 Makoto OYA*, Hiroto MATSUBARA**, Kazuyoshi SAKURAI** and Yu KATO**

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

知能と情報, Vol.30, No.5, pp

知能と情報, Vol.30, No.5, pp 1, Adobe Illustrator Photoshop [1] [2] [3] Initital Values Assignment of Parameters Using Onomatopoieas for Interactive Design Tool Tsuyoshi NAKAMURA, Yuki SAWAMURA, Masayoshi KANOH, and Koji YAMADA Graduate

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.23 Vol.2009-GN-73 No.23 Vol.2009-EIP-46 No /11/27 t-room t-room 2 Development of

IPSJ SIG Technical Report Vol.2009-DPS-141 No.23 Vol.2009-GN-73 No.23 Vol.2009-EIP-46 No /11/27 t-room t-room 2 Development of t-room 1 2 2 2 2 1 1 2 t-room 2 Development of Assistant System for Ensemble in t-room Yosuke Irie, 1 Shigemi Aoyagi, 2 Toshihiro Takada, 2 Keiji Hirata, 2 Katsuhiko Kaji, 2 Shigeru Katagiri 1 and Miho

More information

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System 1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a 1, 1,a) 1, 2 1 1, 3 2 1 2011 6 17, 2011 12 16 Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a) Kazuki Kanamori 1, 2 Mie Nakatani 1 Hirokazu Kato 1, 3 Sanae H. Wake 2 Shogo Nishida

More information

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high

More information

untitled

untitled 1 2 ...1 ...1...3...4...4...4...5...7...10 3-1...10 3-2...10 3-3...11 3-4 Windows2000 / XP...11 3-5 PC...13...14 4-1 SYSTEM...14 4-2 DISPLAY...15...17...20...22...23...24...25...25...25...25...26...28

More information

Copyright

Copyright 2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright

More information

- 1 -

- 1 - Distributed via http://www.cyberpolice.go.jp/ - 1 - - 2 - etc IDS - 3 - - 4 - 1.3% 1.4% 2.4% 3.3% 6.2% 6.4% 14.6% 9.1% 27.6% 16.4% 11.3% - 5 - 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% - 6 - 1.8% 1.8%

More information

Development of Analysis Equipment for the Reprocessing Plant using Microchips Microchip, Analysis, Reprocessing, Thermal Lens, Uranium, Plutonium Development of Analysis Equipment for the Reprocessing

More information

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation

More information

自然言語処理16_2_45

自然言語処理16_2_45 FileMaker Pro E-learning GUI Phrase Reading Cloze. E-learning Language Processing Technology and Educational Material Development Generating English Educational Material using a Database Software Kenichi

More information

ICTのメガトレンドに向けたハイパーコネクテッド・クラウドへの取組み

ICTのメガトレンドに向けたハイパーコネクテッド・クラウドへの取組み ICT Project on Hyper-connected Cloud to Embrace Megatrends in ICT 飯田一朗 あらまし ICT SI ICT Abstract With significant changes occurring on a daily basis, the information and communications technology (ICT)

More information

untitled

untitled FutureNet Microsoft Corporation Microsoft Windows Windows 95 Windows 98 Windows NT4.0 Windows 2000, Windows XP, Microsoft Internet Exproler (1) (2) (3) COM. (4) (5) ii ... 1 1.1... 1 1.2... 3 1.3... 6...

More information

IT講習会

IT講習会 2002 CAVIN SR 2002/10/12-14 2 2002/10/12-14 3 http://www.npa npa.go..go.jp/police_j.htm 2002/10/12-14 4 1 2 3 4 5 6 7 2002/10/12-14 5 2002/10/12-14 6 2002/10/12-14 7 1 2 3 4 5 6 7 2002/10/12-14 8 IT IT

More information

屋内ロケーション管理技術

屋内ロケーション管理技術 Technology to Manage Indoor Locations 奥山敏 森信一郎 小川晃弘 あらまし ICT GPS GPS Abstract Smart devices and wireless networks have become widespread and an environment is gradually being put in place in which information

More information

untitled

untitled IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS

More information

Dual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B

Dual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B root Android IPv4/ 1 1 2 1 NAT Network Address Translation IPv4 NTMobile Network Traversal with Mobility NTMobile Android 4.0 VPN API VpnService root VpnService IPv4 IPv4 VpnService NTMobile root IPv4/

More information

untitled

untitled CAVIN SR 2002 2002/10/12-14 2 http://www.npa npa.go..go.jp/police_j.htm 2002/10/12-14 3 2002/10/12-14 4 1 2 3 4 5 6 7 2002/10/12-14 5 2002/10/12-14 6 1 1 2 3 4 5 6 7 2002/10/12-14 7 2002/10/12-14 8 IT

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

900 GPS GPS DGPS Differential GPS RTK-GPS Real Time Kinematic GPS 2) DGPS RTK-GPS GPS GPS Wi-Fi 3) RFID 4) M-CubITS 5) Wi-Fi PSP PlayStation Portable

900 GPS GPS DGPS Differential GPS RTK-GPS Real Time Kinematic GPS 2) DGPS RTK-GPS GPS GPS Wi-Fi 3) RFID 4) M-CubITS 5) Wi-Fi PSP PlayStation Portable Vol. 51 No. 3 899 913 (Mar. 2010) 1 2 1 1 1 GPS GPS GPS GPS GPS GPS 80 m 80 m 2 3 GPS 0 GPS GPS GPS 5 CGI NTT KDDI 98% A Pedestrian Positioning System Using Road Traffic Signs and Landmarks Tomoyuki Kojima,

More information

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,

More information

SNS ( ) SNS(Social Networking Service) SNS SNS i

SNS ( ) SNS(Social Networking Service) SNS SNS i 22 SNS Job-Hunting Activities situation Understanding Support System Using SNS 1110252 2011 03 01 SNS ( ) SNS(Social Networking Service) SNS SNS i Abstract Job-Hunting Activities situation Understanding

More information

wide94.dvi

wide94.dvi 14 WWW 397 1 NIR-TF UUCP ftp telnet ( ) WIDE Networked Information Retrieval( NIR ) vat(visual Audio Tool) nv(netvedeo) CERN WWW(World Wide Web) WIDE ISODE WIDE project WWW WWW 399 400 1994 WIDE 1 WIDE

More information

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004 The Journal of the Japan Academy of Nursing Administration and Policies Vol 8, No 1, pp 43 _ 57, 2004 The Literature Review of the Japanese Nurses Job Satisfaction Research Which the Stamps-Ozaki Scale

More information

IT,, i

IT,, i 22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki

More information