24 Java Android Android (Dynamic Analysis) (Obfuscation) (Plagiarism) 1
|
|
- ありあ ほうねん
- 5 years ago
- Views:
Transcription
1 25 2 5
2 24 Java Android Android (Dynamic Analysis) (Obfuscation) (Plagiarism) 1
3
4 1 [17, 21] [5] [10, 19] [9] [6] API [16] 2 Java C# [19] 2 Java 2 Android Android 3
5
6 2 2.1 [1, 11] [7, 9, 12, 14, 18, 23] 5 CCFinder[9] CCFinder 4 Step 1. Step 2. 5
7 Step 3. Step [22] 1 Amida[20] Amida Java Virtual Machine Tool Interface(JVMTI) 1 Javassist 2 Java [22] 1 [13] Least Recently Used (LRU) Algorithm 1 [e 1, e 2,..., e last ] 4 c w m threshold e k k ID e k.caller ID e k.callee e k.callstack 4 1 JVMTI: 2 Javassist: 6
8 Algorithm 1 [22] procedure DetectPhases ( in [e 1, e 2,..., e last ]: list of method call event; in c, w, m: integer; in threshold: double; out P : set of integer); 1. LRUCache C new LRU cache(c) 2. integer[] update [] 3. double[] frequency [] 4. set of integer P ϕ 5. for integer t in [1... last] do 6. boolean b1 C.update(e t.caller, t) 7. boolean b2 C.update(e t.callee, t) 8. if b1 b2 then update[t] 1 else update[t] 0 9. double flags for integer k in [max(t w + 1, 1)... t] do 11. flags flags + update[k] 12. end for 13. f requency[t] f lags/w 14. if f requency[t] threshold then 15. integer min max(t m + 1, 1) 16. for integer k in [max(t m + 1, 1)... t] do 17. if e min.callstack e x.callstack then min k 18. end for 19. P P.add(min) 20. end if 21. end for 7
9 Algorithm 1 4 c Algorithm 1 1 LRU 1 1 w LRU frequency (Algorithm ) 1 (Algorithm 1 last) m (Algorithm ) 1 3 threshold LRU frequency (Algorithm 1 14 ) 0 1 LRU 3 Step 1. (Algorithm ) LRU C Step 2. (Algorithm ) t LRU C (frequency(t)) f requency(t) = tk=max(1,t w+1) update[k] w 8
10 update[k] k 1 0 frequency(t) t w threshold Step 3. (Algorithm ) m P = [t 1, t 2,..., t p ] 2 Java [19] [2, 19] ( ) API 1 (a) a b 1 (b) public static 9
11 !"#$$%&#'(")%*+ %%(,-.#/)%.0-1%(,-2/3&/,-24%'$45%*+ %%%%&6$/)'708/7(,-2/"239:;<=>'$45?+ %%(8A"-!%.0-1%$0')/B-2435%*+ %%(,-.#/)%.0-1%#3&/,-24%#5%*+ %%%%&6$/)'708/7(,-2/"239:;<=>#5?+ %%(8A"-!%.0-1%A35%*+ %%(,-.#/)%.0-1%(,-2/3&/,-24%'$45%*+ %%%%&6$/)'708/7(,-2/"23:;<>'$45?+ %%(8A"-!%.0-1%$0')/B-2435%*+ %%(8A"-!%.0-1%$0')/B-2435%*+ +!"#$$%<D%*+ %%(8A"-!%$/#/-!%.0-1%(,-2/3&#'(")%#G% &/,-24%'$45%*+ 1: 1 (c) something print print 10
12 3 4 5 [10] 2.5 Lim [14] Lim Maskeri [15] Eclipse JDT-Core Application Program Interface(API) [16] OS API API API API 2 Windows API 3 ProGuard: 4 DashO: 5 Allatori: 11
13 , Lim Java C# 12
14 Step 1. Step 2. Step 3. Step
15 !"!"#$%&'()*+, #$, #%, 3456,-7./ / /888, &'()"$*"-./012, 89898, #$, -./0$, -./0%, -./0+, #%, -./0$, -./0%, 89898, -./06, 7-$/0%0$-%48/888, &'()"%*":;<, #$, -./0$, -./0%, 89898, -./0+, #%, -./0$, -./0%, 89898, -./06, &'()"8*"-./0=5>?%, #$, -./0$, -./0%, 89898, -./0+, #%, -./0$, -./0%, 89898, -./06, 2: 14
16 "#$%! &'()+'*,(!*-)*! &'().'*/(!*/)*! &'()0'*1(!*/)*!!!!"!!!!!!!!!#!!!!!$!!!!!%!!!!!!!!&!!!!!&!!!$!!!!!!!!!%!!!!!#! +,-! "'#(!$)*! %'&(!&)*! $'%(!#)*! 3: ( ) 3 A(X, Y) A(X, Y) A X Y (1, 2); B(Z, Z) A(X, Y) B Z 3 4 3(4, 4); C(W, Z) 2(3, 1); 3.3 ( ) [24]
17 α N MC (α) α β N match (α, β) α β phase similarity(α, β) = N match (α, β) max(n MC (α), N MC (β)) 4 2 Algorithm Algorithm 2 2 Approximate-DP(Algorithm 3 5 ) [24] Figure 9.32 MatchPhase MatchPhase sort by descending similarities(algorithm 4 3 ) MatchPhase 2 Step 1. (Algorithm 3) 2 Approximate-DP MatchPhase Step 2. (Algorithm 4) MP 0 MP Algorithm 2 procedure MatchingPhases ( in P, P : set of phases; in threshold: integer; out MP : set of MatchPhase); 1. list of MatchPhase MP 0 CalcPhaseSimilarity(P, P, threshold) 2. set of MatchPhase MP OneOnOneP hase(mp 0 ) 16
18 Algorithm 3 procedure CalcPhaseSimilarity ( in P, P : set of phases; in threshold: integer; out MP : list of MatchPhase); 1. list of MatchPhase MP ϕ 2. for p in P do 3. for p in P do 4. if len(p) threshold len(p ) threshold then 5. MatchPhase mp Approximate-DP(p, p ) 6. MP MP.add(mp) 7. end if 8. end for 9. end for Algorithm 4 procedure OneOnOnePhase ( in MP 0 : list of MatchPhase; out MP : set of MatchPhase); 1. set of MatchPhase MP ϕ 2. set of phases Matched ϕ 3. MP 0 sort by descending similarities(mp 0 ) 4. for MatchPhase mp in MP 0 do 5. if Matched.contains(mp.p) Matched.contains(mp.p ) then 6. MP MP.add(mp) 7. M atched M atched.add(mp.p) 8. Matched Matched.add(mp.p ) 9. end if 10. end for 17
19 BC/'#DE"#$%EFG!!"! "#$%"! "#$%#! &'&'&! "#$%$!!#! "#$%"! "#$%#! &'&'&! "#$%&! "#$%8"93:501! -$%'7'$*'&%'7'&.!!"! "#$%"! "#$%#! &'&'&! "#$%$%!!#! "#$%"! "#$%#! &'&'&! "#$%&%! ()*+,-./01' 2345%6!!"! "#$%"! "#$%#! &'&'&! "#$%$%!!#! "#$%"! ()&'"*"! ()&'"*#! &'&'&! ()&'"*$%! "#$%#! ()&'#*"! ()&'#*#! &'&'&! ()&'#*$%! &'&'&! "#$%&%! &'&'&! ()&'&%*"! ()&'&%*#! '&''''&''''&! &'&'&! &'&'&! ()&'&%*$%! -$%'7'&%.!!"! "#$%+"! "#$%+#! &'&'&! "#$%+$%!!#! "#$%,"! "#$%,#! &'&'&! "#$%,$%! 4: 18
20 5 {A B C} {X Y Z} 10 8 Y C Z C X C A Z A B A N MC (A) A B N match (A, B) class similarity(a, B) = 2 N match(a, B) N MC (A) + N MC (B) 6 6 α β 2 α 1 β 1 α 2 β 2 A B A 6 B 5 A B 3 class similarity(a, B) 0.55 A B A B 2 Algorithm Algorithm MatchPhase similarity(algorithm 7 6 ) 19
21 "3! -*! "-!!"! "#$%#! "#$%$! "#$%%!!&! "#$%'! "#$%0! "#$%(! "2!.! "&! "#$%5"6173./!!"! "#$%#! "#$%$! "#$%%!!&! "#$%'! "#$%(! &'()*+,-./) 0123%4!!"! "#$%#! "#$%$! "#$%%!!&! "#$%'! "#$%(! *+,! *+-! *+.! *+&! *+*! *+/! &'89:;<=>! "#$%#! "#$%%!!&! "#$%'! "#$%(! 5: ( 10) 20
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
23 MatchClass MatchClass sort by descending similarities(algorithm 8 3 ) MatchClass 3 Step 1. (Algorithm 6) Step 2. (Algorithm 7) similarity MatchClass Step 3. (Algorithm 8) MC 0 MC 7 {< α α > < β β >} A X A 12 X 20 A X 9 class similarity(a, X) 0.56 A X B Y Algorithm 5 procedure MatchingClasses ( in MP : set of MatchPhase; in N: HashMap of the number of methodcall event in each class; out MC: set of MatchClass); 1. HashMap map CountM atchclass(m P ) 2. list of MatchClass MC 0 CalcClassSimilarity(map, N) 3. set of MatchClass MC OneOnOneClass(MC 0 ) 22
24 Algorithm 6 procedure CountMatchClass ( in MP : set of MatchPhase; out map: HashMap of the number of match methodcall count between class pair); 1. HashMap map ϕ 2. for MatchPhase mp in MP do 3. for < class, class > in mp.info do 4. if map.contains(< class, class >) then 5. map map.put(< class, class >, map.get(< class, class >) + 1) 6. else 7. map map.put(< class, class >, 1) 8. end if 9. end for 10. end for Algorithm 7 procedure CalcClassSimilarity ( in map: HashMap of the number of match methodcall count between class pair; in N: HashMap of the number of methodcall event in each class; out MC: list of MatchClass); 1. list of MatchClass MC ϕ 2. for < class, class > in map do 3. integer #methodcall N.get(class) 4. integer #methodcall N.get(class ) 5. integer #matchcall map.get(< class, class >) 6. MatchClass mc similarity(< class, class >, < #methodcall, #methodcall >, #matchcall) 7. MC MC.add(mc) 8. end for 23
25 Algorithm 8 procedure OneOnOneClass ( in MC 0 : list of MatchClass; out MC: set of MatchClass); 1. set of MatchClass MC ϕ 2. set of classes Matched ϕ 3. MC 0 sort by descending similarities(mc 0 ) 4. for mc in MC 0 do 5. if Matched.contains(mc.c) Matched.contains(mc.c ) then 6. MC MC.add(mc) 7. M atched M atched.add(mc.c) 8. Matched Matched.add(mc.c ) 9. end if 10. end for 24
26 )*34"+",+-./012%&'(34356!!"! %&'(0! %&'(1!!%! %&'(02! %&'(12! "#$3789:;<=>! 78$! "%! 6! 6! 78$! %(! ",!!%! "#$&! "#$'!!"! "#$5! "#$#! "#$$! 6! %!,!.! /! "#$&! "#$'!!"! "#$5! "#$#! "#$$! ()*+! ()",! ()%-! ()%.! ()+"! E*34"+",+-./012"#$34356!!"! "#$5! "#$#!!%! "#$&! "#$'! 7: 25
27 Android ICCA 6 Gemini ICCA Virgo Gemini Virgo Gemini Java 120 Virgo Java 26 ProGuard 7 ProGuard 2.4 Amida 1: Gemini Virgo Gemini 21, , Virgo 15, , ICCA: 7 ProGuard ( Android 26
28 4.1.1 Gemini Virgo ProGuard 1 Xeon 2.66GHz CPU Gemini Virgo 1 ProGuard 2 Gemini Virgo 2 ( ) ( ) CCFinder[9] ProGuard jar Java Decompiler 8 2: ( ) (CCFinder) Gemini ( ) Gemini ( ) Virgo ( ) Virgo ( ) Java Decompiler: 27
29 2 1 if-else Java [4] CCFinder Android Amida Android Android [8] smali Android smali smali 9 return ID RealCalc Plus 10 Quartic Software Google Play smali: 10 RealCalc Plus: RealCalcPlus 11 Google Play: 12 : 28
30 RealCalc Plus Quartic Software Google Play RealCalc Plus RealCalc Plus 3: RealCalc Plus sin cos tan sinh cosh tanh 1 sin 1 cos 1 tan 1 hyp xy x y x 2 x % 1 x x3 3 x ln e x log 10 x EXP MOD n! n C r n P r π e 0! log(0) 0 P 0 0 C 0 y x tan( π 2 ) 4: RealCalc Plus(Google Play) 76, RealCalc Plus( ) 73, :
31 !#,"!#+"!#*"!#)"! " #!#'"!#&" %&'$ ()*+$!#("!#%"!#$"!"!"!-!#$"!#$-!#%"!#%-!#&"!#&-!#'"!#'-!#("!#(-!#)"!#)-!#*"!#*-!#+"!#+-!#,"!#,-$#!"!"#$ 8: Android DUMAPIC 13 INFOLIFE 14 2 INFOLIFE [3] INFOLIFE INFOLIFE LLC 2011/07/14 21:28: Hi, I m Eong from INFOLIFE LLC. Please pay attention that we developed the English version first. We don t know Japanese, the translation was done by 3rd party. The name of these two app may be the same. But the icon, the content and the functions are very different. Apple uses APP STORE to sell apps, Amazon can also use APP STORE for app selling. The name doesn t mean everything. You may ask why we need the internet permission, because we do collect crash information to improve the app. As a company from USA, we are trying to make better apps to make 13 (DUMAPIC): historyeraser 14 (INFOLIFE): eraser 30
32 people s life easier. Please don t just denigrate without any deep investigation. (We keep the right to sue you.) DUMAPIC INFOLIFE 6: (DUMAPIC) Gmail (INFOLIFE) Gmail SMS/MMS SMS/MMS SMS/MMS SMS/MMS 7: (DUMAPIC) 1,231 5 (INFOLIFE) 1, :
33 !#($"!#("!#'$"! "#!#'"!#&$"!#&" %&'$ ()*+$!#%$"!#%"!#!$"!"!"!)!#%"!#%)!#&"!#&)!#'"!#')!#("!#()!#$"!#$)!#*"!#*)!#+"!#+)!#,"!#,)!#-"!#-)%#!"!"#$ 9: 32
34 Android ( ) ( ) Android 15 Android API Android 5.2 Amida 15 Android [8] 33
35 Android Amida Amida 2 ICCA Gemini Virgo Java
36 35
37
38 37
39 [1] I. D. Baxter, A. Yahin, L. Moura, M. S. Anna, and L. Bier. Clone Detection Using Abstract Syntax Trees. In Proc. of ICSM 1998, pp , [2] C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, Blog. /. [4] Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Method and implementation for investigating code clones in a software system. Information and Software Technology, Vol. 49, No. 9-10, pp , [5],,.., Vol. J91-D, No. 6, pp , [6] S. Horwitz, T. Reps, and D. Binkley. Interprocedural slicing using dependence graphs. ACM TOPLAS, Vol. 12, pp , [7] L. Jiang, G. Misherghi, Z. Su, and S. Glondu. DECKARD: Scalable and accurate tree-based detection of code clones. In Proc. of ICSE 2007, pp , [8] JUMPERZ.NET Blog. /. [9] T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., Vol. 28, No. 7, pp , [10],,,.., Vol. 28, No. 1, pp , [11] M. Kim, L. Bergman, T. Lau, and D. Notkin. An Ethnographic Study of Copy and Paste Programming Practices in OOPL. In Proc. of ISESE 2004, pp , [12] J. Krinke. Identifying similar code with program dependence graphs. In Proc. of WCRE 2001, pp ,
40 [13] H. Lieberman and C. Hewitt. A real-time garbage collector based on the lifetimes of objects. CACM, Vol. 26, No. 6, pp , [14] H. Lim, H. Park, S. Choi, and T. Han. A method for detecting the theft of Java programs through analysis of the control flow information. Information and Software Technology, Vol. 51, No. 9, pp , [15] G. Maskeri, D. Karnam, S. A. Viswanathan, and S. Padmanabhuni. Version History Based Source Code Plagiarism Detection in Proprietary Systems. In ICSM 2012, pp , [16],,,,. API., Vol. J89-D, No. 8, pp , [17] E. Raymond and R. Landley. OSI position paper on the SCO-vs.-IBM complaint, [18] A. Sæbjørnsen, J. Willcock, T. Panas, D. Quinlan, and Z. Su. Detecting code clones in binary executables. In Proc. of ISSTA 2009, pp , [19],,,. Java DonQuixote. FOSE 2006, pp , [20],,,,.., Vol. 24, No. 3, pp , [21] T. Ueno. Pocketmascot, ne.jp/wince/about_pocketmascot/about_pocketmascot.html. [22],,.., Vol. 51, No. 12, pp , [23] R. Wettel and R. Marinescu. Archeology of code duplication: recovering duplication chanins from small duplication fragments. In Proc. of SYNASC 2005, pp , [24] R. B. Yates and B. R. Neto. Modern Information Retrieval Second edition. Addison Wesley,
,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More informationソフトウェアエンジニアリングシンポジウム 2013 Smith-Waterman 1,a) 1,b) 1,c) 1,d) 1,e) LCS Smith-Waterman Bellon Gapped Code Clone Detection Using The Smith-Waterman Algor
Smith-Waterman,a),b),c),d),e) LCS Smith-Waterman Bellon Gapped Code Clone Detection Using The Smith-Waterman Algorithm Hiroaki MURAKAMI,a) Keisuke HOTTA,b) Yoshiki HIGO,c) Hiroshi IGAKI,d) Shinji KUSUMOTO,e)
More informationEclipse A Tool Support to Merge Similer Methods with Differences Akira Goto 1 Norihiro Yoshida 2 Masakazu Ioka 1 Katsuro Inoue 1 Abstra
Title 差分を含む類似メソッドの集約支援ツール Author(s) Citation 後藤, 祥 ; 吉田, 則裕 ; 井岡, 正和 ; 井上, 克郎 ソフトウェアエンジニアリングシンポジウム 2012 論文集. 2012 P.1-P.6 Issue Date 2012-08-21 Text Version publisher URL http://hdl.handle.net/11094/50124
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More informationFig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S
1 1 1 Fig. 1 1 Example of a sequential pattern that is exracted from a set of method definitions. A Defect Detection Method for Object-Oriented Programs using Sequential Pattern Mining Goro YAMADA, 1 Norihiro
More informationIPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter
,a),2,3 3,4 CG 2 2 2 An Interpolation Method of Different Flow Fields using Polar Interpolation Syuhei Sato,a) Yoshinori Dobashi,2,3 Tsuyoshi Yamamoto Tomoyuki Nishita 3,4 Abstract: Recently, realistic
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationIT,, i
22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More information浜松医科大学紀要
On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse
More informationuntitled
-1- -2- -3- -4- -5- OPERATION 44.4% 20.4% 14.8% 20.4% RECEIVING OPERATION CALLING OTHERS -6- (Evaluation) (Synthesis) (Analysis) (Application) (Comprehension) (Knowledge) -7- Level 3 Level 2 Level 1 Level
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More information1 Web Web 1,,,, Web, Web : - i -
2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.
More informationVol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe
Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2
More information1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf
1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi
More information10 11 12 33.4 1 open / window / I / shall / the? 79.3 2 something / want / drink / I / to. 43.5 3 the way / you / tell / the library / would / to / me
-1- 10 11 12 33.4 1 open / window / I / shall / the? 79.3 2 something / want / drink / I / to. 43.5 3 the way / you / tell / the library / would / to / me? 28.7 4 Miyazaki / you / will / in / long / stay
More information2 ( ) i
25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA
More information258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System
Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.
More information1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More information[2] [1], [3] Kawaguchi SHINOBI [4] CCFinder [1] CCFinder CCFinder Gemini [5]. Gemini CCFinder Gemini 2.2 CVS Subversion 1 Git Mercurial
1,a) 1,b) 1,c) 1,d) Discussion on Code Clone Modification Tool for Development Process with Version Control System Yusuke Fujihara 1,a) Kenji Fujiwara 1,b) Norihiro Yoshida 1,c) Hajimu Iida 1,d) Abstract:
More information,,.,.,,.,.,.,.,,.,..,,,, i
22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of
More information1_26.dvi
C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows
ActionScript3.0 1 1 YouTube Flash ActionScript3.0 Face detection and hiding using ActionScript3.0 for streaming video on the Internet Ryouta Tanaka 1 and Masanao Koeda 1 Recently, video streaming and video
More informationInt Int 29 print Int fmt tostring 2 2 [19] ML ML [19] ML Emacs Standard ML M M ::= x c λx.m M M let x = M in M end (M) x c λx.
1, 2 1 m110057@shibaura-it.ac.jp 2 sasano@sic.shibaura-it.ac.jp Eclipse Visual Studio ML Standard ML Emacs 1 ( IDE ) IDE C C++ Java IDE IDE IDE IDE Eclipse Java IDE Java Standard ML 1 print (Int. 1 Int
More informationVol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information
Vol.54 No.7 1937 1950 (July 2013) 1,a) 2012 11 1, 2013 4 5 1 Similar Sounds Sentences Generator Based on Morphological Analysis Manner and Low Class Words Masaaki Kanakubo 1,a) Received: November 1, 2012,
More informationThe 15th Game Programming Workshop 2010 Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard Magic Bitboard Magic Bitbo
Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard 64 81 Magic Bitboard Magic Bitboard Bonanza Proposal and Implementation of Magic Bitboards in Shogi Issei Yamamoto, Shogo Takeuchi,
More information(MIRU2008) HOG Histograms of Oriented Gradients (HOG)
(MIRU2008) 2008 7 HOG - - E-mail: katsu0920@me.cs.scitec.kobe-u.ac.jp, {takigu,ariki}@kobe-u.ac.jp Histograms of Oriented Gradients (HOG) HOG Shape Contexts HOG 5.5 Histograms of Oriented Gradients D Human
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More information<95DB8C9288E397C389C88A E696E6462>
2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,
More informationIntroduction Purpose This training course demonstrates the use of the High-performance Embedded Workshop (HEW), a key tool for developing software for
Introduction Purpose This training course demonstrates the use of the High-performance Embedded Workshop (HEW), a key tool for developing software for embedded systems that use microcontrollers (MCUs)
More information4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q
x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe
1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,
More informationTF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat
1 1 2 1. TF-IDF TDF-IDF TDF-IDF. 3 18 6 Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Satoshi Date, 1 Teruaki Kitasuka, 1 Tsuyoshi Itokawa 2
More informationTitle < 論文 > 公立学校における在日韓国 朝鮮人教育の位置に関する社会学的考察 : 大阪と京都における 民族学級 の事例から Author(s) 金, 兌恩 Citation 京都社会学年報 : KJS = Kyoto journal of so 14: 21-41 Issue Date 2006-12-25 URL http://hdl.handle.net/2433/192679 Right
More information2
Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/
More information2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN
PenFlowchart 1,a) 2,b) 3,c) 2015 3 4 2015 5 12, 2015 9 5 PEN & PenFlowchart PEN Evaluation of the Effectiveness of Programming Education with Flowcharts Using PenFlowchart Wataru Nakanishi 1,a) Takeo Tatsumi
More information2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )
1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose
More informationModal Phrase MP because but 2 IP Inflection Phrase IP as long as if IP 3 VP Verb Phrase VP while before [ MP MP [ IP IP [ VP VP ]]] [ MP [ IP [ VP ]]]
30 4 2016 3 pp.195-209. 2014 N=23 (S)AdvOV (S)OAdvV 2 N=17 (S)OAdvV 2014 3, 2008 Koizumi 1993 3 MP IP VP 1 MP 2006 2002 195 Modal Phrase MP because but 2 IP Inflection Phrase IP as long as if IP 3 VP Verb
More informationVol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N
Vol. 42 No. 6 June 2001 IREX-NE F 83.86 A Japanese Named Entity Extraction System Based on Building a Large-scale and High-quality Dictionary and Pattern-matching Rules Yoshikazu Takemoto, Toshikazu Fukushima
More informationBy Kenji Kinoshita, I taru Fukuda, Taiji Ota A Study on the Use of Overseas Construction Materials There are not few things which are superior in the price and the aspect of the quality to a domestic
More informationAtCoder Regular Contest 073 Editorial Kohei Morita(yosupo) A: Shiritori if python3 a, b, c = input().split() if a[len(a)-1] == b[0] and b[len(
AtCoder Regular Contest 073 Editorial Kohei Morita(yosupo) 29 4 29 A: Shiritori if python3 a, b, c = input().split() if a[len(a)-1] == b[0] and b[len(b)-1] == c[0]: print( YES ) else: print( NO ) 1 B:
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More information23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h
23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),
More informationInput image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L
1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More informationIPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St
1 2 1, 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical Structures based on Phrase Similarity Yuma Ito, 1 Yoshinari Takegawa, 2 Tsutomu Terada 1, 3 and Masahiko Tsukamoto
More informationRun-Based Trieから構成される 決定木の枝刈り法
Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network
More information10 2000 11 11 48 ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) CU-SeeMe NetMeeting Phoenix mini SeeMe Integrated Services Digital Network 64kbps 16kbps 128kbps 384kbps
More informationVol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L
Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP
More informationDPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)
1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology
More information,,,, : - i -
2017 Future University Hakodate 2017 System Information Science Practice Group Report Project Name Manga engineering Group Name Literacy Manga /Project No. 19 /Project Leader 1015131 Kiyomasa Murakami
More information4.1 % 7.5 %
2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel
More informationはじめに
IT 1 NPO (IPEC) 55.7 29.5 Web TOEIC Nice to meet you. How are you doing? 1 type (2002 5 )66 15 1 IT Java (IZUMA, Tsuyuki) James Robinson James James James Oh, YOU are Tsuyuki! Finally, huh? What's going
More informationjohnny-paper2nd.dvi
13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More information自然言語処理16_2_45
FileMaker Pro E-learning GUI Phrase Reading Cloze. E-learning Language Processing Technology and Educational Material Development Generating English Educational Material using a Database Software Kenichi
More information,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation
1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1
More informationEQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju
EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo
More informationNO.80 2012.9.30 3
Fukuoka Women s University NO.80 2O12.9.30 CONTENTS 2 2 3 3 4 6 7 8 8 8 9 10 11 11 11 12 NO.80 2012.9.30 3 4 Fukuoka Women s University NO.80 2012.9.30 5 My Life in Japan Widchayapon SASISAKULPON (Ing)
More information1) , 215, 1441, , 132, 1237, % College Analysis 2-4) 2
1 1) 111 3111 1423, 215, 1441, 32 93 2618 1220, 132, 1237, 29 77 5% College Analysis 2-4) 2 1a 1h 1a 1b 1c 3 1d 1e 1f 1g 4 1h 1a 1b 1a 2.80 2.56 2.82 2.88 2.35 2.47 2.71 2.76 4.68 4.89 4.75 4.75 4.85 4.81
More informationIPSJ SIG Technical Report Vol.2017-CLE-21 No /3/21 e 1,2 1,2 1 1,2 1 Sakai e e e Sakai e Current Status and Challenges on e-learning T
e 1,2 1,2 1 1,2 1 Sakai e e 2012 2012 e Sakai e Current Status and Challenges on e-learning Support Service for Institution-wide and Department-wide Program at Kyoto University Shoji Kajita 1,2 Tamaki
More informationB HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int
SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura
More informationGPGPU
GPGPU 2013 1008 2015 1 23 Abstract In recent years, with the advance of microscope technology, the alive cells have been able to observe. On the other hand, from the standpoint of image processing, the
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More information2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055
1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free
More informationWhat s your name? Help me carry the baggage, please. politeness What s your name? Help me carry the baggage, please. iii
What s your name? Help me carry the baggage, please. politeness What s your name? Help me carry the baggage, please. iii p. vi 2 50 2 2016 7 14 London, Russell Square iv iii vi Part 1 1 Part 2 13 Unit
More information24 Depth scaling of binocular stereopsis by observer s own movements
24 Depth scaling of binocular stereopsis by observer s own movements 1130313 2013 3 1 3D 3D 3D 2 2 i Abstract Depth scaling of binocular stereopsis by observer s own movements It will become more usual
More informationkut-paper-template.dvi
26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo
More informationA Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member
A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe
More informationTitle 社 会 化 教 育 における 公 民 的 資 質 : 法 教 育 における 憲 法 的 価 値 原 理 ( fulltext ) Author(s) 中 平, 一 義 Citation 学 校 教 育 学 研 究 論 集 (21): 113-126 Issue Date 2010-03 URL http://hdl.handle.net/2309/107543 Publisher 東 京
More informationMicrosoft Word - toyoshima-deim2011.doc
DEIM Forum 2011 E9-4 252-0882 5322 252-0882 5322 E-mail: t09651yt, sashiori, kiyoki @sfc.keio.ac.jp CBIR A Meaning Recognition System for Sign-Logo by Color-Shape-Based Similarity Computations for Images
More informationAppropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Educati
Appropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Education of Disaster Preparedness System and Class Practice
More information.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns
Cami-log: 1,a) 1,b) 1,c) 1,d),,,.,,.,,,.,, Cami-log,. Cami-log : Proposal of Application to Improve Daily Chewing Activities using Myoelectric Information Hiroki Kurosawa 1,a) Sho Mitarai 1,b) Nagisa Munekata
More informationMicrosoft Word - PCM TL-Ed.4.4(特定電気用品適合性検査申込のご案内)
(2017.04 29 36 234 9 1 1. (1) 3 (2) 9 1 2 2. (1) 9 1 1 2 1 2 (2) 1 2 ( PSE-RE-101/205/306/405 2 PSE-RE-201 PSE-RE-301 PSE-RE-401 PSE-RE-302 PSE-RE-202 PSE-RE-303 PSE-RE-402 PSE-RE-203 PSE-RE-304 PSE-RE-403
More information, : GUI Web Java 2.1 GUI GUI GUI 2 y = x y = x y = x
J.JSSAC (2005) Vol. 11, No. 3,4, pp. 77-88 Noda2005 MathBlackBoard MathBlackBoard is a Java program based on the blackboard applet. We can use the blackboard applet with GUI operations. The blackboard
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More informationIPSJ SIG Technical Report Vol.2016-ARC-221 No /8/9 GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC Dalv
GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC DalvikVM[1] GC 1 Nagoya Institute of Technology GC GC 2. GC GC 2.1 GC 1 c 2016 Information Processing Society of
More information1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D
P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:
More information橡最新卒論
Research of improving of recognition ability in Face recognition system Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint,
More information先端社会研究 ★5★号/4.山崎
71 72 5 1 2005 7 8 47 14 2,379 2,440 1 2 3 2 73 4 3 1 4 1 5 1 5 8 3 2002 79 232 2 1999 249 265 74 5 3 5. 1 1 3. 1 1 2004 4. 1 23 2 75 52 5,000 2 500 250 250 125 3 1995 1998 76 5 1 2 1 100 2004 4 100 200
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More information:
An Analysis of TV Game Market: From the viewpoints of network externalities and whole of services Masaki Matsumura, Hiroyuki Kurimoto, and Toshio Kobayashi It has been understood that a standard would
More informationFig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).
Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation
More informationCONTENTS 3 5 10 12 13 Public relations brochure of Higashikawa 10 2015 October No.744 14 15 16 24 25 26 2
10 2015 October No.744 CONTENTS 3 5 10 12 13 Public relations brochure of Higashikawa 10 2015 October No.744 14 15 16 24 25 26 2 3 4 HIGASHIKAWA TOWN NEWS 5 HIGASHIKAWA TOWN NEWS HIGASHIKAWA TOWN NEWS
More informationIPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info
1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3
More informationきずなプロジェクト-表紙.indd
P6 P7 P12 P13 P20 P28 P76 P78 P80 P81 P88 P98 P138 P139 P140 P142 P144 P146 P148 #1 SHORT-TERM INVITATION GROUPS 2012 6 10 6 23 2012 7 17 14 2012 7 17 14 2012 7 8 7 21 2012 7 8 7 21 2012 8 7 8 18
More informationPage 1 of 6 B (The World of Mathematics) November 20, 2006 Final Exam 2006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (10pts) (a
Page 1 of 6 B (The World of Mathematics) November 0, 006 Final Exam 006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (a) (Decide whether the following holds by completing the truth
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly
More informationStudy of the "Vortex of Naruto" through multilevel remote sensing. Abstract Hydrodynamic characteristics of the "Vortex of Naruto" were investigated b
Study of the "Vortex of Naruto" through multilevel remote sensing. Abstract Hydrodynamic characteristics of the "Vortex of Naruto" were investigated based on the remotely sensed data. Small scale vortices
More informatione a b a b b a a a 1 a a 1 = a 1 a = e G G G : x ( x =, 8, 1 ) x 1,, 60 θ, ϕ ψ θ G G H H G x. n n 1 n 1 n σ = (σ 1, σ,..., σ N ) i σ i i n S n n = 1,,
01 10 18 ( ) 1 6 6 1 8 8 1 6 1 0 0 0 0 1 Table 1: 10 0 8 180 1 1 1. ( : 60 60 ) : 1. 1 e a b a b b a a a 1 a a 1 = a 1 a = e G G G : x ( x =, 8, 1 ) x 1,, 60 θ, ϕ ψ θ G G H H G x. n n 1 n 1 n σ = (σ 1,
More informationCPU Levels in the memory hierarchy Level 1 Level 2... Increasing distance from the CPU in access time Level n Size of the memory at each level 1: 2.2
FFT 1 Fourier fast Fourier transform FFT FFT FFT 1 FFT FFT 2 Fourier 2.1 Fourier FFT Fourier discrete Fourier transform DFT DFT n 1 y k = j=0 x j ω jk n, 0 k n 1 (1) x j y k ω n = e 2πi/n i = 1 (1) n DFT
More information2013 Future University Hakodate 2013 System Information Science Practice Group Report biblive : Project Name biblive : Recording and sharing experienc
2013 Future University Hakodate 2013 System Information Science Practice Group Report biblive : Project Name B biblive stream Group Name GroupB biblive stream /Project No. 12-B /Project Leader 1011063
More information2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last
1 北陸大学 紀要 第33号 2009 pp. 173 186 原著論文 バーチャル世界における呼びかけ語の コミュニケーション機能 ポライトネス理論の観点からの考察 劉 艶 The Communication Function of Vocative Terms in Virtual Communication: from the Viewpoint of Politeness Theory Yan
More information. IDE JIVE[1][] Eclipse Java ( 1) Java Platform Debugger Architecture [5] 3. Eclipse GUI JIVE 3.1 Eclipse ( ) 1 JIVE Java [3] IDE c 016 Information Pr
Eclipse 1,a) 1,b) 1,c) ( IDE) IDE Graphical User Interface( GUI) GUI GUI IDE View Eclipse Development of Eclipse Plug-in to present an Object Diagram to Debug Environment Kubota Yoshihiko 1,a) Yamazaki
More information, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i
25 Estimation scheme of indoor positioning using difference of times which chirp signals arrive 114348 214 3 6 , (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,,
More informationLMS LMS 2014 LMS 2 Moodle 2. LMS LMS e-learning Web LMS MOOC Moodle LMS ( 1 ) ( 2 ) ( 3 ) 24 ( 4 ) ( 5 ) ( 6 ) 1 LMS Web CS LMS Instructu
LMS 1 2 2 LMS Blended-Learning CS PC Web LMS MOOC CS PC LMS LMS Requested Features for Mobile Learning Application dedicated to LMS Toshiyuki Kamada 1 Yasushi Kodama 2 Yuki Terawaki 2 Abstract: The blended-learning
More information