4b_12.dvi

Size: px
Start display at page:

Download "4b_12.dvi"

Transcription

1 Analysis of Answering Method with Probability Conversion for Internet Research Atsushi TAGAMI, Chikara SASAKI, Teruyuki HASEGAWA, Shigehiro ANO, and Yoichi TOMIURA /. [] IPTV Securecy Anonymity 2 SSL KDDI KDDI R&D Laboratories Inc., Fujimino-shi, Japan Kyushu University, Fukuoka-shi, Japan [2], [3] RR Randomized response thechniques [4] [5], [6] x {0, } v x 0 B Vol. J92 B No. 4 pp c

2 2009/4 Vol. J92 B No x v Electronic Voting Scheme Homomorphism [2] MIX-net [3] Item Count [7] RR Randomized Response Thecnique [4] q yes/no q yes/no yes yes no 3. RR [8] PRAM Post RAndomization Method [9], [0] RR RR r

3 0/ Fig. 0/-answer function. x ( {0, }) v x v x v x x v V 0 V f 0(v) V v V f (v) V v f 0(v) 0 f (v) 0 0 σ 2 E[V ; f 0( )] = 0 () E[V ; f ( )] = (2) Var[V ; f 0( )]=Var[V ; f ( )] = σ 2 (3) 0/ V n V n = V i (4) n i n V i i V i V j (i j) m m m + n 0 ( V n = m ) n V i + V i (5) n i= i=m+ m/n = r n () (2) m P n P V i, V i 0 (6) m n m i= i=m+ P P V n n {m +(n m) 0} = m n (7) V n m/n r n r V n 3. 2 σ 2 0/ () (2) (3) m Vi i= N(m, m σ 2 ) n Vi i=m+ N(0, (n m) σ 2 ) N(μ, σ 2 ) μ σ 2 V n ( N n (m +0), ( m σ 2 +(n m) σ 2)) n 2 ( ) N r, σ2 n (8) Z z α/2 P ( z α/2 X z α/2 )= α (9) z α/2 V n r σ2 /n z α/2 (0) r 00 ( α)% ] σ [V n 2 zα/2 n, V n + z σ 2 α/2 n () 73

4 2009/4 Vol. J92 B No. 4 (m/n) ±δ σ 2 ( ) 2 σ 2 δ = n (2) z α/2 (2) σ 2 V n 00 ( α)% ±δ / σ 2 (2) 0/ v v v x v x v V = v x (Bayes decision rule) x =arg max f X V (x v) x {0,} =arg max x {0,} f X(x)f V X (v x) (3) f X V (x v) V = v X = x f V X (v x) X = x V = v f V X (v 0) = f 0(v) f V X (v ) = f (v) f X(x) X D 0 D D e D 0 = {v V f X(0)f 0(v) >f X()f (v)} D = {v V f X(0)f 0(v) <f X()f (v)} (4) D e = {v V f X(0)f 0(v) =f X()f (v)} V = {v R f V (v) > 0)} V V V (3) x v D 0 0 v D v D e ξ (0 ξ ) V = v Error(v) Error(v) f X() f (v) f V (v) = f X(0) f 0(v) f V (v) fx(0) f0(v) ξ f V (v) fx() f(v) +( ξ) f V (v) : v D 0 : v D : v D e f V (v) =f X() f (v)+f X(0) f 0(v). (5) f X() f X(0) = f X() = 0.5 v x Error(v) = 2 min (f0(v),f(v)) f V (v) (6) f X() 6. 3 Anonymity E[Error(V )] V Anonymity =E[Error(V )] = min(f 0(v),f (v)) f V (v) 2 f V (v) v { } = f (v)+ f 0(v)+ f 0(v) (7) 2 v D 0 v D v D e V Anonymity =E[Error(V )] 732

5 = min(f 0(v),f (v)) f V (v) dv 2 f V (v) [ = ] f (v)dv + f 0(v)dv + f 0(v)dv 2 D 0 D D e (8) 4. 2 () (2) (3) 0/ 0/ { f 0(v) : N(0,σ 2 ) f (v) : N(,σ 2 ) 0/ q : v = a f 0(v) = q : v = b q : v = a f (v) = q : v = b 0 <q<0.5 2 f 0 f () (2) a b a = q 2q, b = q 2q f 0 f σ 2 q 0 <q<0.5 q( q) ( 2q) 2 = σ2 (9) RR yes/no a/b RR 0/ (8) 0/ Anonymity = 0.5 f 0(v)dv (20) (7) 0/ 2 Fig. 2 Error probability variance. Anonymity = q (2) n =0,000 α =0.05 δ =0.0 0/ σ 2 z 0.05/2.96 (2) σ / (20) 0.6 0/ (9) (2) 0.5 0/ 0/ (7) (8) v 2 0/ (6) v v = v =0 f(y) f(y) = { p : y =0 p : y = f(y) = { p : y = a p : y = b 2 a b 2q = q 0 f 0 q = q 0 f 0 f 733

6 2009/4 Vol. J92 B No. 4 x σ 2 0/ Error(v) v 0/ 0/ f R D = {y R f(y) > 0} E f [Y k ; D] E f [Y k ; D] = y k f(y) y D E f [; D] = y D f(y) f E f [Y k ; D] D R E f [Y k ; D] = y k f(y) dy D E f [; D] = f(y) dy D f R D R E f [; D] =S<, E f [Y 2 ; D] < a E f [Y ; D] =as, E f [Y 2 ; D] a 2 S {y R f(y) > 0} = {a} Jensen [] 5. 2 σ 2 0/ Error(v) ( > 0) v V Error(v) = (22) 0/ (f 0,f ) m : v = m 2 m f 0(v) = m : v = m 2 m f (v) =f 0( v) m = σ 2 (23) m (5) (6) f X() = f X(0) = 0.5 Error(v) Error(v) = min(f0(v),f(v)) f 0(v)+f (v) (24) f X() = f X(0) = 0.5 D 0 = {v V f 0(v) >f (v)}, D = {v V f 0(v) <f (v)}, D e = {v V f 0(v) =f (v)} (24) v D 0 (,f 0(v) >f (v)) f (v) Error(v) = f < 0(v)+f (v) 2, v D (,f 0(v) <f (v)) f 0(v) Error(v) = f < 0(v)+f (v) 2, (25) v D e (,f 0(v) =f (v)) Error(v) = 2 v D e v D 0 D Error(v) (22) E f [; D e]=e f0 [; D e]=0 E f [; D e]=e f0 [; D e]= v V f 0(v) =f (v) 0/ () (2) (25) v D 0 Error(v) 734

7 f (v) = f0(v) (22) f X() = f X(0) = <<0.5 f (v) = f0(v) : v D0, f 0(v) = (26) f(v) : v D E f0 [; D e]=e f [; D e]=0 (27) (26) E f [V k ; D 0]= E f 0 [V k ; D 0] (28) E f0 [V k ; D ]= E f [V k ; D ] (29) f 0 =E f0 [; D 0]+E f0 [; D ]+E f0 [; D e] (27) (29) =E f0 [; D 0]+ E f [; D ] f (27) (28) = E f 0 [; D 0]+E f [; D ] E f0 [; D 0]=E f [; D ]= (30) 5. 2 {E f [; D 0]+E f0 [; D ]+E f0 [; D e]} (27) (28) (29) (30) Anonimity = 2 {E f 0 [; D 0]+E f [; D ]} = f 0 () (3) 0=E f0 [V ; D 0]+E f0 [V ; D ]+E f0 [V ; D e], σ 2 =E f0 [V 2 ; D 0]+E f0 [V 2 ; D ]+E f0 [V 2 ; D e] (27) (29) 0=E f0 [V ; D 0]+ E f [V ; D ], (3) σ 2 =E f0 [V 2 ; D 0]+ E f [V 2 ; D ] (32) (3) (32) (30) a 0 a 0=a 0()+a (33) σ 2 a 2 0 ()+a 2 (34) f (2) (3) =a 0 + a () (35) σ 2 + a a 2 () (36) (33) (35) a 0 a a 0 = 2, a = 2 (37) (34) (36) 2 ( 2) 2 σ 2 </ σ 2 m m = 2 2 (38) +4σ 2 (34) (36) / 735

8 2009/4 Vol. J92 B No σ 2 v Error(v) (39) 0/ σ 2 0/ (f 0,f ) L : v =/2 Δ M : v =/2 f 0(v) = L /() : v =/2+Δ f (v) =f 0( v) L = ( + 4σ 2 )( 2) 2, M = ( + 4σ 2 )( 2) 2, Δ= 2 ( + 4σ2 )( 2) ( Anonymity = 2σ 2 ) (40) +4σ 2 2 f X() = f X(0) = 0.5 /2 (39) 0/ 0 <</2 (39) f (v) f0(v) : v D0 (4) f 0(v) f(v) : v D (42) 2 f(v) f0(v) :v D0 2 g(v) = f 0(v) : v D e 2 f0(v) f(v) :v D 2 h(v) = (f0(v) f(v)) : v D0 2 0 : v D e (f(v) f0(v)) : v D 2 g h f 0 f h(v)+g(v) : v D 0 f 0(v) = g(v) : v D e (43) h(v)+g(v) : v D h(v)+g(v) : v D0 f (v) = g(v) : v D e (44) h(v)+g(v) : v D E f0 [V k ; D e]=e g[v k ; D e], E f0 [V k ; D ]= E h[v k ; D ]+E g[v k ; D ] g h (4) (42) </2 v g(v) 0, v (D 0 D ) h(v) > 0, v D e h(v) =0, (45) f 0 f (43) (44) E h [; D 0]+ E h[; D ]+E g[; V] =, E h[; D 0]+E h [; D ]+E g[; V] = E h [; D 0]=E h [; D ] L + M = (46) E h [; D 0]=E h [; D ]=L, E g[; V] =M (47) A =2 Anonimity (43) 736

9 (44) (47) A =E f [; D 0]+E f0 [; D ]+E f0 [; D e] = {E h[; D 0]+E h [; D ]} +E g[; D 0]+E g[; D ]+E g[; D e] = 2 L + M (48) (46) (48) L M L = ()( A) 2 M = A 2 2 f 0 () (3) (49) 0=E f0 [V ; D 0]+E f0 [V ; D ]+E f0 [V ; D e], σ 2 =E f0 [V 2 ; D 0]+E f0 [V 2 ; D ]+E f0 [V 2 ; D e] (43) (44) 0=E h [V ; D 0]+ E h[v ; D ]+E g[v ; V], σ 2 =E h [V 2 ; D 0]+ E h[v 2 ; D ]+E g[v 2 ; V] (45) g h D 0 D D e (47) a 0 a a e 0=a 0L + al + aem (50) σ 2 a 2 0 L + a2 L + a 2 e M (5) f (2) (3) = a0l + al + aem (52) σ 2 + a02 L + a 2 L + a 2 e M (53) (50) (52) (49) a 0 a a 0 = A 2 A ae (54) A a = A 2 A ae + (55) A (54) (55) (5) A ( σ 2 +2a 2 a e2 + σ 2 e ) () 2 (56) A 0(a e) (54) (55) (53) A ( a e) 2 + σ 2 ( σ 2 +2( a e) 2 ) () 2 (57) A (a e) A max a e min(a 0(a e),a (a e)) (45) M L M 0 L >0 (49) 2 A< (56) (57) A 0(a e) < A (a e) < A 0(a e) 2, A (a e) 2 2 ( 2) 2 σ 2 0 <</ σ 2 A 0(a e) A (a e) a e A 0(a e) A (a e) max a e min(a 0(a e),a (a e)) = A 0(/2) ( = 4σ 2 2 ) +4σ 2 2 (58) (58) A m A = A m a e =/2 (49) (54) (55) L = ( + 4σ 2 )( 2) 2 737

10 2009/4 Vol. J92 B No. 4 M = ( + 4σ 2 )( 2) 2 a 0 = 2 2 ( + 4σ2 )( 2) a = ( + 4σ2 )( 2) A = A m g h (5) (53) a 0 D 0 a D a e =/2 D e { g(v) = M : v =/2, L : v = a 0, h(v) = L : v = a, (43) (44) / 95% α =0.05 δ =0.0, 0.05 (2) (23) 0.4 δ =0.05 0, Error(v) 4 Anonymity (2) (40) n =0 4, , 0 5, % α =0.05 δ =0.0, / 0/ (40) 4 Error(v) v x f X(0) = f X() = 0.5 x x Fig. 3 3 Anonymity v.s. number of sample. 4 Fig. 4 Anonymity v.s. lower bound of error(v). 738

11 v x min(f X(0),f X()) x = 0. v v v v 5. () (2) (3) 0/ 3 σ 2 0/ Error(v) ( > 0) v V Error(v) = p = f X() 0/ (f 0,f ) ()(p 0 ) : v = p ( 2)p 0 p 0 f 0(v) = (p ) ()p : v = ( 2)p 0 p 0 : otherwise (p 0 ) : v = p ( 2)p p 0 f (v) = ()(p ) ()p : v = ( 2)p p 0 : otherwise p 0 = p = 2 p( p)σ2 4 σ 2 + p 2 p =max(p,p 0). 5 Fig. 5 With known prior probability. 2 p( p)σ2 (59) 4 σ 2 + p 2 5 (59) 95% α =0.05 δ =0.0 f X() = 0.3, 0.4 min(f X(0),f X()) 0/ (3) 7. 0/ 0/ σ 2 0/ 0/ 739

12 2009/4 Vol. J92 B No. 4 n 0 4 n =0 4 40% 95% ±0.05 [] Everybody Votes Channel, na/ channelseverybodyvotes.jsp [2] P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, Proc. EUROCRYPT 99, pp , Czech Republic, May 999. [3] J. Furukawa and K. Sako, An efficient scheme for proving shuffle, Crypto 200, pp , California, Aug [4] S.L. Warner, Randomized response: A survey technique for eliminating evasive answer bias, J. American Statistical Association, vol.60, no.309, pp.63 69, March 965. [5] A. Tagami, C. Sasaki, T. Hasegawa, S. Ano, and Y. Tomiura, Analysis of answering method with probability conversion for Internet research, Fifth Annual IEEE Consumer Communications & Networking Conference, NV, Jan [6] A. Tagami, C. Sasaki, T. Hasegawa, S. Ano, and Y. Tomiura, Optimization of the answering method with probability conversion, Workshop on Heuristic Methods for the Design, Deployment, and Reliability of Network and Network Applications, Finland, July [7] J. Droitcour, R. Caspor, M. Hubbard, T. Parsley, W. Vissher, and T. Ezzati, The item count technique as a method of indirect questioning: A review of its development and a case study application, in Measurement Errors in Surveys, pp.85 20, John Wiley & Sons, New York, 99. [8] W. Du and Z. Zhan, Using randomized response techniques for privacy-preserving data mining, 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp , Washington DC, Aug [9] P.L. Kooiman, L. Willenborg, and J. Gouweleeuw, PRAM: A method for disclosure limitation of microdata, Technical Report, Statistics Netherlands, 997. [0] J. Gouweleeuw, P. Kooiman, Willenborg, and P. Wolf, Post randomization for statistical disclosure control: Theory and implementation, J. Official Statistics, vol.4, pp , 998. [] KDD KDDI IP 6 KDDI QoS KDDI IP 5 KDD KDDI IP 5 KDDATM IP KDDI IP Pacling2005 Best Paper Award FIT

9_18.dvi

9_18.dvi Vol. 49 No. 9 3180 3190 (Sep. 2008) 1, 2 3 1 1 1, 2 4 5 6 1 MRC 1 23 MRC Development and Applications of Multiple Risk Communicator Ryoichi Sasaki, 1, 2 Yuu Hidaka, 3 Takashi Moriya, 1 Katsuhiro Taniyama,

More information

三石貴志.indd

三石貴志.indd 流通科学大学論集 - 経済 情報 政策編 - 第 21 巻第 1 号,23-33(2012) SIRMs SIRMs Fuzzy fuzzyapproximate approximatereasoning reasoningusing using Lukasiewicz Łukasiewicz logical Logical operations Operations Takashi Mitsuishi

More information

Meas- urement Angoff, W. H. 19654 Equating non-parallel tests. Journal of Educational Measurement, 1, 11-14. Angoff, W. H. 1971a Scales, norms and equivalent scores. In R. L. Thorndike (Ed.) Educational

More information

untitled

untitled IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

CVM CVM 1 1 Revealed Preference Stated Preference CVM CVM CVM CVM NOAA 3 CVM 4 5 CVM 2.2 CVM CVM CVM2 CVM 2 Vol.3 No Spring 003

CVM CVM 1 1 Revealed Preference Stated Preference CVM CVM CVM CVM NOAA 3 CVM 4 5 CVM 2.2 CVM CVM CVM2 CVM 2 Vol.3 No Spring 003 Vol.3 No.1 2000 Spring 002 intuitive CVM CVM 1 CVM CVM CVM NISHIDA, Masaru CVM 2 2.1 CVM 1 1 Revealed Preference Stated Preference CVM CVM CVM 2 2 2 CVM NOAA 3 CVM 4 5 CVM 2.2 CVM CVM CVM2 CVM 2 Vol.3

More information

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke

More information

24 201170068 1 4 2 6 2.1....................... 6 2.1.1................... 6 2.1.2................... 7 2.1.3................... 8 2.2..................... 8 2.3................. 9 2.3.1........... 12

More information

181 第 54 回土木計画学研究発表会 講演集 GPS S-502W S-502W

181 第 54 回土木計画学研究発表会 講演集 GPS S-502W S-502W 181 GPS 1 2 3 4 1 98-845 468-1 S-52W E-mail: h-ymgc@plan.civil.tohoku.ac.jp 2 98-845 468-1 S-52W E-mail: mokmr@m.tohoku.ac.jp 3 18-626 2 15-3 C 6F E-mail: h kaneda@zenrin-datacom.net 4 18-626 2 15-3 C

More information

SEJulyMs更新V7

SEJulyMs更新V7 1 2 ( ) Quantitative Characteristics of Software Process (Is There any Myth, Mystery or Anomaly? No Silver Bullet?) Zenya Koono and Hui Chen A process creates a product. This paper reviews various samples

More information

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP

More information

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S KiZUNA: P2P 1,a) 1 1 1 P2P KiZUNA KiZUNA Pure P2P P2P 1 Skip Graph ALM(Application Level Multicast) Pub/Sub, P2P Skip Graph, Bloom Filter KiZUNA: An Implementation of Distributed Microblogging Service

More information

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community

More information

和RIMNo.22高安氏.indd

和RIMNo.22高安氏.indd NIEsGDP 1990 200436.1 22.365.1 80 GDP 4 RIM 2006 Vol.6 No.22 RIM 2006 Vol.6 No.22 5 NIEs GDP GDP GDP GDP 90 GDP 1951 80 81 90 90 90 2001 2003 GDP 80 90 2001 2002 GDP 87GDP 80 GDP GDP 6 RIM 2006 Vol.6 No.22

More information

ohpmain.dvi

ohpmain.dvi fujisawa@ism.ac.jp 1 Contents 1. 2. 3. 4. γ- 2 1. 3 10 5.6, 5.7, 5.4, 5.5, 5.8, 5.5, 5.3, 5.6, 5.4, 5.2. 5.5 5.6 +5.7 +5.4 +5.5 +5.8 +5.5 +5.3 +5.6 +5.4 +5.2 =5.5. 10 outlier 5 5.6, 5.7, 5.4, 5.5, 5.8,

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α,

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α, [II] Optimization Computation for 3-D Understanding of Images [II]: Ellipse Fitting 1. (1) 2. (2) (edge detection) (edge) (zero-crossing) Canny (Canny operator) (3) 1(a) [I] [II] [III] [IV ] E-mail sugaya@iim.ics.tut.ac.jp

More information

untitled

untitled 18 1 2,000,000 2,000,000 2007 2 2 2008 3 31 (1) 6 JCOSSAR 2007pp.57-642007.6. LCC (1) (2) 2 10mm 1020 14 12 10 8 6 4 40,50,60 2 0 1998 27.5 1995 1960 40 1) 2) 3) LCC LCC LCC 1 1) Vol.42No.5pp.29-322004.5.

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 : Transactions of the Operations Research Society of Japan Vol. 58, 215, pp. 148 165 c ( 215 1 2 ; 215 9 3 ) 1) 2) :,,,,, 1. [9] 3 12 Darroch,Newell, and Morris [1] Mcneil [3] Miller [4] Newell [5, 6], [1]

More information

鉄鋼協会プレゼン

鉄鋼協会プレゼン NN :~:, 8 Nov., Adaptive H Control for Linear Slider with Friction Compensation positioning mechanism moving table stand manipulator Point to Point Control [G] Continuous Path Control ground Fig. Positoining

More information

JIS Z803: (substitution method) 3 LCR LCR GPIB

JIS Z803: (substitution method) 3 LCR LCR GPIB LCR NMIJ 003 Agilent 8A 500 ppm JIS Z803:000 50 (substitution method) 3 LCR LCR GPIB Taylor 5 LCR LCR meter (Agilent 8A: Basic accuracy 500 ppm) V D z o I V DUT Z 3 V 3 I A Z V = I V = 0 3 6 V, A LCR meter

More information

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 1, 2 1 1 1 Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 Nobutaka ONO 1 and Shigeki SAGAYAMA 1 This paper deals with instrument separation

More information

橡表紙参照.PDF

橡表紙参照.PDF CIRJE-J-58 X-12-ARIMA 2000 : 2001 6 How to use X-12-ARIMA2000 when you must: A Case Study of Hojinkigyo-Tokei Naoto Kunitomo Faculty of Economics, The University of Tokyo Abstract: We illustrate how to

More information

,.,. NP,., ,.,,.,.,,, (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., , tatsukaw

,.,. NP,., ,.,,.,.,,, (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., , tatsukaw ,.,. NP,.,. 1 1.1.,.,,.,.,,,. 2. 1.1.1 (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., 152-8552 2-12-1, tatsukawa.m.aa@m.titech.ac.jp, 190-8562 10-3, mirai@ism.ac.jp

More information

2/50 Auction: Theory and Practice 3 / 50 (WTO) 10 SDR ,600 Auction: Theory and Practice 4 / 50 2

2/50 Auction: Theory and Practice 3 / 50 (WTO) 10 SDR ,600 Auction: Theory and Practice 4 / 50 2 stakagi@econ.hokudai.ac.jp June 24, 2011 2.... 3... 4... 7 8... 9.... 10... 11... 12 IPV 13 SPSB... 15 SPSB.... 17 SPSB.... 19 FPSB... 20 FPSB.... 22 FPSB.... 23... 24 Low Price Auction.... 27 APV 29...

More information

66-1 田中健吾・松浦紗織.pwd

66-1 田中健吾・松浦紗織.pwd Abstract The aim of this study was to investigate the characteristics of a psychological stress reaction scale for home caregivers, using Item Response Theory IRT. Participants consisted of 337 home caregivers

More information

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2015-DBS-162 No /11/26 1,a) 1,b) EM Designing and developing an interactive data minig tool for rapid r

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2015-DBS-162 No /11/26 1,a) 1,b) EM Designing and developing an interactive data minig tool for rapid r 1,a) 1,b) EM Designing and developing an interactive data minig tool for rapid repeating trials Daishi Kato 1,a) Miki Kiyokazu 1,b) Abstract: Data mining has got attention for finding rules and knowledge

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

42 3 u = (37) MeV/c 2 (3.4) [1] u amu m p m n [1] m H [2] m p = (4) MeV/c 2 = (13) u m n = (4) MeV/c 2 =

42 3 u = (37) MeV/c 2 (3.4) [1] u amu m p m n [1] m H [2] m p = (4) MeV/c 2 = (13) u m n = (4) MeV/c 2 = 3 3.1 3.1.1 kg m s J = kg m 2 s 2 MeV MeV [1] 1MeV=1 6 ev = 1.62 176 462 (63) 1 13 J (3.1) [1] 1MeV/c 2 =1.782 661 731 (7) 1 3 kg (3.2) c =1 MeV (atomic mass unit) 12 C u = 1 12 M(12 C) (3.3) 41 42 3 u

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

Design of highly accurate formulas for numerical integration in weighted Hardy spaces with the aid of potential theory 1 Ken ichiro Tanaka 1 Ω R m F I = F (t) dt (1.1) Ω m m 1 m = 1 1 Newton-Cotes Gauss

More information

guideline_1_0.dvi

guideline_1_0.dvi Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10

More information

IPSJ SIG Technical Report Vol.2014-HCI-158 No /5/22 1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions

IPSJ SIG Technical Report Vol.2014-HCI-158 No /5/22 1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions 1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions with a still picture Yuuki Hyougo 1,a) Hiroko Suzuki 2 Tadanobu Furukawa 2 Kazuo Misue 3,b) Abstract: In order

More information

18 2 20 W/C W/C W/C 4-4-1 0.05 1.0 1000 1. 1 1.1 1 1.2 3 2. 4 2.1 4 (1) 4 (2) 4 2.2 5 (1) 5 (2) 5 2.3 7 3. 8 3.1 8 3.2 ( ) 11 3.3 11 (1) 12 (2) 12 4. 14 4.1 14 4.2 14 (1) 15 (2) 16 (3) 17 4.3 17 5. 19

More information

Tf9-1-07-7168.dvi

Tf9-1-07-7168.dvi /Review 1 1 1 1 2 Innovation Process Technology Hideyasu KARASAWA 1, Katsuro SAGANE 1, Hidenaga KARASAWA 1, Akira KURIYAMA 1, and Minoru KOBAYASHI 2 Abstract We propose a methodology for Innovation Process

More information

Stepwise Chow Test * Chow Test Chow Test Stepwise Chow Test Stepwise Chow Test Stepwise Chow Test Riddell Riddell first step second step sub-step Step

Stepwise Chow Test * Chow Test Chow Test Stepwise Chow Test Stepwise Chow Test Stepwise Chow Test Riddell Riddell first step second step sub-step Step Stepwise Chow Test * Chow Test Chow Test Stepwise Chow Test Stepwise Chow Test Stepwise Chow Test Riddell Riddell first step second step sub-step Stepwise Chow Test a Stepwise Chow Test Takeuchi 1991Nomura

More information

電子マネーと通信産業の戦略

電子マネーと通信産業の戦略 No.7, 55-65 (2006) Vision of Electronic Money Card Distribution Plans in Japan - Discussion of the and Credit Card Distribution Plans - OSHIMA Kazuchika Nihon University, Graduate School of Social and

More information

7章 構造物の応答値の算定

7章 構造物の応答値の算定 (1) 2 (2) 5.4 5.8.4 2 5.2 (3) 1.8 1) 36 2) PS 3) N N PS 37 10 20m N G hg h PS N (1) G h G/G 0 h 3 1) G 0 PS PS 38 N V s G 0 40% Gh 1 S 0.11% G/G 0 h G/G 0 h H-D 2),3) R-O 4) 5),6),7) τ G 0 γ = 0 r 1 (

More information

Brennan, G. and Lomasky, L., Democracy and Decision : The Pure Theory of Electoral Preference, Cambridge: Cambridge U. P., 1993. Campbell, A., Converse, P. E., Miller W. E., and Stokes, D. E., Elections

More information

On the Limited Sample Effect of the Optimum Classifier by Bayesian Approach he Case of Independent Sample Size for Each Class Xuexian HA, etsushi WAKA

On the Limited Sample Effect of the Optimum Classifier by Bayesian Approach he Case of Independent Sample Size for Each Class Xuexian HA, etsushi WAKA Journal Article / 学術雑誌論文 ベイズアプローチによる最適識別系の有限 標本効果に関する考察 : 学習標本の大きさ がクラス間で異なる場合 (< 論文小特集 > パ ターン認識のための学習 : 基礎と応用 On the limited sample effect of bayesian approach : the case of each class 韓, 雪仙 ; 若林, 哲史

More information

1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [

1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [ Vol.2, No.x, April 2015, pp.xx-xx ISSN xxxx-xxxx 2015 4 30 2015 5 25 253-8550 1100 Tel 0467-53-2111( ) Fax 0467-54-3734 http://www.bunkyo.ac.jp/faculty/business/ 1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The

More information

JFE.dvi

JFE.dvi ,, Department of Civil Engineering, Chuo University Kasuga 1-13-27, Bunkyo-ku, Tokyo 112 8551, JAPAN E-mail : atsu1005@kc.chuo-u.ac.jp E-mail : kawa@civil.chuo-u.ac.jp SATO KOGYO CO., LTD. 12-20, Nihonbashi-Honcho

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

UWB a) Accuracy of Relative Distance Measurement with Ultra Wideband System Yuichiro SHIMIZU a) and Yukitoshi SANADA (Ultra Wideband; UWB) UWB GHz DLL

UWB a) Accuracy of Relative Distance Measurement with Ultra Wideband System Yuichiro SHIMIZU a) and Yukitoshi SANADA (Ultra Wideband; UWB) UWB GHz DLL UWB a) Accuracy of Relative Distance Measurement with Ultra Wideband System Yuichiro SHIMIZU a) and Yukitoshi SANADA (Ultra Wideband; UWB) UWB GHz DLL UWB (DLL) UWB DLL 1. UWB FCC (Federal Communications

More information

,,, 2 ( ), $[2, 4]$, $[21, 25]$, $V$,, 31, 2, $V$, $V$ $V$, 2, (b) $-$,,, (1) : (2) : (3) : $r$ $R$ $r/r$, (4) : 3

,,, 2 ( ), $[2, 4]$, $[21, 25]$, $V$,, 31, 2, $V$, $V$ $V$, 2, (b) $-$,,, (1) : (2) : (3) : $r$ $R$ $r/r$, (4) : 3 1084 1999 124-134 124 3 1 (SUGIHARA Kokichi),,,,, 1, [5, 11, 12, 13], (2, 3 ), -,,,, 2 [5], 3,, 3, 2 2, -, 3,, 1,, 3 2,,, 3 $R$ ( ), $R$ $R$ $V$, $V$ $R$,,,, 3 2 125 1 3,,, 2 ( ), $[2, 4]$, $[21, 25]$,

More information

WLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A

WLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A DEIM Forum2015 C2-4 LAN 112 8610 2-1-1 NEC 211 8666 1753 E-mail: mitomo@ogl.is.ocha.ac.jp, {miyoshi,t-murase}@ap.jp.nec.com, oguchi@computer.org LAN AP AP LAN LAN LAN WLAN AP- WLAN 3 LAN LANQoS Quality

More information

dsample.dvi

dsample.dvi 1 1 1 2009 2 ( ) 600 1 2 1 2 RFID PC Practical Verification of Evacuation Guidance Based on Pedestrian Traffic Measurement Tomohisa Yamashita, 1 Shunsuke Soeda 1 and Noda Itsuki 1 In this paper, we report

More information

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

Power Transformation and Its Modifications Toshimitsu HAMASAKI, Tatsuya ISOMURA, Megu OHTAKI and Masashi GOTO Key words : identity transformation, pow

Power Transformation and Its Modifications Toshimitsu HAMASAKI, Tatsuya ISOMURA, Megu OHTAKI and Masashi GOTO Key words : identity transformation, pow Power Transformation and Its Modifications Toshimitsu HAMASAKI, Tatsuya ISOMURA, Megu OHTAKI and Masashi GOTO Key words : identity transformation, power-normal distribution, structured data, unstructured

More information

fiš„v8.dvi

fiš„v8.dvi (2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp

More information

x T = (x 1,, x M ) x T x M K C 1,, C K 22 x w y 1: 2 2

x T = (x 1,, x M ) x T x M K C 1,, C K 22 x w y 1: 2 2 Takio Kurita Neurosceince Research Institute, National Institute of Advanced Indastrial Science and Technology takio-kurita@aistgojp (Support Vector Machine, SVM) 1 (Support Vector Machine, SVM) ( ) 2

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL 1. Twitter 1 2 3 3 3 Twitter Twitter ( ) Twitter (trendspotter) Twitter 5277 24 trendspotter TRENDSPOTTER DETECTION SYSTEM FOR TWITTER Wataru Shirakihara, 1 Tetsuya Oishi, 2 Ryuzo Hasegawa, 3 Hiroshi Hujita

More information

Dynkin Serre Weyl

Dynkin Serre Weyl Dynkin Naoya Enomoto 2003.3. paper Dynkin Introduction Dynkin Lie Lie paper 1 0 Introduction 3 I ( ) Lie Dynkin 4 1 ( ) Lie 4 1.1 Lie ( )................................ 4 1.2 Killing form...........................................

More information

Real AdaBoost HOG 2009 3 A Graduation Thesis of College of Engineering, Chubu University Efficient Reducing Method of HOG Features for Human Detection based on Real AdaBoost Chika Matsushima ITS Graphics

More information

waseda2010a-jukaiki1-main.dvi

waseda2010a-jukaiki1-main.dvi November, 2 Contents 6 2 8 3 3 3 32 32 33 5 34 34 6 35 35 7 4 R 2 7 4 4 9 42 42 2 43 44 2 5 : 2 5 5 23 52 52 23 53 53 23 54 24 6 24 6 6 26 62 62 26 63 t 27 7 27 7 7 28 72 72 28 73 36) 29 8 29 8 29 82 3

More information

03.Œk’ì

03.Œk’ì HRS KG NG-HRS NG-KG AIC Fama 1965 Mandelbrot Blattberg Gonedes t t Kariya, et. al. Nagahara ARCH EngleGARCH Bollerslev EGARCH Nelson GARCH Heynen, et. al. r n r n =σ n w n logσ n =α +βlogσ n 1 + v n w

More information

23

23 Master's Thesis / 修 士 論 文 映 像 配 信 の 中 断 から 復 旧 までの 時 間 を 短 縮 するネットワーク 再 構 築 手 法 の 改 良 隅 田, 貴 久 三 重 大 学, 2011. 三 重 大 学 大 学 院 地 域 イノベーション 学 研 究 科 博 士 前 期 課 程 地 域 イノベーション 学 専 攻 http://hdl.handle.net/10076/12400

More information

¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè2²ó

¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè2²ó 2 2015 4 20 1 (4/13) : ruby 2 / 49 2 ( ) : gnuplot 3 / 49 1 1 2014 6 IIJ / 4 / 49 1 ( ) / 5 / 49 ( ) 6 / 49 (summary statistics) : (mean) (median) (mode) : (range) (variance) (standard deviation) 7 / 49

More information

The Japanese Journal of Health Psychology, 29(S): (2017)

The Japanese Journal of Health Psychology, 29(S): (2017) Journal of Health Psychology Research 2017, Vol. 29, Special issue, 139 149Journal of Health Psychology Research 2016, J-STAGE Vol. Advance 29, Special publication issue, 139 149 date : 5 December, 2016

More information

2.2 (a) = 1, M = 9, p i 1 = p i = p i+1 = 0 (b) = 1, M = 9, p i 1 = 0, p i = 1, p i+1 = 1 1: M 2 M 2 w i [j] w i [j] = 1 j= w i w i = (w i [ ],, w i [

2.2 (a) = 1, M = 9, p i 1 = p i = p i+1 = 0 (b) = 1, M = 9, p i 1 = 0, p i = 1, p i+1 = 1 1: M 2 M 2 w i [j] w i [j] = 1 j= w i w i = (w i [ ],, w i [ RI-002 Encoding-oriented video generation algorithm based on control with high temporal resolution Yukihiro BANDOH, Seishi TAKAMURA, Atsushi SHIMIZU 1 1T / CMOS [1] 4K (4096 2160 /) 900 Hz 50Hz,60Hz 240Hz

More information

36 581/2 2012

36 581/2 2012 4 Development of Optical Ground Station System 4-1 Overview of Optical Ground Station with 1.5 m Diameter KUNIMORI Hiroo, TOYOSHMA Morio, and TAKAYAMA Yoshihisa The OICETS experiment, LEO Satellite-Ground

More information

untitled

untitled 580 26 5 SP-G 2011 AI An Automatic Question Generation Method for a Local Councilor Search System Yasutomo KIMURA Hideyuki SHIBUKI Keiichi TAKAMARU Hokuto Ototake Tetsuro KOBAYASHI Tatsunori MORI Otaru

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

Mantel-Haenszelの方法

Mantel-Haenszelの方法 Mantel-Haenszel 2008 6 12 ) 2008 6 12 1 / 39 Mantel & Haenzel 1959) Mantel N, Haenszel W. Statistical aspects of the analysis of data from retrospective studies of disease. J. Nat. Cancer Inst. 1959; 224):

More information

IPSJ SIG Technical Report Vol.2017-MUS-116 No /8/24 MachineDancing: 1,a) 1,b) 3 MachineDancing MachineDancing MachineDancing 1 MachineDan

IPSJ SIG Technical Report Vol.2017-MUS-116 No /8/24 MachineDancing: 1,a) 1,b) 3 MachineDancing MachineDancing MachineDancing 1 MachineDan MachineDancing: 1,a) 1,b) 3 MachineDancing 2 1. 3 MachineDancing MachineDancing 1 MachineDancing MachineDancing [1] 1 305 0058 1-1-1 a) s.fukayama@aist.go.jp b) m.goto@aist.go.jp 1 MachineDancing 3 CG

More information

Key Words: probabilisic scenario earthquake, active fault data, Great Hanshin earthquake, low frequency-high impact earthquake motion, seismic hazard map 3) Cornell, C. A.: Engineering Seismic

More information

1

1 5-3 Photonic Antennas and its Application to Radio-over-Fiber Wireless Communication Systems LI Keren, MATSUI Toshiaki, and IZUTSU Masayuki In this paper, we presented our recent works on development of

More information

2 / 5 Auction: Theory and Practice 3 / 5 (WTO) 1 SDR 27 1,6 Auction: Theory and Practice 4 / 5 2

2 / 5 Auction: Theory and Practice 3 / 5 (WTO) 1 SDR 27 1,6 Auction: Theory and Practice 4 / 5 2 stakagi@econ.hokudai.ac.jp June 22, 212 2................................................................ 3...................................................... 4............................................................

More information

1 IDC Wo rldwide Business Analytics Technology and Services 2013-2017 Forecast 2 24 http://www.soumu.go.jp/johotsusintokei/whitepaper/ja/h24/pdf/n2010000.pdf 3 Manyika, J., Chui, M., Brown, B., Bughin,

More information

IPSJ SIG Technical Report Vol.2012-MUS-96 No /8/10 MIDI Modeling Performance Indeterminacies for Polyphonic Midi Score Following and

IPSJ SIG Technical Report Vol.2012-MUS-96 No /8/10 MIDI Modeling Performance Indeterminacies for Polyphonic Midi Score Following and MIDI 1 2 3 2 1 Modeling Performance Indeterminacies for Polyphonic Midi Score Following and Its Application to Automatic Accompaniment Nakamura Eita 1 Yamamoto Ryuichi 2 Saito Yasuyuki 3 Sako Shinji 2

More information

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of

More information

1 1 tf-idf tf-idf i

1 1 tf-idf tf-idf i 14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles

More information

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z + 3 3D 1,a) 1 1 Kinect (X, Y) 3D 3D 1. 2010 Microsoft Kinect for Windows SDK( (Kinect) SDK ) 3D [1], [2] [3] [4] [5] [10] 30fps [10] 3 Kinect 3 Kinect Kinect for Windows SDK 3 Microsoft 3 Kinect for Windows

More information

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s 1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene

More information

A Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The

A Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The A Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The Learning Effects of the Animation and the e-learning

More information

Maxwell

Maxwell I 2016 10 6 0 4 1 6 1.1............................ 6 1.2 Maxwell......................... 8 1.3.......................... 9 1.4..................... 11 1.5..................... 11 2 13 2.1...................

More information

Trapezoidal Rule θ = 1/ x n x n 1 t = 1 [f(t n 1, x n 1 ) + f(t n, x n )] (6) 1. dx dt = f(t, x), x(t 0) = x 0 (7) t [t 0, t 1 ] f t [t 0, t 1 ], x x

Trapezoidal Rule θ = 1/ x n x n 1 t = 1 [f(t n 1, x n 1 ) + f(t n, x n )] (6) 1. dx dt = f(t, x), x(t 0) = x 0 (7) t [t 0, t 1 ] f t [t 0, t 1 ], x x University of Hyogo 8 8 1 d x(t) =f(t, x(t)), dt (1) x(t 0 ) =x 0 () t n = t 0 + n t x x n n x n x 0 x i i = 0,..., n 1 x n x(t) 1 1.1 1 1 1 0 θ 1 θ x n x n 1 t = θf(t n 1, x n 1 ) + (1 θ)f(t n, x n )

More information

04.™ƒ”R/’Ô”�/’Xfl©

04.™ƒ”R/’Ô”�/’Xfl© Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP

More information

2

2 Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/

More information

JAPAN MARKETING JOURNAL 112 Vol.28 No.42009

JAPAN MARKETING JOURNAL 112 Vol.28 No.42009 JAPAN MARKETING JOURNAL 112 Vol.28 No.42009 JAPAN MARKETING JOURNAL 112 Vol.28 No.42009 JAPAN MARKETING JOURNAL 112 Vol.28 No.42009 JAPAN MARKETING JOURNAL 112 Vol.28 No.42009 JAPAN MARKETING JOURNAL 112

More information

I A A441 : April 15, 2013 Version : 1.1 I Kawahira, Tomoki TA (Shigehiro, Yoshida )

I A A441 : April 15, 2013 Version : 1.1 I   Kawahira, Tomoki TA (Shigehiro, Yoshida ) I013 00-1 : April 15, 013 Version : 1.1 I Kawahira, Tomoki TA (Shigehiro, Yoshida) http://www.math.nagoya-u.ac.jp/~kawahira/courses/13s-tenbou.html pdf * 4 15 4 5 13 e πi = 1 5 0 5 7 3 4 6 3 6 10 6 17

More information

Microsoft Word doc

Microsoft Word doc . 正規線形モデルのベイズ推定翠川 大竹距離減衰式 (PGA(Midorikawa, S., and Ohtake, Y. (, Attenuation relationships of peak ground acceleration and velocity considering attenuation characteristics for shallow and deeper earthquakes,

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

研究シリーズ第40号

研究シリーズ第40号 165 PEN WPI CPI WAGE IIP Feige and Pearce 166 167 168 169 Vector Autoregression n (z) z z p p p zt = φ1zt 1 + φ2zt 2 + + φ pzt p + t Cov( 0 ε t, ε t j )= Σ for for j 0 j = 0 Cov( ε t, zt j ) = 0 j = >

More information

johnny-paper2nd.dvi

johnny-paper2nd.dvi 13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which

More information

main.dvi

main.dvi 305 8550 1 2 CREST fujii@slis.tsukuba.ac.jp 1 7% 2 2 3 PRIME Multi-lingual Information Retrieval 2 2.1 Cross-Language Information Retrieval CLIR 1990 CD-ROM a. b. c. d. b CLIR b 70% CLIR CLIR 2.2 (b) 2

More information

CVaR

CVaR CVaR 20 4 24 3 24 1 31 ,.,.,. Markowitz,., (Value-at-Risk, VaR) (Conditional Value-at-Risk, CVaR). VaR, CVaR VaR. CVaR, CVaR. CVaR,,.,.,,,.,,. 1 5 2 VaR CVaR 6 2.1................................................

More information

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst 情報処理学会インタラクション 2015 IPSJ Interaction 2015 15INT014 2015/3/7 1,a) 1,b) 1,c) Design and Implementation of a Piano Learning Support System Considering Motivation Fukuya Yuto 1,a) Takegawa Yoshinari 1,b) Yanagi

More information

日本人の子育て観-JGSS-2008 データに見る社会の育児能力に対する評価-

日本人の子育て観-JGSS-2008 データに見る社会の育児能力に対する評価- JGSS-2008 JGSS Japanese Attitudes Toward Childrearing: Opinions About the Ability to Raise Children in Japanese Society Based on JGSS-2008 Data Takayuki SASAKI JGSS Research Center Osaka University of

More information

Japanese Journal of Family Sociology, 29(1): (2017)

Japanese Journal of Family Sociology, 29(1): (2017) 29 1 2017.4 要 約 47 1 2 3 4 2017291: 19 33 Relation of Social Stratum to Parental Education Strategies in Small Cities in Modern China: A Case Study of Shadow Education in Cixi City, Zhejiang Province,

More information