2006 Indexed Fuzzy Vault 3ADM1117 3ADM3225

Size: px
Start display at page:

Download "2006 Indexed Fuzzy Vault 3ADM1117 3ADM3225"

Transcription

1 2006 Indexed Fuzzy Vault 3ADM1117 3ADM3225

2 1 1 2 Fuzzy Vault Scheme Reed-Solomon Indexed Fuzzy Vault ( ) ( ) i

3 ii

4 1 Juels Fuzzy Vault Scheme [1] Fuzzy Vault Scheme Fuzzy Vault Scheme RS RS Uludag [2] [3] 4.6 Fuzzy Vault Scheme RS Juels Fuzzy Vault Scheme 1

5 2 Fuzzy Vault Scheme 2.1 Fuzzy Vault Scheme s A ( ) ( ) A B A B s Fuzzy Vault Scheme Vault R [1] r Vault R t ( ) µ > 0 ( ) µ r t 3 qk t t ( ) q = 10 4 t = s A = {a 1, a 2,..., a n } s p A {a 1,..., a n } (x i, y i ) = (a i, p(a i )) p(0) = s i = n + 1,..., r A y i p(x i ) (x i, y i ) A Vault( ) R x i 2.3 A B = {b 1, b 2, b 3,..., b n } Vault R b i x j (b i, y j ) Q A B Q s 2

6 3 ( ) 3.1 Reed-Solomon Reed-Solomon ( RS ) ( ) CD DVD ADSL RFID QR 3

7 3.2 RS RS 2 p GF (2 p ) 2 p 2 p RS (n, k)rs n k n k t = (n k)/2 GF (x α)(x α 2 )(x α 3 ) V (x) G(x) W (x) = x 2t V (x) + R R = x 2t V (x) mod G(x) ( ) Y (x) x 2t 4

8 RS ( ) NFIS RS.java RS GF Point.java NFIS2 MINDTCT MIN MIN MainFrame.java GUI RS (31,25)RS (63,25)RS 5

9 1: 6

10 NFIS RS 7

11 2: 3: 8

12 3.3.3 NFIS : 1 3 RS 3 19 NFIS2[6] Digital Persona U.are.U4000 Digital Persona Gold SDK Java version NFIS2 U.are.U 9

13 4 Indexed Fuzzy Vault 4.1 A x y Fuzzy Vault Scheme RS A B Vault R B 4.2 ( ) ( ) ( ) Step 1. x y n A = {a 1, a 2,..., a n } Step 2. s RS p A (x i, y i ) = (a i, p(a i )) i = 1,..., n y i i Vault R = {(1, x 1.y 1 ),..., (n, x n, y n )} Step 3. i = n + 1,..., r x i A y i p(x) (x j, y j ) Vault R R = R {(i mod n, x i, y i )} Vault R R = r r/n, (r/n) 1 Step 4. Vault R 10

14 4.2.2 ( ) Vault R ( ) B = {b 1, b 2,..., b n } s Q Step 5. i = i,..., n b i R {x 1,..., x r } d(b i, x j ) = (x i x j ) 2 + (y i y j ) 2 (j, x j, y j ) d(b i, x j ) (j, x j, y j ) R Q Q = Q {(i, x j, y j )} r n Step 6. Q i RS Step 7. s 11

15 NFIS2 RS 2: Digital Persona U.are.U4000 Digital Persona Gold SDK Java version NIST NFIS2[6] NFIS2 MIN MIN MIN NFIS2 NIST Fingerprint Image Software 2 NIST 7 MINDTCT IMGTOOL NFIS2 MIN 1. U.are.U.U.are.U BMP 2. TeraTerm noisy 3. BMP JPG /usr/local/nfis/bin/cjpeg -grayscale [ BMP ] [ JPG ] NFIS 12

16 /usr/local/nfis/bin/ 4. MIN /usr/local/nfis/bin/mindtct [ JPG ] [ ] mindtct ( ).brw.min /usr/local/nfis/bin/mindtct finger.jpg finger finger.brw RAW finger.min ( ) MIN 1 1 MN MX MY DIR REL TYP FTYP FN NX1 NY1 RC1:... MN MX X MY Y DIR REL TYP BIF RIG /home/share/biometrics/nfis2/doc/nfis2.pdf 13

17 t r/n r/n t 2 (FAR) (FRR) 50 FRR FAR i = 1,..., n r/n 1 4 r = n t 5 t = 6 r/n 6 FAR FRR FAR FRR probability error correcting t [block] 4: t 14

18 0.4 FAR FRR probability chaff ratio ( = r / n) 5: r/n FRR FAR 6: FAR FRR 15

19 5.2.2 U.are.U 4000 DigitalPersona SDK U.are.U 5 FAR FRR U.are.U 3: FAR( ) FRR( ) A B C D E F G H I J / /500 16

20 4: FAR( ) FRR( ) : Indexed Fuzzy Vault FAR( ) FRR( ) Indexed Fuzzy Vault U.are.U U.are.U GF 7 t[block] 8 Uludag [2] Uludag n ( 22 n ) T [ms] T ( n t ) y = αe βx α β. Uludag 17

21 GF(2^9) GF(2^10) GF(2^11) 2500 processing time [ms] error correcting t [block] 7: t 1e+006 proposal method Uludag s method processing time [ms] error correcting t [block] 8: Uludag [2] 18

22 5.2.4 n r t (FAR) ( 1 ) n t r/n + 1 n = 22 r = 22 t = [3] 1 8 or Uludag x y 16 x y Uludag Uludag. 19

23 80 70 y-coordinate x-coordinate 9: 100 Oki frequency value of minutiae 10: [3] 20

24 100 Uldag frequency value of calculate minutiae 11: Uludag [2] 5.3 r/n = 1 t = 6 FAR=0 FRR= U.are.U FAR U.are.U FRR U.are.U Uludag 2 Uludag MSB 21

25 6: Uludag x y ( or ) x y 6 Fuzzy VaultScheme Indexed Fuzzy Vault FAR=0 FRR= [ms] Fuzzy Extractor 22

26 [1] A. Juels, M. Sudan, A Fuzzy Vault Scheme, International Symposium on Information Theory, p. 408, IEEE Press, Lausanne, Switzerland, [2] U. Uludag, S. Pankanti and A. Jain. Fuzzy Vault for Fingerprints, Proc. of Audio- and Video-based Biometric Person Authentication (AVBPA) 2005, pp , Rye Brook, NY, July [3] Fuzzy Biometric Vault Scheme SCIS2005 pp [4] [5] [6] NIST FINGERPRINT IMAGE SOFTWARE 2 (NFIS2), [7] Fuzzy Vault SCIS

27 24

2007 CME

2007 CME 2007 CME 1 1 2 2 2.1 NIST Fingerprint Image Software 2.............. 2 2.2 M(i)-tuple............................ 2 2.2.1 M(i)-tuple................... 3 2.2.2............ 4 2.3 Common Minutiae Extractor..................

More information

2008

2008 2008 1 1 2 2 2.1 NIST Fingerprint Image Software 2.............. 2 2.2 Reference Vector........................ 2 2.2.1.................. 2 2.2.2.................. 4 3 5 3.1............................

More information

研修コーナー

研修コーナー l l l l l l l l l l l α α β l µ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l

More information

生体認証システムにおける情報漏洩対策技術の研究動向

生体認証システムにおける情報漏洩対策技術の研究動向 ATM 1 IC ATM ATM IC IC ATM E-mail: masataka.suzuki@boj.or.jp E-mail: inuma.manabu@aist.go.jp E-mail: a-otsuka@aist.go.jp //2010.4 229 1. 2004 ATM PC ATM FISC FISC [2009] FISC [2009] 35-1 ATM IC ATM ATM

More information

one way two way (talk back) (... ) C.E.Shannon 1948 A Mathematical theory of communication. 1 ( ) 0 ( ) 1

one way two way (talk back) (... ) C.E.Shannon 1948 A Mathematical theory of communication. 1 ( ) 0 ( ) 1 1 1.1 1.2 one way two way (talk back) (... ) 1.3 0 C.E.Shannon 1948 A Mathematical theory of communication. 1 ( ) 0 ( ) 1 ( (coding theory)) 2 2.1 (convolution code) (block code), 3 3.1 Q q Q n Q n 1 Q

More information

1 911 9001030 9:00 A B C D E F G H I J K L M 1A0900 1B0900 1C0900 1D0900 1E0900 1F0900 1G0900 1H0900 1I0900 1J0900 1K0900 1L0900 1M0900 9:15 1A0915 1B0915 1C0915 1D0915 1E0915 1F0915 1G0915 1H0915 1I0915

More information

(1) (2) (1) (2) 2 3 {a n } a 2 + a 4 + a a n S n S n = n = S n

(1) (2) (1) (2) 2 3 {a n } a 2 + a 4 + a a n S n S n = n = S n . 99 () 0 0 0 () 0 00 0 350 300 () 5 0 () 3 {a n } a + a 4 + a 6 + + a 40 30 53 47 77 95 30 83 4 n S n S n = n = S n 303 9 k d 9 45 k =, d = 99 a d n a n d n a n = a + (n )d a n a n S n S n = n(a + a n

More information

x, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y)

x, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y) x, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 1 1977 x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y) ( x 2 y + xy 2 x 2 2xy y 2) = 15 (x y) (x + y) (xy

More information

A, B, C. (1) A = A. (2) A = B B = A. (3) A = B, B = C A = C. A = B. (3)., f : A B g : B C. g f : A C, A = C. 7.1, A, B,. A = B, A, A A., A, A

A, B, C. (1) A = A. (2) A = B B = A. (3) A = B, B = C A = C. A = B. (3)., f : A B g : B C. g f : A C, A = C. 7.1, A, B,. A = B, A, A A., A, A 91 7,.,, ( ).,,.,.,. 7.1 A B, A B, A = B. 1), 1,.,. 7.1 A, B, 3. (i) A B. (ii) f : A B. (iii) A B. (i) (ii)., 6.9, (ii) (iii).,,,. 1), Ā = B.. A, Ā, Ā,. 92 7 7.2 A, B, C. (1) A = A. (2) A = B B = A. (3)

More information

名古屋工業大の数学 2000 年 ~2015 年 大学入試数学動画解説サイト

名古屋工業大の数学 2000 年 ~2015 年 大学入試数学動画解説サイト 名古屋工業大の数学 年 ~5 年 大学入試数学動画解説サイト http://mathroom.jugem.jp/ 68 i 4 3 III III 3 5 3 ii 5 6 45 99 5 4 3. () r \= S n = r + r + 3r 3 + + nr n () x > f n (x) = e x + e x + 3e 3x + + ne nx f(x) = lim f n(x) lim

More information

4 4 θ X θ P θ 4. 0, 405 P 0 X 405 X P 4. () 60 () 45 () 40 (4) 765 (5) 40 B 60 0 P = 90, = ( ) = X

4 4 θ X θ P θ 4. 0, 405 P 0 X 405 X P 4. () 60 () 45 () 40 (4) 765 (5) 40 B 60 0 P = 90, = ( ) = X 4 4. 4.. 5 5 0 A P P P X X X X +45 45 0 45 60 70 X 60 X 0 P P 4 4 θ X θ P θ 4. 0, 405 P 0 X 405 X P 4. () 60 () 45 () 40 (4) 765 (5) 40 B 60 0 P 0 0 + 60 = 90, 0 + 60 = 750 0 + 60 ( ) = 0 90 750 0 90 0

More information

24 201170068 1 4 2 6 2.1....................... 6 2.1.1................... 6 2.1.2................... 7 2.1.3................... 8 2.2..................... 8 2.3................. 9 2.3.1........... 12

More information

2012 A, N, Z, Q, R, C

2012 A, N, Z, Q, R, C 2012 A, N, Z, Q, R, C 1 2009 9 2 2011 2 3 2012 9 1 2 2 5 3 11 4 16 5 22 6 25 7 29 8 32 1 1 1.1 3 1 1 1 1 1 1? 3 3 3 3 3 3 3 1 1, 1 1 + 1 1 1+1 2 2 1 2+1 3 2 N 1.2 N (i) 2 a b a 1 b a < b a b b a a b (ii)

More information

waseda2010a-jukaiki1-main.dvi

waseda2010a-jukaiki1-main.dvi November, 2 Contents 6 2 8 3 3 3 32 32 33 5 34 34 6 35 35 7 4 R 2 7 4 4 9 42 42 2 43 44 2 5 : 2 5 5 23 52 52 23 53 53 23 54 24 6 24 6 6 26 62 62 26 63 t 27 7 27 7 7 28 72 72 28 73 36) 29 8 29 8 29 82 3

More information

[I486S] 暗号プロトコル理論

[I486S]  暗号プロトコル理論 [I486S] 2018 5 1 (JAIST) 2018 5 1 1 / 22 : I486S I URL:https://wwwjaistacjp/~fujisaki/i486S (Tuesdays) 5 17:10 18:50 4/17, 4/24, 5/1, 5/15, 5/22, 5/29, 6/5, 6/19, 6/26, 7/3, 7/10, 7/17, 7/24, 7/31 (JAIST)

More information

85 4

85 4 85 4 86 Copright c 005 Kumanekosha 4.1 ( ) ( t ) t, t 4.1.1 t Step! (Step 1) (, 0) (Step ) ±V t (, t) I Check! P P V t π 54 t = 0 + V (, t) π θ : = θ : π ) θ = π ± sin ± cos t = 0 (, 0) = sin π V + t +V

More information

r 1 m A r/m i) t ii) m i) t B(t; m) ( B(t; m) = A 1 + r ) mt m ii) B(t; m) ( B(t; m) = A 1 + r ) mt m { ( = A 1 + r ) m } rt r m n = m r m n B

r 1 m A r/m i) t ii) m i) t B(t; m) ( B(t; m) = A 1 + r ) mt m ii) B(t; m) ( B(t; m) = A 1 + r ) mt m { ( = A 1 + r ) m } rt r m n = m r m n B 1 1.1 1 r 1 m A r/m i) t ii) m i) t Bt; m) Bt; m) = A 1 + r ) mt m ii) Bt; m) Bt; m) = A 1 + r ) mt m { = A 1 + r ) m } rt r m n = m r m n Bt; m) Aert e lim 1 + 1 n 1.1) n!1 n) e a 1, a 2, a 3,... {a n

More information

c2

c2 c1 c2 Digital Image Innovation 1 2002 2003 2003... 1,274,109 1,322,453 $11,002,105... 336,108 362,588 3,016,539... 309,912 313,228 2,605,890... 26,196 49,360 410,649... (18,382) 31,629 263,136... (18,432)

More information

入試の軌跡

入試の軌跡 4 y O x 4 Typed by L A TEX ε ) ) ) 6 4 ) 4 75 ) http://kumamoto.s.xrea.com/plan/.. PDF) Ctrl +L) Ctrl +) Ctrl + Ctrl + ) ) Alt + ) Alt + ) ESC. http://kumamoto.s.xrea.com/nyusi/kumadai kiseki ri i.pdf

More information

12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1

12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1 12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1 Biometrics Biometrics 01.9.11 2003/3/6 Copy ight (C) NEC Corporation 2 AFIS Internet ID(PID) 2003/3/6 Copy ight (C) NEC Corporation 3 2003/3/6 Copy ight

More information

2 2 MATHEMATICS.PDF 200-2-0 3 2 (p n ), ( ) 7 3 4 6 5 20 6 GL 2 (Z) SL 2 (Z) 27 7 29 8 SL 2 (Z) 35 9 2 40 0 2 46 48 2 2 5 3 2 2 58 4 2 6 5 2 65 6 2 67 7 2 69 2 , a 0 + a + a 2 +... b b 2 b 3 () + b n a

More information

( )

( ) 18 10 01 ( ) 1 2018 4 1.1 2018............................... 4 1.2 2018......................... 5 2 2017 7 2.1 2017............................... 7 2.2 2017......................... 8 3 2016 9 3.1 2016...............................

More information

Microsoft PowerPoint Sumi-Protection.ppt

Microsoft PowerPoint Sumi-Protection.ppt 生体認証テンプレート保護技術の動向 鷲見和彦三菱電機株式会社先端技術総合研究所 2007/3/9 WS: 生体情報の漏洩と対策 1 背景 バイオメトリクス個人認証の普及 システムの大規模化 オープン化 パスポートなど公的個人認証 登録システムと認証システムが分かれる 類似した応用システムが多数存在する 物理セキュリティ ( 住宅 企業 会員専用 ) 情報セキュリティ ( 業務系認証 商取引 ) 利便目的のカジュアルな応用が現れる

More information

86 6 r (6) y y d y = y 3 (64) y r y r y r ϕ(x, y, y,, y r ) n dy = f(x, y) (6) 6 Lipschitz 6 dy = y x c R y(x) y(x) = c exp(x) x x = x y(x ) = y (init

86 6 r (6) y y d y = y 3 (64) y r y r y r ϕ(x, y, y,, y r ) n dy = f(x, y) (6) 6 Lipschitz 6 dy = y x c R y(x) y(x) = c exp(x) x x = x y(x ) = y (init 8 6 ( ) ( ) 6 ( ϕ x, y, dy ), d y,, dr y r = (x R, y R n ) (6) n r y(x) (explicit) d r ( y r = ϕ x, y, dy ), d y,, dr y r y y y r (6) dy = f (x, y) (63) = y dy/ d r y/ r 86 6 r (6) y y d y = y 3 (64) y

More information

17 ( ) II III A B C(100 ) 1, 2, 6, 7 II A B (100 ) 2, 5, 6 II A B (80 ) 8 10 I II III A B C(80 ) 1 a 1 = 1 2 a n+1 = a n + 2n + 1 (n = 1,

17 ( ) II III A B C(100 ) 1, 2, 6, 7 II A B (100 ) 2, 5, 6 II A B (80 ) 8 10 I II III A B C(80 ) 1 a 1 = 1 2 a n+1 = a n + 2n + 1 (n = 1, 17 ( ) 17 5 1 4 II III A B C(1 ) 1,, 6, 7 II A B (1 ), 5, 6 II A B (8 ) 8 1 I II III A B C(8 ) 1 a 1 1 a n+1 a n + n + 1 (n 1,,, ) {a n+1 n } (1) a 4 () a n OA OB AOB 6 OAB AB : 1 P OB Q OP AQ R (1) PQ

More information

Taro13-第6章(まとめ).PDF

Taro13-第6章(まとめ).PDF % % % % % % % % 31 NO 1 52,422 10,431 19.9 10,431 19.9 1,380 2.6 1,039 2.0 33,859 64.6 5,713 10.9 2 8,292 1,591 19.2 1,591 19.2 1,827 22.0 1,782 21.5 1,431 17.3 1,661 20.0 3 1,948 1,541 79.1 1,541 79.1

More information

Computer Security Symposium October ,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) [1] 1 Meiji U

Computer Security Symposium October ,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) [1] 1 Meiji U Computer Security Symposium 017 3-5 October 017 1,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) 1. 017 5 [1] 1 Meiji University Graduate School of Advanced Mathematical Science

More information

三石貴志.indd

三石貴志.indd 流通科学大学論集 - 経済 情報 政策編 - 第 21 巻第 1 号,23-33(2012) SIRMs SIRMs Fuzzy fuzzyapproximate approximatereasoning reasoningusing using Lukasiewicz Łukasiewicz logical Logical operations Operations Takashi Mitsuishi

More information

untitled

untitled 1 SS 2 2 (DS) 3 2.1 DS................................ 3 2.2 DS................................ 4 2.3.................................. 4 2.4 (channel papacity)............................ 6 2.5........................................

More information

理解のための教材開発と授業 (宮内).PDF

理解のための教材開発と授業 (宮内).PDF - 25 - Y ( ) () () Y - 26 - CD Y Y Y Y Y Y Y - 27-10 11 12 Y Y - 28 - Y 100 6 2 4 Y PTA Y Y Y - 29 - 1 Y Y Y Y - 32 - T Y Y Y T Y Y T Y T Y T Y T T Y Y T db Y Y T Y B T - 34 - T Y Y T Y T Y T Y Y T

More information

第86回日本感染症学会総会学術集会後抄録(I)

第86回日本感染症学会総会学術集会後抄録(I) κ κ κ κ κ κ μ μ β β β γ α α β β γ α β α α α γ α β β γ μ β β μ μ α ββ β β β β β β β β β β β β β β β β β β γ β μ μ μ μμ μ μ μ μ β β μ μ μ μ μ μ μ μ μ μ μ μ μ μ β

More information

ばらつき抑制のための確率最適制御

ばらつき抑制のための確率最適制御 ( ) http://wwwhayanuemnagoya-uacjp/ fujimoto/ 2011 3 9 11 ( ) 2011/03/09-11 1 / 46 Outline 1 2 3 4 5 ( ) 2011/03/09-11 2 / 46 Outline 1 2 3 4 5 ( ) 2011/03/09-11 3 / 46 (1/2) r + Controller - u Plant y

More information

FrontSystem FrontSystem

FrontSystem FrontSystem My PAGE View http://www.page-view.jp/ FrontSystem FrontSystem FrontSystemMy PAGE View or FrontSystem Web FrontSystem JPG FrontSystem My PAGE View FrontSystem FrontSystem Web FrontSystem Web 3. 1050 Pro

More information

main.dvi

main.dvi CDMA 1 CDMA ( ) CDMA CDMA CDMA 1 ( ) Hopfield [1] Hopfield 1 E-mail: okada@brain.riken.go.jp 1 1: 1 [] Hopfield Sourlas Hopfield [3] Sourlas 1? CDMA.1 DS/BPSK CDMA (Direct Sequence; DS) (Binary Phase-Shift-Keying;

More information

H28.4 / 11 28 7 1 28 28 1 27 29 30 4 1 29 5 5 2 2 1 2 2 28 3 1 28 http://www.city.saitama.jp/005/001/018/003/p036471.html 2 28 7 11 28 8 31 3 CD DVD 4 4 5 7 11 8 31 9 1 9 30 10 1 10 31 11 1 11

More information

熊本県数学問題正解

熊本県数学問題正解 00 y O x Typed by L A TEX ε ( ) (00 ) 5 4 4 ( ) http://www.ocn.ne.jp/ oboetene/plan/. ( ) (009 ) ( ).. http://www.ocn.ne.jp/ oboetene/plan/eng.html 8 i i..................................... ( )0... (

More information

JIS Z803: (substitution method) 3 LCR LCR GPIB

JIS Z803: (substitution method) 3 LCR LCR GPIB LCR NMIJ 003 Agilent 8A 500 ppm JIS Z803:000 50 (substitution method) 3 LCR LCR GPIB Taylor 5 LCR LCR meter (Agilent 8A: Basic accuracy 500 ppm) V D z o I V DUT Z 3 V 3 I A Z V = I V = 0 3 6 V, A LCR meter

More information

pp d 2 * Hz Hz 3 10 db Wind-induced noise, Noise reduction, Microphone array, Beamforming 1

pp d 2 * Hz Hz 3 10 db Wind-induced noise, Noise reduction, Microphone array, Beamforming 1 72 12 2016 pp. 739 748 739 43.60.+d 2 * 1 2 2 3 2 125 Hz 0.3 0.8 2 125 Hz 3 10 db Wind-induced noise, Noise reduction, Microphone array, Beamforming 1. 1.1 PSS [1] [2 4] 2 Wind-induced noise reduction

More information

1 2 3 4 5 1 1 136 2 137 2 1 1 138 2 1 2 139 140 141 142 3 143 3 144 145 4 1 2 146 3 4 147 5 1 2 3 148 1 2 149 3 5 1 2 150 3 151 1 152 2 153 6 1 2 154 3 155 4 1 156 2 3 4 5 157 7 1 2 3 4 158 5 159 6 8 1

More information

2 4 2 3 4 3 [12] 2 3 4 5 1 1 [5, 6, 7] [5, 6] [7] 1 [8] 1 1 [9] 1 [10, 11] [10] [11] 1 [13, 14] [13] [14] [13, 14] [10, 11, 13, 14] 1 [12]

2 4 2 3 4 3 [12] 2 3 4 5 1 1 [5, 6, 7] [5, 6] [7] 1 [8] 1 1 [9] 1 [10, 11] [10] [11] 1 [13, 14] [13] [14] [13, 14] [10, 11, 13, 14] 1 [12] Walking Person Recognition by Matching Video Fragments Masashi Nishiyama, Mayumi Yuasa, Tomokazu Wakasugi, Tomoyuki Shibata, Osamu Yamaguchi ( ), Corporate Research and Development Center, TOSHIBA Corporation

More information

1

1 1 2 3 4 5 6 7 8 9 0 1 2 6 3 1 2 3 4 5 6 7 8 9 0 5 4 STEP 02 STEP 01 STEP 03 STEP 04 1F 1F 2F 2F 2F 1F 1 2 3 4 5 http://smarthouse-center.org/sdk/ http://smarthouse-center.org/inquiries/ http://sh-center.org/

More information

P072-076.indd

P072-076.indd 3 STEP0 STEP1 STEP2 STEP3 STEP4 072 3STEP4 STEP3 STEP2 STEP1 STEP0 073 3 STEP0 STEP1 STEP2 STEP3 STEP4 074 3STEP4 STEP3 STEP2 STEP1 STEP0 075 3 STEP0 STEP1 STEP2 STEP3 STEP4 076 3STEP4 STEP3 STEP2 STEP1

More information

STEP1 STEP3 STEP2 STEP4 STEP6 STEP5 STEP7 10,000,000 2,060 38 0 0 0 1978 4 1 2015 9 30 15,000,000 2,060 38 0 0 0 197941 2016930 10,000,000 2,060 38 0 0 0 197941 2016930 3 000 000 0 0 0 600 15

More information

untitled

untitled 2001 9 11 5 () IC ICAO(ICAO-TR) (GSC-IS) / ISO/IEC CD 19794-5 5 8 ICAO-NTWG SC17/WG3 16 3 31 Personal ID Documents 1 ------------------------------------------------------------------ 3 2 ---------------------------------------------------------------------

More information

I A A441 : April 21, 2014 Version : Kawahira, Tomoki TA (Kondo, Hirotaka ) Google

I A A441 : April 21, 2014 Version : Kawahira, Tomoki TA (Kondo, Hirotaka ) Google I4 - : April, 4 Version :. Kwhir, Tomoki TA (Kondo, Hirotk) Google http://www.mth.ngoy-u.c.jp/~kwhir/courses/4s-biseki.html pdf 4 4 4 4 8 e 5 5 9 etc. 5 6 6 6 9 n etc. 6 6 6 3 6 3 7 7 etc 7 4 7 7 8 5 59

More information

( 9 1 ) 1 2 1.1................................... 2 1.2................................................. 3 1.3............................................... 4 1.4...........................................

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

Solutions to Quiz 1 (April 20, 2007) 1. P, Q, R (P Q) R Q (P R) P Q R (P Q) R Q (P R) X T T T T T T T T T T F T F F F T T F T F T T T T T F F F T T F

Solutions to Quiz 1 (April 20, 2007) 1. P, Q, R (P Q) R Q (P R) P Q R (P Q) R Q (P R) X T T T T T T T T T T F T F F F T T F T F T T T T T F F F T T F Quiz 1 Due at 10:00 a.m. on April 20, 2007 Division: ID#: Name: 1. P, Q, R (P Q) R Q (P R) P Q R (P Q) R Q (P R) X T T T T T T F T T F T T T F F T F T T T F T F T F F T T F F F T 2. 1.1 (1) (7) p.44 (1)-(4)

More information

1 n A a 11 a 1n A =.. a m1 a mn Ax = λx (1) x n λ (eigenvalue problem) x = 0 ( x 0 ) λ A ( ) λ Ax = λx x Ax = λx y T A = λy T x Ax = λx cx ( 1) 1.1 Th

1 n A a 11 a 1n A =.. a m1 a mn Ax = λx (1) x n λ (eigenvalue problem) x = 0 ( x 0 ) λ A ( ) λ Ax = λx x Ax = λx y T A = λy T x Ax = λx cx ( 1) 1.1 Th 1 n A a 11 a 1n A = a m1 a mn Ax = λx (1) x n λ (eigenvalue problem) x = ( x ) λ A ( ) λ Ax = λx x Ax = λx y T A = λy T x Ax = λx cx ( 1) 11 Th9-1 Ax = λx λe n A = λ a 11 a 12 a 1n a 21 λ a 22 a n1 a n2

More information

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 1, 2 1 1 1 Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 Nobutaka ONO 1 and Shigeki SAGAYAMA 1 This paper deals with instrument separation

More information

Riemann-Stieltjes Poland S. Lojasiewicz [1] An introduction to the theory of real functions, John Wiley & Sons, Ltd., Chichester, 1988.,,,,. Riemann-S

Riemann-Stieltjes Poland S. Lojasiewicz [1] An introduction to the theory of real functions, John Wiley & Sons, Ltd., Chichester, 1988.,,,,. Riemann-S Riemnn-Stieltjes Polnd S. Lojsiewicz [1] An introduction to the theory of rel functions, John Wiley & Sons, Ltd., Chichester, 1988.,,,, Riemnn-Stieltjes 1 2 2 5 3 6 4 Jordn 13 5 Riemnn-Stieltjes 15 6 Riemnn-Stieltjes

More information

f(x) = f(x ) + α(x)(x x ) α(x) x = x. x = f (y), x = f (y ) y = f f (y) = f f (y ) + α(f (y))(f (y) f (y )) f (y) = f (y ) + α(f (y)) (y y ) ( (2) ) f

f(x) = f(x ) + α(x)(x x ) α(x) x = x. x = f (y), x = f (y ) y = f f (y) = f f (y ) + α(f (y))(f (y) f (y )) f (y) = f (y ) + α(f (y)) (y y ) ( (2) ) f 22 A 3,4 No.3 () (2) (3) (4), (5) (6) (7) (8) () n x = (x,, x n ), = (,, n ), x = ( (x i i ) 2 ) /2 f(x) R n f(x) = f() + i α i (x ) i + o( x ) α,, α n g(x) = o( x )) lim x g(x) x = y = f() + i α i(x )

More information

Microsoft PowerPoint - 201409_秀英体の取組み素材(予稿集).ppt

Microsoft PowerPoint - 201409_秀英体の取組み素材(予稿集).ppt 1 2 3 4 5 6 7 8 9 10 11 No Image No Image 12 13 14 15 16 17 18 19 20 21 22 23 No Image No Image No Image No Image 24 No Image No Image No Image No Image 25 No Image No Image No Image No Image 26 27 28

More information

(1) PQ (2) () 2 PR = PR P : P = R : R (2) () = P = P R M = XM : = M : M (1) (2) = N = N X M 161 (1) (2) F F = F F F EF = F E

(1) PQ (2) () 2 PR = PR P : P = R : R (2) () = P = P R M = XM : = M : M (1) (2) = N = N X M 161 (1) (2) F F = F F F EF = F E 5 1 1 1.1 2 159 O O PQ RS OR P = PQ P O M MQ O (1) M P (2) P : P R : R () PR P 160 > M : = M : M X (1) N = N M // N X M (2) M 161 (1) E = 8 = 4 = = E = (2) : = 2 : = E = E F 5 F EF F E 5 1 159 (1) PQ (2)

More information

No. 3 Oct The person to the left of the stool carried the traffic-cone towards the trash-can. α α β α α β α α β α Track2 Track3 Track1 Track0 1

No. 3 Oct The person to the left of the stool carried the traffic-cone towards the trash-can. α α β α α β α α β α Track2 Track3 Track1 Track0 1 ACL2013 TACL 1 ACL2013 Grounded Language Learning from Video Described with Sentences (Yu and Siskind 2013) TACL Transactions of the Association for Computational Linguistics What Makes Writing Great?

More information

() n C + n C + n C + + n C n n (3) n C + n C + n C 4 + n C + n C 3 + n C 5 + (5) (6 ) n C + nc + 3 nc n nc n (7 ) n C + nc + 3 nc n nc n (

() n C + n C + n C + + n C n n (3) n C + n C + n C 4 + n C + n C 3 + n C 5 + (5) (6 ) n C + nc + 3 nc n nc n (7 ) n C + nc + 3 nc n nc n ( 3 n nc k+ k + 3 () n C r n C n r nc r C r + C r ( r n ) () n C + n C + n C + + n C n n (3) n C + n C + n C 4 + n C + n C 3 + n C 5 + (4) n C n n C + n C + n C + + n C n (5) k k n C k n C k (6) n C + nc

More information

NL09

NL09 Information September, 2005 1 2 Japanese Association for Molecular Target Therapy of Cancer News Letter No.9 September, 2005 3 2005 4 Japanese Association for Molecular Target Therapy of Cancer News Letter

More information

H22 BioS (i) I treat1 II treat2 data d1; input group patno treat1 treat2; cards; ; run; I

H22 BioS (i) I treat1 II treat2 data d1; input group patno treat1 treat2; cards; ; run; I H BioS (i) I treat II treat data d; input group patno treat treat; cards; 8 7 4 8 8 5 5 6 ; run; I II sum data d; set d; sum treat + treat; run; sum proc gplot data d; plot sum * group ; symbol c black

More information

Otsuma Nakano Senior High School Spring Seminar Mathematics B

Otsuma Nakano Senior High School Spring Seminar Mathematics B Otsuma Nakano Senior High School Spring Seminar Mathematics B 2 a d a n = a + (n 1)d 1 2 ( ) {( ) + ( )} = n 2 {2a + (n 1)d} a r a n = ar n 1 a { r ( ) 1 } r 1 = a { 1 r ( )} 1 r (r 1) n 1 = n k=1 n k

More information