WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i
|
|
- あおい なぐも
- 5 years ago
- Views:
Transcription
1 28 WebRTC Design of multi-platform file sharing system using WebRTC
2 WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i
3 Abstract Design of multi-platform file sharing system using WebRTC Harumi Tsukamoto In the system, such as performing file sharing to build a P2P network, it is necessary to install a dedicated application on the computer. In order to solve this problem, there is a file sharing service that runs on a web browser, but there are problems that the smartphone is not sufficiently dealt with, and there is a problem that it can not be used on a network with a proxy server. In this research, we propose a multi-platform file sharing system using WebRTC which can operate on multiple platforms and solve the above problem. key words WebRTC, P2P, MultiPlatform ii
4 1 1 2 P2P WebRTC OAuth WebAPI WebRTC iii
5 ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) TRUN iv
6 Node.js v
7 1,, P2P.,,. P2P,., Web. Web,. WebAPI. 1
8 2 P2P P2P. Web HTTP. 2.1 Resilio Sync (BitTorrent Sync) storj. Resilio Sync BitTorrent, BitTorrent [1]. BitTorrent P2P [2] [3]. storj, P2P [4]. 2.2 reep.io DirectSEND reep.io WebRTC [5]. TURN TURN, 2
9 2.2 DirectSEND Websocket [6] 3
10 3,., Javascript HTML WebRTC STUN TURN. WebAPI., WebAPI OAuth. 3.1, 3.1. API STUN TURN WebRTC STUN TURN 3.1 4
11 APIサーバシグナリングTURN STUNサーバサーバサーバ Appサーバ ユーザ情報や送信先情報ファイル情報のやり取り 利 者 A ( 送信側 ) WebRTC ファイル転送 利 者 B ( 受信側 ) 利 者 C ( 送信側 ) WebRTC ファイル転送 利 者 D ( 受信側 ) 利 者 E ( 送信側 ) WebRTC ファイル転送 利 者 F ( 受信側 ) 3.1 5
12 WebRTC WebRTC(Web Real-Time Communication) W3C(World Wide Web Consortium)., WebRTC IETF (Internet Engineering Task Force) [7]. WebRTC Web P2P., WebRTC, NAT(NAPT) STUN (Session Traversal Utilities for NATs) P2P. WebRTC TURN(Traversal Using Relay around NAT). STUN TURN ICE(Interactive Connectivity Establishment) SDP(Session Description Protocol) WebRTC OAuth OAuth [8], (RFC6749 RFC6750) OAuth OAuth.. OAuth. 6
13 WebAPI Node.js WebAPI. WebAPI OAuth. WebAPI. WebAPI URL JSON JSON. 1.., ID. OAuth. 2..,,, ID,. 4. 7
14 4.2 WebRTC.., ID. WebRTC ID. WebRTC ID ID WebRTC WebRTC P2P. 1. WebAPI ID. 2. WebAPI ID. WebRTC. SDP. SDP WebRTC ( ), (WebAPI ) ( ) TURN. 8
15 ( ) a Web, API. STUN,. b, API. STUN, WebRTC. c WebRTC WebRTC. 9
16 4.3 2 ファイル情報 3 通信 情報 Appサーバ APIサーバシグナリングサーバ STUNサーバ PC 1 ( 送信側 ) PC 2 ( 受信側 ) 4.1 ( ) 2 転送要求 3 通信 情報 Appサーバ APIサーバシグナリングサーバ STUNサーバ PC 1 ( 送信側 ) PC 2 ( 受信側 ) 4.2 ( ) 10
17 4.3 Appサーバ APIサーバシグナリングサーバ STUNサーバ 2 ファイル転送 PC 1 ( 送信側 ) PC 2 ( 受信側 ) 4.3 ( ) 11
18 ( ) a API. STUN, API. b, API. STUN, WebRTC. c WebRTC WebRTC. 12
19 4.3 Appサーバ APIサーバシグナリングサーバ STUNサーバ スマホ ( 送信側 ) PC ( 受信側 ) 4.4 ( ) 2 転送要求 3 通信 情報 Appサーバ APIサーバシグナリングサーバ STUNサーバ スマホ ( 送信側 ) PC ( 受信側 ) 4.5 ( ) 13
20 4.3 Appサーバ APIサーバシグナリングサーバ STUNサーバ 2 ファイル転送 スマホ ( 送信側 ) 4.6 PC ( 受信側 ) ( ) 14
21 ( ) a Web, API. STUN,. b API. STUN, API WebRTC. c WebRTC WebRTC. 15
22 4.3 2 ファイル情報 3 通信 情報 Appサーバ APIサーバシグナリングサーバ STUNサーバ PC ( 送信側 ) スマホ ( 受信側 ) 4.7 ( ) Appサーバ APIサーバシグナリングサーバ STUNサーバ PC ( 送信側 ) スマホ ( 受信側 ) 4.8 ( ) 16
23 4.3 Appサーバ APIサーバシグナリングサーバ STUNサーバ 2 ファイル転送 PC ( 送信側 ) 4.9 スマホ ( 受信側 ) ( ) 17
24 ( ) a API. STUN, API. b API. STUN, API WebRTC. c WebRTC WebRTC. 18
25 4.3 Appサーバ APIサーバシグナリングサーバ STUNサーバ スマホ 1 ( 送信側 ) スマホ 2 ( 受信側 ) 4.10 ( ) Appサーバ APIサーバシグナリングサーバ STUNサーバ スマホ 1 ( 送信側 ) スマホ 2 ( 受信側 ) 4.11 ( ) 19
26 4.3 Appサーバ APIサーバシグナリングサーバ STUNサーバ 2 ファイル転送 スマホ 1 ( 送信側 ) 4.12 スマホ 2 ( 受信側 ) ( ) 20
27 TURN 4.13 STUN TURN TURN. Appサーバ APIサーバシグナリングサーバ STUNサーバ TURN サーバ 2 ファイル転送 スマホ 1 ( 送信側 ) スマホ 2 ( 受信側 ) 4.13 TRUN 21
28 , Nginx WebAPI. WebAPI Node.js. Node.js, JavaScript [9]. Web PeerJS Web. STUN TURN TURN STUN coturn Node.js PostgreSQL SQLite. STUN coturn STUN. CentOS 7.3 nginx Web MariaDB Node.js JavaScript coturn TURN & STUN WebAPI. 22
29 4.4 bcrypt knex koa oauth2-server nod er node-uuid validator OAuth UUID 4.2 Node.js 23
30 5, P2P,. WebRTC Web. WebRTC ( ) WebAPI. P2P TURN. 24
31 ,.,.,,,,,,,,,., 4. 25
32 [1] P2P BitTorrent Sync (1) P2P available at bittorrentsync/, ( ) [2] P2P available at coara.or.jp/seinfo/p2p.html, ( ) [3] available at 1.htm, ( ) [4] Storj - Decentralized Cloud Storage. available at ( ). [5] reep.io peer-to-peer filesharing made easy. available at ( ). [6] DirectSEND - available at https: //directsend.me, ( ) [7] AlanJohnson/ Daniel C. Burnett[ ] [ ] WebRTC P2P 2014 [8] TCP/IP 2015 [9] Node.js
WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution
More informationWeb Web ID Web 16 Web Web i
24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro
More informationP2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i
26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information
More informationDEIM Forum 2019 I7-2 WebRTC, UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA
DEIM Forum 2019 I7-2 WebRTC, 112-8610 2-1-1 101-0025 3-27-3 980-0812 2-1-3 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA 565-0871 1-5 E-mail: {tanaka.arisa,oguchi}@is.ocha.ac.jp,
More informationP2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i
27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More informationuntitled
Studies in Human Geography 32 Geoenvironmental Sciences, Graduate School of Life and Environmental Sciences, University of Tsukuba, Japan ArcGIS Geography Network ArcGIS ArcGIS ArcGIS Geography Network
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationNAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for
NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for SIP utilizing NAT-f Kenkichi Miura, 1 Hidekazu Suzuki
More informationIT,, i
22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More information17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
More information, IT.,.,..,.. i
25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More informationWeb Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
More informationIPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [
1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)
More information卒業論文2.dvi
15 GUI A study on the system to transfer a GUI sub-picture to the enlarging viewer for operational support 1040270 2004 2 27 GUI PC PC GUI Graphical User Interface PC GUI GUI PC GUI PC PC GUI i Abstract
More information28 NTMobile Java Proposal and Implementation of Java Wrapper for NTMobile ( : ) :
28 NTMobile Java Proposal and Implementation of Java Wrapper for NTMobile ( : 130441077) : 29 2 10 NTMobile Network Traversal with Mobility NTMobile Linux NTMobile C Java NTMobile Java Java JNA Java Native
More information58 10
57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have
More informationn 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i
15 Comparison and Evaluation of Dynamic Programming and Genetic Algorithm for a Knapsack Problem 1040277 2004 2 25 n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i Abstract Comparison and
More informationVirtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking
23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual
More information189 2015 1 80
189 2015 1 A Design and Implementation of the Digital Annotation Basis on an Image Resource for a Touch Operation TSUDA Mitsuhiro 79 189 2015 1 80 81 189 2015 1 82 83 189 2015 1 84 85 189 2015 1 86 87
More information24 Region-Based Image Retrieval using Fuzzy Clustering
24 Region-Based Image Retrieval using Fuzzy Clustering 1130323 2013 3 9 Visual-key Image Retrieval(VKIR) k-means Fuzzy C-means 2 200 2 2 20 VKIR 5 18% 54% 7 30 Fuzzy C-means i Abstract Region-Based Image
More informationPC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i
21 The private mailers synchronization operation for plural terminals 1125083 2010 3 1 PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i Abstract The private mailers synchronization operation for plural terminals
More informationITAOI2003第三屆離島資訊與應用研討會論文範例
2003 6 kung@mail.npust.edu.tw, b8956018@mail.npust.edu.tw, m9056011@mail.npust.edu.tw (Internet) and build up cache proxy servers. In this paper, we (Multi-media) design and development four proxy servers
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji
Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake
More information19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability
19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability 1105402 2008 2 4 2,, i Abstract Systematization of Problem Solving Strategy in High School
More informationDTN DTN DTN DTN i
28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee
More information1 Web Web 1,,,, Web, Web : - i -
2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.
More informationpaper.dvi
28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret
More informationIPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka
* Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More information(Microsoft PowerPoint - 2.\(\220\274\222J\202\263\202\361\)JANOG ppt [\214\335\212\267\203\202\201[\203h])
ISP の NAT には 何が求められるか? NTT コミュニケーションズ株式会社 西谷智広 2008/7/10 JANOG22 1 目次 1. 自己紹介 2. ISPのNATが満たすべき要件は? 1. 透過性 2. 接続確立性 3. 公平性 3. サービス影響 4. まとめ 2008/7/10 JANOG22 2 1. 自己紹介 NTTコミュニケーションズ株式会社先端 IPアーキテクチャセンタにて
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More information23 The Study of support narrowing down goods on electronic commerce sites
23 The Study of support narrowing down goods on electronic commerce sites 1120256 2012 3 15 i Abstract The Study of support narrowing down goods on electronic commerce sites Masaki HASHIMURA Recently,
More information25 Removal of the fricative sounds that occur in the electronic stethoscope
25 Removal of the fricative sounds that occur in the electronic stethoscope 1140311 2014 3 7 ,.,.,.,.,.,.,.,,.,.,.,.,,. i Abstract Removal of the fricative sounds that occur in the electronic stethoscope
More informationWi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i
26 A Study on Secure Remote Control Methods 1175078 2015 2 27 Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i Abstract A Study on Secure Remote Control Methods SHINGAI, Tatsuro In recent years, communication
More informationfiš„v5.dvi
(2001) 49 2 293 303 VRML 1 2 3 2001 4 12 2001 10 16 Web Java VRML (Virtual Reality Modeling Language) VRML Web VRML VRML VRML VRML Web VRML VRML, 3D 1. WWW (World Wide Web) WWW Mittag (2000) Web CGI Java
More information21 A contents organization method for information sharing systems
21 A contents organization method for information sharing systems 1125140 2010 3 4 IT i Abstract A contents organization method for information sharing systems Aoki, Wataru Organizations to share information,
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More information[2] 1. 2. 2 2. 1, [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7
32 (2015 ) [2] Projects of the short term increase at present. In order to let projects complete without rework and delays, it is important that request for proposals (RFP) are written by reflecting precisely
More informationMac OS X Server QuickTime Streaming Server 5.0 の管理(バージョン 10.3 以降用)
Mac OS X Server QuickTime Streaming Server 5.0 Mac OS X Server 10.3 apple Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. QuickTime Streaming Server Apple Apple Computer, Inc. Apple
More information23 Study on Generation of Sudoku Problems with Fewer Clues
23 Study on Generation of Sudoku Problems with Fewer Clues 1120254 2012 3 1 9 9 21 18 i Abstract Study on Generation of Sudoku Problems with Fewer Clues Norimasa NASU Sudoku is puzzle a kind of pencil
More information21 e-learning Development of Real-time Learner Detection System for e-learning
21 e-learning Development of Real-time Learner Detection System for e-learning 1100349 2010 3 1 e-learning WBT (Web Based training) e-learning LMS (Learning Management System) LMS WBT e-learning e-learning
More information企業内システムにおけるA j a x 技術の利用
Utilization of Ajax in Enterprise Intranet Systemsby Tetsuo Yamashita, Takeshi Kuroe and Kazuhisa Ikeda Enterprise 2.0 refers to the recent trend of applying the web technologies widely deployed in Internet
More information2
2011 8 6 2011 5 7 [1] 1 2 i ii iii i 3 [2] 4 5 ii 6 7 iii 8 [3] 9 10 11 cf. Abstracts in English In terms of democracy, the patience and the kindness Tohoku people have shown will be dealt with as an exception.
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More informationHP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree
LAN 1 2 3 2 LAN WiFiTag WiFiTag LAN LAN 100% WiFi Tag An Improved Determination Method with Multiple Access Points for Relative Position Estimation Using Wireless LAN Abstract: We have proposed a WiFiTag
More informationSOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i
20 SOM Development of Syllabus Vsualization System using Spherical Self-Organizing Maps 1090366 2009 3 5 SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i Abstract Development of Syllabus Vsualization
More information21 Quantum calculator simulator based on reversible operation
21 Quantum calculator simulator based on reversible operation 1100366 2010 3 1 i Abstract Quantum calculator simulator based on reversible operation Ryota Yoshimura Quantum computation is the novel computational
More informationprovider_020524_2.PDF
1 1 1 2 2 3 (1) 3 (2) 4 (3) 6 7 7 (1) 8 (2) 21 26 27 27 27 28 31 32 32 36 1 1 2 2 (1) 3 3 4 45 (2) 6 7 5 (3) 6 7 8 (1) ii iii iv 8 * 9 10 11 9 12 10 13 14 15 11 16 17 12 13 18 19 20 (2) 14 21 22 23 24
More information1: MaidSafe [1] Tornet [2] 2
MetaDisk Shawn Wilkinson (shawn@storj.io), Jim Lowry (jim@storj.io) : Tome Boshevski (tome@storj.io) http://storj.io http://metadisk.org 2014 12 23 v1.01 MetaDisk MetaDisk MetaDisk Storj MetaDisk 1 TCP/IP
More information,,,, : - i -
2017 Future University Hakodate 2017 System Information Science Practice Group Report Project Name Manga engineering Group Name Literacy Manga /Project No. 19 /Project Leader 1015131 Kiyomasa Murakami
More information2013 Future University Hakodate 2013 System Information Science Practice Group Report biblive : Project Name biblive : Recording and sharing experienc
2013 Future University Hakodate 2013 System Information Science Practice Group Report biblive : Project Name B biblive stream Group Name GroupB biblive stream /Project No. 12-B /Project Leader 1011063
More information17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
More informationbook.dvi
P2P Web Proxy 1120180 24 3 16 1 3 2 5 2.1 Web........................ 5 2.2 Web Proxy.................................... 10 2.2.1 P2P Web Proxy.............................. 11 3 P2P Web Proxy 13 3.1...................................
More information44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2)
(1) I 44 II 45 III 47 IV 52 44 4 I (1) ( ) 1945 8 9 (10 15 ) ( 17 ) ( 3 1 ) (2) 45 II 1 (3) 511 ( 451 1 ) ( ) 365 1 2 512 1 2 365 1 2 363 2 ( ) 3 ( ) ( 451 2 ( 314 1 ) ( 339 1 4 ) 337 2 3 ) 363 (4) 46
More informationIT i
27 The automatic extract of know-how search tag using a thesaurus 1160374 2016 2 26 IT i Abstract The automatic extract of know-how search tag using a thesaurus In recent years, a number of organizational
More informationi ii i iii iv 1 3 3 10 14 17 17 18 22 23 28 29 31 36 37 39 40 43 48 59 70 75 75 77 90 95 102 107 109 110 118 125 128 130 132 134 48 43 43 51 52 61 61 64 62 124 70 58 3 10 17 29 78 82 85 102 95 109 iii
More information20141013_KAIT.pptx
2014 SNS 2014 10 13 @rhys_no1 yoshiaki@linkedopendata.jp NPO Liked Open Data Initiative (2012 -) World Wide Web Consortium (2011-2012 ) (1999-2005) () Open Data on the Web (World Wide Web Consortium, Open
More information3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp
More information..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i
25 Feature Selection for Prediction of Stock Price Time Series 1140357 2014 2 28 ..,,,,. 2013 1 1 12 31, ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i Abstract Feature Selection for Prediction of Stock Price Time
More information4.1 % 7.5 %
2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel
More information13 RoboCup The Interface System for Learning By Observation Applied to RoboCup Agents Ruck Thawonmas
13 RoboCup The Interface System for Learning By Observation Applied to RoboCup Agents 1020302 Ruck Thawonmas 2002 2 8 RoboCup RoboCup SemiReal SemiReal RAIK-NTG4 Huma SemiReal Huma RoboCup. i Abstract
More information橡最新卒論
Research of improving of recognition ability in Face recognition system Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint,
More information(1) i NGO ii (2) 112
MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 * * 2 * 3 * 4 * 5 * 6 * 7 * 8 Service Learning for Engineering Students Satsuki TASAKA*, Mitsutoshi ISHIMURA* 2, Hikaru MIZUTANI* 3, Naoyuki
More informationDEIM Forum 2010 D Development of a La
DEIM Forum 2010 D5-3 432-8011 3-5-1 E-mail: {cs06062,cs06015}@s.inf.shizuoka.ac.jp, {yokoyama,fukuta,ishikawa}@.inf.shizuoka.ac.jp Development of a Large-scale Visualization System Based on Sensor Network
More informationFAX-760CLT
FAX-760CLT ;; yy 1 f a n l p w s m t v y k u c j 09,. i 09 V X Q ( < N > O P Z R Q: W Y M S T U V 1 2 3 4 2 1 1 2 1 2 j 11 dd e i j i 1 ; 3 oo c o 1 2 3 4 5 6 j12 00 9 i 0 9 i 0 9 i 0 9 i oo
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More informationLite 2 45 ECHONET Lite ECHONET Lite [2], [3], [4], [5], [6], [7] IoT WoT Web [8] HEMS [9] ECHONET Lite ECHONET Lite ECHONET Lite ECHONET Lite ECHONET
ECHONET Lite,a),b),c) 2,d) 2,e) 2,f),g),2,h) IoT WoT Web 20 2 6 HEMS ECHONET Lite ECHONET Lite 4 ECHONET Lite ECHONET Lite Arduino Raspberry Pi JavaScript Ruby HEMS,,,, ECHONET Lite Development of Educational
More information24 LED A visual programming environment for art work using a LED matrix
24 LED A visual programming environment for art work using a LED matrix 1130302 2013 3 1 LED,,,.,. Arduino. Arduino,,,., Arduino,.,, LED,., Arduino, LED, i Abstract A visual programming environment for
More informationWeb Stamps 96 KJ Stamps Web Vol 8, No 1, 2004
The Journal of the Japan Academy of Nursing Administration and Policies Vol 8, No 1, pp 43 _ 57, 2004 The Literature Review of the Japanese Nurses Job Satisfaction Research Which the Stamps-Ozaki Scale
More information〈論文〉興行データベースから「古典芸能」の定義を考える
Abstract The long performance database of rakugo and kabuki was totaled, and it is found that few programs are repeated in both genres both have the frequency differential of performance. It is a question
More information農研機構 食品総合研究所 研究報告 77号
Rep. Natl Food Res. InstNo 技 術 報 告 食 品 害 虫 サイトの 長 期 間 アクセス 解 析 --- A Long-Term Analysis of Access Trend to Food-Insect Site Yukio Magariyama, Kumiko Shichiri, Akihiro Miyanoshita, Taro Imamura, Satoshi
More information1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More informationTakens / / 1989/1/1 2009/9/ /1/1 2009/9/ /1/1 2009/9/30,,, i
21 Market forecast using chaos theory 1100334 2010 3 1 Takens / / 1989/1/1 2009/9/30 1997/1/1 2009/9/30 1999/1/1 2009/9/30,,, i Abstract Market forecast using chaos theory Hiroki Hara The longitudinal
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More information2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i -
2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN C (PR ) Group Name GroupC (PR) /Project No.
More informationkut-paper-template.dvi
26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More information三税協力の実質化 : 住民税の所得税閲覧に関する国税連携の効果
Kwansei Gakuin University Rep Title 三 税 協 力 の 実 質 化 : 住 民 税 の 所 得 税 閲 覧 に 関 する 国 税 連 携 の 効 果 Author(s) Suzuki, Ushio, 鈴 木, 潮 Citation 経 済 学 論 究, 65(4): 175-197 Issue Date 2012-03-20 URL http://hdl.handle.net/10236/9133
More informationIPSJ SIG Technical Report Vol.2010-SLDM-144 No.50 Vol.2010-EMB-16 No.50 Vol.2010-MBL-53 No.50 Vol.2010-UBI-25 No /3/27 Twitter IME Twitte
Twitter 1 1 1 IME Twitter 2009 12 15 2010 2 1 13590 4.83% 8.16% 2 3 Web 10 45% Relational Analysis between User Context and Input Word on Twitter Yutaka Arakawa, 1 Shigeaki Tagashira 1 and Akira Fukuda
More information2017 (413812)
2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has
More informationDEIM Forum 2009 E
DEIM Forum 2009 E5-3 464-8601 1 606-8501 464 8601 1 E-mail: lifushi@arch.itc.nagoya-u.ac.jp, mayumi@mm.media.kyoto-u.ac.jp, {hirano,kajita,mase}@itc.nagoya-u.ac.jp Abstract Study on a Recipe Recommendation
More informationSobel Canny i
21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been
More information本資料について
本資料について 本資料は下記の論文を基にして作成されたものです. 文章の内容の正確さは保障できないため, 正確な知識を求める方は原文を参照して下さい. 著者 :Shiang-Ming Huang,Quincy Wu,Yi-Bing Lin 論文名 :Tunneling IPv6 through NAT with Teredo Mechanism 前半 :Teredo 概要, 後半 :Linux に実装した評価から,
More informationHiroshi OSAWA A Study of Nutrition and Behavior With Particular Reference to Functional Hypoglycemia In order to understand causes of various kinds of problem behavior in the present time, it is assumed
More informationuntitled
SUMMARY This paper presents current situations, issues, and several practical use scenarios of anonymous communication which provides sender anonymity and receiver anonymity in a communication. As methods
More information20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow
20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering
More information1: ( 1) 3 : 1 2 4
RippleDesk Using Ripples to Represent Conversational Noise on Internet Shigaku Iwabuchi Takaomi Hisamatsu Shin Takahashi Buntarou Shizuki Kazuo Misue Jiro Tanaka Department of Comupter Science, University
More information,,.,.,,.,.,.,.,,.,..,,,, i
22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of
More information