摘要:
A content recommendation system includes: an attribute value storage means which stores one or more attribute values of attributes for each content; a preference distribution storage means which stores a user preference degree for each attribute value; an attribute value acquisition means which acquires an attribute value of at least one attribute for each content; a preference distribution update means which updates the storage contents in the preference distribution storage means in accordance with the acquired attribute value; a condition determination means which selects an attribute value of one or more attributes in accordance with probability based on the user preference degree stored in the preference distribution storage means and determines the condition of the attribute value of the one or more attributes in accordance with the selected attribute value; and a content selection means which selects some or all of the contents in accordance with the determined condition.
摘要:
An information processing system that includes a user interface that receives an input by a user; a life rhythm analyzing unit that analyzes the user's life rhythm based on information collected by a sensor for the analysis; and a content transmitting unit that acquires the input and analysis result of the life rhythm of the user from the life rhythm analyzing unit and provides content based on the input and the analysis result.
摘要:
A scalar multiplication can be performed on an elliptic curve cryptosystem at a high speed. P is set as an initial value of Q[0], and 2×P is set as an initial value of Q[1]. An elliptic curve doubling ECDBL of Q[d[i]] is performed, and an arithmetic result is stored in Q[2]. An elliptic curve addition ECADD of Q[0] and Q[1] is performed, and an arithmetic result is stored in Q[1]. Q[2−d[i]] is stored in Q[0]. Q[1+d[i]] is stored in Q[1]. The elliptic curve addition ECADD and the elliptic curve doubling ECDBL are concurrently performed in the respective processors.
摘要:
In a robot device, an action selecting/control system includes a plurality of elementary action modules each of which outputs an action when selected. An activation level calculation unit calculates an activation level AL of each elementary action on the basis of information from an internal-state manager and external-stimulus recognition unit and with reference to a data base. An action selector selects an elementary action whose activation level AL is highest as an action to be implemented. Each action is associated with a predetermined internal state and external stimulus. The activation level calculation unit calculates an activation level AL of each action on the basis of a predicted satisfaction level variation based on the level of an instinct for an action corresponding to an input internal state and a predicted internal-state variation predictable based on an input external stimulus.
摘要:
A behavior control system for a robot apparatus that operates autonomously. The behavior control system includes a plurality of behavior description sections for describing motions of the robot and an external environment recognition section. The system also includes an internal state management section for managing an internal state of the robot in response to the recognized external environment and/or a result of execution of a behavior, and for managing emotions. A behavior evaluation section evaluates execution of behaviors in response to the external environment and/or the internal state.
摘要:
A decryption method of decrypting a plaintext m from a secret exponent d, a public key n, and a ciphertext c includes steps of converting the ciphertext c into a randomized ciphertext t, a step of converting the randomized ciphertext t into a randomized plaintext u, and steps of converting the randomized plaintext u into the plaintext m.
摘要:
A system and method for achieving secure and fast computation in hyperelliptic cryptography is realized. Fast scalar multiplication is achieve by executing computing operations including halving as computing processing in scalar multiplication with respect to a divisor D in hyperelliptic curve cryptography. For example, computing operations including halving are executed in scalar multiplication with respect to a divisor D on a hyperelliptic curve of genus 2 in characteristic 2 having h(x)=x2+x+h0, f4=0 as parameters, a hyperelliptic curve of genus 2 in characteristic 2 having h(x)=x2+h1x+h0, f4=0 as parameters, or a hyperelliptic curve of genus 2 in characteristic 2 having h(x)=x as a parameter. Further, reduced complexity and faster computation are realized through the application of a table that records which of k1, k1′, (k0, k0′) is correct on the basis of a computed value of [½iD] with respect to a fixed divisor D, and through a reduction in the number of inversion operations.
摘要翻译:实现了在超椭圆密码学中实现安全快速计算的系统和方法。 通过执行计算操作来实现快速标量乘法,包括在超椭圆曲线密码学中相对于除数D的标量乘法中的计算处理减半。 例如,包括减号的计算操作在具有h(x)= x2 + x + h 的特征2中的类2的超椭圆曲线上相对于除数D的标量乘法执行, 0,f 4,= 0作为参数,特征2中具有h(x)= x2 + h1的特征2的超椭圆曲线 或作为参数的特征2中的属2的超椭圆曲线,其中h(x)= x作为参数,x + h <0>,f 4 。 此外,降低的复杂度和更快的计算是通过应用一个表来实现的,该表记录了k 1,k 1,..., 基于相对于固定除数D的计算值,对于固定除数D,通过减少数量 反演操作。
摘要:
A recording and reproducing apparatus includes: a broadcast data holding unit that holds recorded broadcast data; a music data detecting unit that detects a start time and an end time of music data included in the broadcast data; a first song information acquiring unit that acquires first song information concerning the music data on the basis of the music data; an association information creating unit that creates information in which the music data, the broadcast data from the start time to the end time of the music data, and the first song information are associated with one another; and an association information holding unit that holds the information.
摘要:
A secret communication and authentication scheme based on a public key cryptosystem in which a decryption speed is improved while maintaining a security level. In the RSA type secret communication, a plaintext is expressed in a form of a k-digit base n number and a ciphertext is obtained by applying a calculation using the first public key n and the second public key e to the base n number and transmitted. Then, from the received ciphertext, a lowest digit of the base n number is decrypted by using the first public key n and the second secret key d, upper digits of the base n number are sequentially decrypted by using a decrypted value of the lowest digit of the base n number at the receiver side, and the plaintext is recovered by using decrypted values of respective digits of the base n number. The Rabin type secret communication can also be realized by the similar scheme. Moreover, the same principle of the base n pubic key cryptosystem can also be used in realizing the RSA type or the Rabin type Authentication.