9_18.dvi

Similar documents
Q [4] 2. [3] [5] ϵ- Q Q CO CO [4] Q Q [1] i = X ln n i + C (1) n i i n n i i i n i = n X i i C exploration exploitation [4] Q Q Q ϵ 1 ϵ 3. [3] [5] [4]

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS ) GPS Global Positioning System

SEJulyMs更新V7

1 UD Fig. 1 Concept of UD tourist information system. 1 ()KDDI UD 7) ) UD c 2010 Information Processing S

Computer Security Symposium October 2013 Android OS kub

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report An Evaluation Method for the Degree of Strain of an Action Scene Mao Kuroda, 1 Takeshi Takai 1 and Takashi Matsuyama 1


& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

WikiWeb Wiki Web Wiki 2. Wiki 1 STAR WARS [3] Wiki Wiki Wiki 2 3 Wiki 5W1H Wiki Web 2.2 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 2.3 Wiki 2015 Informa

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m


IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

Kyushu Communication Studies 第2号

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

3_39.dvi

202

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

MDD PBL ET 9) 2) ET ET 2.2 2), 1 2 5) MDD PBL PBL MDD MDD MDD 10) MDD Executable UML 11) Executable UML MDD Executable UML

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

OJT Planned Happenstance

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

IPSJ SIG Technical Report Vol.2013-GN-86 No.35 Vol.2013-CDS-6 No /1/17 1,a) 2,b) (1) (2) (3) Development of Mobile Multilingual Medical

Abstract This paper concerns with a method of dynamic image cognition. Our image cognition method has two distinguished features. One is that the imag

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

IPSJ SIG Technical Report Vol.2010-NL-199 No /11/ treebank ( ) KWIC /MeCab / Morphological and Dependency Structure Annotated Corp

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

橡自動車~1.PDF

..,,...,..,...,,.,....,,,.,.,,.,.,,,.,.,.,.,,.,,,.,,,,.,,, Becker., Becker,,,,,, Becker,.,,,,.,,.,.,,

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

(1) i NGO ii (2) 112

IPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

IPSJ SIG Technical Report Vol.2014-HCI-158 No /5/22 1,a) 2 2 3,b) Development of visualization technique expressing rainfall changing conditions

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004

Tf dvi

Google Social Influences and Legal Issues of Google Street View Hiroshi Takada

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

29 jjencode JavaScript

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing

Vol.9, 30-40, May ) ) ) ) 9), 10) 11) NHK Table Table 1 分 類 回 答 ( 抜 粋 ) 1マスメデ

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

1 1 tf-idf tf-idf i

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow

日本感性工学会論文誌

Vol. 23 No. 4 Oct Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

IPSJ SIG Technical Report Vol.2011-DBS-153 No /11/3 Wikipedia Wikipedia Wikipedia Extracting Difference Information from Multilingual Wiki

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi



4.1 % 7.5 %

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

untitled

08-特集04.indd

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

IPSJ SIG Technical Report Vol.2009-BIO-17 No /5/26 DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

Vol.53 No (July 2012) EV ITS 1,a) , EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Commu

塗装深み感の要因解析

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

[2] , [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7

e-learning e e e e e-learning 2 Web e-leaning e 4 GP 4 e-learning e-learning e-learning e LMS LMS Internet Navigware

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

Table 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig

知能と情報, Vol.30, No.5, pp

16_.....E...._.I.v2006

1 StarCraft esportsleague WallPlayed.org 200 StarCraft Benzene StarCraft 3 Terran Zerg Protoss Terran Terran Terran 3 Terran Zerg Zerg Worker D

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

福光 寛 1‐37/1‐37

Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

7,, i

ISSN ISBN C3033 The Institute for Economic Studies Seijo University , Seijo, Setagaya Tokyo , Japan

企業の信頼性を通じたブランド構築に関する考察

ユーザーズマニュアル

Fig. 1 Trends of TB incidence rates for all forms and smear-positive pulmonary TB in Kawasaki City and Japan. Incidence=newly notified cases of all fo


The 18th Game Programming Workshop ,a) 1,b) 1,c) 2,d) 1,e) 1,f) Adapting One-Player Mahjong Players to Four-Player Mahjong


Vol.8 No (July 2015) 2/ [3] stratification / *1 2 J-REIT *2 *1 *2 J-REIT % J-REIT J-REIT 6 J-REIT J-REIT 10 J-REIT *3 J-

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

3_23.dvi

IPSJ SIG Technical Report Vol.2009-HCI-134 No /7/17 1. RDB Wiki Wiki RDB SQL Wiki Wiki RDB Wiki RDB Wiki A Wiki System Enhanced by Visibl

Fig. 1 Structure of a Sebaceous Follicle (Ref.1).

28 Horizontal angle correction using straight line detection in an equirectangular image


Transcription:

Vol. 49 No. 9 3180 3190 (Sep. 2008) 1, 2 3 1 1 1, 2 4 5 6 1 MRC 1 23 MRC Development and Applications of Multiple Risk Communicator Ryoichi Sasaki, 1, 2 Yuu Hidaka, 3 Takashi Moriya, 1 Katsuhiro Taniyama, 1 Hiroshi Yajima, 1, 2 Kiyomi Yaegashi, 4 Yasuhiro Kawashima 5 and Hiroshi Yoshiura 6 Businesses and society face various risks, and measures to reduce one risk often cause another risk. It may be said that nowadays is the times of the risk vs. the risk. For this reason, the risk communication for forming agreement among decision-making persons, such as manager, customers, and employees, is becoming important. However, it is not easy to search for the combinations of the optimal measures, reducing the risk based on the concept which is opposed to each other, such as security, privacy, and development cost, and taking agreement. This situation requires development of the multiple risk communicator (MRC) with the functions of which are (1) Modeling support part for expert, (2) optimization engine, and (3) displaying the computed result to decision-making persons. In this paper, after describing a developments design of MRC, we explain the implemented MRC program and its application results to personal information leakage problems, illegal copying problems, and inner control problems with evaluation on the usefulness and issues to be solved in future. 1. 1 1 1 1 Tokyo Denki University 2 Researcher of RISTEX JST 3 IT IT DORAKU RESEARCH LAB. Ltd. 4 PinpointService, Inc. 5 AdIn Research, Inc. 6 The University of Electro-Communications 2007 10 CSEC 3180 c 2008 Information Processing Society of Japan

3181 Multiple Risk Communicator: MRC 1) 2) 13) 1 2 3 MRC 14) MRC MRC MRC MRC 2. MRC MRC 2 (1) (2) (3) 1 MRC 2 MRC 1 2 MRC Fig. 1 Image of method for solving the conflict between risks. Fig. 2 Development objectives and characteristics of MRC.

3182 MRC 1 2 3 4 + 5 FTA 11) 1 3 1 0 1 MRC MRC 6 1 4 a b c d e X i i 0-1 C i D i1 D i2 1 1 Table 1 Examples of the countermeasures and the values of parameters. 3 Fig. 3 Example of fault tree for information leakage by injustice person in inside. P α1 P α2 P β 1 3 C t D 1 D 2 P t

3183 2 3 1 L 4 a b 5 6 2 3. MRC MRC 1 5 (1) MRC (2) PC PC PC MRC 4 2 PC 4 Fig. 4 Image of formulated result. 5 MRC Fig. 5 Structure of MRC program.

3184 6 MRC Fig. 6 Image of display for experts in MRC program. Fig. 7 7 Display for individuals involved in decision making. PC 2 1 15 32 12) Mathematica 9) MRC PC 12 3 1 2 6 2 1 PC 7 1 L 1 100 MRC WEB 1 PC MRC PC PC 4. MRC 4.1 MRC 4.1.1 MRC 3 (1) (2) MRC (3)

3185 2 Table 2 Applied results of MRC. MRC 3 MRC 1 2 2 PR V1 1 4.1.2 1 4) 2 J-SOX MRC 7) J-SOX ETA 3 MRC 5) ETA (1) CRYPTREC 10) (2) (3) (4) (1) (3) MRC 4.1.2 3 1 2 3 3 1 2

3186 3 Table 3 Applied results to private information leakage problems. 3 1 2),8) 8 3 3 1 1 0.15 8,000 0.30 0.30 1 2 (1) 0.1 (2) 0.15 0.15 0.1 3 2 6) MRC 15 5 1 2 MRC 3 MRC 13 3 12 4.1.3 MRC 2 4.1.2 2 2 4 2 2

3187 4 Table 4 Processing time. MRC 15 20 15 4.2 1 MRC 1 MRC FTA ETA 2 MRC 3 MRC 4 1 7 15 5 a b SI c 6 a b 3 2 1 2 MRC c 3 1 3) d

3188 3) 2 e 15 8 15 15 5. 1 (1) (2) MRC 1) Vol.46, No.8, pp.2120 2128 (2005). 2) Sasaki, R., et al.: Development Concept for and Trial Application of a Multiplex Risk Communicator, IFIP I3E2005, pp.607 621 (2005). 3) C pp.310 317 (Feb. 2008). 4) CSS2006 (Nov. 2006). 5) Vol.49, No.3, pp.1105 1118 (2008). 6) CSS2007 (Nov. 2007). 7) CSS2007 (Nov. 2007). 8) SCIS2006 (Jan. 2006). 9) http://www.hulinks.co.jp/software/mathematica/ 10) http://www.cryptrec.jp/ 11) McCormic, N.J.: Reliability and Risk Analysis, Academic Press Inc. (1981). 12) Gerfinkel, R.S., et al.: Integer Programming, Wiley and Sons (1972). 13) JIS TR X 0036-3:2001 3 (2001). 14) (1993). ( 19 11 29 ) ( 20 6 3 )

3189 1971 3 4 2001 4 2007 4 1998 2002 2007 19 1996 1999 IT 2008 2005 2007 IT 2006 3 4 2008 3 4 2007 3 4 1950 10 5 1975 3 1982 MIT 1999 2003 2004 4 IEEE HI 1957 4 10 1976 3 1977 SE 3D 1988 SE AI 1997 2005 AI

3190 1983 CAD/CAM CG 2001 1981 2003 IEEE 2000 2005 2005 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing Best Paper Award