untitled

Similar documents

untitled

untitled

三石貴志.indd

untitled

untitled

untitled

<30365F93C195CA8FDC5F88C092422E696E6464>

,398 4% 017,


通信容量制約を考慮したフィードバック制御 - 電子情報通信学会 情報理論研究会(IT) 若手研究者のための講演会

or57_4_175.dvi

GJG160842_O.QXD

or58_11_651.dvi

Optical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t)

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :

COE-RES Discussion Paper Series Center of Excellence Project The Normative Evaluation and Social Choice of Contemporary Economic Systems Graduate Scho

,.,. NP,., ,.,,.,.,,, (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., , tatsukaw

untitled

\\ \Data_in4\TeX\OR\63-7\07\or63_7_401.dvi

or58_8_455.dvi

28 Horizontal angle correction using straight line detection in an equirectangular image

研究シリーズ第40号

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)

JAPAN MARKETING JOURNAL 122 Vol.31 No.22011

guideline_1_0.dvi


SEJulyMs更新V7

Abstract Gale-Shapley 2 (1) 2 (2) (1)

01-._..

2 (March 13, 2010) N Λ a = i,j=1 x i ( d (a) i,j x j ), Λ h = N i,j=1 x i ( d (h) i,j x j ) B a B h B a = N i,j=1 ν i d (a) i,j, B h = x j N i,j=1 ν i

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

V 0 = + r pv (H) + qv (T ) = + r ps (H) + qs (T ) = S 0 X n+ (T ) = n S n+ (T ) + ( + r)(x n n S n ) = ( + r)x n + n (d r)s n = ( + r)v n + V n+(h) V

ばらつき抑制のための確率最適制御

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

Change in Organization Mode and Asymmetric Personal Information via Corporate Group Management Resolution 1 asymmetric information,2003a symmetric ign

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai,

日立評論2007年3月号 : ソフトウェア開発への

01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

平成 19 年度 ( 第 29 回 ) 数学入門公開講座テキスト ( 京都大学数理解析研究所, 平成 19 ~8 年月 72 月日開催 30 日 ) 1 PCF (Programming language for Computable Functions) PCF adequacy adequacy

520

, 1.,,,.,., (Lin, 1955).,.,.,.,. f, 2,. main.tex 2011/08/13( )

CVaR

9_18.dvi

An Interactive Visualization System of Human Network for Multi-User Hiroki Akehata 11N F

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +

2003/9 Vol. J86 D I No. 9 GA GA [8] [10] GA GA GA SGA GA SGA2 SA TS GA C1: C2: C3: 1 C4: C5: 692

% 95% 2002, 2004, Dunkel 1986, p.100 1


_01野口.indd

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor

人工知能学会研究会資料 SIG-KBS-B Analysis of Voting Behavior in One Night Werewolf 1 2 Ema Nishizaki 1 Tomonobu Ozaki Graduate School of Integrated B

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP

,,, 2 ( ), $[2, 4]$, $[21, 25]$, $V$,, 31, 2, $V$, $V$ $V$, 2, (b) $-$,,, (1) : (2) : (3) : $r$ $R$ $r/r$, (4) : 3

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS ) GPS Global Positioning System

* *2 Russell et al. (2015) 2

9.プレゼン資料(小泉)R1

本文(横)  ※リュウミンL・カンマ使用/大扉●還暦記念論集用

TOP URL 1


(MIRU2008) HOG Histograms of Oriented Gradients (HOG)

‰gficŒõ/’ÓŠ¹

untitled

2 (S, C, R, p, q, S, C, ML ) S = {s 1, s 2,..., s n } C = {c 1, c 2,..., c m } n = S m = C R = {r 1, r 2,...} r r 2 C \ p = (p r ) r R q = (q r ) r R

1 (1997) (1997) 1974:Q3 1994:Q3 (i) (ii) ( ) ( ) 1 (iii) ( ( 1999 ) ( ) ( ) 1 ( ) ( 1995,pp ) 1

On the Limited Sample Effect of the Optimum Classifier by Bayesian Approach he Case of Independent Sample Size for Each Class Xuexian HA, etsushi WAKA

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1

IPSJ SIG Technical Report Vol.2010-NL-199 No /11/ treebank ( ) KWIC /MeCab / Morphological and Dependency Structure Annotated Corp

No. 3 Oct The person to the left of the stool carried the traffic-cone towards the trash-can. α α β α α β α α β α Track2 Track3 Track1 Track0 1

2

or58_10_599.dvi

第5章 偏微分方程式の境界値問題

Vol. 23 No. 4 Oct Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

emarketer SNS / SNS 2009 SNS 15 64

(1) (Karlan, 2004) (1) (1973) (1978) (1991) (1991) 1

Mantel-Haenszelの方法

K 2 X = 4 MWG(f), X P 2 F, υ 0 : X P 2 2,, {f λ : X λ P 1 } λ Λ NS(X λ ), (υ 0 ) λ : X λ P 2 ( 1) X 6, f λ K X + F, f ( 1), n, n 1 (cf [10]) X, f : X


zsj2017 (Toyama) program.pdf


_170825_<52D5><7269><5B66><4F1A>_<6821><4E86><5F8C><4FEE><6B63>_<518A><5B50><4F53><FF08><5168><9801><FF09>.pdf

x (x, ) x y (, y) iy x y z = x + iy (x, y) (r, θ) r = x + y, θ = tan ( y ), π < θ π x r = z, θ = arg z z = x + iy = r cos θ + ir sin θ = r(cos θ + i s

1 Flores, D. (009) All you can drink: should we worry about quality? Journal of Regulatory Economics 35(1), Saggi, K., and Vettas, N. (00) On in

新製品開発プロジェクトの評価手法

main.dvi

Lebesgue可測性に関するSoloayの定理と実数の集合の正則性=1This slide is available on ` `%%%`#`&12_`__~~~ౡ氀猀e

42 3 u = (37) MeV/c 2 (3.4) [1] u amu m p m n [1] m H [2] m p = (4) MeV/c 2 = (13) u m n = (4) MeV/c 2 =

[1], B0TB2053, i

[1] AI [2] Pac-Man Ms. Pac-Man Ms. Pac-Man Pac-Man Ms. Pac-Man IEEE AI Ms. Pac-Man AI [3] AI 2011 UCT[4] [5] 58,990 Ms. Pac-Man AI Ms. Pac-Man 921,360


A Japanese Word Dependency Corpus ÆüËܸì¤Îñ¸ì·¸¤ê¼õ¤±¥³¡¼¥Ñ¥¹

PFI

2.R R R R Pan-Tompkins(PT) [8] R 2 SQRS[9] PT Q R WQRS[10] Quad Level Vector(QLV)[11] QRS R Continuous Wavelet Transform(CWT)[12] Mexican hat 4

johnny-paper2nd.dvi



IPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter

(1.2) T D = 0 T = D = 30 kn 1.2 (1.4) 2F W = 0 F = W/2 = 300 kn/2 = 150 kn 1.3 (1.9) R = W 1 + W 2 = = 1100 N. (1.9) W 2 b W 1 a = 0

Transcription:

c OR 2015 5 [1] OR 1. 2001 9.11 Homeland Security (OR) [2] OR 1972 Chaiken and Larson [3] (1) (2) (3) (4) (5) OR 68 Olson and Wright [4] 239 8686 1 10 20 hozaki@nda.ac.jp Koopman [5] Homeland Security (Stackelberg game) Homeland Security Patrolling security game (PSG) Stackelberg security game (SSG) (Security game) PSG SSG Olson and Wright 2. 226 28 Copyright c by ORSJ. Unauthorized reproduction of this article is prohibited.

Garnaev et al. [6] N x 1 =(x 1 1,...,x 1 N) y =(y 1,...,y N ) C i i v i(x 1, y) u 1 A(x 1, y) = N i=1 Civi(x1, y) x 2 y u 2 A(x 2, y) 1 2 q, 1 q u D(y, (x 1, x 2 )) = {qu 1 A(x 1, y)+(1 q)u 2 A(x 2, y)} x 1, x 2, y x 1, x 2, y u 1 A(x 1, y ) u 1 A(x 1, y ), u 2 A(x 2, y ) u 2 A(x 2, y ), U D(y, (x 1, x 2 )) U D(y, (x 1, x 2 )). u k A(x k, y) u 1 A(x 1, y) = N C ix 1 i (1 d iy i), (1) i=1 u 2 A(x 2, y) =D N x 2 i (1 d iy i), (2) i=1 C i = heipi g EjJ, d σe 2 i = σe 2 + geij P i i h Ei σ E J, g Ej D x k, y (1), (2) Yang et al. [7] SSG SSG Garnaev et al Yang et al 2 [8] Basilico et al. [9] PSG Olson and Wright SSG Tsai et al. [10] [11] [12 16] [1] 2007 ARMOR (Assistant for randomized monitoring over routes) 2009 IRIS (Intelligent randomization in scheduling) ARMOR DOBSS (Decomposed optimal Bayesian Stackelberg solver) 2016 4 Copyright c by ORSJ. Unauthorized reproduction of this article is prohibited. 29 227

400 GUARDS (Game-theoretic unpredictable and randomly deployed security) PROTECT (Port resilience operational/tactical enforcement to combat terrorism) Tambe [17] 3. 1 [18] Hohzaki et al. [19] 1 2 s t p s(t) j q j(i),i=1,...,l j (δ {1, 0}) (2) (d) (3) (α) δα/d 2 1 p s q j q j 1 35 7 1 1 0 1 3 2 0.0962 5 5 3 0.2118 8 8 4 0.2118 11 17 5 0.4281 19 19 6 0.5801 22 22 7 0.5801 24 1 1 t j f j(t) f j 1( ) f j( ) { } f j(t) =min z f j 1(z)+D j 1(z)+E j (t) (3) D j 1(z) z j 1 228 30 Copyright c by ORSJ. Unauthorized reproduction of this article is prohibited.

j E j (t) j t CCD (3) f j(t) j t f j(t) =minmin i z f i(z)+d j i (z)+ej (t) { } D j i (z) j i z j f j(t) j t [20] E2C AWACS (Airborne warning and control system) (P TR) (G A) (λ) (σ) (R) P TRG 2 Aλ 2 σ/(4π) 3 R 4 3 (3) z 2 6 IR1 IR6 IR4 4 PR1 PR4 FR 2016 4 Copyright c by ORSJ. Unauthorized reproduction of this article is prohibited. 31 229

2 PR3 PR4 0.725 0.275 IR4 IR5 0.309 0.691 IR4 IR5 4. Hohzaki and Chiba [21] 2 2 (Attrition game) 2 [22] N A H h H R0 h e 1 d h e Ω h S s S B0 s s U(s) h f(h) e h s γe hs h x s y y f e(x, y) =max{0, x γ hs e y} (4) 0 (4) 230 32 Copyright c by ORSJ. Unauthorized reproduction of this article is prohibited.

2 h H l π h (l) π h = {π h (l),l Ω h } s e ye s y s = {ye,e s A} s g(s) E l l El e l e h l s y s e Rhs(l, I y s )= d h e max 0,Rh 0 γ hs e ys e (5) e E l e E e l g(s) h π h Rh(l, I (g,y)) = g(s)rhs(l, I y s ) s S Rh(π I h, (g,y)) = π h (l)rh(l, I (g,y)) l Ω h (g,y)={(g(s), y s ),s S} h max πh Rh(π I h, (g,y)) π h f(h) h H f(h)maxπ h RI h(π h, (g,y)) (g,y) {π h,h H} (g,y) R I (π,(g,y)) = f(h) π h (l) g(s)rhs(l, I y s ) h H l Ω h s S 2 (5) R II (π, (g,y)) = f(h) π h (l) h H l Ω h max dh e R0 h γ hs e g(s)ys e, e E l s S e E l e d h e R0 h γ hs e g(s)ys e s S e E e l d h e d h e e 3 [23] 15 16 H = {1, 2} h =1 2 5, 6, 7, 8 1 14 h =2 2016 4 Copyright c by ORSJ. Unauthorized reproduction of this article is prohibited. 33 231

4 B 1 0 5 B 1 0 3 1 13, 14, 15 2 4 9 14 4 1 2 f(1) = 0.8, f(2) = 0.2 R0 1 =5,R0 2 =10 S = {1, 2} 2 s =1 s =2 U(2) = 0.3 γe hs s =2 γe hs B0,B 1 0 2 s = 2 s = 1 2 g(s) s C g(1)b0 1 +2g(2)B0 2 1 s =1 B0 1 s =2 γe hs s =1 g(2) = 0.3 s =2 B0 1 B0 2 (C 0.7B0 1 )/(2 0.3) C =20 4 5 B0 1 ye s 4 s =1 2 B0 1 =9, B0 2 =22.8 C 5 s =1 1 s =2 B0 1 B 0 1 12, 13 C (1) (2) 232 34 Copyright c by ORSJ. Unauthorized reproduction of this article is prohibited.

(i) γe hs (ii) d h e (iii) (3) 5. 4 [1] 60, pp. 266 273, 2015. [2] J. Herrmann (ed.), Handbook of Operations Research for Homeland Security, Springer Science & Business Media, 2012. [3]J.M.ChaikenandR.C.Larson, Methodsforallocating urban emergency units: A survey, Management Science, 19, pp. 110 130, 1972. [4] D. G. Olson and G. P. Wright, Models for allocating police preventive patrol effort, Operational Research Quarterly, 26, pp. 703 715, 1975. [5] B. O. Koopman, Search and screening, Operations Evaluation Group Report No. 56, 1946. [6] A. Garnaev, M. Baykal-Gursoy and H. V. Poor, Incorporating attack-type uncertainty into network protection, IEEE Transactions on Information Forensics and Security, 9, pp. 1278 1287, 2014. [7] R. Yang, C. Kiekintveld, F. Ordonez, M. Tambe and R. John, Improving resource allocation strategies against human adversaries in security games: An extended study, Artificial Intelligence, 195, pp. 440 469, 2013. [8] A. R. Washburn, TPZS applications: Blotto games, Wiley Encyclopedia of Operations Research and Management Science, 7, pp. 5504 5511, 2011. [9] N. Basilico, N. Gatti and F. Amigoni, Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder, Artificial Intelligence, 184, pp. 78 123, 2012. [10] J. Tsai, Z. Yin, J. Y. Kwak, D. Kempe, C. Kiekintveld and M. Tambe, Urban security: Gametheoretic resource allocation in networked physical domains, In Proceedings of the 24th AAAI Conference on Artificial Intelligence, pp. 881 886, 2010. [11] 2015 pp. 4 5, 2015. [12] J. Salmeron, R. K. Wood and R. Baldick, Analysis of electric grid security under terrorist threat, IEEE Transactions on Power Systems, 19, pp. 905 912, 2004. [13] J. Pita, M. Jain, F. Ordonez, C. Portway, M. Tambe and C. Western, Using game theory for Los Angeles airport security, AI Magazine, pp. 43 57, 2009. [14] M. Kodialam and T. V. Lakshman, Detecting network intrusions via sampling: A game theoretical approach, In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications (IEEE INFOCOM), 3, pp. 1880 1889, 2003. [15] F. Perea and J. Puerto, Revisiting a game theoretic framework for the robust railway network design against intentional attacks, European Journal of Operational Research, 226, pp. 286 292, 2013. [16] M. Bell, U. Kanturska, J. Schmocker and A. Fonzone, Attacker-defender models and road network vulnerability, Philosophical Transactions of the Royal Society, 366, pp. 1893 1906, 2008. [17] M. Tambe, Security and Game Theory-Algorithms, Deployed Systems, Lessons Learned, Cambridge University Press, 2012. [18] 4, pp. 19 35, 2011. [19] R. Hohzaki, S. Morita and Y. Terashima, A patrol problem in a building by search theory, In Proceedings of 2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), pp. 104 111, 2013. [20] 60, pp. 437 442, 2015. [21] R. Hohzaki and T. Chiba, An attrition game on an acyclic network, Journal of the Operational Research Society, 66, pp. 979 992, 2015. [22] pp. 141 150, 2015. [23] http://www.ishigaki-airport. co.jp/facility.html 2015 12 1 2016 4 Copyright c by ORSJ. Unauthorized reproduction of this article is prohibited. 35 233