genus 2 Jacobi Pila Schoof 42 Adleman Huang Gaudry Harley l genus 2 Jacobi 17 Jacobi Spallek 52 theta CM Jacobi genus2 Wang 61 Weber 60 Wamelen
|
|
- しのぶ すすむ
- 7 years ago
- Views:
Transcription
1 Journal of the Institute of Science and Engineering5 Chuo University Jacobi CM Type Computation of CM Type of Jacobian Varieties Jacobi CM CM Jacobi CM type reflex CM type Frobenius endomorphism Jacobi CM Jacobi CM type reflex CM type Jacobi CM CM Type Reflex CM Type 1 Jacobi Jacobi Jacobi baby-step-giant-step N O N Pohlig-Hellman baby-step-giant-step MOV 32 Frey Rück Jacobi Gaudry genus 4 O N baby-step-giant-step genus Jacobi Schoof SEA reduction CM Toyo Communication Equipment Co.,Ltd.,2-1-1 Koyato, Samukawa-machi Koza-gun, Kanagawa, Japan Department of Electrical and Electronic Engineering, Chuo University. The Institute of Science and Engineering, Chuo University Kasuga, Bunkyo-ku, Tokyo, Japan Department of Information and System Engineering, Chuo University. The Institute of Science and Engineering, Chuo University Kasuga, Bunkyo-ku, Tokyo, Japan Department of Mathematics,Chuo Uni-versity.The Institute of Science and Engineering, Chuo Uni-versity Kasuga, Bunkyoku, Tokyo, Japan. 29
2 genus 2 Jacobi Pila Schoof 42 Adleman Huang Gaudry Harley l genus 2 Jacobi 17 Jacobi Spallek 52 theta CM Jacobi genus2 Wang 61 Weber 60 Wamelen lifting Jacobi CM CM base 8 56 genus 2 Jacobi CM CM CM type reflex CM type CM CM Jacobi CM type reflex CM type Jacobi CM CM type reflex CM type CM CM type reflex CM type 2 Jacobi k F X Y k X Y C F X Y 0 C C P i D S i m i P i m i C C Abel 0 0 h k C D degd S i m i h S i P i Q i P i Q i h l 0 C Jacobi k k 0 / l Jacobi Abel Jacobi Volcheck 55 30
3 Jacobi CM Type C ab Arita 6 superelliptic curve Galbrath 13 Cantor 7 Jacobi D 1 D 2 q D 1 md 2 m 3 Ordinary Jacobi CM C Jacobi CM K K A k g Abel K EndA 2 K A CM A CM i K EndA a K i a EndA EndA k k K 2g A ordinary CM A/ q ordinary Z X 53 p ordinary Abel A/ q q-frobenius endomorphism A CM K p C q i - i 1...g A q-frobenius endomorphism Z X X Z X K Jacobi ordinary CM Algorithm1 Algorithm 1 CM Input C/ q Output C Jacobi CM K Z X ordinary false 1 i 1...g C q i - N i 2 N i M i N i q i 1 3 S a n j M i Newton a j s i SP i a j 4 Z X X 2g s1 X 2g 1 s2 X 2g 2 q g 1 X q g X 5 Z X false 6 Z X Algorithm1 O q g q g 1 O 8g/5 Og q4 1 Elkies 14 Jacobi genus 4 Ordinary Jacobi CM Type Jacobi CM type reflex CM type CM type reflex CM type Jacobi CM type reflex CM type 31
4 Jacobi CM type reflex CM type 51 r K 2g CM K * 1,...,* g r* 1,...,r* g K CM type F * 1,...,* g K F CM type x K type normn F N F x P i x * i L K G Gal L/ * i * i L F G H G K S HF S s 1 s S H g g G gs S H g G Sg S K L H Y S K K K Y CM type K Y K F reflex Algorithm 2 CM type K F reflex CM type K Y Algorithm 2 Reflex CM Type Input CM type K F Output reflex CM type K Y 1 K L 2 G Gal L/ 3 K H G 4 S HF 5 H g G Sg S 6 H K L g K /2 7 S g G g 1 S 8 K g S Y S 9 K Y Y Y K Jacobi CM type A 0 k CM K g Abel A torus g EndA M * 1,...,* 2g K M g * 1,...,* g F * 1,...,* g K F CM type A type K F A k reflex CM K A CM type K F H S H g g G gs S A simple A simple K 0 reflex type y 1,...,y g K 0 K p K 0 32
5 Jacobi CM Type p K k p K A Amod N -Frobenius endomorphism Frobenius endomorphism p N Y f f / / k A q N q f / p q p n n f / f / p f / K 0 ordinary f / 1 f / n/f / p f / Algorithm 3 Jacobi CM type K F Algorithm 3 CM Type Input C/ q Output C Jacobi CM type K F reflexcm type K Y ordinary false 1 q p n p n 2 Algorithm 1 CM K Z X Algorithm 1 false false 3 K L 4 G Gal L/ 5 K H G 6 G g T F i 7 F i 7.1 F F i 7.2 K F CM type Algorithm 2 reflexcm type K Y 7.3 K g K 0 Y K 0 K 7.4 K 0 p p P e i i 7.5 i i / p f f n K P
6 7.5.5 N Y n f Z X K p p p K F K Y CM type reflex CM type i F i F 7.1. CM Jacobi CM type reflex CM type A k k A Amod K 0 K A ordinary k reduction Algorithm 3 CM type CM Jacobi CM type reflex CM type Algorithm 4 CM Type Input Jacobi CM C/k Output CM type K F reflex CM type K Y 1 q 2 C q reduction C Algorithm 3 CM type K F reflex CM type K Y Algorithm 3 false 1. 3 K F K Y CM type reflex CM type Algorithm 4 CM 56 Frobenius endomorphism K Algorithm 4 Algorithm 5 CM Type Input Jacobi CM C/k Output CM type K F reflex CM type K Y 1 q 2 Algorithm 1 C q reduction C CM K Algorithm 1 false 1. 3 Algorithm 3 L G H T 4 F i T 4.1 F F i 4.2 K F CM type Algorithm 2 reflex CM type K Y 4.3 K g K 0 Y K 0 K 4.4 Nw p w K 4.5 p k f / p 4.6 p f -Frobenius endomorphism Z X Algorithm p N Y w f 4.8 p Z X 4.9 Z X Z X K F K Y CM type reflex CM type 34
7 Jacobi CM Type 4.10 F i F CM Algorithm 1 Algorithm 1 C/ 5 Y 2 X 7 4X 6 3X 5 3X 4 X 3 X 4 Jacobi Frobenius endomorphism p Z X Z X X 6 8X 4 4X 3 40X CM Type Reflex CM Type Algorithm2 3 CM K p L L a a 12 40a 10 70a 9 473a 8 130a a a a 4 320a a a s i G Gal L/ s i a b i b i L 1 a a 2 a 3 a 4 a 5 a 6 a 7 a 8 a 9 a 10 a 11 b b / b / b / b / b / b / , b / b / b / b / b /
8 r s 4 CM type K F reflex CM type K Y K p p 6 8p 4 4p 3 40p F s 1 s 2 s 3 K x x 6 26x 5 223x 4 654x 3 54x x Y s 1 s 5 s CM Type Reflex CM Type p genus 2 Jacobi CM type reflex CM type Algorithm p p CM type reflex CM type A, L 4 B L 8 1 CM Type, Reflex CM Type KASH/KANT 9 UltraSPARC-IIi301MHz L. M. Adleman, A subexponential algorithm for the discrete logarithm problem with applications, Proc. 20th Ann. IEEE Symp. on Foundations of Computer Science,pp ,1979. L. M. Adleman,M. D. A. Huang Primality Testing and Abelian Varieties Over Finite Fields, Springer-Verlag,1992. L. M. Adleman,M. D. A. Huang Counting rational points on curves and abelian varieties over finite fields, Proc. of ANTS-2,Springer-Verlag,1996. L. M. Adleman,J. D. Marrais,M. D. Huang: A Subexponential Algorithms for Discrete Logarithms over the Rational Subgroup of the Jacobians of Large Genus Hyperelliptic Curves over Finite Fields, Proc. of ANTS95,Springer,1995. S. Arita, Public key cryptosystems with C ab curve 2, IEICE,Proc. of SCIS 98,7. 1-B,
9 Jacobi CM Type 6 S. Arita, A. Yoshikawa, H. Miyauch, A software implementation of discrete-log-based cryptosystems with C ab curve, IEEE Japan Proc. of SCIS 99, T3-1. 3, D. Cantor Computing in the jacobian of hyperelliptic curve, Math. Comp., vol. 48, p , J. Chao, N. Matsuda, S, Tsujii Efficient construction of secure hyperelliptic discrete logarithm problems Springer-Verlag Lecture Notes on Computer Science, Vol. 1334, pp , M. Daberkow, C. Fieker, J. Klners, M. Pohst, K. Roegner, M. Schrnig, K. Wildanger KANT V4, J. Symb. Comp., Vol. 24, No3, pp , H. Cohen A course in computational algebraic number theory Springer, GTM-138, J. DeJong, R. Noot, Jacobians with complex multiplication, Arithmetic Algebraic Geometry, Birkhäuser PM89, pp , I. Duursma, P. Gaudry, F. Morain, Speeding up the discrete log computation on curves with automorphisms, LIX/RR/99/03, Ecole Polytech., S. D. Galbrath, S. Paulus, N. P. Smart Arithmetic on superelliptic curves, preprint. 14 N. D. Elkies, Elliptic and modular curves over finite fields and related computational issues, Computational Perspective on Number Theory in honor of A. O. L. Atkin, G. Frey, H. G. Rück A remark concerning m-divisibility and the discrete logarihm in the divisor class group of curves, Mathematics of Computation, 62, , P. Gaudry A variant of the Adelman-DeMarrais-Huang algorithm and its application to small genera Preliminary version, June P. Gaudry, R. Harley, Counting Points on Hyperelliptic Curves over Finite Fields, ANTS-IV, Springer, LNCS1838, pp , T. Haga, K. Matsuo, J. Chao, S. Tsujii Construction of CM Hyperelliptic Curve using Ordinary Liftings, IEICE, Japan, Proc. of SCIS2000, C51, M. D. Huang, D. Ierardi Counting Rational Point on Curves over Finite Fields, Proc. 32nd IEEE Symp. on the Foundations of Computers Science, T. Honda Isogeny classes of abelian varieties over finite fields, J. Math. Soc. Japan, vol. 20, No. 1-2, p , J. Igusa Arithmetic variety of moduli for genus two, Ann. of Math., vol. 72, No. 3, p , H. Kawashiro, O. Nakamura, J. Chao, S. Tsujii Construction of CM hyperelliptic curves using RM family, IEICE ISEC97-72, pp , J. Klüners, M. Pohst On Computing Subfields, J. Symbolic Computation, 11, H. Kuboyama, K. Kamio, K. Matsuo, J. Chao, S. Tsujii Construction of Superelliptic Curve Cryptosystem, IEICE, Japan, Proc. of SCIS2000, C52, N. Koblitz Elliptic Curve Cryptosystems, Math. Comp., vol. 48, p , N. Koblitz Hyperelliptic cryptosystems, J. of Cryptology, vol. 1, p, , N. Koblitz, A very easy way to generate curves over prime field for hyperelliptic cryptosystem, CRYPTO 97, Ramp session, S. Lang Abelian Varieties, Interscience, New York S. Lang Complex multiplication Springer-Verlag, H. W. Lenstra Algorithms in Algebraic Number Theory, Bulletin of The Amer. Math. Soc., 2, vol. 26, pp , K. Matsuo, J. Chao, S. Tsujii On lifting of CM hyperelliptic curves, IEICE Proc. SCIS 99, A. Menezes, S. Vanstone, T. Okamoto Reducing Elliptic Curve Logarithms to Logarithms in a Finite Fields, Proc. of STOC, p ,
10 33 A. Menezes Elliptic Curve Public Key Cryptosystems, Kluwer Academic, V. S. Miller Use of Elliptic Curves in Cryptography, Advances in Cryptology Proceedings of Crypto 85, Lecture Notes in. Computer Science, 218, Springer-Verlag, p , D. Mumford Abelian varieties, Tata Studies in Mathematics, Oxford, Bobay, D. Mumford Tata Lectures on Theta, Birkhäuser, Boston, D. Mumford Tata Lectures on Theta, Birkhäuser, Boston, V. Müller, A. Stein, C. Thiel Computing discrete logarithms in real quadratic congruence function fields of large genus Preprint, Nov. 13, K. Nagao, Construction of the Jacobians of Curves Y 2 X 5 k/ p with Prime Order, Manuscript, F. Oort, T, Sekiguchi The canonical lifting of an ordinary jacobian variety need not be a jacobian variety, J. Math. Soc. Japan, Vol. 38, no. 3, S. Paulus Ein Algorithmus zur Berechunung der Klassengruppe quadratischer Ordnungen, über Hauptidealringen, GH Essen, Dr. Thesis, J. Pila Frobenius maps of abelian varieties and finding roots of unity in finite fields, Math. Comp., vol. 55, p , B. Poonen Computational aspects of curves of genus at least 2, H. Cohen Ed Algorithmic number theory Lecture Notes in Computer Science, 1122, Second International Symposium, ANTS-, Proceedings, pp M. Pohst, H. Zassenhaus Algorithmic Algebraic Number Theory, Cambridge, M. Pohst Computational Algebraic Number Theory, DMV21, Birkhäuser, H. G. Rück on the discrete logarithm problem in the divisor class group of curves Preprint, R. Schoof Elliptic curves over finite fields and the computation of square roots mod p, Math. Comp., vol. 44, p , J. P. Serre, J. Tate Good reduction of abelian varieties, Ann. of Math. 2, , page G. Shimura Introduction to arithmetic theory of automorphic function, Iwanami-Shoten and Princeton, G. Shimura, Y. Taniyama Complex multiplication of abelian varieties and its application to number theory, Pub. Math. Soc. Jap. no. 6, G. Shimura Abelian Varieties with Complex Multiplication and Modular Functions, Princeton Univ. Press, A-M. Spallek Kurven vom Geschlecht 2 und ihre An-wendung in Public-Key-Kryptosystemen, Dissertation, preprint, No. 18, J. Tate Endomorphisms of Abelian varieties over finite fields, Invent. Math. 2, p , S. Uchiyama, T. Saitoh A Note on The Discrete Logarithm Problem on Elliptic Curves of Trace Two, IEICE Japan Tech. Rep. ISEC98-27, pp , E. J. Volcheck Computing in the Jacobian of a plane algebraic curve, Proc. of ANT-1, p , LNCS-877, T. Wakabayashi, T. Nakamizo, K. Matsuo, J. Chao, S. Tsujii Computation of Weil Number of CM Varieties and Design of Jacobian Cryptosystems, IEICE, Japan, Proc. of SCIS2000, C50, P. V. Wamelen Examples of genus two CM curves defined over the rationals, Math. Comp., , pp , P. V. Wamelen PROVING THAT A GENUS 2 CURVE HAS COMPLEX MULTIPLICATION, Math. Comp., vol. 68, 1999 pp,
11 Jacobi CM Type 59 W. C. Waterhouse Abelian varieties over finite fields Ann. scient. EC. Norm. Sup. 4 t. 2, 1969, p H. J. Weber Hyperelliptic Simple Factor of J 0 N with Dimension at Least 3, Experimental Math., vol6, X. Wang 2-dimensional simple factors of J 0 N, manuscripta math., 87, pp ,
1 2 1.1............................................ 3 1.2.................................... 7 1.3........................................... 9 1.4..
2010 8 3 ( ) 1 2 1.1............................................ 3 1.2.................................... 7 1.3........................................... 9 1.4........................................
More informationK 2 X = 4 MWG(f), X P 2 F, υ 0 : X P 2 2,, {f λ : X λ P 1 } λ Λ NS(X λ ), (υ 0 ) λ : X λ P 2 ( 1) X 6, f λ K X + F, f ( 1), n, n 1 (cf [10]) X, f : X
2 E 8 1, E 8, [6], II II, E 8, 2, E 8,,, 2 [14],, X/C, f : X P 1 2 3, f, (O), f X NS(X), (O) T ( 1), NS(X), T [15] : MWG(f) NS(X)/T, MWL(f) 0 (T ) NS(X), MWL(f) MWL(f) 0, : {f λ : X λ P 1 } λ Λ NS(X λ
More information#2 (IISEC)
#2 (IISEC) 2007 10 6 E Y 2 = F (X) E(F p ) E : Y 2 = F (X) = X 3 + AX + B, A, B F p E(F p ) = {(x, y) F 2 p y2 = F (x)} {P } P : E(F p ) E F p - Given: E/F p : EC, P E(F p ), Q P Find: x Z/NZ s.t. Q =
More informationSiegel modular forms of middle parahoric subgroups and Ihara lift ( Tomoyoshi Ibukiyama Osaka University 1. Introduction [8] Ihara Sp(2, R) p
Siegel modular forms of middle parahoric subgroups and Ihara lift ( Tomoyoshi Ibukiyama Osaka University 1. Introduction [8] Ihara 80 1963 Sp(2, R) p L holomorphic discrete series Eichler Brandt Eichler
More informationSkew-Frobenius IISEC, JANT18 1
Skew-Frobenius IISEC, 2008 7 5 JANT18 1 Frobenius C/F p Jacobian J C (F p n) Frobenius ϕ p ϕ p Z[ϕ p ] End(J C ) ϕ p J C (F p ) J C (F p n) (J C (F p n)/j C (F p )) p g(n 1) g 2, p n J C (F p ) JANT18
More information( 9 1 ) 1 2 1.1................................... 2 1.2................................................. 3 1.3............................................... 4 1.4...........................................
More informationa m 1 mod p a km 1 mod p k<s 1.6. n > 1 n 1= s m, (m, = 1 a n n a m 1 mod n a km 1 mod n k<sn a 1.7. n > 1 n 1= s m, (m, = 1 r n ν = min ord (p 1 (1 B
10 004 Journal of the Institute of Science and Engineering. Chuo University Euler n > 1 p n p ord p n n n 1= s m (m B psp = {a (Z/nZ ; a n 1 =1}, B epsp = { ( a (Z/nZ ; a n 1 a }, = n B spsp = { a (Z/nZ
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More information1980年代半ば,米国中西部のモデル 理論,そして未来-モデル理論賛歌
2016 9 27 RIMS 1 2 3 1983 9-1989 6 University of Illinois at Chicago (UIC) John T Baldwin 1983 9-1989 6 University of Illinois at Chicago (UIC) John T Baldwin Y N Moschovakis, Descriptive Set Theory North
More information:00-16:10
3 3 2007 8 10 13:00-16:10 2 Diffie-Hellman (1976) K K p:, b [1, p 1] Given: p: prime, b [1, p 1], s.t. {b i i [0, p 2]} = {1,..., p 1} a {b i i [0, p 2]} Find: x [0, p 2] s.t. a b x mod p Ind b a := x
More information/ ( ) 1 1.1 323 206 23 ( 23 529 529 323 206 ) 23 1.2 33 1.3 323 61 61 3721 3721 323 168 168 323 23 61 61 23 1403 323 111 111 168 206 323 47 111 323 47 2 23 2 2.1 34 2 2.2 2 a, b N a b N a b (mod N) mod
More information特集_03-07.Q3C
3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution
More information2003/9 Vol. J86 D I No. 9 GA GA [8] [10] GA GA GA SGA GA SGA2 SA TS GA C1: C2: C3: 1 C4: C5: 692
Comparisons of Genetic Algorithms for Timetabling Problems Hiroaki UEDA, Daisuke OUCHI, Kenichi TAKAHASHI, and Tetsuhiro MIYAHARA GA GA GA GA GA SGA GA SGA2SA TS 6 SGA2 GA GA SA 1. GA [1] [12] GA Faculty
More information2016 Course Description of Undergraduate Seminars (2015 12 16 ) 2016 12 16 ( ) 13:00 15:00 12 16 ( ) 1 21 ( ) 1 13 ( ) 17:00 1 14 ( ) 12:00 1 21 ( ) 15:00 1 27 ( ) 13:00 14:00 2 1 ( ) 17:00 2 3 ( ) 12
More informationPari-gp /7/5 1 Pari-gp 3 pq
Pari-gp 3 2007/7/5 1 Pari-gp 3 pq 3 2007 7 5 Pari-gp 3 2007/7/5 2 1. pq 3 2. Pari-gp 3. p p 4. p Abel 5. 6. 7. Pari-gp 3 2007/7/5 3 pq 3 Pari-gp 3 2007/7/5 4 p q 1 (mod 9) p q 3 (3, 3) Abel 3 Pari-gp 3
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationJacobi Determination of Endomorphism Type of Jacobian Varieties of Hyperelliptic Curves over Finite Fields Kazuto MATSUO, Jinhui CHAO, and Shigeo TSUJ
Jacob Determnaton of Endomorphsm Type of Jacoban Varetes of Hyperellptc Curves over Fnte Felds Kazuto MATSUO, Jnhu CHAO, and Shgeo TSUJII CM CM CM lftng CM CM lftng Jacob Jacob ordnary Jacob Jacob Frobenus
More information楕円曲線暗号と RSA 暗号の安全性比較
RSA, RSA RSA 7 NIST SP-7 Neal Koblitz Victor Miller ECDLP (Elliptic Curve Discrete Logarithm Problem) RSA Blu-ray AACS (Advanced Access Control System) DTCP (Digital Transmission Content Protection) RSA
More information,,, 2 ( ), $[2, 4]$, $[21, 25]$, $V$,, 31, 2, $V$, $V$ $V$, 2, (b) $-$,,, (1) : (2) : (3) : $r$ $R$ $r/r$, (4) : 3
1084 1999 124-134 124 3 1 (SUGIHARA Kokichi),,,,, 1, [5, 11, 12, 13], (2, 3 ), -,,,, 2 [5], 3,, 3, 2 2, -, 3,, 1,, 3 2,,, 3 $R$ ( ), $R$ $R$ $V$, $V$ $R$,,,, 3 2 125 1 3,,, 2 ( ), $[2, 4]$, $[21, 25]$,
More informationReferences tll A. Hurwitz, IJber algebraischen Gebilde mit eindeutige Transformationen Ann. in sich, Math. L27 A. Kuribayashi-K. Komiya, On Weierstrass points of non-hyperelliptic compact Riemann surfaces
More information[AI] G. Anderson, Y. Ihara, Pro-l branched cov erings of P1 and higher circular l-units, Part 1 Ann. of Math. 128 (1988), 271-293 ; Part 2, Intern. J. Math. 1 (1990), 119-148. [B] G. V. Belyi, On Galois
More informationReal AdaBoost HOG 2009 3 A Graduation Thesis of College of Engineering, Chubu University Efficient Reducing Method of HOG Features for Human Detection based on Real AdaBoost Chika Matsushima ITS Graphics
More information(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α,
[II] Optimization Computation for 3-D Understanding of Images [II]: Ellipse Fitting 1. (1) 2. (2) (edge detection) (edge) (zero-crossing) Canny (Canny operator) (3) 1(a) [I] [II] [III] [IV ] E-mail sugaya@iim.ics.tut.ac.jp
More informationA Brief Introduction to Modular Forms Computation
A Brief Introduction to Modular Forms Computation Magma Supported by GCOE Program Math-For-Industry Education & Research Hub What s this? Definitions and Properties Demonstration H := H P 1 (Q) some conditions
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087
More information0. I II I II (1) linear type: GL( ), Sp( ), O( ), (2) loop type: loop current Kac-Moody affine, hyperbolic (3) diffeo t
e-mail: koyama@math.keio.ac.jp 0. I II I II (1) linear type: GL( ), Sp( ), O( ), (2) loop type: loop current Kac-Moody affine, hyperbolic (3) diffeo type: diffeo universal Teichmuller modular I. I-. Weyl
More informationMicrosoft Excelを用いた分子軌道の描画の実習
J. Comput. Chem. Jpn.,Vol.9, No.4, pp.177 182 (2010) 2010 Society of Computer Chemistry, Japan Microsoft Excel a*, b, c a, 790-8577 2-5 b, 350-0295 1-1 c, 305-8568 1-1-1 *e-mail: nagaoka@ehimegw.dpc.ehime-u.ac.jp
More information社会言語学:その仕組み、展望と社会の中での言葉遣いについて
Sociolinguistics: The mechanisms and perspectives of language use within societies. Barry Kavanagh1) Abstract Sociolinguistics is the study of how aspects of society, including its cultural norms, expectations,
More informationMilnor 1 ( ), IX,. [KN].,. 2 : (1),. (2). 1 ; 1950, Milnor[M1, M2]. Milnor,,. ([Hil, HM, IO, St] ).,.,,, ( 2 5 )., Milnor ( 4.1)..,,., [CEGS],. Ω m, P
Milnor 1 ( ), IX,. [KN].,. 2 : (1),. (2). 1 ; 1950, Milnor[M1, M2]. Milnor,,. ([Hil, HM, IO, St] ).,.,,, ( 2 5 )., Milnor ( 4.1)..,,., [CEGS],. Ω m, PC ( 4 5 )., 5, Milnor Milnor., ( 6 )., (I) Z modulo
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information30 2018.4.25 30 1 nuida@mist.i.u-tokyo.ac.jp 2018 4 11 2018 4 25 30 2018.4.25 1 1 2 8 3 21 4 28 5 37 6 43 7 47 8 52 30 2018.4.25 1 1 Z Z 0 Z >0 Q, R, C a, b a b a = bc c 0 a b b a b a a, b, c a b b c a
More informationsakigake1.dvi
(Zin ARAI) arai@cris.hokudai.ac.jp http://www.cris.hokudai.ac.jp/arai/ 1 dynamical systems ( mechanics ) dynamical systems 3 G X Ψ:G X X, (g, x) Ψ(g, x) =:Ψ g (x) Ψ id (x) =x, Ψ gh (x) =Ψ h (Ψ g (x)) (
More information04.™ƒ”R/’Ô”�/’Xfl©
Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name RSA Group Name RSA Code Elliptic Curve Cryptograrhy Group /Project No. 13-B /Project Leader 1009087 Takahiro
More informationBulletin of JSSAC(2014) Vol. 20, No. 2, pp (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles ca
Bulletin of JSSAC(2014) Vol. 20, No. 2, pp. 3-22 (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles can be solved by using Gröbner bases. In this paper,
More informationCentralizers of Cantor minimal systems
Centralizers of Cantor minimal systems 1 X X X φ (X, φ) (X, φ) φ φ 2 X X X Homeo(X) Homeo(X) φ Homeo(X) x X Orb φ (x) = { φ n (x) ; n Z } x φ x Orb φ (x) X Orb φ (x) x n N 1 φ n (x) = x 1. (X, φ) (i) (X,
More information平成 30 年度 ( 第 40 回 ) 数学入門公開講座テキスト ( 京都大学数理解析研究所, 平成 30 ~8 年月 72 月日開催 30 日 [6] 1 4 A 1 A 2 A 3 l P 3 P 2 P 1 B 1 B 2 B 3 m 1 l 3 A 1, A 2, A 3 m 3 B 1,
[6] 1 4 A 1 A 2 A 3 l P 3 P 2 P 1 B 1 B 2 B 3 m 1 l 3 A 1, A 2, A 3 m 3 B 1, B 2, B 3 A i 1 B i+1 A i+1 B i 1 P i i = 1, 2, 3 3 3 P 1, P 2, P 3 1 *1 19 3 27 B 2 P m l (*) l P P l m m 1 P l m + m *1 A N
More informationNP 1 ( ) Ehrgott [3] ( ) (Ehrgott [3] ) Ulungu & Teghem [8] Zitzler, Laumanns & Bleuler [11] Papadimitriou & Yannakakis [7] Zaroliagis [10] 2 1
NP 1 ( ) Ehrgott [3] 2 1 1 ( ) (Ehrgott [3] ) Ulungu & Teghem [8] Zitzler, Laumanns & Bleuler [11] Papadimitriou & Yannakakis [7] Zaroliagis [10] 2 1 1 1 Avis & Fukuda [1] 2 NP (Ehrgott [3] ) ( ) 3 NP
More informationII
II 2016 7 21 computer-assisted proof 1 / 64 1. 2. 3. Siegfried M. Rump : [1] I,, 14:3 (2004), pp. 214 223. [2] II,, 14:4 (2004), pp. 346 359. 2 / 64 Risch 18 3 / 64 M n = 2 n 1 (n = 1, 2,... ) 2 2 1 1
More information., White-Box, White-Box. White-Box.,, White-Box., Maple [11], 2. 1, QE, QE, 1 Redlog [7], QEPCAD [9], SyNRAC [8] 3 QE., 2 Brown White-Box. 3 White-Box
White-Box Takayuki Kunihiro Graduate School of Pure and Applied Sciences, University of Tsukuba Hidenao Iwane ( ) / Fujitsu Laboratories Ltd. / National Institute of Informatics. Yumi Wada Graduate School
More informationSAMA- SUKU-RU Contents p-adic families of Eisenstein series (modular form) Hecke Eisenstein Eisenstein p T
SAMA- SUKU-RU Contents 1. 1 2. 7.1. p-adic families of Eisenstein series 3 2.1. modular form Hecke 3 2.2. Eisenstein 5 2.3. Eisenstein p 7 3. 7.2. The projection to the ordinary part 9 3.1. The ordinary
More information1.2 (Kleppe, cf. [6]). C S 3 P 3 3 S 3. χ(p 3, I C (3)) 1 C, C P 3 ( ) 3 S 3( S 3 S 3 ). V 3 del Pezzo (cf. 2.1), S V, del Pezzo 1.1, V 3 del Pe
3 del Pezzo (Hirokazu Nasu) 1 [10]. 3 V C C, V Hilbert scheme Hilb V [C]. C V C S V S. C S S V, C V. Hilbert schemes Hilb V Hilb S [S] [C] ( χ(s, N S/V ) χ(c, N C/S )), Hilb V [C] (generically non-reduced)
More information, CH n. CH n, CP n,,,., CH n,,. RH n ( Cartan )., CH n., RH n CH n,,., RH n, CH n., RH n ( ), CH n ( 1.1 (v), (vi) )., RH n,, CH n,., CH n,. 1.2, CH n
( ), Jürgen Berndt,.,. 1, CH n.,,. 1.1 ([6]). CH n (n 2), : (i) CH k (k = 0,..., n 1) tube. (ii) RH n tube. (iii). (iv) ruled minimal, equidistant. (v) normally homogeneous submanifold F k tube. (vi) normally
More informationJFE.dvi
,, Department of Civil Engineering, Chuo University Kasuga 1-13-27, Bunkyo-ku, Tokyo 112 8551, JAPAN E-mail : atsu1005@kc.chuo-u.ac.jp E-mail : kawa@civil.chuo-u.ac.jp SATO KOGYO CO., LTD. 12-20, Nihonbashi-Honcho
More informationSQUFOF NTT Shanks SQUFOF SQUFOF Pentium III Pentium 4 SQUFOF 2.03 (Pentium 4 2.0GHz Willamette) N UBASIC 50 / 200 [
SQUFOF SQUFOF NTT 2003 2 17 16 60 Shanks SQUFOF SQUFOF Pentium III Pentium 4 SQUFOF 2.03 (Pentium 4 2.0GHz Willamette) 60 1 1.1 N 62 16 24 UBASIC 50 / 200 [ 01] 4 large prime 943 2 1 (%) 57 146 146 15
More information<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>
2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................
More information( ) 1., ([SU] ): F K k., Z p -, (cf. [Iw2], [Iw3], [Iw6]). K F F/K Z p - k /k., Weil., K., K F F p- ( 4.1).,, Z p -,., Weil..,,. Weil., F, F projectiv
( ) 1 ([SU] ): F K k Z p - (cf [Iw2] [Iw3] [Iw6]) K F F/K Z p - k /k Weil K K F F p- ( 41) Z p - Weil Weil F F projective smooth C C Jac(C)/F ( ) : 2 3 4 5 Tate Weil 6 7 Z p - 2 [Iw1] 2 21 K k k 1 k K
More information(1970) 17) V. Kucera: A Contribution to Matrix Ouadratic Equations, IEEE Trans. on Automatic Control, AC- 17-3, 344/347 (1972) 18) V. Kucera: On Nonnegative Definite Solutions to Matrix Ouadratic Equations,
More informationDataHD:Zip16:blue982:lcs:lcs-for-web.dvi
Ver 1.21 10 5 7 0 1 I 3 1 / 3 1.1... 3 1.2... 5 1.3... 5 1.4... 6 1.5... 7 1.6... 7 1.7... 7 2 9 2.1... 9 2.2 ( ). 10 2.3 :... 10 2.4... 11 2.5... 12 2.6... 13 II 16 3.2.1... 17 3.2.2... 19 3.2.3.. 22
More information2017 : msjmeeting-2017sep-02i004 Euler-Bernoulli (elastica) Elastica of Euler-Bernoulli and its generalization: from sprout of elliptic functions to r
017 : msjmeeting-017sep-0i004 Euler-Bernoulli (elastica) Elastica of Euler-Bernoulli and its generalization: from sprout of elliptic functions to reconstruction of Abelian function theory ( ) Elastica
More information第 61 回トポロジーシンポジウム講演集 2014 年 7 月於東北大学 ( ) 1 ( ) [6],[7] J.W. Alexander 3 1 : t 2 t +1=0 4 1 : t 2 3t +1=0 8 2 : 1 3t +3t 2 3t 3 +3t 4 3t 5 + t
( ) 1 ( ) [6],[7] 1. 1928 J.W. Alexander 3 1 : t 2 t +1=0 4 1 : t 2 3t +1=0 8 2 : 1 3t +3t 2 3t 3 +3t 4 3t 5 + t 6 7 7 : 1 5t +9t 2 5t 3 + t 4 ( :25400086) 2010 Mathematics Subject Classification: 57M25,
More information(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1
(Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding
More information1
1 Borel1956 Groupes linéaire algébriques, Ann. of Math. 64 (1956), 20 82. Chevalley1956/58 Sur la classification des groupes de Lie algébriques, Sém. Chevalley 1956/58, E.N.S., Paris. Tits1959 Sur la classification
More information1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [
Vol.2, No.x, April 2015, pp.xx-xx ISSN xxxx-xxxx 2015 4 30 2015 5 25 253-8550 1100 Tel 0467-53-2111( ) Fax 0467-54-3734 http://www.bunkyo.ac.jp/faculty/business/ 1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The
More information1
5-3 Photonic Antennas and its Application to Radio-over-Fiber Wireless Communication Systems LI Keren, MATSUI Toshiaki, and IZUTSU Masayuki In this paper, we presented our recent works on development of
More informationIPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS
1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high
More information2 2 ( M2) ( )
2 2 ( M2) ( ) 2007 3 3 1 2 P. Gaudry and R. Harley, 2000 Schoof 63bit 2 8 P. Gaudry and É. Schost, 2004 80bit 1 / 2 16 2 10 2 p: F p 2 C : Y 2 =F (X), F F p [X] : monic, deg F = 5, J C (F p ) F F p p Frobenius
More informationRSA署名方式の安全性を巡る研究動向について
RSA RSA RSA RSA RSA RSA PSSRSA PSS RSARSA PSS RSA PSS RSARSA-PSS E-mail:mayumi.saitou@boj.or.jp RSARSA PKCS ISO ISO IPS ANS X RSARSA RSA RSA RSA RSA RSA RSA bit RSA RSA PSS RSA PSS RSA ISO PKCSVer RSA
More information[1] [3]. SQL SELECT GENERATE< media >< T F E > GENERATE. < media > HTML PDF < T F E > Target Form Expression ( ), 3.. (,). : Name, Tel name tel
DEIM Forum 2011 C7-5 SuperSQL 223 8522 3 14 1 E-mail: tomonari@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp SuperSQL, SQL SELECT GENERATE SQL., SuperSQL HTML,.,. SuperSQL, HTML, Equivalent Transformation on
More informationMicrosoft Word - toyoshima-deim2011.doc
DEIM Forum 2011 E9-4 252-0882 5322 252-0882 5322 E-mail: t09651yt, sashiori, kiyoki @sfc.keio.ac.jp CBIR A Meaning Recognition System for Sign-Logo by Color-Shape-Based Similarity Computations for Images
More information2
Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/
More informationDPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)
1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology
More information[Oc, Proposition 2.1, Theorem 2.4] K X (a) l (b) l (a) (b) X [M3] Huber adic 1 Huber ([Hu1], [Hu2], [Hu3]) adic 1.1 adic A I I A {I n } 0 adic 2
On the action of the Weil group on the l-adic cohomology of rigid spaces over local fields (Yoichi Mieda) Graduate School of Mathematical Sciences, The University of Tokyo 0 l Galois K F F q l q K, F K,
More informationFig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).
Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation
More information15 2 1 4 1.1........................... 4 1.2.............................. 4 1.3.............................. 5 2 5 2.1....................................... 5 2.2 Fermat....................................
More informationIPSJ SIG Technical Report Vol.2014-DPS-158 No.27 Vol.2014-CSEC-64 No /3/6 1,a) 2,b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,.,.,
1,a),b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,,,,.,,,,.,,.,,,,.,, 1 Department of Electrical Electronic and Communication Engineering Faculty of Science and Engineering Chuo University
More information三石貴志.indd
流通科学大学論集 - 経済 情報 政策編 - 第 21 巻第 1 号,23-33(2012) SIRMs SIRMs Fuzzy fuzzyapproximate approximatereasoning reasoningusing using Lukasiewicz Łukasiewicz logical Logical operations Operations Takashi Mitsuishi
More information2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal
1 2 3 A projection-based method for interactive 3D visualization of complex graphs Masanori Takami, 1 Hiroshi Hosobe 2 and Ken Wakita 3 Proposed is a new interaction technique to manipulate graph layouts
More informationR R P N (C) 7 C Riemann R K ( ) C R C K 8 (R ) R C K 9 Riemann /C /C Riemann 10 C k 11 k C/k 12 Riemann k Riemann C/k k(c)/k R k F q Riemann 15
(Gen KUROKI) 1 1 : Riemann Spec Z 2? 3 : 4 2 Riemann Riemann Riemann 1 C 5 Riemann Riemann R compact R K C ( C(x) ) K C(R) Riemann R 6 (E-mail address: kuroki@math.tohoku.ac.jp) 1 1 ( 5 ) 2 ( Q ) Spec
More informationTitle KETpicによる曲面描画と教育利用 ( 数式処理と教育教育における数式処理システムの効果的利用に関する研究 ) : 数学 Author(s) 金子, 真隆 ; 阿部, 孝之 ; 関口, 昌由 ; 山下, 哲 ; 高遠, Citation 数理解析研究所講究録 (2009), 1624:
Title KETpicによる曲面描画と教育利用 ( 数式処理と教育教育における数式処理システムの効果的利用に関する研究 ) : 数学 Author(s) 金子, 真隆 ; 阿部, 孝之 ; 関口, 昌由 ; 山下, 哲 ; 高遠, Citation 数理解析研究所講究録 (2009), 1624: 1-10 Issue Date 2009-01 URL http://hdl.handle.net/2433/140279
More informationI. (CREMONA ) : Cremona [C],., modular form f E f. 1., modular X H 1 (X, Q). modular symbol M-symbol, ( ) modular symbol., notation. H = { z = x
I. (CREMONA ) : Cremona [C],., modular form f E f. 1., modular X H 1 (X, Q). modular symbol M-symbol, ( ). 1.1. modular symbol., notation. H = z = x iy C y > 0, cusp H = H Q., Γ = PSL 2 (Z), G Γ [Γ : G]
More informationBloomfield, L. (1933). Language. Chomsky, N. (1957). Syntactic structures. George Allen and Unwin. Mouton. Chomsky, N. (1964). Current issues in linguistic theory. Mouton. Chomsky, N. (1965). Aspects of
More information3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp
More informationuntitled
3. OPAC 4. OPAC 5. OPACBook ContentsWebcatPlus FELXCiNii Web of Science DB ScienceDirect DB -1 - GACoS Point! GACoS MENU GACoS Gateway to Academic Contents System http://www.lib.u-tokyo.ac.jp/dl/gacos/index.html
More informationShonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral
MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Parallel Computer Ships1 Makoto OYA*, Hiroto MATSUBARA**, Kazuyoshi SAKURAI** and Yu KATO**
More information2 Poisson Image Editing DC DC 2 Poisson Image Editing Agarwala 3 4 Agarwala Poisson Image Editing Poisson Image Editing f(u) u 2 u = (x
1 Poisson Image Editing Poisson Image Editing Stabilization of Poisson Equation for Gradient-Based Image Composing Ryo Kamio Masayuki Tanaka Masatoshi Okutomi Poisson Image Editing is the image composing
More information第62巻 第1号 平成24年4月/石こうを用いた木材ペレット
Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting
More informationTwist knot orbifold Chern-Simons
Twist knot orbifold Chern-Simons 1 3 M π F : F (M) M ω = {ω ij }, Ω = {Ω ij }, cs := 1 4π 2 (ω 12 ω 13 ω 23 + ω 12 Ω 12 + ω 13 Ω 13 + ω 23 Ω 23 ) M Chern-Simons., S. Chern J. Simons, F (M) Pontrjagin 2.,
More informationOptical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t)
http://wwwieice-hbkborg/ 2 2 4 2 -- 2 4 2010 9 3 3 4-1 Lucas-Kanade 4-2 Mean Shift 3 4-3 2 c 2013 1/(18) http://wwwieice-hbkborg/ 2 2 4 2 -- 2 -- 4 4--1 2010 9 4--1--1 Optical Flow t t + δt 1 Motion Field
More informationIPSJ SIG Technical Report Vol.2010-SLDM-144 No.50 Vol.2010-EMB-16 No.50 Vol.2010-MBL-53 No.50 Vol.2010-UBI-25 No /3/27 Twitter IME Twitte
Twitter 1 1 1 IME Twitter 2009 12 15 2010 2 1 13590 4.83% 8.16% 2 3 Web 10 45% Relational Analysis between User Context and Input Word on Twitter Yutaka Arakawa, 1 Shigeaki Tagashira 1 and Akira Fukuda
More information,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation
1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1
More informationa) Extraction of Similarities and Differences in Human Behavior Using Singular Value Decomposition Kenichi MISHIMA, Sayaka KANATA, Hiroaki NAKANISHI a
a) Extraction of Similarities and Differences in Human Behavior Using Singular Value Decomposition Kenichi MISHIMA, Sayaka KANATA, Hiroaki NAKANISHI a), Tetsuo SAWARAGI, and Yukio HORIGUCHI 1. Johansson
More information(check matrices and minimum distances) H : a check matrix of C the minimum distance d = (the minimum # of column vectors of H which are linearly depen
Hamming (Hamming codes) c 1 # of the lines in F q c through the origin n = qc 1 q 1 Choose a direction vector h i for each line. No two vectors are colinear. A linearly dependent system of h i s consists
More informationCPU Levels in the memory hierarchy Level 1 Level 2... Increasing distance from the CPU in access time Level n Size of the memory at each level 1: 2.2
FFT 1 Fourier fast Fourier transform FFT FFT FFT 1 FFT FFT 2 Fourier 2.1 Fourier FFT Fourier discrete Fourier transform DFT DFT n 1 y k = j=0 x j ω jk n, 0 k n 1 (1) x j y k ω n = e 2πi/n i = 1 (1) n DFT
More information1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c
CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification
More information平成26年度 学生要覧
Department of Mechanical Engineering Department of Electrical and Electronic Systems Department of System Information Engineering Department of Biotechnology and Environmental Engineering Department of
More information(3.6 ) (4.6 ) 2. [3], [6], [12] [7] [2], [5], [11] [14] [9] [8] [10] (1) Voodoo 3 : 3 Voodoo[1] 3 ( 3D ) (2) : Voodoo 3D (3) : 3D (Welc
1,a) 1,b) Obstacle Detection from Monocular On-Vehicle Camera in units of Delaunay Triangles Abstract: An algorithm to detect obstacles by using a monocular on-vehicle video camera is developed. Since
More informationA Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member
A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe
More informationA Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi
A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,
More informationJapanese Journal of Applied Psychology
Japanese Journal of Applied Psychology 2015, Vol. 41, No. 1, 65 76 1 1 PAC * Motivational Factors, Valence, and Time Perspectives in Student Job Hunting: A Personal Attitude Construct Analysis of a Female
More information2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055
1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free
More informationRIMS Kôkyûroku Bessatsu B32 (2012), (Iwasawa invariants of rea abeian number fieds with prime power conductors) By (Keiichi Komatsu), (Takashi
Tite 素数巾導手実アーベル体の岩澤不変量 (Agebraic Number Theory and Reated Topics 2010) Author(s) 小松, 啓一 ; 福田, 隆 ; 森澤, 貴之 Citation 数理解析研究所講究録別冊 = RIMS Kokyuroku Bessa (2012), B32: 105-124 Issue Date 2012-07 URL http://hd.hande.net/2433/196246
More information将来の暗号技術に関する安全性要件調査報告書
i ... 1... 3... 4 DES... 4 DES Cracker (1998 )... 4... 6 3.3.1 Lenstra & Verheul1999... 6 3.3.2 2000... 10 3.3.3 Silverman2000... 12... 12... 13... 13... 14... 17... 18... 18 5.1.1... 18 5.1.2... 18 5.1.3...
More information258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System
Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.
More informationcompact compact Hermann compact Hermite ( - ) Hermann Hermann ( ) compact Hermite Lagrange compact Hermite ( ) a, Σ a {0} a 3 1
014 5 4 compact compact Hermann compact Hermite ( - ) Hermann Hermann ( ) compact Hermite Lagrange compact Hermite ( ) 1 1.1. a, Σ a {0} a 3 1 (1) a = span(σ). () α, β Σ s α β := β α,β α α Σ. (3) α, β
More informationk + (1/2) S k+(1/2) (Γ 0 (N)) N p Hecke T k+(1/2) (p 2 ) S k+1/2 (Γ 0 (N)) M > 0 2k, M S 2k (Γ 0 (M)) Hecke T 2k (p) (p M) 1.1 ( ). k 2 M N M N f S k+
1 SL 2 (R) γ(z) = az + b cz + d ( ) a b z h, γ = SL c d 2 (R) h 4 N Γ 0 (N) {( ) } a b Γ 0 (N) = SL c d 2 (Z) c 0 mod N θ(z) θ(z) = q n2 q = e 2π 1z, z h n Z Γ 0 (4) j(γ, z) ( ) a b θ(γ(z)) = j(γ, z)θ(z)
More informationfiš„v8.dvi
(2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp
More informationkb-HP.dvi
Recent developments in the log minimal model program II II Birkar-Cascini-Hacon-McKernan 1 2 2 3 3 5 4 8 4.1.................. 9 4.2.......................... 10 5 11 464-8602, e-mail: fujino@math.nagoya-u.ac.jp
More information( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst
情報処理学会インタラクション 2015 IPSJ Interaction 2015 15INT014 2015/3/7 1,a) 1,b) 1,c) Design and Implementation of a Piano Learning Support System Considering Motivation Fukuya Yuto 1,a) Takegawa Yoshinari 1,b) Yanagi
More information4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q
x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke
More information