著者
木竜 徹 加藤 元樹 斉藤 義明 Kiryu Tohru Katoh Motoki Saitoh Yoshiaki
出版者
電子情報通信学会
雑誌
電子情報通信学会論文誌 D-2 情報・システム (ISSN:09151923)
巻号頁・発行日
vol.73, no.10, pp.p1779-1785, 1990-10
被引用文献数
5 3

誘発波は生体システムのインパルスレスポンスであり,神経系の状態を探る貴重な情報源として種々の研究に使われている.本論文では疲労時の誘発筋電図に着目し,その詳細な解析により筋疲労機序の解明を試みる.従来,筋疲労は一定負荷時の表面筋電図に見られるパワースペクトルの低域化のみで特徴づけられ,種々の生理的要因が報告されている.誘発筋電図は一定負荷時よりも活動している筋線維の数が多く,しかも疲労しやすいFT(fast twitch)系筋線維の活動が顕著である.従って,早期に疲労の兆候が現れる可能性がある.これまで誘発波はその形状,生成過程ゆえに,種々の工学的波形解析法が試みられてきた.しかし,その範ちゅうは時不変,線形システムであることが多く,本研究の対象には合わない.本論文では一定負荷状態を持続しながら,疲労に至る過程で外部刺激による誘発筋電図を繰り返し計測し,これらの波形に対し,興奮電位の伝導速度をDPマッチングパス,また筋線維組成にかかわる活動レベルを瞬時周波数パターンで詳細に解析する.その結果,瞬時周波数パターンに2段階の変化が観察でき,シミュレーションによれば,FT系筋線維の活動停止が伝導速度の低下よりも早期に現れているものと思われた.
著者
堀内 啓次 布田 裕一 境 隆一 金子 昌信 笠原 正雄
出版者
電子情報通信学会
雑誌
電子情報通信学会論文誌. A, 基礎・境界 (ISSN:09135707)
巻号頁・発行日
vol.82, no.8, pp.1269-1277, 1999-08
被引用文献数
7

楕円暗号において, 楕円曲線の群の位数は重要なパラメータである. 特に, その位数が素数であることが望ましい. 楕円曲線の位数を計算する方法としてSchoofのアルゴリズム及びそれを改良したElkies, Atkinのアルゴリズムが知られている. 本論文ではSchoofの改良アルゴリズムを用いた素数位数を有する楕円曲線の効率的な構成法を示す. 更に, 楕円曲線の位数分布及び位数が素数である確率を導出した後, 素数位数を有する楕円曲線の構成に必要な計算量を評価する. また, 法pの条件による計算時間の違いについて考察する.
著者
ARIMURA Mitsuharu KOGA Hiroki IWATA Ken-ichi
出版者
電子情報通信学会
雑誌
IEICE transactions on fundamentals of electronics, communications and computer sciences (ISSN:09168508)
巻号頁・発行日
vol.E96.A, no.12, pp.2443-2446, 2013-12

In this letter, we first introduce a stronger notion of the optimistic achievable coding rate and discuss a coding theorem. Next, we give a necessary and sufficient condition under which the coding rates of all the optimal FF codes asymptotically converge to a constant.
著者
ARIMURA Mitsuharu KOGA Hiroki IWATA Ken-ichi
出版者
電子情報通信学会
雑誌
IEICE transactions on fundamentals of electronics, communications and computer sciences (ISSN:09168508)
巻号頁・発行日
vol.E96.A, no.12, pp.2332-2342, 2013-12
被引用文献数
1

In this paper we consider fixed-to-fixed length (FF) coding of a general source X with vanishing error probability and define two kinds of optimalities with respect to the coding rate and the redundancy, where the redundancy is defined as the difference between the coding rate and the symbolwise ideal codeword length. We first show that the infimum achievable redundancy coincides with the asymptotic width W(X) of the entropy spectrum. Next, we consider the two sets $\mCH(\bX)$ and $\mCW(\bX)$ and investigate relationships between them, where $\mCH(\bX)$ and $\mCW(\bX)$ denote the sets of all the optimal FF codes with respect to the coding rate and the redundancy, respectively. We give two necessary and sufficient conditions corresponding to $\mCH(\bX) \subseteq \mCW(\bX)$ and $\mCW(\bX) \subseteq \mCH(\bX)$, respectively. We can also show the existence of an FF code that is optimal with respect to both the redundancy and the coding rate.
著者
FUJII Tsutomu SAWAUMI Takafumi AIKAWA Atsushi
出版者
電子情報通信学会
雑誌
IEICE transactions on fundamentals of electronics, communications and computer sciences (ISSN:09168508)
巻号頁・発行日
vol.E96.A, no.8, pp.1768-1774, 2013-08
被引用文献数
11

This study investigated the test-retest reliability and the criterion-related validity of the Implicit Association Test (IAT [1]) that was developed for measuring shyness among Japanese people. The IAT has been used to measure implicit stereotypes, as well as self-concepts, such as implicit shyness and implicit self-esteem. We administered the shyness IAT and the self-esteem IAT to participants (N =59) on two occasions over a one-week interval (Time 1 and Time 2) and examined the test-retest reliability by correlating shyness IATs between the two time points. We also assessed the criterion-related validity by calculating the correlation between implicit shyness and implicit self-esteem. The results indicated a sufficient positive correlation coefficient between the scores of implicit shyness over the one-week interval (r =.67, p < .01). Moreover, a strong negative correlation coefficient was indicated between implicit shyness and implicit self-esteem (r =-.72, p < .01). These results confirmed the test-retest reliability and the criterion-related validity of the Japanese version of the shyness IAT, which is indicative of the validity of the test for assessing implicit shyness.
著者
SUZUKI Nobutaka FUKUSHIMA Yuji IKEDA Kosetsu
出版者
電子情報通信学会
雑誌
IEICE transactions on information and systems (ISSN:09168532)
巻号頁・発行日
vol.E96-D, no.5, pp.1029-1042, 2013-05
被引用文献数
1

In this paper, we consider the XPath satisfiability problem under restricted DTDs called “duplicate free”. For an XPath expression q and a DTD D, q is satisfiable under D if there exists an XML document t such that t is valid against D and that the answer of q on t is nonempty. Evaluating an unsatisfiable XPath expression is meaningless, since such an expression can always be replaced by an empty set without evaluating it. However, it is shown that the XPath satisfiability problem is intractable for a large number of XPath fragments. In this paper, we consider simple XPath fragments under two restrictions: (i) only a label can be specified as a node test and (ii) operators such as qualifier ([ ]) and path union (∪) are not allowed. We first show that, for some small XPath fragments under the above restrictions, the satisfiability problem is NP-complete under DTDs without any restriction. Then we show that there exist XPath fragments, containing the above small fragments, for which the satisfiability problem is in PTIME under duplicate-free DTDs.
著者
KOGA Hiroki
出版者
電子情報通信学会
雑誌
IEICE transactions on fundamentals of electronics, communications and computer sciences (ISSN:09168508)
巻号頁・発行日
vol.E95.A, no.12, pp.2100-2106, 2012-12

This paper is concerned with coding theorems in the optimistic sense for separate coding of two correlated general sources X1 and X2. We investigate the achievable rate region Rtopt(X1,X2) such that the decoding error probability caused by two encoders and one decoder can be arbitrarily small infinitely often under a certain rate constraint. We give an inner and an outer bounds of Rtopt(X1,X2), where the outer bound is described by using new information-theoretic quantities. We also give two simple sufficient conditions under which the inner bound coincides with the outer bound.
著者
梶本 裕之 川上 直樹 前田 太郎 舘 暲
出版者
電子情報通信学会
雑誌
電子情報通信学会論文誌D-II (ISSN:09151923)
巻号頁・発行日
vol.84, no.1, pp.120-128, 2001-01

経皮電流刺激により皮膚感覚を提示する触覚ディスプレイを提案する。過去の多くの皮膚感覚ディスプレイでは言語報告によって表される種々の感覚(圧覚、振動覚、手触り等)を表現するTop-downの設計法がとられてきたが、それらの感覚は各種感覚受容器の活動を組み合わせた結果であるため、こうして設計されたディスプレイはある限られた感覚を提示するにとどまっていた。これに対して我々の方針は、感覚神経をその種類別に刺激するというものである。種類別刺激が可能であれば、それらを組み合わせることであらゆる感覚を生成することができるだろう。これらの刺激を、視覚との類似性から「触原色」と呼ぶことにする。刺激手段として皮膚表面からの電気刺激を用いる。電気刺激自体の歴史は古いが上記のような原色作成の試みはなく、多くが単なる特殊感覚のad-hocな生成に終わっている。本論文では受容器選択的刺激のための二つの方法を提案する。一つはアレー状電極を用い、各電極の重み付け変化で刺激深度を変化させる手法である。もう一つはこれまでの経皮電気刺激が陰極電流を刺激として用いていたのに対し、陽極電流を使うことで神経軸索の方向に選択的な刺激を行う手法である。
著者
KIM Woosuk KUZUOKA Hideaki SUZUKI Kenji
出版者
電子情報通信学会
雑誌
IEICE transactions on information and systems (ISSN:09168532)
巻号頁・発行日
vol.E95-D, no.10, pp.2447-2455, 2012-10

The style of a gesture provides significant information for communication, and thus understanding the style is of great importance in improving gestural interfaces using hand gestures. We present a novel method to estimate temporal and spatial scale—which are considered principal elements of the style—of hand gestures. Gesture synchronization is proposed for matching progression between spatio-temporally varying gestures, and scales are estimated based on the progression matching. For comparing gestures of various sizes and speeds, gesture representation is defined by adopting turning angle representation. Also, LCSS is used as a similarity measure for reliability and robustness to noise and outliers. Performance of our algorithm is evaluated with synthesized data to show the accuracy and robustness to noise and experiments are carried out using recorded hand gestures to analyze applicability under real-world situations.
著者
高橋 努
出版者
電子情報通信学会
雑誌
電子情報通信学会誌 (ISSN:09135693)
巻号頁・発行日
vol.95, no.1, pp.27-32, 2012-01 (Released:2012-01-31)

近年, 電子ジャーナルのアクセス環境は急速に向上した. しかし, 大学の厳しい財政状況のなかで, 学術雑誌の価格高騰やビッグディールのもたらす問題が深刻化している. これらに立ち向かうため大学図書館はコンソーシアムの活動を積極的に進めてきた. 平成23(2011)年4月には大学図書館コンソーシアム連合(JUSTICE)が設立され, 取組みの一層の強化が図られている. 電子ジャーナルの保存と恒久アクセスの保証に関わる問題のほか, オープンアクセスに関わる動向についても言及する.
著者
OMOTE Kazumasa KATO Kazuhiko
出版者
電子情報通信学会
雑誌
IEICE transactions on information and systems (ISSN:09168532)
巻号頁・発行日
vol.E93.D, no.5, pp.1080-1086, 2010-05

In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication.In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.
著者
TAKAHASHII Tsubasa KITAGAWA Hiroyuki WATANABE Keita
出版者
電子情報通信学会
雑誌
IEICE transactions on information and systems (ISSN:09168532)
巻号頁・発行日
vol.E93.D, no.6, pp.1403-1413, 2010-06
被引用文献数
1 2

Social bookmarking services have recently made it possible for us to register and share our own bookmarks on the web and are attracting attention. The services let us get structured data: (URL, Username, Timestamp, Tag Set). And these data represent user interest in web pages. The number of bookmarks is a barometer of web page value. Some web pages have many bookmarks, but most of those bookmarks may have been posted far in the past. Therefore, even if a web page has many bookmarks, their value is not guaranteed. If most of the bookmarks are very old, the page may be obsolete. In this paper, by focusing on the timestamp sequence of social bookmarkings on web pages, we model their activation levels representing current values. Further, we improve our previously proposed ranking method for web search by introducing the activation level concept. Finally, through experiments, we show effectiveness of the proposed ranking method.
著者
SUZUKI Nobutaka
出版者
電子情報通信学会
雑誌
IEICE transactions on information and systems (ISSN:09168532)
巻号頁・発行日
vol.E93.D, no.8, pp.2198-2212, 2010-08
被引用文献数
1 3

DTDs are continuously updated according to changes in the real world. Let t be an XML document valid against a DTD D, and suppose that D is updated by an update script s. In general, we cannot uniquely “infer” a transformation of t from s, i.e., we cannot uniquely determine the elements in t that should be deleted and/or the positions in t that new elements should be inserted into. In this paper, we consider inferring K optimum transformations of t from s so that a user finds the most desirable transformation more easily. We first show that the problem of inferring K optimum transformations of an XML document from an update script is NP-hard even if K = 1. Then, assuming that an update script is of length one, we show an algorithm for solving the problem, which runs in time polynomial of