ソフトウェアエンジニアリングシンポジウム 2013 Smith-Waterman 1,a) 1,b) 1,c) 1,d) 1,e) LCS Smith-Waterman Bellon Gapped Code Clone Detection Using The Smith-Waterman Algor
|
|
- ひでより ねごろ
- 4 years ago
- Views:
Transcription
1 Smith-Waterman,a),b),c),d),e) LCS Smith-Waterman Bellon Gapped Code Clone Detection Using The Smith-Waterman Algorithm Hiroaki MURAKAMI,a) Keisuke HOTTA,b) Yoshiki HIGO,c) Hiroshi IGAKI,d) Shinji KUSUMOTO,e) Abstract: A variety of techniques detecting code clones has been proposed before now. In order to detect gapped code clones, AST(Abstract Syntax Tree)-based technique, PDG(Program Dependence Graph)-based technique, metric-based technique and finger print technique using the LCS algorithm have been proposed. However, each of those techniques has limitations such as detection time is long or detection accuracy is not sufficient. This paper proposes a new method that detects gapped code clones using the Smith-Waterman algorithm in order to resolve those limitations. The authors developed the proposed method as a software tool, and confirmed that the proposed method could resolve the limitations by conducting a quantitative evaluation with Bellon s benchmark. Keywords: Code Clone, Program Analysis, String Algorithm. [] Graduate School of Information Science and Technology, Osaka University a) h-murakm@ist.osaka-u.ac.jp b) k-hotta@ist.osaka-u.ac.jp c) higo@ist.osaka-u.ac.jp d) igaki@ist.osaka-u.ac.jp e) kusumoto@ist.osaka-u.ac.jp [2] [3] 23 Information Processing Society of Japan
2 * *2 LCS AST PDG LCS AST PDG AST PDG AST PDG LCS Smith- Waterman [4] Smith-Waterman 2 AST PDG AST PDG LCS LCS Bellon [5] Bellon Bellon Bellon * Abstract Syntax Tree AST *2 Program Dependence Graph PDG Smith-Waterman F 2. Smith-Waterman Smith-Waterman [4] 2 Smith-Waterman TCGATAGCT ACGTACGCA 2 Smith- Waterman Smith-Waterman. : 2 a, a 2,, a N b, b 2,, b M (N + 2) (M + 2) 2. : A 2 3. : v i,j + s(a i, b j ), v i,j + gap, v i,j (2 i, 2 j) = max () v i,j + gap,. { match (ai = b j ), s(a i, b j ) = (2) mismatch (a i b j ). c i,j i j v i,j c i,j a i a, a 2,, a N i b j b, b 2,, b M j s(a i, b j ) a i b j match mismatch gap match mismatch gap (match, mismatch, gap) (, -, -) v i,j c i,j (4) v 7,6 (= 3) v 6,5 (= 2) s(v,6, v 7, )(= ) c 6,5 c 7,6 4. : C 23 Information Processing Society of Japan 2
3 T C G A T A G C T T C G A T A G C T 塩基配列 : T C G A T A G C T A C A C 4 G 2 4 G 2 塩基配列 2: A C G T A C G C A T 2 A C T 2 A C G G C C A 3 3 A 3 3 () (2) (3) T C G A T A G C T T C G A T A G C T A C A C 塩基配列 : T C G A T A G C T G 2 T 2 A C G 2 T 2 A C 類似部分配列塩基配列 2: A C G T A C G C A 8 G G C C A 3 3 A 3 3 (4) (5) Smith-Waterman Fig. An Example of the Smith-Waterman Algorithm. (6) 5. : CGATAGC CGTACGC CGATAGC CGTACGC 3. match mismatch gap match mismatch gap 5 : 2: 3: 4: 5: 2 : 2: ; { } 2 3: Smith-Waterman Information Processing Society of Japan 3
4 : if(isname){ 3: for(int i = ; i < token.length; i++){ 32: buf.append(token[i]);} 33: String result = buf.tostring(); 34: }else{ 35: for(int j = ; j < token.length; j++){ 36: buf.append(token[j]); 37: if(j % 2 == ){buf.append(",");}} 38: String result = buf.tostring(); 39: } 4: return result; 52: StringBuffer buf = new StringBuffer(); 53: for(int i = ; i < token.length; i++){ 54: buf.append(token[i]);} 55: buf.append(getcomma()); 56: String result = buf.tostring(); 57: System.out.println(result); if ( $ ) { for ( $ $ = $ ; $ < $. $ ; $ + + ) { $. $ ( $ [ $ ] ) ; } $ $ = $. $ ( ) ; } else { for ( $ $ = $ ; $ < $. $ ; $ + + ) { $. $ ( $ [ $ ] ) ; } if ( $ % $ = = $ ) { $. $ ( $ ) ; } } $ $ = $. $ ( ) ; } return $ ; $ $ = new $ ( ) ; for ( $ $ = $ ; $ < $. $ ; $ + + ) { $. $ ( $ [ $ ] ) ; } $. $ ( $() ) ; $ $ = $. $ ( ) ; $. $. $ ( $ ) ; if($) { for($$=$ ; $<$.$ ; $++) { $.$($[$]) ; } $$=$.$() ; } else { for($$=$ ; $<$.$ ; $++) { $.$($[$]) ; } if($%$==$) { $.$($) ; } } $$=$.$() ; } return$ ; $$=new$() ; for($$=$ ; $<$.$ ; $++) { $.$($[$]) ; } $.$($()) ; $$=$.$() ; $.$.$($) ; () (2) (3) (4) { (6) ; 2(5) ; 3(4) { 4(9) ; } 5(8) ; } 6() { (6) ; 2(5) ; 3(4) { 4(9) ; } 6(9) { 7(6) ; } } 5(8) ; } 8(2) ; 9(7) ; (6) ; 2(5) ; 3(4) { 4(9) ; } 95(8) ; 5(8) ; (8) ; (4) ハッシュ値列 字句数列 ハッシュ値列 字句数列 (5) (6) ハッシュ値列 類似部分ハッシュ値列ハッシュ値列 if ( j % 2 = = ) buf. append (, ) ギャップとなる字句 buf. append ( getcomma ()) : if(isname){ 3: for(int i = ; i < token.length; i++){ 32: buf.append(token[i]);} 33: String result = buf.tostring(); 34: }else{ 35: for(int j = ; j < token.length; j++){ 36: buf.append(token[j]); 37: if(j % 2 == ){buf.append(",");}} 38: String result = buf.tostring(); 39: } 4: return result; 52: StringBuffer buf = new StringBuffer(); 53: for(int i = ; i < token.length; i++){ 54: buf.append(token[i]);} 55: buf.append(getcomma()); 56: String result = buf.tostring(); 57: System.out.println(result); コードクローン コードクローンのペア関係 ギャップとなるトークン (7) (8) (9) 2 Fig. 2 An Example of Detection Process Using the Proposed Method. 2 2 v i,j >. v i, = v,j. c i,j c k,l (k i, l j) S S = {c m,n k m i l n j}. (3) 23 Information Processing Society of Japan 4
5 Algorithm Input: (N + 2) (M + 2) Output: for i = N + 2 to do for j = M + 2 to do if v i,j > and v i, = v,j and (c i,j ) then c i,j end if end for end for Algorithm : 3 LCS *3 LCS 5: CDSW Smith-Waterman 3 (match, mismatch, gap) A B : F 2: 3: *3 Longest Common Subsequence 2 A B Smith- Waterman A B Bellon [6] 8 Bellon *4 8 CPU 2.27GHz Intel Xeon CPU 6.GB 4.3 : : Bellon ok [5] ok Definition 4. (ok ). f f 2 lines(f) f A A contain(f, f 2 ) = lines(f ) lines(f 2 ). (4) lines(f ) p p 2 ok p.f p p.f 2 Table Target Software Systems. netbeans Java 4,36 weltab C,46 ant Java 34,744 cook C 7,8 jdtcore Java 47,634 snns C 93,867 swing Java 24,37 postgresql C 2,686 *4 ( ) 23 Information Processing Society of Japan 5
6 73: final public void dstore_2() { 74: countlabels = ; 75: stackdepth -= 2; 76: if (maxlocals < 4) { 77: maxlocals = 4; } 78: try { 79: position++; 7: bcodestream[classfileoffset++] = OPC_dstore_2; 7: } catch (IndexOutOfBoundsException e) { 72: resizebytearray(opc_dstore_2); } } ギャップ行 86: final public void fcmpl() { 862: countlabels = ; 863: stackdepth--; 864: try { 865: position++; 866: bcodestream[classfileoffset++] = OPC_fcmpl; 867: } catch (IndexOutOfBoundsException e) { 868: resizebytearray(opc_fcmpl); } } クローンタイプ ギャップ行の集合 2 終了行 終了行 2 ギャップ行の集合 ファイル名 開始行 ファイル名 2 開始行 2 eclipse-jdtcore/src/internal/compiler/codegen/codestream.java eclipse-jdtcore/src/internal/compiler/codegen/codestream.java , 76, No. 577 Fig. 3 An Example of the Clone Reference the Authors Remade (Reference No. 577). ok(p, p 2 ) = min( max( contain(p.f, p 2.f ), contain(p 2.f, p.f )), max( contain(p.f 2, p 2.f 2 ), contain(p 2.f 2, p.f 2 ))). (5) Bellon ok.7 S cand S refs S cand S refs S Recall P recision F F -measure Recall = S S refs. (6) P recision = S S cand. (7) 2 Recall P recision F -measure = Recall + P recision. (8) 5. Smith-Waterman 3 (match, mismatch, gap) (9) () () Z match = {x Z x 4}. (9) mismatch = {y Z 4 y }. () gap = {z Z 4 z }. () : 2: 64 (= 4 4 4) CDSW F F (match, mismatch, gap) (match, mismatch, gap) (2, -2, -) F A B (match, mismatch, gap) (2, -2, -) 6. A A Bellon Bellon Web * F Bellon F 4 F F 3.8%.43% *5 references_with_gaps/ 23 Information Processing Society of Japan 6
7 Bellon's らの正解クローン clone references Our 著者らの正解クローン clone references netbeans ant jdtcore swing weltab cook snns postgresql 4 F Fig. 4 F -measure of CDSW Using Both the Clone References. F 7. B CloneDR CLAN CCFinder Dup Duploc Duplix NiCad DECKARD CDSW 5 Fig. 5 F F -measure of All the Clone Detectors. B CDSW CDSW 2 NiCad DECKARD Bellon NiCad 3 CDSW CDSW F 5 F 5 CDSW F CDSW ok ok 2 Table 2 Clone Detectors Used for Comparison. Baxter CloneDR Merlo CLAN Kamiya CCFinder Baker Dup Rieger Duploc Krinke Duplix Roy NiCad LCS Jiang DECKARD 6 DECKARD CDSW Fig. 6 Exection Time of DECKARD and CDSW..7 CDSW DECKARD 6 6 CDSW 3 DECKARD CDSW F CDSW 3 CDSW Bellon CDSW Bellon NiCad 23 Information Processing Society of Japan 7
8 Bellon Bellon NiCad Smith-Waterman LCS Smith-Waterman LCS Smith-Waterman mismatch gap LCS Smith-Waterman Smith-Waterman 2 2 a, a 2,, a n b, b 2,, b m Smith-Waterman O(mn) O(mn) LCS 9.2 Smith-Waterman [7] 2 2 Smith-Waterman [8]. Smith-Waterman CSDW 8 Smith-Waterman 3 (match, mismatch, gap) Bellon CSDW CSDW F 7 CDSW (S)( 25223) ( 2465) (A)( 24682) SEC: Software Reliability Enhancement Center 22 [] D Vol. 9-D, No. 6, pp (28). [2] Clone Detection Literature:. tairasr/clones/literature/. [3] Kim, M., Bergman, L., Lau, T. and Notkin, D.: An Ethnographic Study of Copy and Paste Programming Practices in OOPL, Proc. of the 24 International Symposium on Empirical Software Engineering, pp (24). [4] Smith, T. F. and Waterman, M. S.: Identification of common molecular subsequences, Journal of Molecular Biology, Vol. 47, No., pp (98). [5] Bellon, S., Koschke, R., Antniol, G., Krinke, J. and Merlo, E.: Comparison and evaluation of clone detection tools, IEEE Trans. on Software Engineering, Vol. 3, No., pp (27). [6] Detection of Software Clones:. bauhaus-stuttgart.de/clones/. [7] Smith-Waterman Vol. 2, No. 39, pp. 6 (22). [8] D Vol. 93-D, No. 9, pp (2). 23 Information Processing Society of Japan 8
1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More information1_26.dvi
C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito
More information258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System
Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.
More information1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf
1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi
More informationInput image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L
1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives
More informationFig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S
1 1 1 Fig. 1 1 Example of a sequential pattern that is exracted from a set of method definitions. A Defect Detection Method for Object-Oriented Programs using Sequential Pattern Mining Goro YAMADA, 1 Norihiro
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More information1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More informationEQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju
EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More informationIPSJ SIG Technical Report Vol.2009-BIO-17 No /5/26 DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing
DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing Youhei Namiki 1 and Yutaka Akiyama 1 Pyrosequencing, one of the DNA sequencing technologies, allows us to determine
More information第62巻 第1号 平成24年4月/石こうを用いた木材ペレット
Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting
More information2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC
H.264 CABAC 1 1 1 1 1 2, CABAC(Context-based Adaptive Binary Arithmetic Coding) H.264, CABAC, A Parallelization Technology of H.264 CABAC For Real Time Encoder of Moving Picture YUSUKE YATABE 1 HIRONORI
More information2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN
PenFlowchart 1,a) 2,b) 3,c) 2015 3 4 2015 5 12, 2015 9 5 PEN & PenFlowchart PEN Evaluation of the Effectiveness of Programming Education with Flowcharts Using PenFlowchart Wataru Nakanishi 1,a) Takeo Tatsumi
More informationThe 15th Game Programming Workshop 2010 Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard Magic Bitboard Magic Bitbo
Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard 64 81 Magic Bitboard Magic Bitboard Bonanza Proposal and Implementation of Magic Bitboards in Shogi Issei Yamamoto, Shogo Takeuchi,
More informationID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR
Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append
More information1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [
Vol.2, No.x, April 2015, pp.xx-xx ISSN xxxx-xxxx 2015 4 30 2015 5 25 253-8550 1100 Tel 0467-53-2111( ) Fax 0467-54-3734 http://www.bunkyo.ac.jp/faculty/business/ 1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The
More informationIPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came
3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is
More informationFig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).
Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation
More information[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing
1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November
More informationVol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe
Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2
More informationVol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information
Vol.54 No.7 1937 1950 (July 2013) 1,a) 2012 11 1, 2013 4 5 1 Similar Sounds Sentences Generator Based on Morphological Analysis Manner and Low Class Words Masaaki Kanakubo 1,a) Received: November 1, 2012,
More informationEclipse A Tool Support to Merge Similer Methods with Differences Akira Goto 1 Norihiro Yoshida 2 Masakazu Ioka 1 Katsuro Inoue 1 Abstra
Title 差分を含む類似メソッドの集約支援ツール Author(s) Citation 後藤, 祥 ; 吉田, 則裕 ; 井岡, 正和 ; 井上, 克郎 ソフトウェアエンジニアリングシンポジウム 2012 論文集. 2012 P.1-P.6 Issue Date 2012-08-21 Text Version publisher URL http://hdl.handle.net/11094/50124
More informationThe copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website
The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website by the author(s) under the agreement with the IPSJ.
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe
1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,
More information3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp
More informationVol.11-HCI-15 No. 11//1 Xangle 5 Xangle 7. 5 Ubi-WA Finger-Mount 9 Digitrack 11 1 Fig. 1 Pointing operations with our method Xangle Xa
Vol.11-HCI-15 No. 11//1 GUI 1 1 1, 1 GUI Graphical User Interface Xangle Xangle A Pointing Method Using Accelerometers for Graphical User Interfaces Tatsuya Horie, 1 Takuya Katayama, 1 Tsutomu Terada 1,
More informationIPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St
1 2 1, 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical Structures based on Phrase Similarity Yuma Ito, 1 Yoshinari Takegawa, 2 Tsutomu Terada 1, 3 and Masahiko Tsukamoto
More information2017 (413812)
2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has
More informationB HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int
SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura
More information2 22006 2 e-learning e e 2003 1 4 e e e-learning 2 Web e-leaning 2004 2005 2006 e 4 GP 4 e-learning e-learning e-learning e LMS LMS Internet Navigware
2 2 Journal of Multimedia Aided Education Research 2006, Vol. 2, No. 2, 19 e 1 1 2 2 1 1 GP e 2004 e-learning 2004 e-learning 2005 e-learning e-learning e-learning e-learning 2004 e-learning HuWeb 2005
More information1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing
1,a) 2,b) 3 Modeling of Agitation Method in Automatic Mahjong Table using Multi-Agent Simulation Hiroyasu Ide 1,a) Takashi Okuda 2,b) Abstract: Automatic mahjong table refers to mahjong table which automatically
More informationWeb Stamps 96 KJ Stamps Web Vol 8, No 1, 2004
The Journal of the Japan Academy of Nursing Administration and Policies Vol 8, No 1, pp 43 _ 57, 2004 The Literature Review of the Japanese Nurses Job Satisfaction Research Which the Stamps-Ozaki Scale
More informationVol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a
1, 1,a) 1, 2 1 1, 3 2 1 2011 6 17, 2011 12 16 Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a) Kazuki Kanamori 1, 2 Mie Nakatani 1 Hirokazu Kato 1, 3 Sanae H. Wake 2 Shogo Nishida
More information3_23.dvi
Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems
More informationDPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)
1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More information1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan
SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:
More information(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s
1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene
More information. IDE JIVE[1][] Eclipse Java ( 1) Java Platform Debugger Architecture [5] 3. Eclipse GUI JIVE 3.1 Eclipse ( ) 1 JIVE Java [3] IDE c 016 Information Pr
Eclipse 1,a) 1,b) 1,c) ( IDE) IDE Graphical User Interface( GUI) GUI GUI IDE View Eclipse Development of Eclipse Plug-in to present an Object Diagram to Debug Environment Kubota Yoshihiko 1,a) Yamazaki
More information12) NP 2 MCI MCI 1 START Simple Triage And Rapid Treatment 3) START MCI c 2010 Information Processing Society of Japan
1 1, 2 1, 2 1 A Proposal of Ambulance Scheduling System Based on Electronic Triage Tag Teruhiro Mizumoto, 1 Weihua Sun, 1, 2 Keiichi Yasumoto 1, 2 and Minoru Ito 1 For effective life-saving in MCI (Mass
More informationIPSJ SIG Technical Report Pitman-Yor 1 1 Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Aki
Pitman-Yor Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Akira Shirai and Tadahiro Taniguchi Although a lot of melody generation method has been
More informationkiyo5_1-masuzawa.indd
.pp. A Study on Wind Forecast using Self-Organizing Map FUJIMATSU Seiichiro, SUMI Yasuaki, UETA Takuya, KOBAYASHI Asuka, TSUKUTANI Takao, FUKUI Yutaka SOM SOM Elman SOM SOM Elman SOM Abstract : Now a small
More informationKochi University of Technology Aca Title 省 電 力 セルフタイム 回 路 に 関 する 研 究 Author(s) 岩 田, 誠, 宮 城, 桂, 三 宮, 秀 次, 西 川, 博 昭 Citation 高 知 工 科 大 学 紀 要, 10(1): 95-102 Date of 2013-07-20 issue URL http://hdl.handle.net/10173/1082
More informationIPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU
1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale
More information1 7.35% 74.0% linefeed point c 200 Information Processing Society of Japan
1 2 3 Incremental Linefeed Insertion into Lecture Transcription for Automatic Captioning Masaki Murata, 1 Tomohiro Ohno 2 and Shigeki Matsubara 3 The development of a captioning system that supports the
More information2
Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/
More informationActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows
ActionScript3.0 1 1 YouTube Flash ActionScript3.0 Face detection and hiding using ActionScript3.0 for streaming video on the Internet Ryouta Tanaka 1 and Masanao Koeda 1 Recently, video streaming and video
More information23 Study on Generation of Sudoku Problems with Fewer Clues
23 Study on Generation of Sudoku Problems with Fewer Clues 1120254 2012 3 1 9 9 21 18 i Abstract Study on Generation of Sudoku Problems with Fewer Clues Norimasa NASU Sudoku is puzzle a kind of pencil
More informationIPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara
1 1,2 1 (: Head Mounted Display),,,, An Information Presentation Method for Wearable Displays Considering Surrounding Conditions in Wearable Computing Environments Masayuki Nakao 1 Tsutomu Terada 1,2 Masahiko
More informationIPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS
1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high
More information2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )
1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose
More informationA Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi
A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More information17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationTitle < 論文 > 公立学校における在日韓国 朝鮮人教育の位置に関する社会学的考察 : 大阪と京都における 民族学級 の事例から Author(s) 金, 兌恩 Citation 京都社会学年報 : KJS = Kyoto journal of so 14: 21-41 Issue Date 2006-12-25 URL http://hdl.handle.net/2433/192679 Right
More informationMAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP
LSM OS 700-8530 3 1 1 matsuda@swlab.it.okayama-u.ac.jp tabata@cs.okayama-u.ac.jp 242-8502 1623 14 munetoh@jp.ibm.com OS Linux 2.6 Linux Security Modules LSM LSM Linux 4 OS OS LSM An Evaluation of Performance
More informationIPSJ SIG Technical Report Vol.2014-HCI-158 No /5/22 1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions
1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions with a still picture Yuuki Hyougo 1,a) Hiroko Suzuki 2 Tadanobu Furukawa 2 Kazuo Misue 3,b) Abstract: In order
More informationMDD PBL ET 9) 2) ET ET 2.2 2), 1 2 5) MDD PBL PBL MDD MDD MDD 10) MDD Executable UML 11) Executable UML MDD Executable UML
PBL 1 2 3 4 (MDD) PBL Project Based Learning MDD PBL PBL PBL MDD PBL A Software Development PBL for Beginners using Project Facilitation Tools Seiko Akayama, 1 Shin Kuboaki, 2 Kenji Hisazumi 3 and Takao
More informationIPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-
1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,
More informationFig. 1. Example of characters superimposed on delivery slip.
Extraction of Handwritten Character String Superimposed on Delivery Slip Data Ken-ichi MATSUO, Non-member, Katsuhiko UEDA, Non-member (Nara National College of Technology), Michio UMEDA, Member (Osaka
More information大学における原価計算教育の現状と課題
1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012
More informationFUJII, M. and KOSAKA, M. 2. J J [7] Fig. 1 J Fig. 2: Motivation and Skill improvement Model of J Orchestra Fig. 1: Motivating factors for a
/Specially issued Original Paper QOL 1 1 A Proposal of Value Co-creation Model to Promote Elderly People s Community Activities Concerning QOL Improvement Case Studies of Successful Social Activities by
More information4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q
x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke
More informationModal Phrase MP because but 2 IP Inflection Phrase IP as long as if IP 3 VP Verb Phrase VP while before [ MP MP [ IP IP [ VP VP ]]] [ MP [ IP [ VP ]]]
30 4 2016 3 pp.195-209. 2014 N=23 (S)AdvOV (S)OAdvV 2 N=17 (S)OAdvV 2014 3, 2008 Koizumi 1993 3 MP IP VP 1 MP 2006 2002 195 Modal Phrase MP because but 2 IP Inflection Phrase IP as long as if IP 3 VP Verb
More information日本感性工学会論文誌
pp.343-351 2013 Changes in Three Attributes of Color by Reproduction of Memorized Colors Hiroaki MIYAKE, Takeshi KINOSHITA and Atsushi OSA Graduate School of Science and Engineering, Yamaguchi University,
More informationCore Ethics Vol. Nerriere D.Hon EU GS NPO GS GS Oklahoma State University Kyoto Branch OSU-K OSU-K OSU-K
Core Ethics Vol. K EU Core Ethics Vol. Nerriere D.Hon EU GS NPO GS GS Oklahoma State University Kyoto Branch OSU-K OSU-K OSU-K OSU-K OSU-K OSU-K OSU-K OSU-K Team FA SA TP TP KINDER WP THP FP, KINDER World
More information( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst
情報処理学会インタラクション 2015 IPSJ Interaction 2015 15INT014 2015/3/7 1,a) 1,b) 1,c) Design and Implementation of a Piano Learning Support System Considering Motivation Fukuya Yuto 1,a) Takegawa Yoshinari 1,b) Yanagi
More informationMicrosoft PowerPoint _01.ppt
コードクローンとは コードクローン検出技術とその利用法 大阪大学大学院情報科学研究科コンピュータサイエンス専攻井上研究室肥後芳樹 (y-higo@ist.osaka-u.ac.jp) ソースコード中に存在する, 他のコード片と一致または類似しているコード片 さまざまな理由により生成される コピーアンドペーストによる再利用 定型的な処理 例 ファイルオープン, データベース接続 意図的な繰り返し パフォーマンス重視
More informationVol.53 No (Aug. 2012) BibTEX 1 2,a) , bole BibTEX BibTEX 1 BibTeX Literature Management System Based on BibTEX for L
BibTEX 1 2,a) 3 2011 11 22, 2012 5 12 bole BibTEX BibTEX 1 BibTeX Literature Management System Based on BibTEX for Laboratory Hiroyuki Ebara 1 Takahiro Ohtsuka 2,a) Yuki Yamakami 3 Received: November 22,
More informationJournal of Geography 116 (6) Configuration of Rapid Digital Mapping System Using Tablet PC and its Application to Obtaining Ground Truth
Journal of Geography 116 (6) 749-758 2007 Configuration of Rapid Digital Mapping System Using Tablet PC and its Application to Obtaining Ground Truth Data: A Case Study of a Snow Survey in Chuetsu District,
More information(MIRU2008) HOG Histograms of Oriented Gradients (HOG)
(MIRU2008) 2008 7 HOG - - E-mail: katsu0920@me.cs.scitec.kobe-u.ac.jp, {takigu,ariki}@kobe-u.ac.jp Histograms of Oriented Gradients (HOG) HOG Shape Contexts HOG 5.5 Histograms of Oriented Gradients D Human
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. {s-yui,t-ishihr,k-hotta,h-hata,higo,igaki,kus
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {s-yui,t-ishihr,k-hotta,h-hata,higo,igaki,kusumoto@ist.osaka-u.ac.jp Improving Software Metrics
More informationDEIM Forum 2009 E
DEIM Forum 2009 E5-3 464-8601 1 606-8501 464 8601 1 E-mail: lifushi@arch.itc.nagoya-u.ac.jp, mayumi@mm.media.kyoto-u.ac.jp, {hirano,kajita,mase}@itc.nagoya-u.ac.jp Abstract Study on a Recipe Recommendation
More information2 HI LO ZDD 2 ZDD 2 HI LO 2 ( ) HI (Zero-suppress ) Zero-suppress ZDD ZDD Zero-suppress 1 ZDD abc a HI b c b Zero-suppress b ZDD ZDD 5) ZDD F 1 F = a
ZDD 1, 2 1, 2 1, 2 2 2, 1 #P- Knuth ZDD (Zero-suppressed Binary Decision Diagram) 2 ZDD ZDD ZDD Knuth Knuth ZDD ZDD Path Enumeration Algorithms Using ZDD and Their Performance Evaluations Toshiki Saitoh,
More information知能と情報, Vol.30, No.5, pp
1, Adobe Illustrator Photoshop [1] [2] [3] Initital Values Assignment of Parameters Using Onomatopoieas for Interactive Design Tool Tsuyoshi NAKAMURA, Yuki SAWAMURA, Masayoshi KANOH, and Koji YAMADA Graduate
More informationDEIM Forum 2010 A Web Abstract Classification Method for Revie
DEIM Forum 2010 A2-2 305 8550 1 2 305 8550 1 2 E-mail: s0813158@u.tsukuba.ac.jp, satoh@slis.tsukuba.ac.jp Web Abstract Classification Method for Reviews using Degree of Mentioning each Viewpoint Tomoya
More information08医療情報学22_1_水流final.PDF
22 (1), 702002: 59 59- The Problem of Nursing Common Language for the Information Sharing in Clinical Practice The fact-finding in regard to the correspondence between name and content of nursing action
More information6_27.dvi
Vol. 49 No. 6 1932 1941 (June 2008) RFID 1 2 RFID RFID RFID 13.56 MHz RFID A Experimental Study for Measuring Human Activities in A Bathroom Using RFID Ryo Onishi 1 and Shigeyuki Hirai 2 A bathroom is
More information1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c
CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification
More informationIPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f
1,a) 2 zabbix Consideration of a system to support understanding of fault occurrences based on the similarity of the time series Miyaza Nao 1,a) Masuda Hideo 2 Abstract: With the development of network
More information, : GUI Web Java 2.1 GUI GUI GUI 2 y = x y = x y = x
J.JSSAC (2005) Vol. 11, No. 3,4, pp. 77-88 Noda2005 MathBlackBoard MathBlackBoard is a Java program based on the blackboard applet. We can use the blackboard applet with GUI operations. The blackboard
More informationVol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N
Vol. 42 No. 6 June 2001 IREX-NE F 83.86 A Japanese Named Entity Extraction System Based on Building a Large-scale and High-quality Dictionary and Pattern-matching Rules Yoshikazu Takemoto, Toshikazu Fukushima
More informationCX-Checker CX-Checker (1)XPath (2)DOM (3) 3 XPath CX-Checker. MISRA-C 62%(79/127) SQMlint 76%(13/17) XPath CX-Checker 3. CX-Checker 4., MISRA-C CX- Ch
CX-Checker: C 1 1 2 3 4 5 1 CX-Checker CX-Checker XPath DOM 3 CX-Checker MISRA-C CX-Checker: A Customizable Coding Checker for C TOSHINORI OSUKA, 1 TAKASHI KOBAYASHI, 1 JUNICHI MASE, 2 NORITOSHI ATSUMI,
More informationIPSJ SIG Technical Report An Evaluation Method for the Degree of Strain of an Action Scene Mao Kuroda, 1 Takeshi Takai 1 and Takashi Matsuyama 1
1 1 1 An Evaluation Method for the Degree of of an Action Scene Mao Kuroda, 1 Takeshi Takai 1 and Takashi Matsuyama 1 The purpose of our research is to investigate structure of an action scene scientifically.
More information[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis
1,a) 2 2 2 1 2 3 24 Motion Frame Omission for Cartoon-like Effects Abstract: Limited animation is a hand-drawn animation style that holds each drawing for two or three successive frames to make up 24 frames
More informationIPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info
1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3
More informationTable 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig
Mover Design and Performance Analysis of Linear Synchronous Reluctance Motor with Multi-flux Barrier Masayuki Sanada, Member, Mitsutoshi Asano, Student Member, Shigeo Morimoto, Member, Yoji Takeda, Member
More informationTCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of
IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN
More informationTable 1. Assumed performance of a water electrol ysis plant. Fig. 1. Structure of a proposed power generation system utilizing waste heat from factori
Proposal and Characteristics Evaluation of a Power Generation System Utilizing Waste Heat from Factories for Load Leveling Pyong Sik Pak, Member, Takashi Arima, Non-member (Osaka University) In this paper,
More information10D16.dvi
D IEEJ Transactions on Industry Applications Vol.136 No.10 pp.686 691 DOI: 10.1541/ieejias.136.686 NW Accelerating Techniques for Sequence Alignment based on an Extended NW Algorithm Jin Okaze, Non-member,
More informationVol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L
Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP
More information大学論集第42号本文.indb
42 2010 2011 3 279 295 COSO 281 COSO 1990 1 internal control 1 19962007, Internal Control Integrated Framework COSO COSO 282 42 2 2) the Committee of Sponsoring Organizations of the Treadway committee
More information202
201 Presenteeism 202 203 204 Table 1. Name Elements of Work Productivity Targeted Populations Measurement items of Presenteeism (Number of Items) Reliability Validity α α 205 α ä 206 Table 2. Factors of
More informationIPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter
,a),2,3 3,4 CG 2 2 2 An Interpolation Method of Different Flow Fields using Polar Interpolation Syuhei Sato,a) Yoshinori Dobashi,2,3 Tsuyoshi Yamamoto Tomoyuki Nishita 3,4 Abstract: Recently, realistic
More information