Akito Niwa Kouya Tochikubo ( ) SI Systems Integration Technology Center, Toshiba Solutions Corporation 1 [1-10] IPA FIPS $[2,

Size: px
Start display at page:

Download "Akito Niwa Kouya Tochikubo ( ) SI Systems Integration Technology Center, Toshiba Solutions Corporation 1 [1-10] IPA FIPS $[2,"

Transcription

1 Akito Niwa Kouya Tochikubo ( ) SI Systems Integration Technology Center, Toshiba Solutions Corporation 1 [110] IPA FIPS 1402 $[2, 3]$ FIPS 1402 NIST Special Publication 80022(SP80022) $[5,6]$ NIST SP T 5 21 The Art of Computer programming, / Knuth The Art of Computer programming, / [1] 12 Kl (frequency test) K2 (2 )(seri test) K3 (gap test) K4 (poker test)

2 81 K5 \ddagger L (coupon collector s test) K6 (permutation test) K7 (run test) K8 $t$ $t$ (maximumof test) K9 (collosion test) K1O (serial correlation test) Kll K12 [1] $[0, 1)$ $<u_{n}>=0,$ $u_{1},$ $u_{2},$ $\cdots$ 0 $d1$ $<u_{n}>$ $U_{\dot{*}}>=\lfloor du_{i}\rfloor$ $<U_{n}>=U_{0},$ $U_{1},$ $U_{2\prime}\cdots$ $[0, 1)$ $u_{n}>$ 0 $d1$ $<U_{n}>$ 2 $<U_{n}>$ ( ) 0 1 $(d=2)$ 22 FIPS PUS 1402 FIPS PUS 1402 [2] $\text{ }$ 4 Fl 1 (monobit test) F2 (poker test) F3 (runs test) F4 (longest runs test) [2] FIPS PUS 1402 Change Notice 2[3] 23 [4] 7 Rl 1 R2 2 R3 R4 OPSO R6

3 $\sigma^{2}$ 82 R7 [4] [1] $[0, 1)$ $<u_{\iota},>$ 0 $d1$ $<U_{n}>$ 2 24 NIST Special Publication NIST Special Publication 80022[5] 16 Nl 1 (frequency test) N2 (frequency test within ablock) N3 (runs test) N4 (test for longest run of ones in ablock) N5 2 (binary matrix rank test) N6 (discrete fourier transform (spectral)test) N7 (nonoverlapping template matching test) N8 (overlappiug template match $\mathrm{g}$ test) N9 Maurer (Maurer s universal statistical test) N1O LempelZiv (LempelZiv compression test) Nll (linear complexity test) N12 (serial test) N13 (approximate entrow test) N14 (cumulative sums (cusums) test) N15 (random excursions test) N16 (random excursions variant test) NIST 0 1 NIST $p$value $0$ $p$value pvalue $X_{1},$ $X_{2_{\mathit{1}}}\cdots,$ $X_{n}$ 1 $1,$ 1 $n$ $S_{1},=X_{1}+X_{2}+=\cdot\cdot+Xn$ 2 $\mu$ $=$ 0 $=$ $n$ $n arrow!\mathrm{f}\mathrm{f}\mathrm{i}p(\frac{s_{n}}{\sqrt{n}}\leq z)=\phi$ (z) $\Phi(z)=\int_{\infty}^{z}\frac{1}{\sqrt{2\pi}}e^{x^{2}/2}dx$

4 Using 83 3 $s= S_{n} /\sqrt{n}$ $P(s\leq z)=2\phi(z)1$ $\Psi \mathrm{v}\mathrm{a}\mathrm{l}\mathrm{u}\mathrm{e}=2[1\phi(s)]$ NIST $\Phi(z)$ $erfc(z)= \int_{\sim^{\nu}}$ $\frac{2}{\sqrt{\pi}}e^{x^{2}}d\prime x$ $I^{\succ \mathrm{v}\mathrm{a}1\mathrm{u}\mathrm{e}=erfc(s}/\sqrt{9})$ $;t$ $r\mathrm{v}\mathrm{a}\mathrm{l}\mathrm{u}\mathrm{e}<001$ NIST 2 pvalue $\int_{\mathrm{z}}^{\infty}\frac{1}{2\gamma(\frac{n}{2})}(\frac{t}{2})^{\kappa}\tau^{1}e^{\#}dt$ $N$ $\chi^{2}$ $\Gamma(\alpha)=\int_{0}^{\infty}x^{\alpha1}e^{x}dx$ NIST 1 $\mathrm{a}^{\mathrm{a}_{\text{ }}}$ (NIST 10 ) 1 $p$value $A?\cdot p$value $p$value $[0, 1)$ $[0, 1)$ $p$value $m$ 001 $p$value $099\pm\sqrt{\frac{099\mathrm{x}001}{m}}$ $\iota NIST 0$ 1 ASCII NIST NIST 1 $\mathrm{g}$ SHAI(FIPS 186 SHAI ) 2 Linear Congruential 3 BlumBlumShub 4 MicaliSchnorr 5 Modular Exponentiation 6 Quadratic Congruential I 7 Quadratic Congruential II 8 Cubic Congruential 9 XOR

5 Using ANSI X917 (3DES) DES(FIPS 186 DES ) 11 $\mathrm{g}$ 1 (1 ) , 6 ( ) finalanalysisreport 25 DIEHARD DIEHARD [7] T 18 Dl (b hday spacings test) D2 OPERM5 (overlapping 5 permutation test) D3(3lx31) 2 (binary rank test for matrices) $31\mathrm{x}31$ D4 $(32\mathrm{x}32)$ D5 $(6\mathrm{x}8)$ D6 2 (binary rank test for matrices) $32\mathrm{x}32$ $6\mathrm{x}8$ 2 (binary rank test for (bitstream Test) matrices) D7 OPSO (OPSO(OverlappingPairsSparseOccupancy) test) D8 OQSO (OQSO( test) D9 DNA (DNA test) D1O 8 (countthel s test on astream of bytes) Dll 8 (countthel s test for specific bytes) D12 (parking lot test) D13 (minimum distance test) D14 $3\mathrm{D}\mathrm{S}\mathrm{P}\mathrm{H}\mathrm{E}\mathrm{R}\mathrm{E}\mathrm{S}$ ( $3\mathrm{d}$spheres test) D15 (squeeze test) D16 (overlapping sums test) D17 (runs test) D18 (cra test) DIEHARD 0 1 lombyte llmbyte DIEHARD $\mu$value r ue $[0, 1)$ $\}^{}$ pvalue DIEHARD rvalue DIEHARD 1 2 3, DIEHARD 0 1 ASCII

6 generator \mathrm{w}\mathrm{i}\mathrm{t}\mathrm{h}rightarrow \mathrm{b}\mathrm{o}\mathrm{r}\mathrm{r}\mathrm{o}\mathrm{w}$ (SWB) 85 1 Mulfiplywithcarry (MWC) generator (MWC generator) $1\mathrm{C}$ 2 4 on pairs of 16 bits(mwc1616 generator) 3 :Mother of all random number generators (MOTHER generator) 4 KISS generator 5 Simple but very good generator COMBO (COMBO generator) 6 Lagged FibonacciMWC combination ULTRA (ULTLA generator) $\mathrm{m}\mathrm{w}\mathrm{c}/\mathrm{s}\mathrm{w}\mathrm{b}$ $\mathrm{m}\mathrm{w}\mathrm{c}/\mathrm{s}\mathrm{u}\mathrm{b}\mathrm{t}\mathrm{r}\mathrm{a}\mathrm{c}\mathrm{t} 7 Combination generator ( generator) 8 Extended congruential generator (EXCONG generator) 9 SuperDuper generator (SUPERDUPER generator) 10 Subtractwithborrow generator (SWB generator) 11 Specified congruential generator 12 31bit generator ran2 from Numerical Recipes (RAN2 generator) 13 Specified shiftregister generator 14 System generator in Microsofi Fortran ( MSRAN generator) 15 LaggedFibonacci generator 16 Inverse congruential generator (INVCONG generator) 3 2 $ $ ( (SP80022) 0 1 $\{X_{i}\}$ $X_{:}\neq X_{:+1}$ $d1$ 5 $(1)5$ $(2)3$ 4 (3) 2 3 (4) 1 (5) 5 2 FIPS 14&2 4

7 $m$ $m$ $m$ 6 2 $\mathrm{y}$ $u=\mathrm{y}/2^{32}$ $[0, 1)$ $k$ $k=2^{31}$ $karrow\lfloor k\mathrm{x}u\rfloor$ $k=1$ 43 2 $\mathrm{y}$ $u=\lfloor \mathrm{y}/2^{32}\mathrm{x}6\rfloor+1$ $u$ Craps Craps , OPERM $(6\mathrm{x}8)$ $(31 $(32\mathrm{x}32)$ 2 $(6\mathrm{x}8)$ \mathrm{x}31)$ $(31\mathrm{x}31)$ $(32\mathrm{x}32)$ $M$ 7 2 $M$ FIPS $m$ 1

8 $\mathrm{y}_{1}$,, Y4 ), $[0, 1)$ $[0, 1)$ $k$ $k$ 2 $\mathrm{y}$ u=l Y/ $\mathrm{y}$ $u=10000\mathrm{y}/2^{32}$ $3\mathrm{D}\mathrm{S}\mathrm{P}\mathrm{H}\mathrm{E}^{1}$RES $\mathrm{y}$ $u=1000\mathrm{y}/2^{32}$ $2^{21}$ $(X_{1}, X_{2}, \cdots, X_{20})_{\text{ }}2$ $(X_{2}, X_{3}, \cdots, X_{21})$ 1 OPSO $\mathrm{y}$ $2^{21}1\mathrm{H}$ $(\mathrm{y}_{1}, \mathrm{y}_{2})$ $\mathrm{y}_{2},$ $\cdots$ $(\mathrm{y}_{2}, \mathrm{y}_{3}),$ $\cdots$, OQSO $Y$ $\mathrm{y}_{1},$ $\rangle$ $\mathrm{y}$2 $(\mathrm{y}_{1}, \mathrm{y}_{2}, \mathrm{y}_{3}, Y_{4}),$ $\mathrm{y}_{2}$ $\mathrm{y}_{3\mathrm{t}}$ $\mathrm{y}_{5}$ $\cdots$ (, 4 5, 4 $^{21}$ 5 DNA $\mathrm{y}$ $\mathrm{y}_{2},$ $\cdots$ $(\mathrm{y}_{1}, \mathrm{y}_{2}, \cdot\cdot\sim, \mathrm{y}_{10}),$ $(\mathrm{y}_{2}, \mathrm{y}_{3}, \cdots, \mathrm{y}_{11}),$ $\cdots$ }1, 10 2 $2^{21}$ $d1$ $n$ 0 $d1$

9 $\cdot$ 88 0 $d1$ 0 $d1$ $Z$ $Z_{\dot{\iota}}$ $\{\mathrm{y}_{1}\}$ $Z_{1},$ $Z_{2},$ $\cdots,$ $Z_{1024}$ 1,023 $Y_{i}$ $s$ $t$ $[0, 1)$ $l$ $Y_{1},$ $\mathrm{y}$2, $(\mathrm{y}_{1},$, $\mathrm{y}_{100})$ $\rangle$ $\mathrm{y}$2, (Y2, $\mathrm{y}$3i, ), $\mathrm{y}_{101}$ $\cdots$ $X_{1},$ $X_{2},$ $\cdots X_{r\iota}$ $S_{\dot{l}}= \sum_{j=1}^{\dot{\iota}}(2x_{j}1)$ 1) $(1 \leq i\leq n)$ $S_{\dot{l}} = \sum_{j= \iota:+1}^{n}$(2x 0 1 $X_{1},$ $X_{2},$ $\cdots X_{n}$ $ 4\sim 1_{\text{ }}$ $S_{1}$ $=0$ 0 1 $1\sim 4$ 8 $S_{\dot{*}}= \sum \mathrm{j}_{=\iota}(2x_{j}1)(1\leq i\leq n)$ 0 1 $X_{1},$ $X_{2,}\ldots \mathrm{y}_{n}$ $S_{i}= \sum_{j=1}^{\dot{ }}(2X_{j}1)(1\leq i\leq \mathrm{z})$ 9 $\sim$ 1 1\sim E Maurer $L$ 0 1 kmpelziv 0 1 mpleziv 0 1 $m$ $m1$ $m2$ 0 1 $m$ $m+1$

10 $\text{ }$ $\text{ }$ $\text{ }$ $\mathrm{d}\backslash$ 0 1 $M$ \iota $\mathrm{a}_{\text{ }}$ 36 $U_{j+1}$ $U_{j}$ $c= \frac{n(u_{0}u_{1}+u_{1}u_{2}+\cdots+u_{n2}u_{n1}+u_{n1}u_{n})(u_{0}+u_{1}+\cdots+u_{n1})^{2}}{n(u_{0}^{2}+u_{1}^{2}+\cdots+u_{n1}^{2})(u_{0}+u_{1}+\cdots+u_{n1})^{2}}$ (1) $1\leq C\leq 1$ $C=0$ $<U_{n}>$ $\mathrm{c}$ NIST DIEHARD NIST DIEHARD $\mathrm{s}\mathrm{p}8w2$ 2 DIEHARD 8 8 $\mathrm{o}\mathrm{p}\mathrm{e}\mathrm{r}\mathrm{m}5$ OPSO OQSO

11 $\lceil \mathrm{i}\mathrm{p}\mathrm{a}$ 80 2 $X_{:}=aX_{\dot{\mathrm{s}}1}+c\mathrm{m}$od $M$ (Linear Congruential) [1117] FIPS1402 FIPS SP80022 SP IPA $\mathrm{t}1$ 0 ASCII 2 52 GUI <GUI ( 3) (GUD ( )

12 $\mathrm{s}$ ) $\mathrm{t}$ $\dagger$ 81 $\cdot$ $\wedge^{\ulcorner}=,_{} $ $\mathrm{t}$ bf $\mathrm{t}$ $\mathrm{t}$ $\mathrm{t}$ JAPA \dagger 1: 2: (PDS) 6 NIST [5] DIEHARD [7]

13 \mathrm{o}\mathrm{u}\mathrm{r}\mathrm{c}\mathrm{e}/\mathrm{c}\mathrm{r}y\mathrm{p}\mathrm{t}\mathrm{x}/$ \mathrm{i}\mathrm{c}\mathrm{a}\mathrm{l}$ Jgorithms, mat 92 3: (IPA) 13 $\mathrm{s}\mathrm{e}\mathrm{m}\mathrm{i}\mathrm{n}\mathrm{u}\mathrm{m}\alpha [1] D Knuth, The art of computer programming, [2] NIST, FIPS PUB 1402, Security requirements for cryptographic modulae, [3] NIST, FIPS PUB 1402, Change Notice 2, 2002 [4],, [5] NIST, Special Publication 80022, A Statistical Test Suite For Random and Pseudorandom Number Generators for Cryptographic Applications, 2001 [6] NIST, Special Publication $ $ NIST Statistical Suite, $800\cdot 22,$ $//\mathrm{s}\mathrm{t}\mathrm{a}\mathrm{t}\mathrm{f}\mathrm{s}\mathrm{u}\mathrm{e}\mathrm{d}\mathrm{u}/\mathrm{g}\mathrm{e}\mathrm{o}/\mathrm{d}\mathrm{l}\mathrm{e}\mathrm{h}\mathrm{a}\mathrm{r}\mathrm{d}$ [7] G Marsaglia, $ $(DIEHARD, (http: html, $\mathrm{f}\mathrm{s}\mathrm{u}\mathrm{e}\mathrm{d}\mathrm{u}/\mathrm{p}\mathrm{u}\mathrm{b}/\mathrm{d}\mathrm{l}\mathrm{e}\mathrm{h}\mathrm{a}\mathrm{r}\mathrm{d}/$ ) $//\mathrm{r}\mathrm{a}\mathrm{n}\mathrm{d}\mathrm{o}\mathrm{m}$ $\mathrm{a}\mathrm{t}/\mathrm{t}\mathrm{e}\mathrm{s}\mathrm{t}\mathrm{s}/$ [8] P Hellekalek, Tests for random numbers, (http: sbg ac ) [9] J Walker, A Pseudorandom Number Sequence Test Program, (http: $//\mathrm{w}\mathrm{w}\mathrm{w}$ fouznilab $\mathrm{c}\mathrm{h}/\mathrm{r}\mathrm{a}\mathrm{n}\mathrm{d}\mathrm{o}\mathrm{n}/$) [10] The Information Security Research Centre at Queensland University of Technoloy, CryptX, $//\mathrm{w}\mathrm{w}\mathrm{w}$ $\mathrm{a}\mathrm{u}/\mathrm{r}\mathrm{e}\epsilon (http: isrc qut edu ) [11] J A Reeds, Cradcing multiplocative congruential encryption algorithm, in Information Linkage Between Applied Mathematics and Industry, PCC Wang, ed, Academic Press, pp467472, 1979

14 $\iota\lceil 15]$ H 93 [12] J A Reeds, Solution of challenge cipher, Cryptologia, $\mathrm{v}\mathrm{o}\mathrm{l}$ $3,$ No 2, pp8395, 1979 $23\mathrm{r}\mathrm{d}$ [13] J B Plumstread, Inferring a sequence generated by a linear congruence, Proceedings of the IEEE Symposium on the Foundatiorls of Computer Science, pp153159, 1982 $\mathrm{j}\mathrm{c}$ [14] Lagarias and J Reeds, Unique extrapolation of polynomial recurrences, SIAM Joumal on Computing, Vol 17 No 2, pp342362, 1988 Krawczyk, How to predict congruential generators,, Advances in CryptologyCRYPTO 89, pp138153, 1990 $\mathrm{a}\mathrm{m}$ [16] Frieze, J Hastad, R Kannan, J C Lagarias and A Shamir, Reconstracting truncated integer variables satisfying linear congruences, SIAM Journal on Computing, Vol 17, No 2, pp262280, 1988 [17] J Stern, Secret linear congruential generators are not cryptographically Secure, Proceedings of the 28th Symposium on the Foundations of Computer Science, pp421426, 1987

Microsoft Word - HM-RAJ doc

Microsoft Word - HM-RAJ doc NIST 及び DIEHARD テストによる RPG100 乱数評価 FDK( 株 )RPG 推進室 2003/12/16 導入 RPG100 から生成される乱数を 2 つの有名なテストを用いて評価します 一方は米国機関 NIST により公開されている資料に基づくテストで 他方は Marsaglia 博士により提供されているテストです 乱数を一度テストしただけでは それが常にテストを満足する乱数性を持っていることを確認できないことから

More information

2004 1

2004 1 2004 1 1 3 2 4 2.1......................................... 4 2.2........................................ 7 3 NIST Special Publicatio 800-22 9 3.1................................... 9 3.1.1 1...............................

More information

CryptrecReport.dvi

CryptrecReport.dvi 16 12 1 NIST NIST Special Publication 800-22[1, 2] SP 800-22 2 DIEHARD [27] SP 800-22Ver.1.516 189 DFT Lempel-Ziv [3, 4, 5] SP 800-22 16 DFT Lempel-Ziv 1 2 SP 800-22 NIST SP800-22[1, 2] NISTNational Institute

More information

Title 疑似乱数生成器の安全性とモンテカルロ法 ( 確率数値解析に於ける諸問題,VI) Author(s) 杉田, 洋 Citation 数理解析研究所講究録 (2004), 1351: Issue Date URL

Title 疑似乱数生成器の安全性とモンテカルロ法 ( 確率数値解析に於ける諸問題,VI) Author(s) 杉田, 洋 Citation 数理解析研究所講究録 (2004), 1351: Issue Date URL Title 疑似乱数生成器の安全性とモンテカルロ法 ( 確率数値解析に於ける諸問題,VI) Author(s) 杉田, 洋 Citation 数理解析研究所講究録 (2004), 1351: 33-40 Issue Date 2004-01 URL http://hdlhandlenet/2433/64973 Right Type Departmental Bulletin Paper Textversion

More information

3. ( 1 ) Linear Congruential Generator:LCG 6) (Mersenne Twister:MT ), L 1 ( 2 ) 4 4 G (i,j) < G > < G 2 > < G > 2 g (ij) i= L j= N

3. ( 1 ) Linear Congruential Generator:LCG 6) (Mersenne Twister:MT ), L 1 ( 2 ) 4 4 G (i,j) < G > < G 2 > < G > 2 g (ij) i= L j= N RMT 1 1 1 N L Q=L/N (RMT), RMT,,,., Box-Muller, 3.,. Testing Randomness by Means of RMT Formula Xin Yang, 1 Ryota Itoi 1 and Mieko Tanaka-Yamawaki 1 Random matrix theory derives, at the limit of both dimension

More information

自動残差修正機能付き GBiCGSTAB$(s,L)$法 (科学技術計算アルゴリズムの数理的基盤と展開)

自動残差修正機能付き GBiCGSTAB$(s,L)$法 (科学技術計算アルゴリズムの数理的基盤と展開) 1733 2011 149-159 149 GBiCGSTAB $(s,l)$ GBiCGSTAB(s,L) with Auto-Correction of Residuals (Takeshi TSUKADA) NS Solutions Corporation (Kouki FUKAHORI) Graduate School of Information Science and Technology

More information

5 / / $\mathrm{p}$ $\mathrm{r}$ 8 7 double 4 22 / [10][14][15] 23 P double 1 $\mathrm{m}\mathrm{p}\mathrm{f}\mathrm{u}\mathrm{n}/\mathrm{a

5 / / $\mathrm{p}$ $\mathrm{r}$ 8 7 double 4 22 / [10][14][15] 23 P double 1 $\mathrm{m}\mathrm{p}\mathrm{f}\mathrm{u}\mathrm{n}/\mathrm{a double $\mathrm{j}\mathrm{s}\mathrm{t}$ $\mathrm{q}$ 1505 2006 1-13 1 / (Kinji Kimura) Japan Science and Technology Agency Faculty of Science Rikkyo University 1 / / 6 1 2 3 4 5 Kronecker 6 2 21 $\mathrm{p}$

More information

スライド 1

スライド 1 IPA 2010 3 25 1 1 / / 2 (DRBG) DRBG NIST SP800-90 2 1 3 JCMVP 2009 1 JCATT AES 15 4 5 OK/NG OK ( ) ( ) 6 JCMVP JCATT JCATT http://www.ipa.go.jp/security/jcmvp/open_documents.html 7 332 (DES, Triple-DES,

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( ) 1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

42 1 ( ) 7 ( ) $\mathrm{s}17$ $-\supset$ 2 $(1610?\sim 1624)$ 8 (1622) (3 ), 4 (1627?) 5 (1628) ( ) 6 (1629) ( ) 8 (1631) (2 ) $\text{ }$ ( ) $\text{

42 1 ( ) 7 ( ) $\mathrm{s}17$ $-\supset$ 2 $(1610?\sim 1624)$ 8 (1622) (3 ), 4 (1627?) 5 (1628) ( ) 6 (1629) ( ) 8 (1631) (2 ) $\text{ }$ ( ) $\text{ 26 [\copyright 0 $\perp$ $\perp$ 1064 1998 41-62 41 REJECT}$ $=\underline{\not\equiv!}\xi*$ $\iota_{arrow}^{-}\approx 1,$ $\ovalbox{\tt\small ffl $\mathrm{y}

More information

2 (S, C, R, p, q, S, C, ML ) S = {s 1, s 2,..., s n } C = {c 1, c 2,..., c m } n = S m = C R = {r 1, r 2,...} r r 2 C \ p = (p r ) r R q = (q r ) r R

2 (S, C, R, p, q, S, C, ML ) S = {s 1, s 2,..., s n } C = {c 1, c 2,..., c m } n = S m = C R = {r 1, r 2,...} r r 2 C \ p = (p r ) r R q = (q r ) r R RF-004 Hashimoto Naoyuki Suguru Ueda Atsushi Iwasaki Yosuke Yasuda Makoto Yokoo 1 [10] ( ). ( ) 1 ( ) 3 4 3 4 = 12 deferred acceptance (DA) [3, 7] [5] ( ) NP serial dictatorship with regional quotas (SDRQ)

More information

$\hat{\grave{\grave{\lambda}}}$ $\grave{\neg}\backslash \backslash ^{}4$ $\approx \mathrm{t}\triangleleft\wedge$ $10^{4}$ $10^{\backslash }$ $4^{\math

$\hat{\grave{\grave{\lambda}}}$ $\grave{\neg}\backslash \backslash ^{}4$ $\approx \mathrm{t}\triangleleft\wedge$ $10^{4}$ $10^{\backslash }$ $4^{\math $\mathrm{r}\mathrm{m}\mathrm{s}$ 1226 2001 76-85 76 1 (Mamoru Tanahashi) (Shiki Iwase) (Toru Ymagawa) (Toshio Miyauchi) Department of Mechanical and Aerospaoe Engineering Tokyo Institute of Technology

More information

128 Howarth (3) (4) 2 ( ) 3 Goldstein (5) 2 $(\theta=79\infty^{\mathrm{o}})$ : $cp_{n}=0$ : $\Omega_{m}^{2}=1$ $(_{\theta=80}62^{\mathrm{o}})$

128 Howarth (3) (4) 2 ( ) 3 Goldstein (5) 2 $(\theta=79\infty^{\mathrm{o}})$ : $cp_{n}=0$ : $\Omega_{m}^{2}=1$ $(_{\theta=80}62^{\mathrm{o}})$ 1075 1999 127-142 127 (Shintaro Yamashita) 7 (Takashi Watanabe) $\mathrm{n}\mathrm{a}\mathrm{k}\mathrm{a}\mathrm{m}\mathrm{u}\mathrm{f}\mathrm{a}\rangle$ (Ikuo 1 1 $90^{\mathrm{o}}$ ( 1 ) ( / \rangle (

More information

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Interactive Recommendation System 1 1 1 1 LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Shun ichi Tano 1 1 Graduate School of Information Systems, The University of Electro-Communications Abstract: The

More information

ASF-01

ASF-01 暗号モジュール試験及び認証制度 (JCMVP) 承認されたセキュリティ機能に関する仕様 平成 26 年 4 月 1 日独立行政法人情報処理推進機構 ASF-01 A p p r o v e d S e c u r i t y F u n c t i o n s 目次 1. 目的... 1 2. 承認されたセキュリティ機能... 1 公開鍵... 1 共通鍵... 3 ハッシュ... 4 メッセージ認証...

More information

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification

More information

$\text{ ^{ } }\dot{\text{ }}$ KATSUNORI ANO, NANZAN UNIVERSITY, DERA MDERA, MDERA 1, (, ERA(Earned Run Average) ),, ERA 1,,

$\text{ ^{ } }\dot{\text{ }}$ KATSUNORI ANO, NANZAN UNIVERSITY, DERA MDERA, MDERA 1, (, ERA(Earned Run Average) ),, ERA 1,, 併殺を考慮したマルコフ連鎖に基づく投手評価指標とそ Titleの 1997 年度日本プロ野球シーズンでの考察 ( 最適化のための連続と離散数理 ) Author(s) 穴太, 克則 Citation 数理解析研究所講究録 (1999), 1114: 114-125 Issue Date 1999-11 URL http://hdlhandlenet/2433/63391 Right Type Departmental

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3 36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there

More information

浜松医科大学紀要

浜松医科大学紀要 On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse

More information

将来の暗号技術に関する安全性要件調査報告書

将来の暗号技術に関する安全性要件調査報告書 i ... 1... 3... 4 DES... 4 DES Cracker (1998 )... 4... 6 3.3.1 Lenstra & Verheul1999... 6 3.3.2 2000... 10 3.3.3 Silverman2000... 12... 12... 13... 13... 14... 17... 18... 18 5.1.1... 18 5.1.2... 18 5.1.3...

More information

ヘンリー・ブリッグスの『対数算術』と『数理精蘊』の対数部分について : 会田安明『対数表起源』との関連を含めて (数学史の研究)

ヘンリー・ブリッグスの『対数算術』と『数理精蘊』の対数部分について : 会田安明『対数表起源』との関連を含めて (数学史の研究) 1739 2011 214-225 214 : 1 RJMS 2010 8 26 (Henry Briggs, 1561-16301) $Ar ithmetica$ logarithmica ( 1624) (Adriaan Vlacq, 1600-1667 ) 1628 [ 2. (1628) Tables des Sinus, Tangentes et Secantes; et des Logarithmes

More information

FA $*1$ $*$ 1, $*$2 : $*2$ : Takehiro Takano $*$ 1, Katsunori Ano*2 $*1$ : Graduate School of Engineering and Science, Shibaura Ins

FA $*1$ $*$ 1, $*$2 : $*2$ : Takehiro Takano $*$ 1, Katsunori Ano*2 $*1$ : Graduate School of Engineering and Science, Shibaura Ins Title マルコフ連鎖に基づく最適打順モデルによる FA 打者獲得戦略 ( 不確実 不確定性の下での数理意思決定モデルとその周辺 ) Author(s) 高野, 健大 ; 穴太, 克則 Citation 数理解析研究所講究録 (2016), 1990: 89-96 Issue Date 2016-04 URL http://hdl.handle.net/2433/224603 Right Type

More information

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo

More information

$\mathrm{s}$ DE ( Kenta Kobayashi ), (Hisashi Okamoto) (Research Institute for Mathematical Sciences, Kyoto Univ.) (Jinghui Zhu)

$\mathrm{s}$ DE ( Kenta Kobayashi ), (Hisashi Okamoto) (Research Institute for Mathematical Sciences, Kyoto Univ.) (Jinghui Zhu) $\mathrm{s}$ 1265 2002 209-219 209 DE ( Kenta Kobayashi ), (Hisashi Okamoto) (Research Institute for Mathematical Sciences, Kyoto Univ) (Jinghui Zhu) 1 Iiitroductioii (Xiamen Univ) $c$ (Fig 1) Levi-Civita

More information

40 $\mathrm{e}\mathrm{p}\mathrm{r}$ 45

40 $\mathrm{e}\mathrm{p}\mathrm{r}$ 45 ro 980 1997 44-55 44 $\mathrm{i}\mathrm{c}\mathrm{h}\mathrm{i}$ $-$ (Ko Ma $\iota_{\mathrm{s}\mathrm{u}\mathrm{n}}0$ ) $-$. $-$ $-$ $-$ $-$ $-$ $-$ 40 $\mathrm{e}\mathrm{p}\mathrm{r}$ 45 46 $-$. $\backslash

More information

(check matrices and minimum distances) H : a check matrix of C the minimum distance d = (the minimum # of column vectors of H which are linearly depen

(check matrices and minimum distances) H : a check matrix of C the minimum distance d = (the minimum # of column vectors of H which are linearly depen Hamming (Hamming codes) c 1 # of the lines in F q c through the origin n = qc 1 q 1 Choose a direction vector h i for each line. No two vectors are colinear. A linearly dependent system of h i s consists

More information

a m 1 mod p a km 1 mod p k<s 1.6. n > 1 n 1= s m, (m, = 1 a n n a m 1 mod n a km 1 mod n k<sn a 1.7. n > 1 n 1= s m, (m, = 1 r n ν = min ord (p 1 (1 B

a m 1 mod p a km 1 mod p k<s 1.6. n > 1 n 1= s m, (m, = 1 a n n a m 1 mod n a km 1 mod n k<sn a 1.7. n > 1 n 1= s m, (m, = 1 r n ν = min ord (p 1 (1 B 10 004 Journal of the Institute of Science and Engineering. Chuo University Euler n > 1 p n p ord p n n n 1= s m (m B psp = {a (Z/nZ ; a n 1 =1}, B epsp = { ( a (Z/nZ ; a n 1 a }, = n B spsp = { a (Z/nZ

More information

[I486S] 暗号プロトコル理論

[I486S]  暗号プロトコル理論 [I486S] 2018 5 1 (JAIST) 2018 5 1 1 / 22 : I486S I URL:https://wwwjaistacjp/~fujisaki/i486S (Tuesdays) 5 17:10 18:50 4/17, 4/24, 5/1, 5/15, 5/22, 5/29, 6/5, 6/19, 6/26, 7/3, 7/10, 7/17, 7/24, 7/31 (JAIST)

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

A MATLAB Toolbox for Parametric Rob TitleDesign based on symbolic computatio Design of Algorithms, Implementatio Author(s) 坂部, 啓 ; 屋並, 仁史 ; 穴井, 宏和 ; 原

A MATLAB Toolbox for Parametric Rob TitleDesign based on symbolic computatio Design of Algorithms, Implementatio Author(s) 坂部, 啓 ; 屋並, 仁史 ; 穴井, 宏和 ; 原 A MATLAB Toolbox for Parametric Rob TitleDesign based on symbolic computatio Design of Algorithms, Implementatio Author(s) 坂部, 啓 ; 屋並, 仁史 ; 穴井, 宏和 ; 原, 辰次 Citation 数理解析研究所講究録 (2004), 1395: 231-237 Issue

More information

,,, 2 ( ), $[2, 4]$, $[21, 25]$, $V$,, 31, 2, $V$, $V$ $V$, 2, (b) $-$,,, (1) : (2) : (3) : $r$ $R$ $r/r$, (4) : 3

,,, 2 ( ), $[2, 4]$, $[21, 25]$, $V$,, 31, 2, $V$, $V$ $V$, 2, (b) $-$,,, (1) : (2) : (3) : $r$ $R$ $r/r$, (4) : 3 1084 1999 124-134 124 3 1 (SUGIHARA Kokichi),,,,, 1, [5, 11, 12, 13], (2, 3 ), -,,,, 2 [5], 3,, 3, 2 2, -, 3,, 1,, 3 2,,, 3 $R$ ( ), $R$ $R$ $V$, $V$ $R$,,,, 3 2 125 1 3,,, 2 ( ), $[2, 4]$, $[21, 25]$,

More information

Bulletin of JSSAC(2014) Vol. 20, No. 2, pp (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles ca

Bulletin of JSSAC(2014) Vol. 20, No. 2, pp (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles ca Bulletin of JSSAC(2014) Vol. 20, No. 2, pp. 3-22 (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles can be solved by using Gröbner bases. In this paper,

More information

189 2 $\mathrm{p}\mathrm{a}$ (perturbation analysis ) PA (Ho&Cao [5] ) 1 FD 1 ( ) / PA $\mathrm{p}\mathrm{a}$ $\mathrm{p}\mathrm{a}$ (infinite

189 2 $\mathrm{p}\mathrm{a}$ (perturbation analysis ) PA (Ho&Cao [5] ) 1 FD 1 ( ) / PA $\mathrm{p}\mathrm{a}$ $\mathrm{p}\mathrm{a}$ (infinite 947 1996 188-199 188 (Hideaki Takada) (Naoto Miyoshi) (Toshiharu Hasegawa) Abstract (perturbation analysis) 1 1 1 ( ) $R$ (stochastic discrete event system) (finite difference $\mathrm{f}\mathrm{d}$ estimate

More information

Microsoft Excelを用いた分子軌道の描画の実習

Microsoft Excelを用いた分子軌道の描画の実習 J. Comput. Chem. Jpn.,Vol.9, No.4, pp.177 182 (2010) 2010 Society of Computer Chemistry, Japan Microsoft Excel a*, b, c a, 790-8577 2-5 b, 350-0295 1-1 c, 305-8568 1-1-1 *e-mail: nagaoka@ehimegw.dpc.ehime-u.ac.jp

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding

More information

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策 IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... E-mail: hidemitsu.izawa@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp / /2015.10

More information

$\mathrm{d}\mathrm{p}$ (Katsuhisa $\mathrm{o}\mathrm{m}\mathrm{o}$) Aichi Institute of Technology (Takahiro Ito) Nagoya Institute of Te

$\mathrm{d}\mathrm{p}$ (Katsuhisa $\mathrm{o}\mathrm{m}\mathrm{o}$) Aichi Institute of Technology (Takahiro Ito) Nagoya Institute of Te Title ニューロ DP による多品目在庫管理の最適化 ( 不確実で動的なシステムへの最適化理論とその展開 ) Author(s) 大野 勝久 ; 伊藤 崇博 ; 石垣 智徳 ; 渡辺 誠 Citation 数理解析研究所講究録 (24) 383: 64-7 Issue Date 24-7 URL http://hdlhandlenet/2433/2575 Right Type Departmental

More information

untitled

untitled On a Correlation-based Scheme of Digital Watermarking for Images Exploiting 2-D LOT Hiromu KODA and Kyousuke KAMINUSI Abstract In this paper, we propose a correlation based scheme of digital watermarking

More information

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU 1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale

More information

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0 AMBA 1 1 1 1 FabScalar FabScalar AMBA AMBA FutureBus Improvement of AMBA Bus Frame-work for Heterogeneos Multi-processor Seto Yusuke 1 Takahiro Sasaki 1 Kazuhiko Ohno 1 Toshio Kondo 1 Abstract: The demand

More information

å‰Łçı—訋çfl»æ³Łã†¨ã…Łã‡£ã…œã…−ã……ã…†æŁ°, ㆚ㆮ2æ¬¡è©Łä¾¡å‹ƒå›²ã•† ㅋㅪㅜã…−ã……ã…†æŁ°å‹Šã†«ã‡‹ã‡‰é•£ã†®ç¢ºç”⁄訋箊

å‰Łçı—訋çfl»æ³Łã†¨ã…Łã‡£ã…œã…−ã……ã…†æŁ°,   ㆚ㆮ2æ¬¡è©Łä¾¡å‹ƒå›²ã•† ㅋㅪㅜã…−ã……ã…†æŁ°å‹Šã†«ã‡‹ã‡‰é•£ã†®ç¢ºç”⁄訋箊 , 2 August 28 (Fri), 2016 August 28 (Fri), 2016 1 / 64 Outline 1 2 3 2 4 2 5 6 August 28 (Fri), 2016 2 / 64 fibonacci Lucas 2 August 28 (Fri), 2016 3 / 64 Dynamic Programming R.Bellman Bellman Continuum

More information

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055 1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free

More information

(1970) 17) V. Kucera: A Contribution to Matrix Ouadratic Equations, IEEE Trans. on Automatic Control, AC- 17-3, 344/347 (1972) 18) V. Kucera: On Nonnegative Definite Solutions to Matrix Ouadratic Equations,

More information

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name RSA Group Name RSA Code Elliptic Curve Cryptograrhy Group /Project No. 13-B /Project Leader 1009087 Takahiro

More information

RTM RTM Risk terrain terrain RTM RTM 48

RTM RTM Risk terrain terrain RTM RTM 48 Risk Terrain Model I Risk Terrain Model RTM,,, 47 RTM RTM Risk terrain terrain RTM RTM 48 II, RTM CSV,,, RTM Caplan and Kennedy RTM Risk Terrain Modeling Diagnostics RTMDx RTMDx RTMDx III 49 - SNS 50 0

More information

RIMS98R2.dvi

RIMS98R2.dvi RIMS Kokyuroku, vol.084, (999), 45 59. Euler Fourier Euler Fourier S = ( ) n f(n) = e in f(n) (.) I = 0 e ix f(x) dx (.2) Euler Fourier Fourier Euler Euler Fourier Euler Euler Fourier Fourier [5], [6]

More information

わが国企業による資金調達方法の選択問題

わが国企業による資金調達方法の選択問題 * takeshi.shimatani@boj.or.jp ** kawai@ml.me.titech.ac.jp *** naohiko.baba@boj.or.jp No.05-J-3 2005 3 103-8660 30 No.05-J-3 2005 3 1990 * E-mailtakeshi.shimatani@boj.or.jp ** E-mailkawai@ml.me.titech.ac.jp

More information

1 OpenCL OpenCL 1 OpenCL GPU ( ) 1 OpenCL Compute Units Elements OpenCL OpenCL SPMD (Single-Program, Multiple-Data) SPMD OpenCL work-item work-group N

1 OpenCL OpenCL 1 OpenCL GPU ( ) 1 OpenCL Compute Units Elements OpenCL OpenCL SPMD (Single-Program, Multiple-Data) SPMD OpenCL work-item work-group N GPU 1 1 2 1, 3 2, 3 (Graphics Unit: GPU) GPU GPU GPU Evaluation of GPU Computing Based on An Automatic Program Generation Technology Makoto Sugawara, 1 Katsuto Sato, 1 Kazuhiko Komatsu, 2 Hiroyuki Takizawa

More information

set element a A A a A a A 1 extensional definition, { } A = {1, 2, 3, 4, 5, 6, 7, 8, 9} 9 1, 2, 3, 4, 5, 6, 7, 8, 9..

set element a A A a A a A 1 extensional definition, { } A = {1, 2, 3, 4, 5, 6, 7, 8, 9} 9 1, 2, 3, 4, 5, 6, 7, 8, 9.. 12 -- 2 1 2009 5,,.,.,.. 1, 2, 3,., 4),, 4, 5),. 4, 6, 7).,, R A B, 8, (a) A, B 9), (b) {a (a, b) R b B }, {b (a, b) R a A } 10, 11, 12) 2. (a). 11, 13, R S {(a, c) (a, b) R, (b, c) S } (c) R S 14), 1,

More information

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect Using a Human-Shaped Input Device for Remote Pose Instruction Yuki Tayama 1,a) Yoshiaki Ando 2,b) Misaki Hagino 2,c) Ken-ichi Okada 1,d) Abstract: There

More information

2 ( ) i

2 ( ) i 25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA

More information

untitled

untitled Copyright 2008 IPAAll Rights Reserved 1 1. 2. 3. Copyright 2008 IPAAll Rights Reserved 2 IT IT IT Copyright 2008 IPAAll Rights Reserved http://www.jitec.jp/1_00topic/topic_20071225_shinseido.html 3 URL

More information

量子情報科学−情報科学の物理限界への挑戦- 2018

量子情報科学−情報科学の物理限界への挑戦- 2018 1 http://qi.mp.es.osaka-u.ac.jp/main 2 0 5000 10000 15000 20000 25000 30000 35000 40000 1945 1947 1949 1951 1953 1955 1957 1959 1961 1963 1965 1967 1969 1971 1973 1975 1977 1979 1981 1983 1985 1987 1989

More information

Optimal Torque Distribution Algorithm for Redundant Reaction Wheels Takehiro NISHIYAMA and Katsuhiko YAMADA*3 Advanced Technology R & D Center, Mitsub

Optimal Torque Distribution Algorithm for Redundant Reaction Wheels Takehiro NISHIYAMA and Katsuhiko YAMADA*3 Advanced Technology R & D Center, Mitsub Optimal Torque Distribution Algorithm for Redundant Reaction Wheels Takehiro NISHIYAMA and Katsuhiko YAMADA*3 Advanced Technology R & D Center, Mitsubishi Electric Corporation, 8-1-1 Tsukaguchi-Honmachi,

More information

,,.,.,,.,.,.,.,,.,..,,,, i

,,.,.,,.,.,.,.,,.,..,,,, i 22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of

More information

FA - : (FA) FA [3] [4] [5] 1.1 () 25 1:

FA - : (FA) FA [3] [4] [5] 1.1 () 25 1: 得点圏打率 盗塁 併殺を考慮した最適打順決定モデル Titleについて : FA 打者トレード戦略の検討 ( 不確実性の下での数理モデルとその周辺 ) Author(s) 穴太, 克則 ; 高野, 健大 Citation 数理解析研究所講究録 (2015), 1939: 133-142 Issue Date 2015-04 URL http://hdl.handle.net/2433/223766

More information

The 18th Game Programming Workshop ,a) 1,b) 1,c) 2,d) 1,e) 1,f) Adapting One-Player Mahjong Players to Four-Player Mahjong

The 18th Game Programming Workshop ,a) 1,b) 1,c) 2,d) 1,e) 1,f) Adapting One-Player Mahjong Players to Four-Player Mahjong 1 4 1,a) 1,b) 1,c) 2,d) 1,e) 1,f) 4 1 1 4 1 4 4 1 4 Adapting One-Player Mahjong Players to Four-Player Mahjong by Recognizing Folding Situations Naoki Mizukami 1,a) Ryotaro Nakahari 1,b) Akira Ura 1,c)

More information

$\ovalbox{\tt\small REJECT}$ SDE 1 1 SDE ;1) SDE 2) Burgers Model SDE $([4],[5],[7], [8])$ 1.1 SDE SDE (cf.[4],[5]) SDE $\{$ : $dx_

$\ovalbox{\tt\small REJECT}$ SDE 1 1 SDE ;1) SDE 2) Burgers Model SDE $([4],[5],[7], [8])$ 1.1 SDE SDE (cf.[4],[5]) SDE $\{$ : $dx_ $\ovalbox{\tt\small REJECT}$ 1032 1998 46-61 46 SDE 1 1 SDE ;1) SDE 2) Burgers Model SDE $([4],[5],[7], [8])$ 1.1 SDE SDE (cf.[4],[5]) SDE $dx_{t}=a(t, X_{t}, u)dt+b(t, x_{t}, u)dwt$, $X_{0}=\xi(\omega)$

More information

\mathrm{n}\circ$) (Tohru $\mathrm{o}\mathrm{k}\mathrm{u}\mathrm{z}\circ 1 $(\mathrm{f}_{\circ \mathrm{a}}\mathrm{m})$ ( ) ( ). - $\

\mathrm{n}\circ$) (Tohru $\mathrm{o}\mathrm{k}\mathrm{u}\mathrm{z}\circ 1 $(\mathrm{f}_{\circ \mathrm{a}}\mathrm{m})$ ( ) ( ). - $\ 1081 1999 84-99 84 \mathrm{n}\circ$) (Tohru $\mathrm{o}\mathrm{k}\mathrm{u}\mathrm{z}\circ 1 $(\mathrm{f}_{\circ \mathrm{a}}\mathrm{m})$ ( ) ( ) - $\text{ }$ 2 2 ( ) $\mathrm{c}$ 85 $\text{ }$ 3 ( 4 )

More information

untitled

untitled IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)

More information

ISO/IEC 9798プロトコルの安全性評価

ISO/IEC 9798プロトコルの安全性評価 ISO/IEC 9798 2011 2 4 ISO/IEC 9798-2 (Mechanisms using symmetric encipherment algorithms), ISO/IEC 9798-3 (Mechanisms using digital signature techniques), ISO/IEC 9798-4 (Mechanisms using a cryptographic

More information

橡最新卒論

橡最新卒論 Research of improving of recognition ability in Face recognition system Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint,

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

105 $\cdot$, $c_{0},$ $c_{1},$ $c_{2}$, $a_{0},$ $a_{1}$, $\cdot$ $a_{2}$,,,,,, $f(z)=a_{0}+a_{1}z+a_{2}z^{2}+\cdots$ (16) $z=\emptyset(w)=b_{1}w+b_{2

105 $\cdot$, $c_{0},$ $c_{1},$ $c_{2}$, $a_{0},$ $a_{1}$, $\cdot$ $a_{2}$,,,,,, $f(z)=a_{0}+a_{1}z+a_{2}z^{2}+\cdots$ (16) $z=\emptyset(w)=b_{1}w+b_{2 1155 2000 104-119 104 (Masatake Mori) 1 $=\mathrm{l}$ 1970 [2, 4, 7], $=-$, $=-$,,,, $\mathrm{a}^{\mathrm{a}}$,,, $a_{0}+a_{1}z+a_{2}z^{2}+\cdots$ (11), $z=\alpha$ $c_{0}+c_{1}(z-\alpha)+c2(z-\alpha)^{2}+\cdots$

More information

表紙4_1/山道 小川内 小川内 芦塚

表紙4_1/山道 小川内 小川内 芦塚 1 2008.1Vol.23 2008.1Vol.23 2 2008.1Vol.23 3 2008.1Vol.23 4 5 2008.1Vol.23 2008.1Vol.23 6 7 2008.1Vol.23 2008.1Vol.23 8 9 2008.1Vol.23 10 2008.1Vol.23 11 2008.1Vol.23 12 2008.1Vol.23 Center 13 2008.1Vol.23

More information

Explicit form of the evolution oper TitleCummings model and quantum diagonal (Dynamical Systems and Differential Author(s) 鈴木, 達夫 Citation 数理解析研究所講究録

Explicit form of the evolution oper TitleCummings model and quantum diagonal (Dynamical Systems and Differential Author(s) 鈴木, 達夫 Citation 数理解析研究所講究録 Explicit form of the evolution oper TitleCummings model and quantum diagonal (Dynamical Systems and Differential Author(s) 鈴木 達夫 Citation 数理解析研究所講究録 (2004) 1408: 97-109 Issue Date 2004-12 URL http://hdlhandlenet/2433/26142

More information

86 Development of a Course Classification Support System for the Awarding of Degrees using Syllabus Data MIYAZAKI Kazuteru, IDA Masaaki, YOSHIKANE Fuyuki, NOZAWA Takayuki and KITA Hajime Research in Academic

More information

SDPA( Programming Algorithm) $\mathrm{s}\mathrm{e}\mathrm{m}\mathrm{i}\mathrm{d}\mathrm{e}\mathrm{f}\mathrm{i}\mathrm{n}\mathrm{

SDPA( Programming Algorithm) $\mathrm{s}\mathrm{e}\mathrm{m}\mathrm{i}\mathrm{d}\mathrm{e}\mathrm{f}\mathrm{i}\mathrm{n}\mathrm{ 1114 1999 149-159 149 SDPA( Programming Algorithm) $\mathrm{s}\mathrm{e}\mathrm{m}\mathrm{i}\mathrm{d}\mathrm{e}\mathrm{f}\mathrm{i}\mathrm{n}\mathrm{i}\mathrm{t}\mathrm{e}$ $\mathrm{m}\mathrm{a}\mathrm{s}^{\urcorner}\mathrm{a}\mathrm{k}\mathrm{a}\mathrm{z}\mathrm{l}\mathrm{l}$

More information

guideline_1_0.dvi

guideline_1_0.dvi Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10

More information

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi- 1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,

More information

Page 1 of 6 B (The World of Mathematics) November 20, 2006 Final Exam 2006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (10pts) (a

Page 1 of 6 B (The World of Mathematics) November 20, 2006 Final Exam 2006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (10pts) (a Page 1 of 6 B (The World of Mathematics) November 0, 006 Final Exam 006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (a) (Decide whether the following holds by completing the truth

More information

BOK body of knowledge, BOK BOK BOK 1 CC2001 computing curricula 2001 [1] BOK IT BOK 2008 ITBOK [2] social infomatics SI BOK BOK BOK WikiBOK BO

BOK body of knowledge, BOK BOK BOK 1 CC2001 computing curricula 2001 [1] BOK IT BOK 2008 ITBOK [2] social infomatics SI BOK BOK BOK WikiBOK BO DEIM Forum 2012 C8-5 WikiBOK 252 5258 5 10 1 E-mail: shunsuke.shibuya@gmail.com, {kaz,masunaga}@si.aoyama.ac.jp, {yabuki,sakuta}@it.aoyama.ac.jp Body Of Knowledge, BOK BOK BOK BOK BOK, BOK Abstract Extention

More information

$\mathrm{n}$ Interpolation solves open questions in discrete integrable system (Kinji Kimura) Graduate School of Science and Tec

$\mathrm{n}$ Interpolation solves open questions in discrete integrable system (Kinji Kimura) Graduate School of Science and Tec $\mathrm{n}$ 1381 2004 168-181 190 Interpolation solves open questions in discrete integrable system (Kinji Kimura) Graduate School of Science and Technology Kobe University 1 Introduction 2 (i) (ii) (i)

More information

日立評論2007年3月号 : ソフトウェア開発への

日立評論2007年3月号 : ソフトウェア開発への Vol.89 No.3 298-299 Application of Statistical Process Control to Software Development Mutsumi Komuro 1 23 1985 ACM IEEE 1 195QC Quality Control 1 2 CMM Capability Maturity Model CMMI Capability Maturity

More information

CAPELLI (T\^o $\mathrm{r}\mathrm{u}$ UMEDA) MATHEMATICS, KYOTO UNIVERSITY DEPARTMENT $\mathrm{o}\mathrm{p}$ $0$:, Cape i,.,.,,,,.,,,.

CAPELLI (T\^o $\mathrm{r}\mathrm{u}$ UMEDA) MATHEMATICS, KYOTO UNIVERSITY DEPARTMENT $\mathrm{o}\mathrm{p}$ $0$:, Cape i,.,.,,,,.,,,. 1508 2006 1-11 1 CAPELLI (T\^o $\mathrm{r}\mathrm{u}$ UMEDA) MATHEMATICS KYOTO UNIVERSITY DEPARTMENT $\mathrm{o}\mathrm{p}$ $0$: Cape i Capelli 1991 ( ) (1994 ; 1998 ) 100 Capelli Capelli Capelli ( ) (

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

Mathematica を活用する数学教材とその検証 (数式処理と教育)

Mathematica を活用する数学教材とその検証 (数式処理と教育) $\bullet$ $\bullet$ 1735 2011 115-126 115 Mathematica (Shuichi Yamamoto) College of Science and Technology, Nihon University 1 21 ( ) 1 3 (1) ( ) (2 ) ( ) 10 Mathematica ( ) 21 22 2 Mathematica $?$ 10

More information

$/\mathrm{t}\mathrm{a}\mathrm{k}\mathrm{a}\mathrm{y}\mathrm{a}$ MIYANO E mail: hirosaki-u.ac.jp 1 ( ) ( ) 1980

$/\mathrm{t}\mathrm{a}\mathrm{k}\mathrm{a}\mathrm{y}\mathrm{a}$ MIYANO E mail: hirosaki-u.ac.jp 1 ( ) ( ) 1980 Title 非線形時系列解析によるカオス性検定 ( 非線形解析学と凸解析学の研究 ) Author(s) 宮野, 尚哉 Citation 数理解析研究所講究録 (2000), 1136: 28-36 Issue Date 2000-04 URL http://hdl.handle.net/2433/63786 Right Type Departmental Bulletin Paper Textversion

More information

Fig. 1 Relative delay coding.

Fig. 1 Relative delay coding. An Architecture of Small-scaled Neuro-hardware Using Probabilistically-coded Pulse Neurons Takeshi Kawashima, Non-member (DENSO CORPORATION), Akio Ishiguro, Member (Nagoya University), Shigeru Okuma, Member

More information

Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth

Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth and Foot Breadth Akiko Yamamoto Fukuoka Women's University,

More information

IPSJ SIG Technical Report Vol.2018-SE-200 No /12/ Proposal of test description support environment for request acquisition in web appli

IPSJ SIG Technical Report Vol.2018-SE-200 No /12/ Proposal of test description support environment for request acquisition in web appli 1 1 1 2 Proposal of test description support environment for request acquisition in web application development Nakaji Yoshitake 1 Choi Eunjong 1 Iida Hajimu 1 Yoshida Norihiro 2 1. 1 ( ) 1 Nara Institute

More information

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learninglms CMS A Trial and Prospect of Kumamoto University e-learning Station Hiroshi Nakano 1) Kazuhisa

More information

2 HI LO ZDD 2 ZDD 2 HI LO 2 ( ) HI (Zero-suppress ) Zero-suppress ZDD ZDD Zero-suppress 1 ZDD abc a HI b c b Zero-suppress b ZDD ZDD 5) ZDD F 1 F = a

2 HI LO ZDD 2 ZDD 2 HI LO 2 ( ) HI (Zero-suppress ) Zero-suppress ZDD ZDD Zero-suppress 1 ZDD abc a HI b c b Zero-suppress b ZDD ZDD 5) ZDD F 1 F = a ZDD 1, 2 1, 2 1, 2 2 2, 1 #P- Knuth ZDD (Zero-suppressed Binary Decision Diagram) 2 ZDD ZDD ZDD Knuth Knuth ZDD ZDD Path Enumeration Algorithms Using ZDD and Their Performance Evaluations Toshiki Saitoh,

More information

オーストラリア研究紀要 36号(P)☆/3.橋本

オーストラリア研究紀要 36号(P)☆/3.橋本 36 p.9 202010 Tourism Demand and the per capita GDP : Evidence from Australia Keiji Hashimoto Otemon Gakuin University Abstract Using Australian quarterly data1981: 2 2009: 4some time-series econometrics

More information

paper

paper WISS2013 EpisoPass:. / EpisoPass EpisoPass / 1 [21] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [23] [1][3][12] [18] Copyright is held by the author(s). Toshiyuki Masui, [25] [2][19] EpisoPass

More information