4b_12.dvi
|
|
- れいな みやのじょう
- 5 years ago
- Views:
Transcription
1 Analysis of Answering Method with Probability Conversion for Internet Research Atsushi TAGAMI, Chikara SASAKI, Teruyuki HASEGAWA, Shigehiro ANO, and Yoichi TOMIURA /. [] IPTV Securecy Anonymity 2 SSL KDDI KDDI R&D Laboratories Inc., Fujimino-shi, Japan Kyushu University, Fukuoka-shi, Japan [2], [3] RR Randomized response thechniques [4] [5], [6] x {0, } v x 0 B Vol. J92 B No. 4 pp c
2 2009/4 Vol. J92 B No x v Electronic Voting Scheme Homomorphism [2] MIX-net [3] Item Count [7] RR Randomized Response Thecnique [4] q yes/no q yes/no yes yes no 3. RR [8] PRAM Post RAndomization Method [9], [0] RR RR r
3 0/ Fig. 0/-answer function. x ( {0, }) v x v x v x x v V 0 V f 0(v) V v V f (v) V v f 0(v) 0 f (v) 0 0 σ 2 E[V ; f 0( )] = 0 () E[V ; f ( )] = (2) Var[V ; f 0( )]=Var[V ; f ( )] = σ 2 (3) 0/ V n V n = V i (4) n i n V i i V i V j (i j) m m m + n 0 ( V n = m ) n V i + V i (5) n i= i=m+ m/n = r n () (2) m P n P V i, V i 0 (6) m n m i= i=m+ P P V n n {m +(n m) 0} = m n (7) V n m/n r n r V n 3. 2 σ 2 0/ () (2) (3) m Vi i= N(m, m σ 2 ) n Vi i=m+ N(0, (n m) σ 2 ) N(μ, σ 2 ) μ σ 2 V n ( N n (m +0), ( m σ 2 +(n m) σ 2)) n 2 ( ) N r, σ2 n (8) Z z α/2 P ( z α/2 X z α/2 )= α (9) z α/2 V n r σ2 /n z α/2 (0) r 00 ( α)% ] σ [V n 2 zα/2 n, V n + z σ 2 α/2 n () 73
4 2009/4 Vol. J92 B No. 4 (m/n) ±δ σ 2 ( ) 2 σ 2 δ = n (2) z α/2 (2) σ 2 V n 00 ( α)% ±δ / σ 2 (2) 0/ v v v x v x v V = v x (Bayes decision rule) x =arg max f X V (x v) x {0,} =arg max x {0,} f X(x)f V X (v x) (3) f X V (x v) V = v X = x f V X (v x) X = x V = v f V X (v 0) = f 0(v) f V X (v ) = f (v) f X(x) X D 0 D D e D 0 = {v V f X(0)f 0(v) >f X()f (v)} D = {v V f X(0)f 0(v) <f X()f (v)} (4) D e = {v V f X(0)f 0(v) =f X()f (v)} V = {v R f V (v) > 0)} V V V (3) x v D 0 0 v D v D e ξ (0 ξ ) V = v Error(v) Error(v) f X() f (v) f V (v) = f X(0) f 0(v) f V (v) fx(0) f0(v) ξ f V (v) fx() f(v) +( ξ) f V (v) : v D 0 : v D : v D e f V (v) =f X() f (v)+f X(0) f 0(v). (5) f X() f X(0) = f X() = 0.5 v x Error(v) = 2 min (f0(v),f(v)) f V (v) (6) f X() 6. 3 Anonymity E[Error(V )] V Anonymity =E[Error(V )] = min(f 0(v),f (v)) f V (v) 2 f V (v) v { } = f (v)+ f 0(v)+ f 0(v) (7) 2 v D 0 v D v D e V Anonymity =E[Error(V )] 732
5 = min(f 0(v),f (v)) f V (v) dv 2 f V (v) [ = ] f (v)dv + f 0(v)dv + f 0(v)dv 2 D 0 D D e (8) 4. 2 () (2) (3) 0/ 0/ { f 0(v) : N(0,σ 2 ) f (v) : N(,σ 2 ) 0/ q : v = a f 0(v) = q : v = b q : v = a f (v) = q : v = b 0 <q<0.5 2 f 0 f () (2) a b a = q 2q, b = q 2q f 0 f σ 2 q 0 <q<0.5 q( q) ( 2q) 2 = σ2 (9) RR yes/no a/b RR 0/ (8) 0/ Anonymity = 0.5 f 0(v)dv (20) (7) 0/ 2 Fig. 2 Error probability variance. Anonymity = q (2) n =0,000 α =0.05 δ =0.0 0/ σ 2 z 0.05/2.96 (2) σ / (20) 0.6 0/ (9) (2) 0.5 0/ 0/ (7) (8) v 2 0/ (6) v v = v =0 f(y) f(y) = { p : y =0 p : y = f(y) = { p : y = a p : y = b 2 a b 2q = q 0 f 0 q = q 0 f 0 f 733
6 2009/4 Vol. J92 B No. 4 x σ 2 0/ Error(v) v 0/ 0/ f R D = {y R f(y) > 0} E f [Y k ; D] E f [Y k ; D] = y k f(y) y D E f [; D] = y D f(y) f E f [Y k ; D] D R E f [Y k ; D] = y k f(y) dy D E f [; D] = f(y) dy D f R D R E f [; D] =S<, E f [Y 2 ; D] < a E f [Y ; D] =as, E f [Y 2 ; D] a 2 S {y R f(y) > 0} = {a} Jensen [] 5. 2 σ 2 0/ Error(v) ( > 0) v V Error(v) = (22) 0/ (f 0,f ) m : v = m 2 m f 0(v) = m : v = m 2 m f (v) =f 0( v) m = σ 2 (23) m (5) (6) f X() = f X(0) = 0.5 Error(v) Error(v) = min(f0(v),f(v)) f 0(v)+f (v) (24) f X() = f X(0) = 0.5 D 0 = {v V f 0(v) >f (v)}, D = {v V f 0(v) <f (v)}, D e = {v V f 0(v) =f (v)} (24) v D 0 (,f 0(v) >f (v)) f (v) Error(v) = f < 0(v)+f (v) 2, v D (,f 0(v) <f (v)) f 0(v) Error(v) = f < 0(v)+f (v) 2, (25) v D e (,f 0(v) =f (v)) Error(v) = 2 v D e v D 0 D Error(v) (22) E f [; D e]=e f0 [; D e]=0 E f [; D e]=e f0 [; D e]= v V f 0(v) =f (v) 0/ () (2) (25) v D 0 Error(v) 734
7 f (v) = f0(v) (22) f X() = f X(0) = <<0.5 f (v) = f0(v) : v D0, f 0(v) = (26) f(v) : v D E f0 [; D e]=e f [; D e]=0 (27) (26) E f [V k ; D 0]= E f 0 [V k ; D 0] (28) E f0 [V k ; D ]= E f [V k ; D ] (29) f 0 =E f0 [; D 0]+E f0 [; D ]+E f0 [; D e] (27) (29) =E f0 [; D 0]+ E f [; D ] f (27) (28) = E f 0 [; D 0]+E f [; D ] E f0 [; D 0]=E f [; D ]= (30) 5. 2 {E f [; D 0]+E f0 [; D ]+E f0 [; D e]} (27) (28) (29) (30) Anonimity = 2 {E f 0 [; D 0]+E f [; D ]} = f 0 () (3) 0=E f0 [V ; D 0]+E f0 [V ; D ]+E f0 [V ; D e], σ 2 =E f0 [V 2 ; D 0]+E f0 [V 2 ; D ]+E f0 [V 2 ; D e] (27) (29) 0=E f0 [V ; D 0]+ E f [V ; D ], (3) σ 2 =E f0 [V 2 ; D 0]+ E f [V 2 ; D ] (32) (3) (32) (30) a 0 a 0=a 0()+a (33) σ 2 a 2 0 ()+a 2 (34) f (2) (3) =a 0 + a () (35) σ 2 + a a 2 () (36) (33) (35) a 0 a a 0 = 2, a = 2 (37) (34) (36) 2 ( 2) 2 σ 2 </ σ 2 m m = 2 2 (38) +4σ 2 (34) (36) / 735
8 2009/4 Vol. J92 B No σ 2 v Error(v) (39) 0/ σ 2 0/ (f 0,f ) L : v =/2 Δ M : v =/2 f 0(v) = L /() : v =/2+Δ f (v) =f 0( v) L = ( + 4σ 2 )( 2) 2, M = ( + 4σ 2 )( 2) 2, Δ= 2 ( + 4σ2 )( 2) ( Anonymity = 2σ 2 ) (40) +4σ 2 2 f X() = f X(0) = 0.5 /2 (39) 0/ 0 <</2 (39) f (v) f0(v) : v D0 (4) f 0(v) f(v) : v D (42) 2 f(v) f0(v) :v D0 2 g(v) = f 0(v) : v D e 2 f0(v) f(v) :v D 2 h(v) = (f0(v) f(v)) : v D0 2 0 : v D e (f(v) f0(v)) : v D 2 g h f 0 f h(v)+g(v) : v D 0 f 0(v) = g(v) : v D e (43) h(v)+g(v) : v D h(v)+g(v) : v D0 f (v) = g(v) : v D e (44) h(v)+g(v) : v D E f0 [V k ; D e]=e g[v k ; D e], E f0 [V k ; D ]= E h[v k ; D ]+E g[v k ; D ] g h (4) (42) </2 v g(v) 0, v (D 0 D ) h(v) > 0, v D e h(v) =0, (45) f 0 f (43) (44) E h [; D 0]+ E h[; D ]+E g[; V] =, E h[; D 0]+E h [; D ]+E g[; V] = E h [; D 0]=E h [; D ] L + M = (46) E h [; D 0]=E h [; D ]=L, E g[; V] =M (47) A =2 Anonimity (43) 736
9 (44) (47) A =E f [; D 0]+E f0 [; D ]+E f0 [; D e] = {E h[; D 0]+E h [; D ]} +E g[; D 0]+E g[; D ]+E g[; D e] = 2 L + M (48) (46) (48) L M L = ()( A) 2 M = A 2 2 f 0 () (3) (49) 0=E f0 [V ; D 0]+E f0 [V ; D ]+E f0 [V ; D e], σ 2 =E f0 [V 2 ; D 0]+E f0 [V 2 ; D ]+E f0 [V 2 ; D e] (43) (44) 0=E h [V ; D 0]+ E h[v ; D ]+E g[v ; V], σ 2 =E h [V 2 ; D 0]+ E h[v 2 ; D ]+E g[v 2 ; V] (45) g h D 0 D D e (47) a 0 a a e 0=a 0L + al + aem (50) σ 2 a 2 0 L + a2 L + a 2 e M (5) f (2) (3) = a0l + al + aem (52) σ 2 + a02 L + a 2 L + a 2 e M (53) (50) (52) (49) a 0 a a 0 = A 2 A ae (54) A a = A 2 A ae + (55) A (54) (55) (5) A ( σ 2 +2a 2 a e2 + σ 2 e ) () 2 (56) A 0(a e) (54) (55) (53) A ( a e) 2 + σ 2 ( σ 2 +2( a e) 2 ) () 2 (57) A (a e) A max a e min(a 0(a e),a (a e)) (45) M L M 0 L >0 (49) 2 A< (56) (57) A 0(a e) < A (a e) < A 0(a e) 2, A (a e) 2 2 ( 2) 2 σ 2 0 <</ σ 2 A 0(a e) A (a e) a e A 0(a e) A (a e) max a e min(a 0(a e),a (a e)) = A 0(/2) ( = 4σ 2 2 ) +4σ 2 2 (58) (58) A m A = A m a e =/2 (49) (54) (55) L = ( + 4σ 2 )( 2) 2 737
10 2009/4 Vol. J92 B No. 4 M = ( + 4σ 2 )( 2) 2 a 0 = 2 2 ( + 4σ2 )( 2) a = ( + 4σ2 )( 2) A = A m g h (5) (53) a 0 D 0 a D a e =/2 D e { g(v) = M : v =/2, L : v = a 0, h(v) = L : v = a, (43) (44) / 95% α =0.05 δ =0.0, 0.05 (2) (23) 0.4 δ =0.05 0, Error(v) 4 Anonymity (2) (40) n =0 4, , 0 5, % α =0.05 δ =0.0, / 0/ (40) 4 Error(v) v x f X(0) = f X() = 0.5 x x Fig. 3 3 Anonymity v.s. number of sample. 4 Fig. 4 Anonymity v.s. lower bound of error(v). 738
11 v x min(f X(0),f X()) x = 0. v v v v 5. () (2) (3) 0/ 3 σ 2 0/ Error(v) ( > 0) v V Error(v) = p = f X() 0/ (f 0,f ) ()(p 0 ) : v = p ( 2)p 0 p 0 f 0(v) = (p ) ()p : v = ( 2)p 0 p 0 : otherwise (p 0 ) : v = p ( 2)p p 0 f (v) = ()(p ) ()p : v = ( 2)p p 0 : otherwise p 0 = p = 2 p( p)σ2 4 σ 2 + p 2 p =max(p,p 0). 5 Fig. 5 With known prior probability. 2 p( p)σ2 (59) 4 σ 2 + p 2 5 (59) 95% α =0.05 δ =0.0 f X() = 0.3, 0.4 min(f X(0),f X()) 0/ (3) 7. 0/ 0/ σ 2 0/ 0/ 739
12 2009/4 Vol. J92 B No. 4 n 0 4 n =0 4 40% 95% ±0.05 [] Everybody Votes Channel, na/ channelseverybodyvotes.jsp [2] P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, Proc. EUROCRYPT 99, pp , Czech Republic, May 999. [3] J. Furukawa and K. Sako, An efficient scheme for proving shuffle, Crypto 200, pp , California, Aug [4] S.L. Warner, Randomized response: A survey technique for eliminating evasive answer bias, J. American Statistical Association, vol.60, no.309, pp.63 69, March 965. [5] A. Tagami, C. Sasaki, T. Hasegawa, S. Ano, and Y. Tomiura, Analysis of answering method with probability conversion for Internet research, Fifth Annual IEEE Consumer Communications & Networking Conference, NV, Jan [6] A. Tagami, C. Sasaki, T. Hasegawa, S. Ano, and Y. Tomiura, Optimization of the answering method with probability conversion, Workshop on Heuristic Methods for the Design, Deployment, and Reliability of Network and Network Applications, Finland, July [7] J. Droitcour, R. Caspor, M. Hubbard, T. Parsley, W. Vissher, and T. Ezzati, The item count technique as a method of indirect questioning: A review of its development and a case study application, in Measurement Errors in Surveys, pp.85 20, John Wiley & Sons, New York, 99. [8] W. Du and Z. Zhan, Using randomized response techniques for privacy-preserving data mining, 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp , Washington DC, Aug [9] P.L. Kooiman, L. Willenborg, and J. Gouweleeuw, PRAM: A method for disclosure limitation of microdata, Technical Report, Statistics Netherlands, 997. [0] J. Gouweleeuw, P. Kooiman, Willenborg, and P. Wolf, Post randomization for statistical disclosure control: Theory and implementation, J. Official Statistics, vol.4, pp , 998. [] KDD KDDI IP 6 KDDI QoS KDDI IP 5 KDD KDDI IP 5 KDDATM IP KDDI IP Pacling2005 Best Paper Award FIT
9_18.dvi
Vol. 49 No. 9 3180 3190 (Sep. 2008) 1, 2 3 1 1 1, 2 4 5 6 1 MRC 1 23 MRC Development and Applications of Multiple Risk Communicator Ryoichi Sasaki, 1, 2 Yuu Hidaka, 3 Takashi Moriya, 1 Katsuhiro Taniyama,
More information三石貴志.indd
流通科学大学論集 - 経済 情報 政策編 - 第 21 巻第 1 号,23-33(2012) SIRMs SIRMs Fuzzy fuzzyapproximate approximatereasoning reasoningusing using Lukasiewicz Łukasiewicz logical Logical operations Operations Takashi Mitsuishi
More informationMeas- urement Angoff, W. H. 19654 Equating non-parallel tests. Journal of Educational Measurement, 1, 11-14. Angoff, W. H. 1971a Scales, norms and equivalent scores. In R. L. Thorndike (Ed.) Educational
More informationuntitled
IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)
More information& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us
1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo
More informationCVM CVM 1 1 Revealed Preference Stated Preference CVM CVM CVM CVM NOAA 3 CVM 4 5 CVM 2.2 CVM CVM CVM2 CVM 2 Vol.3 No Spring 003
Vol.3 No.1 2000 Spring 002 intuitive CVM CVM 1 CVM CVM CVM NISHIDA, Masaru CVM 2 2.1 CVM 1 1 Revealed Preference Stated Preference CVM CVM CVM 2 2 2 CVM NOAA 3 CVM 4 5 CVM 2.2 CVM CVM CVM2 CVM 2 Vol.3
More information4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q
x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke
More information24 201170068 1 4 2 6 2.1....................... 6 2.1.1................... 6 2.1.2................... 7 2.1.3................... 8 2.2..................... 8 2.3................. 9 2.3.1........... 12
More information181 第 54 回土木計画学研究発表会 講演集 GPS S-502W S-502W
181 GPS 1 2 3 4 1 98-845 468-1 S-52W E-mail: h-ymgc@plan.civil.tohoku.ac.jp 2 98-845 468-1 S-52W E-mail: mokmr@m.tohoku.ac.jp 3 18-626 2 15-3 C 6F E-mail: h kaneda@zenrin-datacom.net 4 18-626 2 15-3 C
More informationSEJulyMs更新V7
1 2 ( ) Quantitative Characteristics of Software Process (Is There any Myth, Mystery or Anomaly? No Silver Bullet?) Zenya Koono and Hui Chen A process creates a product. This paper reviews various samples
More informationxx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL
PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP
More informationA Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi
A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,
More information1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D
P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:
More informationPublish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S
KiZUNA: P2P 1,a) 1 1 1 P2P KiZUNA KiZUNA Pure P2P P2P 1 Skip Graph ALM(Application Level Multicast) Pub/Sub, P2P Skip Graph, Bloom Filter KiZUNA: An Implementation of Distributed Microblogging Service
More informationDEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme
DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community
More information和RIMNo.22高安氏.indd
NIEsGDP 1990 200436.1 22.365.1 80 GDP 4 RIM 2006 Vol.6 No.22 RIM 2006 Vol.6 No.22 5 NIEs GDP GDP GDP GDP 90 GDP 1951 80 81 90 90 90 2001 2003 GDP 80 90 2001 2002 GDP 87GDP 80 GDP GDP 6 RIM 2006 Vol.6 No.22
More informationohpmain.dvi
fujisawa@ism.ac.jp 1 Contents 1. 2. 3. 4. γ- 2 1. 3 10 5.6, 5.7, 5.4, 5.5, 5.8, 5.5, 5.3, 5.6, 5.4, 5.2. 5.5 5.6 +5.7 +5.4 +5.5 +5.8 +5.5 +5.3 +5.6 +5.4 +5.2 =5.5. 10 outlier 5 5.6, 5.7, 5.4, 5.5, 5.8,
More information8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact
8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for
More information(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α,
[II] Optimization Computation for 3-D Understanding of Images [II]: Ellipse Fitting 1. (1) 2. (2) (edge detection) (edge) (zero-crossing) Canny (Canny operator) (3) 1(a) [I] [II] [III] [IV ] E-mail sugaya@iim.ics.tut.ac.jp
More informationuntitled
18 1 2,000,000 2,000,000 2007 2 2 2008 3 31 (1) 6 JCOSSAR 2007pp.57-642007.6. LCC (1) (2) 2 10mm 1020 14 12 10 8 6 4 40,50,60 2 0 1998 27.5 1995 1960 40 1) 2) 3) LCC LCC LCC 1 1) Vol.42No.5pp.29-322004.5.
More information1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,
More information149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :
Transactions of the Operations Research Society of Japan Vol. 58, 215, pp. 148 165 c ( 215 1 2 ; 215 9 3 ) 1) 2) :,,,,, 1. [9] 3 12 Darroch,Newell, and Morris [1] Mcneil [3] Miller [4] Newell [5, 6], [1]
More information鉄鋼協会プレゼン
NN :~:, 8 Nov., Adaptive H Control for Linear Slider with Friction Compensation positioning mechanism moving table stand manipulator Point to Point Control [G] Continuous Path Control ground Fig. Positoining
More informationJIS Z803: (substitution method) 3 LCR LCR GPIB
LCR NMIJ 003 Agilent 8A 500 ppm JIS Z803:000 50 (substitution method) 3 LCR LCR GPIB Taylor 5 LCR LCR meter (Agilent 8A: Basic accuracy 500 ppm) V D z o I V DUT Z 3 V 3 I A Z V = I V = 0 3 6 V, A LCR meter
More informationIPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1
1, 2 1 1 1 Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 Nobutaka ONO 1 and Shigeki SAGAYAMA 1 This paper deals with instrument separation
More information橡表紙参照.PDF
CIRJE-J-58 X-12-ARIMA 2000 : 2001 6 How to use X-12-ARIMA2000 when you must: A Case Study of Hojinkigyo-Tokei Naoto Kunitomo Faculty of Economics, The University of Tokyo Abstract: We illustrate how to
More information,.,. NP,., ,.,,.,.,,, (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., , tatsukaw
,.,. NP,.,. 1 1.1.,.,,.,.,,,. 2. 1.1.1 (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., 152-8552 2-12-1, tatsukawa.m.aa@m.titech.ac.jp, 190-8562 10-3, mirai@ism.ac.jp
More information2/50 Auction: Theory and Practice 3 / 50 (WTO) 10 SDR ,600 Auction: Theory and Practice 4 / 50 2
stakagi@econ.hokudai.ac.jp June 24, 2011 2.... 3... 4... 7 8... 9.... 10... 11... 12 IPV 13 SPSB... 15 SPSB.... 17 SPSB.... 19 FPSB... 20 FPSB.... 22 FPSB.... 23... 24 Low Price Auction.... 27 APV 29...
More information66-1 田中健吾・松浦紗織.pwd
Abstract The aim of this study was to investigate the characteristics of a psychological stress reaction scale for home caregivers, using Item Response Theory IRT. Participants consisted of 337 home caregivers
More information情報処理学会研究報告 IPSJ SIG Technical Report Vol.2015-DBS-162 No /11/26 1,a) 1,b) EM Designing and developing an interactive data minig tool for rapid r
1,a) 1,b) EM Designing and developing an interactive data minig tool for rapid repeating trials Daishi Kato 1,a) Miki Kiyokazu 1,b) Abstract: Data mining has got attention for finding rules and knowledge
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More information42 3 u = (37) MeV/c 2 (3.4) [1] u amu m p m n [1] m H [2] m p = (4) MeV/c 2 = (13) u m n = (4) MeV/c 2 =
3 3.1 3.1.1 kg m s J = kg m 2 s 2 MeV MeV [1] 1MeV=1 6 ev = 1.62 176 462 (63) 1 13 J (3.1) [1] 1MeV/c 2 =1.782 661 731 (7) 1 3 kg (3.2) c =1 MeV (atomic mass unit) 12 C u = 1 12 M(12 C) (3.3) 41 42 3 u
More informationRun-Based Trieから構成される 決定木の枝刈り法
Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network
More informationB HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int
SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation
More informationDesign of highly accurate formulas for numerical integration in weighted Hardy spaces with the aid of potential theory 1 Ken ichiro Tanaka 1 Ω R m F I = F (t) dt (1.1) Ω m m 1 m = 1 1 Newton-Cotes Gauss
More informationguideline_1_0.dvi
Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10
More informationIPSJ SIG Technical Report Vol.2014-HCI-158 No /5/22 1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions
1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions with a still picture Yuuki Hyougo 1,a) Hiroko Suzuki 2 Tadanobu Furukawa 2 Kazuo Misue 3,b) Abstract: In order
More information18 2 20 W/C W/C W/C 4-4-1 0.05 1.0 1000 1. 1 1.1 1 1.2 3 2. 4 2.1 4 (1) 4 (2) 4 2.2 5 (1) 5 (2) 5 2.3 7 3. 8 3.1 8 3.2 ( ) 11 3.3 11 (1) 12 (2) 12 4. 14 4.1 14 4.2 14 (1) 15 (2) 16 (3) 17 4.3 17 5. 19
More informationTf9-1-07-7168.dvi
/Review 1 1 1 1 2 Innovation Process Technology Hideyasu KARASAWA 1, Katsuro SAGANE 1, Hidenaga KARASAWA 1, Akira KURIYAMA 1, and Minoru KOBAYASHI 2 Abstract We propose a methodology for Innovation Process
More informationStepwise Chow Test * Chow Test Chow Test Stepwise Chow Test Stepwise Chow Test Stepwise Chow Test Riddell Riddell first step second step sub-step Step
Stepwise Chow Test * Chow Test Chow Test Stepwise Chow Test Stepwise Chow Test Stepwise Chow Test Riddell Riddell first step second step sub-step Stepwise Chow Test a Stepwise Chow Test Takeuchi 1991Nomura
More information電子マネーと通信産業の戦略
No.7, 55-65 (2006) Vision of Electronic Money Card Distribution Plans in Japan - Discussion of the and Credit Card Distribution Plans - OSHIMA Kazuchika Nihon University, Graduate School of Social and
More information7章 構造物の応答値の算定
(1) 2 (2) 5.4 5.8.4 2 5.2 (3) 1.8 1) 36 2) PS 3) N N PS 37 10 20m N G hg h PS N (1) G h G/G 0 h 3 1) G 0 PS PS 38 N V s G 0 40% Gh 1 S 0.11% G/G 0 h G/G 0 h H-D 2),3) R-O 4) 5),6),7) τ G 0 γ = 0 r 1 (
More informationBrennan, G. and Lomasky, L., Democracy and Decision : The Pure Theory of Electoral Preference, Cambridge: Cambridge U. P., 1993. Campbell, A., Converse, P. E., Miller W. E., and Stokes, D. E., Elections
More informationOn the Limited Sample Effect of the Optimum Classifier by Bayesian Approach he Case of Independent Sample Size for Each Class Xuexian HA, etsushi WAKA
Journal Article / 学術雑誌論文 ベイズアプローチによる最適識別系の有限 標本効果に関する考察 : 学習標本の大きさ がクラス間で異なる場合 (< 論文小特集 > パ ターン認識のための学習 : 基礎と応用 On the limited sample effect of bayesian approach : the case of each class 韓, 雪仙 ; 若林, 哲史
More information1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [
Vol.2, No.x, April 2015, pp.xx-xx ISSN xxxx-xxxx 2015 4 30 2015 5 25 253-8550 1100 Tel 0467-53-2111( ) Fax 0467-54-3734 http://www.bunkyo.ac.jp/faculty/business/ 1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The
More informationJFE.dvi
,, Department of Civil Engineering, Chuo University Kasuga 1-13-27, Bunkyo-ku, Tokyo 112 8551, JAPAN E-mail : atsu1005@kc.chuo-u.ac.jp E-mail : kawa@civil.chuo-u.ac.jp SATO KOGYO CO., LTD. 12-20, Nihonbashi-Honcho
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe
1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,
More informationUWB a) Accuracy of Relative Distance Measurement with Ultra Wideband System Yuichiro SHIMIZU a) and Yukitoshi SANADA (Ultra Wideband; UWB) UWB GHz DLL
UWB a) Accuracy of Relative Distance Measurement with Ultra Wideband System Yuichiro SHIMIZU a) and Yukitoshi SANADA (Ultra Wideband; UWB) UWB GHz DLL UWB (DLL) UWB DLL 1. UWB FCC (Federal Communications
More information,,, 2 ( ), $[2, 4]$, $[21, 25]$, $V$,, 31, 2, $V$, $V$ $V$, 2, (b) $-$,,, (1) : (2) : (3) : $r$ $R$ $r/r$, (4) : 3
1084 1999 124-134 124 3 1 (SUGIHARA Kokichi),,,,, 1, [5, 11, 12, 13], (2, 3 ), -,,,, 2 [5], 3,, 3, 2 2, -, 3,, 1,, 3 2,,, 3 $R$ ( ), $R$ $R$ $V$, $V$ $R$,,,, 3 2 125 1 3,,, 2 ( ), $[2, 4]$, $[21, 25]$,
More informationWLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A
DEIM Forum2015 C2-4 LAN 112 8610 2-1-1 NEC 211 8666 1753 E-mail: mitomo@ogl.is.ocha.ac.jp, {miyoshi,t-murase}@ap.jp.nec.com, oguchi@computer.org LAN AP AP LAN LAN LAN WLAN AP- WLAN 3 LAN LANQoS Quality
More informationdsample.dvi
1 1 1 2009 2 ( ) 600 1 2 1 2 RFID PC Practical Verification of Evacuation Guidance Based on Pedestrian Traffic Measurement Tomohisa Yamashita, 1 Shunsuke Soeda 1 and Noda Itsuki 1 In this paper, we report
More information27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U
YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube
More informationPower Transformation and Its Modifications Toshimitsu HAMASAKI, Tatsuya ISOMURA, Megu OHTAKI and Masashi GOTO Key words : identity transformation, pow
Power Transformation and Its Modifications Toshimitsu HAMASAKI, Tatsuya ISOMURA, Megu OHTAKI and Masashi GOTO Key words : identity transformation, power-normal distribution, structured data, unstructured
More informationfiš„v8.dvi
(2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp
More informationx T = (x 1,, x M ) x T x M K C 1,, C K 22 x w y 1: 2 2
Takio Kurita Neurosceince Research Institute, National Institute of Advanced Indastrial Science and Technology takio-kurita@aistgojp (Support Vector Machine, SVM) 1 (Support Vector Machine, SVM) ( ) 2
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More information1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2
DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web
More information2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL
1. Twitter 1 2 3 3 3 Twitter Twitter ( ) Twitter (trendspotter) Twitter 5277 24 trendspotter TRENDSPOTTER DETECTION SYSTEM FOR TWITTER Wataru Shirakihara, 1 Tetsuya Oishi, 2 Ryuzo Hasegawa, 3 Hiroshi Hujita
More informationDynkin Serre Weyl
Dynkin Naoya Enomoto 2003.3. paper Dynkin Introduction Dynkin Lie Lie paper 1 0 Introduction 3 I ( ) Lie Dynkin 4 1 ( ) Lie 4 1.1 Lie ( )................................ 4 1.2 Killing form...........................................
More informationReal AdaBoost HOG 2009 3 A Graduation Thesis of College of Engineering, Chubu University Efficient Reducing Method of HOG Features for Human Detection based on Real AdaBoost Chika Matsushima ITS Graphics
More informationwaseda2010a-jukaiki1-main.dvi
November, 2 Contents 6 2 8 3 3 3 32 32 33 5 34 34 6 35 35 7 4 R 2 7 4 4 9 42 42 2 43 44 2 5 : 2 5 5 23 52 52 23 53 53 23 54 24 6 24 6 6 26 62 62 26 63 t 27 7 27 7 7 28 72 72 28 73 36) 29 8 29 8 29 82 3
More information03.Œk’ì
HRS KG NG-HRS NG-KG AIC Fama 1965 Mandelbrot Blattberg Gonedes t t Kariya, et. al. Nagahara ARCH EngleGARCH Bollerslev EGARCH Nelson GARCH Heynen, et. al. r n r n =σ n w n logσ n =α +βlogσ n 1 + v n w
More information23
Master's Thesis / 修 士 論 文 映 像 配 信 の 中 断 から 復 旧 までの 時 間 を 短 縮 するネットワーク 再 構 築 手 法 の 改 良 隅 田, 貴 久 三 重 大 学, 2011. 三 重 大 学 大 学 院 地 域 イノベーション 学 研 究 科 博 士 前 期 課 程 地 域 イノベーション 学 専 攻 http://hdl.handle.net/10076/12400
More information¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè2²ó
2 2015 4 20 1 (4/13) : ruby 2 / 49 2 ( ) : gnuplot 3 / 49 1 1 2014 6 IIJ / 4 / 49 1 ( ) / 5 / 49 ( ) 6 / 49 (summary statistics) : (mean) (median) (mode) : (range) (variance) (standard deviation) 7 / 49
More informationThe Japanese Journal of Health Psychology, 29(S): (2017)
Journal of Health Psychology Research 2017, Vol. 29, Special issue, 139 149Journal of Health Psychology Research 2016, J-STAGE Vol. Advance 29, Special publication issue, 139 149 date : 5 December, 2016
More information2.2 (a) = 1, M = 9, p i 1 = p i = p i+1 = 0 (b) = 1, M = 9, p i 1 = 0, p i = 1, p i+1 = 1 1: M 2 M 2 w i [j] w i [j] = 1 j= w i w i = (w i [ ],, w i [
RI-002 Encoding-oriented video generation algorithm based on control with high temporal resolution Yukihiro BANDOH, Seishi TAKAMURA, Atsushi SHIMIZU 1 1T / CMOS [1] 4K (4096 2160 /) 900 Hz 50Hz,60Hz 240Hz
More information36 581/2 2012
4 Development of Optical Ground Station System 4-1 Overview of Optical Ground Station with 1.5 m Diameter KUNIMORI Hiroo, TOYOSHMA Morio, and TAKAYAMA Yoshihisa The OICETS experiment, LEO Satellite-Ground
More informationuntitled
580 26 5 SP-G 2011 AI An Automatic Question Generation Method for a Local Councilor Search System Yasutomo KIMURA Hideyuki SHIBUKI Keiichi TAKAMARU Hokuto Ototake Tetsuro KOBAYASHI Tatsunori MORI Otaru
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More informationMantel-Haenszelの方法
Mantel-Haenszel 2008 6 12 ) 2008 6 12 1 / 39 Mantel & Haenzel 1959) Mantel N, Haenszel W. Statistical aspects of the analysis of data from retrospective studies of disease. J. Nat. Cancer Inst. 1959; 224):
More informationIPSJ SIG Technical Report Vol.2017-MUS-116 No /8/24 MachineDancing: 1,a) 1,b) 3 MachineDancing MachineDancing MachineDancing 1 MachineDan
MachineDancing: 1,a) 1,b) 3 MachineDancing 2 1. 3 MachineDancing MachineDancing 1 MachineDancing MachineDancing [1] 1 305 0058 1-1-1 a) s.fukayama@aist.go.jp b) m.goto@aist.go.jp 1 MachineDancing 3 CG
More informationKey Words: probabilisic scenario earthquake, active fault data, Great Hanshin earthquake, low frequency-high impact earthquake motion, seismic hazard map 3) Cornell, C. A.: Engineering Seismic
More information1
5-3 Photonic Antennas and its Application to Radio-over-Fiber Wireless Communication Systems LI Keren, MATSUI Toshiaki, and IZUTSU Masayuki In this paper, we presented our recent works on development of
More information2 / 5 Auction: Theory and Practice 3 / 5 (WTO) 1 SDR 27 1,6 Auction: Theory and Practice 4 / 5 2
stakagi@econ.hokudai.ac.jp June 22, 212 2................................................................ 3...................................................... 4............................................................
More information1 IDC Wo rldwide Business Analytics Technology and Services 2013-2017 Forecast 2 24 http://www.soumu.go.jp/johotsusintokei/whitepaper/ja/h24/pdf/n2010000.pdf 3 Manyika, J., Chui, M., Brown, B., Bughin,
More informationIPSJ SIG Technical Report Vol.2012-MUS-96 No /8/10 MIDI Modeling Performance Indeterminacies for Polyphonic Midi Score Following and
MIDI 1 2 3 2 1 Modeling Performance Indeterminacies for Polyphonic Midi Score Following and Its Application to Automatic Accompaniment Nakamura Eita 1 Yamamoto Ryuichi 2 Saito Yasuyuki 3 Sako Shinji 2
More informationIPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka
* Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More information1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +
3 3D 1,a) 1 1 Kinect (X, Y) 3D 3D 1. 2010 Microsoft Kinect for Windows SDK( (Kinect) SDK ) 3D [1], [2] [3] [4] [5] [10] 30fps [10] 3 Kinect 3 Kinect Kinect for Windows SDK 3 Microsoft 3 Kinect for Windows
More information(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s
1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene
More informationA Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The
A Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The Learning Effects of the Animation and the e-learning
More informationMaxwell
I 2016 10 6 0 4 1 6 1.1............................ 6 1.2 Maxwell......................... 8 1.3.......................... 9 1.4..................... 11 1.5..................... 11 2 13 2.1...................
More informationTrapezoidal Rule θ = 1/ x n x n 1 t = 1 [f(t n 1, x n 1 ) + f(t n, x n )] (6) 1. dx dt = f(t, x), x(t 0) = x 0 (7) t [t 0, t 1 ] f t [t 0, t 1 ], x x
University of Hyogo 8 8 1 d x(t) =f(t, x(t)), dt (1) x(t 0 ) =x 0 () t n = t 0 + n t x x n n x n x 0 x i i = 0,..., n 1 x n x(t) 1 1.1 1 1 1 0 θ 1 θ x n x n 1 t = θf(t n 1, x n 1 ) + (1 θ)f(t n, x n )
More information04.™ƒ”R/’Ô”�/’Xfl©
Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP
More information2
Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/
More informationJAPAN MARKETING JOURNAL 112 Vol.28 No.42009
JAPAN MARKETING JOURNAL 112 Vol.28 No.42009 JAPAN MARKETING JOURNAL 112 Vol.28 No.42009 JAPAN MARKETING JOURNAL 112 Vol.28 No.42009 JAPAN MARKETING JOURNAL 112 Vol.28 No.42009 JAPAN MARKETING JOURNAL 112
More informationI A A441 : April 15, 2013 Version : 1.1 I Kawahira, Tomoki TA (Shigehiro, Yoshida )
I013 00-1 : April 15, 013 Version : 1.1 I Kawahira, Tomoki TA (Shigehiro, Yoshida) http://www.math.nagoya-u.ac.jp/~kawahira/courses/13s-tenbou.html pdf * 4 15 4 5 13 e πi = 1 5 0 5 7 3 4 6 3 6 10 6 17
More informationMicrosoft Word doc
. 正規線形モデルのベイズ推定翠川 大竹距離減衰式 (PGA(Midorikawa, S., and Ohtake, Y. (, Attenuation relationships of peak ground acceleration and velocity considering attenuation characteristics for shallow and deeper earthquakes,
More informationDPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)
1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology
More information研究シリーズ第40号
165 PEN WPI CPI WAGE IIP Feige and Pearce 166 167 168 169 Vector Autoregression n (z) z z p p p zt = φ1zt 1 + φ2zt 2 + + φ pzt p + t Cov( 0 ε t, ε t j )= Σ for for j 0 j = 0 Cov( ε t, zt j ) = 0 j = >
More informationjohnny-paper2nd.dvi
13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which
More informationmain.dvi
305 8550 1 2 CREST fujii@slis.tsukuba.ac.jp 1 7% 2 2 3 PRIME Multi-lingual Information Retrieval 2 2.1 Cross-Language Information Retrieval CLIR 1990 CD-ROM a. b. c. d. b CLIR b 70% CLIR CLIR 2.2 (b) 2
More informationCVaR
CVaR 20 4 24 3 24 1 31 ,.,.,. Markowitz,., (Value-at-Risk, VaR) (Conditional Value-at-Risk, CVaR). VaR, CVaR VaR. CVaR, CVaR. CVaR,,.,.,,,.,,. 1 5 2 VaR CVaR 6 2.1................................................
More information( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst
情報処理学会インタラクション 2015 IPSJ Interaction 2015 15INT014 2015/3/7 1,a) 1,b) 1,c) Design and Implementation of a Piano Learning Support System Considering Motivation Fukuya Yuto 1,a) Takegawa Yoshinari 1,b) Yanagi
More information日本人の子育て観-JGSS-2008 データに見る社会の育児能力に対する評価-
JGSS-2008 JGSS Japanese Attitudes Toward Childrearing: Opinions About the Ability to Raise Children in Japanese Society Based on JGSS-2008 Data Takayuki SASAKI JGSS Research Center Osaka University of
More informationJapanese Journal of Family Sociology, 29(1): (2017)
29 1 2017.4 要 約 47 1 2 3 4 2017291: 19 33 Relation of Social Stratum to Parental Education Strategies in Small Cities in Modern China: A Case Study of Shadow Education in Cixi City, Zhejiang Province,
More information