詳細検索結果
以下の条件での結果を表示する: 検索条件を変更
クエリ検索: %22Google Chrome%22
2,026,994件中 1-20の結果を表示しています
  • Ro
    22
    -8181皮膚科研究会
    西日本皮膚科
    1987年 49 巻 5 号 902-911
    発行日: 1987/10/01
    公開日: 2012/03/10
    ジャーナル 認証あり
    帯状疱疹に対するRo
    22
    -8181の有効性, 安全性および有用性を検討するため, ヒト血清アルブミンを対照薬として, 二重盲検比較試験を行つた。皮膚症状の観察項目別の改善率では, 水疱·膿疱において投与開始後5日目でRo
    22
    -8181群70%, placebo群50%で, 両群間に差(p<0.05)が認められた。皮膚症状改善度の推移を著明改善以上の症例についてみると, 投与開始後4日目の著明改善率はRo
    22
    -8181群8%, placebo群0%であり, Fisherの直接計算法で両群間に差(p<0.05)が認められた。また, 投与開始後5日目の著明改善率はRo
    22
    -8181群15%, placebo群3%であり, κ2 検定で両群間に差(p<0.05)が認められた。主治医による有効性の判定ではU検定でRo
    22
    -8181群が優れている傾向が認められた。主治医による安全性の判定では副作用発現率がRo
    22
    -8181群83%, placebo群14%であり, U検定で両群間に差(p<0.001)が認められた。主治医による有用性の判定ではU検定で両群間に差は認められなかつた。以上の結果より, 帯状疱疹に対し, Ro
    22
    -8181は皮疹のうち水疱·膿疱に対して有効であり, 主治医判定でも有効性が認められたが, 安全性については本薬剤の耐薬性が示されたものの副作用の発現率が高かつたため, 有用性は高くないと考えられた。
  • 森谷 博之
    リアルオプションと戦略
    2020年 11 巻 1 号 17-22
    発行日: 2020年
    公開日: 2020/04/15
    研究報告書・技術報告書 フリー
    CTAの行政上の取り扱い、歴史、投資戦略等をまず簡単に説明する。CTAとは金融先物、オプション、スワップを対象とした取り引きに関する投資のアドバイスやサービスを個人、ファンドに提供する個人、または組織に対する金融行政上の用語で、正式名はCommodity trading advisorである。CTAという用語は投資信託、ETFを含むヘッジファンド、プライベートファンドへの投資アドバイスにも適応される。CTAs は米国連邦政府による規制対象であり Commodity Futures Trading Commission (CFTC) への登録と National Futures Association (NFA) のメンバーになることが義務付けられている。また、CTAはヘッジファンドの投資スタイルのひとつ (Global Macro) でもある。
  • The Japan Society for Occupational Health May
    22
    , 2019
    Environmental and Occupational Health Practice
    2019年 1 巻 2 号 61-94
    発行日: 2019年
    公開日: 2019/12/28
    [早期公開] 公開日: 2019/12/04
    ジャーナル フリー HTML

    The Japan Society for Occupational Health (JSOH) recommends the Occupational Exposure Limits (OELs) as reference values for preventing adverse health effects on workers caused by occupational exposure to chemical substances, continuous or intermittent noise, impulsive or impact noise, heat stress, cold stress, whole-body vibration, hand-arm vibration and time-varying electric, magnetic and electromagnetic fields and ultraviolet and ionizing radiation.

  • 情報管理
    2008年 51 巻 7 号 538-540
    発行日: 2008年
    公開日: 2008/10/01
    ジャーナル フリー
  • 22
    回日本コンピュータ外科学会大会座長
    日本コンピュータ外科学会誌
    2013年 15 巻 3 号 293-296
    発行日: 2013/11/15
    公開日: 2014/03/31
    ジャーナル フリー
  • A. SRIVASTAVA, H.P. GUPTA, I.S. MATHUR, S.K. GUPTA
    The Journal of General and Applied Microbiology
    1971年 17 巻 3 号 251-257
    発行日: 1971年
    公開日: 2006/08/16
    ジャーナル フリー
    Intracerebral injection of vegetative myxamoebae of strains of Polysphondylium pallidum caused 80 to 100% mortality in mice, whereas a 30 to 50% mortality occurred with strains of Dictyostelium giganteum and D. mucoroides. Death is attributable to an unidentified toxic factor. Histopathologically a giant cell formation was seen in the spleen of mice. This cell was different from Langerhan's or foreign body giant cell. Rats injected intracerebrally behaved similarly. Intranasal instillation of myxamoebae in guinea pigs caused transient pneumonia. Myxamoebae do not multiply in the brain tissues of mice or rats, or in the lungs of guinea pigs.
    Intranasal instillation of vegetative myxamoebae is less pathogenic than free living amoebae like Hartmanella culbertsoni, H. rhysodes, Naegleria sp. (Culbertson strain HB-1), or Naegleria aerobia.
  • Guannan HU, Kensuke FUKUDA
    IEICE Transactions on Communications
    2023年 E106.B 巻 2 号 156-165
    発行日: 2023/02/01
    公開日: 2023/02/01
    [早期公開] 公開日: 2022/08/02
    ジャーナル 認証あり

    Increased demand for DNS privacy has driven the creation of several encrypted DNS protocols, such as DNS over HTTPS (DoH), DNS over TLS (DoT), and DNS over QUIC (DoQ). Recently, DoT and DoH have been deployed by some vendors like

    Google
    and Cloudflare. This paper addresses privacy leakage in these three encrypted DNS protocols (especially DoQ) with different DNS recursive resolvers (
    Google
    , NextDNS, and Bind) and DNS proxy (AdGuard). More particularly, we investigate encrypted DNS traffic to determine whether the adversary can infer the category of websites users visit for this purpose. Through analyzing packet traces of three encrypted DNS protocols, we show that the classification performance of the websites (i.e., user's privacy leakage) is very high in terms of identifying 42 categories of the websites both in public (
    Google
    and NextDNS) and local (Bind) resolvers. By comparing the case with cache and without cache at the local resolver, we confirm that the caching effect is negligible as regards identification. We also show that discriminative features are mainly related to the inter-arrival time of packets for DNS resolving. Indeed, we confirm that the F1 score decreases largely by removing these features. We further investigate two possible countermeasures that could affect the inter-arrival time analysis in the local resolver: AdBlocker and DNS prefetch. However, there is no significant improvement in results with these countermeasures. These findings highlight that information leakage is still possible even in encrypted DNS traffic regardless of underlying protocols (i.e., HTTPS, TLS, QUIC).

  • Sayanth Sudheer, Heshalini Rajagopal, Azam Mohammed Al-Qussari, Norrima Mokhtar
    Journal of Advances in Artificial Life Robotics
    2023年 4 巻 1 号 59-62
    発行日: 2023年
    公開日: 2023/09/22
    ジャーナル オープンアクセス
    We realize we've misplaced our keys and are frustrated by a massive search of the house. This paper develops a simple IoT-based key discovery method that uses a NodeMCU, a buzzer, and a battery. The method involved creating a key management method designed for key installation and developing a website to assist with key location. With her
    Google
    Chrome
    browser on the user's mobile phone, she can pinpoint the location of the lost key. When the website presses the key search button, it will play an IoT key-related beep and save time by streamlining the process. If you misplace your keys, you may search all over the house, but in the end, you may not be able to find them. This paper is extremely important in that it has developed a method for quickly finding keys using the method described above.
  • 日本科学教育学会第
    22
    回年会実行委員会
    科学教育研究
    1999年 23 巻 2 号 138-152
    発行日: 1999/06/10
    公開日: 2017/06/30
    ジャーナル フリー
    The
    22
    nd Annual Meeting of Japan Society for Science Education (JSSE) was held on July 29-31, 1998 at Tokyo Gakugei University in western suburb of Tokyo with about 290 registrants under the main theme of "Towards Implementation of Science Curriculum for Construction of Creation and Symbiosis." Number of papers over 210 were presented in both main sessions and general presentations. There were two symposiums, one lecture, one forum, one international forum, one workshop, three sessions of themes set by the steering committee and ten sessions of themes set independently by members of JSSE in main sessions. Also, there were many other general presentations. Many papers were presented coping with the main theme. They were a lecture related to learning and creativity based on advance of brain, and many presentations related to symbiosis such as relation between in-door and out-door school activities, school based research activities such as curriculum development, and way of finding new methodology of research on classroom, consistency of curriculum through elementary to high school, pre-service teacher education, and so on. Contents of claims and discussions in every presentation in main sessions are summarized in this paper.
  • 森谷 博之
    人工知能学会第二種研究会資料
    2017年 2017 巻 FIN-019 号 09-
    発行日: 2017/10/14
    公開日: 2022/12/17
    研究報告書・技術報告書 フリー

    A financial market is a diversified dynamical system with many constraints, and price movements are modeled in terms of the micro properties of each transactions and the macro properties of dynamical systems. These two properties must be bridged by the multiplicity. The model forcuses on the size of tick and the number of transactions with the price movement compared with the previous transctions and explains stochastic nature of short-term volatilities and persistently stable long-term volatilities as a results of unique behaviour of heterogeneous market participants.

  • —限られた研究時間をより効率的に—
    野村 紀匡, 辻 幸子
    薬学図書館
    2019年 64 巻 3 号 162-165
    発行日: 2019/07/31
    公開日: 2023/05/24
    ジャーナル フリー

    Kopernio(コペルニオ)は,ワンクリックで文献の本文(フルテキストPDF)へのアクセスを可能にする無料のブラウザー拡張機能で,2万を越える出版社サイト・文献検索データベース・検索サイトで作動する。学術論文の電子化が進んだことで,正規のルートを無視した学術論文本文の入手経路が問題になっている。また,正規のルートでダウンロードする場合も,本文に到達するまでにかなりの回数クリックする必要があったり,そもそもダウンロードできるかどうかもわからないまま時間を浪費したりすることすらある。Kopernioはこうした問題のソリューションになると期待できる。本稿ではKopernioが求められる背景とサービスの概要を紹介する。

  • 大野 ふみ, 阿部 厚, 木下 篤敬, 桂木 明子, 関 泰, 栗田 賢一
    日本口腔外科学会雑誌
    2005年 51 巻 6 号 291-294
    発行日: 2005/06/20
    公開日: 2011/04/22
    ジャーナル フリー
    DiGeorge syndrome (DGA), velocardiofacial syndrome (VCFS), and conotruncal anomaly face syndrome (CTAF) are frequently associated with
    22
    q11.2 deletion syndrome. We report two cases of
    22
    q11.2 deletion syndrome. Two patients had cleft palate, and facial dysmorphism. Fluorescence in situ hybridization (FISH) was used to show deletion of chromosome
    22
    q11.2. Palatoplasty was performed at about two years of age with the patients under general anesthesia. The postoperative course was uneventful in both patients.
  • Hyungkyu LEE, Younho LEE, Changho SEO, Hyunsoo YOON
    IEICE Transactions on Communications
    2018年 E101.B 巻 9 号 1982-1996
    発行日: 2018/09/01
    公開日: 2018/09/01
    [早期公開] 公開日: 2018/03/23
    ジャーナル 認証あり

    We propose a method for efficiently detecting phishing attacks in mobile environments. When a user visits a website of a certain URL, the proposed method first compares the URL to a generated whitelist. If the URL is not in the whitelist, it detects if the site is a phishing site based on the results of

    Google
    search with a carefully refined URL. In addition, the phishing detection is performed only when the user provides input to the website, thereby reducing the frequency of invoking phishing detection to decrease the amount of power used. We implemented the proposed method and used 8315 phishing sites and the same number of legitimate websites for evaluating the performance of the proposed method. We achieved a phishing detection rate of 99.
    22
    % with 81.
    22
    % reduction in energy consumption as compared to existing approaches that also use search engine for phishing detection. Moreover, because the proposed method does not employ any other algorithm, software, or comparison group, the proposed method can be easily deployed.

  • 情報メディア学会 第
    22
    回研究大会企画委員会
    情報の科学と技術
    2023年 73 巻 11 号 520-521
    発行日: 2023/11/01
    公開日: 2023/11/01
    ジャーナル オープンアクセス
  • Daiki CHIBA, Ayako AKIYAMA HASEGAWA, Takashi KOIDE, Yuta SAWABE, Shigeki GOTO, Mitsuaki AKIYAMA
    IEICE Transactions on Information and Systems
    2020年 E103.D 巻 7 号 1493-1511
    発行日: 2020/07/01
    公開日: 2020/07/01
    ジャーナル フリー

    Internationalized domain names (IDNs) are abused to create domain names that are visually similar to those of legitimate/popular brands. In this work, we systematize such domain names, which we call deceptive IDNs, and analyze the risks associated with them. In particular, we propose a new system called DomainScouter to detect various deceptive IDNs and calculate a deceptive IDN score, a new metric indicating the number of users that are likely to be misled by a deceptive IDN. We perform a comprehensive measurement study on the identified deceptive IDNs using over 4.4 million registered IDNs under 570 top-level domains (TLDs). The measurement results demonstrate that there are many previously unexplored deceptive IDNs targeting non-English brands or combining other domain squatting methods. Furthermore, we conduct online surveys to examine and highlight vulnerabilities in user perceptions when encountering such IDNs. Finally, we discuss the practical countermeasures that stakeholders can take against deceptive IDNs.

  • Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori
    Journal of Information Processing
    2023年 31 巻 620-642
    発行日: 2023年
    公開日: 2023/09/15
    ジャーナル フリー

    Modern Web services provide advanced features by utilizing hardware resources on the user's device. Web browsers implement a user consent-based permission model to protect user privacy. In this study, we developed PERMIUM, a web browser analysis framework that automatically analyzes the behavior of permission mechanisms implemented by various browsers. We systematically studied the behavior of permission mechanisms for

    22
    major browser implementations running on five different operating systems. We found fragmented implementations. Implementations between browsers running on different operating systems are not always identical. We determined that implementation inconsistencies could lead to privacy risks. We identified gaps between browser permission implementations and user perceptions from the user study corresponding to the analyses using PERMIUM. Based on the implementation inconsistencies, we developed two proof-of-concept attacks and evaluated their feasibility. The first attack uses permission information to secretly track the user. The second attack aims to create a situation in which the user cannot correctly determine the origin of the permission request and the user mistakenly grants permission. Finally, we clarify the technical issues that must be standardized in privacy mechanisms and provide recommendations to OS/browser vendors to mitigate the threats identified in this study.

  • 檜垣 貴哉
    アレルギー
    2020年 69 巻 9 号 897-899
    発行日: 2020年
    公開日: 2020/11/13
    ジャーナル フリー
  • Haruo Toda, Yuko Shiga
    Niigata Journal of Health and Welfare
    2020年 20 巻 2 号 113-126
    発行日: 2020年
    公開日: 2021/05/13
    ジャーナル フリー HTML

    In education on medical- or medical-related disciplines, effective student practice is acutely important. A computer-aided practice is a possible solution for effective student practice. However, installing laboratory-made applications is troublesome and even can cause security faults. Therefore, other convenient and secure methods are preferable. HTML5, the latest web standard, includes a canvas element that can be programmed in JavaScript language for two-dimensional dynamic drawings. Most modern web browsers, which are installed on computers and mobile devices, support this standard. Utilizing this feature, the study ported the Hodgkin and Huxley membrane model simulators for personal computers or Android devices into HTML5 capable devices and tested it in a student practice and evaluated the students' acceptance for the practice. The HTML5-based simulator readily run on the preliminary testing environments and students' devices (mainly iPhones or iPads) in actual practice. However, increased student involvement through additional interactivity of the application may be required for a better understanding of the topic.

  • ―中小飲食企業4 事例のケース・スタディに基づいて―
    足立 洋, 岸保 宏
    中小企業会計研究
    2019年 2019 巻 5 号 35-45
    発行日: 2019年
    公開日: 2020/10/05
    ジャーナル オープンアクセス

     本稿では,中小企業経営者が自社の管理会計実践に対して抱いている認識について検討する。先行研究では,自らは管理会計を実施していないと認識していながらも自社の財務的業績の推移を確認している中小企業経営者が一定数存在していることが明らかにされている(朝原 2010)。本稿ではこれを受けて,飲食企業4 事例のケース・スタディにより,経営者が認識していないにもかかわらず管理会計が実践されている可能性を考察したい。そして,経営者自身が会計プロセスの一部分しか担っていない場合には,経営者が自社において管理会計を実践していることを認識しない場合があることを示す。そのうえで,中小企業における管理会計の実態をより正確に理解するためには,会計情報の生成・ 利用プロセスにとどまらず,企業活動の管理のための情報の生成・利用プロセスというより広範な観点からの調査が必要と考えられることを論じる。

  • -講義科目および実験実習の準備学習での活用事例-
    *大嶋 正人
    工学教育研究講演会講演論文集
    2020年 2020 巻 2A02
    発行日: 2020年
    公開日: 2020/10/23
    会議録・要旨集 フリー
feedback
Top