24 Java Android Android (Dynamic Analysis) (Obfuscation) (Plagiarism) 1

Size: px
Start display at page:

Download "24 Java Android Android (Dynamic Analysis) (Obfuscation) (Plagiarism) 1"

Transcription

1 25 2 5

2 24 Java Android Android (Dynamic Analysis) (Obfuscation) (Plagiarism) 1

3

4 1 [17, 21] [5] [10, 19] [9] [6] API [16] 2 Java C# [19] 2 Java 2 Android Android 3

5

6 2 2.1 [1, 11] [7, 9, 12, 14, 18, 23] 5 CCFinder[9] CCFinder 4 Step 1. Step 2. 5

7 Step 3. Step [22] 1 Amida[20] Amida Java Virtual Machine Tool Interface(JVMTI) 1 Javassist 2 Java [22] 1 [13] Least Recently Used (LRU) Algorithm 1 [e 1, e 2,..., e last ] 4 c w m threshold e k k ID e k.caller ID e k.callee e k.callstack 4 1 JVMTI: 2 Javassist: 6

8 Algorithm 1 [22] procedure DetectPhases ( in [e 1, e 2,..., e last ]: list of method call event; in c, w, m: integer; in threshold: double; out P : set of integer); 1. LRUCache C new LRU cache(c) 2. integer[] update [] 3. double[] frequency [] 4. set of integer P ϕ 5. for integer t in [1... last] do 6. boolean b1 C.update(e t.caller, t) 7. boolean b2 C.update(e t.callee, t) 8. if b1 b2 then update[t] 1 else update[t] 0 9. double flags for integer k in [max(t w + 1, 1)... t] do 11. flags flags + update[k] 12. end for 13. f requency[t] f lags/w 14. if f requency[t] threshold then 15. integer min max(t m + 1, 1) 16. for integer k in [max(t m + 1, 1)... t] do 17. if e min.callstack e x.callstack then min k 18. end for 19. P P.add(min) 20. end if 21. end for 7

9 Algorithm 1 4 c Algorithm 1 1 LRU 1 1 w LRU frequency (Algorithm ) 1 (Algorithm 1 last) m (Algorithm ) 1 3 threshold LRU frequency (Algorithm 1 14 ) 0 1 LRU 3 Step 1. (Algorithm ) LRU C Step 2. (Algorithm ) t LRU C (frequency(t)) f requency(t) = tk=max(1,t w+1) update[k] w 8

10 update[k] k 1 0 frequency(t) t w threshold Step 3. (Algorithm ) m P = [t 1, t 2,..., t p ] 2 Java [19] [2, 19] ( ) API 1 (a) a b 1 (b) public static 9

11 !"#$$%&#'(")%*+ %%(,-.#/)%.0-1%(,-2/3&/,-24%'$45%*+ %%%%&6$/)'708/7(,-2/"239:;<=>'$45?+ %%(8A"-!%.0-1%$0')/B-2435%*+ %%(,-.#/)%.0-1%#3&/,-24%#5%*+ %%%%&6$/)'708/7(,-2/"239:;<=>#5?+ %%(8A"-!%.0-1%A35%*+ %%(,-.#/)%.0-1%(,-2/3&/,-24%'$45%*+ %%%%&6$/)'708/7(,-2/"23:;<>'$45?+ %%(8A"-!%.0-1%$0')/B-2435%*+ %%(8A"-!%.0-1%$0')/B-2435%*+ +!"#$$%<D%*+ %%(8A"-!%$/#/-!%.0-1%(,-2/3&#'(")%#G% &/,-24%'$45%*+ 1: 1 (c) something print print 10

12 3 4 5 [10] 2.5 Lim [14] Lim Maskeri [15] Eclipse JDT-Core Application Program Interface(API) [16] OS API API API API 2 Windows API 3 ProGuard: 4 DashO: 5 Allatori: 11

13 , Lim Java C# 12

14 Step 1. Step 2. Step 3. Step

15 !"!"#$%&'()*+, #$, #%, 3456,-7./ / /888, &'()"$*"-./012, 89898, #$, -./0$, -./0%, -./0+, #%, -./0$, -./0%, 89898, -./06, 7-$/0%0$-%48/888, &'()"%*":;<, #$, -./0$, -./0%, 89898, -./0+, #%, -./0$, -./0%, 89898, -./06, &'()"8*"-./0=5>?%, #$, -./0$, -./0%, 89898, -./0+, #%, -./0$, -./0%, 89898, -./06, 2: 14

16 "#$%! &'()+'*,(!*-)*! &'().'*/(!*/)*! &'()0'*1(!*/)*!!!!"!!!!!!!!!#!!!!!$!!!!!%!!!!!!!!&!!!!!&!!!$!!!!!!!!!%!!!!!#! +,-! "'#(!$)*! %'&(!&)*! $'%(!#)*! 3: ( ) 3 A(X, Y) A(X, Y) A X Y (1, 2); B(Z, Z) A(X, Y) B Z 3 4 3(4, 4); C(W, Z) 2(3, 1); 3.3 ( ) [24]

17 α N MC (α) α β N match (α, β) α β phase similarity(α, β) = N match (α, β) max(n MC (α), N MC (β)) 4 2 Algorithm Algorithm 2 2 Approximate-DP(Algorithm 3 5 ) [24] Figure 9.32 MatchPhase MatchPhase sort by descending similarities(algorithm 4 3 ) MatchPhase 2 Step 1. (Algorithm 3) 2 Approximate-DP MatchPhase Step 2. (Algorithm 4) MP 0 MP Algorithm 2 procedure MatchingPhases ( in P, P : set of phases; in threshold: integer; out MP : set of MatchPhase); 1. list of MatchPhase MP 0 CalcPhaseSimilarity(P, P, threshold) 2. set of MatchPhase MP OneOnOneP hase(mp 0 ) 16

18 Algorithm 3 procedure CalcPhaseSimilarity ( in P, P : set of phases; in threshold: integer; out MP : list of MatchPhase); 1. list of MatchPhase MP ϕ 2. for p in P do 3. for p in P do 4. if len(p) threshold len(p ) threshold then 5. MatchPhase mp Approximate-DP(p, p ) 6. MP MP.add(mp) 7. end if 8. end for 9. end for Algorithm 4 procedure OneOnOnePhase ( in MP 0 : list of MatchPhase; out MP : set of MatchPhase); 1. set of MatchPhase MP ϕ 2. set of phases Matched ϕ 3. MP 0 sort by descending similarities(mp 0 ) 4. for MatchPhase mp in MP 0 do 5. if Matched.contains(mp.p) Matched.contains(mp.p ) then 6. MP MP.add(mp) 7. M atched M atched.add(mp.p) 8. Matched Matched.add(mp.p ) 9. end if 10. end for 17

19 BC/'#DE"#$%EFG!!"! "#$%"! "#$%#! &'&'&! "#$%$!!#! "#$%"! "#$%#! &'&'&! "#$%&! "#$%8"93:501! -$%'7'$*'&%'7'&.!!"! "#$%"! "#$%#! &'&'&! "#$%$%!!#! "#$%"! "#$%#! &'&'&! "#$%&%! ()*+,-./01' 2345%6!!"! "#$%"! "#$%#! &'&'&! "#$%$%!!#! "#$%"! ()&'"*"! ()&'"*#! &'&'&! ()&'"*$%! "#$%#! ()&'#*"! ()&'#*#! &'&'&! ()&'#*$%! &'&'&! "#$%&%! &'&'&! ()&'&%*"! ()&'&%*#! '&''''&''''&! &'&'&! &'&'&! ()&'&%*$%! -$%'7'&%.!!"! "#$%+"! "#$%+#! &'&'&! "#$%+$%!!#! "#$%,"! "#$%,#! &'&'&! "#$%,$%! 4: 18

20 5 {A B C} {X Y Z} 10 8 Y C Z C X C A Z A B A N MC (A) A B N match (A, B) class similarity(a, B) = 2 N match(a, B) N MC (A) + N MC (B) 6 6 α β 2 α 1 β 1 α 2 β 2 A B A 6 B 5 A B 3 class similarity(a, B) 0.55 A B A B 2 Algorithm Algorithm MatchPhase similarity(algorithm 7 6 ) 19

21 "3! -*! "-!!"! "#$%#! "#$%$! "#$%%!!&! "#$%'! "#$%0! "#$%(! "2!.! "&! "#$%5"6173./!!"! "#$%#! "#$%$! "#$%%!!&! "#$%'! "#$%(! &'()*+,-./) 0123%4!!"! "#$%#! "#$%$! "#$%%!!&! "#$%'! "#$%(! *+,! *+-! *+.! *+&! *+*! *+/! &'89:;<=>! "#$%#! "#$%%!!&! "#$%'! "#$%(! 5: ( 10) 20

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

23 MatchClass MatchClass sort by descending similarities(algorithm 8 3 ) MatchClass 3 Step 1. (Algorithm 6) Step 2. (Algorithm 7) similarity MatchClass Step 3. (Algorithm 8) MC 0 MC 7 {< α α > < β β >} A X A 12 X 20 A X 9 class similarity(a, X) 0.56 A X B Y Algorithm 5 procedure MatchingClasses ( in MP : set of MatchPhase; in N: HashMap of the number of methodcall event in each class; out MC: set of MatchClass); 1. HashMap map CountM atchclass(m P ) 2. list of MatchClass MC 0 CalcClassSimilarity(map, N) 3. set of MatchClass MC OneOnOneClass(MC 0 ) 22

24 Algorithm 6 procedure CountMatchClass ( in MP : set of MatchPhase; out map: HashMap of the number of match methodcall count between class pair); 1. HashMap map ϕ 2. for MatchPhase mp in MP do 3. for < class, class > in mp.info do 4. if map.contains(< class, class >) then 5. map map.put(< class, class >, map.get(< class, class >) + 1) 6. else 7. map map.put(< class, class >, 1) 8. end if 9. end for 10. end for Algorithm 7 procedure CalcClassSimilarity ( in map: HashMap of the number of match methodcall count between class pair; in N: HashMap of the number of methodcall event in each class; out MC: list of MatchClass); 1. list of MatchClass MC ϕ 2. for < class, class > in map do 3. integer #methodcall N.get(class) 4. integer #methodcall N.get(class ) 5. integer #matchcall map.get(< class, class >) 6. MatchClass mc similarity(< class, class >, < #methodcall, #methodcall >, #matchcall) 7. MC MC.add(mc) 8. end for 23

25 Algorithm 8 procedure OneOnOneClass ( in MC 0 : list of MatchClass; out MC: set of MatchClass); 1. set of MatchClass MC ϕ 2. set of classes Matched ϕ 3. MC 0 sort by descending similarities(mc 0 ) 4. for mc in MC 0 do 5. if Matched.contains(mc.c) Matched.contains(mc.c ) then 6. MC MC.add(mc) 7. M atched M atched.add(mc.c) 8. Matched Matched.add(mc.c ) 9. end if 10. end for 24

26 )*34"+",+-./012%&'(34356!!"! %&'(0! %&'(1!!%! %&'(02! %&'(12! "#$3789:;<=>! 78$! "%! 6! 6! 78$! %(! ",!!%! "#$&! "#$'!!"! "#$5! "#$#! "#$$! 6! %!,!.! /! "#$&! "#$'!!"! "#$5! "#$#! "#$$! ()*+! ()",! ()%-! ()%.! ()+"! E*34"+",+-./012"#$34356!!"! "#$5! "#$#!!%! "#$&! "#$'! 7: 25

27 Android ICCA 6 Gemini ICCA Virgo Gemini Virgo Gemini Java 120 Virgo Java 26 ProGuard 7 ProGuard 2.4 Amida 1: Gemini Virgo Gemini 21, , Virgo 15, , ICCA: 7 ProGuard ( Android 26

28 4.1.1 Gemini Virgo ProGuard 1 Xeon 2.66GHz CPU Gemini Virgo 1 ProGuard 2 Gemini Virgo 2 ( ) ( ) CCFinder[9] ProGuard jar Java Decompiler 8 2: ( ) (CCFinder) Gemini ( ) Gemini ( ) Virgo ( ) Virgo ( ) Java Decompiler: 27

29 2 1 if-else Java [4] CCFinder Android Amida Android Android [8] smali Android smali smali 9 return ID RealCalc Plus 10 Quartic Software Google Play smali: 10 RealCalc Plus: RealCalcPlus 11 Google Play: 12 : 28

30 RealCalc Plus Quartic Software Google Play RealCalc Plus RealCalc Plus 3: RealCalc Plus sin cos tan sinh cosh tanh 1 sin 1 cos 1 tan 1 hyp xy x y x 2 x % 1 x x3 3 x ln e x log 10 x EXP MOD n! n C r n P r π e 0! log(0) 0 P 0 0 C 0 y x tan( π 2 ) 4: RealCalc Plus(Google Play) 76, RealCalc Plus( ) 73, :

31 !#,"!#+"!#*"!#)"! " #!#'"!#&" %&'$ ()*+$!#("!#%"!#$"!"!"!-!#$"!#$-!#%"!#%-!#&"!#&-!#'"!#'-!#("!#(-!#)"!#)-!#*"!#*-!#+"!#+-!#,"!#,-$#!"!"#$ 8: Android DUMAPIC 13 INFOLIFE 14 2 INFOLIFE [3] INFOLIFE INFOLIFE LLC 2011/07/14 21:28: Hi, I m Eong from INFOLIFE LLC. Please pay attention that we developed the English version first. We don t know Japanese, the translation was done by 3rd party. The name of these two app may be the same. But the icon, the content and the functions are very different. Apple uses APP STORE to sell apps, Amazon can also use APP STORE for app selling. The name doesn t mean everything. You may ask why we need the internet permission, because we do collect crash information to improve the app. As a company from USA, we are trying to make better apps to make 13 (DUMAPIC): historyeraser 14 (INFOLIFE): eraser 30

32 people s life easier. Please don t just denigrate without any deep investigation. (We keep the right to sue you.) DUMAPIC INFOLIFE 6: (DUMAPIC) Gmail (INFOLIFE) Gmail SMS/MMS SMS/MMS SMS/MMS SMS/MMS 7: (DUMAPIC) 1,231 5 (INFOLIFE) 1, :

33 !#($"!#("!#'$"! "#!#'"!#&$"!#&" %&'$ ()*+$!#%$"!#%"!#!$"!"!"!)!#%"!#%)!#&"!#&)!#'"!#')!#("!#()!#$"!#$)!#*"!#*)!#+"!#+)!#,"!#,)!#-"!#-)%#!"!"#$ 9: 32

34 Android ( ) ( ) Android 15 Android API Android 5.2 Amida 15 Android [8] 33

35 Android Amida Amida 2 ICCA Gemini Virgo Java

36 35

37

38 37

39 [1] I. D. Baxter, A. Yahin, L. Moura, M. S. Anna, and L. Bier. Clone Detection Using Abstract Syntax Trees. In Proc. of ICSM 1998, pp , [2] C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, Blog. /. [4] Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Method and implementation for investigating code clones in a software system. Information and Software Technology, Vol. 49, No. 9-10, pp , [5],,.., Vol. J91-D, No. 6, pp , [6] S. Horwitz, T. Reps, and D. Binkley. Interprocedural slicing using dependence graphs. ACM TOPLAS, Vol. 12, pp , [7] L. Jiang, G. Misherghi, Z. Su, and S. Glondu. DECKARD: Scalable and accurate tree-based detection of code clones. In Proc. of ICSE 2007, pp , [8] JUMPERZ.NET Blog. /. [9] T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., Vol. 28, No. 7, pp , [10],,,.., Vol. 28, No. 1, pp , [11] M. Kim, L. Bergman, T. Lau, and D. Notkin. An Ethnographic Study of Copy and Paste Programming Practices in OOPL. In Proc. of ISESE 2004, pp , [12] J. Krinke. Identifying similar code with program dependence graphs. In Proc. of WCRE 2001, pp ,

40 [13] H. Lieberman and C. Hewitt. A real-time garbage collector based on the lifetimes of objects. CACM, Vol. 26, No. 6, pp , [14] H. Lim, H. Park, S. Choi, and T. Han. A method for detecting the theft of Java programs through analysis of the control flow information. Information and Software Technology, Vol. 51, No. 9, pp , [15] G. Maskeri, D. Karnam, S. A. Viswanathan, and S. Padmanabhuni. Version History Based Source Code Plagiarism Detection in Proprietary Systems. In ICSM 2012, pp , [16],,,,. API., Vol. J89-D, No. 8, pp , [17] E. Raymond and R. Landley. OSI position paper on the SCO-vs.-IBM complaint, [18] A. Sæbjørnsen, J. Willcock, T. Panas, D. Quinlan, and Z. Su. Detecting code clones in binary executables. In Proc. of ISSTA 2009, pp , [19],,,. Java DonQuixote. FOSE 2006, pp , [20],,,,.., Vol. 24, No. 3, pp , [21] T. Ueno. Pocketmascot, ne.jp/wince/about_pocketmascot/about_pocketmascot.html. [22],,.., Vol. 51, No. 12, pp , [23] R. Wettel and R. Marinescu. Archeology of code duplication: recovering duplication chanins from small duplication fragments. In Proc. of SYNASC 2005, pp , [24] R. B. Yates and B. R. Neto. Modern Information Retrieval Second edition. Addison Wesley,

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

ソフトウェアエンジニアリングシンポジウム 2013 Smith-Waterman 1,a) 1,b) 1,c) 1,d) 1,e) LCS Smith-Waterman Bellon Gapped Code Clone Detection Using The Smith-Waterman Algor

ソフトウェアエンジニアリングシンポジウム 2013 Smith-Waterman 1,a) 1,b) 1,c) 1,d) 1,e) LCS Smith-Waterman Bellon Gapped Code Clone Detection Using The Smith-Waterman Algor Smith-Waterman,a),b),c),d),e) LCS Smith-Waterman Bellon Gapped Code Clone Detection Using The Smith-Waterman Algorithm Hiroaki MURAKAMI,a) Keisuke HOTTA,b) Yoshiki HIGO,c) Hiroshi IGAKI,d) Shinji KUSUMOTO,e)

More information

Eclipse A Tool Support to Merge Similer Methods with Differences Akira Goto 1 Norihiro Yoshida 2 Masakazu Ioka 1 Katsuro Inoue 1 Abstra

Eclipse A Tool Support to Merge Similer Methods with Differences Akira Goto 1 Norihiro Yoshida 2 Masakazu Ioka 1 Katsuro Inoue 1 Abstra Title 差分を含む類似メソッドの集約支援ツール Author(s) Citation 後藤, 祥 ; 吉田, 則裕 ; 井岡, 正和 ; 井上, 克郎 ソフトウェアエンジニアリングシンポジウム 2012 論文集. 2012 P.1-P.6 Issue Date 2012-08-21 Text Version publisher URL http://hdl.handle.net/11094/50124

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S 1 1 1 Fig. 1 1 Example of a sequential pattern that is exracted from a set of method definitions. A Defect Detection Method for Object-Oriented Programs using Sequential Pattern Mining Goro YAMADA, 1 Norihiro

More information

IPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter

IPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter ,a),2,3 3,4 CG 2 2 2 An Interpolation Method of Different Flow Fields using Polar Interpolation Syuhei Sato,a) Yoshinori Dobashi,2,3 Tsuyoshi Yamamoto Tomoyuki Nishita 3,4 Abstract: Recently, realistic

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

IT,, i

IT,, i 22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki

More information

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325 社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL

More information

浜松医科大学紀要

浜松医科大学紀要 On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse

More information

untitled

untitled -1- -2- -3- -4- -5- OPERATION 44.4% 20.4% 14.8% 20.4% RECEIVING OPERATION CALLING OTHERS -6- (Evaluation) (Synthesis) (Analysis) (Application) (Comprehension) (Knowledge) -7- Level 3 Level 2 Level 1 Level

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

1 Web Web 1,,,, Web, Web : - i -

1 Web Web 1,,,, Web, Web : - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.

More information

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2

More information

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf 1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi

More information

10 11 12 33.4 1 open / window / I / shall / the? 79.3 2 something / want / drink / I / to. 43.5 3 the way / you / tell / the library / would / to / me

10 11 12 33.4 1 open / window / I / shall / the? 79.3 2 something / want / drink / I / to. 43.5 3 the way / you / tell / the library / would / to / me -1- 10 11 12 33.4 1 open / window / I / shall / the? 79.3 2 something / want / drink / I / to. 43.5 3 the way / you / tell / the library / would / to / me? 28.7 4 Miyazaki / you / will / in / long / stay

More information

2 ( ) i

2 ( ) i 25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

[2] [1], [3] Kawaguchi SHINOBI [4] CCFinder [1] CCFinder CCFinder Gemini [5]. Gemini CCFinder Gemini 2.2 CVS Subversion 1 Git Mercurial

[2] [1], [3] Kawaguchi SHINOBI [4] CCFinder [1] CCFinder CCFinder Gemini [5]. Gemini CCFinder Gemini 2.2 CVS Subversion 1 Git Mercurial 1,a) 1,b) 1,c) 1,d) Discussion on Code Clone Modification Tool for Development Process with Version Control System Yusuke Fujihara 1,a) Kenji Fujiwara 1,b) Norihiro Yoshida 1,c) Hajimu Iida 1,d) Abstract:

More information

,,.,.,,.,.,.,.,,.,..,,,, i

,,.,.,,.,.,.,.,,.,..,,,, i 22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of

More information

1_26.dvi

1_26.dvi C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows ActionScript3.0 1 1 YouTube Flash ActionScript3.0 Face detection and hiding using ActionScript3.0 for streaming video on the Internet Ryouta Tanaka 1 and Masanao Koeda 1 Recently, video streaming and video

More information

Int Int 29 print Int fmt tostring 2 2 [19] ML ML [19] ML Emacs Standard ML M M ::= x c λx.m M M let x = M in M end (M) x c λx.

Int Int 29 print Int fmt tostring 2 2 [19] ML ML [19] ML Emacs Standard ML M M ::= x c λx.m M M let x = M in M end (M) x c λx. 1, 2 1 m110057@shibaura-it.ac.jp 2 sasano@sic.shibaura-it.ac.jp Eclipse Visual Studio ML Standard ML Emacs 1 ( IDE ) IDE C C++ Java IDE IDE IDE IDE Eclipse Java IDE Java Standard ML 1 print (Int. 1 Int

More information

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information Vol.54 No.7 1937 1950 (July 2013) 1,a) 2012 11 1, 2013 4 5 1 Similar Sounds Sentences Generator Based on Morphological Analysis Manner and Low Class Words Masaaki Kanakubo 1,a) Received: November 1, 2012,

More information

The 15th Game Programming Workshop 2010 Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard Magic Bitboard Magic Bitbo

The 15th Game Programming Workshop 2010 Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard Magic Bitboard Magic Bitbo Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard 64 81 Magic Bitboard Magic Bitboard Bonanza Proposal and Implementation of Magic Bitboards in Shogi Issei Yamamoto, Shogo Takeuchi,

More information

(MIRU2008) HOG Histograms of Oriented Gradients (HOG)

(MIRU2008) HOG Histograms of Oriented Gradients (HOG) (MIRU2008) 2008 7 HOG - - E-mail: katsu0920@me.cs.scitec.kobe-u.ac.jp, {takigu,ariki}@kobe-u.ac.jp Histograms of Oriented Gradients (HOG) HOG Shape Contexts HOG 5.5 Histograms of Oriented Gradients D Human

More information

soturon.dvi

soturon.dvi 12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm

More information

<95DB8C9288E397C389C88A E696E6462>

<95DB8C9288E397C389C88A E696E6462> 2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,

More information

Introduction Purpose This training course demonstrates the use of the High-performance Embedded Workshop (HEW), a key tool for developing software for

Introduction Purpose This training course demonstrates the use of the High-performance Embedded Workshop (HEW), a key tool for developing software for Introduction Purpose This training course demonstrates the use of the High-performance Embedded Workshop (HEW), a key tool for developing software for embedded systems that use microcontrollers (MCUs)

More information

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat 1 1 2 1. TF-IDF TDF-IDF TDF-IDF. 3 18 6 Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Satoshi Date, 1 Teruaki Kitasuka, 1 Tsuyoshi Itokawa 2

More information

Title < 論文 > 公立学校における在日韓国 朝鮮人教育の位置に関する社会学的考察 : 大阪と京都における 民族学級 の事例から Author(s) 金, 兌恩 Citation 京都社会学年報 : KJS = Kyoto journal of so 14: 21-41 Issue Date 2006-12-25 URL http://hdl.handle.net/2433/192679 Right

More information

2

2 Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/

More information

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN PenFlowchart 1,a) 2,b) 3,c) 2015 3 4 2015 5 12, 2015 9 5 PEN & PenFlowchart PEN Evaluation of the Effectiveness of Programming Education with Flowcharts Using PenFlowchart Wataru Nakanishi 1,a) Takeo Tatsumi

More information

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( ) 1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose

More information

Modal Phrase MP because but 2 IP Inflection Phrase IP as long as if IP 3 VP Verb Phrase VP while before [ MP MP [ IP IP [ VP VP ]]] [ MP [ IP [ VP ]]]

Modal Phrase MP because but 2 IP Inflection Phrase IP as long as if IP 3 VP Verb Phrase VP while before [ MP MP [ IP IP [ VP VP ]]] [ MP [ IP [ VP ]]] 30 4 2016 3 pp.195-209. 2014 N=23 (S)AdvOV (S)OAdvV 2 N=17 (S)OAdvV 2014 3, 2008 Koizumi 1993 3 MP IP VP 1 MP 2006 2002 195 Modal Phrase MP because but 2 IP Inflection Phrase IP as long as if IP 3 VP Verb

More information

Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N

Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N Vol. 42 No. 6 June 2001 IREX-NE F 83.86 A Japanese Named Entity Extraction System Based on Building a Large-scale and High-quality Dictionary and Pattern-matching Rules Yoshikazu Takemoto, Toshikazu Fukushima

More information

By Kenji Kinoshita, I taru Fukuda, Taiji Ota A Study on the Use of Overseas Construction Materials There are not few things which are superior in the price and the aspect of the quality to a domestic

More information

AtCoder Regular Contest 073 Editorial Kohei Morita(yosupo) A: Shiritori if python3 a, b, c = input().split() if a[len(a)-1] == b[0] and b[len(

AtCoder Regular Contest 073 Editorial Kohei Morita(yosupo) A: Shiritori if python3 a, b, c = input().split() if a[len(a)-1] == b[0] and b[len( AtCoder Regular Contest 073 Editorial Kohei Morita(yosupo) 29 4 29 A: Shiritori if python3 a, b, c = input().split() if a[len(a)-1] == b[0] and b[len(b)-1] == c[0]: print( YES ) else: print( NO ) 1 B:

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h 23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),

More information

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L 1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives

More information

16_.....E...._.I.v2006

16_.....E...._.I.v2006 55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA

More information

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St 1 2 1, 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical Structures based on Phrase Similarity Yuma Ito, 1 Yoshinari Takegawa, 2 Tsutomu Terada 1, 3 and Masahiko Tsukamoto

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

10 2000 11 11 48 ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) CU-SeeMe NetMeeting Phoenix mini SeeMe Integrated Services Digital Network 64kbps 16kbps 128kbps 384kbps

More information

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

,,,, : - i -

,,,, : - i - 2017 Future University Hakodate 2017 System Information Science Practice Group Report Project Name Manga engineering Group Name Literacy Manga /Project No. 19 /Project Leader 1015131 Kiyomasa Murakami

More information

4.1 % 7.5 %

4.1 % 7.5 % 2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel

More information

はじめに

はじめに IT 1 NPO (IPEC) 55.7 29.5 Web TOEIC Nice to meet you. How are you doing? 1 type (2002 5 )66 15 1 IT Java (IZUMA, Tsuyuki) James Robinson James James James Oh, YOU are Tsuyuki! Finally, huh? What's going

More information

johnny-paper2nd.dvi

johnny-paper2nd.dvi 13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

自然言語処理16_2_45

自然言語処理16_2_45 FileMaker Pro E-learning GUI Phrase Reading Cloze. E-learning Language Processing Technology and Educational Material Development Generating English Educational Material using a Database Software Kenichi

More information

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation 1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1

More information

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo

More information

NO.80 2012.9.30 3

NO.80 2012.9.30 3 Fukuoka Women s University NO.80 2O12.9.30 CONTENTS 2 2 3 3 4 6 7 8 8 8 9 10 11 11 11 12 NO.80 2012.9.30 3 4 Fukuoka Women s University NO.80 2012.9.30 5 My Life in Japan Widchayapon SASISAKULPON (Ing)

More information

1) , 215, 1441, , 132, 1237, % College Analysis 2-4) 2

1) , 215, 1441, , 132, 1237, % College Analysis 2-4) 2 1 1) 111 3111 1423, 215, 1441, 32 93 2618 1220, 132, 1237, 29 77 5% College Analysis 2-4) 2 1a 1h 1a 1b 1c 3 1d 1e 1f 1g 4 1h 1a 1b 1a 2.80 2.56 2.82 2.88 2.35 2.47 2.71 2.76 4.68 4.89 4.75 4.75 4.85 4.81

More information

IPSJ SIG Technical Report Vol.2017-CLE-21 No /3/21 e 1,2 1,2 1 1,2 1 Sakai e e e Sakai e Current Status and Challenges on e-learning T

IPSJ SIG Technical Report Vol.2017-CLE-21 No /3/21 e 1,2 1,2 1 1,2 1 Sakai e e e Sakai e Current Status and Challenges on e-learning T e 1,2 1,2 1 1,2 1 Sakai e e 2012 2012 e Sakai e Current Status and Challenges on e-learning Support Service for Institution-wide and Department-wide Program at Kyoto University Shoji Kajita 1,2 Tamaki

More information

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura

More information

GPGPU

GPGPU GPGPU 2013 1008 2015 1 23 Abstract In recent years, with the advance of microscope technology, the alive cells have been able to observe. On the other hand, from the standpoint of image processing, the

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055 1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free

More information

What s your name? Help me carry the baggage, please. politeness What s your name? Help me carry the baggage, please. iii

What s your name? Help me carry the baggage, please. politeness What s your name? Help me carry the baggage, please. iii What s your name? Help me carry the baggage, please. politeness What s your name? Help me carry the baggage, please. iii p. vi 2 50 2 2016 7 14 London, Russell Square iv iii vi Part 1 1 Part 2 13 Unit

More information

24 Depth scaling of binocular stereopsis by observer s own movements

24 Depth scaling of binocular stereopsis by observer s own movements 24 Depth scaling of binocular stereopsis by observer s own movements 1130313 2013 3 1 3D 3D 3D 2 2 i Abstract Depth scaling of binocular stereopsis by observer s own movements It will become more usual

More information

kut-paper-template.dvi

kut-paper-template.dvi 26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo

More information

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe

More information

Title 社 会 化 教 育 における 公 民 的 資 質 : 法 教 育 における 憲 法 的 価 値 原 理 ( fulltext ) Author(s) 中 平, 一 義 Citation 学 校 教 育 学 研 究 論 集 (21): 113-126 Issue Date 2010-03 URL http://hdl.handle.net/2309/107543 Publisher 東 京

More information

Microsoft Word - toyoshima-deim2011.doc

Microsoft Word - toyoshima-deim2011.doc DEIM Forum 2011 E9-4 252-0882 5322 252-0882 5322 E-mail: t09651yt, sashiori, kiyoki @sfc.keio.ac.jp CBIR A Meaning Recognition System for Sign-Logo by Color-Shape-Based Similarity Computations for Images

More information

Appropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Educati

Appropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Educati Appropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Education of Disaster Preparedness System and Class Practice

More information

.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns

.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns Cami-log: 1,a) 1,b) 1,c) 1,d),,,.,,.,,,.,, Cami-log,. Cami-log : Proposal of Application to Improve Daily Chewing Activities using Myoelectric Information Hiroki Kurosawa 1,a) Sho Mitarai 1,b) Nagisa Munekata

More information

Microsoft Word - PCM TL-Ed.4.4(特定電気用品適合性検査申込のご案内)

Microsoft Word - PCM TL-Ed.4.4(特定電気用品適合性検査申込のご案内) (2017.04 29 36 234 9 1 1. (1) 3 (2) 9 1 2 2. (1) 9 1 1 2 1 2 (2) 1 2 ( PSE-RE-101/205/306/405 2 PSE-RE-201 PSE-RE-301 PSE-RE-401 PSE-RE-302 PSE-RE-202 PSE-RE-303 PSE-RE-402 PSE-RE-203 PSE-RE-304 PSE-RE-403

More information

, : GUI Web Java 2.1 GUI GUI GUI 2 y = x y = x y = x

, : GUI Web Java 2.1 GUI GUI GUI 2 y = x y = x y = x J.JSSAC (2005) Vol. 11, No. 3,4, pp. 77-88 Noda2005 MathBlackBoard MathBlackBoard is a Java program based on the blackboard applet. We can use the blackboard applet with GUI operations. The blackboard

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

IPSJ SIG Technical Report Vol.2016-ARC-221 No /8/9 GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC Dalv

IPSJ SIG Technical Report Vol.2016-ARC-221 No /8/9 GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC Dalv GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC DalvikVM[1] GC 1 Nagoya Institute of Technology GC GC 2. GC GC 2.1 GC 1 c 2016 Information Processing Society of

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

橡最新卒論

橡最新卒論 Research of improving of recognition ability in Face recognition system Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint,

More information

先端社会研究 ★5★号/4.山崎

先端社会研究 ★5★号/4.山崎 71 72 5 1 2005 7 8 47 14 2,379 2,440 1 2 3 2 73 4 3 1 4 1 5 1 5 8 3 2002 79 232 2 1999 249 265 74 5 3 5. 1 1 3. 1 1 2004 4. 1 23 2 75 52 5,000 2 500 250 250 125 3 1995 1998 76 5 1 2 1 100 2004 4 100 200

More information

1 1 tf-idf tf-idf i

1 1 tf-idf tf-idf i 14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles

More information

:

: An Analysis of TV Game Market: From the viewpoints of network externalities and whole of services Masaki Matsumura, Hiroyuki Kurimoto, and Toshio Kobayashi It has been understood that a standard would

More information

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation

More information

CONTENTS 3 5 10 12 13 Public relations brochure of Higashikawa 10 2015 October No.744 14 15 16 24 25 26 2

CONTENTS 3 5 10 12 13 Public relations brochure of Higashikawa 10 2015 October No.744 14 15 16 24 25 26 2 10 2015 October No.744 CONTENTS 3 5 10 12 13 Public relations brochure of Higashikawa 10 2015 October No.744 14 15 16 24 25 26 2 3 4 HIGASHIKAWA TOWN NEWS 5 HIGASHIKAWA TOWN NEWS HIGASHIKAWA TOWN NEWS

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

きずなプロジェクト-表紙.indd

きずなプロジェクト-表紙.indd P6 P7 P12 P13 P20 P28 P76 P78 P80 P81 P88 P98 P138 P139 P140 P142 P144 P146 P148 #1 SHORT-TERM INVITATION GROUPS 2012 6 10 6 23 2012 7 17 14 2012 7 17 14 2012 7 8 7 21 2012 7 8 7 21 2012 8 7 8 18

More information

Page 1 of 6 B (The World of Mathematics) November 20, 2006 Final Exam 2006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (10pts) (a

Page 1 of 6 B (The World of Mathematics) November 20, 2006 Final Exam 2006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (10pts) (a Page 1 of 6 B (The World of Mathematics) November 0, 006 Final Exam 006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (a) (Decide whether the following holds by completing the truth

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly

More information

Study of the "Vortex of Naruto" through multilevel remote sensing. Abstract Hydrodynamic characteristics of the "Vortex of Naruto" were investigated b

Study of the Vortex of Naruto through multilevel remote sensing. Abstract Hydrodynamic characteristics of the Vortex of Naruto were investigated b Study of the "Vortex of Naruto" through multilevel remote sensing. Abstract Hydrodynamic characteristics of the "Vortex of Naruto" were investigated based on the remotely sensed data. Small scale vortices

More information

e a b a b b a a a 1 a a 1 = a 1 a = e G G G : x ( x =, 8, 1 ) x 1,, 60 θ, ϕ ψ θ G G H H G x. n n 1 n 1 n σ = (σ 1, σ,..., σ N ) i σ i i n S n n = 1,,

e a b a b b a a a 1 a a 1 = a 1 a = e G G G : x ( x =, 8, 1 ) x 1,, 60 θ, ϕ ψ θ G G H H G x. n n 1 n 1 n σ = (σ 1, σ,..., σ N ) i σ i i n S n n = 1,, 01 10 18 ( ) 1 6 6 1 8 8 1 6 1 0 0 0 0 1 Table 1: 10 0 8 180 1 1 1. ( : 60 60 ) : 1. 1 e a b a b b a a a 1 a a 1 = a 1 a = e G G G : x ( x =, 8, 1 ) x 1,, 60 θ, ϕ ψ θ G G H H G x. n n 1 n 1 n σ = (σ 1,

More information

CPU Levels in the memory hierarchy Level 1 Level 2... Increasing distance from the CPU in access time Level n Size of the memory at each level 1: 2.2

CPU Levels in the memory hierarchy Level 1 Level 2... Increasing distance from the CPU in access time Level n Size of the memory at each level 1: 2.2 FFT 1 Fourier fast Fourier transform FFT FFT FFT 1 FFT FFT 2 Fourier 2.1 Fourier FFT Fourier discrete Fourier transform DFT DFT n 1 y k = j=0 x j ω jk n, 0 k n 1 (1) x j y k ω n = e 2πi/n i = 1 (1) n DFT

More information

2013 Future University Hakodate 2013 System Information Science Practice Group Report biblive : Project Name biblive : Recording and sharing experienc

2013 Future University Hakodate 2013 System Information Science Practice Group Report biblive : Project Name biblive : Recording and sharing experienc 2013 Future University Hakodate 2013 System Information Science Practice Group Report biblive : Project Name B biblive stream Group Name GroupB biblive stream /Project No. 12-B /Project Leader 1011063

More information

2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last

2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last 1 北陸大学 紀要 第33号 2009 pp. 173 186 原著論文 バーチャル世界における呼びかけ語の コミュニケーション機能 ポライトネス理論の観点からの考察 劉 艶 The Communication Function of Vocative Terms in Virtual Communication: from the Viewpoint of Politeness Theory Yan

More information

. IDE JIVE[1][] Eclipse Java ( 1) Java Platform Debugger Architecture [5] 3. Eclipse GUI JIVE 3.1 Eclipse ( ) 1 JIVE Java [3] IDE c 016 Information Pr

. IDE JIVE[1][] Eclipse Java ( 1) Java Platform Debugger Architecture [5] 3. Eclipse GUI JIVE 3.1 Eclipse ( ) 1 JIVE Java [3] IDE c 016 Information Pr Eclipse 1,a) 1,b) 1,c) ( IDE) IDE Graphical User Interface( GUI) GUI GUI IDE View Eclipse Development of Eclipse Plug-in to present an Object Diagram to Debug Environment Kubota Yoshihiko 1,a) Yamazaki

More information

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i 25 Estimation scheme of indoor positioning using difference of times which chirp signals arrive 114348 214 3 6 , (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,,

More information

LMS LMS 2014 LMS 2 Moodle 2. LMS LMS e-learning Web LMS MOOC Moodle LMS ( 1 ) ( 2 ) ( 3 ) 24 ( 4 ) ( 5 ) ( 6 ) 1 LMS Web CS LMS Instructu

LMS LMS 2014 LMS 2 Moodle 2. LMS LMS e-learning Web LMS MOOC Moodle LMS ( 1 ) ( 2 ) ( 3 ) 24 ( 4 ) ( 5 ) ( 6 ) 1 LMS Web CS LMS Instructu LMS 1 2 2 LMS Blended-Learning CS PC Web LMS MOOC CS PC LMS LMS Requested Features for Mobile Learning Application dedicated to LMS Toshiyuki Kamada 1 Yasushi Kodama 2 Yuki Terawaki 2 Abstract: The blended-learning

More information