9_21.dvi

Size: px
Start display at page:

Download "9_21.dvi"

Transcription

1 Vol. 50 No (Sep. 2009) GF(3 n ) GF(3 n ) η T η T GF(3 n ) DLP GF(3 n ) DLP DLP GF(3)[x] window GF(3 n ) DLP Granger GF(3 222 ) 352 GF(3 277 ) 440 DLP An Experiment on Implementation of the Function Field Sieve over GF(3 n ) Takuya Hayashi, 1 Masaaki Shirase 1 and Tsuyoshi Takagi 1 The η T pairing on supersingular curve over finite field GF(3 n )isknownas one of the most efficient pairings. The security of pairing based cryptosystems using the η T pairing is based on the difficulty of the discrete logarithm problems (DLP) over GF(3 n ). The most efficient algorithm for solving the DLP over finite fields of small characteristic is the function field sieve. However, few experiments on the difficulty of the DLP over GF(3 n ) have been reported. In this paper, we implemented the function field sieve and experimented the difficulty of the DLP over GF(3 n ). We present a faster implementation of the sieving in GF(3)[x] which is the most time-consuming step in the function field sieve. From this improvement, we succeeded solving the DLP over GF(3 277 )of 440 bits. This is currently the top-record bit-size of the function field sieve over GF(3 n ) to the best of our knowledge. 1. ID ID 8) 3 η T 6) 7),14) 3 η T 3 GF(3 n ) DLP DLP GF(3 n ) DLP 1),24),26) GF(3 n ) DLP 2004 Granger GF(3 n ) DLP GF(3 222 ) 352 DLP 13) DLP 15),18) 3),5) GF(3 n ) Polynomial sieve 12) 4),22) GF(3)[x] k p i (k GF(3)[x]) 12) GF(2)[x] window GF(3)[x] 1 Granger GF(3 n ) DLP 5 1 Graduate School of Systems Information Science, Future University Hakodate 1956 c 2009 Information Processing Society of Japan

2 1957 GF(3 n ) GF(3 n ) DLP GF(3 277 ) 440 DLP Joux-Lercier 16) window Structured Gaussian Elimination 19),23) Lanczos 20) GF(3 277 ) 440 DLP GF(3 n ) DLP GF(3 222 ) GF(p n ) DLP Table 1 The world records of solving the DLP over GF(p n ). GF(p) GF(2 n ) GF(3 n ) / Kleinjung, et al. 18) Joux, et al. 15) Granger, et al. 13) / Many PCs Itanium2 1.3 GHz Pentium Xeon GHz Itanium2 1.3 GHz Ultra SPARC III p n GF(p n ) GF(p n ) GF(p n ) GF(p n ) g α GF(p n ) α = g l l {0, 1,...,p n 2} GF(p n ) (DLP) l =log g α 2.1 GF(p n ) DLP GF(p n ) DLP 1 p {2, 3,p} p Granger GF(3 n ) DLP 13) 352 Joux GF(2 n ) DLP 15) 613 Kleinjung GF(p) DLP 18) DLP DLP 11) 1),24),26) Coppersmith 9) DLP Coppersmith GF(q) (q = p n ) n L q[1/3,c] = exp((c + o(1))(log q) 1/3 (log log q) 2/3 ) c o(1) n o(1) 0 Coppersmith 1984 Coppersmith p =2 n c =(32/9) 1/3 c =4 1/3 Thomé Coppersmith 2001 GF(2 607 ) DLP 25) 1994 Adleman p n o( n) c =(64/9) 1/3 1) 1999 Adleman-Huang p 6 n c =(32/9) 1/3 2) Schirokauer p n o( n) Adleman-Huang 24) 2002 Joux-Lercier 16) Adleman-Huang c =(32/9) 1/3 Joux-Lercier Granger Joux-Lercier GF(3 222 ) DLP 13) 2006 Joux-Lercier p n c =3 1/3 17) 3. Adleman Adleman 1) p p n f n GF(p n ) = GF(p)[x]/(f) GF(p n ) g H(x, y) y d x d 1 2 d d 1 H(x, y) = h i,jy i x j GF(p)[x, y] i=0 j=0 H(x, y) 8

3 1958 GF(3 n ) (1) H (2) h d,d 1 =1. (3) h x = d h i=0 i,d 1y i F [y] F GF(p) (4) h 0,d 1 0. (5) h y = d 1 h j=0 d,jx j F [x] F GF(p) (6) h d,0 0. (7) m GF(p)[x] s.t. H(x, m) 0modf (8) gcd(h L, (p n 1)/(p 1)) = 1 h L H(x, y) L =GF(p)(x)[y]/(H) { GF(p)[x, y]/(h) GF(p n ) φ : = GF(p)[x]/(f) y m H(x, y) = d i=0 hiyi F [x, y](h i GF(p)[x]) smooth bound B B R B A B R = {p GF(p)[x] deg(p) B, p } B A = { p,y t Div(GF(p)[x, y]/(h)) p B R,t mmod p} degree bound D r s GF(p)[x] D gcd(r, s) =1 rm + s = p ai i (1) p i B R ry + s = b j p j,y t j (2) p j,t j B A r s double smooth pair r s double smooth pair h L p j,y t j h L p j,y t j = λ j λ j (GF(p)[x, y]/(h)) (ry + s) h L = μ λ b j j μ GF(p) (ry + s) h L = μ λ b j j φ (rm + s) h L = φ(μ) φ(λ j) b j (1) p a ih L p i B R i = φ(μ) φ(λ j) b j φ(μ) GF(p) (p n 1)/(p 1) p i B R a ih L log g p i b j log g φ(λ j)mod(p n 1)/(p 1) H 8 1/h L κ j =(log g φ(λ j))/h L relation p i B R a i log g p i b jκ j mod (p n 1)/(p 1) (3) log g p i κ j (3) κ j b j p j,y t j b j double smooth pair (3) 1 log g p i mod (p n 1)/(p 1) 4. 4 (i) Polynomial selection (ii) Collection of relations ( iii ) Linear algebra (iv) Individual logarithms 4.1 H(x, y) 3 8 H(x, y) GF(2 n ) DLP Coppersmith Adleman-Huang 2) C ab Joux-Lercier 16) H(x, y) C ab 21) Proposition-Definition ) 8 24) p H(x, y) L g h L ( p +1) 2g 24) (p n 1) h L N (3) mod(p n 1)/N 8 log g p i mod (p n 1) Pohlig-Hellman GF(p n ) N DLP C ab H(x, y) 8 7

4 1959 GF(3 n ) 4.2 r s GF(p)[x] double smooth pair r s GF(p)[x] (3) N R(r, s) =rm + s, N A(r, s) =N( ry + s ) =r d H(x, s/r) B R B A B R = {(p,t) deg(p) B p t m mod p} B A = {(p,t) deg(p) B p H(x, t) 0modp} B R p P R B A p P A a GF(p)[x] B a B-smooth N R P R (1) N A P A 11) (2) D r s N R(r, s) P R N A(r, s) P A divisor N R B-smooth N R P R N A B-smooth N A P A N R N A B-smooth D r s GF(p)[x] N R(r, s) N A(r, s) B-smooth gcd p D+1 p D+1 B-smooth candidate gcd N (r, s) N R(r, s) N A(r, s) P P R P A (1) (2) N (r, s) N (r, s) = p i P p e i i N (r, s) p i e i GF(p)[x] e i =1 N deg(n (r, s)) = p i P e i deg(p i) p i P deg(p i) (r, s) v(r, s) N 0 N (r, s) p i P v(r, s) deg(p i) p i P t(r, s) N v(r, s) B-smooth gcd Polynomial sieve N (r, s) p i N (r, s + p i) p i p i N (r, s 0) s = s 0 + p i,s 0 +2p i,s 0 +3p i,... s 0 p i p i N (r, s) p p i p i N (r, s) p s = s 0 + p i,s 0 + x p i,s 0 +(x +1) p i,..., s 0 +2x p i,..., s 0 + x 2 p i,... s 0 p i k GF(p)[x] k p i k p i k p i Gordon-McCurley p =2 k p i 12) G 1,G 2,...,G 2 d d 2 i 1 l(i) i {1, 2,...,2 d 1} G i G i+1 l(i) 2 d i=1 pixl(i) i k p i (k GF(2)[x], deg(k) (d 1)) l(i), p ix l(i) k p i Thomé p =2 1 Grouping sieves 25) ),22) N q P (r, s) q (q, u) B special-q B B R B A

5 1960 GF(3 n ) N special-q (r, s) v 1 v 2 (GF(p)[x]) 2 av 1 + bv 2 (a, b GF(p)[x]) ab N B-smooth N /q B-smooth Gauss v 1 v 2 special-q Gauss 4.3 (3) R n 1 =#B R n 2 =#B A R (n 1 + n 2) A (n 1 + n 2) x log g p 1 a 1,1... a n1,1 b 1,1... b. n2,1 A =...., x = log g p n1 κ 1. a 1,R... a n1,r b 1,R... b n2,r. p i P R A x 0 mod(p n 1)/(p 1) (4) x A (4) Lanczos 20) Wiedemann 27) Structured Gaussian Elimination 19),23) 4.4 Adleman 1) Coppersmith 9) Adleman Coppersmith Coppersmith GF(p n ) g α GF(p n ) log g α B log g p i p i P R κ n2 (3) κ j p g P R γ {1, 2,...,(p n 1)/(p 1)} z = p γ g α z z 1/z 2 mod f z 1 z 2 (deg(z 1), deg(z 2) <n/2) B >B z 1 z 2 B -smooth z 1 z 2 B B special-q z i i {1, 2} d j B <deg(d j) B special-q N d j d j N d k deg(d j) deg(d k ) >B d k special-q special-q B d j 5. GF(3 n ) GF(3 n ) k p i k GF(3)[x] GF(3 n ) 5.1 smooth bound B degree bound D H(x, y) y d Joux-Lercier heuristic analysis 16) n/(b B = (4/9) 1/3 n 1/3 (log 3 n) 2/3, D = B, d = +1) (5) H(x, y) Granger 13) 5.2 Joux-Lercier 16) Algorithm 1 u 1 u 2 f u 1 u 2 n/d Adleman-Huang m n/d d n Joux-Lercier Adleman-Huang N R(r, s) N R(r, s) B-smooth Adleman- Huang Joux-Lericer Joux-Lercier N R(r, s) =su 2 ru 1 (3)

6 1961 GF(3 n ) Algorithm 1 Joux-Lercier Algorithm 1 Joux-Lercier s polynomial selection d y d H(x, y) = i=0 hiyi GF(3)[x, y] n n f GF(3)[x] u 1,u 2 GF(3)[x] s.t. H(x, u 1/u 2) 0modf 1: repeat 2: n/d u 1,u 2 GF(3)[x] 3: f u d 2 H(x, u1/u2) = d i=0 hi( u1)i u d i 2 4: until f n 5: return f, u 1,u 2 a i log g p i log g u 2 b jκ j mod (3 n 1)/2 p i P R 5.3 gcd B-smooth p P A N A d k p i k p i k GF(3)[x] p = k p i G 1,G 2,...,G 3 d d 3 l(i) 3 i 3 2 i {1, 2,...,3 d 1} G i G i+1 l(i) p =2 3 d i=1 pixl(i) p ix l(i) k p i k GF(3)[x] p =2 l(i) 3 k p i window window 3 Algorithm 2 GF(3)[x] window Algorithm 2 Polynomial sieve with window method in rational part over GF(3)[x] smooth bound B N degree bound D N P R u 1,u 2 GF(3)[x] s.t. H(x, u 1/u 2) 0modf S = {(r, s)} 1: for all r GF(3)[x] s.t. deg(r) D do 2: for i =0to 3 D+1 1 do 3: v[i] 0 4: for all p P R do 5: s 0 ru 1/u 2 mod p 6: d D deg(p) 7: if d 0 then 8: window = {(k p)} s.t. k GF(3)[x], deg(k) d 9: if deg(s 0) D then 10: for all w window do 11: s s 0 + w 12: v[ξ(s)] v[ξ(s)] + deg(p) /* ξ : GF(3)[x] N */ 13: for all s GF(3)[x] s.t. deg(s) D do 14: if v[ξ(s)] t(r, s) then 15: S S {(r, s)} 16: return S window window 1 window window Algorithm 2 8 window d window window 11 window s 0 N R(r, s) p s 12 v deg(p) ξ : GF(3)[x] N, x 3 s v r t(r, s) =deg(n R(r, s)) B v[ξ(s)] (r, s) B-smooth deg(n R(r, s)) = max(deg(ru 1), deg(su 2)) Algorithm 3 4) Gauss 16)

7 1962 GF(3 n ) Algorithm 3 GF(3)[x] Algorithm 3 Lattice sieve in rational part over GF(3)[x] smooth bound B N degree bound D a,d b N B R special-q Q (B R B A ) u 1,u 2 GF(3)[x] s.t. H(x, u 1/u 2) 0modf S = {(r, s)} 1: for all (q, u) Q do 2: w 1 ( u, 1), w 2 (q, 0) 3: Gauss w 1,w 2 v 1 =(a 1,b 1), v 2 =(a 2,b 2) 4: for i =1to 3 Da+1 1 do 5: for j =1to 3 D b +1 1 do 6: v[i][j] 0 7: for all (p,t) B R do 8: T a 1 + b 1t, U a 2 + b 2t 9: if deg(p) D a then 10: at + bu 0modp ab (Algorithm 2) 11: else 12: w 3 ( T 1 U mod p, 1), w 4 (p, 0) T 0modp v 3 (1, 0), v 4 (0, p) 14 U 0modp v 3 (0, 1), v 4 (p, 0) 14 13: Gauss w 3,w 4 v 3 =(a 3,b 3), v 4 =(a 4,b 4) 14: for all c, d GF(3)[x] s.t. deg(ca 3 + da 4) D a, deg(cb 3 + db 4) D b do 15: v[ξ(a)][ξ(b)] v[ξ(a)][ξ(b)] + deg(p) /* ξ : GF(3)[x] N */ 16: for all a, b GF(3)[x] s.t. deg(a) D a, deg(b) D b do 17: if v[ξ(a)][ξ(b)] t(a, b) then 18: S S {(r, s)} s.t. r = ab 1 + bb 2,s= aa 1 + ba 2 19: return S N special-q (r, s) v 1 v 2 (r, s) = av 1 + bv 2 deg(p) D a ((p,t) B R) ab 10 deg(p) >D a p ab N R p v 3 v v 3 v 4 (a, b) =cv 3 + dv 4 N R(r, s) p deg(a) D a deg(b) D b v[ξ(a)][ξ(b)] deg(p) ξ :GF(3)[x] N x 3 a b 17 t(a, b) d =max(deg(u 1ab 1), deg(u 1bb 2), deg(u 2aa 1), deg(u 2ba 2)) q B R t(a, b) =d deg(q) B q B A t(a, b) =d B t(a, b) v[ξ(a)][ξ(b)] rs B-smooth (r, s) gcd(r, s) =1 N (r, s) B-smooth gcd r s r s gcd x x +1 x +2 1 N (r, s) B-smooth smooth 9),12) smooth B-smooth w = N (r, s) w w t = w B i= B/2 (x3i x) modw w w (x 3i x) i t =0 w B-smooth smooth (4) Structured Gaussian Elimination Lanczos Lanczos Wiedemann n O(n 2 ) DLP 15) Lanczos 18) Wiedemann 2 6. GF(3 n ) DLP GF(3 n ) DLP GF(3 277 ) DLP C

8 1963 GF(3 n ) Table ,000 Timing for finding 10,000 relations using the polynomial or lattice sieve. 3 Table 3 The parameters in our experiments gcc gnu mp 10) 1 η T n 6 n 6.1 DLP 13) 15) 18) 2001 GF(2 n ) DLP 25) GF(3 n ) DLP 350 GF(3 223 ) DLP 10,000 Quad-Core Xeon E GHz 2CPUs 16 GB RAM 1 8 (5) smooth bound B =13 H(x, y) =y 4 + x 3 + x degree bound D D =13 RAM D a = D b =9 special-q q B R deg(q) =B ,000 2 N special-q N special-q B-smooth Gauss n GF(3 n ) DLP n = GF(3 n ) DLP n n GF(3 n ) n B, D H(x, y) GF(3)[x, y] y 4 + x y 4 + x 3 + x y 4 + x y 4 + x y 4 + x y 4 + x 3 + x 1 n GF(3 n ) DLP Fig. 1 Timing for solving the DLP over GF(3 n ) with different n. Quad-Core Xeon E GHz 2CPUs 16 GB RAM (5) 3 smooth bound B degree bound D y d H(x, y) 1 n (5) n = d =3 H 3

9 1964 GF(3 n ) Table 4 4 The number of candidates and relations in the collection of relations. 5 B D GF(3 137 ) DLP Table 5 Timing for solving the DLP over GF(3 137 ) with parameters B, D. n B, D ,348, ,398 18, ,383,548 55,859 18, ,623, ,362 50, ,780, ,537 50, ,637,508 1,327, , ,673, , ,989 d =4 1 B = D degree bound D smooth bound B 3 D+1 3 D+1 degree bound D 9 9 #B R +#B A 2 3 B /B smooth bound B 3 Lanczos n O(n 2 ) smooth bound B Lanczos 9 B = D 4 n n gcd Structured Gaussian Elimination B =9 B =10 B =11 D =9 No No No D =10 No D = B D 5 GF(3 137 ) DLP B D Quad-Core Xeon E GHz 2CPUs 16 GB RAM 1 8 No 1 (B,D) =(11, 11) (5) (B,D) =(11, 11) (B,D) =(9, 11) (5) smooth bound B (5) 1 2 degree bound D GF(3 277 ) DLP 3 DLP GF(3 277 ) DLP 6.3 (5) B = D =15 B =13 D =14 H(x, y) =y 4 + x GF(3 277 ) x 16 ( )/2 =0xf11d8f 0x6f7ae4ee19 0x9fd45e 8d564da1 17d7e227 03db7c4e a f f4a de 9d9f0aca 44d59c9f dc8ea9ed 63f7122f GF(3 277 ) f Algorithm 1 f GF(3 277 ) = GF(3)[x]/(f) g ξ :GF(3)[x] N, x 3 ν = ξ 1 GF(3)[x] ν 16 x = ν(0x3)

10 1965 GF(3 n ) x +1=ν(0x4) x +2=ν(0x5) f = ν(0xbde83b 323a35f1 2fa25b fe3 a2d27cc d2d52740 f0d0f d9d328 5aaba2d1 4675fa4a e1da3f7c 2e23513c) g = ν(0x3) e(x) π(x) e = e 276,e 275,...,e 0 e(x) = 276 (ei mod 3)xi i=0 π(x) Quad-Core Xeon E GHz 2CPUs 16 GB RAM 5 Quad-Core Xeon X GHz 2CPUs 16 GB RAM r s ,021, , , , r s 126,339,538 60, , Quad-Core Xeon E GHz 2CPUs 16 GB RAM RAM RAM RAM-HDD mod(( )/2) (( )/2) , , / Structured Gaussian Elimination 1 317, ,650 Lanczos log g (ν(0x4)) = 0x6967cd ff11d92c cf944de5 62f05bb0 9a28076f 02230c58 1fb1c26d 7b13ef36 077dde2a e2da59fc e f69b8db3 b aee6f4 log g (ν(0x5)) = 0x69aff 1e8f913d 31de275e d3222e9d d310979e 3fbe2d7d 4689d8d4 2d29d27b 612c4c6d d07a8a00 270a4365 ca6c430f fb c Quad-Core Xeon E GHz 2CPUs 16 GB RAM 1 8 e(x) π(x) 4.4 Coppersmith Coppersmith e(x) 100 z 1 z 2 GF(3)[x] z 1 = ν(0x5) ν(0x11) ν(0x22) ν(0x61) ν(0x64d8) ν(0x906d) ν(0xbb586) ν(0x879bbc33) ν(0x5e f167b4da) ν(0x94f 11e8020e) ν(0x26b3 5f504b20) z 2 = ν(0x3) 2 ν(0x8b) ν(0x2950) ν(0x1b190c) ν(0x448cd1d) ν(0x1 154d210e) ν(0x3 60cb9a77) ν(0x130 7f7519d1) ν(0x1f1a 6bef7161) γ = 0x21cd41 ca470ab0 8d79e5b2 7eb38e3c b16357c7 83db7e74 3e14b949 4bf9a3a e 762e3b9f 800d bb0dbe c3573f7e 4b1c5cb3 s.t. x γ e(x) z 1/z 2 mod f 13 special-q 1.12 e(x) π(x) 16 log g e(x) =0x5748fc 413ea1c6 0cbbcafb e975544a 0d2b9548 4c1ab555 a89275a2 2a31cf65 9a3608bd f3161fcb b243d33a 76cf8e2a e76da8e3 88f5d3fb log g π(x) =0x342b5a d4cede7d b2cc2d8c a7ac1cb1 e12ccdb6 6e5e2f f030 1a3cb ce bcd1 0dcf fb cbcd5d GF(3 277 ) 440 DLP

11 1966 GF(3 n ) 6 GF(3 277 ) DLP Table 6 The details of timing for solving the DLP over GF(3 277 ) Table 7 7 Granger Comparison with the experiment by Granger, et al. Granger, et al. 13) GF(3 222 ) GF(3 277 ) Pentium 4 Quad-Core Xeon Ultra SPARC III Quad-Core Xeon Granger Granger GF(3 277 ) DLP L 3 277[1/3, (32/9) 1/3 ]/L 3 222[1/3, (32/9) 1/3 ] Granger 5 7. GF(3 n ) GF(3 n ) DLP window Structured Gaussian Elimination Lanczos Granger GF(3 n ) DLP GF(3 222 ) 352 GF(3 277 ) 440 DLP CRYPTREC jp/ NTT 1) Adleman, L.M.: The Function Field Sieve, Proc. Algorithmic Number Theory Symposium (ANTS-I ), LNCS 877, pp (1994). 2) Adleman, L.M. and Huang, M.-D.A.: Function Field Sieve Method for Discrete Logarithms over Finite Fields, Information and Computation, Vol.151, pp.5 16 (1999). 3) Aoki, K., Franke, J., Kleinjung, T., Lenstra, A.K. and Osvik, D.A.: A Kilobit Special Number Field Sieve Factorization, Proc. Advances in Cryptology ASI- ACRYPT 2007, LNCS 4833, pp.1 12 (2007). 4) 6 ISEC, Vol.104, No.315, pp.9 14 (2004). 5) Bahr, F., Boehm, M., Franke, J. and Kleinjung, T.: RSA-200, Announcement (2005). 6) Barreto, P.S.L.M., Galbraith, S., ÓhÉigeartaigh, C. and Scott, M.: Efficient Pairing Computation on Supersingular Abelian Varieties, Designs, Codes and Cryptography, Vol.42, No.3, pp (2007). 7) Beuchat, J.-L., Brisebarre, N., Detrey, J., Okamoto, E., Shirase, M. and Takagi, T.: Algorithms and Arithmetic Operators for Computing the η T Pairing in Characteristic Three, IEEE Trans. Comput., Vol.57, No.11, pp (2008). 8) Boneh, D. and Franklin, M.: Identity Based Encryption from the Weil Pairing, SIAM Journal on Computing, Vol.32, No.3, pp (2003). 9) Coppersmith, D.: Fast Evaluation of Logarithms in Fields of Characteristic Two, IEEE Trans. Information Theory, Vol.IT-30, No.4, pp (1984). 10) Free Software Foundation: GNU MP GNU Multiple Precision Arithmetic Library. 11) Gordon, D.M.: Discrete Logarithms in GF(p) using the Number Field Sieve, SIAM Journal on Discrete Mathematics, Vol.6, No.1, pp (1993). 12) Gordon, D.M. and McCurley, K.S.: Massively Parallel Computation of Discrete Logarithms, Proc. Advances in Cryptology CRYPTO 92, LNCS 740, pp (1992). 13) Granger, R., Holt, A.J., Page, D., Smart, N.P. and Vercauteren, F.: Function Field Sieve in Characteristic Three, Proc. Algorithmic Number Theory Symposium (ANTS-VI ), LNCS 3076, pp (2004). 14) Granger, R., Page, D. and Stam, M.: Hardware and Software Normal Basis Arithmetic for Pairing-based Cryptography in Characteristic Three, IEEE Trans. Comput., Vol.54, No.7, pp (2005).

12 1967 GF(3 n ) 15) Joux, A., et al.: Discrete Logarithms in GF(2 607 )andgf(2 613 ), Posting to the Number Theory List (2005). wa.exe?a2=ind0509&l=nmbrthry&t=0&p= ) Joux, A. and Lercier, R.: The Function Field Sieve is Quite Special, Proc. Algorithmic Number Theory Symposium (ANTS-V ), LNCS 2369, pp (2002). 17) Joux, A. and Lercier, R.: The Function Field Sieve in the Medium Prime Case, Proc. Advances in Cryptology EUROCRYPT 2006, LNCS 4004, pp (2006). 18) Kleinjung, T., et al.: Discrete Logarithms in GF(p) 160 digits, Posting to the Number Theory List (2007). wa.exe?a2=ind0702&l=nmbrthry&t=0&p=194 19) LaMacchia, B.A. and Odlyzko, A.M.: Solving Large Sparse Linear Systems over Finite Fields, Proc. Advances in Cryptology CRYPTO 90, LNCS 537, pp (1991). 20) Lanczos, C.: Solution of Systems of Linear Equations by Minimized Iterations, Journal of Research of the National Bureau of Standards, Vol.49, No.1, pp (1952). 21) Matsumoto, R.: Using C ab Curves in the Function Field Sieve, IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, Vol.E82- A, No.3, pp (1999). 22) Pollard, J.: The Lattice Sieve, The Development of the Number Field Sieve, pp (1991). 23) Pomerance, C. and Smith, J.W.: Reduction of Huge, Sparse Matrices over Finite Fields via Created Catastrophes, Experimental Mathematics, Vol.1, No.2, pp (1992). 24) Schirokauer, O.: The Special Function Field Sieve, SIAM Journal on Discrete Mathematics, Vol.16, No.1, pp (2003). 25) Thomé, E.: Computation of Discrete Logarithms in F 2 607, Proc. Advances in Cryptology ASIACRYPT 2001, LNCS 2248, pp (2001). 26) Vol.13, No.2, pp (2003). 27) Wiedemann, D.H.: Solving Sparse Linear Equations over Finite Fields, IEEE Trans. Information Theory, Vol.IT-32, No.1, pp (1986). ( ) ( ) JTB NTT IACR

:00-16:10

:00-16:10 3 3 2007 8 10 13:00-16:10 2 Diffie-Hellman (1976) K K p:, b [1, p 1] Given: p: prime, b [1, p 1], s.t. {b i i [0, p 2]} = {1,..., p 1} a {b i i [0, p 2]} Find: x [0, p 2] s.t. a b x mod p Ind b a := x

More information

( 9 1 ) 1 2 1.1................................... 2 1.2................................................. 3 1.3............................................... 4 1.4...........................................

More information

取扱説明書 -詳細版- 液晶プロジェクター CP-AW3019WNJ

取扱説明書 -詳細版- 液晶プロジェクター CP-AW3019WNJ B A C D E F K I M L J H G N O Q P Y CB/PB CR/PR COMPONENT VIDEO OUT RS-232C LAN RS-232C LAN LAN BE EF 03 06 00 2A D3 01 00 00 60 00 00 BE EF 03 06 00 BA D2 01 00 00 60 01 00 BE EF 03 06 00 19 D3 02 00

More information

HITACHI 液晶プロジェクター CP-AX3505J/CP-AW3005J 取扱説明書 -詳細版- 【技術情報編】

HITACHI 液晶プロジェクター CP-AX3505J/CP-AW3005J 取扱説明書 -詳細版- 【技術情報編】 B A C E D 1 3 5 7 9 11 13 15 17 19 2 4 6 8 10 12 14 16 18 H G I F J M N L K Y CB/PB CR/PR COMPONENT VIDEO OUT RS-232C LAN RS-232C LAN LAN BE EF 03 06 00 2A D3 01 00 00 60 00 00 BE EF 03 06 00 BA D2 01

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

index calculus

index calculus index calculus 2008 3 8 1 generalized Weil descent p :, E/F p 3 : Y 2 = f(x), where f(x) = X 3 + AX + B, A F p, B F p 3 E(F p 3) 3 : Generalized Weil descent E(F p 4) 2 Index calculus Plain version Double-large-prime

More information

HITACHI 液晶プロジェクター CP-EX301NJ/CP-EW301NJ 取扱説明書 -詳細版- 【技術情報編】 日本語

HITACHI 液晶プロジェクター CP-EX301NJ/CP-EW301NJ 取扱説明書 -詳細版- 【技術情報編】 日本語 A B C D E F G H I 1 3 5 7 9 11 13 15 17 19 2 4 6 8 10 12 14 16 18 K L J Y CB/PB CR/PR COMPONENT VIDEO OUT RS-232C RS-232C RS-232C Cable (cross) LAN cable (CAT-5 or greater) LAN LAN LAN LAN RS-232C BE

More information

#2 (IISEC)

#2 (IISEC) #2 (IISEC) 2007 10 6 E Y 2 = F (X) E(F p ) E : Y 2 = F (X) = X 3 + AX + B, A, B F p E(F p ) = {(x, y) F 2 p y2 = F (x)} {P } P : E(F p ) E F p - Given: E/F p : EC, P E(F p ), Q P Find: x Z/NZ s.t. Q =

More information

楕円曲線暗号と RSA 暗号の安全性比較

楕円曲線暗号と RSA 暗号の安全性比較 RSA, RSA RSA 7 NIST SP-7 Neal Koblitz Victor Miller ECDLP (Elliptic Curve Discrete Logarithm Problem) RSA Blu-ray AACS (Advanced Access Control System) DTCP (Digital Transmission Content Protection) RSA

More information

30 2018.4.25 30 1 nuida@mist.i.u-tokyo.ac.jp 2018 4 11 2018 4 25 30 2018.4.25 1 1 2 8 3 21 4 28 5 37 6 43 7 47 8 52 30 2018.4.25 1 1 Z Z 0 Z >0 Q, R, C a, b a b a = bc c 0 a b b a b a a, b, c a b b c a

More information

2 HI LO ZDD 2 ZDD 2 HI LO 2 ( ) HI (Zero-suppress ) Zero-suppress ZDD ZDD Zero-suppress 1 ZDD abc a HI b c b Zero-suppress b ZDD ZDD 5) ZDD F 1 F = a

2 HI LO ZDD 2 ZDD 2 HI LO 2 ( ) HI (Zero-suppress ) Zero-suppress ZDD ZDD Zero-suppress 1 ZDD abc a HI b c b Zero-suppress b ZDD ZDD 5) ZDD F 1 F = a ZDD 1, 2 1, 2 1, 2 2 2, 1 #P- Knuth ZDD (Zero-suppressed Binary Decision Diagram) 2 ZDD ZDD ZDD Knuth Knuth ZDD ZDD Path Enumeration Algorithms Using ZDD and Their Performance Evaluations Toshiki Saitoh,

More information

., White-Box, White-Box. White-Box.,, White-Box., Maple [11], 2. 1, QE, QE, 1 Redlog [7], QEPCAD [9], SyNRAC [8] 3 QE., 2 Brown White-Box. 3 White-Box

., White-Box, White-Box. White-Box.,, White-Box., Maple [11], 2. 1, QE, QE, 1 Redlog [7], QEPCAD [9], SyNRAC [8] 3 QE., 2 Brown White-Box. 3 White-Box White-Box Takayuki Kunihiro Graduate School of Pure and Applied Sciences, University of Tsukuba Hidenao Iwane ( ) / Fujitsu Laboratories Ltd. / National Institute of Informatics. Yumi Wada Graduate School

More information

ばらつき抑制のための確率最適制御

ばらつき抑制のための確率最適制御 ( ) http://wwwhayanuemnagoya-uacjp/ fujimoto/ 2011 3 9 11 ( ) 2011/03/09-11 1 / 46 Outline 1 2 3 4 5 ( ) 2011/03/09-11 2 / 46 Outline 1 2 3 4 5 ( ) 2011/03/09-11 3 / 46 (1/2) r + Controller - u Plant y

More information

/ ( ) 1 1.1 323 206 23 ( 23 529 529 323 206 ) 23 1.2 33 1.3 323 61 61 3721 3721 323 168 168 323 23 61 61 23 1403 323 111 111 168 206 323 47 111 323 47 2 23 2 2.1 34 2 2.2 2 a, b N a b N a b (mod N) mod

More information

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

1 IPA Hierocrypt-L1 Hierocrypt-L Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 2 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-

1 IPA Hierocrypt-L1 Hierocrypt-L Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 2 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt- Hierocrypt-L1 : Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Abstract: In this report, we address our security evaluation of Hierocrypt-L1. As a result, we found no critical security flaw during the limited

More information

x, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y)

x, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y) x, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 1 1977 x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y) ( x 2 y + xy 2 x 2 2xy y 2) = 15 (x y) (x + y) (xy

More information

SO(2)

SO(2) TOP URL http://amonphys.web.fc2.com/ 1 12 3 12.1.................................. 3 12.2.......................... 4 12.3............................. 5 12.4 SO(2).................................. 6

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

CPU Levels in the memory hierarchy Level 1 Level 2... Increasing distance from the CPU in access time Level n Size of the memory at each level 1: 2.2

CPU Levels in the memory hierarchy Level 1 Level 2... Increasing distance from the CPU in access time Level n Size of the memory at each level 1: 2.2 FFT 1 Fourier fast Fourier transform FFT FFT FFT 1 FFT FFT 2 Fourier 2.1 Fourier FFT Fourier discrete Fourier transform DFT DFT n 1 y k = j=0 x j ω jk n, 0 k n 1 (1) x j y k ω n = e 2πi/n i = 1 (1) n DFT

More information

II Time-stamp: <05/09/30 17:14:06 waki> ii

II Time-stamp: <05/09/30 17:14:06 waki> ii II waki@cc.hirosaki-u.ac.jp 18 1 30 II Time-stamp: ii 1 1 1.1.................................................. 1 1.2................................................... 3 1.3..................................................

More information

Bulletin of JSSAC(2014) Vol. 20, No. 2, pp (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles ca

Bulletin of JSSAC(2014) Vol. 20, No. 2, pp (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles ca Bulletin of JSSAC(2014) Vol. 20, No. 2, pp. 3-22 (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles can be solved by using Gröbner bases. In this paper,

More information

( [1]) (1) ( ) 1: ( ) 2 2.1,,, X Y f X Y (a mapping, a map) X ( ) x Y f(x) X Y, f X Y f : X Y, X f Y f : X Y X Y f f 1 : X 1 Y 1 f 2 : X 2 Y 2 2 (X 1

( [1]) (1) ( ) 1: ( ) 2 2.1,,, X Y f X Y (a mapping, a map) X ( ) x Y f(x) X Y, f X Y f : X Y, X f Y f : X Y X Y f f 1 : X 1 Y 1 f 2 : X 2 Y 2 2 (X 1 2013 5 11, 2014 11 29 WWW ( ) ( ) (2014/7/6) 1 (a mapping, a map) (function) ( ) ( ) 1.1 ( ) X = {,, }, Y = {, } f( ) =, f( ) =, f( ) = f : X Y 1.1 ( ) (1) ( ) ( 1 ) (2) 1 function 1 ( [1]) (1) ( ) 1:

More information

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2

More information

1 1.1 R (ring) R1 R4 R1 R (commutative [abelian] group) R2 a, b, c R (ab)c = a(bc) (associative law) R3 a, b, c R a(b + c) = ab + ac, (a + b)c = ac +

1 1.1 R (ring) R1 R4 R1 R (commutative [abelian] group) R2 a, b, c R (ab)c = a(bc) (associative law) R3 a, b, c R a(b + c) = ab + ac, (a + b)c = ac + ALGEBRA II Hiroshi SUZUKI Department of Mathematics International Christian University 2004 1 1 1 2 2 1 3 3 1 4 4 1 5 5 1 6 6 1 7 7 1 7.1....................... 7 1 7.2........................... 7 4 8

More information

2797 4 5 6 7 2. 2.1 COM COM 4) 5) COM COM 3 4) 5) 2 2.2 COM COM 6) 7) 10) COM Bonanza 6) Bonanza 6 10 20 Hearts COM 7) 10) 52 4 3 Hearts 3 2,000 4,000

2797 4 5 6 7 2. 2.1 COM COM 4) 5) COM COM 3 4) 5) 2 2.2 COM COM 6) 7) 10) COM Bonanza 6) Bonanza 6 10 20 Hearts COM 7) 10) 52 4 3 Hearts 3 2,000 4,000 Vol. 50 No. 12 2796 2806 (Dec. 2009) 1 1, 2 COM TCG COM TCG COM TCG Strategy-acquisition System for Video Trading Card Game Nobuto Fujii 1 and Haruhiro Katayose 1, 2 Behavior and strategy of computers

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name RSA Group Name RSA Code Elliptic Curve Cryptograrhy Group /Project No. 13-B /Project Leader 1009087 Takahiro

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

1 Abstract 2 3 n a ax 2 + bx + c = 0 (a 0) (1) ( x + b ) 2 = b2 4ac 2a 4a 2 D = b 2 4ac > 0 (1) 2 D = 0 D < 0 x + b 2a = ± b2 4ac 2a b ± b 2

1 Abstract 2 3 n a ax 2 + bx + c = 0 (a 0) (1) ( x + b ) 2 = b2 4ac 2a 4a 2 D = b 2 4ac > 0 (1) 2 D = 0 D < 0 x + b 2a = ± b2 4ac 2a b ± b 2 1 Abstract n 1 1.1 a ax + bx + c = 0 (a 0) (1) ( x + b ) = b 4ac a 4a D = b 4ac > 0 (1) D = 0 D < 0 x + b a = ± b 4ac a b ± b 4ac a b a b ± 4ac b i a D (1) ax + bx + c D 0 () () (015 8 1 ) 1. D = b 4ac

More information

13 0 1 1 4 11 4 12 5 13 6 2 10 21 10 22 14 3 20 31 20 32 25 33 28 4 31 41 32 42 34 43 38 5 41 51 41 52 43 53 54 6 57 61 57 62 60 70 0 Gauss a, b, c x, y f(x, y) = ax 2 + bxy + cy 2 = x y a b/2 b/2 c x

More information

ALGEBRA I Hiroshi SUZUKI Department of Mathematics International Christian University

ALGEBRA I Hiroshi SUZUKI Department of Mathematics International Christian University ALGEBRA I Hiroshi SUZUKI Department of Mathematics International Christian University 2004 1 1 1 2 2 1 3 3 1 4 4 1 5 5 1 6 6 1 7 7 1 8 8 1 9 9 1 10 10 1 E-mail:hsuzuki@icu.ac.jp 0 0 1 1.1 G G1 G a, b,

More information

h1-4_cs5.5.indd

h1-4_cs5.5.indd SIMATIC HMI SIMATIC HMI SIMATIC HMI Comfort Panel All-in-One SIMATIC Comfort Panel all-in-one 4 22 1677 0 100% IP65 CEULKCRCMATEX HMI VB HMI ATEX 4 12 SIMATIC HMI Basic Panel 2 nd Generation SIMATIC Basic

More information

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:

More information

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP

More information

Block cipher

Block cipher 18 12 9 1 2 1.1............................... 2 1.2.................. 2 1.3................................. 4 1.4 Block cipher............................. 4 1.5 Stream cipher............................

More information

日立液晶プロジェクター CP-AW2519NJ 取扱説明書- 詳細版-

日立液晶プロジェクター CP-AW2519NJ 取扱説明書- 詳細版- PAGE UP DOWN D- ESC ENTER 1 1 2 2 3 COMPUTER IN1 USB TYPE A DC5V 0.5A USB TYPE B HDMI COMPUTER IN2 LAN CONTROL MONITOR OUT MIC AUDIO IN1 AUDIO IN3 AUDIO OUT R R L L S-VIDEO AUDIO IN2 VIDEO PAGE UP DOWN

More information

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α,

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α, [II] Optimization Computation for 3-D Understanding of Images [II]: Ellipse Fitting 1. (1) 2. (2) (edge detection) (edge) (zero-crossing) Canny (Canny operator) (3) 1(a) [I] [II] [III] [IV ] E-mail sugaya@iim.ics.tut.ac.jp

More information

1 2 1.1............................................ 3 1.2.................................... 7 1.3........................................... 9 1.4..

1 2 1.1............................................ 3 1.2.................................... 7 1.3........................................... 9 1.4.. 2010 8 3 ( ) 1 2 1.1............................................ 3 1.2.................................... 7 1.3........................................... 9 1.4........................................

More information

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing 1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November

More information

a n a n ( ) (1) a m a n = a m+n (2) (a m ) n = a mn (3) (ab) n = a n b n (4) a m a n = a m n ( m > n ) m n 4 ( ) 552

a n a n ( ) (1) a m a n = a m+n (2) (a m ) n = a mn (3) (ab) n = a n b n (4) a m a n = a m n ( m > n ) m n 4 ( ) 552 3 3.0 a n a n ( ) () a m a n = a m+n () (a m ) n = a mn (3) (ab) n = a n b n (4) a m a n = a m n ( m > n ) m n 4 ( ) 55 3. (n ) a n n a n a n 3 4 = 8 8 3 ( 3) 4 = 8 3 8 ( ) ( ) 3 = 8 8 ( ) 3 n n 4 n n

More information

SAMA- SUKU-RU Contents p-adic families of Eisenstein series (modular form) Hecke Eisenstein Eisenstein p T

SAMA- SUKU-RU Contents p-adic families of Eisenstein series (modular form) Hecke Eisenstein Eisenstein p T SAMA- SUKU-RU Contents 1. 1 2. 7.1. p-adic families of Eisenstein series 3 2.1. modular form Hecke 3 2.2. Eisenstein 5 2.3. Eisenstein p 7 3. 7.2. The projection to the ordinary part 9 3.1. The ordinary

More information

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came 3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is

More information

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat 1 1 2 1. TF-IDF TDF-IDF TDF-IDF. 3 18 6 Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Satoshi Date, 1 Teruaki Kitasuka, 1 Tsuyoshi Itokawa 2

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

9_18.dvi

9_18.dvi Vol. 49 No. 9 3180 3190 (Sep. 2008) 1, 2 3 1 1 1, 2 4 5 6 1 MRC 1 23 MRC Development and Applications of Multiple Risk Communicator Ryoichi Sasaki, 1, 2 Yuu Hidaka, 3 Takashi Moriya, 1 Katsuhiro Taniyama,

More information

Solutions to Quiz 1 (April 20, 2007) 1. P, Q, R (P Q) R Q (P R) P Q R (P Q) R Q (P R) X T T T T T T T T T T F T F F F T T F T F T T T T T F F F T T F

Solutions to Quiz 1 (April 20, 2007) 1. P, Q, R (P Q) R Q (P R) P Q R (P Q) R Q (P R) X T T T T T T T T T T F T F F F T T F T F T T T T T F F F T T F Quiz 1 Due at 10:00 a.m. on April 20, 2007 Division: ID#: Name: 1. P, Q, R (P Q) R Q (P R) P Q R (P Q) R Q (P R) X T T T T T T F T T F T T T F F T F T T T F T F T F F T T F F F T 2. 1.1 (1) (7) p.44 (1)-(4)

More information

, IT.,.,..,.. i

, IT.,.,..,.. i 25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge

More information

1 1 n 0, 1, 2,, n n 2 a, b a n b n a, b n a b (mod n) 1 1. n = (mod 10) 2. n = (mod 9) n II Z n := {0, 1, 2,, n 1} 1.

1 1 n 0, 1, 2,, n n 2 a, b a n b n a, b n a b (mod n) 1 1. n = (mod 10) 2. n = (mod 9) n II Z n := {0, 1, 2,, n 1} 1. 1 1 n 0, 1, 2,, n 1 1.1 n 2 a, b a n b n a, b n a b (mod n) 1 1. n = 10 1567 237 (mod 10) 2. n = 9 1567 1826578 (mod 9) n II Z n := {0, 1, 2,, n 1} 1.2 a b a = bq + r (0 r < b) q, r q a b r 2 1. a = 456,

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087

More information

2 (March 13, 2010) N Λ a = i,j=1 x i ( d (a) i,j x j ), Λ h = N i,j=1 x i ( d (h) i,j x j ) B a B h B a = N i,j=1 ν i d (a) i,j, B h = x j N i,j=1 ν i

2 (March 13, 2010) N Λ a = i,j=1 x i ( d (a) i,j x j ), Λ h = N i,j=1 x i ( d (h) i,j x j ) B a B h B a = N i,j=1 ν i d (a) i,j, B h = x j N i,j=1 ν i 1. A. M. Turing [18] 60 Turing A. Gierer H. Meinhardt [1] : (GM) ) a t = D a a xx µa + ρ (c a2 h + ρ 0 (0 < x < l, t > 0) h t = D h h xx νh + c ρ a 2 (0 < x < l, t > 0) a x = h x = 0 (x = 0, l) a = a(x,

More information

1/68 A. 電気所 ( 発電所, 変電所, 配電塔 ) における変圧器の空き容量一覧 平成 31 年 3 月 6 日現在 < 留意事項 > (1) 空容量は目安であり 系統接続の前には 接続検討のお申込みによる詳細検討が必要となります その結果 空容量が変更となる場合があります (2) 特に記載

1/68 A. 電気所 ( 発電所, 変電所, 配電塔 ) における変圧器の空き容量一覧 平成 31 年 3 月 6 日現在 < 留意事項 > (1) 空容量は目安であり 系統接続の前には 接続検討のお申込みによる詳細検討が必要となります その結果 空容量が変更となる場合があります (2) 特に記載 1/68 A. 電気所 ( 発電所, 変電所, 配電塔 ) における変圧器の空き容量一覧 平成 31 年 3 月 6 日現在 < 留意事項 > (1) 空容量は目安であり 系統接続の前には 接続検討のお申込みによる詳細検討が必要となります その結果 空容量が変更となる場合があります (2) 特に記載のない限り 熱容量を考慮した空き容量を記載しております その他の要因 ( 電圧や系統安定度など ) で連系制約が発生する場合があります

More information

a m 1 mod p a km 1 mod p k<s 1.6. n > 1 n 1= s m, (m, = 1 a n n a m 1 mod n a km 1 mod n k<sn a 1.7. n > 1 n 1= s m, (m, = 1 r n ν = min ord (p 1 (1 B

a m 1 mod p a km 1 mod p k<s 1.6. n > 1 n 1= s m, (m, = 1 a n n a m 1 mod n a km 1 mod n k<sn a 1.7. n > 1 n 1= s m, (m, = 1 r n ν = min ord (p 1 (1 B 10 004 Journal of the Institute of Science and Engineering. Chuo University Euler n > 1 p n p ord p n n n 1= s m (m B psp = {a (Z/nZ ; a n 1 =1}, B epsp = { ( a (Z/nZ ; a n 1 a }, = n B spsp = { a (Z/nZ

More information

(1) (2) (3) (4) 1

(1) (2) (3) (4) 1 8 3 4 3.................................... 3........................ 6.3 B [, ].......................... 8.4........................... 9........................................... 9.................................

More information

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke

More information

NP 1 ( ) Ehrgott [3] ( ) (Ehrgott [3] ) Ulungu & Teghem [8] Zitzler, Laumanns & Bleuler [11] Papadimitriou & Yannakakis [7] Zaroliagis [10] 2 1

NP 1 ( ) Ehrgott [3] ( ) (Ehrgott [3] ) Ulungu & Teghem [8] Zitzler, Laumanns & Bleuler [11] Papadimitriou & Yannakakis [7] Zaroliagis [10] 2 1 NP 1 ( ) Ehrgott [3] 2 1 1 ( ) (Ehrgott [3] ) Ulungu & Teghem [8] Zitzler, Laumanns & Bleuler [11] Papadimitriou & Yannakakis [7] Zaroliagis [10] 2 1 1 1 Avis & Fukuda [1] 2 NP (Ehrgott [3] ) ( ) 3 NP

More information

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 : Transactions of the Operations Research Society of Japan Vol. 58, 215, pp. 148 165 c ( 215 1 2 ; 215 9 3 ) 1) 2) :,,,,, 1. [9] 3 12 Darroch,Newell, and Morris [1] Mcneil [3] Miller [4] Newell [5, 6], [1]

More information

23_02.dvi

23_02.dvi Vol. 2 No. 2 10 21 (Mar. 2009) 1 1 1 Effect of Overconfidencial Investor to Stock Market Behaviour Ryota Inaishi, 1 Fei Zhai 1 and Eisuke Kita 1 Recently, the behavioral finance theory has been interested

More information

1_26.dvi

1_26.dvi C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito

More information

r 1 m A r/m i) t ii) m i) t B(t; m) ( B(t; m) = A 1 + r ) mt m ii) B(t; m) ( B(t; m) = A 1 + r ) mt m { ( = A 1 + r ) m } rt r m n = m r m n B

r 1 m A r/m i) t ii) m i) t B(t; m) ( B(t; m) = A 1 + r ) mt m ii) B(t; m) ( B(t; m) = A 1 + r ) mt m { ( = A 1 + r ) m } rt r m n = m r m n B 1 1.1 1 r 1 m A r/m i) t ii) m i) t Bt; m) Bt; m) = A 1 + r ) mt m ii) Bt; m) Bt; m) = A 1 + r ) mt m { = A 1 + r ) m } rt r m n = m r m n Bt; m) Aert e lim 1 + 1 n 1.1) n!1 n) e a 1, a 2, a 3,... {a n

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

IPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter

IPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter ,a),2,3 3,4 CG 2 2 2 An Interpolation Method of Different Flow Fields using Polar Interpolation Syuhei Sato,a) Yoshinori Dobashi,2,3 Tsuyoshi Yamamoto Tomoyuki Nishita 3,4 Abstract: Recently, realistic

More information

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L 1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP

More information

1. 2 P 2 (x, y) 2 x y (0, 0) R 2 = {(x, y) x, y R} x, y R P = (x, y) O = (0, 0) OP ( ) OP x x, y y ( ) x v = y ( ) x 2 1 v = P = (x, y) y ( x y ) 2 (x

1. 2 P 2 (x, y) 2 x y (0, 0) R 2 = {(x, y) x, y R} x, y R P = (x, y) O = (0, 0) OP ( ) OP x x, y y ( ) x v = y ( ) x 2 1 v = P = (x, y) y ( x y ) 2 (x . P (, (0, 0 R {(,, R}, R P (, O (0, 0 OP OP, v v P (, ( (, (, { R, R} v (, (, (,, z 3 w z R 3,, z R z n R n.,..., n R n n w, t w ( z z Ke Words:. A P 3 0 B P 0 a. A P b B P 3. A π/90 B a + b c π/ 3. +

More information

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h 23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),

More information

I A A441 : April 21, 2014 Version : Kawahira, Tomoki TA (Kondo, Hirotaka ) Google

I A A441 : April 21, 2014 Version : Kawahira, Tomoki TA (Kondo, Hirotaka ) Google I4 - : April, 4 Version :. Kwhir, Tomoki TA (Kondo, Hirotk) Google http://www.mth.ngoy-u.c.jp/~kwhir/courses/4s-biseki.html pdf 4 4 4 4 8 e 5 5 9 etc. 5 6 6 6 9 n etc. 6 6 6 3 6 3 7 7 etc 7 4 7 7 8 5 59

More information

橡固有値セミナー2_棚橋改.PDF

橡固有値セミナー2_棚橋改.PDF 1 II. 2003 5 14 2... Arnoldi. Lanczos. Jacobi-Davidson . 3 4 Ax = x A A Ax = Mx M: M 5 Householder ln ln-1 0 l3 0 l2 l1 6 Lanczos Lanczos, 1950 Arnoldi Arnoldi, 1951 Hessenberg Jacobi-Davidson Sleijpen

More information

三石貴志.indd

三石貴志.indd 流通科学大学論集 - 経済 情報 政策編 - 第 21 巻第 1 号,23-33(2012) SIRMs SIRMs Fuzzy fuzzyapproximate approximatereasoning reasoningusing using Lukasiewicz Łukasiewicz logical Logical operations Operations Takashi Mitsuishi

More information

Gauss Gauss ɛ 0 E ds = Q (1) xy σ (x, y, z) (2) a ρ(x, y, z) = x 2 + y 2 (r, θ, φ) (1) xy A Gauss ɛ 0 E ds = ɛ 0 EA Q = ρa ɛ 0 EA = ρea E = (ρ/ɛ 0 )e

Gauss Gauss ɛ 0 E ds = Q (1) xy σ (x, y, z) (2) a ρ(x, y, z) = x 2 + y 2 (r, θ, φ) (1) xy A Gauss ɛ 0 E ds = ɛ 0 EA Q = ρa ɛ 0 EA = ρea E = (ρ/ɛ 0 )e 7 -a 7 -a February 4, 2007 1. 2. 3. 4. 1. 2. 3. 1 Gauss Gauss ɛ 0 E ds = Q (1) xy σ (x, y, z) (2) a ρ(x, y, z) = x 2 + y 2 (r, θ, φ) (1) xy A Gauss ɛ 0 E ds = ɛ 0 EA Q = ρa ɛ 0 EA = ρea E = (ρ/ɛ 0 )e z

More information

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara 1 1,2 1 (: Head Mounted Display),,,, An Information Presentation Method for Wearable Displays Considering Surrounding Conditions in Wearable Computing Environments Masayuki Nakao 1 Tsutomu Terada 1,2 Masahiko

More information

¥µ¥¤¥Ü¥¦¥º¡¦¥é¥Ü¥æ¡¼¥¹ À®²ÌÊó¹ð

¥µ¥¤¥Ü¥¦¥º¡¦¥é¥Ü¥æ¡¼¥¹ À®²ÌÊó¹ð Python March 30, 2016 1 / 30 who? @elliptic shiho 0x10, CTF March 30, 2016 2 / 30 why? Python sage 1,, 1 NumPy, Cython Python March 30, 2016 3 / 30 why?,. -, -,, March 30, 2016 4 / 30 , E : y 2 = x 3 +

More information

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append

More information

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server a) Change Detection Using Joint Intensity Histogram Yasuyo KITA a) 2 (0 255) (I 1 (x),i 2 (x)) I 2 = CI 1 (C>0) (I 1,I 2 ) (I 1,I 2 ) 2 1. [1] 2 [2] [3] [5] [6] [8] Intelligent Systems Research Institute,

More information

newmain.dvi

newmain.dvi 数論 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. http://www.morikita.co.jp/books/mid/008142 このサンプルページの内容は, 第 2 版 1 刷発行当時のものです. Daniel DUVERNEY: THÉORIE DES NOMBRES c Dunod, Paris, 1998, This book is published

More information

COE-RES Discussion Paper Series Center of Excellence Project The Normative Evaluation and Social Choice of Contemporary Economic Systems Graduate Scho

COE-RES Discussion Paper Series Center of Excellence Project The Normative Evaluation and Social Choice of Contemporary Economic Systems Graduate Scho COE-RES Discussion Paper Series Center of Excellence Project The Normative Evaluation and Social Choice of Contemporary Economic Systems Graduate School of Economics and Institute of Economic Research

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

18 5 10 1 1 1.1 1.1.1 P Q P Q, P, Q P Q P Q P Q, P, Q 2 1 1.1.2 P.Q T F Z R 0 1 x, y x + y x y x y = y x x (y z) = (x y) z x + y = y + x x + (y + z) = (x + y) + z P.Q V = {T, F } V P.Q P.Q T F T F 1.1.3

More information

Twist knot orbifold Chern-Simons

Twist knot orbifold Chern-Simons Twist knot orbifold Chern-Simons 1 3 M π F : F (M) M ω = {ω ij }, Ω = {Ω ij }, cs := 1 4π 2 (ω 12 ω 13 ω 23 + ω 12 Ω 12 + ω 13 Ω 13 + ω 23 Ω 23 ) M Chern-Simons., S. Chern J. Simons, F (M) Pontrjagin 2.,

More information

2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal

2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal 1 2 3 A projection-based method for interactive 3D visualization of complex graphs Masanori Takami, 1 Hiroshi Hosobe 2 and Ken Wakita 3 Proposed is a new interaction technique to manipulate graph layouts

More information

2 22006 2 e-learning e e 2003 1 4 e e e-learning 2 Web e-leaning 2004 2005 2006 e 4 GP 4 e-learning e-learning e-learning e LMS LMS Internet Navigware

2 22006 2 e-learning e e 2003 1 4 e e e-learning 2 Web e-leaning 2004 2005 2006 e 4 GP 4 e-learning e-learning e-learning e LMS LMS Internet Navigware 2 2 Journal of Multimedia Aided Education Research 2006, Vol. 2, No. 2, 19 e 1 1 2 2 1 1 GP e 2004 e-learning 2004 e-learning 2005 e-learning e-learning e-learning e-learning 2004 e-learning HuWeb 2005

More information

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055 1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free

More information

000 001

000 001 all-round catalogue vol.2 000 001 002 003 AA0102 AA0201 AA0701 AA0801 artistic brushes AA0602 AB2701 AB2702 AB2703 AB2704 AA0301 AH3001 AH3011 AH3101 AH3201 AH3111 AB3201 AB3202 AB2601 AB2602 AB0701 artistic

More information

Real AdaBoost HOG 2009 3 A Graduation Thesis of College of Engineering, Chubu University Efficient Reducing Method of HOG Features for Human Detection based on Real AdaBoost Chika Matsushima ITS Graphics

More information

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System 1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of

More information

BD = a, EA = b, BH = a, BF = b 3 EF B, EOA, BOD EF B EOA BF : AO = BE : AE, b : = BE : b, AF = BF = b BE = bb. () EF = b AF = b b. (2) EF B BOD EF : B

BD = a, EA = b, BH = a, BF = b 3 EF B, EOA, BOD EF B EOA BF : AO = BE : AE, b : = BE : b, AF = BF = b BE = bb. () EF = b AF = b b. (2) EF B BOD EF : B 2000 8 3.4 p q θ = 80 B E a H F b θ/2 O θ/2 D A B E BD = a, EA = b, BH = a, BF = b 3 EF B, EOA, BOD EF B EOA BF : AO = BE : AE, b : = BE : b, AF = BF = b BE = bb. () EF = b AF = b b. (2) EF B BOD EF :

More information

1 n 1 1 2 2 3 3 3.1............................ 3 3.2............................. 6 3.2.1.............. 6 3.2.2................. 7 3.2.3........................... 10 4 11 4.1..........................

More information

四変数基本対称式の解放

四変数基本対称式の解放 Solving the simultaneous equation of the symmetric tetravariate polynomials and The roots of a quartic equation Oomori, Yasuhiro in Himeji City, Japan Dec.1, 2011 Abstract 1. S 4 2. 1. {α, β, γ, δ} (1)

More information

Optical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t)

Optical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t) http://wwwieice-hbkborg/ 2 2 4 2 -- 2 4 2010 9 3 3 4-1 Lucas-Kanade 4-2 Mean Shift 3 4-3 2 c 2013 1/(18) http://wwwieice-hbkborg/ 2 2 4 2 -- 2 -- 4 4--1 2010 9 4--1--1 Optical Flow t t + δt 1 Motion Field

More information

IPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing

IPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing number of HOG Features based on Real AdaBoost Chika Matsushima, 1 Yuji Yamauchi, 1 Takayoshi Yamashita 1, 2 and

More information

(a) Picking up of six components (b) Picking up of three simultaneously. components simultaneously. Fig. 2 An example of the simultaneous pickup. 6 /

(a) Picking up of six components (b) Picking up of three simultaneously. components simultaneously. Fig. 2 An example of the simultaneous pickup. 6 / *1 *1 *1 *2 *2 Optimization of Printed Circuit Board Assembly Prioritizing Simultaneous Pickup in a Placement Machine Toru TSUCHIYA *3, Atsushi YAMASHITA, Toru KANEKO, Yasuhiro KANEKO and Hirokatsu MURAMATSU

More information

S K(S) = T K(T ) T S K n (1.1) n {}}{ n K n (1.1) 0 K 0 0 K Q p K Z/pZ L K (1) L K L K (2) K L L K [L : K] 1.1.

S K(S) = T K(T ) T S K n (1.1) n {}}{ n K n (1.1) 0 K 0 0 K Q p K Z/pZ L K (1) L K L K (2) K L L K [L : K] 1.1. () 1.1.. 1. 1.1. (1) L K (i) 0 K 1 K (ii) x, y K x + y K, x y K (iii) x, y K xy K (iv) x K \ {0} x 1 K K L L K ( 0 L 1 L ) L K L/K (2) K M L M K L 1.1. C C 1.2. R K = {a + b 3 i a, b Q} Q( 2, 3) = Q( 2

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 1, 2 1 1 1 Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 Nobutaka ONO 1 and Shigeki SAGAYAMA 1 This paper deals with instrument separation

More information

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting

More information