Akito Niwa Kouya Tochikubo ( ) SI Systems Integration Technology Center, Toshiba Solutions Corporation 1 [1-10] IPA FIPS $[2,
|
|
- たしろう こいたばし
- 5 years ago
- Views:
Transcription
1 Akito Niwa Kouya Tochikubo ( ) SI Systems Integration Technology Center, Toshiba Solutions Corporation 1 [110] IPA FIPS 1402 $[2, 3]$ FIPS 1402 NIST Special Publication 80022(SP80022) $[5,6]$ NIST SP T 5 21 The Art of Computer programming, / Knuth The Art of Computer programming, / [1] 12 Kl (frequency test) K2 (2 )(seri test) K3 (gap test) K4 (poker test)
2 81 K5 \ddagger L (coupon collector s test) K6 (permutation test) K7 (run test) K8 $t$ $t$ (maximumof test) K9 (collosion test) K1O (serial correlation test) Kll K12 [1] $[0, 1)$ $<u_{n}>=0,$ $u_{1},$ $u_{2},$ $\cdots$ 0 $d1$ $<u_{n}>$ $U_{\dot{*}}>=\lfloor du_{i}\rfloor$ $<U_{n}>=U_{0},$ $U_{1},$ $U_{2\prime}\cdots$ $[0, 1)$ $u_{n}>$ 0 $d1$ $<U_{n}>$ 2 $<U_{n}>$ ( ) 0 1 $(d=2)$ 22 FIPS PUS 1402 FIPS PUS 1402 [2] $\text{ }$ 4 Fl 1 (monobit test) F2 (poker test) F3 (runs test) F4 (longest runs test) [2] FIPS PUS 1402 Change Notice 2[3] 23 [4] 7 Rl 1 R2 2 R3 R4 OPSO R6
3 $\sigma^{2}$ 82 R7 [4] [1] $[0, 1)$ $<u_{\iota},>$ 0 $d1$ $<U_{n}>$ 2 24 NIST Special Publication NIST Special Publication 80022[5] 16 Nl 1 (frequency test) N2 (frequency test within ablock) N3 (runs test) N4 (test for longest run of ones in ablock) N5 2 (binary matrix rank test) N6 (discrete fourier transform (spectral)test) N7 (nonoverlapping template matching test) N8 (overlappiug template match $\mathrm{g}$ test) N9 Maurer (Maurer s universal statistical test) N1O LempelZiv (LempelZiv compression test) Nll (linear complexity test) N12 (serial test) N13 (approximate entrow test) N14 (cumulative sums (cusums) test) N15 (random excursions test) N16 (random excursions variant test) NIST 0 1 NIST $p$value $0$ $p$value pvalue $X_{1},$ $X_{2_{\mathit{1}}}\cdots,$ $X_{n}$ 1 $1,$ 1 $n$ $S_{1},=X_{1}+X_{2}+=\cdot\cdot+Xn$ 2 $\mu$ $=$ 0 $=$ $n$ $n arrow!\mathrm{f}\mathrm{f}\mathrm{i}p(\frac{s_{n}}{\sqrt{n}}\leq z)=\phi$ (z) $\Phi(z)=\int_{\infty}^{z}\frac{1}{\sqrt{2\pi}}e^{x^{2}/2}dx$
4 Using 83 3 $s= S_{n} /\sqrt{n}$ $P(s\leq z)=2\phi(z)1$ $\Psi \mathrm{v}\mathrm{a}\mathrm{l}\mathrm{u}\mathrm{e}=2[1\phi(s)]$ NIST $\Phi(z)$ $erfc(z)= \int_{\sim^{\nu}}$ $\frac{2}{\sqrt{\pi}}e^{x^{2}}d\prime x$ $I^{\succ \mathrm{v}\mathrm{a}1\mathrm{u}\mathrm{e}=erfc(s}/\sqrt{9})$ $;t$ $r\mathrm{v}\mathrm{a}\mathrm{l}\mathrm{u}\mathrm{e}<001$ NIST 2 pvalue $\int_{\mathrm{z}}^{\infty}\frac{1}{2\gamma(\frac{n}{2})}(\frac{t}{2})^{\kappa}\tau^{1}e^{\#}dt$ $N$ $\chi^{2}$ $\Gamma(\alpha)=\int_{0}^{\infty}x^{\alpha1}e^{x}dx$ NIST 1 $\mathrm{a}^{\mathrm{a}_{\text{ }}}$ (NIST 10 ) 1 $p$value $A?\cdot p$value $p$value $[0, 1)$ $[0, 1)$ $p$value $m$ 001 $p$value $099\pm\sqrt{\frac{099\mathrm{x}001}{m}}$ $\iota NIST 0$ 1 ASCII NIST NIST 1 $\mathrm{g}$ SHAI(FIPS 186 SHAI ) 2 Linear Congruential 3 BlumBlumShub 4 MicaliSchnorr 5 Modular Exponentiation 6 Quadratic Congruential I 7 Quadratic Congruential II 8 Cubic Congruential 9 XOR
5 Using ANSI X917 (3DES) DES(FIPS 186 DES ) 11 $\mathrm{g}$ 1 (1 ) , 6 ( ) finalanalysisreport 25 DIEHARD DIEHARD [7] T 18 Dl (b hday spacings test) D2 OPERM5 (overlapping 5 permutation test) D3(3lx31) 2 (binary rank test for matrices) $31\mathrm{x}31$ D4 $(32\mathrm{x}32)$ D5 $(6\mathrm{x}8)$ D6 2 (binary rank test for matrices) $32\mathrm{x}32$ $6\mathrm{x}8$ 2 (binary rank test for (bitstream Test) matrices) D7 OPSO (OPSO(OverlappingPairsSparseOccupancy) test) D8 OQSO (OQSO( test) D9 DNA (DNA test) D1O 8 (countthel s test on astream of bytes) Dll 8 (countthel s test for specific bytes) D12 (parking lot test) D13 (minimum distance test) D14 $3\mathrm{D}\mathrm{S}\mathrm{P}\mathrm{H}\mathrm{E}\mathrm{R}\mathrm{E}\mathrm{S}$ ( $3\mathrm{d}$spheres test) D15 (squeeze test) D16 (overlapping sums test) D17 (runs test) D18 (cra test) DIEHARD 0 1 lombyte llmbyte DIEHARD $\mu$value r ue $[0, 1)$ $\}^{}$ pvalue DIEHARD rvalue DIEHARD 1 2 3, DIEHARD 0 1 ASCII
6 generator \mathrm{w}\mathrm{i}\mathrm{t}\mathrm{h}rightarrow \mathrm{b}\mathrm{o}\mathrm{r}\mathrm{r}\mathrm{o}\mathrm{w}$ (SWB) 85 1 Mulfiplywithcarry (MWC) generator (MWC generator) $1\mathrm{C}$ 2 4 on pairs of 16 bits(mwc1616 generator) 3 :Mother of all random number generators (MOTHER generator) 4 KISS generator 5 Simple but very good generator COMBO (COMBO generator) 6 Lagged FibonacciMWC combination ULTRA (ULTLA generator) $\mathrm{m}\mathrm{w}\mathrm{c}/\mathrm{s}\mathrm{w}\mathrm{b}$ $\mathrm{m}\mathrm{w}\mathrm{c}/\mathrm{s}\mathrm{u}\mathrm{b}\mathrm{t}\mathrm{r}\mathrm{a}\mathrm{c}\mathrm{t} 7 Combination generator ( generator) 8 Extended congruential generator (EXCONG generator) 9 SuperDuper generator (SUPERDUPER generator) 10 Subtractwithborrow generator (SWB generator) 11 Specified congruential generator 12 31bit generator ran2 from Numerical Recipes (RAN2 generator) 13 Specified shiftregister generator 14 System generator in Microsofi Fortran ( MSRAN generator) 15 LaggedFibonacci generator 16 Inverse congruential generator (INVCONG generator) 3 2 $ $ ( (SP80022) 0 1 $\{X_{i}\}$ $X_{:}\neq X_{:+1}$ $d1$ 5 $(1)5$ $(2)3$ 4 (3) 2 3 (4) 1 (5) 5 2 FIPS 14&2 4
7 $m$ $m$ $m$ 6 2 $\mathrm{y}$ $u=\mathrm{y}/2^{32}$ $[0, 1)$ $k$ $k=2^{31}$ $karrow\lfloor k\mathrm{x}u\rfloor$ $k=1$ 43 2 $\mathrm{y}$ $u=\lfloor \mathrm{y}/2^{32}\mathrm{x}6\rfloor+1$ $u$ Craps Craps , OPERM $(6\mathrm{x}8)$ $(31 $(32\mathrm{x}32)$ 2 $(6\mathrm{x}8)$ \mathrm{x}31)$ $(31\mathrm{x}31)$ $(32\mathrm{x}32)$ $M$ 7 2 $M$ FIPS $m$ 1
8 $\mathrm{y}_{1}$,, Y4 ), $[0, 1)$ $[0, 1)$ $k$ $k$ 2 $\mathrm{y}$ u=l Y/ $\mathrm{y}$ $u=10000\mathrm{y}/2^{32}$ $3\mathrm{D}\mathrm{S}\mathrm{P}\mathrm{H}\mathrm{E}^{1}$RES $\mathrm{y}$ $u=1000\mathrm{y}/2^{32}$ $2^{21}$ $(X_{1}, X_{2}, \cdots, X_{20})_{\text{ }}2$ $(X_{2}, X_{3}, \cdots, X_{21})$ 1 OPSO $\mathrm{y}$ $2^{21}1\mathrm{H}$ $(\mathrm{y}_{1}, \mathrm{y}_{2})$ $\mathrm{y}_{2},$ $\cdots$ $(\mathrm{y}_{2}, \mathrm{y}_{3}),$ $\cdots$, OQSO $Y$ $\mathrm{y}_{1},$ $\rangle$ $\mathrm{y}$2 $(\mathrm{y}_{1}, \mathrm{y}_{2}, \mathrm{y}_{3}, Y_{4}),$ $\mathrm{y}_{2}$ $\mathrm{y}_{3\mathrm{t}}$ $\mathrm{y}_{5}$ $\cdots$ (, 4 5, 4 $^{21}$ 5 DNA $\mathrm{y}$ $\mathrm{y}_{2},$ $\cdots$ $(\mathrm{y}_{1}, \mathrm{y}_{2}, \cdot\cdot\sim, \mathrm{y}_{10}),$ $(\mathrm{y}_{2}, \mathrm{y}_{3}, \cdots, \mathrm{y}_{11}),$ $\cdots$ }1, 10 2 $2^{21}$ $d1$ $n$ 0 $d1$
9 $\cdot$ 88 0 $d1$ 0 $d1$ $Z$ $Z_{\dot{\iota}}$ $\{\mathrm{y}_{1}\}$ $Z_{1},$ $Z_{2},$ $\cdots,$ $Z_{1024}$ 1,023 $Y_{i}$ $s$ $t$ $[0, 1)$ $l$ $Y_{1},$ $\mathrm{y}$2, $(\mathrm{y}_{1},$, $\mathrm{y}_{100})$ $\rangle$ $\mathrm{y}$2, (Y2, $\mathrm{y}$3i, ), $\mathrm{y}_{101}$ $\cdots$ $X_{1},$ $X_{2},$ $\cdots X_{r\iota}$ $S_{\dot{l}}= \sum_{j=1}^{\dot{\iota}}(2x_{j}1)$ 1) $(1 \leq i\leq n)$ $S_{\dot{l}} = \sum_{j= \iota:+1}^{n}$(2x 0 1 $X_{1},$ $X_{2},$ $\cdots X_{n}$ $ 4\sim 1_{\text{ }}$ $S_{1}$ $=0$ 0 1 $1\sim 4$ 8 $S_{\dot{*}}= \sum \mathrm{j}_{=\iota}(2x_{j}1)(1\leq i\leq n)$ 0 1 $X_{1},$ $X_{2,}\ldots \mathrm{y}_{n}$ $S_{i}= \sum_{j=1}^{\dot{ }}(2X_{j}1)(1\leq i\leq \mathrm{z})$ 9 $\sim$ 1 1\sim E Maurer $L$ 0 1 kmpelziv 0 1 mpleziv 0 1 $m$ $m1$ $m2$ 0 1 $m$ $m+1$
10 $\text{ }$ $\text{ }$ $\text{ }$ $\mathrm{d}\backslash$ 0 1 $M$ \iota $\mathrm{a}_{\text{ }}$ 36 $U_{j+1}$ $U_{j}$ $c= \frac{n(u_{0}u_{1}+u_{1}u_{2}+\cdots+u_{n2}u_{n1}+u_{n1}u_{n})(u_{0}+u_{1}+\cdots+u_{n1})^{2}}{n(u_{0}^{2}+u_{1}^{2}+\cdots+u_{n1}^{2})(u_{0}+u_{1}+\cdots+u_{n1})^{2}}$ (1) $1\leq C\leq 1$ $C=0$ $<U_{n}>$ $\mathrm{c}$ NIST DIEHARD NIST DIEHARD $\mathrm{s}\mathrm{p}8w2$ 2 DIEHARD 8 8 $\mathrm{o}\mathrm{p}\mathrm{e}\mathrm{r}\mathrm{m}5$ OPSO OQSO
11 $\lceil \mathrm{i}\mathrm{p}\mathrm{a}$ 80 2 $X_{:}=aX_{\dot{\mathrm{s}}1}+c\mathrm{m}$od $M$ (Linear Congruential) [1117] FIPS1402 FIPS SP80022 SP IPA $\mathrm{t}1$ 0 ASCII 2 52 GUI <GUI ( 3) (GUD ( )
12 $\mathrm{s}$ ) $\mathrm{t}$ $\dagger$ 81 $\cdot$ $\wedge^{\ulcorner}=,_{} $ $\mathrm{t}$ bf $\mathrm{t}$ $\mathrm{t}$ $\mathrm{t}$ JAPA \dagger 1: 2: (PDS) 6 NIST [5] DIEHARD [7]
13 \mathrm{o}\mathrm{u}\mathrm{r}\mathrm{c}\mathrm{e}/\mathrm{c}\mathrm{r}y\mathrm{p}\mathrm{t}\mathrm{x}/$ \mathrm{i}\mathrm{c}\mathrm{a}\mathrm{l}$ Jgorithms, mat 92 3: (IPA) 13 $\mathrm{s}\mathrm{e}\mathrm{m}\mathrm{i}\mathrm{n}\mathrm{u}\mathrm{m}\alpha [1] D Knuth, The art of computer programming, [2] NIST, FIPS PUB 1402, Security requirements for cryptographic modulae, [3] NIST, FIPS PUB 1402, Change Notice 2, 2002 [4],, [5] NIST, Special Publication 80022, A Statistical Test Suite For Random and Pseudorandom Number Generators for Cryptographic Applications, 2001 [6] NIST, Special Publication $ $ NIST Statistical Suite, $800\cdot 22,$ $//\mathrm{s}\mathrm{t}\mathrm{a}\mathrm{t}\mathrm{f}\mathrm{s}\mathrm{u}\mathrm{e}\mathrm{d}\mathrm{u}/\mathrm{g}\mathrm{e}\mathrm{o}/\mathrm{d}\mathrm{l}\mathrm{e}\mathrm{h}\mathrm{a}\mathrm{r}\mathrm{d}$ [7] G Marsaglia, $ $(DIEHARD, (http: html, $\mathrm{f}\mathrm{s}\mathrm{u}\mathrm{e}\mathrm{d}\mathrm{u}/\mathrm{p}\mathrm{u}\mathrm{b}/\mathrm{d}\mathrm{l}\mathrm{e}\mathrm{h}\mathrm{a}\mathrm{r}\mathrm{d}/$ ) $//\mathrm{r}\mathrm{a}\mathrm{n}\mathrm{d}\mathrm{o}\mathrm{m}$ $\mathrm{a}\mathrm{t}/\mathrm{t}\mathrm{e}\mathrm{s}\mathrm{t}\mathrm{s}/$ [8] P Hellekalek, Tests for random numbers, (http: sbg ac ) [9] J Walker, A Pseudorandom Number Sequence Test Program, (http: $//\mathrm{w}\mathrm{w}\mathrm{w}$ fouznilab $\mathrm{c}\mathrm{h}/\mathrm{r}\mathrm{a}\mathrm{n}\mathrm{d}\mathrm{o}\mathrm{n}/$) [10] The Information Security Research Centre at Queensland University of Technoloy, CryptX, $//\mathrm{w}\mathrm{w}\mathrm{w}$ $\mathrm{a}\mathrm{u}/\mathrm{r}\mathrm{e}\epsilon (http: isrc qut edu ) [11] J A Reeds, Cradcing multiplocative congruential encryption algorithm, in Information Linkage Between Applied Mathematics and Industry, PCC Wang, ed, Academic Press, pp467472, 1979
14 $\iota\lceil 15]$ H 93 [12] J A Reeds, Solution of challenge cipher, Cryptologia, $\mathrm{v}\mathrm{o}\mathrm{l}$ $3,$ No 2, pp8395, 1979 $23\mathrm{r}\mathrm{d}$ [13] J B Plumstread, Inferring a sequence generated by a linear congruence, Proceedings of the IEEE Symposium on the Foundatiorls of Computer Science, pp153159, 1982 $\mathrm{j}\mathrm{c}$ [14] Lagarias and J Reeds, Unique extrapolation of polynomial recurrences, SIAM Joumal on Computing, Vol 17 No 2, pp342362, 1988 Krawczyk, How to predict congruential generators,, Advances in CryptologyCRYPTO 89, pp138153, 1990 $\mathrm{a}\mathrm{m}$ [16] Frieze, J Hastad, R Kannan, J C Lagarias and A Shamir, Reconstracting truncated integer variables satisfying linear congruences, SIAM Journal on Computing, Vol 17, No 2, pp262280, 1988 [17] J Stern, Secret linear congruential generators are not cryptographically Secure, Proceedings of the 28th Symposium on the Foundations of Computer Science, pp421426, 1987
Microsoft Word - HM-RAJ doc
NIST 及び DIEHARD テストによる RPG100 乱数評価 FDK( 株 )RPG 推進室 2003/12/16 導入 RPG100 から生成される乱数を 2 つの有名なテストを用いて評価します 一方は米国機関 NIST により公開されている資料に基づくテストで 他方は Marsaglia 博士により提供されているテストです 乱数を一度テストしただけでは それが常にテストを満足する乱数性を持っていることを確認できないことから
More information2004 1
2004 1 1 3 2 4 2.1......................................... 4 2.2........................................ 7 3 NIST Special Publicatio 800-22 9 3.1................................... 9 3.1.1 1...............................
More informationCryptrecReport.dvi
16 12 1 NIST NIST Special Publication 800-22[1, 2] SP 800-22 2 DIEHARD [27] SP 800-22Ver.1.516 189 DFT Lempel-Ziv [3, 4, 5] SP 800-22 16 DFT Lempel-Ziv 1 2 SP 800-22 NIST SP800-22[1, 2] NISTNational Institute
More informationTitle 疑似乱数生成器の安全性とモンテカルロ法 ( 確率数値解析に於ける諸問題,VI) Author(s) 杉田, 洋 Citation 数理解析研究所講究録 (2004), 1351: Issue Date URL
Title 疑似乱数生成器の安全性とモンテカルロ法 ( 確率数値解析に於ける諸問題,VI) Author(s) 杉田, 洋 Citation 数理解析研究所講究録 (2004), 1351: 33-40 Issue Date 2004-01 URL http://hdlhandlenet/2433/64973 Right Type Departmental Bulletin Paper Textversion
More information3. ( 1 ) Linear Congruential Generator:LCG 6) (Mersenne Twister:MT ), L 1 ( 2 ) 4 4 G (i,j) < G > < G 2 > < G > 2 g (ij) i= L j= N
RMT 1 1 1 N L Q=L/N (RMT), RMT,,,., Box-Muller, 3.,. Testing Randomness by Means of RMT Formula Xin Yang, 1 Ryota Itoi 1 and Mieko Tanaka-Yamawaki 1 Random matrix theory derives, at the limit of both dimension
More information自動残差修正機能付き GBiCGSTAB$(s,L)$法 (科学技術計算アルゴリズムの数理的基盤と展開)
1733 2011 149-159 149 GBiCGSTAB $(s,l)$ GBiCGSTAB(s,L) with Auto-Correction of Residuals (Takeshi TSUKADA) NS Solutions Corporation (Kouki FUKAHORI) Graduate School of Information Science and Technology
More information5 / / $\mathrm{p}$ $\mathrm{r}$ 8 7 double 4 22 / [10][14][15] 23 P double 1 $\mathrm{m}\mathrm{p}\mathrm{f}\mathrm{u}\mathrm{n}/\mathrm{a
double $\mathrm{j}\mathrm{s}\mathrm{t}$ $\mathrm{q}$ 1505 2006 1-13 1 / (Kinji Kimura) Japan Science and Technology Agency Faculty of Science Rikkyo University 1 / / 6 1 2 3 4 5 Kronecker 6 2 21 $\mathrm{p}$
More informationスライド 1
IPA 2010 3 25 1 1 / / 2 (DRBG) DRBG NIST SP800-90 2 1 3 JCMVP 2009 1 JCATT AES 15 4 5 OK/NG OK ( ) ( ) 6 JCMVP JCATT JCATT http://www.ipa.go.jp/security/jcmvp/open_documents.html 7 332 (DES, Triple-DES,
More information特集_03-07.Q3C
3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution
More information<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>
2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................
More information2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )
1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information42 1 ( ) 7 ( ) $\mathrm{s}17$ $-\supset$ 2 $(1610?\sim 1624)$ 8 (1622) (3 ), 4 (1627?) 5 (1628) ( ) 6 (1629) ( ) 8 (1631) (2 ) $\text{ }$ ( ) $\text{
26 [\copyright 0 $\perp$ $\perp$ 1064 1998 41-62 41 REJECT}$ $=\underline{\not\equiv!}\xi*$ $\iota_{arrow}^{-}\approx 1,$ $\ovalbox{\tt\small ffl $\mathrm{y}
More information2 (S, C, R, p, q, S, C, ML ) S = {s 1, s 2,..., s n } C = {c 1, c 2,..., c m } n = S m = C R = {r 1, r 2,...} r r 2 C \ p = (p r ) r R q = (q r ) r R
RF-004 Hashimoto Naoyuki Suguru Ueda Atsushi Iwasaki Yosuke Yasuda Makoto Yokoo 1 [10] ( ). ( ) 1 ( ) 3 4 3 4 = 12 deferred acceptance (DA) [3, 7] [5] ( ) NP serial dictatorship with regional quotas (SDRQ)
More information$\hat{\grave{\grave{\lambda}}}$ $\grave{\neg}\backslash \backslash ^{}4$ $\approx \mathrm{t}\triangleleft\wedge$ $10^{4}$ $10^{\backslash }$ $4^{\math
$\mathrm{r}\mathrm{m}\mathrm{s}$ 1226 2001 76-85 76 1 (Mamoru Tanahashi) (Shiki Iwase) (Toru Ymagawa) (Toshio Miyauchi) Department of Mechanical and Aerospaoe Engineering Tokyo Institute of Technology
More information128 Howarth (3) (4) 2 ( ) 3 Goldstein (5) 2 $(\theta=79\infty^{\mathrm{o}})$ : $cp_{n}=0$ : $\Omega_{m}^{2}=1$ $(_{\theta=80}62^{\mathrm{o}})$
1075 1999 127-142 127 (Shintaro Yamashita) 7 (Takashi Watanabe) $\mathrm{n}\mathrm{a}\mathrm{k}\mathrm{a}\mathrm{m}\mathrm{u}\mathrm{f}\mathrm{a}\rangle$ (Ikuo 1 1 $90^{\mathrm{o}}$ ( 1 ) ( / \rangle (
More informationTA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1
Interactive Recommendation System 1 1 1 1 LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Shun ichi Tano 1 1 Graduate School of Information Systems, The University of Electro-Communications Abstract: The
More informationASF-01
暗号モジュール試験及び認証制度 (JCMVP) 承認されたセキュリティ機能に関する仕様 平成 26 年 4 月 1 日独立行政法人情報処理推進機構 ASF-01 A p p r o v e d S e c u r i t y F u n c t i o n s 目次 1. 目的... 1 2. 承認されたセキュリティ機能... 1 公開鍵... 1 共通鍵... 3 ハッシュ... 4 メッセージ認証...
More information1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c
CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification
More information$\text{ ^{ } }\dot{\text{ }}$ KATSUNORI ANO, NANZAN UNIVERSITY, DERA MDERA, MDERA 1, (, ERA(Earned Run Average) ),, ERA 1,,
併殺を考慮したマルコフ連鎖に基づく投手評価指標とそ Titleの 1997 年度日本プロ野球シーズンでの考察 ( 最適化のための連続と離散数理 ) Author(s) 穴太, 克則 Citation 数理解析研究所講究録 (1999), 1114: 114-125 Issue Date 1999-11 URL http://hdlhandlenet/2433/63391 Right Type Departmental
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationVol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3
36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there
More information浜松医科大学紀要
On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse
More information将来の暗号技術に関する安全性要件調査報告書
i ... 1... 3... 4 DES... 4 DES Cracker (1998 )... 4... 6 3.3.1 Lenstra & Verheul1999... 6 3.3.2 2000... 10 3.3.3 Silverman2000... 12... 12... 13... 13... 14... 17... 18... 18 5.1.1... 18 5.1.2... 18 5.1.3...
More informationヘンリー・ブリッグスの『対数算術』と『数理精蘊』の対数部分について : 会田安明『対数表起源』との関連を含めて (数学史の研究)
1739 2011 214-225 214 : 1 RJMS 2010 8 26 (Henry Briggs, 1561-16301) $Ar ithmetica$ logarithmica ( 1624) (Adriaan Vlacq, 1600-1667 ) 1628 [ 2. (1628) Tables des Sinus, Tangentes et Secantes; et des Logarithmes
More informationFA $*1$ $*$ 1, $*$2 : $*2$ : Takehiro Takano $*$ 1, Katsunori Ano*2 $*1$ : Graduate School of Engineering and Science, Shibaura Ins
Title マルコフ連鎖に基づく最適打順モデルによる FA 打者獲得戦略 ( 不確実 不確定性の下での数理意思決定モデルとその周辺 ) Author(s) 高野, 健大 ; 穴太, 克則 Citation 数理解析研究所講究録 (2016), 1990: 89-96 Issue Date 2016-04 URL http://hdl.handle.net/2433/224603 Right Type
More informationEQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju
EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo
More information$\mathrm{s}$ DE ( Kenta Kobayashi ), (Hisashi Okamoto) (Research Institute for Mathematical Sciences, Kyoto Univ.) (Jinghui Zhu)
$\mathrm{s}$ 1265 2002 209-219 209 DE ( Kenta Kobayashi ), (Hisashi Okamoto) (Research Institute for Mathematical Sciences, Kyoto Univ) (Jinghui Zhu) 1 Iiitroductioii (Xiamen Univ) $c$ (Fig 1) Levi-Civita
More information40 $\mathrm{e}\mathrm{p}\mathrm{r}$ 45
ro 980 1997 44-55 44 $\mathrm{i}\mathrm{c}\mathrm{h}\mathrm{i}$ $-$ (Ko Ma $\iota_{\mathrm{s}\mathrm{u}\mathrm{n}}0$ ) $-$. $-$ $-$ $-$ $-$ $-$ $-$ 40 $\mathrm{e}\mathrm{p}\mathrm{r}$ 45 46 $-$. $\backslash
More information(check matrices and minimum distances) H : a check matrix of C the minimum distance d = (the minimum # of column vectors of H which are linearly depen
Hamming (Hamming codes) c 1 # of the lines in F q c through the origin n = qc 1 q 1 Choose a direction vector h i for each line. No two vectors are colinear. A linearly dependent system of h i s consists
More informationa m 1 mod p a km 1 mod p k<s 1.6. n > 1 n 1= s m, (m, = 1 a n n a m 1 mod n a km 1 mod n k<sn a 1.7. n > 1 n 1= s m, (m, = 1 r n ν = min ord (p 1 (1 B
10 004 Journal of the Institute of Science and Engineering. Chuo University Euler n > 1 p n p ord p n n n 1= s m (m B psp = {a (Z/nZ ; a n 1 =1}, B epsp = { ( a (Z/nZ ; a n 1 a }, = n B spsp = { a (Z/nZ
More information[I486S] 暗号プロトコル理論
[I486S] 2018 5 1 (JAIST) 2018 5 1 1 / 22 : I486S I URL:https://wwwjaistacjp/~fujisaki/i486S (Tuesdays) 5 17:10 18:50 4/17, 4/24, 5/1, 5/15, 5/22, 5/29, 6/5, 6/19, 6/26, 7/3, 7/10, 7/17, 7/24, 7/31 (JAIST)
More information1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More informationA MATLAB Toolbox for Parametric Rob TitleDesign based on symbolic computatio Design of Algorithms, Implementatio Author(s) 坂部, 啓 ; 屋並, 仁史 ; 穴井, 宏和 ; 原
A MATLAB Toolbox for Parametric Rob TitleDesign based on symbolic computatio Design of Algorithms, Implementatio Author(s) 坂部, 啓 ; 屋並, 仁史 ; 穴井, 宏和 ; 原, 辰次 Citation 数理解析研究所講究録 (2004), 1395: 231-237 Issue
More information,,, 2 ( ), $[2, 4]$, $[21, 25]$, $V$,, 31, 2, $V$, $V$ $V$, 2, (b) $-$,,, (1) : (2) : (3) : $r$ $R$ $r/r$, (4) : 3
1084 1999 124-134 124 3 1 (SUGIHARA Kokichi),,,,, 1, [5, 11, 12, 13], (2, 3 ), -,,,, 2 [5], 3,, 3, 2 2, -, 3,, 1,, 3 2,,, 3 $R$ ( ), $R$ $R$ $V$, $V$ $R$,,,, 3 2 125 1 3,,, 2 ( ), $[2, 4]$, $[21, 25]$,
More informationBulletin of JSSAC(2014) Vol. 20, No. 2, pp (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles ca
Bulletin of JSSAC(2014) Vol. 20, No. 2, pp. 3-22 (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles can be solved by using Gröbner bases. In this paper,
More information189 2 $\mathrm{p}\mathrm{a}$ (perturbation analysis ) PA (Ho&Cao [5] ) 1 FD 1 ( ) / PA $\mathrm{p}\mathrm{a}$ $\mathrm{p}\mathrm{a}$ (infinite
947 1996 188-199 188 (Hideaki Takada) (Naoto Miyoshi) (Toshiharu Hasegawa) Abstract (perturbation analysis) 1 1 1 ( ) $R$ (stochastic discrete event system) (finite difference $\mathrm{f}\mathrm{d}$ estimate
More informationMicrosoft Excelを用いた分子軌道の描画の実習
J. Comput. Chem. Jpn.,Vol.9, No.4, pp.177 182 (2010) 2010 Society of Computer Chemistry, Japan Microsoft Excel a*, b, c a, 790-8577 2-5 b, 350-0295 1-1 c, 305-8568 1-1-1 *e-mail: nagaoka@ehimegw.dpc.ehime-u.ac.jp
More informationComputer Security Symposium October 2013 Android OS kub
Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android
More information(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1
(Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding
More informationVol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe
Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2
More information258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System
Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.
More informationICカード利用システムにおいて新たに顕現化したPre-play attackとその対策
IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... E-mail: hidemitsu.izawa@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp / /2015.10
More information$\mathrm{d}\mathrm{p}$ (Katsuhisa $\mathrm{o}\mathrm{m}\mathrm{o}$) Aichi Institute of Technology (Takahiro Ito) Nagoya Institute of Te
Title ニューロ DP による多品目在庫管理の最適化 ( 不確実で動的なシステムへの最適化理論とその展開 ) Author(s) 大野 勝久 ; 伊藤 崇博 ; 石垣 智徳 ; 渡辺 誠 Citation 数理解析研究所講究録 (24) 383: 64-7 Issue Date 24-7 URL http://hdlhandlenet/2433/2575 Right Type Departmental
More informationuntitled
On a Correlation-based Scheme of Digital Watermarking for Images Exploiting 2-D LOT Hiromu KODA and Kyousuke KAMINUSI Abstract In this paper, we propose a correlation based scheme of digital watermarking
More informationIPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU
1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale
More informationCore1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0
AMBA 1 1 1 1 FabScalar FabScalar AMBA AMBA FutureBus Improvement of AMBA Bus Frame-work for Heterogeneos Multi-processor Seto Yusuke 1 Takahiro Sasaki 1 Kazuhiko Ohno 1 Toshio Kondo 1 Abstract: The demand
More information01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六
*1 2 PR ( ) 1. 1 1.1. 2 1 2.2 3. 4. 5. 6. *1 Graduate School for Creative Cities, Osaka City University 1.2. Vol.6 (March, 2006) 3. 01) 02) ( ) 03) 04) 05) 06) 07) 08) 5.2.1. 09) 10),11) 2. 2.1. 2 1 2
More informationå‰Łçı—訋çfl»æ³Łã†¨ã…Łã‡£ã…œã…−ã……ã…†æŁ°, ㆚ㆮ2æ¬¡è©Łä¾¡å‹ƒå›²ã•† ㅋㅪㅜã…−ã……ã…†æŁ°å‹Šã†«ã‡‹ã‡‰é•£ã†®ç¢ºç”⁄訋箊
, 2 August 28 (Fri), 2016 August 28 (Fri), 2016 1 / 64 Outline 1 2 3 2 4 2 5 6 August 28 (Fri), 2016 2 / 64 fibonacci Lucas 2 August 28 (Fri), 2016 3 / 64 Dynamic Programming R.Bellman Bellman Continuum
More information2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055
1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free
More information(1970) 17) V. Kucera: A Contribution to Matrix Ouadratic Equations, IEEE Trans. on Automatic Control, AC- 17-3, 344/347 (1972) 18) V. Kucera: On Nonnegative Definite Solutions to Matrix Ouadratic Equations,
More information(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji
Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name RSA Group Name RSA Code Elliptic Curve Cryptograrhy Group /Project No. 13-B /Project Leader 1009087 Takahiro
More informationRTM RTM Risk terrain terrain RTM RTM 48
Risk Terrain Model I Risk Terrain Model RTM,,, 47 RTM RTM Risk terrain terrain RTM RTM 48 II, RTM CSV,,, RTM Caplan and Kennedy RTM Risk Terrain Modeling Diagnostics RTMDx RTMDx RTMDx III 49 - SNS 50 0
More informationRIMS98R2.dvi
RIMS Kokyuroku, vol.084, (999), 45 59. Euler Fourier Euler Fourier S = ( ) n f(n) = e in f(n) (.) I = 0 e ix f(x) dx (.2) Euler Fourier Fourier Euler Euler Fourier Euler Euler Fourier Fourier [5], [6]
More informationわが国企業による資金調達方法の選択問題
* takeshi.shimatani@boj.or.jp ** kawai@ml.me.titech.ac.jp *** naohiko.baba@boj.or.jp No.05-J-3 2005 3 103-8660 30 No.05-J-3 2005 3 1990 * E-mailtakeshi.shimatani@boj.or.jp ** E-mailkawai@ml.me.titech.ac.jp
More information1 OpenCL OpenCL 1 OpenCL GPU ( ) 1 OpenCL Compute Units Elements OpenCL OpenCL SPMD (Single-Program, Multiple-Data) SPMD OpenCL work-item work-group N
GPU 1 1 2 1, 3 2, 3 (Graphics Unit: GPU) GPU GPU GPU Evaluation of GPU Computing Based on An Automatic Program Generation Technology Makoto Sugawara, 1 Katsuto Sato, 1 Kazuhiko Komatsu, 2 Hiroyuki Takizawa
More informationset element a A A a A a A 1 extensional definition, { } A = {1, 2, 3, 4, 5, 6, 7, 8, 9} 9 1, 2, 3, 4, 5, 6, 7, 8, 9..
12 -- 2 1 2009 5,,.,.,.. 1, 2, 3,., 4),, 4, 5),. 4, 6, 7).,, R A B, 8, (a) A, B 9), (b) {a (a, b) R b B }, {b (a, b) R a A } 10, 11, 12) 2. (a). 11, 13, R S {(a, c) (a, b) R, (b, c) S } (c) R S 14), 1,
More informationIPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect
1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect Using a Human-Shaped Input Device for Remote Pose Instruction Yuki Tayama 1,a) Yoshiaki Ando 2,b) Misaki Hagino 2,c) Ken-ichi Okada 1,d) Abstract: There
More information2 ( ) i
25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA
More informationuntitled
Copyright 2008 IPAAll Rights Reserved 1 1. 2. 3. Copyright 2008 IPAAll Rights Reserved 2 IT IT IT Copyright 2008 IPAAll Rights Reserved http://www.jitec.jp/1_00topic/topic_20071225_shinseido.html 3 URL
More information量子情報科学−情報科学の物理限界への挑戦- 2018
1 http://qi.mp.es.osaka-u.ac.jp/main 2 0 5000 10000 15000 20000 25000 30000 35000 40000 1945 1947 1949 1951 1953 1955 1957 1959 1961 1963 1965 1967 1969 1971 1973 1975 1977 1979 1981 1983 1985 1987 1989
More informationOptimal Torque Distribution Algorithm for Redundant Reaction Wheels Takehiro NISHIYAMA and Katsuhiko YAMADA*3 Advanced Technology R & D Center, Mitsub
Optimal Torque Distribution Algorithm for Redundant Reaction Wheels Takehiro NISHIYAMA and Katsuhiko YAMADA*3 Advanced Technology R & D Center, Mitsubishi Electric Corporation, 8-1-1 Tsukaguchi-Honmachi,
More information,,.,.,,.,.,.,.,,.,..,,,, i
22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of
More informationFA - : (FA) FA [3] [4] [5] 1.1 () 25 1:
得点圏打率 盗塁 併殺を考慮した最適打順決定モデル Titleについて : FA 打者トレード戦略の検討 ( 不確実性の下での数理モデルとその周辺 ) Author(s) 穴太, 克則 ; 高野, 健大 Citation 数理解析研究所講究録 (2015), 1939: 133-142 Issue Date 2015-04 URL http://hdl.handle.net/2433/223766
More informationThe 18th Game Programming Workshop ,a) 1,b) 1,c) 2,d) 1,e) 1,f) Adapting One-Player Mahjong Players to Four-Player Mahjong
1 4 1,a) 1,b) 1,c) 2,d) 1,e) 1,f) 4 1 1 4 1 4 4 1 4 Adapting One-Player Mahjong Players to Four-Player Mahjong by Recognizing Folding Situations Naoki Mizukami 1,a) Ryotaro Nakahari 1,b) Akira Ura 1,c)
More information$\ovalbox{\tt\small REJECT}$ SDE 1 1 SDE ;1) SDE 2) Burgers Model SDE $([4],[5],[7], [8])$ 1.1 SDE SDE (cf.[4],[5]) SDE $\{$ : $dx_
$\ovalbox{\tt\small REJECT}$ 1032 1998 46-61 46 SDE 1 1 SDE ;1) SDE 2) Burgers Model SDE $([4],[5],[7], [8])$ 1.1 SDE SDE (cf.[4],[5]) SDE $dx_{t}=a(t, X_{t}, u)dt+b(t, x_{t}, u)dwt$, $X_{0}=\xi(\omega)$
More information\mathrm{n}\circ$) (Tohru $\mathrm{o}\mathrm{k}\mathrm{u}\mathrm{z}\circ 1 $(\mathrm{f}_{\circ \mathrm{a}}\mathrm{m})$ ( ) ( ). - $\
1081 1999 84-99 84 \mathrm{n}\circ$) (Tohru $\mathrm{o}\mathrm{k}\mathrm{u}\mathrm{z}\circ 1 $(\mathrm{f}_{\circ \mathrm{a}}\mathrm{m})$ ( ) ( ) - $\text{ }$ 2 2 ( ) $\mathrm{c}$ 85 $\text{ }$ 3 ( 4 )
More informationuntitled
IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)
More informationISO/IEC 9798プロトコルの安全性評価
ISO/IEC 9798 2011 2 4 ISO/IEC 9798-2 (Mechanisms using symmetric encipherment algorithms), ISO/IEC 9798-3 (Mechanisms using digital signature techniques), ISO/IEC 9798-4 (Mechanisms using a cryptographic
More information橡最新卒論
Research of improving of recognition ability in Face recognition system Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint,
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More information105 $\cdot$, $c_{0},$ $c_{1},$ $c_{2}$, $a_{0},$ $a_{1}$, $\cdot$ $a_{2}$,,,,,, $f(z)=a_{0}+a_{1}z+a_{2}z^{2}+\cdots$ (16) $z=\emptyset(w)=b_{1}w+b_{2
1155 2000 104-119 104 (Masatake Mori) 1 $=\mathrm{l}$ 1970 [2, 4, 7], $=-$, $=-$,,,, $\mathrm{a}^{\mathrm{a}}$,,, $a_{0}+a_{1}z+a_{2}z^{2}+\cdots$ (11), $z=\alpha$ $c_{0}+c_{1}(z-\alpha)+c2(z-\alpha)^{2}+\cdots$
More information表紙4_1/山道 小川内 小川内 芦塚
1 2008.1Vol.23 2008.1Vol.23 2 2008.1Vol.23 3 2008.1Vol.23 4 5 2008.1Vol.23 2008.1Vol.23 6 7 2008.1Vol.23 2008.1Vol.23 8 9 2008.1Vol.23 10 2008.1Vol.23 11 2008.1Vol.23 12 2008.1Vol.23 Center 13 2008.1Vol.23
More informationExplicit form of the evolution oper TitleCummings model and quantum diagonal (Dynamical Systems and Differential Author(s) 鈴木, 達夫 Citation 数理解析研究所講究録
Explicit form of the evolution oper TitleCummings model and quantum diagonal (Dynamical Systems and Differential Author(s) 鈴木 達夫 Citation 数理解析研究所講究録 (2004) 1408: 97-109 Issue Date 2004-12 URL http://hdlhandlenet/2433/26142
More information86 Development of a Course Classification Support System for the Awarding of Degrees using Syllabus Data MIYAZAKI Kazuteru, IDA Masaaki, YOSHIKANE Fuyuki, NOZAWA Takayuki and KITA Hajime Research in Academic
More informationSDPA( Programming Algorithm) $\mathrm{s}\mathrm{e}\mathrm{m}\mathrm{i}\mathrm{d}\mathrm{e}\mathrm{f}\mathrm{i}\mathrm{n}\mathrm{
1114 1999 149-159 149 SDPA( Programming Algorithm) $\mathrm{s}\mathrm{e}\mathrm{m}\mathrm{i}\mathrm{d}\mathrm{e}\mathrm{f}\mathrm{i}\mathrm{n}\mathrm{i}\mathrm{t}\mathrm{e}$ $\mathrm{m}\mathrm{a}\mathrm{s}^{\urcorner}\mathrm{a}\mathrm{k}\mathrm{a}\mathrm{z}\mathrm{l}\mathrm{l}$
More informationguideline_1_0.dvi
Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10
More informationIPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-
1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,
More informationPage 1 of 6 B (The World of Mathematics) November 20, 2006 Final Exam 2006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (10pts) (a
Page 1 of 6 B (The World of Mathematics) November 0, 006 Final Exam 006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (a) (Decide whether the following holds by completing the truth
More informationBOK body of knowledge, BOK BOK BOK 1 CC2001 computing curricula 2001 [1] BOK IT BOK 2008 ITBOK [2] social infomatics SI BOK BOK BOK WikiBOK BO
DEIM Forum 2012 C8-5 WikiBOK 252 5258 5 10 1 E-mail: shunsuke.shibuya@gmail.com, {kaz,masunaga}@si.aoyama.ac.jp, {yabuki,sakuta}@it.aoyama.ac.jp Body Of Knowledge, BOK BOK BOK BOK BOK, BOK Abstract Extention
More information$\mathrm{n}$ Interpolation solves open questions in discrete integrable system (Kinji Kimura) Graduate School of Science and Tec
$\mathrm{n}$ 1381 2004 168-181 190 Interpolation solves open questions in discrete integrable system (Kinji Kimura) Graduate School of Science and Technology Kobe University 1 Introduction 2 (i) (ii) (i)
More information日立評論2007年3月号 : ソフトウェア開発への
Vol.89 No.3 298-299 Application of Statistical Process Control to Software Development Mutsumi Komuro 1 23 1985 ACM IEEE 1 195QC Quality Control 1 2 CMM Capability Maturity Model CMMI Capability Maturity
More informationCAPELLI (T\^o $\mathrm{r}\mathrm{u}$ UMEDA) MATHEMATICS, KYOTO UNIVERSITY DEPARTMENT $\mathrm{o}\mathrm{p}$ $0$:, Cape i,.,.,,,,.,,,.
1508 2006 1-11 1 CAPELLI (T\^o $\mathrm{r}\mathrm{u}$ UMEDA) MATHEMATICS KYOTO UNIVERSITY DEPARTMENT $\mathrm{o}\mathrm{p}$ $0$: Cape i Capelli 1991 ( ) (1994 ; 1998 ) 100 Capelli Capelli Capelli ( ) (
More informationIPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info
1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3
More informationMathematica を活用する数学教材とその検証 (数式処理と教育)
$\bullet$ $\bullet$ 1735 2011 115-126 115 Mathematica (Shuichi Yamamoto) College of Science and Technology, Nihon University 1 21 ( ) 1 3 (1) ( ) (2 ) ( ) 10 Mathematica ( ) 21 22 2 Mathematica $?$ 10
More information$/\mathrm{t}\mathrm{a}\mathrm{k}\mathrm{a}\mathrm{y}\mathrm{a}$ MIYANO E mail: hirosaki-u.ac.jp 1 ( ) ( ) 1980
Title 非線形時系列解析によるカオス性検定 ( 非線形解析学と凸解析学の研究 ) Author(s) 宮野, 尚哉 Citation 数理解析研究所講究録 (2000), 1136: 28-36 Issue Date 2000-04 URL http://hdl.handle.net/2433/63786 Right Type Departmental Bulletin Paper Textversion
More informationFig. 1 Relative delay coding.
An Architecture of Small-scaled Neuro-hardware Using Probabilistically-coded Pulse Neurons Takeshi Kawashima, Non-member (DENSO CORPORATION), Akio Ishiguro, Member (Nagoya University), Shigeru Okuma, Member
More informationStudies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth
Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth and Foot Breadth Akiko Yamamoto Fukuoka Women's University,
More informationIPSJ SIG Technical Report Vol.2018-SE-200 No /12/ Proposal of test description support environment for request acquisition in web appli
1 1 1 2 Proposal of test description support environment for request acquisition in web application development Nakaji Yoshitake 1 Choi Eunjong 1 Iida Hajimu 1 Yoshida Norihiro 2 1. 1 ( ) 1 Nara Institute
More informatione-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto
e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learninglms CMS A Trial and Prospect of Kumamoto University e-learning Station Hiroshi Nakano 1) Kazuhisa
More information2 HI LO ZDD 2 ZDD 2 HI LO 2 ( ) HI (Zero-suppress ) Zero-suppress ZDD ZDD Zero-suppress 1 ZDD abc a HI b c b Zero-suppress b ZDD ZDD 5) ZDD F 1 F = a
ZDD 1, 2 1, 2 1, 2 2 2, 1 #P- Knuth ZDD (Zero-suppressed Binary Decision Diagram) 2 ZDD ZDD ZDD Knuth Knuth ZDD ZDD Path Enumeration Algorithms Using ZDD and Their Performance Evaluations Toshiki Saitoh,
More informationオーストラリア研究紀要 36号(P)☆/3.橋本
36 p.9 202010 Tourism Demand and the per capita GDP : Evidence from Australia Keiji Hashimoto Otemon Gakuin University Abstract Using Australian quarterly data1981: 2 2009: 4some time-series econometrics
More informationpaper
WISS2013 EpisoPass:. / EpisoPass EpisoPass / 1 [21] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [23] [1][3][12] [18] Copyright is held by the author(s). Toshiyuki Masui, [25] [2][19] EpisoPass
More information