paper.dvi
|
|
- くうしょう ねごろ
- 5 years ago
- Views:
Transcription
1 28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation
2 DMAT i
3 Abstract Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation Asami TANAKA The medical treatment in the area affected of disaster was difficult because medical datalostinthetsunami ofgreateast japanearthquake. Inorder toprevent medicaldata from being lost, the hospitals in Kochi have started the remote backup plan. Moreover, by providing the required information of treating victims from backup data such as name, blood type and medicine information, Disaster Medical Assistance Team(DMAT) can treat victims outside the hospital at the acute stage of disasters. Because medical data is personal information, it is necessary to provide the minimum required patient information. The restoration method has been proposed to confine more decoding data than necessary decoding data. In order to provide the patient information, the proposed method owns the decoding control information. However, it is possible to illegally decode in case the leaked the decoding control information. In this paper, the restoration structure to prevent from illegal decoding has been proposed. To prevent from illegal decoding, the structure control information has been defined to prohibit the decoding control information leakage. In addition, the requirement has been defined to prevent the structure control information from being leaked. The experimental results suggested that it is possible to prevent from illegal decoding by satisfying the requirements. key words distributed backup, secret sharing scheme, confied decodning ii
4 SS-MIX(Standardized Structured Medical Information exchange) (k,n) (k,n) iii
5 3.5.1 PC PC PC PC PC PC iv
6 2.1 SS-MIX (k,n) SS-MIX (k,n) SS-MIX SS-MIX ( ) ( ) PC PC PC PC PC PC v
7 PC PC PC ( ) PC PC PC PC PC vi
8 4.4 PC vii
9 viii
10 1 1.1 [1] [2]
11 2 [1] [2] [3] [1] (k,n) (k,n) 2
12 (SS-MIX: Standardized Structured Medical Information exchange) [4] [4] 3
13 SS-MIX(Standardized Structured Medical Information exchange) SS-MIX [5] SS-MIX HIS(Hospital Information System) 4
14 SS-MIX 2.2 CD 2.1 SS-MIX ID 2.2 5
15 2.2 HL7 [6]
16 2.3 (k,n) 2.3 (k,n) [7] 2 [9] 1 (k,n) (k,n) SS-MIX 2.3 SS-MIX ID (k,n) n k (k,n) 2.4 n k k [10] (k,n) 7
17 2.3 (k,n) 2.3 (k,n) SS-MIX 2.4 (k,n) S p(s < p n < p) Z/pZ {0} x x = {x 1,x 2,,x n }. Z/pZ R 8
18 2.3 (k,n) 1. x X = 1 x 1 x 2 1 x k x 2 x 2 2 x k x n x 2 n x k 1 n (mod p) (2.1) vandermonde X 2. S R k 1 a S r 1 a = r 2 (r 1,r 2,,r k 1, R, r k 1 0) (2.2). r k 1 3. p X a Xa = w 1 w 2,. w n (mod p) (2.3) w i (i = 1,2,,n) w i w i 4. k k W W = w 1 w 2. (2.4) w k 9
19 2.3 (k,n) 5. X X 1 W X 1 W = X 1 w 1 w 2. w k = X 1 X = S r 1 r 2. r k 1 S r 1 r 2. r k 1 (mod p) (2.5) S (k,n) (2.4) w 1 = S +r 1 x 1 +r 2 x r k 1x k 1 1 (mod p) w 2 = S +r 1 x 2 +r 2 x r k 1x k 1 2 (mod p). w k = S +r 1 x k +r 2 x 2 k + +r k 1x k 1 k (mod p) (2.6) (2.6) S w i k S w i k S (k,n) n n k k (k,n) 10
20 SS-MIX 2.4 (k,n) [11] (k,n) SS-MIX SS-MIX (k,n)
21 SS-MIX S d S i (i = 1,2,,d) (k,n) S i l i 0 12
22 (k,n) S S S i (i = 1,2,,d) S i S = S 1 d m=2 2 l m +S 2 d m=3 2 l m + +S d 1 2 d +S d (2.7) 13
23 2.4 S l i S i S all = {S 1,S 2,,S d } S all S all S c = {S c1,s c2,,s cj } (1 d) S S = S c1 j m=2 2 l m +S c2 j m=3 2 l m + +S c1 S c S ct (1 t j) W ct = {w ct1 w ct2,,w ctn } G c W ct u c = j m=2 2l m j m=3 2l m. 1 (2.8) 1. S (2.7) S i l i 2. p (S < p n < p) 3. Z/pZ {0} X = {x 1,x 2 x n } X = 1 x 1 x 2 2 x k x 2 x 2 2 x k x n x 2 n x k 1 n (mod p) (2.9) 14
24 2.4 n k vandermonde X S i Z/pZ R i = {r i,1,,r i,k 1 }( r i,k 1 {X/pZ} {0} ) a i a i = S i r i1 r i2. r ik 1 4. p X a i Xa i = w i1 w i2. w in (mod p) (2.10) w ij (j = 1,2,,n) w ij 5. G c w cj k k k k w c11 w c21 w cj1 w c12 w c22 w cj2 W c = W c (2.11) w c1k w c2k w cjk 6. W c (2.8) j w c11 m=2 2l m j +w c21 m=3 2l m + +w cj1 j w c12 m=2 W c u c = 2l m j +w c22 m=3 2l m + +w cj2. (2.12) w c1k j m=2 2l m +w c2k j m=3 2l m + +w cjk 15
25 2.5 (k,n) (2.12) j S c1 m=2 2l m j +S c2 m=3 2l m + +S cj j r 11 m=2 X 2l m j +r 21 m=3 2l m + +r j1. j r 1k 1 m=2 2l m j +r 2k 1 m=3 2l m + +r jk 1 7. (2.13) X X 1 (2.13) j 2 X 1 W c u c = S c1 2 l m +S c2 2 l m + +S cj (2.14) = S m=2 m=3 S S S (k,n) S (k,n) (k,n) S u c 2.5 (k,n) (k,n) (k,n) n n k k n k 16
26 2.6 (k,n) (k,n) (k,n) 2.6 (k,n) 17
27 2.6 (k,n) (k,n) 18
28 DMAT
29
30 3.3 [12] SS-MIX
31 ( ) PC DB DB 3.3 DB PC PC PC 22
32 ( ) PC
33 SS-MIX DB SS-MIX 3.5 SS-MIX DB 24
34 3.4 DB DB DB DB PC 25
35 3.4 ( ) ( ) DB DB SQL DB DB PC PC PC
36 PC PC PC PC PC PC ( ) PC ( ) 27
37 PC PC PC 28
38 3.5 ( ) PC
39 ( ) ( ) DB ( ) PC DB ( ) 30
40 PC 1 PC PC PC PC PC PC PC PC 3.8 PC PC PC
41 3.5 PC 2. PC PC PC PC 3. PC PC PC 1. PC 2. 32
42 3.5 PC PC 3. PC PC PC PC PC 4. PC PC PC PC PC PC PC PC PC PC
43 PC PC (1) ( ) ( ) ( ) (2) (3) (4) (1) 3.10 (1) PC PC PC PC 1 PC 3.10 PC
44 PC 3.11 PC PC 3.10 PC 3.12 (2) 3.13 (2) PC PC PC 35
45 PC 3.13 PC (1)
46 (5) (5) 3.15 (5) PC (1) (5) PC 37
47
48 (1) n (2) (3) (1) (2) (2) 39
49 (3)
50 PC PC PC PC 3.20 PC 3.21 PC 41
51 n (k 1) 2 P a P a = 2 n (3.1) (k 1) PC 42
52 PC 1. PC n k P P = k n (3.2) 2. PC 3. PC PC PC PC 43
53 3.5 PC PC PC PC (1) ( PC ) ( ) (2) ( ) (3) ( ) ( ) ( ) (4) ( ) ( ) ( ) (5) ( ) PC (1) PC PC (1) 3.23 PC 44
54 PC 3.24 PC PC ( ) PC PC (2) (2) 3.24 ( ) 45
55 ( ) 3.26 (3) (4) (3) 3.25 ( ) ( ) (4) 3.26 ( ) (5) 46
56 (5) 3.27 PC PC PC PC PC 3.28 PC 47
57 PC 3.29 PC PC PC PC PC 48
58 PC (1) (2) (1) PC (1) 3.30 PC PC (2) 3.31 PC PC 49
59 PC PC 50
60 3.6 51
61 4 4.1 d DB 1 52
62 PC PC ( ) PC 53
63 PC PC 4.1 PC PC PC PC PC 2 PC PC SQL 54
64 HTTPS PC PC PC PC 55
65 PC PC PC 4.3 PC PC PC 56
66 PC PC PC PC PC 4.4 PC PC DB Web 57
67 OS Ubuntu16.04LTS Web Apache2.4 DB Mysql5.6 PHP5.6 HTTPS PC
68 4.3 DB PC 4.3 PC PC 59
69 PC PC 4.6 DMAT PC 60
70
71
72 PC 63
73 4 TA TA 6 64
74 [1], (ICT),, Vol.33, No.4, pp , [2], Mercato,, Vol.89, pp.18 20, [3], ICT 2015 pp , Oct [4], [5] SS-MIX SS-MIX, Sep [6] SS-MIX, g01/6th r.pdf Sep [7] A. Shamir How to Share a Secret, Communication of the ACM, Vol.22, No.11, pp , Nov [8], Feb [9] M.Fujiwara, A.Waseda, R.Nojima, S.Moriai, W.Ogata, M.Sasaki. Unbreakable distributed storage with quantum key distribution network and passwordauthenticated secret sharing. Scientific Reports 6, Article number:
75 doi: [10] G. Blakley, Safeguarding Cryptographic Keys, Proc of AFIPS 1979 Nat. Computer Conf, Vol.48, pp , Sept [11], IA , pp.31 36, Dec [12] 4.3, Sanjikanshitsu Shakaihoshoutantou/ pdf,
Web Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More information, IT.,.,..,.. i
25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More informationIT,, i
22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki
More information(Visual Secret Sharing Scheme) VSSS VSSS 3 i
13 A Visual Secret Sharing Scheme for Continuous Color Images 10066 14 8 (Visual Secret Sharing Scheme) VSSS VSSS 3 i Abstract A Visual Secret Sharing Scheme for Continuous Color Images Tomoe Ogawa The
More informationWeb Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
More informationWebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution
More informationIT i
27 The automatic extract of know-how search tag using a thesaurus 1160374 2016 2 26 IT i Abstract The automatic extract of know-how search tag using a thesaurus In recent years, a number of organizational
More informationSOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i
20 SOM Development of Syllabus Vsualization System using Spherical Self-Organizing Maps 1090366 2009 3 5 SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i Abstract Development of Syllabus Vsualization
More informationVirtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking
23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More informationuntitled
i ii iii iv v 43 43 vi 43 vii T+1 T+2 1 viii 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 a) ( ) b) ( ) 51
More information2
1 2 3 4 5 6 7 8 9 10 I II III 11 IV 12 V 13 VI VII 14 VIII. 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 _ 33 _ 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 VII 51 52 53 54 55 56 57 58 59
More information25 Removal of the fricative sounds that occur in the electronic stethoscope
25 Removal of the fricative sounds that occur in the electronic stethoscope 1140311 2014 3 7 ,.,.,.,.,.,.,.,,.,.,.,.,,. i Abstract Removal of the fricative sounds that occur in the electronic stethoscope
More information,,.,.,,.,.,.,.,,.,..,,,, i
22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of
More informationP2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i
26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More information17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
More information<4D6963726F736F667420506F776572506F696E74202D208376838C835B83938365815B835683878393312E707074205B8CDD8AB78382815B83685D>
i i vi ii iii iv v vi vii viii ix 2 3 4 5 6 7 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
More informationSC-85X2取説
I II III IV V VI .................. VII VIII IX X 1-1 1-2 1-3 1-4 ( ) 1-5 1-6 2-1 2-2 3-1 3-2 3-3 8 3-4 3-5 3-6 3-7 ) ) - - 3-8 3-9 4-1 4-2 4-3 4-4 4-5 4-6 5-1 5-2 5-3 5-4 5-5 5-6 5-7 5-8 5-9 5-10 5-11
More information2 1 ( ) 2 ( ) i
21 Perceptual relation bettween shadow, reflectance and luminance under aambiguous illuminations. 1100302 2010 3 1 2 1 ( ) 2 ( ) i Abstract Perceptual relation bettween shadow, reflectance and luminance
More informationi ii iii iv v vi vii ( ー ー ) ( ) ( ) ( ) ( ) ー ( ) ( ) ー ー ( ) ( ) ( ) ( ) ( ) 13 202 24122783 3622316 (1) (2) (3) (4) 2483 (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) 11 11 2483 13
More informationJOURNAL OF THE JAPANESE ASSOCIATION FOR PETROLEUM TECHNOLOGY VOL. 66, NO. 6 (Nov., 2001) (Received August 10, 2001; accepted November 9, 2001) Alterna
JOURNAL OF THE JAPANESE ASSOCIATION FOR PETROLEUM TECHNOLOGY VOL. 66, NO. 6 (Nov., 2001) (Received August 10, 2001; accepted November 9, 2001) Alternative approach using the Monte Carlo simulation to evaluate
More informationDTN DTN DTN DTN i
28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee
More information三税協力の実質化 : 住民税の所得税閲覧に関する国税連携の効果
Kwansei Gakuin University Rep Title 三 税 協 力 の 実 質 化 : 住 民 税 の 所 得 税 閲 覧 に 関 する 国 税 連 携 の 効 果 Author(s) Suzuki, Ushio, 鈴 木, 潮 Citation 経 済 学 論 究, 65(4): 175-197 Issue Date 2012-03-20 URL http://hdl.handle.net/10236/9133
More information21 A contents organization method for information sharing systems
21 A contents organization method for information sharing systems 1125140 2010 3 4 IT i Abstract A contents organization method for information sharing systems Aoki, Wataru Organizations to share information,
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More informationP2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i
27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification
More information20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow
20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationWeb Web ID Web 16 Web Web i
24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro
More informationPC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i
21 The private mailers synchronization operation for plural terminals 1125083 2010 3 1 PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i Abstract The private mailers synchronization operation for plural terminals
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More information2007-Kanai-paper.dvi
19 Estimation of Sound Source Zone using The Arrival Time Interval 1080351 2008 3 7 S/N 2 2 2 i Abstract Estimation of Sound Source Zone using The Arrival Time Interval Koichiro Kanai The microphone array
More informationこれわかWord2010_第1部_100710.indd
i 1 1 2 3 6 6 7 8 10 10 11 12 12 12 13 2 15 15 16 17 17 18 19 20 20 21 ii CONTENTS 25 26 26 28 28 29 30 30 31 32 35 35 35 36 37 40 42 44 44 45 46 49 50 50 51 iii 52 52 52 53 55 56 56 57 58 58 60 60 iv
More informationパワポカバー入稿用.indd
i 1 1 2 2 3 3 4 4 4 5 7 8 8 9 9 10 11 13 14 15 16 17 19 ii CONTENTS 2 21 21 22 25 26 32 37 38 39 39 41 41 43 43 43 44 45 46 47 47 49 52 54 56 56 iii 57 59 62 64 64 66 67 68 71 72 72 73 74 74 77 79 81 84
More informationこれでわかるAccess2010
i 1 1 1 2 2 2 3 4 4 5 6 7 7 9 10 11 12 13 14 15 17 ii CONTENTS 2 19 19 20 23 24 25 25 26 29 29 31 31 33 35 36 36 39 39 41 44 45 46 48 iii 50 50 52 54 55 57 57 59 61 63 64 66 66 67 70 70 73 74 74 77 77
More informationWMN Wi-Fi MBCR i
27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI
More informationSURF,,., 55%,.,., SURF(Speeded Up Robust Features), 4 (,,, ), SURF.,, 84%, 96%, 28%, 32%.,,,. SURF, i
24 SURF Recognition of Facial Expression Based on SURF 1130402 2013 3 1 SURF,,., 55%,.,., SURF(Speeded Up Robust Features), 4 (,,, ), SURF.,, 84%, 96%, 28%, 32%.,,,. SURF, i Abstract Recognition of Facial
More information先端社会研究 ★5★号/4.山崎
71 72 5 1 2005 7 8 47 14 2,379 2,440 1 2 3 2 73 4 3 1 4 1 5 1 5 8 3 2002 79 232 2 1999 249 265 74 5 3 5. 1 1 3. 1 1 2004 4. 1 23 2 75 52 5,000 2 500 250 250 125 3 1995 1998 76 5 1 2 1 100 2004 4 100 200
More informationkut-paper-template.dvi
26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information平成18年版 男女共同参画白書
i ii iii iv v vi vii viii ix 3 4 5 6 7 8 9 Column 10 11 12 13 14 15 Column 16 17 18 19 20 21 22 23 24 25 26 Column 27 28 29 30 Column 31 32 33 34 35 36 Column 37 Column 38 39 40 Column 41 42 43 44 45
More information2017 (413812)
2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has
More informationIII
III 1 1 2 1 2 3 1 3 4 1 3 1 4 1 3 2 4 1 3 3 6 1 4 6 1 4 1 6 1 4 2 8 1 4 3 9 1 5 10 1 5 1 10 1 5 2 12 1 5 3 12 1 5 4 13 1 6 15 2 1 18 2 1 1 18 2 1 2 19 2 2 20 2 3 22 2 3 1 22 2 3 2 24 2 4 25 2 4 1 25 2
More informationiii iv v vi vii viii ix 1 1-1 1-2 1-3 2 2-1 3 3-1 3-2 3-3 3-4 4 4-1 4-2 5 5-1 5-2 5-3 5-4 5-5 5-6 5-7 6 6-1 6-2 6-3 6-4 6-5 6 6-1 6-2 6-3 6-4 6-5 7 7-1 7-2 7-3 7-4 7-5 7-6 7-7 7-8 7-9 7-10 7-11 8 8-1
More information07_太田美帆.indd
54 2013 pp. 167 190 2011 3 11 1 2 8 2014 1 6 167 54 133 2 2011 3 11 3 4 5 3 / 168 3 2013 11 133 NPO 6 PBV PBV 0 3 2012 3157 1 501076 99 11,427 PBV 67,991 7 254 1 PBV PBV PBV PBV 2011 2011 2012 5 5 6,695
More informationCore Ethics Vol.
Core Ethics Vol. Core Ethics Vol. . % % % Core Ethics Vol. %, Core Ethics Vol. % % % -. %. Core Ethics Vol. a b : Core Ethics Vol. pp... pp.. pp... pp. pp.. pp...pp.... pp. pp. pp.. pp.. Vol.. pp... pp..
More information2 10 The Bulletin of Meiji University of Integrative Medicine 1,2 II 1 Web PubMed elbow pain baseball elbow little leaguer s elbow acupun
10 1-14 2014 1 2 3 4 2 1 2 3 4 Web PubMed elbow pain baseball elbow little leaguer s elbow acupuncture electric acupuncture 2003 2012 10 39 32 Web PubMed Key words growth stage elbow pain baseball elbow
More information3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp
More information58 10
57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have
More informationWebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i
28 WebRTC Design of multi-platform file sharing system using WebRTC 1170336 2017 2 28 WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i Abstract Design of multi-platform file sharing system using WebRTC Harumi
More informationn 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i
15 Comparison and Evaluation of Dynamic Programming and Genetic Algorithm for a Knapsack Problem 1040277 2004 2 25 n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i Abstract Comparison and
More informationWi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i
26 A Study on Secure Remote Control Methods 1175078 2015 2 27 Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i Abstract A Study on Secure Remote Control Methods SHINGAI, Tatsuro In recent years, communication
More informationIPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came
3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More information23 The Study of support narrowing down goods on electronic commerce sites
23 The Study of support narrowing down goods on electronic commerce sites 1120256 2012 3 15 i Abstract The Study of support narrowing down goods on electronic commerce sites Masaki HASHIMURA Recently,
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More information840 Geographical Review of Japan 73A-12 835-854 2000 The Mechanism of Household Reproduction in the Fishing Community on Oro Island Masakazu YAMAUCHI (Graduate Student, Tokyo University) This
More information, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i
25 Estimation scheme of indoor positioning using difference of times which chirp signals arrive 114348 214 3 6 , (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,,
More information28 TCG SURF Card recognition using SURF in TCG play video
28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka
More informationkiyo5_1-masuzawa.indd
.pp. A Study on Wind Forecast using Self-Organizing Map FUJIMATSU Seiichiro, SUMI Yasuaki, UETA Takuya, KOBAYASHI Asuka, TSUKUTANI Takao, FUKUI Yutaka SOM SOM Elman SOM SOM Elman SOM Abstract : Now a small
More informationエクセルカバー入稿用.indd
i 1 1 2 3 5 5 6 7 7 8 9 9 10 11 11 11 12 2 13 13 14 15 15 16 17 17 ii CONTENTS 18 18 21 22 22 24 25 26 27 27 28 29 30 31 32 36 37 40 40 42 43 44 44 46 47 48 iii 48 50 51 52 54 55 59 61 62 64 65 66 67 68
More informationSobel Canny i
21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been
More informationi
14 i ii iii iv v vi 14 13 86 13 12 28 14 16 14 15 31 (1) 13 12 28 20 (2) (3) 2 (4) (5) 14 14 50 48 3 11 11 22 14 15 10 14 20 21 20 (1) 14 (2) 14 4 (3) (4) (5) 12 12 (6) 14 15 5 6 7 8 9 10 7
More informationTable 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig
Mover Design and Performance Analysis of Linear Synchronous Reluctance Motor with Multi-flux Barrier Masayuki Sanada, Member, Mitsutoshi Asano, Student Member, Shigeo Morimoto, Member, Yoji Takeda, Member
More information01_.g.r..
I II III IV V VI VII VIII IX X XI I II III IV V I I I II II II I I YS-1 I YS-2 I YS-3 I YS-4 I YS-5 I YS-6 I YS-7 II II YS-1 II YS-2 II YS-3 II YS-4 II YS-5 II YS-6 II YS-7 III III YS-1 III YS-2
More informationi
i KEY WORDS CASE CHECK POINT EXERCISE Column ii 4 6 9 11 1 5 7 8 2 3 10 12 MESSAGE iii 1 1 23 4 2 56 3 2 5 8 11 CASE 12 1 2 3 181920 20 4 2223 232425 5 6 14 16 18 22 25 27 29 CASE 30 1 31 3233 2 31 34
More informationuntitled
I...1 II...2...2 III...3...3...7 IV...15...15...20 V...23...23...24...25 VI...31...31...32...33...40...47 VII...62...62...67 VIII...70 1 2 3 4 m 3 m 3 m 3 m 3 m 3 m 3 5 6 () 17 18 7 () 17 () 17 8 9 ()
More information..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i
25 Feature Selection for Prediction of Stock Price Time Series 1140357 2014 2 28 ..,,,,. 2013 1 1 12 31, ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i Abstract Feature Selection for Prediction of Stock Price Time
More information21 e-learning Development of Real-time Learner Detection System for e-learning
21 e-learning Development of Real-time Learner Detection System for e-learning 1100349 2010 3 1 e-learning WBT (Web Based training) e-learning LMS (Learning Management System) LMS WBT e-learning e-learning
More information四校_目次~巻頭言.indd
107 25 1 2016 3 Key Words : A 114 67 58.84 Mann-Whitney 6 1. 2. 3. 4. 5. 6. I. 21 4 B 23 11 1 9 8 7 23456 108 25 1 2016 3 78 9 II. III. IV. 1. 24 4 A 114 2. 24 5 6 3. 4. 5. 3 42 5 16 6 22 5 4 4 4 3 6.
More informationVol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe
Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2
More information24 Region-Based Image Retrieval using Fuzzy Clustering
24 Region-Based Image Retrieval using Fuzzy Clustering 1130323 2013 3 9 Visual-key Image Retrieval(VKIR) k-means Fuzzy C-means 2 200 2 2 20 VKIR 5 18% 54% 7 30 Fuzzy C-means i Abstract Region-Based Image
More information卒業論文はMS-Word により作成して下さい
() 2007 2006 KO-MA KO-MA 2006 6 2007 6 KO-MA KO-MA 256 :117:139 8 40 i 23 50 2008 3 8 NPO 7 KO-MA( KO-MA ) 1) (1945-) KO-MA KO-MA AD 2007 1 29 2007 6 13 20 KO-MA 2006 6 KO-MA KO-MA ii KJ 11 KO-MA iii KO-MA
More informationii iii iv CON T E N T S iii iv v Chapter1 Chapter2 Chapter 1 002 1.1 004 1.2 004 1.2.1 007 1.2.2 009 1.3 009 1.3.1 010 1.3.2 012 1.4 012 1.4.1 014 1.4.2 015 1.5 Chapter3 Chapter4 Chapter5 Chapter6 Chapter7
More informationuntitled
SUMMARY Although the situation where sufficient food was not supplied for the victims occurred in the Great East Japan Earthquake, this is a serious problem at the time of catastrophic disasters like the
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More information1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 () - 1 - - 2 - - 3 - - 4 - - 5 - 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
More information12) NP 2 MCI MCI 1 START Simple Triage And Rapid Treatment 3) START MCI c 2010 Information Processing Society of Japan
1 1, 2 1, 2 1 A Proposal of Ambulance Scheduling System Based on Electronic Triage Tag Teruhiro Mizumoto, 1 Weihua Sun, 1, 2 Keiichi Yasumoto 1, 2 and Minoru Ito 1 For effective life-saving in MCI (Mass
More information1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,
More information21 Effects of background stimuli by changing speed color matching color stimulus
21 Effects of background stimuli by changing speed color matching color stimulus 1100274 2010 3 1 ,.,,.,.,.,,,,.,, ( FL10N-EDL). ( 10cm, 2cm),,, 3.,,,, 4., ( MSS206-402W2J), ( SDM496)., 1200r/min,1200r/min
More informationSNS ( ) SNS(Social Networking Service) SNS SNS i
22 SNS Job-Hunting Activities situation Understanding Support System Using SNS 1110252 2011 03 01 SNS ( ) SNS(Social Networking Service) SNS SNS i Abstract Job-Hunting Activities situation Understanding
More informationThe Tohoku Medical Megabank project is a part of the national project to reconstruct Tohoku area.. It aims to become a centripetal force for the reconstruction of Tohoku University Tohoku Medical Megabank
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More information3 5 18 3 5000 1 2 7 8 120 1 9 1954 29 18 12 30 700 4km 1.5 100 50 6 13 5 99 93 34 17 2 2002 04 14 16 6000 12 57 60 1986 55 3 3 3 500 350 4 5 250 18 19 1590 1591 250 100 500 20 800 20 55 3 3 3 18 19 1590
More information