生体認証システムにおける情報漏洩対策技術の研究動向

Size: px
Start display at page:

Download "生体認証システムにおける情報漏洩対策技術の研究動向"

Transcription

1 ATM 1 IC ATM ATM IC IC ATM masataka.suzuki@boj.or.jp inuma.manabu@aist.go.jp a-otsuka@aist.go.jp //

2 ATM PC ATM FISC FISC [2009] FISC [2009] 35-1 ATM IC ATM ATM IC 230 /2010.4

3 IC IC IC 2 IC IC IC 1. IC 1 231

4 1. IC 3 ATM IC IC STOC Store on Card IC IC MOC MatchonCard IC SOC System on Card2005 ATM IC ATM ATM IC STOC MOC IC IC STOC MOC STOC MOC 2 1 ffl STOC ffl MOC IC 1STOC MOC /2010.4

5 2 STOC MOC 1 IC STOC MOC 2 STOC 3 MOC IC 2 3 Ratha, Connell, and Bolle [2001] 233

6 3 2 Hill [2001] Adler [2003] 3 Matsumoto, Matsumoto, Yamada, and Hoshino [2002] 4 3 IC % 1 3 Adler [2003] 4, /2010.4

7 4. IC 5 IC 1 4 ffl 1 IC ffl 2 IC IC 6 ffl 3 IC 2 IC ffl 4 IC IC 7. IC ATM ATM PIN , IC 7 IC IC IC 235

8 Finextra [2009] IC ATM ffl 5 IC ffl 6 IC IC STOC IC MOC ffl STOC MOC IC 2 IC ffl 1 IC IC 8 Une, Otsuka, and Imai [2008] 2007 Inuma, Otsuka, and Imai [2009] /2010.4

9 5 STOC MOC 1 2 STOC MOC IC STOC MOC IC IC A-4 A-6 ffl STOC â 2 4 IC â 5 â 6 ffl MOC â 2 1 IC â 3 4 STOC 5 IC 237

10 â 5 6 IC ffl ffl IC IC ffl 3. 1 DES /2010.4

11 Ratha, Connell, and Bolle [2001] Jain, Nandakumar, and Nagar [2008]

12 ffl 1 IC ffl 2 IC ffl 3 IC /2010.4

13 Breebaart, Busch, Grave, and Kindt [2008]

14 /2010.4

15 Uludag, Pankanti, and Jain [2005] 16 Hao, Anderson, and Daugman [2006] 2 3 Takahashi and Hirata [2009] IC Jin, Ling, and Goh [2004]

16 IC IC IC 2 MOC-ff MOC-fi 10 ffl MOC-ff IC ffl MOC-fi IC MOC-ff MOC-fi Jin, Ling, and Goh [2004] IBG [2006] 650 FVC [2006] /2010.4

17 10 1 MOC-ff 2 MOC-fi IC 2 MOC-ff MOC-fi ffl 1 2 IC ffl 3 IC MOC-ff MOC-fi 1 ffl MOC-ff 4 IC â 19 â

18 11 MOC-ff fi MOC-ff MOC-fi IC ffl MOC-fi 4 IC 21 ffl 5 6 IC MOC-ff 22 MOC 23 MOC-fi MOC IC IC 21 MOC-ff 4 MOC-fi STOC-ff /2010.4

19 5. IC ATM MOC-ff

20 IC IC 1 6 ATM 4 6. ATM ATM IC 248 /2010.4

21 1 249

22 FISC 7 FISC B Wolf Lamb 2009 D B Adler, Andy, Can Images Be Regenerated from Biometric Templates? Biometric Conference, Breebaart, Jeroen, Christoph Busch, Justine Grave, and Els Kindt, A Reference Architecture for Biometric Template Protection Based on Pseudo Identities, Proc. the Special Interest Group on Biometrics and Electronic Signatures (BIOSIG), 2008, pp Finextra, Criminal Malware Infection Hits Eastern European Cash Machines, June 29, 2009 ( Fingerprint Verification Competition (FVC), Databases, 2006 ( fvc2006/databases.asp). Hao, Feng, Ross Anderson, and John Daugman, Combining Crypto with Biometrics Effectively, IEEE Transaction on Computers, 55 (9), 2006, pp /2010.4

23 Hill, Chirstopher James, Risk of Masquerade Arising from the Storage of Biometrics, Bachelor Thesis, Department of Computer Science, Australian National University, International Biometric Group (IBG), Comparative Biometric Testing Round 6 Public Report, IBG, 2006 ( CBT6_report.htm). Inuma, Manabu, Akira Otsuka, and Hideki Imai, Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems, International Conference on Biometrics (ICB), Jain, Anil K., Karthik Nandakumar, and Abhishek Nagar, Biometric Template Security, EURASIP Journal on Advances in Signal Processing, Special Issue on Biometrics, 2008, pp Jin, Teoh Andrew Beng, David Ngo Chek Ling, and Alwyn Goh, Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenized Random Number, Pattern Recognition, 37, 2004, pp Matsumoto, Tsutomu, Hiroyuki Matsumoto, Koji Yamada, and Satoshi Hoshino, Impact of Artificial Gummy Fingers on Fingerprint Systems, SPIE Optical Security and Counterfeit Deterrence Techniques IV, Vol. 4677, Ratha, Nalini K., Jonathan H. Connell, and Ruud M. Bolle, Enhancing Security and Privacy of Biometric-Based Authentication Systems, IBM Systems Journal, 40 (3), 2001, pp Takahashi, Kenta, and Shinji Hirata, Generating Provably Secure Cancelable Fingerprint Templates Based on Correlation-Invariant Random Filtering, IEEE Conf. Biometrics: Theory, Applications and Systems, Uludag, Umut, Sharath Pankanti, and Anil K. Jain., Fuzzy Vault for Fingerprints, Proceeding of International Conference on Audio- and Video-Based Biometric Person Authentication, 2005, pp Une, Masashi, Akira Otsuka, and Hideki Imai, Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems, IEICE Trans. Inf. & Syst., E91-D (5), 2008, pp

24 1. STOC MOC 1 STOC STOC IC 4 STOC A-1 24 STOC-3 2 STOC ffl STOC-1 ffl STOC-2 ffl STOC-3 ffl STOC-4 2 MOC STOC MOC IC A-1 STOC 4 IC STOC-1 STOC-2 STOC-3 STOC-4 24 STOC-3 STOC-4 STOC-3 STOC /2010.4

25 A-2 MOC 2 MOC-1 MOC-2 IC A MOC-1 STOC-1 STOC-2 MOC-2 STOC-3 STOC MOC A-2 25 MOC-1 2 MOC ffl MOC-1 IC ffl MOC-2 IC 3 STOC-1 4 MOC A-3 25 MOC-2 MOC-2 253

26 A-4 1 IC 2 A-4 ffl IC 1 2 IC STOC-1 2 ffl IC 3 4 IC STOC-1 2 MOC-1 IC MOC-2 ffl 5 6 STOC /2010.4

27 IC 1 STOC-ff A-5 STOC-ff IC IC STOC-ff IC A-5 STOC-ff IC 255

28 2 STOC-ff A-6 ffl 1 IC ffl 2 4 IC STOC-ff 1 ffl 5 ffl 6 IC 5 STOC-ff MOC-ff 1 STOC-1 4 MOC MOC-fi 1 3 A-6 STOC-ff /2010.4

生体認証システムにおける人工物を用いた攻撃に対するセキュリティ評価手法の確立に向けて

生体認証システムにおける人工物を用いた攻撃に対するセキュリティ評価手法の確立に向けて ATM 2016 ATM IC... E-mail: masashi.une@boj.or.jp / /2016.10 55 1. ATM Automated Tellers Machine IC 1 2000 1 ATM ATM ATM False Accept Rate: FAR ISO International Organization for Standardization IEC International

More information

2006 Indexed Fuzzy Vault 3ADM1117 3ADM3225

2006 Indexed Fuzzy Vault 3ADM1117 3ADM3225 2006 Indexed Fuzzy Vault 3ADM1117 3ADM3225 1 1 2 Fuzzy Vault Scheme 2 2.1................................... 2 2.2............................... 2 2.3............................. 2 3 3 3.1 Reed-Solomon...........................

More information

yoo_graduation_thesis.dvi

yoo_graduation_thesis.dvi 200 3 A Graduation Thesis of College of Engineering, Chubu University Keypoint Matching of Range Data from Features of Shape and Appearance Yohsuke Murai 1 1 2 2.5D 3 2.1 : : : : : : : : : : : : : : :

More information

人工物メトリクスの評価における現状と課題

人工物メトリクスの評価における現状と課題 E-mail: h.matsumoto@nhkspg.co.jp E-mail: masashi.une@boj.or.jp E-mail: tsutomu@mlab.jks.ynu.ac.jp E-mail: iwashita@imes.boj.or.jp E-mail: sugahara@nhkspg.co.jp artifact-metrics biometrics artifact-metric

More information

Computer Security Symposium October ,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) [1] 1 Meiji U

Computer Security Symposium October ,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) [1] 1 Meiji U Computer Security Symposium 017 3-5 October 017 1,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) 1. 017 5 [1] 1 Meiji University Graduate School of Advanced Mathematical Science

More information

04.™ƒ”R/’Ô”�/’Xfl©

04.™ƒ”R/’Ô”�/’Xfl© Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP

More information

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策 IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... E-mail: hidemitsu.izawa@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp / /2015.10

More information

untitled

untitled IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)

More information

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055 1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free

More information

IPSJ SIG Technical Report Vol.2014-DPS-158 No.27 Vol.2014-CSEC-64 No /3/6 1,a) 2,b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,.,.,

IPSJ SIG Technical Report Vol.2014-DPS-158 No.27 Vol.2014-CSEC-64 No /3/6 1,a) 2,b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,.,., 1,a),b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,,,,.,,,,.,,.,,,,.,, 1 Department of Electrical Electronic and Communication Engineering Faculty of Science and Engineering Chuo University

More information

ICカード利用システムにおいて新たに顕現化した中間者攻撃とその対策

ICカード利用システムにおいて新たに顕現化した中間者攻撃とその対策 IC IC EMV EMV ICIC IC IC EMV IC EMV IC... E-mail: masataka.suzuki@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp E-mail: k-kobara@aist.go.jp //2012.7 107 1 IC EMV 1 EMV EMVCo IC 36% 10 IC 65% 1,540 2009

More information

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α,

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α, [II] Optimization Computation for 3-D Understanding of Images [II]: Ellipse Fitting 1. (1) 2. (2) (edge detection) (edge) (zero-crossing) Canny (Canny operator) (3) 1(a) [I] [II] [III] [IV ] E-mail sugaya@iim.ics.tut.ac.jp

More information

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP

More information

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto

More information

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3) (MIRU2012) 2012 8 820-8502 680-4 E-mail: {d kouno,shimada,endo}@pluto.ai.kyutech.ac.jp (1) (2) (3) (4) 4 AdaBoost 1. Kanade [6] CLAFIC [12] EigenFace [10] 1 1 2 1 [7] 3 2 2 (1) (2) (3) (4) 4 4 AdaBoost

More information

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server a) Change Detection Using Joint Intensity Histogram Yasuyo KITA a) 2 (0 255) (I 1 (x),i 2 (x)) I 2 = CI 1 (C>0) (I 1,I 2 ) (I 1,I 2 ) 2 1. [1] 2 [2] [3] [5] [6] [8] Intelligent Systems Research Institute,

More information

リテール・バンキング・システムのICカード対応に関する現状とその課題

リテール・バンキング・システムのICカード対応に関する現状とその課題 IC IC IC ATM IC IC ATM IC IC IC IC E-mail: yuuko.tamura@boj.or.jp E-mail: hirokawa@imes.boj.or.jp IC IC MS IC IC IC IC IC IC IC MS IC IC IC IC IC ICIC ICATM ATMIC IC IC ATMMS IC MS IC IC IC IC ATM IC ICIC

More information

第 1 回バイオメトリクス研究会 ( 早稲田大学 ) THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169

第 1 回バイオメトリクス研究会 ( 早稲田大学 ) THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169-8555 3-4-1,169-8555 3-4-1 E-mail: s hayashi@kom.comm.waseda.ac.jp, ohki@suou.waseda.jp Wolf

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

Real AdaBoost HOG 2009 3 A Graduation Thesis of College of Engineering, Chubu University Efficient Reducing Method of HOG Features for Human Detection based on Real AdaBoost Chika Matsushima ITS Graphics

More information

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 657 8531 1 1 E-mail: {soda,matsubara}@ws.cs.kobe-u.ac.jp, {masa-n,shinsuke,shin,yosimoto}@cs.kobe-u.ac.jp,

More information

Convolutional Neural Network A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolution

Convolutional Neural Network A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolution Convolutional Neural Network 2014 3 A Graduation Thesis of College of Engineering, Chubu University Investigation of feature extraction by Convolutional Neural Network Fukui Hiroshi 1940 1980 [1] 90 3

More information

14) Ogihara ATM 15) ATM 10 16) 17),18) 1 4) 1 8),9) 10) 12) realadaboost 13) % 12) 2. 3 Gluhchev 19) 1 19) 2 10) 12) 3. 2 ID 1 8) 9),20) 2 2

14) Ogihara ATM 15) ATM 10 16) 17),18) 1 4) 1 8),9) 10) 12) realadaboost 13) % 12) 2. 3 Gluhchev 19) 1 19) 2 10) 12) 3. 2 ID 1 8) 9),20) 2 2 1, 1 2 1 33 realadaboost 30 4.1% Biometric Person Authentication Method Using Pen Holding Feature Daigo Muramats, 1, 1 Yuki Hashimoto 1 and Hiroyuki Ogata 1 We focus on a biometric person authentication

More information

(MIRU2008) HOG Histograms of Oriented Gradients (HOG)

(MIRU2008) HOG Histograms of Oriented Gradients (HOG) (MIRU2008) 2008 7 HOG - - E-mail: katsu0920@me.cs.scitec.kobe-u.ac.jp, {takigu,ariki}@kobe-u.ac.jp Histograms of Oriented Gradients (HOG) HOG Shape Contexts HOG 5.5 Histograms of Oriented Gradients D Human

More information

Abstract Bitcoin P2P (Pear To Pear)

Abstract Bitcoin P2P (Pear To Pear) Bitcoin 2014 4 19 IS Report No. 2014041902 Report Medical Information System Labratry Abstract Bitcoin P2P (Pear To Pear) 1............................ 2 2 Bitcoin.......................... 3 3 Bitcoin........................

More information

[1] [3]. SQL SELECT GENERATE< media >< T F E > GENERATE. < media > HTML PDF < T F E > Target Form Expression ( ), 3.. (,). : Name, Tel name tel

[1] [3]. SQL SELECT GENERATE< media >< T F E > GENERATE. < media > HTML PDF < T F E > Target Form Expression ( ), 3.. (,). : Name, Tel name tel DEIM Forum 2011 C7-5 SuperSQL 223 8522 3 14 1 E-mail: tomonari@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp SuperSQL, SQL SELECT GENERATE SQL., SuperSQL HTML,.,. SuperSQL, HTML, Equivalent Transformation on

More information

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation

More information

IS1-09 第 回画像センシングシンポジウム, 横浜,14 年 6 月 2 Hough Forest Hough Forest[6] Random Forest( [5]) Random Forest Hough Forest Hough Forest 2.1 Hough Forest 1 2.2

IS1-09 第 回画像センシングシンポジウム, 横浜,14 年 6 月 2 Hough Forest Hough Forest[6] Random Forest( [5]) Random Forest Hough Forest Hough Forest 2.1 Hough Forest 1 2.2 IS1-09 第 回画像センシングシンポジウム, 横浜,14 年 6 月 MI-Hough Forest () E-mail: ym@vision.cs.chubu.ac.jphf@cs.chubu.ac.jp Abstract Hough Forest Random Forest MI-Hough Forest Multiple Instance Learning Bag Hough Forest

More information

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて 1999 IC IC 2008 2 5 10 E-mail: masataka.suzuki@boj.or.jp E-mail: hirokawa@imes.boj.or.jp E-mail: une@imes.boj.or.jp //2008.8 39 1. 1990 2007 1 IC 1 1 20072006 2007 1 Edy Edy IC 2007 2 22 IC PASMO IC 2008

More information

12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1

12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1 12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1 Biometrics Biometrics 01.9.11 2003/3/6 Copy ight (C) NEC Corporation 2 AFIS Internet ID(PID) 2003/3/6 Copy ight (C) NEC Corporation 3 2003/3/6 Copy ight

More information

2.2 (a) = 1, M = 9, p i 1 = p i = p i+1 = 0 (b) = 1, M = 9, p i 1 = 0, p i = 1, p i+1 = 1 1: M 2 M 2 w i [j] w i [j] = 1 j= w i w i = (w i [ ],, w i [

2.2 (a) = 1, M = 9, p i 1 = p i = p i+1 = 0 (b) = 1, M = 9, p i 1 = 0, p i = 1, p i+1 = 1 1: M 2 M 2 w i [j] w i [j] = 1 j= w i w i = (w i [ ],, w i [ RI-002 Encoding-oriented video generation algorithm based on control with high temporal resolution Yukihiro BANDOH, Seishi TAKAMURA, Atsushi SHIMIZU 1 1T / CMOS [1] 4K (4096 2160 /) 900 Hz 50Hz,60Hz 240Hz

More information

guideline_1_0.dvi

guideline_1_0.dvi Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10

More information

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s 1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

Microsoft PowerPoint Sumi-Protection.ppt

Microsoft PowerPoint Sumi-Protection.ppt 生体認証テンプレート保護技術の動向 鷲見和彦三菱電機株式会社先端技術総合研究所 2007/3/9 WS: 生体情報の漏洩と対策 1 背景 バイオメトリクス個人認証の普及 システムの大規模化 オープン化 パスポートなど公的個人認証 登録システムと認証システムが分かれる 類似した応用システムが多数存在する 物理セキュリティ ( 住宅 企業 会員専用 ) 情報セキュリティ ( 業務系認証 商取引 ) 利便目的のカジュアルな応用が現れる

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

No.7, (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit

No.7, (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit No.7,321-332 (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit Cash Card Standard Specifications (Second Edition)

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

2003/3 Vol. J86 D II No.3 2.3. 4. 5. 6. 2. 1 1 Fig. 1 An exterior view of eye scanner. CCD [7] 640 480 1 CCD PC USB PC 2 334 PC USB RS-232C PC 3 2.1 2

2003/3 Vol. J86 D II No.3 2.3. 4. 5. 6. 2. 1 1 Fig. 1 An exterior view of eye scanner. CCD [7] 640 480 1 CCD PC USB PC 2 334 PC USB RS-232C PC 3 2.1 2 Curved Document Imaging with Eye Scanner Toshiyuki AMANO, Tsutomu ABE, Osamu NISHIKAWA, Tetsuo IYODA, and Yukio SATO 1. Shape From Shading SFS [1] [2] 3 2 Department of Electrical and Computer Engineering,

More information

2

2 Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

10_08.dvi

10_08.dvi 476 67 10 2011 pp. 476 481 * 43.72.+q 1. MOS Mean Opinion Score ITU-T P.835 [1] [2] [3] Subjective and objective quality evaluation of noisereduced speech. Takeshi Yamada, Shoji Makino and Nobuhiko Kitawaki

More information

量子暗号通信の仕組みと開発動向

量子暗号通信の仕組みと開発動向 RSA AES 1 BB84Y-00 E-mail: hitoshi.gotou-1@boj.or.jp //2009.10 107 1. 2008 10 9 20 km 1.02 Mbps 100 km 10.1 kbps 1 Gbps 10 Gbps VPN 7 km 2. 1 3 2 1 2 108 /2009.10 1 2 2 109 2 ID IC KEELOQ 1 1 EUROCRYPT2008

More information

IBISML 20 (IBIS2017) 6 IBISML 4 CANDAR2017 (Graph Golf 2017) CW WSSM AI Author s Toolkit Writing Better Techn

IBISML 20 (IBIS2017) 6 IBISML 4 CANDAR2017 (Graph Golf 2017) CW WSSM AI Author s Toolkit Writing Better Techn ISSN Print ISSN 2189-9797 ISSN ISSN 2189-9819 https://www.jstage.jst.go.jp/browse/ieiceissjournal/-char/ja/ c 2018 30 2 1 22 4 89 22 4 89 3 IBISML 20 (IBIS2017) 6 IBISML 4 CANDAR2017 (Graph Golf 2017)

More information

1 2 3 マルチメディア, 分散, 協調とモバイル (DICOMO2013) シンポジウム 平成 25 年 7 月.,.,,.,. Surrogate Diner,., Surrogate Diner,, 3,, Surrogate Diner. An Interface Agent for Ps

1 2 3 マルチメディア, 分散, 協調とモバイル (DICOMO2013) シンポジウム 平成 25 年 7 月.,.,,.,. Surrogate Diner,., Surrogate Diner,, 3,, Surrogate Diner. An Interface Agent for Ps 1 2 3 マルチメディア, 分散, 協調とモバイル (DICOMO2013) シンポジウム 平成 25 年 7 月.,.,,.. Surrogate Diner,., Surrogate Diner, 3,, Surrogate Diner. An Interface Agent for Pseudo Co-Dining with a Remote Person TAKUTO SHIOHARA 1

More information

サイドチャネル攻撃に対する安全性評価の研究動向とEMVカード固有の留意点

サイドチャネル攻撃に対する安全性評価の研究動向とEMVカード固有の留意点 EMV IC IC 20 IC EMV IC EMV IC EMV... E-mail: masataka.suzuki@boj.or.jp E-mail: Sugawara.Takeshi@bp.MitsubishiElectric.co.jp E-mail: Suzuki.Daisuke@bx.MitsubishiElectric.co.jp / /2015.10 107 1. IC 2011

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation 1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1

More information

2013 M

2013 M 2013 M0110453 2013 : M0110453 20 1 1 1.1............................ 1 1.2.............................. 4 2 5 2.1................................. 6 2.2................................. 8 2.3.................................

More information

3.1 Thalmic Lab Myo * Bluetooth PC Myo 8 RMS RMS t RMS(t) i (i = 1, 2,, 8) 8 SVM libsvm *2 ν-svm 1 Myo 2 8 RMS 3.2 Myo (Root

3.1 Thalmic Lab Myo * Bluetooth PC Myo 8 RMS RMS t RMS(t) i (i = 1, 2,, 8) 8 SVM libsvm *2 ν-svm 1 Myo 2 8 RMS 3.2 Myo (Root 1,a) 2 2 1. 1 College of Information Science, School of Informatics, University of Tsukuba 2 Faculty of Engineering, Information and Systems, University of Tsukuba a) oharada@iplab.cs.tsukuba.ac.jp 2.

More information

,,.,.,,.,.,.,.,,.,..,,,, i

,,.,.,,.,.,.,.,,.,..,,,, i 22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of

More information

Mark A. Peterson, Legislating Together: The White House and Capitol Hill from Eisenhower to Reagan, Cambridge : Harvard University Press, Michel Foley

Mark A. Peterson, Legislating Together: The White House and Capitol Hill from Eisenhower to Reagan, Cambridge : Harvard University Press, Michel Foley Mark A. Peterson, Legislating Together: The White House and Capitol Hill from Eisenhower to Reagan, Cambridge : Harvard University Press, Michel Foley and John E. Owens, Congress and the presidency: Institutional

More information

Cut Energy Bills 11% in Smart Meter Test: IBM is Running a Test in Dubuque, Iowa, to Get Residents Engaged with Their Smart Meter Data Consumers Wary of Smart Meters A Policy Framework for The 21 st Century

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

顔画像を用いた個人認証システムの性能検討に関する研究

顔画像を用いた個人認証システムの性能検討に関する研究 12 Research on performance examination of individual attestation system using face image 1010429 2001 2 5 1997 FaceIt The age using various biometrics for the attestation with the computer to attest the

More information

(3.6 ) (4.6 ) 2. [3], [6], [12] [7] [2], [5], [11] [14] [9] [8] [10] (1) Voodoo 3 : 3 Voodoo[1] 3 ( 3D ) (2) : Voodoo 3D (3) : 3D (Welc

(3.6 ) (4.6 ) 2. [3], [6], [12] [7] [2], [5], [11] [14] [9] [8] [10] (1) Voodoo 3 : 3 Voodoo[1] 3 ( 3D ) (2) : Voodoo 3D (3) : 3D (Welc 1,a) 1,b) Obstacle Detection from Monocular On-Vehicle Camera in units of Delaunay Triangles Abstract: An algorithm to detect obstacles by using a monocular on-vehicle video camera is developed. Since

More information

DEIM Forum 2017 E Netflix (Video on Demand) IP 4K [1] Video on D

DEIM Forum 2017 E Netflix (Video on Demand) IP 4K [1] Video on D DEIM Forum 2017 E1-1 700-8530 3-1-1 E-mail: inoue-y@mis.cs.okayama-u.ac.jp, gotoh@cs.okayama-u.ac.jp 1. Netflix (Video on Demand) IP 4K [1] Video on Demand ( VoD) () 2. 2. 1 VoD VoD 2. 2 AbemaTV VoD VoD

More information

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf 1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi

More information

WLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A

WLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A DEIM Forum2015 C2-4 LAN 112 8610 2-1-1 NEC 211 8666 1753 E-mail: mitomo@ogl.is.ocha.ac.jp, {miyoshi,t-murase}@ap.jp.nec.com, oguchi@computer.org LAN AP AP LAN LAN LAN WLAN AP- WLAN 3 LAN LANQoS Quality

More information

DEIM Forum 2012 E Web Extracting Modification of Objec

DEIM Forum 2012 E Web Extracting Modification of Objec DEIM Forum 2012 E4-2 670 0092 1 1 12 E-mail: nd11g028@stshse.u-hyogo.ac.jp, {dkitayama,sumiya}@shse.u-hyogo.ac.jp Web Extracting Modification of Objects for Supporting Map Browsing Junki MATSUO, Daisuke

More information

No. 3 Oct The person to the left of the stool carried the traffic-cone towards the trash-can. α α β α α β α α β α Track2 Track3 Track1 Track0 1

No. 3 Oct The person to the left of the stool carried the traffic-cone towards the trash-can. α α β α α β α α β α Track2 Track3 Track1 Track0 1 ACL2013 TACL 1 ACL2013 Grounded Language Learning from Video Described with Sentences (Yu and Siskind 2013) TACL Transactions of the Association for Computational Linguistics What Makes Writing Great?

More information

ii

ii I05-010 : 19 1 ii k + 1 2 DS 198 20 32 1 1 iii ii iv v vi 1 1 2 2 3 3 3.1.................................... 3 3.2............................. 4 3.3.............................. 6 3.4.......................................

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura

More information

- 1 -

- 1 - Study on installation environment in consideration of electromagnetic compatibility of electrical equipment in direct current power distribution for consumers - 1 - - 2 - 1

More information

21 Pitman-Yor Pitman- Yor [7] n -gram W w n-gram G Pitman-Yor P Y (d, θ, G 0 ) (1) G P Y (d, θ, G 0 ) (1) Pitman-Yor d, θ, G 0 d 0 d 1 θ Pitman-Yor G

21 Pitman-Yor Pitman- Yor [7] n -gram W w n-gram G Pitman-Yor P Y (d, θ, G 0 ) (1) G P Y (d, θ, G 0 ) (1) Pitman-Yor d, θ, G 0 d 0 d 1 θ Pitman-Yor G ol2013-nl-214 No6 1,a) 2,b) n-gram 1 M [1] (TG: Tree ubstitution Grammar) [2], [3] TG TG 1 2 a) ohno@ilabdoshishaacjp b) khatano@maildoshishaacjp [4], [5] [6] 2 Pitman-Yor 3 Pitman-Yor 1 21 Pitman-Yor

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

戦間期日本企業の資金調達、資本コスト、資本構成:最適資本構成理論からみた1930年代における企業財務

戦間期日本企業の資金調達、資本コスト、資本構成:最適資本構成理論からみた1930年代における企業財務 1930 Modigliani and Miller [1958] 170 1930 2008 7 16 I E-mail: takashi.nanjou@boj.or.jp E-mail: cc00881@srv.cc.hit-u.ac.jp //2009.7 81 1. 1 2 M&A 3 4 1965 1969 1995 1995 1993 1 2008 2008 1985 2006 10 ROA

More information

核融合…予稿集

核融合…予稿集 9:30 9:45 9:45 10:00 10:05 10:10 10:10 10:40 2 3 10:40 11:10 11:10 11:40 11:40 12:00 6 7 8 9 10 11 13:10 13:20 13:20 14:00 14:00 14:20 14:20 14:40 14:50 15:20 15:20 15:50 15:50 15:55 14 15 16 17 18 19

More information

DEIM Forum 2017 H ,

DEIM Forum 2017 H , DEIM Forum 217 H5-4 113 8656 7 3 1 153 855 4 6 1 3 2 1 2 E-mail: {satoyuki,haya,kgoda,kitsure}@tkl.iis.u-tokyo.ac.jp,.,,.,,.,, 1.. 1956., IBM IBM RAMAC 35 IBM 35 24 5, 5MB. 1961 IBM 131,,, IBM 35 13.,

More information

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St 1 2 1, 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical Structures based on Phrase Similarity Yuma Ito, 1 Yoshinari Takegawa, 2 Tsutomu Terada 1, 3 and Masahiko Tsukamoto

More information

VHDL-AMS Department of Electrical Engineering, Doshisha University, Tatara, Kyotanabe, Kyoto, Japan TOYOTA Motor Corporation, Susono, Shizuok

VHDL-AMS Department of Electrical Engineering, Doshisha University, Tatara, Kyotanabe, Kyoto, Japan TOYOTA Motor Corporation, Susono, Shizuok VHDL-AMS 1-3 1200 Department of Electrical Engineering, Doshisha University, Tatara, Kyotanabe, Kyoto, Japan TOYOTA Motor Corporation, Susono, Shizuoka, Japan E-mail: tkato@mail.doshisha.ac.jp E-mail:

More information

第1章

第1章 ( ) 2005 1 IC 1... 1 1.1... 1 1.1.1... 1 1.1.2... 1 1.2... 5 1.2.1... 5 1.2.2... 5 1.3... 7 2... 8 2.1... 8 2.1.1... 10 2.1.2... 11 2.1.3... 13 2.1.4... 13 2.2... 16 2.2.1... 19 2.2.2... 21 2.2.3... 23

More information

untitled

untitled 22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29

More information

SICE東北支部研究集会資料(2017年)

SICE東北支部研究集会資料(2017年) 307 (2017.2.27) 307-8 Deep Convolutional Neural Network X Detecting Masses in Mammograms Based on Transfer Learning of A Deep Convolutional Neural Network Shintaro Suzuki, Xiaoyong Zhang, Noriyasu Homma,

More information

[1] SBS [2] SBS Random Forests[3] Random Forests ii

[1] SBS [2] SBS Random Forests[3] Random Forests ii Random Forests 2013 3 A Graduation Thesis of College of Engineering, Chubu University Proposal of an efficient feature selection using the contribution rate of Random Forests Katsuya Shimazaki [1] SBS

More information

Web Social Networking Service Virtual Private Network 84

Web Social Networking Service Virtual Private Network 84 Promising business utilized five senses information media through the Next Generation Network Toshio ASANO Next Generation Network 2004 11 2010 6,000 3,000 2006 12 2008 83 Web Social Networking Service

More information

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 1, 2 1 1 1 Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 Nobutaka ONO 1 and Shigeki SAGAYAMA 1 This paper deals with instrument separation

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

4 4 2 RAW 4 4 4 (PCA) 4 4 4 4 RAW RAW [5] 4 RAW 4 Park [12] Park 2 RAW RAW 2 RAW y = Mx + n. (1) y RAW x RGB M CFA n.. R G B σr 2, σ2 G, σ2 B D n ( )

4 4 2 RAW 4 4 4 (PCA) 4 4 4 4 RAW RAW [5] 4 RAW 4 Park [12] Park 2 RAW RAW 2 RAW y = Mx + n. (1) y RAW x RGB M CFA n.. R G B σr 2, σ2 G, σ2 B D n ( ) RAW 4 E-mail: hakiyama@ok.ctrl.titech.ac.jp Abstract RAW RAW RAW RAW RAW 4 RAW RAW RAW 1 (CFA) CFA Bayer CFA [1] RAW CFA 1 2 [2, 3, 4, 5]. RAW RAW RAW RAW 3 [2, 3, 4, 5] (AWGN) [13, 14] RAW 2 RAW RAW RAW

More information

DC-DC Control Circuit for Single Inductor Dual Output DC-DC Converter with Charge Pump (AKM AKM Kenji TAKAHASHI Hajime YOKOO Shunsuke MIWA Hiroyuki IW

DC-DC Control Circuit for Single Inductor Dual Output DC-DC Converter with Charge Pump (AKM AKM Kenji TAKAHASHI Hajime YOKOO Shunsuke MIWA Hiroyuki IW DC-DC Control Circuit for Single Inductor Dual Output DC-DC Converter with Charge Pump (AKM AKM Kenji TAKAHASHI Hajime YOKOO Shunsuke MIWA Hiroyuki IWASE Nobukazu TAKAI Haruo KOBAYASHI Takahiro ODAGUCHI

More information

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2

More information

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325 社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL

More information

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0 AMBA 1 1 1 1 FabScalar FabScalar AMBA AMBA FutureBus Improvement of AMBA Bus Frame-work for Heterogeneos Multi-processor Seto Yusuke 1 Takahiro Sasaki 1 Kazuhiko Ohno 1 Toshio Kondo 1 Abstract: The demand

More information

位相限定相関法と そのバイオメトリクス認証への応用

位相限定相関法と そのバイオメトリクス認証への応用 1 バイオメトリクスの最新動向 ~IJCB2011 学会報告 ~ 東北大学大学院情報科学研究科 伊藤康一 本発表の目的 2 パターン認識やセキュリティの研究者に世界の最新の研究動向を紹介したい 国際会議で日本の研究者による発表が少ないので, 世界で研究成果をアピールしてもらいたい 私見が多分に含まれていますので, 一意見として参考にしていただければ幸いです. 発表手順 3 国際会議にみる最近の研究動向

More information

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke

More information

2008 : 80725872 1 2 2 3 2.1.......................................... 3 2.2....................................... 3 2.3......................................... 4 2.4 ()..................................

More information