2??? 1959 DTN Application Protocol Data Units(APDU) 6) IP 1 DTN PBR TCTR TCTR (1) ( TCTR ) (2) ( 3.3 ) 2000[m] 2000[m] 100 (3) (4) (5) 2 3 TCTR
|
|
- かつかげ すすむ
- 7 years ago
- Views:
Transcription
1 Vol. 0 No. 0??? 1959 DTN 1 1 Delay (or Disruption) Tolerant Networks(DTN) DTN Potential-Based Routing(PBR) DTN Topology Change Tolerant Routing(TCTR) TCTR TCTR 100 Topology Change Tolerant Routing for Delay Tolerant Networks Hideya Ochiai 1 and Hiroshi Esaki 1 Delay (or Disruption) Tolerant Networks (DTN) are promised as an efficient message delivery scheme in physically unstable networks like wireless networks. However, because datalinks could be physically disrupted in DTN environment, global synchronization in the network is absolutely difficult, which indicates the traditional routing schemes cannot work appropriately. We propose Topology Change Tolerant Routing (TCTR), which do not need global synchronization in the network for message delivery. In fact, TCTR is a instance of Potential-Based Routing(PBR) which selects the next hop of messages only using the relative information with its neighbor nodes. We have developed a prototype system and TCTR simulator. We have confirmed that the implementation of TCTR is feasible. We have also evaluated TCTR in terms of message delivery time, transmission cost and message pool size with the simulator. 1. MANET Delay (or Disruption) Tolerant Networks(DTN) IP TCP DTN DTN ( ) DTN 1 The University of Tokyo (e.g., RIP 14), OSPF 16), MPLS 18), AODV 17) ) DTN Topology Change Tolerant Routing(TCTR) TCTR Potential-Based Routing(PBR) TCTR 1
2 2??? 1959 DTN Application Protocol Data Units(APDU) 6) IP 1 DTN PBR TCTR TCTR (1) ( TCTR ) (2) ( 3.3 ) 2000[m] 2000[m] 100 (3) (4) (5) 2 3 TCTR Delay (or Disruption) Tolerant Networks (DTN) 3) Epidemic Routing 20) Spray and Wait 19) (i.e., ) (i.e., ) Merugu 15) Leguay MobySpace 10) PROPHET 12) Francois 4) PBR (Gradient Descent Search) Basu 1)
3 Vol. 0 No. 0 DTN 3 Anycast 9)11) Volcano Routing Scheme(VRS) 5) PBR PWave 13) ZebraNet 8) History-based Protocol PBR DTN 3. TCTR TCTR PBR TCTR G = (N, E) G n( N) nbr(n) n n d( N) t d n V d (n, t) V d (n, t) d 3.1 Potential-Based Routing(PBR) t n d M d (n, t) k nbr(n) F d k (n, t) F d k (n, t) {V d (k, t) V d (n, t)} (1) M d (n, t) nexthop d (n, t) PBR k nbr(n), F d k (n, t) α nexthop d (n, t) = Φ (2) k nbr(n), F d k (n, t) > α nexthop d (n, t) = {k F d k (n, t) = max Fk d (n, t)} (3) k nbr(n) α 2 α 1 Potential-Based Routing(PBR) Fig. 1 Potential-Based Routing(PBR) (Φ ) 3 α 1 d 1 PBR G n k 1, k 2 k 1 n k 1 d PBR 3.2 PBR 2,3 1
4 4??? d = n6 Fig. 2 Potential formation and message delivery path for destination d = n6 in a physically connected network. V d (n, t + 1) = V d (n, t) + D min k nbr(n) {0, V d (k, t) V d (n, t)} +ρ (4) d N tv d (d, t) = 0 (5) n N V d (n, 0) = 0 (6) V d (n, t) D(0 < D < 1) ρ(0 < ρ < D) V d (n, t) 3 ( 2) 2 d = n6 V n6 (n, t) 2 n6 ( 3) G 1 = (N 1, E 1 ), G 2 = (N 2, E 2 ) G 1 (i.e., d N 1 ) N 2 3 n2 n4 ; n0, n1, n2, n3 ρ Fig. 3 Potential formation when n2 n4 link has been disrupted. Potentials of n0, n1, n2, n3 goes up with the velocity of ρ. (c ) n N2 V d (n, t) ρt + c (7) (t ) 3 {n0,..., n3} ρ {n0,..., n3} ( 4) 4 n1 n5 4 {n0,..., n3} (i.e., ) 4 d d
5 Vol. 0 No. 0 DTN 5 4 n1 n5 n0, n1, n2, n3 Fig. 4 When n1 n5 link has been setup, potentials of n0, n1, n2, n3 goes down with making message delivery curves k nbr(n) V d (k, t) t TCTR n k ( V d n (k, t) ) k V d k (k, t) T V d k (k, t) V d k (k, t T ) = V d k (k, t) V d n (k, t) (8) V d n (k, t) V d k (k, t) T V d n (n, t) t (9) 4 i N, V d i (i, t) = V (t) V(t) 3 2,3 α = 0 nexthop d (n, t) = Φ 7 Vk d V (t) (n, t) V (t) T t 1 Fk d V (t) (n, t) = T t (10) (11) ( V (T ) t > 0) 3 nexthop d (n, t) = k nbr(n) k (12) 1 5 A, B, C A B C A C B C C A, B C A B B A C B B B C A
6 6??? 1959 Fig. 5 5 An example of message overflow phenomenon 4 n ( 1 ) Advertisement Manager: UDP Multicast 6 Fig. 6 Prototype System Overview 2,3 α β β < α (13) α β 9 β = T max V d (n, t) t 4 max V d (n, t) t (14) = ρ (15) β = ρ T (16) k nbr(n) V (k, t), V (n, t) Multicast Socket V (k, t) PotentialTable PotentialTable n V (n, t) UDP Multicast ( 2 ) Potential Table: k nbr(n) V (k, t) V (n, t) V (n, t + 1) 4 ( 3 ) Forwarding Table: Potential Table V d (n, t) k nbr(n) V d (k, t) 2 3 d ( 4 ) Message Manager: Message Manager (Send) Message Manager n (Receive) n d Forwarding Table ACK
7 Vol. 0 No. 0 DTN 7 7 Fig. 7 TCTR Simulator Overview Message Manager () Forwarding Table () () (Send) (Receive) C OS Linux g 4.2 TCTR 7 3 ( 1 ) Node: Node Node Node Locator ( ) ( 2 ) Node Locator: Node (2 ) ( 3 ) Mobility Manager: Node Locator () Forwarding Table () 8 Fig. 8 Mobility model used in the experiment () (Send) (Receive) Java JavaVM OS Linux Flooding-Based Routing(FBR) : (1) (2) (3) ( ) D ρ D = 0.2 ρ = Home A Home B Meeting Point
8 8??? Fig. 9 Potential patterns with the prototype-based experiment 10 Fig. 10 Potential patterns with the simulation-based experiment 1 4 Home A B 2 3 Home A B 2 3 Meeting Point Home A, Meeting Point, Home B ( )20m V 1 (n, t) t = 3600 t = 4800 (t 3600) n 1, n 2, n 3, n 4 1, t = 60 n 2 n 1 V (n 2, t) t = 580 n 3 n 2 V (n 3, t) 122 n 2 n 2 n 3 Meeting Point t = 1140 n 4 n 3 n 2 n 1 n 4 n 2 n n 3 n 1 TCTR 10 1 V 1 (n, t) t = 3600 t = 4800 ( (t 3600) ) C 16 0 < T < 1, ρ = α {0.000, 0.010, 0.015, 0.020, 0.025, 0.030} 5 1 α 3 5 Node A Node B (Status) A Node A B Node B Φ
9 Vol. 0 No. 0 DTN 9 Table 1 1 An Analysis of the Message Overflow Threshold α Node A Node B Status B B B A A A Φ B B A A Φ Φ Φ B A A Φ Φ B B Φ Φ Φ Φ Φ Φ Φ Φ Φ Φ Φ Φ Φ Φ Φ α α Flooding-Based Routing(FBR) FBR A( N) B( N) A B M A M B A B m M A m M B T ransfer A (m, B) (17) m M B m M A T ransfer B(m, A) (18) T ransfer X (m, Y ) X m Y m(m M A m M B) (19) m FBR FBR TCTR Time To Live(TTL) (FBR TCTR ) 11 Fig. 11 Delivery Time Relationship between FBR and TCTR 2000[m] 2000[m] 0 300[m] [m] [Hz] Random Way Point(RWP) 2) RWP t=0 t=10000 (t=10000 TCTR ) FBR T ime (F BR) TCTR T ime (T CT R) ( : ) T ime (T CT R) = T ime (F BR) T ime (T CT R) T ime (F BR) 12 T ime (T CT R) T ime F BR 33% (FBR) 2 50% 3
10 10??? 1959 Fig Efficiency in Delivery Time and its Distribution 14 Fig. 14 The Average Message Pool Size FBR TCTR 13 Fig. 13 The Total Message Transmission in the Network 10 5% FBR TCTR ( t = ) a( N) b( N, a b) FBR TCTR 10 FBR (=100 ) TCTR ( t = ) FBR TCTR 97 FBR = TCTR 6. β 3.3 TCTR α 100 FBR FBR
11 Vol.0 No.0 DTN 11 3 TCTR FBR TCTR 7) 7. DTN TCTR PBR TCTR TCTR 100 FBR ) Basu, A., Lin, A. and Ramanathan, S.: Routing Using Potentials: A Dynamic Traffic-Aware Routing Algorithm, ACM SIGCOMM 2003, pp (2003). 2) Bettstetter, C., Resta, G. and Santi, P.: The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks, IEEE Transactions on Mobile Computing, Vol.2, No.3, pp (2003). 3) Fall, K.: A Delay-Tolerant Network Architecture for Challenged Internets, ACM SIG- COMM 2003, pp (2003). 4) Francois, J.-M. and Leduc, G.: Delivery Guarantees in Predictable Disruption Tolerant Networks, Lecture Nodes in Computer Science, Vol.4479, pp (2007). 5) Ganjali, Y. and McKeown, N.: Routing in a Highly Dynamic Topology, IEEE SECON, pp (2005). 6) Iren, S., Amer, P.D. and Conrad, P.T.: The Transport Layer: Tutorial and Survey, ACM Computing Surverys, Vol.31, No.4, pp (1999). 7) Jain, S., Fall, K. and Patra, R.: Routing in a Delay Tolerant Network, ACM SIGCOMM 2004, pp (2004). 8) Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.-S. and Rubenstein, D.: Energy- Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet, ACM SIGOPS, pp (2002). 9) Kumar, P., Kuri, J., Nuggehalli, P., Strasser, M., May, M. and Plattner, B.: Connectivityaware Routing in Sensor Networks, IEEE SensorComm, pp (2007). 10) Leguay, J., Friedman, T. and Conan, V.: DTN Routing in a Mobility Pattern Space, ACM SIGCOMM workshop on Delay-tolerant networking, pp (2005). 11) Lenders, V., May, M. and Plattner, B.: Density-based vs. Proximity-based Anycast Routing for Mobile Networks, IEEE INFO- COM, pp.1 13 (2006). 12) Lindgren, A., Doria, A. and Schelen, O.: Probabilistic Routing in Intermittently Connected Networks, Lecture Nodes in Computer Science, Vol.3126, pp (2004). 13) Liu, H., Zhang, Z.-L., Srivastava, J. and Firoiu, V.: PWave: A Multi-source Multi-sink Anycast Routing Framework for Wireless Sensor Networks, Lecture Nodes in Computer Science, Vol.4479, pp (2007). 14) Malkin, G.: RFC2453: RIP Version 2 (1998). 15) Merugu, S., Ammar, M. and Zegura, E.: Routing in Space and Time in Networks with Predictable Mobility, Technical report, Georgia Institute of Technology (2004). 16) Moy, J.: RFC2328: OSPF Version 2 (1998). 17) Perkins, C., Belding-Royer, E. and Das, S.: RFC1058: Ad hoc On-Demand Distance Vector (AODV) Routing (2003). 18) Rosen, E., Viswanathan, A. and Callon, R.: RFC3031: Multiprotocol Label Switching Architecture (2001). 19) Spyropoulos, T., Psounis, K. and Raghaven-
12 12??? 1959 dra, C.S.: Spray and Wait: An Efficient Routing Scheme for Intermittently Connected Mobile Networks, ACM SIGCOMM workshop on Delay-tolerant networking, pp (2005). 20) Vahdat, A. and Becker, D.: Epidemic Routing for Partially-Connected Ad Hoc Networks, Technical report, Duke University (2000).
DTN DTN DTN DTN i
28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee
More information1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2
DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web
More informationTCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of
IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN
More informationMANET MANET MANET (DTN: Delay Tolerant Network) DTN DTN DTN DTN [7], [3], [11] [8] % N M m M n N D(m, n) Size(m) m MD(m) m M, n N, MD(m) = max{d
DEIM Forum 2013 F1-4 DTN, 565-0871 1-5 567-0047 5-1 184-8795 4-2-1 565-0871 2-1 E-mail: {sawamura.yusuke,nishio}@ist.osaka-u.ac.jp, teranisi@cmc.osaka-u.ac.jp, harumoto@eng.osaka-u.ac.jp DTN (DTN ) DTN
More information修士論文
27 Mobile Ad Hoc Networks An Ant-based Routing Algorithm with Multi-phase Pheromone and Power-saving in Mobile Ad Hoc Networks 14T0013 Shohei Miyashita E-mail: shohei.miyashita.4j@stu.hosei.ac.jp : Abstract
More informationA Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation
More information外国語学部_紀要34号(横書)/11_若山
IETF Internet Engineering Task Force MANET Mobile Ad Hoc Network ITS Intelligent Transport Systems ITS ITS VICS Vehicle Information and Communication System ETC Electronic Toll Collection System VICS IETF
More informationWMN Wi-Fi MBCR i
27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI
More information1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF.
2011 2012 1 31 5110B036-6 1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF....................................
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More informationDEIM Forum 2009 B4-6, Str
DEIM Forum 2009 B4-6, 305 8573 1 1 1 152 8550 2 12 1 E-mail: tttakuro@kde.cs.tsukuba.ac.jp, watanabe@de.cs.titech.ac.jp, kitagawa@cs.tsukuba.ac.jp StreamSpinner PC PC StreamSpinner Development of Data
More informationVol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L
Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP
More information258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System
Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.
More information1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf
1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe
1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More information1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D
P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More informationFig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).
Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation
More information2015 3
JAIST Reposi https://dspace.j Title 有 線 ネットワークによるすれ 違 い 通 信 の 性 能 改 善 の 研 究 Author(s) 八 木, 辰 弥 Citation Issue Date 2015-03 Type Thesis or Dissertation Text version author URL http://hdl.handle.net/10119/12658
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More informationPublish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S
KiZUNA: P2P 1,a) 1 1 1 P2P KiZUNA KiZUNA Pure P2P P2P 1 Skip Graph ALM(Application Level Multicast) Pub/Sub, P2P Skip Graph, Bloom Filter KiZUNA: An Implementation of Distributed Microblogging Service
More informationIPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU
1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale
More informationVol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a
1, 1,a) 1, 2 1 1, 3 2 1 2011 6 17, 2011 12 16 Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a) Kazuki Kanamori 1, 2 Mie Nakatani 1 Hirokazu Kato 1, 3 Sanae H. Wake 2 Shogo Nishida
More informationIP IPv4-IPv6
IPv6 Mobility IETF 2006 6 9 14:00-15:30 Interop Tokyo 2006 IIJ Nautilus6 IP IPv4-IPv6 L2 L3 Mobile IPv6 HIP L3.5 Shim6(?) L4 SCTP IPv6 Mobile IPv6/NEMO BS IETF RFC3775 - Mobile IPv6 RFC3963 - NEMO Basic
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More informationID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR
Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More information58 10
57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have
More information3_39.dvi
Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar
More information586 HEMS 1 HEMS Table 1 Various comparisons of Smart Tap HEMS. HEMS HEMS 1 HEMS HEMS PLC Power Line Communication EL HEMS 2) 3) Bluetooth 4),5) ZigBee
Vol. 52 No. 2 585 595 (Feb. 2011) HEMS 1 2 2 3 1 ZigBee HEMS Home Energy Management System HEMS HEMS ZigBee HEMS Development and Evaluation of Easy-HEMS for Indication Using Wireless Sensor Networks Keiichi
More informationIPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka
* Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of
More informationTable 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig
Mover Design and Performance Analysis of Linear Synchronous Reluctance Motor with Multi-flux Barrier Masayuki Sanada, Member, Mitsutoshi Asano, Student Member, Shigeo Morimoto, Member, Yoji Takeda, Member
More informationTCP T ransmission Control Protocol TCP TCP TCP TCP TCP TCP TCP TCP c /(18)
3 -- 4 1 TCP T ransmission Control Protocol 2013 12 TCP TCP TCP TCP TCP TCP TCP TCP c 2013 1/(18) 3 -- 4 -- 1 1--1 TCP 2013 12 TCP Transmission Control Protocol TCP TCP TCP 1981 RFC 793 Request for Comments
More information1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More informationDEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN
DEIM Forum 2017 H2-2 Android LAN 112-8610 2-1-1 163-8677 1-24-2 E-mail: {ayano,oguchi}@ogl.is.ocha.ac.jp, sane@cc.kogakuin.ac.jp Android 1 Android LAN Ayano KOYANAGI, Saneyasu YAMAGUCHI, and Masato OGUCHI
More informationVisual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science,
Visual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science, Bunka Women's University, Shibuya-ku, Tokyo 151-8523
More information( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst
情報処理学会インタラクション 2015 IPSJ Interaction 2015 15INT014 2015/3/7 1,a) 1,b) 1,c) Design and Implementation of a Piano Learning Support System Considering Motivation Fukuya Yuto 1,a) Takegawa Yoshinari 1,b) Yanagi
More information29 Short-time prediction of time series data for binary option trade
29 Short-time prediction of time series data for binary option trade 1180365 2018 2 28 RSI(Relative Strength Index) 3 USD/JPY 1 2001 1 2 4 10 2017 12 29 17 00 1 high low i Abstract Short-time prediction
More information橡 PDF
* * ** * * Transport Information Service Realized with the Fleet Management ASP Kiyotaka KISHINO*Yasushi ISHIDA*Takumi FUSHIKI** Naohiko GONMORI* Hiroyuki NAKAGAWA* Abstract: Fleet management system utilizing
More information2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )
1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose
More information17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
More information& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us
1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo
More informationA Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member
A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe
More informationDPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)
1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology
More information1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,
More informationIPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came
3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is
More informationP2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i
26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information
More information第62巻 第1号 平成24年4月/石こうを用いた木材ペレット
Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting
More informationAndroid LAN 1 1,, Google Android. Android, Android,. Android x86 CPU,,,. A study of performance improvement of a wireless LAN bases on Android termina
Android LAN 1 1,, Google Android. Android, Android,. Android x86 CPU,,,. A study of performance improvement of a wireless LAN bases on Android terminals analysis Kaori Miki 1 and Masato Oguchi 1 In reccent
More information2) 2. DLNA DLNA (Version 1.5) 2 (DMC1) (SSDP) (DMS1, DMS2) (DMR1, DMR2, DMR3) (UDP) DMC1 3 DMS2 DMC1 DMS1 (HTTP) DMS1 DMR2 (RTP) DMR2 3. DLNA 4 DMC1 D
1 1 2 2 DVD LED A Networked Home Appliance Control Method Using Augmented Reality Kenya Sato, 1 Akira Sakamoto, 1 Shinya Mihara 2 and Hideki Shimada 2 Many kinds of networked home appliances connected
More information.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns
Cami-log: 1,a) 1,b) 1,c) 1,d),,,.,,.,,,.,, Cami-log,. Cami-log : Proposal of Application to Improve Daily Chewing Activities using Myoelectric Information Hiroki Kurosawa 1,a) Sho Mitarai 1,b) Nagisa Munekata
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly
More information1 I/F I/F 1 6) MobileIP 7) 8) MN: Monile Node MN AR Mobility Anchor Point(MAP) MobileIP HMIP HMIP HA-MAP MN MAP MN MAP HMIP MAP MN 2 MobileIP Mo
1 2 2 I/F Mobility Anchor Point MAP Composite Wireless Access Networks on Mobile Communications and Its Evaluation Abstract: In emerging wireless communication environments, mobile terminals that have
More information8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact
8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for
More informationIPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info
1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3
More information9_4.dvi
Vol. 50 No. 9 2298 2311 (Sep. 2009) ID/Locator 1 2, 3 3 ID locator ID/Locator ID ID Transport IP locator Locator Transport ID locator P2P PIAX 10,000 1% A Mechanism of ID/Locator Separation in Overlay
More informationIPSJ SIG Technical Report Vol.2010-SLDM-144 No.50 Vol.2010-EMB-16 No.50 Vol.2010-MBL-53 No.50 Vol.2010-UBI-25 No /3/27 Twitter IME Twitte
Twitter 1 1 1 IME Twitter 2009 12 15 2010 2 1 13590 4.83% 8.16% 2 3 Web 10 45% Relational Analysis between User Context and Input Word on Twitter Yutaka Arakawa, 1 Shigeaki Tagashira 1 and Akira Fukuda
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.23 Vol.2009-GN-73 No.23 Vol.2009-EIP-46 No /11/27 t-room t-room 2 Development of
t-room 1 2 2 2 2 1 1 2 t-room 2 Development of Assistant System for Ensemble in t-room Yosuke Irie, 1 Shigemi Aoyagi, 2 Toshihiro Takada, 2 Keiji Hirata, 2 Katsuhiko Kaji, 2 Shigeru Katagiri 1 and Miho
More information3_23.dvi
Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems
More informationIPSJ SIG Technical Report Vol.2009-BIO-17 No /5/26 DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing
DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing Youhei Namiki 1 and Yutaka Akiyama 1 Pyrosequencing, one of the DNA sequencing technologies, allows us to determine
More informationVol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe
Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2
More informationPeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW
PPv2: 1 2 3 4 PeerPool PeerPool 3 PPv2(PeerPool version 2) PPv2: A Transparent Network Architecture for Naive Inter-Smart Environment Communication Michinobu Shimatani, 4 Yu Enokibori, 2 ismail Arai 3
More information(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s
1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene
More information27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U
YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube
More information25 Removal of the fricative sounds that occur in the electronic stethoscope
25 Removal of the fricative sounds that occur in the electronic stethoscope 1140311 2014 3 7 ,.,.,.,.,.,.,.,,.,.,.,.,,. i Abstract Removal of the fricative sounds that occur in the electronic stethoscope
More information075730G: 2008/7/4, /07/ A: J: E:
075730G: 2008/7/4,11 2008/07/18 075711A: 075726J: 075759E: 1 (Mesh) () LAN () LAN LAN ( LAN ) 2 RMR Rokko Mesh Router LAN 3 RMR IP RMR mesh007 https://192.168.71.1 RMR Username:rootPassword:root Network
More informationtotal.dvi
VII W I D E P R O J E C T MPLS-IX MPLS-IX MPLS 1 MPLS AYAME IX IX LDP/RSVP-TE/CR- [121] 1999 Sub- LDP IP MPLS IX LSP LSP MPLS ebgp[165] LSP ( 2002 1.1 1.2) MPLS-IX MPLS IPv6 6PE IX () MPLS-IX MPLS IX
More informationDual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B
root Android IPv4/ 1 1 2 1 NAT Network Address Translation IPv4 NTMobile Network Traversal with Mobility NTMobile Android 4.0 VPN API VpnService root VpnService IPv4 IPv4 VpnService NTMobile root IPv4/
More informationwide93.dvi
5 161 1 1.1 DDT WG DDT WG 1. \DDT" 2. DDT WG DDT WG 1.2 x ( IP) y ( X.25) x y \x overy" x y 1.1 IP X.25 IP IP IPX Appletalk OSI IP \encapsulation" \encapsulation header" \decapsulation" 163 164 1993 WIDE
More informationKyushu Communication Studies 第2号
Kyushu Communication Studies. 2004. 2:1-11 2004 How College Students Use and Perceive Pictographs in Cell Phone E-mail Messages IGARASHI Noriko (Niigata University of Health and Welfare) ITOI Emi (Bunkyo
More informationVol.11-HCI-15 No. 11//1 Xangle 5 Xangle 7. 5 Ubi-WA Finger-Mount 9 Digitrack 11 1 Fig. 1 Pointing operations with our method Xangle Xa
Vol.11-HCI-15 No. 11//1 GUI 1 1 1, 1 GUI Graphical User Interface Xangle Xangle A Pointing Method Using Accelerometers for Graphical User Interfaces Tatsuya Horie, 1 Takuya Katayama, 1 Tsutomu Terada 1,
More informationEQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju
EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo
More information分散ストレージシステム (4) (5) (6) 書き込み 書き込み 読み出し 読み出し (2) コーディネータ 1 Fig. 1 Image of distributed storage system. 2 Fig. 2 Process flow of ( 1 ) ( 2 ) ( 3 )
1 1 1 1 1 key-value store Application of Load Balancing Mechanism with Considering Data Access Frequency to Daisuke Kawakami, 1 Toshihiro Matsui, 1 Shoichi Saito, 1 Tomoaki Tsumura 1 and Hiroshi Matsuo
More informationwide97.dvi
12 357 1 WIDE MOBSEC (Mobile Security) Working Group Mobile-IP IP (IPSEC) IPA( ) (NECM) NECM 11 MOBSEC IP IETF Mobile-IP VIP PC 40 LAN IP IP MANET (Mobile Ad Hoc Networking) IETF Working Group 359 2 2.1
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More information人工知能学会研究会資料 SIG-FPAI-B Predicting stock returns based on the time lag in information diffusion through supply chain networks 1 1 Yukinobu HA
人工知能学会研究会資料 SIG-FPAI-B508-08 - - Predicting stock returns based on the time lag in information diffusion through supply chain networks 1 1 Yukinobu HAMURO 1 Katsuhiko OKADA 1 1 1 Kwansei Gakuin University
More informationIP RTP 2 QoS i
17 IP A study on IP path quality forecasting from the IP path delay measurements 1060339 2006 3 10 IP RTP 2 QoS i Abstract A study on IP path quality forecasting from the IP path delay measurements Kotaro
More informationISSN NII Technical Report Patent application and industry-university cooperation: Analysis of joint applications for patent in the Universit
ISSN 1346-5597 NII Technical Report Patent application and industry-university cooperation: Analysis of joint applications for patent in the University of Tokyo Morio SHIBAYAMA, Masaharu YANO, Kiminori
More information2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN
PenFlowchart 1,a) 2,b) 3,c) 2015 3 4 2015 5 12, 2015 9 5 PEN & PenFlowchart PEN Evaluation of the Effectiveness of Programming Education with Flowcharts Using PenFlowchart Wataru Nakanishi 1,a) Takeo Tatsumi
More informationIEEE802.11n LAN WiMAX(Mobile Worldwide Interoperability for Microwave Access) LTE(Long Term Evolution) IEEE LAN Bluetooth IEEE LAN
23 IEEE802.11n LAN 43422519 ( ) 24 2 6 IEEE802.11n LAN WiMAX(Mobile Worldwide Interoperability for Microwave Access) LTE(Long Term Evolution) IEEE802.11 LAN Bluetooth 2009 9 IEEE802.11 LAN IEE E802.11n
More information1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan
SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:
More information雇用不安時代における女性の高学歴化と結婚タイミング-JGSSデータによる検証-
日 本 版 General Social Surveys 研 究 論 文 集 [6] JGSS で 見 た 日 本 人 の 意 識 と 行 動 JGSS Research Series No.3 JGSS Women s Higher Education and Marriage Timing in an era of employment uncertainty Yuko NOZAKI Graduate
More information1
5-3 Photonic Antennas and its Application to Radio-over-Fiber Wireless Communication Systems LI Keren, MATSUI Toshiaki, and IZUTSU Masayuki In this paper, we presented our recent works on development of
More informationVol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N
Vol. 42 No. 6 June 2001 IREX-NE F 83.86 A Japanese Named Entity Extraction System Based on Building a Large-scale and High-quality Dictionary and Pattern-matching Rules Yoshikazu Takemoto, Toshikazu Fukushima
More informationVol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A
Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,
More informationInput image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L
1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives
More informationIPSJ SIG Technical Report Vol.2013-SLDM-160 No.7 Vol.2013-EMB-28 No /3/13 CAN-Ethernet 1,a) CAN-Ethernet CAN CAN CAN OMNeT++ CAN Ether
CAN-Ethernet 1,a) 1 1 2 2 2 CAN-Ethernet CAN CAN CAN OMNeT++ CAN Ethernet CAN-Ethernet protocol convert algorithm for automotive networks Jun Matsumura 1,a) Yutaka Matsubara 1 Hiroaki Takada 1 Masaya Oi
More informationBS・110度CSデジタルハイビジョンチューナー P-TU1000JS取扱説明書
C S0 CS Digital Hi-Vision Tuner C C C C S0-0A TQZW99 0 C C C C 4 5 6 7 8 9 C C C C C C C C C C C C C C C C C C C C C C C 0 FGIH C 0 FGIH C C C FGIH FG IH FGIH I H FGIH FGIH 0 C C # $ IH F G 0 # $ # $
More informationVol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3
36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationThe Journal of the Japan Academy of Nursing Administration and Policies Vol 7, No 2, pp 19 _ 30, 2004 Survey on Counseling Services Performed by Nursi
The Journal of the Japan Academy of Nursing Administration and Policies Vol 7, No 2, pp 19 _ 30, 2004 Survey on Counseling Services Performed by Nursing Professionals for Diabetic Outpatients Not Using
More informationDevelopment of Analysis Equipment for the Reprocessing Plant using Microchips Microchip, Analysis, Reprocessing, Thermal Lens, Uranium, Plutonium Development of Analysis Equipment for the Reprocessing
More informationJournal of Geography 116 (6) Configuration of Rapid Digital Mapping System Using Tablet PC and its Application to Obtaining Ground Truth
Journal of Geography 116 (6) 749-758 2007 Configuration of Rapid Digital Mapping System Using Tablet PC and its Application to Obtaining Ground Truth Data: A Case Study of a Snow Survey in Chuetsu District,
More information17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
More information23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h
23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),
More informationWeb ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval
SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto
More informationï\éÜA4*
Feature Article Imaging of minuscule amounts of chemicals, Scannimg Chemical Microscope --- Increasing analysis information through imaging --- Abstract We have developed a Scanning Chemical Microscope
More informationRun-Based Trieから構成される 決定木の枝刈り法
Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network
More information