Web Web Web Web i

Size: px
Start display at page:

Download "Web Web Web Web i"

Transcription

1 28 Research of password manager using pattern lock and user certificate

2 Web Web Web Web i

3 Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In recent years, with the spread of web services, web service accounts managed by users are increasing. Password authentification is often used for web service authentification. Users are reusing a password on a lot of web services, because it is difficult to remember mutiple web service passwords. Therefore, users use a software called password manager for managing their multiple passwords. the password manager manages multiple password of the web service with a master password. However, if the master password is leaked, third parties can get user s passwords from the password manager. Therefore, the security of the master password is important. This research clarifies a problems of existing password manager and solves it. key words Password manager, Password, Web service, Pattern lock, User certificate, Key logger ii

4 Web iii

5 iv

6 1.1 Web (SNS) Web Web v

7 vi

8 1 SNS(Social Networking Service) Web ( 1.1)[1] SNS Web 1.1 Web (SNS) Web ID [2] Web 1

9 Web Web [3] 2

10 2 2.1 Web 2.1 PC LastPass LastPass [4] Web URL Web URL 2.1 3

11 ID Web ( 2.2)[5] ( 2.3)[6] 4

12 [7] 2.4 5

13 ( 2.5) Web 2.5 6

14 2.3 7

15

16 Server User C ID V M Pass User S Name User Server Web S Pass User Server Web Salt ID H(x) x Salt (SHA256) 9

17 Android User ( 3.2)[8] User [8] 3.2 ( 3.4) C V I). User C Server II). Server C ID V III). Server ID S V H(V) IV). H(V) ( 3.3) V). User ( 3.4) 10

18 User Salt User C Salt ( 3.5)

19 User Server User ( 3.6) 3.6 User ID User User ( 3.7) User 12

20 Web User Web User 3.8 I). User Server Server User ID V II). ID V C User III). User C Server Server C V H(V) H(V) 16 13

21 3.3 IV). Server III User V). User M Pass Server VI). Server M Pass User

22 Web User Web Web 3.10 I). User C Server Server C V H(V) H(V) 16 II). Server I User III). User M Pass Server IV). Server M Pass C ID User V). User S Name S Pass Server S Pass Web S Pass

23 User Web?? I). User C Server Server C V H(V) H(V) 16 II). Server I User III). Server M Pass C ID User IV). User S Name S Pass

24 4 4.1 JavaScript HTML Java Eclipse Mars.2 Release (4.5.2) Web Web 4.3 Web 4.3 Web 4.4 Web URL 17

25 Web 4.3 Web 18

26 OS CPU OSX Yosemite GHz Intel Core i5 Windows GHz Intel Core i Web FireFox Web Tomcat 7.0 KeyCastr Click

27 ID 20

28 5 21

29 22

30 [1] ICT 2015 SNS html [2] vol.113 pp [3] internet.watch.impress.co.jp/cda/event/2008/12/09/21794.html, [4] LastPass LastPass - Password Manager [5] jp/files/ pdf [6] [7] vol.19 pp [8] Vol.112 pp

Web Web ID Web 16 Web Web i

Web Web ID Web 16 Web Web i 24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro

More information

Web Basic Web SAS-2 Web SAS-2 i

Web Basic Web SAS-2 Web SAS-2 i 19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE

More information

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i 26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

25 About what prevent spoofing of misusing a session information

25 About what prevent spoofing of misusing a session information 25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent

More information

, IT.,.,..,.. i

, IT.,.,..,.. i 25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

IT,, i

IT,, i 22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki

More information

finalrep.dvi

finalrep.dvi 18 Building a Knowledge Management System for Acquiring Wisdom of Crowds 1095701 2007 3 16 Blog Wiki Web Web Web i Abstract Building a Knowledge Management System for Acquiring Wisdom of Crowds Kazunori

More information

SNS ( ) SNS(Social Networking Service) SNS SNS i

SNS ( ) SNS(Social Networking Service) SNS SNS i 22 SNS Job-Hunting Activities situation Understanding Support System Using SNS 1110252 2011 03 01 SNS ( ) SNS(Social Networking Service) SNS SNS i Abstract Job-Hunting Activities situation Understanding

More information

i

i 14 i ii iii iv v vi 14 13 86 13 12 28 14 16 14 15 31 (1) 13 12 28 20 (2) (3) 2 (4) (5) 14 14 50 48 3 11 11 22 14 15 10 14 20 21 20 (1) 14 (2) 14 4 (3) (4) (5) 12 12 (6) 14 15 5 6 7 8 9 10 7

More information

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i 26 A Study on Secure Remote Control Methods 1175078 2015 2 27 Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i Abstract A Study on Secure Remote Control Methods SHINGAI, Tatsuro In recent years, communication

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking 23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual

More information

, i

, i 23 The reserch of the users action patterns and the suitable delivery of coupons for them 1145120 2012 2 13 , i Abstract The reserch of the users action patterns and the suitable delivery of coupons for

More information

卒業論文2.dvi

卒業論文2.dvi 15 GUI A study on the system to transfer a GUI sub-picture to the enlarging viewer for operational support 1040270 2004 2 27 GUI PC PC GUI Graphical User Interface PC GUI GUI PC GUI PC PC GUI i Abstract

More information

IT i

IT i 27 The automatic extract of know-how search tag using a thesaurus 1160374 2016 2 26 IT i Abstract The automatic extract of know-how search tag using a thesaurus In recent years, a number of organizational

More information

PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i

PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i 21 The private mailers synchronization operation for plural terminals 1125083 2010 3 1 PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i Abstract The private mailers synchronization operation for plural terminals

More information

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i 26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

28 TCG SURF Card recognition using SURF in TCG play video

28 TCG SURF Card recognition using SURF in TCG play video 28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

i ii iii iv v vi vii ( ー ー ) ( ) ( ) ( ) ( ) ー ( ) ( ) ー ー ( ) ( ) ( ) ( ) ( ) 13 202 24122783 3622316 (1) (2) (3) (4) 2483 (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) 11 11 2483 13

More information

262014 3 1 1 6 3 2 198810 2/ 198810 2 1 3 4 http://www.pref.hiroshima.lg.jp/site/monjokan/ 1... 1... 1... 2... 2... 4... 5... 9... 9... 10... 10... 10... 10... 13 2... 13 3... 15... 15... 15... 16 4...

More information

o 2o 3o 3 1. I o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o I 2o 3o 4o 5o 6o 7o 2197/ o 1o 1 1o

o 2o 3o 3 1. I o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o I 2o 3o 4o 5o 6o 7o 2197/ o 1o 1 1o 78 2 78... 2 22201011... 4... 9... 7... 29 1 1214 2 7 1 8 2 2 3 1 2 1o 2o 3o 3 1. I 1124 4o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o 72 1. I 2o 3o 4o 5o 6o 7o 2197/6 9. 9 8o 1o 1 1o 2o / 3o 4o 5o 6o

More information

kut-paper-template.dvi

kut-paper-template.dvi 26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo

More information

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i 28 WebRTC Design of multi-platform file sharing system using WebRTC 1170336 2017 2 28 WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i Abstract Design of multi-platform file sharing system using WebRTC Harumi

More information

provider_020524_2.PDF

provider_020524_2.PDF 1 1 1 2 2 3 (1) 3 (2) 4 (3) 6 7 7 (1) 8 (2) 21 26 27 27 27 28 31 32 32 36 1 1 2 2 (1) 3 3 4 45 (2) 6 7 5 (3) 6 7 8 (1) ii iii iv 8 * 9 10 11 9 12 10 13 14 15 11 16 17 12 13 18 19 20 (2) 14 21 22 23 24

More information

23 The Study of support narrowing down goods on electronic commerce sites

23 The Study of support narrowing down goods on electronic commerce sites 23 The Study of support narrowing down goods on electronic commerce sites 1120256 2012 3 15 i Abstract The Study of support narrowing down goods on electronic commerce sites Masaki HASHIMURA Recently,

More information

44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2)

44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2) (1) I 44 II 45 III 47 IV 52 44 4 I (1) ( ) 1945 8 9 (10 15 ) ( 17 ) ( 3 1 ) (2) 45 II 1 (3) 511 ( 451 1 ) ( ) 365 1 2 512 1 2 365 1 2 363 2 ( ) 3 ( ) ( 451 2 ( 314 1 ) ( 339 1 4 ) 337 2 3 ) 363 (4) 46

More information

i ii i iii iv 1 3 3 10 14 17 17 18 22 23 28 29 31 36 37 39 40 43 48 59 70 75 75 77 90 95 102 107 109 110 118 125 128 130 132 134 48 43 43 51 52 61 61 64 62 124 70 58 3 10 17 29 78 82 85 102 95 109 iii

More information

178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21

178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21 I 178 II 180 III ( ) 181 IV 183 V 185 VI 186 178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21 4 10 (

More information

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake

More information

橡最新卒論

橡最新卒論 Research of improving of recognition ability in Face recognition system Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint,

More information

21 A contents organization method for information sharing systems

21 A contents organization method for information sharing systems 21 A contents organization method for information sharing systems 1125140 2010 3 4 IT i Abstract A contents organization method for information sharing systems Aoki, Wataru Organizations to share information,

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

paper.dvi

paper.dvi 28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret

More information

17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki

More information

19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability

19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability 19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability 1105402 2008 2 4 2,, i Abstract Systematization of Problem Solving Strategy in High School

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

Sobel Canny i

Sobel Canny i 21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been

More information

27 VR Effects of the position of viewpoint on self body in VR environment

27 VR Effects of the position of viewpoint on self body in VR environment 27 VR Effects of the position of viewpoint on self body in VR environment 1160298 2015 2 25 VR (HMD), HMD (VR). VR,.. HMD,., VR,.,.,,,,., VR,. HMD VR i Abstract Effects of the position of viewpoint on

More information

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i 20 SOM Development of Syllabus Vsualization System using Spherical Self-Organizing Maps 1090366 2009 3 5 SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i Abstract Development of Syllabus Vsualization

More information

17 The Analysis of Hand-Writing datas for pen-input character boxes

17 The Analysis of Hand-Writing datas for pen-input character boxes 17 The Analysis of Hand-Writing datas for pen-input character boxes 1060362 2006 3 10 PDA(Personal Digital Assistants) [1] 1.20 x 1.44 cm 1.44 x 1.44 cm [1] 8 i Abstract The Analysis of Hand-Writing datas

More information

24 Region-Based Image Retrieval using Fuzzy Clustering

24 Region-Based Image Retrieval using Fuzzy Clustering 24 Region-Based Image Retrieval using Fuzzy Clustering 1130323 2013 3 9 Visual-key Image Retrieval(VKIR) k-means Fuzzy C-means 2 200 2 2 20 VKIR 5 18% 54% 7 30 Fuzzy C-means i Abstract Region-Based Image

More information

21 e-learning Development of Real-time Learner Detection System for e-learning

21 e-learning Development of Real-time Learner Detection System for e-learning 21 e-learning Development of Real-time Learner Detection System for e-learning 1100349 2010 3 1 e-learning WBT (Web Based training) e-learning LMS (Learning Management System) LMS WBT e-learning e-learning

More information

,,.,.,,.,.,.,.,,.,..,,,, i

,,.,.,,.,.,.,.,,.,..,,,, i 22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of

More information

25 Removal of the fricative sounds that occur in the electronic stethoscope

25 Removal of the fricative sounds that occur in the electronic stethoscope 25 Removal of the fricative sounds that occur in the electronic stethoscope 1140311 2014 3 7 ,.,.,.,.,.,.,.,,.,.,.,.,,. i Abstract Removal of the fricative sounds that occur in the electronic stethoscope

More information

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System 1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of

More information

Vol. 28 No. 2 Apr. 2011 173 1. 1 Web Twitter/Facebook UI 4 1. 2. 3. 4. Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2

Vol. 28 No. 2 Apr. 2011 173 1. 1 Web Twitter/Facebook UI 4 1. 2. 3. 4. Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2 172 SNS Web Web As social web sites such as blog and SNS(Social Network System) became popular, many people have communicated with their friends on the Web. Meanwhile, several problems of social web sites

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

I.... 1 I-1.... 1 I-2.... 1 I-3.... 2 I-4.... 5 II.... 6 II-1.... 6 II-2.... 8 III....10 III-1.... 10 III-2.... 14 IV....23 IV-1.... 23 IV-2.... 29 IV-3.... 31 IV-4.... 34 V....36 V-1.... 36 V-2.... 38

More information

() ID () () () ID 1.... 1 2.... 4 3.... 7 4.... 10 5.... 14 6. ID... 15 7.... 21 8.... 29-1. 9. ID... 31 10. ID... 33-2. 11.... 36 12.... 44 13. ID ID.... 44 14.... 46 15..... 50 16.... 51 17. ID... 52

More information

untitled

untitled i ii iii iv v 43 43 vi 43 vii T+1 T+2 1 viii 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 a) ( ) b) ( ) 51

More information

1 1 tf-idf tf-idf i

1 1 tf-idf tf-idf i 14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles

More information

4.1 % 7.5 %

4.1 % 7.5 % 2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel

More information

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i 25 Estimation scheme of indoor positioning using difference of times which chirp signals arrive 114348 214 3 6 , (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,,

More information

AccessflÌfl—−ÇŠš1

AccessflÌfl—−ÇŠš1 ACCESS ACCESS i ii ACCESS iii iv ACCESS v vi ACCESS CONTENTS ACCESS CONTENTS ACCESS 1 ACCESS 1 2 ACCESS 3 1 4 ACCESS 5 1 6 ACCESS 7 1 8 9 ACCESS 10 1 ACCESS 11 1 12 ACCESS 13 1 14 ACCESS 15 1 v 16 ACCESS

More information

SURF,,., 55%,.,., SURF(Speeded Up Robust Features), 4 (,,, ), SURF.,, 84%, 96%, 28%, 32%.,,,. SURF, i

SURF,,., 55%,.,., SURF(Speeded Up Robust Features), 4 (,,, ), SURF.,, 84%, 96%, 28%, 32%.,,,. SURF, i 24 SURF Recognition of Facial Expression Based on SURF 1130402 2013 3 1 SURF,,., 55%,.,., SURF(Speeded Up Robust Features), 4 (,,, ), SURF.,, 84%, 96%, 28%, 32%.,,,. SURF, i Abstract Recognition of Facial

More information

2

2 1 2 3 4 5 6 7 8 9 10 I II III 11 IV 12 V 13 VI VII 14 VIII. 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 _ 33 _ 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 VII 51 52 53 54 55 56 57 58 59

More information

熊本大学学術リポジトリ Kumamoto University Repositor Title 特別支援を要する児童生徒を対象としたタブレット端末 における操作ボタンの最適寸法 Author(s) 竹財, 大輝 ; 塚本, 光夫 Citation 日本産業技術教育学会九州支部論文集, 23: 61-

熊本大学学術リポジトリ Kumamoto University Repositor Title 特別支援を要する児童生徒を対象としたタブレット端末 における操作ボタンの最適寸法 Author(s) 竹財, 大輝 ; 塚本, 光夫 Citation 日本産業技術教育学会九州支部論文集, 23: 61- 熊本大学学術リポジトリ Kumamoto University Repositor Title 特別支援を要する児童生徒を対象としたタブレット端末 における操作ボタンの最適寸法 Author(s) 竹財, 大輝 ; 塚本, 光夫 Citation 日本産業技術教育学会九州支部論文集, 23: 61-68 Issue date 215 Type URL Right Journal Article http://hdl.handle.net/2298/3622

More information

23 Study on Generation of Sudoku Problems with Fewer Clues

23 Study on Generation of Sudoku Problems with Fewer Clues 23 Study on Generation of Sudoku Problems with Fewer Clues 1120254 2012 3 1 9 9 21 18 i Abstract Study on Generation of Sudoku Problems with Fewer Clues Norimasa NASU Sudoku is puzzle a kind of pencil

More information

fiš„v5.dvi

fiš„v5.dvi (2001) 49 2 293 303 VRML 1 2 3 2001 4 12 2001 10 16 Web Java VRML (Virtual Reality Modeling Language) VRML Web VRML VRML VRML VRML Web VRML VRML, 3D 1. WWW (World Wide Web) WWW Mittag (2000) Web CGI Java

More information

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 () - 1 - - 2 - - 3 - - 4 - - 5 - 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

活用ガイド (ソフトウェア編)

活用ガイド (ソフトウェア編) (Windows 95 ) ii iii iv NEC Corporation 1999 v P A R T 1 vi P A R T 2 vii P A R T 3 P A R T 4 viii P A R T 5 ix x P A R T 1 2 3 1 1 2 4 1 2 3 4 5 1 1 2 3 4 6 5 6 7 7 1 1 2 8 1 9 1 1 2 3 4 5 6 1 2 3 4

More information

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i 27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering

More information

86 7 I ( 13 ) II ( )

86 7 I ( 13 ) II ( ) 10 I 86 II 86 III 89 IV 92 V 2001 93 VI 95 86 7 I 2001 6 12 10 2001 ( 13 ) 10 66 2000 2001 4 100 1 3000 II 1988 1990 1991 ( ) 500 1994 2 87 1 1994 2 1000 1000 1000 2 1994 12 21 1000 700 5 800 ( 97 ) 1000

More information

Q-Learning Support-Vector-Machine NIKKEI NET Infoseek MSN 10 1 12 22 170 121 10 9 15 12 22 85 2 85 10 i

Q-Learning Support-Vector-Machine NIKKEI NET Infoseek MSN 10 1 12 22 170 121 10 9 15 12 22 85 2 85 10 i 21 Stock price forecast using text mining 1100323 2010 3 1 Q-Learning Support-Vector-Machine NIKKEI NET Infoseek MSN 10 1 12 22 170 121 10 9 15 12 22 85 2 85 10 i Abstract Stock price forecast using text

More information

入門ガイド

入門ガイド ii iii iv NEC Corporation 1998 v P A R 1 P A R 2 P A R 3 T T T vi P A R T 4 P A R T 5 P A R T 6 P A R T 7 vii 1P A R T 1 2 2 1 3 1 4 1 1 5 2 3 6 4 1 7 1 2 3 8 1 1 2 3 9 1 2 10 1 1 2 11 3 12 1 2 1 3 4 13

More information

23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones

23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones 23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones 1120220 2012 3 1 iphone..,. 2 (, ) 3 (,, ),,,.,..,. HCI i Abstract A Comparison of Flick and Ring Document Scrolling in

More information

25 AR 3 Property of three-dimensional perception in the wearable AR environment

25 AR 3 Property of three-dimensional perception in the wearable AR environment 25 AR 3 Property of three-dimensional perception in the wearable AR environment 1140378 2014 2 28 AR 3 AR.. AR,. AR. 2, [2]., [3]., AR. AR. 3D 3D,,., 3D..,,,,. AR,, HMD,, 3 i Abstract Property of three-dimensional

More information

<4D6963726F736F667420506F776572506F696E74202D208376838C835B83938365815B835683878393312E707074205B8CDD8AB78382815B83685D>

<4D6963726F736F667420506F776572506F696E74202D208376838C835B83938365815B835683878393312E707074205B8CDD8AB78382815B83685D> i i vi ii iii iv v vi vii viii ix 2 3 4 5 6 7 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60

More information

CRS4

CRS4 I... 1 II... 1 A... 1 B... 1 C... 1 D... 2 E... 3 III... 3 A... 3 B... 4 C... 5 IV... 8 A... 8 B... 8 C... 9 D... 10 V... 11 A... 11 B... 11 C... 12 VI... 12 A... 12 B... 12 C... 12 VII... 13 ii I II A

More information

2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i -

2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN C (PR ) Group Name GroupC (PR) /Project No.

More information

How to reinforce password authentications

How to reinforce password authentications 学術情報処理研究 No.19 2015 pp.40-49 How to reinforce password authentications Mitsuru Tada Institute of Media and Information Technologies, Chiba University 263-8522 1-33 Yayoicho 1-33, Inage, Chiba 263-8522,

More information

SC-85X2取説

SC-85X2取説 I II III IV V VI .................. VII VIII IX X 1-1 1-2 1-3 1-4 ( ) 1-5 1-6 2-1 2-2 3-1 3-2 3-3 8 3-4 3-5 3-6 3-7 ) ) - - 3-8 3-9 4-1 4-2 4-3 4-4 4-5 4-6 5-1 5-2 5-3 5-4 5-5 5-6 5-7 5-8 5-9 5-10 5-11

More information

評論・社会科学 120号(P)☆/1.楊

評論・社会科学 120号(P)☆/1.楊 SNS SNS SNS SNS 1 2SNS 2-1SNS 2-2SNS 3 SNS 3-1 3-2SNS 3-3 SNS 3-4 4 SNS 4-1 SNS 4-2 5SNS 5-1 5-2 5-3 5-4 6 2016 12 5 2016 12 5 SNS 1 6 1 1 2 2014 62.3 20 94.1 3 SNS 4 201469 SNS LINE FacebookInstagramTwitter

More information

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP

More information

DEIM Forum 2010 A3-3 Web Web Web Web Web. Web Abstract Web-page R

DEIM Forum 2010 A3-3 Web Web Web Web Web. Web Abstract Web-page R DEIM Forum 2010 A3-3 Web Web 305 8550 1 2 305 8550 1 2 E-mail: s0813167@u.tsukuba.ac.jp, satoh@slis.tsukuba.ac.jp Web Web Web. Web Abstract Web-page Recommendation System based on the Keyword transitions

More information

22 1,936, ,115, , , , , , ,

22 1,936, ,115, , , , , , , 21 * 2 3 1 1991 1945 200 60 1944 No. 41 2016 22 1,936,843 1945 1,115,594 1946 647,006 1947 598,507 1 60 2014 501,230 354,503 5 2009 405,571 5 1 2 2009 2014 5 37,285 1 2 1965 10 1975 66 1985 43 10 3 1990

More information

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325 社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL

More information

活用ガイド (ソフトウェア編)

活用ガイド (ソフトウェア編) (Windows 98 ) ii iii iv v NEC Corporation 1999 vi P A R T 1 P A R T 2 vii P A R T 3 viii P A R T 4 ix P A R T 5 x P A R T 1 2 3 1 1 2 4 1 2 3 4 5 1 1 2 3 4 5 6 6 7 7 1 1 2 8 1 9 1 1 2 3 4 5 6 1 2 3 10

More information

第1部 一般的コメント

第1部 一般的コメント (( 2000 11 24 2003 12 31 3122 94 2332 508 26 a () () i ii iii iv (i) (ii) (i) (ii) (iii) (iv) (a) (b)(c)(d) a) / (i) (ii) (iii) (iv) 1996 7 1996 12

More information