Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

Size: px
Start display at page:

Download "Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i"

Transcription

1 26 A Study on Secure Remote Control Methods

2 Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

3 Abstract A Study on Secure Remote Control Methods SHINGAI, Tatsuro In recent years, communication carriers provides public Wi-Fi services in train stations, airports, the city.this service if you are in possession of the terminal corresponding to the standard of Wi-Fi, you can be utilized.however, sometimes it is provided in a non password in such public Wi-Fi service.in such a case, there is a risk of eavesdropping the communication content from the malicious third party. To solve this problem, there is a remote control.however, the existing products, continue to use a single encryption key. Therefore, it is not maintained confidentiality of communication contents to be eavesdropping key. In this paper, I proposed a method to change the encryption key at regular time intervals and went the application development of applying the proposed method.as a result, In a network that does not safety is secured, it has become possible higher than the existing products confidential communication. key words Remote-Control SAS SAS-2 Wi-Fi One-time password Secure ii

4 VPN Diffie-Hellman Difiie-Hellman RSA RSA SAS SAS iii

5 AuthenticationP hase RemoteControlP hase iv

6 Diffie-Hellman RSA SAS SAS AuthenticationP hase RemoteControlP hase Server Client Server Server Client v

7 vi

8 vii

9 1 1.1 Wi-Fi [1] Wi-Fi LAN Wi-Fi [2] VPN VPN 1

10 1.2 RSA AES RSA AES 1.2 Diffie-Hellman RSA SAS-2 2

11 [3] 2.1 Wi-Fi 3

12 VPN VPN VPN VPN VPN VPN VPN VPN 2.3 Wi-Fi 2.2 4

13 RSA AES 2.3 5

14 2.4 6

15 3 Diffie-Hellman [4] RSA SAS-2 [5] 3.1 Diffie-Hellman Diffie-Hellman Diffie-Hellman X Y 7

16 3.1 Diffie-Hellman p a Z p a X a Y b X b Y K mod Difiie-Hellman Diffie-Hellman a p X Y X Y a X a Y 0 p X b X Y Y b Y X 3.1 Diffie-Hellman b Y = a a Y mod p 8

17 3.1 Diffie-Hellman X a X b Y K K = (b Y ) a X mod p Y a Y b x K K = (b X ) a Y mod p X Y K K = (a a X a Y mod p) b X b Y b X = a a X mod p b Y = a a Y mod p K = (a a X a Y mod p) K X Y Diffie-Hellman a X a Y Diffie-Hellman Man-in-the-middle Attack 9

18 3.2 RSA 3.2 RSA RSA Diffie-Hellman RSA X Y e p q n p Q n a c m z / RSA RSA X 10

19 3.2 RSA X X e p q n n a n a e 3.2 Y n a Y m m n a c X 3.2 RSA c = m e mod n a c X m m = c 1/e mod (p 1)(q 1) mod pq 11

20 3.3 SAS-2 c z e (z ) e n a n a z e c m X Y 3.3 SAS-2 SAS-2 (Replya Attack) (Man-in-the-middle Attack) SAS-2 User Server User ID User S X F H H(x) x i 12

21 3.3 SAS-2 N i i SAS-2 SAS SAS-2 ID S N i ID S N i A = X(ID S N 1 ) ID A ID A

22 3.3 SAS SAS-2 ID S N i A = X(ID S N i ) N i+1 C = X(ID S N i+1 ) F (C) = F (ID C) C F (C) N i+1 α = C (F (C) + A) β = F (C) A ID α β β A F (C) = β A F (C) F (ID C) A C γ = H(ID F (C)) γ H(ID F (C)) γ 14

23 3.3 SAS-2 SAS-2 (i + 1) α E (F (E) + C) β F (E) C ID α x (F (E) + C) β F (x) C ID i SAS-2 15

24 4 Client Server A SAS-2 Ev D, X, F H(x) x i N i i I Server M k I e I M k E ve Ev M k + 16

25 Wi-Fi 4.1 [6] SAS SAS-2 DH RSA or bit 3856 bit 2400 bit Client Server Server Client

26 Client Server AuthenticationP hase RemoteControlP hase Close AuthenticationP hase 4.3 AuthenticationP hase AuthenticationP hase Client Server Client Server A Client Client N i N i C C F (C) C F (C) α β α β Server A M k 18

27 AuthenticationP hase Server Server Client α β A F (C) C C C M k AuthenticationP hase RemoteControlP hase 4.4 RemoteControlP hase RemoteControlP hase E v I RemoteControlP hase AuthenticationP hase Client 19

28 RemoteControlP hase 20

29 4.4 Server C M k Client Client N i N i G G F (G) G F (G) α β E v M k E v E ve E ve α β Server Server Client α β C F (G) G G M k E ve E v E v Server I I M k I e I e Client G Server Client Server I e M k I G Client RemoteControlP hase 4.4 Server 21

30 4.4 Wi-Fi SAS-2 [7] 22

31 5 Client Server 5.1 CPU : Core i5(2.2ghz) : 4GB 23

32 5.2 SAS-2 JAVA AES128bit AES DES 3DES AES Client Server Server Server Server Client Client Client Client Server Client Server 5.2 Socket T CP 24

33 Remote_Client_SAS.java Remote_Server_SAS.java Remote_Client_SAS.java Client Remote_Server_SAS.java Server Server Remote_Server_SAS ( 5.3) 2. Server IP Remote_Client_SAS ( 5.4) 25

34 5.2 実装したアプリケーション 図 5.3 Server プログラム起動 図 Client プログラム起動 実行を行うと 遠隔操作を行う画面が立ち上がる (図 5.5) 画面が立ち上がると Client は AuthenticationP hase に移る (図 5.6) 認証が完了したら Client は操作情報を Server に送信する (図 5.7) Server は操作情報をもとに操作を行い その状態をスクリーンキャプチャし暗号化し て Client に送信する (図 5.8) 7. Client で受け取った暗号化されたデータを復元し 画像データを表示する (図 5.9) 26

35 5.2 実装したアプリケーション 図 5.5 操作画面起動 図 5.6 認証 図 5.7 Server が受信した操作情報 27

36 5.3 利便性の評価 5.3 図 5.8 Server のキャプチャ画像 図 5.9 Client プログラムに表示 利便性の評価 本研究における提案方式を実装して 利便性の評価について述べる 図 5.10 に示す ユー ザが操作情報を入力し Server が処理を行い Client に画像データを送信して Client で 画像の表示を行うまでの応答時間を計測する このサイクルを 1000 回行い平均値 (ms) を 算出する これにより 反応待ちの時間と人間心理の関係について評価を行う 実験環境 実験を行うパソコンのスペックを以下に示す CPU : Core i5(2.2ghz) 28

37 : 4GB Client Server Client Server Client Server ms 96ms 121ms Client 29

38 Server ms 140ms 178ms [8] 5.1 (ms) 100ms 1000ms 10000ms 10000ms 121ms 178ms 100ms 30

39 5.3 31

40 6 Wi-Fi 121ms 178ms Client Server Server Server Client Wi-Fi Wi-Fi 32

41 33

42 [1] 2013 LAN ICT 2013 [2] LAN [3] 2007 [4] W.Diffie and M.E.Hellman New Directions in Cryptography IEEE Transactions on Information Theory vol.it-22 No.6 pp Nov 1976 [5] T.Tsuji and A.Shimizu Simple and secure password authentication protocol ver.2(sas-2) IEICE Technical Reports OIS [6] VoIP 2009 [7] SAS 2013 [8] Jakob Nielsen Response Times:The 3 Important Limits 1993 [9] BP

Web Basic Web SAS-2 Web SAS-2 i

Web Basic Web SAS-2 Web SAS-2 i 19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE

More information

Web Web ID Web 16 Web Web i

Web Web ID Web 16 Web Web i 24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro

More information

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i 20 SOM Development of Syllabus Vsualization System using Spherical Self-Organizing Maps 1090366 2009 3 5 SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i Abstract Development of Syllabus Vsualization

More information

58 10

58 10 57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have

More information

i ii iii iv v vi vii ( ー ー ) ( ) ( ) ( ) ( ) ー ( ) ( ) ー ー ( ) ( ) ( ) ( ) ( ) 13 202 24122783 3622316 (1) (2) (3) (4) 2483 (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) 11 11 2483 13

More information

, IT.,.,..,.. i

, IT.,.,..,.. i 25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge

More information

IT i

IT i 27 The automatic extract of know-how search tag using a thesaurus 1160374 2016 2 26 IT i Abstract The automatic extract of know-how search tag using a thesaurus In recent years, a number of organizational

More information

これわかWord2010_第1部_100710.indd

これわかWord2010_第1部_100710.indd i 1 1 2 3 6 6 7 8 10 10 11 12 12 12 13 2 15 15 16 17 17 18 19 20 20 21 ii CONTENTS 25 26 26 28 28 29 30 30 31 32 35 35 35 36 37 40 42 44 44 45 46 49 50 50 51 iii 52 52 52 53 55 56 56 57 58 58 60 60 iv

More information

パワポカバー入稿用.indd

パワポカバー入稿用.indd i 1 1 2 2 3 3 4 4 4 5 7 8 8 9 9 10 11 13 14 15 16 17 19 ii CONTENTS 2 21 21 22 25 26 32 37 38 39 39 41 41 43 43 43 44 45 46 47 47 49 52 54 56 56 iii 57 59 62 64 64 66 67 68 71 72 72 73 74 74 77 79 81 84

More information

これでわかるAccess2010

これでわかるAccess2010 i 1 1 1 2 2 2 3 4 4 5 6 7 7 9 10 11 12 13 14 15 17 ii CONTENTS 2 19 19 20 23 24 25 25 26 29 29 31 31 33 35 36 36 39 39 41 44 45 46 48 iii 50 50 52 54 55 57 57 59 61 63 64 66 66 67 70 70 73 74 74 77 77

More information

PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i

PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i 21 The private mailers synchronization operation for plural terminals 1125083 2010 3 1 PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i Abstract The private mailers synchronization operation for plural terminals

More information

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i 26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information

More information

,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i

,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i 23 Experimental investigation of Natural Use Profiles of Pen Pressure, Tilt and Azimuth 1120230 2012 3 1 ,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i Abstract Experimental investigation of Natural Use

More information

2

2 1 2 3 4 5 6 7 8 9 10 I II III 11 IV 12 V 13 VI VII 14 VIII. 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 _ 33 _ 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 VII 51 52 53 54 55 56 57 58 59

More information

ネットワーク化するデジタル情報家電の動向

ネットワーク化するデジタル情報家電の動向 In this broadband era, Information Technology has started at a market targeting home consumers, and upon gaining good achievements there would move on to be used in the business and enterprise markets.

More information

untitled

untitled i ii iii iv v 43 43 vi 43 vii T+1 T+2 1 viii 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 a) ( ) b) ( ) 51

More information

i

i 14 i ii iii iv v vi 14 13 86 13 12 28 14 16 14 15 31 (1) 13 12 28 20 (2) (3) 2 (4) (5) 14 14 50 48 3 11 11 22 14 15 10 14 20 21 20 (1) 14 (2) 14 4 (3) (4) (5) 12 12 (6) 14 15 5 6 7 8 9 10 7

More information

AccessflÌfl—−ÇŠš1

AccessflÌfl—−ÇŠš1 ACCESS ACCESS i ii ACCESS iii iv ACCESS v vi ACCESS CONTENTS ACCESS CONTENTS ACCESS 1 ACCESS 1 2 ACCESS 3 1 4 ACCESS 5 1 6 ACCESS 7 1 8 9 ACCESS 10 1 ACCESS 11 1 12 ACCESS 13 1 14 ACCESS 15 1 v 16 ACCESS

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

エクセルカバー入稿用.indd

エクセルカバー入稿用.indd i 1 1 2 3 5 5 6 7 7 8 9 9 10 11 11 11 12 2 13 13 14 15 15 16 17 17 ii CONTENTS 18 18 21 22 22 24 25 26 27 27 28 29 30 31 32 36 37 40 40 42 43 44 44 46 47 48 iii 48 50 51 52 54 55 59 61 62 64 65 66 67 68

More information

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 () - 1 - - 2 - - 3 - - 4 - - 5 - 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

More information

企業内システムにおけるA j a x 技術の利用

企業内システムにおけるA j a x 技術の利用 Utilization of Ajax in Enterprise Intranet Systemsby Tetsuo Yamashita, Takeshi Kuroe and Kazuhisa Ikeda Enterprise 2.0 refers to the recent trend of applying the web technologies widely deployed in Internet

More information

入門ガイド

入門ガイド ii iii iv NEC Corporation 1998 v P A R 1 P A R 2 P A R 3 T T T vi P A R T 4 P A R T 5 P A R T 6 P A R T 7 vii 1P A R T 1 2 2 1 3 1 4 1 1 5 2 3 6 4 1 7 1 2 3 8 1 1 2 3 9 1 2 10 1 1 2 11 3 12 1 2 1 3 4 13

More information

24_ChenGuang_final.indd

24_ChenGuang_final.indd Abstract If rapid economic development is sure to bring hierarchical consumption (M. Ozawa), the solution can only be to give property to all of the people in the country. In China, economic development

More information

2007-Kanai-paper.dvi

2007-Kanai-paper.dvi 19 Estimation of Sound Source Zone using The Arrival Time Interval 1080351 2008 3 7 S/N 2 2 2 i Abstract Estimation of Sound Source Zone using The Arrival Time Interval Koichiro Kanai The microphone array

More information

<4D6963726F736F667420506F776572506F696E74202D208376838C835B83938365815B835683878393312E707074205B8CDD8AB78382815B83685D>

<4D6963726F736F667420506F776572506F696E74202D208376838C835B83938365815B835683878393312E707074205B8CDD8AB78382815B83685D> i i vi ii iii iv v vi vii viii ix 2 3 4 5 6 7 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60

More information

SC-85X2取説

SC-85X2取説 I II III IV V VI .................. VII VIII IX X 1-1 1-2 1-3 1-4 ( ) 1-5 1-6 2-1 2-2 3-1 3-2 3-3 8 3-4 3-5 3-6 3-7 ) ) - - 3-8 3-9 4-1 4-2 4-3 4-4 4-5 4-6 5-1 5-2 5-3 5-4 5-5 5-6 5-7 5-8 5-9 5-10 5-11

More information

社会学部紀要 114号☆/22.松村

社会学部紀要 114号☆/22.松村 March 2012 1 1 1 2005 : 261 1 100 2 22 15.1 41.8 10.3 100 3 2008 : 282 23 34 70 3 114 30 4 1 2 1 2 2 1 1998 1999 2004 N 3 4 7 9 3 100 1970 March 2012 15900 42 10 15000 4 K 40 2 2 2 3 5 100 DVD 6 http :

More information

paper.dvi

paper.dvi 23 Study on character extraction from a picture using a gradient-based feature 1120227 2012 3 1 Google Street View Google Street View SIFT 3 SIFT 3 y -80 80-50 30 SIFT i Abstract Study on character extraction

More information

ÿþ

ÿþ I O 01 II O III IV 02 II O 03 II O III IV III IV 04 II O III IV III IV 05 II O III IV 06 III O 07 III O 08 III 09 O III O 10 IV O 11 IV O 12 V O 13 V O 14 V O 15 O ( - ) ( - ) 16 本 校 志 望 の 理 由 入 学 後 の

More information

A Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)

More information

(1) (2) (3) (4) (5) (6) (7) (8) (9) PLC PLC LAN MASTER PLC LAN MASTER PLC LAN MASTER PLC LAN MASTER PLC LAN MASTER MASTER MASTER PLC LAN PLC LAN PLC LAN MASTER PLC LAN MASTER MASTER TERMINAL MASTER TERMINAL

More information

ベース0516.indd

ベース0516.indd QlikView QlikView 2012 2 qlikview.com Business Discovery QlikTech QlikView QlikView QlikView QlikView 1 QlikView Server QlikTech QlikView Scaling Up vs. Scaling Out in a QlikView Environment 2 QlikView

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

kut-paper-template.dvi

kut-paper-template.dvi 14 Application of Automatic Text Summarization for Question Answering System 1030260 2003 2 12 Prassie Posum Prassie Prassie i Abstract Application of Automatic Text Summarization for Question Answering

More information

[2] 1. 2. 2 2. 1, [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7

[2] 1. 2. 2 2. 1, [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7 32 (2015 ) [2] Projects of the short term increase at present. In order to let projects complete without rework and delays, it is important that request for proposals (RFP) are written by reflecting precisely

More information

一般演題(ポスター)

一般演題(ポスター) 6 5 13 : 00 14 : 00 A μ 13 : 00 14 : 00 A β β β 13 : 00 14 : 00 A 13 : 00 14 : 00 A 13 : 00 14 : 00 A β 13 : 00 14 : 00 A β 13 : 00 14 : 00 A 13 : 00 14 : 00 A β 13 : 00 14 : 00 A 13 : 00 14 : 00 A

More information

IP RTP 2 QoS i

IP RTP 2 QoS i 17 IP A study on IP path quality forecasting from the IP path delay measurements 1060339 2006 3 10 IP RTP 2 QoS i Abstract A study on IP path quality forecasting from the IP path delay measurements Kotaro

More information

o 2o 3o 3 1. I o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o I 2o 3o 4o 5o 6o 7o 2197/ o 1o 1 1o

o 2o 3o 3 1. I o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o I 2o 3o 4o 5o 6o 7o 2197/ o 1o 1 1o 78 2 78... 2 22201011... 4... 9... 7... 29 1 1214 2 7 1 8 2 2 3 1 2 1o 2o 3o 3 1. I 1124 4o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o 72 1. I 2o 3o 4o 5o 6o 7o 2197/6 9. 9 8o 1o 1 1o 2o / 3o 4o 5o 6o

More information

三税協力の実質化 : 住民税の所得税閲覧に関する国税連携の効果

三税協力の実質化 : 住民税の所得税閲覧に関する国税連携の効果 Kwansei Gakuin University Rep Title 三 税 協 力 の 実 質 化 : 住 民 税 の 所 得 税 閲 覧 に 関 する 国 税 連 携 の 効 果 Author(s) Suzuki, Ushio, 鈴 木, 潮 Citation 経 済 学 論 究, 65(4): 175-197 Issue Date 2012-03-20 URL http://hdl.handle.net/10236/9133

More information

’ÓŠ¹/‰´„û

’ÓŠ¹/‰´„û Core Ethics Vol. transition from school to work [][] [] Core Ethics Vol. [], pp.- [], p. [a], p.ojt OJT. [] OJT [] [] [], p. OJTOffJTp. [] p. [], pp.- [] [] [] [] [a] [], p. Core Ethics Vol. [], p. []

More information

untitled

untitled Ministry of Land, Infrastructure, Transport and Tourism IATA 996 9 96 96 1180 11 11 80 80 27231 27 27231 231 H19.12.5 10 200612 20076 200710 20076 20086 11 20061192008630 12 20088 20045 13 113 20084

More information

08-特集04.indd

08-特集04.indd 5 2 Journal of Multimedia Aided Education Research 2008, Vol. 5, No. 2, 3543 ICT ICT ICT 2 ICT ICT 1100 2008 ICT ICT 2007 ICT ICT ICT ICT IPtalk2008 2006 LAN TCP/IP 1 35 5 22008 1 Enter 1 IPtalk 2 2 2IPtalk

More information

1... 1... 1... 3 2... 4... 4... 4... 4... 4... 6... 10... 11... 15... 30

1... 1... 1... 3 2... 4... 4... 4... 4... 4... 6... 10... 11... 15... 30 1 2420128 1 6 3 2 199103 189/1 1991031891 3 4 5 JISJIS X 0208, 1997 1 http://www.pref.hiroshima.lg.jp/site/monjokan/ 1... 1... 1... 3 2... 4... 4... 4... 4... 4... 6... 10... 11... 15... 30 1 3 5 7 6 7

More information

平成18年版 男女共同参画白書

平成18年版 男女共同参画白書 i ii iii iv v vi vii viii ix 3 4 5 6 7 8 9 Column 10 11 12 13 14 15 Column 16 17 18 19 20 21 22 23 24 25 26 Column 27 28 29 30 Column 31 32 33 34 35 36 Column 37 Column 38 39 40 Column 41 42 43 44 45

More information

178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21

178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21 I 178 II 180 III ( ) 181 IV 183 V 185 VI 186 178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21 4 10 (

More information

44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2)

44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2) (1) I 44 II 45 III 47 IV 52 44 4 I (1) ( ) 1945 8 9 (10 15 ) ( 17 ) ( 3 1 ) (2) 45 II 1 (3) 511 ( 451 1 ) ( ) 365 1 2 512 1 2 365 1 2 363 2 ( ) 3 ( ) ( 451 2 ( 314 1 ) ( 339 1 4 ) 337 2 3 ) 363 (4) 46

More information

i ii i iii iv 1 3 3 10 14 17 17 18 22 23 28 29 31 36 37 39 40 43 48 59 70 75 75 77 90 95 102 107 109 110 118 125 128 130 132 134 48 43 43 51 52 61 61 64 62 124 70 58 3 10 17 29 78 82 85 102 95 109 iii

More information

橡ボーダーライン.PDF

橡ボーダーライン.PDF 1 ( ) ( ) 2 3 4 ( ) 5 6 7 8 9 10 11 12 13 14 ( ) 15 16 17 18 19 20 ( ) 21 22 23 24 ( ) 25 26 27 28 29 30 ( ) 31 To be or not to be 32 33 34 35 36 37 38 ( ) 39 40 41 42 43 44 45 46 47 48 ( ) 49 50 51 52

More information

四校_目次~巻頭言.indd

四校_目次~巻頭言.indd 107 25 1 2016 3 Key Words : A 114 67 58.84 Mann-Whitney 6 1. 2. 3. 4. 5. 6. I. 21 4 B 23 11 1 9 8 7 23456 108 25 1 2016 3 78 9 II. III. IV. 1. 24 4 A 114 2. 24 5 6 3. 4. 5. 3 42 5 16 6 22 5 4 4 4 3 6.

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

NotePC 8 10cd=m 2 965cd=m 2 1.2 Note-PC Weber L,M,S { i {

NotePC 8 10cd=m 2 965cd=m 2 1.2 Note-PC Weber L,M,S { i { 12 The eect of a surrounding light to color discrimination 1010425 2001 2 5 NotePC 8 10cd=m 2 965cd=m 2 1.2 Note-PC Weber L,M,S { i { Abstract The eect of a surrounding light to color discrimination Ynka

More information

™…

™… i 1 1 1 2 3 5 5 6 7 9 10 11 13 13 14 15 15 16 17 18 20 20 20 21 22 ii CONTENTS 23 24 26 27 2 31 31 32 32 33 34 37 37 38 39 39 40 42 42 43 44 45 48 50 51 51 iii 54 57 58 60 60 62 64 64 67 69 70 iv 70 71

More information

インターネット概論 第07回(2004/11/12) 「SFC-CNSの現状」

インターネット概論 第07回(2004/11/12) 「SFC-CNSの現状」 / / / : AES 128bit) 196bit 256bit 128bit) 10 12 14 196bit) 12 12 14 256bit) 14 14 14 (n, e) (n, d) M M : 2 ( 101 5) [e ] [e ] n = p * q (p q ) (n) = (p-1)(q-1) gcd( (n), e) = 1; 1 < e < (n) d = e^-1

More information

fiš„v5.dvi

fiš„v5.dvi (2001) 49 2 293 303 VRML 1 2 3 2001 4 12 2001 10 16 Web Java VRML (Virtual Reality Modeling Language) VRML Web VRML VRML VRML VRML Web VRML VRML, 3D 1. WWW (World Wide Web) WWW Mittag (2000) Web CGI Java

More information

06’ÓŠ¹/ŒØŒì

06’ÓŠ¹/ŒØŒì FD. FD FD FD FD FD FD / Plan-Do-See FD FD FD FD FD FD FD FD FD FD FD FD FD FD JABEE FD A. C. A B .. AV .. B Communication Space A FD FD ES FD FD The approach of the lesson improvement in Osaka City University

More information

untitled

untitled SUMMARY Although the situation where sufficient food was not supplied for the victims occurred in the Great East Japan Earthquake, this is a serious problem at the time of catastrophic disasters like the

More information

SPSS

SPSS The aging of residents who moved suburban new town in young is progressing. However, such residents tend to consider the service life of their houses only in terms of the time they will be occupying it.

More information

A B C B C ICT ICT ITC ICT

A B C B C ICT ICT ITC ICT ICT Development of curriculum for improving of teachers ICT based on evaluation standards. Kazuhiko ISHIHARA Abstract Ministry of Education and Science announced Checklist of teacher s ICT in March,. All

More information

III

III III 1 1 2 1 2 3 1 3 4 1 3 1 4 1 3 2 4 1 3 3 6 1 4 6 1 4 1 6 1 4 2 8 1 4 3 9 1 5 10 1 5 1 10 1 5 2 12 1 5 3 12 1 5 4 13 1 6 15 2 1 18 2 1 1 18 2 1 2 19 2 2 20 2 3 22 2 3 1 22 2 3 2 24 2 4 25 2 4 1 25 2

More information

iii iv v vi vii viii ix 1 1-1 1-2 1-3 2 2-1 3 3-1 3-2 3-3 3-4 4 4-1 4-2 5 5-1 5-2 5-3 5-4 5-5 5-6 5-7 6 6-1 6-2 6-3 6-4 6-5 6 6-1 6-2 6-3 6-4 6-5 7 7-1 7-2 7-3 7-4 7-5 7-6 7-7 7-8 7-9 7-10 7-11 8 8-1

More information

ÿþ

ÿþ Abstract Social bookmark service is a tool to classify information on the web with user s own criteria. Organizing website with social bookmark service is fundamentally conducted for individual s benefit.

More information

自分の天職をつかめ

自分の天職をつかめ Hiroshi Kawasaki / / 13 4 10 18 35 50 600 4 350 400 074 2011 autumn / No.389 5 5 I 1 4 1 11 90 20 22 22 352 325 27 81 9 3 7 370 2 400 377 23 83 12 3 2 410 3 415 391 24 82 9 3 6 470 4 389 362 27 78 9 5

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

) 2) , , ) 1 2 Q1 / Q2 Q Q4 /// Q5 Q6 3,4 Q7 5, Q8 HP Q9 Q10 13 Q11

) 2) , , ) 1 2 Q1 / Q2 Q Q4 /// Q5 Q6 3,4 Q7 5, Q8 HP Q9 Q10 13 Q11 2009 0612001. 1) 2) 2 2009 3 2009 8, 10 1 3, 12 50 4) 1 2 Q1 / Q2 Q3 910203040 5060708090 Q4 /// Q5 Q6 3,4 Q7 5,6711 123 4 Q8 HP Q9 Q10 13 Q11 , A 5 2 3 3 3 3 3 2 8 5 3 3 4 A C B 1 1 KJ 1 9 1 12 12 15

More information

16_.....E...._.I.v2006

16_.....E...._.I.v2006 55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA

More information

finalrep.dvi

finalrep.dvi 18 Building a Knowledge Management System for Acquiring Wisdom of Crowds 1095701 2007 3 16 Blog Wiki Web Web Web i Abstract Building a Knowledge Management System for Acquiring Wisdom of Crowds Kazunori

More information

4 i

4 i 22 Quantum error correction and its simulation 1135071 2011 3 1 4 i Abstract Quantum error correction and its simulation Hiroko Dehare Researches in quantum information theory and technology, that mix

More information

01_.g.r..

01_.g.r.. I II III IV V VI VII VIII IX X XI I II III IV V I I I II II II I I YS-1 I YS-2 I YS-3 I YS-4 I YS-5 I YS-6 I YS-7 II II YS-1 II YS-2 II YS-3 II YS-4 II YS-5 II YS-6 II YS-7 III III YS-1 III YS-2

More information

<312D322D30348BE08BE28EEC2E696E6464>

<312D322D30348BE08BE28EEC2E696E6464> 57 連 体 修 飾 構 造 における 主 格 助 詞 の の 変 化 1.はじめに 1 2. 問 題 の 所 在 2 1 2 4 HERSETEC, 1, 2 (2007), 57 72 58 1 2 3 4 2 4 1 2 2 1955 3 3. 中 古 語 の 連 体 構 造 における 主 格 助 詞 の 1 2 59 3 1 195 55 1975 1978 1975 1978 1955 5

More information

ii iii iv CON T E N T S iii iv v Chapter1 Chapter2 Chapter 1 002 1.1 004 1.2 004 1.2.1 007 1.2.2 009 1.3 009 1.3.1 010 1.3.2 012 1.4 012 1.4.1 014 1.4.2 015 1.5 Chapter3 Chapter4 Chapter5 Chapter6 Chapter7

More information

A Study on Arifields and City Planning in the Capital Region of Japan by Naotoshi HIDAKA, Keita TEZUKA, Tsuneaki FUKUI Osamu SHINOHARA and Koichi AMANC, Abstract: Airports play very important role in the

More information