119 research outputs found

    Another scope test on nonuse value of the Shimanto river, Japan

    Get PDF
    In Japan, dramatic decrease in population and tax revenues of local areas have made the preservation of precious local environmental resources difficult. Although people who live in urban areas have a general consciousness toward preservation of such resources, the amount they are willing to pay and how this consciousness can be realized remain vague. The aims of this study are to estimate such willingness to pay (WTP), to consider the applicability of the contingent valuation method, and to suggest a funding scheme for conservation. Estimation is focused on the Shimanto river, famous as the last clear stream of Japan. Consideration includes a comparison of non-response rate between questionnaire formats and a test of scope insensitivity. Comparison between the private goods format and the referendum format is noteworthy because most Japanese do not have the experience of participating referendum voting on a specific issue. The test of scope insensitivity shows that mean WTP for water quality improvement of the entirety of the river is significantly larger than that of only part. However, weak sensitivity calls for careful benefit transfer. Finally, the paper examines the significance of WTP from a policy perspective. To actualize the will of residents of urban centers for conservation of local environmental assets, it is necessary to establish an institution that can collect the cost for conservation directly from beneficiaries

    Quantitative Measurement and Analysis to Computational Thinking for Elementary Schools in Japan

    Get PDF
    In Japan, programming education has been made compulsory in elementary schools since 2020. The Programming Education Guide (GPE) explains the purpose of programming education and the abilities that can be fostered through programming education. In addition, the “Portal Site for Programming Education Focusing on Elementary Schools” introduces various examples of programming education. However, there is little information measuring whether programming classes are effective in improving OTWP (Objective Thinking as a Way of Programming) abilities based on CT (Computational Thinking), except for reports of improvement after simple statistical analysis. Therefore, we prepared 30 CT questions, 12 basic and 18 applied, for the CT test considering four key techniques, decomposition, pattern recognition, abstraction, and algorithms, of which 14 questions were pre-test and seven questions were assessment test. In the experiment, 18 elementary school students from grades 1st to 6th were given a short workshop only once, and the analysis of the effect was done statistically, considering their habituation to the problems. The results of the experiment showed that there was no effect of the one-time workshop, unlike other reports of improvement that used simple statistical methods. It became clear that the CT ability was not improved by the short education. On the other hand, a new finding is that females may be inferior to males in three techniques: decomposition, algorithm, and abstraction

    フラクタル フゴウ オ モチイタ ガゾウ パターン ケンサク ノ イチシュホウ

    Get PDF
    画像のフラクタル符号化の過程で定まるアフィン写像について,その逆写像の族を反復計算する力学系を考えると,その状態空間中のアトラクタの引力圏(収束領域)を求めることにより,画像の領域分割が可能である.本論文は,この手法を応用し,指定した検索パターンを画像内から抽出する方法を提案する.また,精度の高い結果を得るための補正方法,検索結果画像の抽出について述べる.すべての処理は圧縮データを直接用い,原画像の情報は用いない.応用例として,人型の検索パターンを指定し,画像内から人間領域を抽出した

    Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE Problem

    Full text link
    Modern information communications use cryptography to keep the contents of communications confidential. RSA (Rivest-Shamir-Adleman) cryptography and elliptic curve cryptography, which are public-key cryptosystems, are widely used cryptographic schemes. However, it is known that these cryptographic schemes can be deciphered in a very short time by Shor's algorithm when a quantum computer is put into practical use. Therefore, several methods have been proposed for quantum computer-resistant cryptosystems that cannot be cracked even by a quantum computer. A simple implementation of LWE-based lattice cryptography based on the LWE (Learning With Errors) problem requires a key length of O(n2)O(n^2) to ensure the same level of security as existing public-key cryptography schemes such as RSA and elliptic curve cryptography. In this paper, we attacked the Ring-LWE (RLWE) scheme, which can be implemented with a short key length, with a modified LLL (Lenstra-Lenstra-Lov\'asz) basis reduction algorithm and investigated the trend in the degree of field extension required to generate a secure and small key. Results showed that the lattice-based cryptography may be strengthened by employing Cullen or Mersenne prime numbers as the degree of field extension.Comment: accepted in COMPSAC 2023 Workshop DSML: The 1st IEEE International Workshop on Data Science & Machine Learning for Cybersecurity, IoT & Digital Forensic

    A Questionnaire System with an Authentication Framework Considering Online Activities of Users

    Get PDF
    It is difficult to distribute online questionnaire adequately to those subjects who satisfy requirements of investigations. In addition, low questionnaire response rates, because of factors such as overlooking request emails and noncooperation to answer the questionnaires, sometimes annoy the investigators. Now that today’s organizational systems adopt a unified authentication framework of which logging function stores authentication records of users in federated systems, the possible solution for these problems arises by utilizing the log data and adding the questionnaire process to the framework. The present paper proposes a flow controlling mechanism arranged in a major unified authentication framework and describes how to utilize log data on the framework to select target persons for questionnaires and increase the response rates

    A Method to Detect Rogue Access Points in a Campus without Decrypting WLAN Frames

    Get PDF
    大学に無線LAN アクセスポイント(以下,AP と呼ぶ)を導入するに当り,許可を得ず接続されたAP や正規のAP を装ったAP 等の不正AP に関するセキュリティ上の課題が存在する.大学では,全学としてのネットワーク管理者(以下,全学ネットワーク管理者と呼ぶ)だけでなく,各サブネットワークごとに管理者を指定していることが多く,ネットワーク全体を把握している管理者が存在しない可能性がある.本論文では,全学ネットワーク管理者の視点で,サブネットワーク管理者との連携を追加で要することなく,検査対象AP のキャンパスネットワークへの接続の有無を判断することにより不正AP を検出する手法について提案する.提案手法では,Windows やAndroid 等のOS に導入されている,Captive Portal Detection(以下,CPD と呼ぶ)を利用する.キャンパスネットワークの上流と無線LAN 通信区間の二箇所におけるCPD 用HTTP 通信の時間差から,検査対象AP のキャンパスネットワークへの接続を確認する.なお,本手法では無線LAN での通信において,WPA2 等の復号を行わず推定している.評価実験では,提案手法によりネットワーク上流から見た各サブネットワークのIP アドレスと無線LAN クライアントが接続したAP の紐付けが可能であることを確認した

    Challenges and Improvements in a Workshop-Type Class in BYOD

    Get PDF
    医療系大学1 年生を対象とした実習型の講義「医療情報処理」が,個人PC を用いたBYOD (Bring Your Own Device) 環境でのワークショップ形式で,2017 年度前期と2018 年度前期に実施された。本講義は,前半は個人課題,後半はグループ課題となるよう設計されており,マナーやコミュニケーションの重要性についても学ぶ機会を提供している。BYOD 環境では,PC 環境の違いや情報リテラシーに対する個人差等が影響し,カリキュラム設計や教員側の人的資源に課題があったが,本研究では,グループ学習がこの問題を解消する可能性を示す。The workshop-type “Medical Informatics” classes were held with first-year dental students under BYOD (Bring Your Own Device) in the first semesters of 2017 and 2018. The classes were composed of two phases with personal exercises and group exercises. The group exercises aimed to provide opportunities for students to learn étiquette and communication skills. Under the BYOD environment, there were still some problems according to differences in the PC environment and individual ability. This research shows that it is possible to solve those issues with group learning

    Challenges and Improvements in a Workshop-Type Class in BYOD

    Get PDF
    医療系大学1 年生を対象とした実習型の講義「医療情報処理」が,個人PC を用いたBYOD (Bring Your Own Device) 環境でのワークショップ形式で,2017 年度前期と2018 年度前期に実施された。本講義は,前半は個人課題,後半はグループ課題となるよう設計されており,マナーやコミュニケーションの重要性についても学ぶ機会を提供している。BYOD 環境では,PC 環境の違いや情報リテラシーに対する個人差等が影響し,カリキュラム設計や教員側の人的資源に課題があったが,本研究では,グループ学習がこの問題を解消する可能性を示す。The workshop-type “Medical Informatics” classes were held with first-year dental students under BYOD (Bring Your Own Device) in the first semesters of 2017 and 2018. The classes were composed of two phases with personal exercises and group exercises. The group exercises aimed to provide opportunities for students to learn étiquette and communication skills. Under the BYOD environment, there were still some problems according to differences in the PC environment and individual ability. This research shows that it is possible to solve those issues with group learning

    ドイツ ライプチヒ ガクハ トレーニング カガク ノ セイリツ カテイ ニ カンスル キソテキ ケンキュウ 1

    Get PDF
    The Purpose of this paper as a first report is to show the theoretical change and development of the Applied Trainingscience in the GDR. The following kind of result was obtained : 1. About data and documents collection 1) "Theorie und Praxis der Leistungssport (theory and practice of elite sport)(1963-1990)". This is reserch bulletin of the Reserch Institute for Physical Culture and Sport in the GDR. 2) Concerning the textbook, it could collect typical ones, "Trainingswissenschaft (trainingscience)"(1994, 1997, 2003), "Bewegungslehre-Sportmotorik (movement theory-sport kinematics)"(1960, 1976, 1987), "Sportmotorik"(1978, 1984, 1987), 3) Concerning the research report, the reporst as not yet publication of the Reserch Institute for Physical Culture and Sport laboratory was collected on the Applied Trainingscience Center in Germany. 4) Concerning the textbook of the German College for Physical Culture and Sport in Leipzig, typical ones were collected. 5) Concerning doctor qualification dissertation, it could collect typical ones every of area. 2. About the study on terminology of trainingscience 2. 1. One of th feature of the Leipziger\u27 trainingscience is the development of terminology. Proposing the terminology of, for example, "performance prerequisite", "performance structure", "performance execution" and so on, the Sporttrainer observes the performance with the tournament scene and in order to be able to analyze, supports. 2. 2. About an interdisciplinary sport-specific approach to the benefit of athletic performance.This approach emphasized the individual case aspect. This individual case study is seriously considered as a central research modulo of the trainingscience which designates the trainingsystem of the multi primary factors as the object. 3. Directing to future research East German sportsscience research system is suggest as the case as part of a link between theory and practice in educational actibities. But accumulation of the research was restricted being enormous. In the future the detailed data analysis in each field becomes necessary

    1-year tolvaptan efficacy in ADPKD

    Get PDF
    Autosomal dominant polycystic kidney disease (ADPKD) develops into end-stage kidney disease by 65 years of age in an estimated 45%-70% of patients. Recent trials revealed that tolvaptan inhibits disease progression both in early-stage or late-stage ADPKD ; however, stratified analysis showed a difference of favorable factors correlated with tolvaptan efficacy between early-stage and late-stage ADPKD. Thus, we examined the efficacy of tolvaptan in ADPKD with a wide range of estimated glomerular filtration rates (eGFR). We enrolled 24 patients with eGFR 35.3 (28.0-65.5) ml / min / 1.73m2 and evaluated treatment effect as ΔΔeGFR (ml / min / 1.73m2 / year) or ΔΔtotal kidney volume (TKV) (% / year) that was calculated as post-treatment annual change - pre-treatment annual change. Pre ΔeGFR was significantly low in eGFR responders, defined as ΔΔeGFR > 0 ml / min / 1.73m2 / year. In eGFR responders, pre ΔeGFR, post ΔeGFR, eGFR, TKV, and proteinuria were significantly correlated with ΔΔeGFR. In TKV responders defined as ΔΔTKV > 5 % / year, we identified hypertension history, proteinuria, TKV, and post ΔTKV as significantly correlated factors with ΔΔTKV. In conclusion, pre ΔeGFR may be a predictive factor of therapeutic efficacy on kidney function. Tolvaptan may have greater efficacy in early-stage ADPKD with rapid GFR decline or with well-controlled blood pressure
    corecore