4 i

Size: px
Start display at page:

Download "4 i"

Transcription

1 22 Quantum error correction and its simulation

2 4 i

3 Abstract Quantum error correction and its simulation Hiroko Dehare Researches in quantum information theory and technology, that mix quantum theory and informatics, have been very active in recent years. The quantum bits, that are used in quantum informatics, are susceptible to external noises and often error prone. The error-correction, therefore, is essential in the realization quantum information processing. The classical error correction schemes can not be used because they exacerbate errors in quantum bits with the disturbances caused by quantum observations. In this thesis, we develop simulation programs for four existing quantum errorcorrection algorithms, and test their performances and efficiencies in realistic settings. Based on the results of thqe simulations, we propose a new hybrid algorithm which balances the efficiency in single error-correction and the tolerance for multiple errors. key words quantum bits quantum error correction ii

4 iii

5 X Not Qbit Qbit Qbit Shor 5Qbit Shor 5Qbit Shor 5Qbit Shor 5Qbit Qbit Steane 7Qbit Shor 9Qbit Shor 9Qbit iv

6 39 A 40 A A A B 43 v

7 4.1 Not 3Qbit Not3Qbit Not3Qbit X Not3Qbit X Y Z Not5Qbit Not5Qbit Not5Qbit X Not5Qbit X Y Z Qbit Qbit Qbit X Qbit X Y Z Shor 5Qbit Shor 5Qbit Shor 5Qbit X Shor 5Qbit X Y Z Qbit Qbit X Qbit X Y Z :X :X Y Z ( ) :X Y Z ( ) vi

8 2.1 1Qbit Not3Qbit Not5Qbit Qbit Shor 5Qbit Steane 7Qbit Shor 9Qbit B.1 Shor 5Qbit 2Qbit B.2 5-3Qbit 2Qbit vii

9 Bennett Brassard BB84 Bennett B92 Ekert E91 BB84 1

10 1.2 B92 BB BB B92 E BB84 80km [5] Benioff Bennett Benioff 1985 Deutsch 1994 Shor 2

11 1.2 [7] ψ =α 0 + β 1 ψ α β ψ (1.1) (1.2) a A b B (1.1) (1.2) (1.3) ψ = α 0 A + β 1 A (1.1) φ AB = 1 2 ( 0 A 0 B + 1 A 1 B ) (1.2) ψ A φ AB = (α 0 A + β 1 A ) 1 2 ( 0 A 0 B + 1 A 1 B ) (1.3) (1.3) ψ 2.2 q ψ 00 ψ 00 ψ C Z 10 C X 11 C Z C X 3

12

13 2 2.1 Quantum bit 1bit 1Qbit 1Qbit x(x = 0, 1) x (2.1) (2.1) (2.2) x = α 0 + β 1 ( α 2 + β 2 = 1) (2.1) ( ) ( ) 1 0 x = α + β 0 1 (2.2) 0 1 (2.2) (2.3) ( 1 ) ( 0 ) = 0 = 1 (2.3) θ (2.1) (2.2) (2.3) (2.4) θ = sin θ cos θ 2 1 = ( sin θ 2 cos θ 2 ) (2.4) 5

14 2.1 (2.4) (2.5) ( ) ( = = ) (2.5) θ θ + π θ θ + π (2.6) = { 50% 50% (2.6) BB84 B W.K.Heisenberg ( ) [4] ( ) ( ) 6

15 2.1 (2.7) (2.8) { : 50% 50% : 50% 50% (2.7) { : 50% 50% : 50% 50% (2.8) [1] ψ φ ( ψ φ ) ψ φ ( ψ φ = 0) 0 (2.9) ψ 0 φ 0 (2.9) (2.9) U (2.10) { U( ψ 0 ) = ψ ψ U( φ 0 ) = φ φ (2.10) (2.10) (2.11) ψ φ = ( ψ φ ) 2 (2.11) (2.11) ψ φ = 0 ψ φ = 1 ψ = φ ψ φ (2.11) 7

16 θ R (2.12) R(θ) = ( cos θ 2 sin θ 2 sin θ 2 cos θ 2 ) (2.12) C X C Y C Z I H( ) 5 C X C Y C Z A.1 C X C Y C Z (2.13) C X = σ x C Y = iσ y (2.13) C Z = σ z 1Qbit (2.14) 1Qbit C X C Y C Z 8

17 2.2 ( ) ( ) ( ) C X = C Y = C Z = ( ) ( ) (2.14) I = H = H C X C Z H (2.15) H = 1 2 (C X + C Z ) (2.15) C Y C Z C X C Y C X C Z (2.16) { CZ C X = C Y C X C Z = C Y (2.16) (2.14) (2.16) (2.17) (2.18) (2.19) { CX C Y = C Z C Y C Z = C X (2.17) C X C Y = C Y C X C X C Z = C Z C X (2.18) C Y C Z = C Z C Y C 2 X = C 2 Y = C 2 Z = I (2.19) 0 1 1Qbit (2.1) (2.1) A.2 (2.1) α β I C X C Y C Z (2.12) R θ I C Y (2.20) R θ = I cos θ 2 C Y sin θ 2 (2.20) 9

18 Qbit C X C Y C Z I H ( ) ( 0 1 ) Not 2Qbit Not (A.3) Not XOR Not 3Qbit And Not Cont X Cont Y ContZ 2Qbit (A.8) (A.10) (A.11) (A.12) (2.19) C Y C Y (2.16) C Y = C Z C X C X C Z C Y 10

19 2.3 U α 0 + β 1 (2.21) U{U(α 0 + β 1 )} = α 0 + β 1 (2.21) Not 2.4 ( ) [3] ψ = a b 2Qbit (2.22) 2Qbit (2.23) a b = 1 2 ( ) (2.22) a b = 1 2 ( + (2.23) 11

20 2.4 a a = b (2.23) b a b [1] b a b ( ) b = 1 2 ( ± ) Belle B [3] 12

21 X Y Z 3 X Y Z X 0 1 Z Y (2.16) Z X I C X C Y C Z a X θ (3.1) e iθx a = (I cos θ + ix sin θ) a ( ) cos θ i sin θ = a (3.1) i sin θ cos θ 13

22 α 0 + β 1 5Qbit F (3.2) F = α β (3.2) α β

23 C X C Y C Z Y C Y

24 4 4.1 nqbit F = f 0 f n 1 E i 2 100,000Qbit X X Y Z 1 3 X X Y Z (2.1) Y Z X Y Z i (i=0,,4) C X 16

25 4.2 Not X i C Y C Z Y i Z i i X Y Z C X C Y C Z X i Y i Z i i (i=0,,4) X X α 0 + β 1 α β X α β Y Z 4.2 Not Not 2.3 f i = 1 Not X Y Y Z Qbit Not 3Qbit 2Qbit P = p 0 p 1 p i (i = 0, 1) f i f i+1 17

26 4.2 Not 4.1 Not 3Qbit (4.1) P (4.1) X 4.1 Not3Qbit I X 0 X 1 X 2 p p Not3Qbit (4.1) (4.2) (4.2) X X Y Z 2 (4.3) (4.4) 4.3 Not3Qbit 4.4 Not3Qbit X X Y Z 18

27 4.2 Not Qbit 4Qbit P = p 0 p 1 p 2 p 3 p i f i f i Not5Qbit (4.5) P (4.2) 2Qbit X 4.2 Not5Qbit I X 0 X 1 X 2 X 3 X 4 X 0 X 1 X 0 X 2 X 0 X 3 X 0 X 4 X 1 X 2 X 1 X 3 X 1 X 4 X 2 X 3 X 2 X 4 X 3 X 4 p p p p

28 Not5Qbit (4.2) (4.6) (4.6) (4.7) (4.8) 4.7 Not5Qbit 4.8 Not5Qbit X X Y Z 4.3 Cont X Cont Y Cont X H nbit M M (4.1) (4.2) M 2 = I (4.1) MM F = F (4.2) M M i M n

29 E i M (2.18) X i Z i (2.16) C Y C Z C X X i Y j Y i Z j (i j) (4.3) (4.4) (5.1) (5.2) Qbit 2Qbit p 0 p 1 i X E i F = X i F { M0 = Z 0 Z 1 M 1 = Z 1 Z 2 (4.3) i = 0 X 0 F (4.3) M 0 M 1 (4.2) (4.4) X 0 F M 0 M 1 { M0 X 0 F = X 0 F M 1 X 0 F = X 0 F (4.4) 21

30 Qbit (4.9) P E i M 0 M 1 (4.3) p i = 1 { M0 E i F = ( 1) p 0 E i F M 1 E i F = ( 1) p 1 E i F (4.5) (4.1) Not3Qbit (4.9) 3Qbit A Qbit X 0 X 1 X 2 M 0 + M Qbit (4.9) P (4.5) M 0 M 1 E i P (4.3) X (4.10) 3Qbit (4.11) (4.12) 22

31 Qbit Qbit X X Y Z Shor 5Qbit Shor 5Qbit [2] 4Qbit P = p 0 p 1 p 2 p 3 M (4.6) (4.7) (4.8) M = (1 + M 0 )(1 + M 1 )(1 + M 2 )(1 + M 3 ) (4.6) M 0 = Z 4 X 3 X 2 Z 1 M 1 = X 4 X 3 Z 2 Z 0 (4.7) M 2 = X 4 Z 3 Z 1 X 0 M 3 = Z 4 Z 2 X 1 X 0 M i (1 + M i ) = 1 + M i (4.8) G = M F (4.9) (4.7) M i G M i (4.8) (4.10) M i G = G (4.10) (4.7) Shor 5Qbit (4.13) 23

32 Shor 5Qbit M 0 E i G = ( 1) p 0 E i G M 1 E i G = ( 1) p 1 E i G M 2 E i G = ( 1) p 2 E i G M 3 E i G = ( 1) p 3 E i G (4.11) (4.13) P (4.11) E i M i (4.4) G 1Qbit 4.4 Shor 5Qbit X 0 Y 0 Z 0 X 1 Y 1 Z 1 X 2 Y 2 Z 2 X 3 Y 3 Z 3 X 4 Y 4 Z 4 1 M M M M (4.4) (4.14) Y i Y i 24

33 Shor 5Qbit (4.14) (4.2) (4.12) M G F M G = F (4.12) (4.16) (4.12) F 4.15 Shor 5Qbit X 4.16 Shor 5Qbit X Y Z Shor 5Qbit Shor 5Qbit 1Qbit 2Qbit

34 4.3 2Qbit 1Qbit (B.1) 3Qbit Shor 5Qbit Shor 5Qbit Shor 5Qbit 5Qbit Shor 5Qbit 4Q 16 Y i X i Z i i = 0 X 0 = (+ ++) Z 0 = (+ + ) Y 0 = (+ ) X 0 Z 1 X 0 Z 1 = (+ + ) (B.1) X 2 X 0 Z 1 X 2 Shor 5Qbit X 0 Z 1 X 2 = (+ + ++) X 0 Z 1 X 2 (4.13) (4.13) M 0 X 0 Z 1 X 2 G = X 0 Z 1 X 2 G M 1 X 0 Z 1 X 2 G = X 1 Z 1 X 2 G M 2 X 0 Z 1 X 2 G = X 2 Z 1 X 2 G M 3 X 0 Z 1 X 2 G = X 3 Z 1 X 2 G (4.13) 1Qbit 26

35 4.3 3Qbit 2Qbit Shor 5Qbit Shor 5Qbit 2Qbit 1Qbit 2Qbit 2Qbit X i Y i Z i X i X j Y i Y j Z i Z j X i Y j X i Z j Y i Z j (i j) 105 (B.1) 2Qbit 1Qbit 1 2Qbit Qbit 2Qbit Shor 5Qbit Shor 5Qbit 2Qbit 2Qbit Shor 5Qbit 7 3Qbit Shor 5Qbit F 3Qbit 2 27

36 4.3 3Qbit 2 Not 5Qbit Shor 5Qbit 3Qbit 1Qbit 3Qbit X 2Qbit (B.1) X Y Shor 5Qbit X i Y i 3Qbit Shor 5Qbit 3Qbit (B.2) 2Qbit (4.17) 3Qbit 3Qbit Qbit (4.17) Shor 5Qbit X i Y i Z i 5-3Qbit 2Qbit (4.18) (4.19) 28

37 Qbit X Qbit X Y Z 29

38 X (5.1) X Y Z (5.2) (5.3) 5.1 :X Not 2 3Qbit 3 X Shor 5Qbit 5-3Qbit X Y Z X Shor 5Qbit X Y Z

39 :X Y Z 5.3 :X Y Z ( ) ( ) Not 3Qbit 5-3Qbit X Y Z Shor 5Qbit 3Qbit Not5Qbit Not Y Z X Shor 5Qbit 5-3Qbit Not 3Qbit X Y Z 100% (4.4) (4.8) (4.12) 100% 3Qbit 2Qbit 0 Z (2.1) Shor 5Qbit 5-3Qbit

40 Qbit 5Qbit [1] Steane 7Qbit A.M.Steane 7Qbit [9] [1] 1Qbit Shor 5Qbit Steane 7Qbit 2Qbit Shor 5Qbit X Z Steane 7Qbit 6Qbit 3Qbit X 3Qbit Z Y Y i = Z i X i X i Z i X Z 1Qbit 2Qbit 2Qbit X i Z j (i j) X i X j Z i Z j (2.16) X i Y j Y i Z j Y i Y j (i j) Steane 7Qbit X i Y i Z i 7 X i Z j Steane 7Qbit Z M i X N i (5.1) Shor 5Qbit 32

41 5.2 (5.1) M 0 = X 0 X 4 X 5 X 6 M 1 = X 1 X 3 X 5 X 6 M 2 = X 2 X 3 X 4 X 6 N 0 = Z 0 Z 4 Z 5 Z 6 N 1 = Z 1 Z 3 Z 5 Z 6 N 2 = Z 2 Z 3 Z 4 Z 6 (5.1) 5.1 Steane 7Qbit I Z 0 Z 1 Z 2 Z 3 Z 4 Z 5 Z 6 M M M I X 0 X 1 X 2 X 3 X 4 X 5 X 6 N N N Shor 9Qbit Shor 9Qbit [10] 3Qbit 3Qbit Z Y Z Shor 9Qbit Z 3Qbit F (5.2) Z 0 F = Z 1 F = Z 2 F Z 3 F = Z 4 F = Z 5 F Z 6 F = Z 7 F = Z 8 F (5.2) 33

42 5.2 X i (i = 0 8) Z j Z j+1 Z j+2 (j = 0 3 6) Shor 9Qbit (5.3) (5.2) M 0 = X 0 X 1 X 2 X 3 X 4 X 5 M 1 = X 3 X 4 X 5 X 6 X 7 X 8 N 0 = Z 0 Z 1 N 1 = Z 1 Z 2 N 2 = Z 3 Z 4 N 3 = Z 4 Z 5 N 4 = Z 6 Z 7 N 5 = Z 7 Z 8 (5.3) 5.2 Shor 9Qbit I Z 0 Z 1 Z 2 Z 3 Z 4 Z 5 Z 6 Z 7 Z 8 q X 0 X 1 X 2 X 3 X 4 X 5 X 6 X 7 X 8 M M N N N N N N Shor 9Qbit (5.2) 1Qbit Qbit X 3Qbit 3Qbit 34

43 5.2 2Qbit Shor 9Qbit 3Qbit Z 2 Z 3 Z 5 Z 6 9Qbit M 0 M 1 Shor 9Qbit Shor 9Qbit 1Qbit Shor 9Qbit 3Qbit 3Qbit 1Qbit X X i X j X k (i = 0 2 j = 3 5 k = 6 8) Z X X 35

44 6 X X Y Z 2 A.2 X X Y Z 5 Shor 5Qbit 5-3Qbit 2 5-3Qbit 2Qbit Steane 7Qbit X i X j Y i Y j Z i Z j X i Y j Y i Z j (i j) 2bit 5Qbit 8Qbit Shor 5Qbit Steane 7Qbit 36

45 5-3Qbit 2.4 [6] 9Qbit Shor exponential 37

46 38

47 [1] N.David Mermin 2009 [2] D P DiVincenzo P W Shor Fault-Tolerant Error Correction with Efficient Quantum Codes Phys Rev Lett 77(15): [3] Belle B News@KEK [4] BP [5] 80km JST [6] T.Aoki G.Takahashi T.Kajiya J.Yoshikawa S.L.Braunstein P.v.Loock A.Furusawa Quantum eroor correction beyong qubits Nature Physics 5: [7] Colin P.Williams Scott H.Chearwater [8] K.Fujii Y.Tokunaga Fault-Tolerant Topological One-Way Quantum Compution with Probabilistic Two-Qubit Gates Phys.Rev.Lett [9] A.M.Steane Error Correcting Codes in Quantum Theory Phys. Rev.Lett. 77(5): [10] P.W.Shor Scheme for reducing decoherence in quantum conputer memory Phys.Rev.A 52(4):

48 A A ( ) ( ) ( i 1 0 σ x = σ y = σ z = 1 0 i ) (A.1) (A.1) σ x σ y σ z (A.2) (A.3) (A.4) σx 2 = σy 2 = σz 2 = I σ x σ y = iσ z σ y σ z = iσ x σ z σ x = iσ y σ x σ y = σ y σ x σ y σ z = σ z σ y σ z σ x = σ x σ z (A.2) (A.3) (A.4) A.2 a a (2.1) 1 a a (A.5) a 40

49 A.3 { = = 0 1 (A.5) A.3 ( 0 1 ) ( 1 1 ) ( 1 0 ) ( 1 1 ) 1 0 = (A.6) ( 1 0 ) ( 1 1 ) ( 0 1 ) ( 1 1 ) 0 1 = (A.7) (A.8) = (A.9) 41

50 A (A.10) (A.11) = (A.12) = (A.13) 42

51 B B.1 Shor 5Qbit 2Qbit I XX YY ZZ XY YZ ZX X 0 Y 4 Y 1 Z 3 Z 2 X 4 Y 2 X 1 Y 3 Z 4 X 3 Z 1 X 2 Y 0 X 3 X 2 Z 4 Z 1 X 4 Y 3 X 1 Y 2 Y 4 Z 2 Y 1 Z 3 Z 0 X 4 X 1 Y 3 Y 2 Y 4 Z 3 Y 1 Z 2 Z 1 X 3 Z 4 X 2 X 1 Y 2 Y 0 Z 4 Z 3 X 2 Y 4 X 0 Y 3 Z 0 X 4 Z 2 X 3 Y 1 X 4 X 3 Z 2 Z 0 X 0 Y 4 X 2 Y 3 Y 2 Z 4 Y 0 Z 3 Z 1 X 2 X 0 Y 4 Y 3 Y 0 Z 4 Y 2 Z 3 Z 2 X 4 Z 0 X 3 X 2 Y 3 Y 1 Z 4 Z 0 X 3 Y 0 X 1 Y 4 Z 3 X 4 Z 1 X 0 Y 2 X 4 X 0 Z 3 Z 1 X 1 Y 0 X 3 Y 4 Y 3 Z 0 Y 1 Z 4 Z 2 X 3 X 1 Y 4 Y 0 Y 1 Z 0 Y 3 Z 4 Z 1 X 4 Z 3 X 0 X 3 Y 4 Y 2 Z 1 Z 0 X 4 Y 3 X 2 Y 0 Z 4 X 0 Z 2 X 1 Y 3 X 1 X 0 Z 4 Z 2 X 4 Y 0 X 2 Y 1 Y 4 Z 1 Y 2 Z 0 Z 3 X 3 X 1 Y 4 Y 0 Y 4 Z 0 Y 2 Z 1 Z 4 X 1 Z 2 X 0 X 4 Y 3 Y 0 Z 2 Z 1 X 3 Y 1 X 0 Y 2 Z 3 X 2 Z 0 X 1 Y 4 X 2 X 1 Z 3 Z 0 X 3 Y 2 X 0 Y 1 Y 3 Z 1 Y 0 Z 2 Z 4 X 3 X 0 Y 2 Y 1 Y 3 Z 2 Y 0 Z 1 Z 0 X 2 Z 3 X 1 43

52 B.2 5-3Qbit 2Qbit X 0 X 0 Z 3 Z 2 Z 1 X 2 Y 0 Y 0 Z 4 Z 1 Y 1 Z 3 X 1 Y 2 X 4 Y 3 Z 0 Z 0 Y 1 Z 2 Z 4 X 2 X 1 X 1 Z 4 Z 3 Y 2 Y 0 Y 1 Y 1 Y 0 Z 3 Z 2 Z 0 Y 2 Z 4 X 4 X 3 Z 1 Z 1 Y 0 Z 4 Y 4 Y 3 Y 2 Z 3 X 2 X 0 X 2 X 2 Z 4 Z 0 Z 1 X 0 Y 2 Y 2 X 3 Y 4 X 1 Y 0 Y 1 Z 4 Z 3 Z 1 Z 2 Z 2 Z 3 X 0 Y 1 Z 0 X 3 X 3 Y 4 Y 2 X 4 Y 1 Y 3 Y 3 Y 4 Z 1 X 4 Y 0 Z 3 Z 3 Z 2 X 0 Y 1 Y 0 Z 4 X 1 Y 2 Z 1 X 4 X 4 Y 3 Y 0 X 3 Y 1 Y 4 Y 4 X 3 Y 2 Y 3 Z 1 Z 4 Z 4 Y 0 Z 1 Z 3 X 1 Y 2 Y 1 Z 0 X X 0 Y 4 Y 1 Z 4 X 3 X 1 Y 3 X 4 Y 2 Y 0 Y 4 Z 2 X 3 X 2 Z 0 Y 4 Z 3 Y 3 Y 2 X 4 X 1 Z 1 X 3 X 1 Z 0 X 4 X 2 Y 4 X 0 Y 3 Z 2 X 3 Y 1 X 2 Y 3 X 0 Y 4 Z 1 Z 2 X 4 Y 3 Y 2 X 4 X 1 Z 1 X 3 X 2 Y 3 Y 1 X 3 Y 0 X 1 Y 4 Z 3 X 4 Y 2 Y 3 Z 0 X 4 X 0 Z 2 Z 1 X 4 Y 4 Y 0 Y 3 Z 4 X 3 X 1 X 3 X 2 Y 0 Z 1 Z 0 Z 4 X 0 Z 2 X 1 Y 3 X 2 Y 1 Y 2 Z 0 Z 4 Z 2 X 1 X 0 Z 3 Y 4 Z 0 X 4 X 2 X 4 Z 2 Z 1 Z 0 X 1 Z 3 X 2 X 0 Y 2 Y 4 Z 3 Z 0 Y 0 Z 2 X 0 Y 1 X 2 X 1 Z 4 Y 3 Z 2 X 3 X 0 44

21 Quantum calculator simulator based on reversible operation

21 Quantum calculator simulator based on reversible operation 21 Quantum calculator simulator based on reversible operation 1100366 2010 3 1 i Abstract Quantum calculator simulator based on reversible operation Ryota Yoshimura Quantum computation is the novel computational

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 () - 1 - - 2 - - 3 - - 4 - - 5 - 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

More information

<4D6963726F736F667420506F776572506F696E74202D208376838C835B83938365815B835683878393312E707074205B8CDD8AB78382815B83685D>

<4D6963726F736F667420506F776572506F696E74202D208376838C835B83938365815B835683878393312E707074205B8CDD8AB78382815B83685D> i i vi ii iii iv v vi vii viii ix 2 3 4 5 6 7 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60

More information

SC-85X2取説

SC-85X2取説 I II III IV V VI .................. VII VIII IX X 1-1 1-2 1-3 1-4 ( ) 1-5 1-6 2-1 2-2 3-1 3-2 3-3 8 3-4 3-5 3-6 3-7 ) ) - - 3-8 3-9 4-1 4-2 4-3 4-4 4-5 4-6 5-1 5-2 5-3 5-4 5-5 5-6 5-7 5-8 5-9 5-10 5-11

More information

i ii iii iv v vi vii ( ー ー ) ( ) ( ) ( ) ( ) ー ( ) ( ) ー ー ( ) ( ) ( ) ( ) ( ) 13 202 24122783 3622316 (1) (2) (3) (4) 2483 (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) 11 11 2483 13

More information

量子情報科学−情報科学の物理限界への挑戦- 2018

量子情報科学−情報科学の物理限界への挑戦- 2018 1 http://qi.mp.es.osaka-u.ac.jp/main 2 0 5000 10000 15000 20000 25000 30000 35000 40000 1945 1947 1949 1951 1953 1955 1957 1959 1961 1963 1965 1967 1969 1971 1973 1975 1977 1979 1981 1983 1985 1987 1989

More information

3 5 18 3 5000 1 2 7 8 120 1 9 1954 29 18 12 30 700 4km 1.5 100 50 6 13 5 99 93 34 17 2 2002 04 14 16 6000 12 57 60 1986 55 3 3 3 500 350 4 5 250 18 19 1590 1591 250 100 500 20 800 20 55 3 3 3 18 19 1590

More information

これわかWord2010_第1部_100710.indd

これわかWord2010_第1部_100710.indd i 1 1 2 3 6 6 7 8 10 10 11 12 12 12 13 2 15 15 16 17 17 18 19 20 20 21 ii CONTENTS 25 26 26 28 28 29 30 30 31 32 35 35 35 36 37 40 42 44 44 45 46 49 50 50 51 iii 52 52 52 53 55 56 56 57 58 58 60 60 iv

More information

パワポカバー入稿用.indd

パワポカバー入稿用.indd i 1 1 2 2 3 3 4 4 4 5 7 8 8 9 9 10 11 13 14 15 16 17 19 ii CONTENTS 2 21 21 22 25 26 32 37 38 39 39 41 41 43 43 43 44 45 46 47 47 49 52 54 56 56 iii 57 59 62 64 64 66 67 68 71 72 72 73 74 74 77 79 81 84

More information

これでわかるAccess2010

これでわかるAccess2010 i 1 1 1 2 2 2 3 4 4 5 6 7 7 9 10 11 12 13 14 15 17 ii CONTENTS 2 19 19 20 23 24 25 25 26 29 29 31 31 33 35 36 36 39 39 41 44 45 46 48 iii 50 50 52 54 55 57 57 59 61 63 64 66 66 67 70 70 73 74 74 77 77

More information

平成18年版 男女共同参画白書

平成18年版 男女共同参画白書 i ii iii iv v vi vii viii ix 3 4 5 6 7 8 9 Column 10 11 12 13 14 15 Column 16 17 18 19 20 21 22 23 24 25 26 Column 27 28 29 30 Column 31 32 33 34 35 36 Column 37 Column 38 39 40 Column 41 42 43 44 45

More information

IntroductionToQuantumComputer

IntroductionToQuantumComputer http://quantphys.org/wp/keisukefujii/?p=433 Twitter Keisuke Fujii@fgksk ? 1687: () Isaac Newton (1642-1727) http://www.newton.cam.ac.uk/art/portrait.html Equation of motion ? 1687: () 1873: () James C.

More information

III

III III 1 1 2 1 2 3 1 3 4 1 3 1 4 1 3 2 4 1 3 3 6 1 4 6 1 4 1 6 1 4 2 8 1 4 3 9 1 5 10 1 5 1 10 1 5 2 12 1 5 3 12 1 5 4 13 1 6 15 2 1 18 2 1 1 18 2 1 2 19 2 2 20 2 3 22 2 3 1 22 2 3 2 24 2 4 25 2 4 1 25 2

More information

iii iv v vi vii viii ix 1 1-1 1-2 1-3 2 2-1 3 3-1 3-2 3-3 3-4 4 4-1 4-2 5 5-1 5-2 5-3 5-4 5-5 5-6 5-7 6 6-1 6-2 6-3 6-4 6-5 6 6-1 6-2 6-3 6-4 6-5 7 7-1 7-2 7-3 7-4 7-5 7-6 7-7 7-8 7-9 7-10 7-11 8 8-1

More information

2

2 1 2 3 4 5 6 7 8 9 10 I II III 11 IV 12 V 13 VI VII 14 VIII. 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 _ 33 _ 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 VII 51 52 53 54 55 56 57 58 59

More information

untitled

untitled i ii iii iv v 43 43 vi 43 vii T+1 T+2 1 viii 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 a) ( ) b) ( ) 51

More information

Web Web Web Web i

Web Web Web Web i 28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In

More information

Chap10.dvi

Chap10.dvi =0. f = 2 +3 { 2 +3 0 2 f = 1 =0 { sin 0 3 f = 1 =0 2 sin 1 0 4 f = 0 =0 { 1 0 5 f = 0 =0 f 3 2 lim = lim 0 0 0 =0 =0. f 0 = 0. 2 =0. 3 4 f 1 lim 0 0 = lim 0 sin 2 cos 1 = lim 0 2 sin = lim =0 0 2 =0.

More information

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i 25 Estimation scheme of indoor positioning using difference of times which chirp signals arrive 114348 214 3 6 , (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,,

More information

1 (1) ( i ) 60 (ii) 75 (iii) 315 (2) π ( i ) (ii) π (iii) 7 12 π ( (3) r, AOB = θ 0 < θ < π ) OAB A 2 OB P ( AB ) < ( AP ) (4) 0 < θ < π 2 sin θ

1 (1) ( i ) 60 (ii) 75 (iii) 315 (2) π ( i ) (ii) π (iii) 7 12 π ( (3) r, AOB = θ 0 < θ < π ) OAB A 2 OB P ( AB ) < ( AP ) (4) 0 < θ < π 2 sin θ 1 (1) ( i ) 60 (ii) 75 (iii) 15 () ( i ) (ii) 4 (iii) 7 1 ( () r, AOB = θ 0 < θ < ) OAB A OB P ( AB ) < ( AP ) (4) 0 < θ < sin θ < θ < tan θ 0 x, 0 y (1) sin x = sin y (x, y) () cos x cos y (x, y) 1 c

More information

エクセルカバー入稿用.indd

エクセルカバー入稿用.indd i 1 1 2 3 5 5 6 7 7 8 9 9 10 11 11 11 12 2 13 13 14 15 15 16 17 17 ii CONTENTS 18 18 21 22 22 24 25 26 27 27 28 29 30 31 32 36 37 40 40 42 43 44 44 46 47 48 iii 48 50 51 52 54 55 59 61 62 64 65 66 67 68

More information

i

i 14 i ii iii iv v vi 14 13 86 13 12 28 14 16 14 15 31 (1) 13 12 28 20 (2) (3) 2 (4) (5) 14 14 50 48 3 11 11 22 14 15 10 14 20 21 20 (1) 14 (2) 14 4 (3) (4) (5) 12 12 (6) 14 15 5 6 7 8 9 10 7

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

01_.g.r..

01_.g.r.. I II III IV V VI VII VIII IX X XI I II III IV V I I I II II II I I YS-1 I YS-2 I YS-3 I YS-4 I YS-5 I YS-6 I YS-7 II II YS-1 II YS-2 II YS-3 II YS-4 II YS-5 II YS-6 II YS-7 III III YS-1 III YS-2

More information

D xy D (x, y) z = f(x, y) f D (2 ) (x, y, z) f R z = 1 x 2 y 2 {(x, y); x 2 +y 2 1} x 2 +y 2 +z 2 = 1 1 z (x, y) R 2 z = x 2 y

D xy D (x, y) z = f(x, y) f D (2 ) (x, y, z) f R z = 1 x 2 y 2 {(x, y); x 2 +y 2 1} x 2 +y 2 +z 2 = 1 1 z (x, y) R 2 z = x 2 y 5 5. 2 D xy D (x, y z = f(x, y f D (2 (x, y, z f R 2 5.. z = x 2 y 2 {(x, y; x 2 +y 2 } x 2 +y 2 +z 2 = z 5.2. (x, y R 2 z = x 2 y + 3 (2,,, (, 3,, 3 (,, 5.3 (. (3 ( (a, b, c A : (x, y, z P : (x, y, x

More information

2 122

2 122 32 2008 pp. 121 133 1 Received November 4, 2008 The aim of this paper is to clarify some profound changes in the language used in the visual media, especially in TV news programs in Japan, and show what

More information

ii iii iv CON T E N T S iii iv v Chapter1 Chapter2 Chapter 1 002 1.1 004 1.2 004 1.2.1 007 1.2.2 009 1.3 009 1.3.1 010 1.3.2 012 1.4 012 1.4.1 014 1.4.2 015 1.5 Chapter3 Chapter4 Chapter5 Chapter6 Chapter7

More information

四校_目次~巻頭言.indd

四校_目次~巻頭言.indd 107 25 1 2016 3 Key Words : A 114 67 58.84 Mann-Whitney 6 1. 2. 3. 4. 5. 6. I. 21 4 B 23 11 1 9 8 7 23456 108 25 1 2016 3 78 9 II. III. IV. 1. 24 4 A 114 2. 24 5 6 3. 4. 5. 3 42 5 16 6 22 5 4 4 4 3 6.

More information

III No (i) (ii) (iii) (iv) (v) (vi) x 2 3xy + 2 lim. (x,y) (1,0) x 2 + y 2 lim (x,y) (0,0) lim (x,y) (0,0) lim (x,y) (0,0) 5x 2 y x 2 + y 2. xy x2 + y

III No (i) (ii) (iii) (iv) (v) (vi) x 2 3xy + 2 lim. (x,y) (1,0) x 2 + y 2 lim (x,y) (0,0) lim (x,y) (0,0) lim (x,y) (0,0) 5x 2 y x 2 + y 2. xy x2 + y III No (i) (ii) (iii) (iv) (v) (vi) x 2 3xy + 2. (x,y) (1,0) x 2 + y 2 5x 2 y x 2 + y 2. xy x2 + y 2. 2x + y 3 x 2 + y 2 + 5. sin(x 2 + y 2 ). x 2 + y 2 sin(x 2 y + xy 2 ). xy (i) (ii) (iii) 2xy x 2 +

More information

活用ガイド (ソフトウェア編)

活用ガイド (ソフトウェア編) (Windows 95 ) ii iii iv NEC Corporation 1999 v P A R T 1 vi P A R T 2 vii P A R T 3 P A R T 4 viii P A R T 5 ix x P A R T 1 2 3 1 1 2 4 1 2 3 4 5 1 1 2 3 4 6 5 6 7 7 1 1 2 8 1 9 1 1 2 3 4 5 6 1 2 3 4

More information

x = a 1 f (a r, a + r) f(a) r a f f(a) 2 2. (a, b) 2 f (a, b) r f(a, b) r (a, b) f f(a, b)

x = a 1 f (a r, a + r) f(a) r a f f(a) 2 2. (a, b) 2 f (a, b) r f(a, b) r (a, b) f f(a, b) 2011 I 2 II III 17, 18, 19 7 7 1 2 2 2 1 2 1 1 1.1.............................. 2 1.2 : 1.................... 4 1.2.1 2............................... 5 1.3 : 2.................... 5 1.3.1 2.....................................

More information

29

29 9 .,,, 3 () C k k C k C + C + C + + C 8 + C 9 + C k C + C + C + C 3 + C 4 + C 5 + + 45 + + + 5 + + 9 + 4 + 4 + 5 4 C k k k ( + ) 4 C k k ( k) 3 n( ) n n n ( ) n ( ) n 3 ( ) 3 3 3 n 4 ( ) 4 4 4 ( ) n n

More information

II A A441 : October 02, 2014 Version : Kawahira, Tomoki TA (Kondo, Hirotaka )

II A A441 : October 02, 2014 Version : Kawahira, Tomoki TA (Kondo, Hirotaka ) II 214-1 : October 2, 214 Version : 1.1 Kawahira, Tomoki TA (Kondo, Hirotaka ) http://www.math.nagoya-u.ac.jp/~kawahira/courses/14w-biseki.html pdf 1 2 1 9 1 16 1 23 1 3 11 6 11 13 11 2 11 27 12 4 12 11

More information

困ったときのQ&A

困ったときのQ&A ii iii iv NEC Corporation 1997 v P A R T 1 vi vii P A R T 2 viii P A R T 3 ix x xi 1P A R T 2 1 3 4 1 5 6 1 7 8 1 9 1 2 3 4 10 1 11 12 1 13 14 1 1 2 15 16 1 2 1 1 2 3 4 5 17 18 1 2 3 1 19 20 1 21 22 1

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

2 ( ) i

2 ( ) i 25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA

More information

入門ガイド

入門ガイド ii iii iv NEC Corporation 1998 v P A R 1 P A R 2 P A R 3 T T T vi P A R T 4 P A R T 5 P A R T 6 P A R T 7 vii 1P A R T 1 2 2 1 3 1 4 1 1 5 2 3 6 4 1 7 1 2 3 8 1 1 2 3 9 1 2 10 1 1 2 11 3 12 1 2 1 3 4 13

More information

W u = u(x, t) u tt = a 2 u xx, a > 0 (1) D := {(x, t) : 0 x l, t 0} u (0, t) = 0, u (l, t) = 0, t 0 (2)

W u = u(x, t) u tt = a 2 u xx, a > 0 (1) D := {(x, t) : 0 x l, t 0} u (0, t) = 0, u (l, t) = 0, t 0 (2) 3 215 4 27 1 1 u u(x, t) u tt a 2 u xx, a > (1) D : {(x, t) : x, t } u (, t), u (, t), t (2) u(x, ) f(x), u(x, ) t 2, x (3) u(x, t) X(x)T (t) u (1) 1 T (t) a 2 T (t) X (x) X(x) α (2) T (t) αa 2 T (t) (4)

More information

( ) sin 1 x, cos 1 x, tan 1 x sin x, cos x, tan x, arcsin x, arccos x, arctan x. π 2 sin 1 x π 2, 0 cos 1 x π, π 2 < tan 1 x < π 2 1 (1) (

( ) sin 1 x, cos 1 x, tan 1 x sin x, cos x, tan x, arcsin x, arccos x, arctan x. π 2 sin 1 x π 2, 0 cos 1 x π, π 2 < tan 1 x < π 2 1 (1) ( 6 20 ( ) sin, cos, tan sin, cos, tan, arcsin, arccos, arctan. π 2 sin π 2, 0 cos π, π 2 < tan < π 2 () ( 2 2 lim 2 ( 2 ) ) 2 = 3 sin (2) lim 5 0 = 2 2 0 0 2 2 3 3 4 5 5 2 5 6 3 5 7 4 5 8 4 9 3 4 a 3 b

More information

x () g(x) = f(t) dt f(x), F (x) 3x () g(x) g (x) f(x), F (x) (3) h(x) = x 3x tf(t) dt.9 = {(x, y) ; x, y, x + y } f(x, y) = xy( x y). h (x) f(x), F (x

x () g(x) = f(t) dt f(x), F (x) 3x () g(x) g (x) f(x), F (x) (3) h(x) = x 3x tf(t) dt.9 = {(x, y) ; x, y, x + y } f(x, y) = xy( x y). h (x) f(x), F (x [ ] IC. f(x) = e x () f(x) f (x) () lim f(x) lim f(x) x + x (3) lim f(x) lim f(x) x + x (4) y = f(x) ( ) ( s46). < a < () a () lim a log xdx a log xdx ( ) n (3) lim log k log n n n k=.3 z = log(x + y ),

More information

微分積分 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. このサンプルページの内容は, 初版 1 刷発行時のものです.

微分積分 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます.   このサンプルページの内容は, 初版 1 刷発行時のものです. 微分積分 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. ttp://www.morikita.co.jp/books/mid/00571 このサンプルページの内容は, 初版 1 刷発行時のものです. i ii 014 10 iii [note] 1 3 iv 4 5 3 6 4 x 0 sin x x 1 5 6 z = f(x, y) 1 y = f(x)

More information

58 10

58 10 57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have

More information

,,.,.,,.,.,.,.,,.,..,,,, i

,,.,.,,.,.,.,.,,.,..,,,, i 22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of

More information

e a b a b b a a a 1 a a 1 = a 1 a = e G G G : x ( x =, 8, 1 ) x 1,, 60 θ, ϕ ψ θ G G H H G x. n n 1 n 1 n σ = (σ 1, σ,..., σ N ) i σ i i n S n n = 1,,

e a b a b b a a a 1 a a 1 = a 1 a = e G G G : x ( x =, 8, 1 ) x 1,, 60 θ, ϕ ψ θ G G H H G x. n n 1 n 1 n σ = (σ 1, σ,..., σ N ) i σ i i n S n n = 1,, 01 10 18 ( ) 1 6 6 1 8 8 1 6 1 0 0 0 0 1 Table 1: 10 0 8 180 1 1 1. ( : 60 60 ) : 1. 1 e a b a b b a a a 1 a a 1 = a 1 a = e G G G : x ( x =, 8, 1 ) x 1,, 60 θ, ϕ ψ θ G G H H G x. n n 1 n 1 n σ = (σ 1,

More information

untitled

untitled 1998 6 25 ( ) 1 10 1982 10 28 37/7 1990 12 14 45/94 (WHO) 1 1989 12 8 NGO (ECE) 3 1995 10 25 ECE 1991 2 25 1992 3 17 1998 6 4 1 2 1. 2. a b c (a) (b) d 17 3. a b (a) c (b) 4. 5. 3 1. 2. 3. 4. 5. 6. 7.

More information

M41 JP Manual.indd

M41 JP Manual.indd i ii iii iv v vi vii 1 No / A-B EQ 2 MIC REC REC00001.WAV Stereo CH:01 0:00:00 1:50:00 3 4 5 6 7 8 9 10 11 12 1 1 F F A A 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Φ 35 36 37 38

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

活用ガイド (ソフトウェア編)

活用ガイド (ソフトウェア編) (Windows 98 ) ii iii iv v NEC Corporation 1999 vi P A R T 1 P A R T 2 vii P A R T 3 viii P A R T 4 ix P A R T 5 x P A R T 1 2 3 1 1 2 4 1 2 3 4 5 1 1 2 3 4 5 6 6 7 7 1 1 2 8 1 9 1 1 2 3 4 5 6 1 2 3 10

More information

() n C + n C + n C + + n C n n (3) n C + n C + n C 4 + n C + n C 3 + n C 5 + (5) (6 ) n C + nc + 3 nc n nc n (7 ) n C + nc + 3 nc n nc n (

() n C + n C + n C + + n C n n (3) n C + n C + n C 4 + n C + n C 3 + n C 5 + (5) (6 ) n C + nc + 3 nc n nc n (7 ) n C + nc + 3 nc n nc n ( 3 n nc k+ k + 3 () n C r n C n r nc r C r + C r ( r n ) () n C + n C + n C + + n C n n (3) n C + n C + n C 4 + n C + n C 3 + n C 5 + (4) n C n n C + n C + n C + + n C n (5) k k n C k n C k (6) n C + nc

More information

i

i i ii iii iv v vi vii viii ix x xi ( ) 854.3 700.9 10 200 3,126.9 162.3 100.6 18.3 26.5 5.6/s ( ) ( ) 1949 8 12 () () ア イ ウ ) ) () () () () BC () () (

More information

..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i

..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i 25 Feature Selection for Prediction of Stock Price Time Series 1140357 2014 2 28 ..,,,,. 2013 1 1 12 31, ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i Abstract Feature Selection for Prediction of Stock Price Time

More information

Web Web ID Web 16 Web Web i

Web Web ID Web 16 Web Web i 24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro

More information

1 1 3 ABCD ABD AC BD E E BD 1 : 2 (1) AB = AD =, AB AD = (2) AE = AB + (3) A F AD AE 2 = AF = AB + AD AF AE = t AC = t AE AC FC = t = (4) ABD ABCD 1 1

1 1 3 ABCD ABD AC BD E E BD 1 : 2 (1) AB = AD =, AB AD = (2) AE = AB + (3) A F AD AE 2 = AF = AB + AD AF AE = t AC = t AE AC FC = t = (4) ABD ABCD 1 1 ABCD ABD AC BD E E BD : () AB = AD =, AB AD = () AE = AB + () A F AD AE = AF = AB + AD AF AE = t AC = t AE AC FC = t = (4) ABD ABCD AB + AD AB + 7 9 AD AB + AD AB + 9 7 4 9 AD () AB sin π = AB = ABD AD

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

活用ガイド (ソフトウェア編)

活用ガイド (ソフトウェア編) ii iii iv NEC Corporation 1998 v vi PA RT 1 vii PA RT 2 viii PA RT 3 PA RT 4 ix P A R T 1 2 3 1 4 5 1 1 2 1 2 3 4 6 1 2 3 4 5 7 1 6 7 8 1 9 1 10 1 2 3 4 5 6 7 8 9 10 11 11 1 12 12 1 13 1 1 14 2 3 4 5 1

More information

22 1,936, ,115, , , , , , ,

22 1,936, ,115, , , , , , , 21 * 2 3 1 1991 1945 200 60 1944 No. 41 2016 22 1,936,843 1945 1,115,594 1946 647,006 1947 598,507 1 60 2014 501,230 354,503 5 2009 405,571 5 1 2 2009 2014 5 37,285 1 2 1965 10 1975 66 1985 43 10 3 1990

More information

パソコン機能ガイド

パソコン機能ガイド PART12 ii iii iv v 1 2 3 4 5 vi vii viii ix P A R T 1 x P A R T 2 xi P A R T 3 xii xiii P A R T 1 2 3 1 4 5 1 6 1 1 2 7 1 2 8 1 9 10 1 11 12 1 13 1 2 3 4 14 1 15 1 2 3 16 4 1 1 2 3 17 18 1 19 20 1 1

More information

パソコン機能ガイド

パソコン機能ガイド PART2 iii ii iv v 1 2 3 4 5 vi vii viii ix P A R T 1 x P A R T 2 xi P A R T 3 xii xiii P A R T 1 2 1 3 4 1 5 6 1 2 1 1 2 7 8 9 1 10 1 11 12 1 13 1 2 3 14 4 1 1 2 3 15 16 1 17 1 18 1 1 2 19 20 1 21 1 22

More information

: α α α f B - 3: Barle 4: α, β, Θ, θ α β θ Θ

: α α α f B - 3: Barle 4: α, β, Θ, θ α β θ Θ 17 6 8.1 1: Bragg-Brenano x 1 Bragg-Brenano focal geomer 1 Bragg-Brenano α α 1 1 α < α < f B α 3 α α Barle 1. 4 α β θ 1 : α α α f B - 3: Barle 4: α, β, Θ, θ α β θ Θ Θ θ θ Θ α, β θ Θ 5 a, a, a, b, b, b

More information

BIT -2-

BIT -2- 2004.3.31 10 11 12-1- BIT -2- -3-256 258 932 524 585 -4- -5- A B A B AB A B A B C AB A B AB AB AB AB -6- -7- A B -8- -9- -10- mm -11- fax -12- -13- -14- -15- s58.10.1 1255 4.2 30.10-16- -17- -18- -19-6.12.10

More information

,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i

,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i 23 Experimental investigation of Natural Use Profiles of Pen Pressure, Tilt and Azimuth 1120230 2012 3 1 ,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i Abstract Experimental investigation of Natural Use

More information

28 TCG SURF Card recognition using SURF in TCG play video

28 TCG SURF Card recognition using SURF in TCG play video 28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka

More information

2 1 ( ) 2 ( ) i

2 1 ( ) 2 ( ) i 21 Perceptual relation bettween shadow, reflectance and luminance under aambiguous illuminations. 1100302 2010 3 1 2 1 ( ) 2 ( ) i Abstract Perceptual relation bettween shadow, reflectance and luminance

More information

85 4

85 4 85 4 86 Copright c 005 Kumanekosha 4.1 ( ) ( t ) t, t 4.1.1 t Step! (Step 1) (, 0) (Step ) ±V t (, t) I Check! P P V t π 54 t = 0 + V (, t) π θ : = θ : π ) θ = π ± sin ± cos t = 0 (, 0) = sin π V + t +V

More information

液晶の物理1:連続体理論(弾性,粘性)

液晶の物理1:連続体理論(弾性,粘性) The Physics of Liquid Crystals P. G. de Gennes and J. Prost (Oxford University Press, 1993) Liquid crystals are beautiful and mysterious; I am fond of them for both reasons. My hope is that some readers

More information

#A A A F, F d F P + F P = d P F, F y P F F x A.1 ( α, 0), (α, 0) α > 0) (x, y) (x + α) 2 + y 2, (x α) 2 + y 2 d (x + α)2 + y 2 + (x α) 2 + y 2 =

#A A A F, F d F P + F P = d P F, F y P F F x A.1 ( α, 0), (α, 0) α > 0) (x, y) (x + α) 2 + y 2, (x α) 2 + y 2 d (x + α)2 + y 2 + (x α) 2 + y 2 = #A A A. F, F d F P + F P = d P F, F P F F A. α, 0, α, 0 α > 0, + α +, α + d + α + + α + = d d F, F 0 < α < d + α + = d α + + α + = d d α + + α + d α + = d 4 4d α + = d 4 8d + 6 http://mth.cs.kitmi-it.c.jp/

More information

1... 1 2... 1 1... 1 2... 2 3... 2 4... 4 5... 4 6... 4 7... 22 8... 22 3... 22 1... 22 2... 23 3... 23 4... 24 5... 24 6... 25 7... 31 8... 32 9... 3

1... 1 2... 1 1... 1 2... 2 3... 2 4... 4 5... 4 6... 4 7... 22 8... 22 3... 22 1... 22 2... 23 3... 23 4... 24 5... 24 6... 25 7... 31 8... 32 9... 3 3 2620149 3 6 3 2 198812 21/ 198812 21 1 3 4 5 JISJIS X 0208 : 1997 JIS 4 JIS X 0213:2004 http://www.pref.hiroshima.lg.jp/site/monjokan/ 1... 1 2... 1 1... 1 2... 2 3... 2 4... 4 5... 4 6... 4 7... 22

More information

Information is physical. Rolf Landauer It from bit. John Wheeler I think there is a world market for maybe five computers. Thomas Watson

Information is physical. Rolf Landauer It from bit. John Wheeler I think there is a world market for maybe five computers. Thomas Watson 量子情報基礎 阿部英介 慶應義塾大学先導研究センター 応用物理情報特別講義 A 216 年度春学期後半金曜 4 限 @14-22 Information is physical. Rolf Landauer It from bit. John Wheeler I think there is a world market for maybe five computers. Thomas Watson

More information

II No.01 [n/2] [1]H n (x) H n (x) = ( 1) r n! r!(n 2r)! (2x)n 2r. r=0 [2]H n (x) n,, H n ( x) = ( 1) n H n (x). [3] H n (x) = ( 1) n dn x2 e dx n e x2

II No.01 [n/2] [1]H n (x) H n (x) = ( 1) r n! r!(n 2r)! (2x)n 2r. r=0 [2]H n (x) n,, H n ( x) = ( 1) n H n (x). [3] H n (x) = ( 1) n dn x2 e dx n e x2 II No.1 [n/] [1]H n x) H n x) = 1) r n! r!n r)! x)n r r= []H n x) n,, H n x) = 1) n H n x) [3] H n x) = 1) n dn x e dx n e x [4] H n+1 x) = xh n x) nh n 1 x) ) d dx x H n x) = H n+1 x) d dx H nx) = nh

More information

.2 ρ dv dt = ρk grad p + 3 η grad (divv) + η 2 v.3 divh = 0, rote + c H t = 0 dive = ρ, H = 0, E = ρ, roth c E t = c ρv E + H c t = 0 H c E t = c ρv T

.2 ρ dv dt = ρk grad p + 3 η grad (divv) + η 2 v.3 divh = 0, rote + c H t = 0 dive = ρ, H = 0, E = ρ, roth c E t = c ρv E + H c t = 0 H c E t = c ρv T NHK 204 2 0 203 2 24 ( ) 7 00 7 50 203 2 25 ( ) 7 00 7 50 203 2 26 ( ) 7 00 7 50 203 2 27 ( ) 7 00 7 50 I. ( ν R n 2 ) m 2 n m, R = e 2 8πε 0 hca B =.09737 0 7 m ( ν = ) λ a B = 4πε 0ħ 2 m e e 2 = 5.2977

More information

知能科学:ニューラルネットワーク

知能科学:ニューラルネットワーク 2 3 4 (Neural Network) (Deep Learning) (Deep Learning) ( x x = ax + b x x x ? x x x w σ b = σ(wx + b) x w b w b .2.8.6 σ(x) = + e x.4.2 -.2 - -5 5 x w x2 w2 σ x3 w3 b = σ(w x + w 2 x 2 + w 3 x 3 + b) x,

More information

知能科学:ニューラルネットワーク

知能科学:ニューラルネットワーク 2 3 4 (Neural Network) (Deep Learning) (Deep Learning) ( x x = ax + b x x x ? x x x w σ b = σ(wx + b) x w b w b .2.8.6 σ(x) = + e x.4.2 -.2 - -5 5 x w x2 w2 σ x3 w3 b = σ(w x + w 2 x 2 + w 3 x 3 + b) x,

More information

(iii) 0 V, x V, x + 0 = x. 0. (iv) x V, y V, x + y = 0., y x, y = x. (v) 1x = x. (vii) (α + β)x = αx + βx. (viii) (αβ)x = α(βx)., V, C.,,., (1)

(iii) 0 V, x V, x + 0 = x. 0. (iv) x V, y V, x + y = 0., y x, y = x. (v) 1x = x. (vii) (α + β)x = αx + βx. (viii) (αβ)x = α(βx)., V, C.,,., (1) 1. 1.1...,. 1.1.1 V, V x, y, x y x + y x + y V,, V x α, αx αx V,, (i) (viii) : x, y, z V, α, β C, (i) x + y = y + x. (ii) (x + y) + z = x + (y + z). 1 (iii) 0 V, x V, x + 0 = x. 0. (iv) x V, y V, x + y

More information

29 Short-time prediction of time series data for binary option trade

29 Short-time prediction of time series data for binary option trade 29 Short-time prediction of time series data for binary option trade 1180365 2018 2 28 RSI(Relative Strength Index) 3 USD/JPY 1 2001 1 2 4 10 2017 12 29 17 00 1 high low i Abstract Short-time prediction

More information

70 : 20 : A B (20 ) (30 ) 50 1

70 : 20 : A B (20 ) (30 ) 50 1 70 : 0 : A B (0 ) (30 ) 50 1 1 4 1.1................................................ 5 1. A............................................... 6 1.3 B............................................... 7 8.1 A...............................................

More information

262014 3 1 1 6 3 2 198810 2/ 198810 2 1 3 4 http://www.pref.hiroshima.lg.jp/site/monjokan/ 1... 1... 1... 2... 2... 4... 5... 9... 9... 10... 10... 10... 10... 13 2... 13 3... 15... 15... 15... 16 4...

More information

23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones

23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones 23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones 1120220 2012 3 1 iphone..,. 2 (, ) 3 (,, ),,,.,..,. HCI i Abstract A Comparison of Flick and Ring Document Scrolling in

More information

01-加藤 実-5.02

01-加藤 実-5.02 Bull. Natl. Mus. Nat. Sci., Ser. E, 30, pp. 1 13, December 21, 2007 1 2 3 1 169 0073 3 23 1 2 523 0058 961 3 248 0036 3 5 6 The Mechanism of the Automatic Wari-koma Dial in the Japanese Clocks and its

More information

IT i

IT i 27 The automatic extract of know-how search tag using a thesaurus 1160374 2016 2 26 IT i Abstract The automatic extract of know-how search tag using a thesaurus In recent years, a number of organizational

More information

i

i i KEY WORDS CASE CHECK POINT EXERCISE Column ii 4 6 9 11 1 5 7 8 2 3 10 12 MESSAGE iii 1 1 23 4 2 56 3 2 5 8 11 CASE 12 1 2 3 181920 20 4 2223 232425 5 6 14 16 18 22 25 27 29 CASE 30 1 31 3233 2 31 34

More information

The 15th Game Programming Workshop 2010 Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard Magic Bitboard Magic Bitbo

The 15th Game Programming Workshop 2010 Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard Magic Bitboard Magic Bitbo Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard 64 81 Magic Bitboard Magic Bitboard Bonanza Proposal and Implementation of Magic Bitboards in Shogi Issei Yamamoto, Shogo Takeuchi,

More information

function2.pdf

function2.pdf 2... 1 2009, http://c-faculty.chuo-u.ac.jp/ nishioka/ 2 11 38 : 5) i) [], : 84 85 86 87 88 89 1000 ) 13 22 33 56 92 147 140 120 100 80 60 40 20 1 2 3 4 5 7.1 7 7.1 1. *1 e = 2.7182 ) fx) e x, x R : 7.1)

More information

R = Ar l B r l. A, B A, B.. r 2 R r = r2 [lar r l B r l2 ]=larl l B r l.2 r 2 R = [lar l l Br ] r r r = ll Ar l ll B = ll R rl.3 sin θ Θ = ll.4 Θsinθ

R = Ar l B r l. A, B A, B.. r 2 R r = r2 [lar r l B r l2 ]=larl l B r l.2 r 2 R = [lar l l Br ] r r r = ll Ar l ll B = ll R rl.3 sin θ Θ = ll.4 Θsinθ .3.2 3.3.2 Spherical Coorinates.5: Laplace 2 V = r 2 r 2 x = r cos φ sin θ, y = r sin φ sin θ, z = r cos θ.93 r 2 sin θ sin θ θ θ r 2 sin 2 θ 2 V =.94 2.94 z V φ Laplace r 2 r 2 r 2 sin θ.96.95 V r 2 R

More information