| Âê̾ | Â絬ÌϺҳ²»þ¤Σ³GÄ̿®ÉԲÄǽ¥¨¥ꥢ¤ˤª¤±¤ë¾ðÊóȯ¿®¤ª¤è¤Ӽý½¸¤ò²Äǽ¤Ȥ¹¤ëDTN¥١¼¥¹¥á¥å»¡¼¥¸Ãæ·Ñˡ¤ÎÄó°ƤÈɾ²Á |
| Ãø¼Ô | ¾®»³ ͳ (ÆàÎÉÀèü²ʳص»½ÑÂç³ر¡Âç³Ø), *¿åËÜ °°ÍÎ (ÆàÎÉÀèü²ʳص»½ÑÂç³ر¡Âç³ء¤ÆüËܳؽѿ¶¶½²ñÆÃÊ̸¦µæ°÷£ģÃ), °ÂËÜ ·İì (ÆàÎÉÀèü²ʳص»½ÑÂç³ر¡Âç³Ø) |
| Page | pp. 26 - 33 |
| Keyword | ºҳ²»þÄ̿®, DTN, Social Networking Service, ¤¹¤ì°㤤Ä̿®, ¥롼¥ƥ£¥ó¥° |
| Abstract | ËܹƤǤϡ¤Â絬ÌϺҳ²ȯ¤ˤè¤ꥻ¥ë¥éÄ̿®¤¬ÍøÍÑÉԲÄǽ¤ˤʤä¿Ãϰè¤ˤª¤¤¤Ƥ⡤¥¹¥ޡ¼¥ȥե©¥ó¤òÍѤ¤¤ưÂÈݳÎǧ¾ðÊó¤ÎÁª¤è¤ӼèÆò²Äǽ¤ˤ¹¤ëDTN¡ÊDisruption/ Delay Tolerant Networking¡ˤ˴ð¤Ť¤¤¿¥á¥å»¡¼¥¸Ãæ·Ñˡ¤òÄó°Ƥ¹¤롥Äó°Ƽêˡ¤Ǥϳƥ桼¥¶¤Υ»¥ë¥éÄ̿®¾Ȼþ¹ï¤ò´ޤ°ÜưÍúÎò¤˲䨡¤¾¥桼¥¶üËö¤ȤÎÁø¶øÍúÎò¤òµϿ¤··Ðϩɽ¤òºî¤¹¤롥¤³¤ηÐϩɽ¤òÍøÍѤ·¡¤¤è¤êû¤¤»þ´֤ÇÅþ㤹¤ë²Äǽ¤ι⤤¥桼¥¶¤إá¥å»¡¼¥¸¤òÃæ·Ѥ¹¤뤳¤Ȥǥ»¥ë¥éÄ̿®¤¬²Äǽ¤ʥ¨¥ꥢ¤ª¤è¤ÓÆÃÄê¥桼¥¶¤˸þ¤±¤ƸúΨ¤褯¥á¥å»¡¼¥¸¤òÇÛÁ롥¸½¼ÂŪ¤ʥޥåפª¤è¤ӥâ¥ӥê¥ƥ£¥â¥ǥë¤òÍѤ¤¤¿·»µ¡¥·¥ߥå¥졼¥·¥ç¥ó¤ò¹Ԥ¤¡¤¥á¥å»¡¼¥¸ÅþãΨ¤ʤɤ˴ؤ·¤ƥ¨¥ԥǥߥ寥롼¥ƥ£¥ÈÈæ³Ӥò¹Ԥä¿·ë²̡¤Ä̿®²Äǽ¤ʥ¨¥ꥢ¤ÈÄ̿®ÉԲÄǽ¤ʥ¨¥ꥢ¤Υ桼¥¶¤ؤΥá¥å»¡¼¥¸Ãæ·Ѥˤª¤¤¤ơ¤¤½¤줾¤ìÅþãΨ¤¬80%¡¤70%¤ȡ¤¥¨¥ԥǥߥ寥롼¥ƥ£¥ËɤŨ¤¹¤ëǽ¤ò㤷¤¿¾å¤ǡ¤¸µ¤줿Áí¥á¥å»¡¼¥¸¿ô¤¨¥ԥǥߥ寥롼¥ƥ£¥ËÈæ¤١¤¤½¤줾¤ì30%¡¤45%º︺¤¹¤뤳¤Ȥ¬¤Ǥ¤¿¡¥ |
| Âê̾ | ÂѺҳ²NDN¥١¼¥¹ʬ»¶·¿¥¢¥ץꥱ¡¼¥·¥ç¥ó¤ξðÊóÅÁãǽ¤ËÂФ¹¤ë¥桼¥¶°Üư¥â¥ǥë¤αƶÁɾ²Á |
| Ãø¼Ô | *¾®²ϸ¶ ·ò, À ·½Çî, Àõ¸« Ű (ÅìµþÂç³ØÂç³ر¡¾ðÊóÍý¹©³طϸ¦µæ²Ê) |
| Page | pp. 34 - 42 |
| Keyword | P2P, Named Data Networking, ³¬Áط¿ID¥١¼¥¹°Źæ, ÂѺҳ²¥¢¥ץꥱ¡¼¥·¥ç¥ó |
| Abstract | ºҳ²»þ¤ˤª¤¤¤Ƥϡ¤°ÂÈݳÎǧ¤äÈïºҾʤɼþ°ϾÎŪ³ΤÊÇİ®¤¬Èﳲ³ÈÂç¤òËɤ°¾å¤ǽÅÍפȤʤ롥¤·¤«¤·¤ʤ¬¤顤¤½¤Τ褦¤ʾðÊó¤ÎÅÁã¤òô¤¦·ÈÂÓÅÅÏÃÌ֤ʤɤÎÄ̿®¥¤¥ó¥եé¤ÏÂ絬ÌϤʺҳ²»þ¤ˤϵ¡ǽ¤·¤ʤ¤¤³¤Ȥ¬¿¤¤¡¥¤½¤θ¶°ø¤ΰì¤Ĥϡ¤¸½ºߤξðÊó¥եé¤ϡ¤¥µ¡¼¥ӥ¹¤òΤè¤ӴÉÍý¤¹¤륵¡¼¥Ф¬ÍøÍѤǤ¤ʤ¯¤ʤë¤ȡ¤´ðÃ϶ɤȤ¤¤ä¿ËöüÀßÈòºߤǤⵡǽ¤·¤ʤ¯¤ʤ롤¥»¥¼½¸Ã淿¤ι½¤¤ò¤ȤäƤ¤¤뤳¤ȤǤ¢¤롥Ëܸ¦µæ¤Ǥϡ¤ºҳ²»þ¤ËÃÇÀþ¤ʤɤˤè¤ꥵ¡¼¥ÐÎबÍøÍѤǤ¤ʤ¯¤ʤ俾ì¹ç¤ˤ⡤´ðÃ϶ɤʤɻĸ¤·¤¿ÀßÈ÷¤òÍøÍѤ·¤ƶɽêŪ¤ʥͥåȥ¥¯¤ò¹½Ãۤ·¡¤¥µ¡¼¥ӥ¹¤ò·Ñ³¤µ¤»¤뤳¤ȤòÌܻؤ¹¡¥¤½¤Τ¿¤á¤ˡ¤Named Data Networking(NDN)¤ˤè¤꼫Ωʬ»¶·¿¥ͥåȥ¥¯¤ò¹½Ãۤ·¡¤Hierarchical ID-Based Encryption(HIDE)¤ˤè¤뼫Χǧ¾ڤò¹Ԥ¦¤³¤Ȥǡ¤ºҳ²»þ¤ˤâÄ̾ï»þƱÍͤËÍøÍѤǤ¤륵¡¼¥ӥ¹¤ª¤è¤ӥ¢¥ץꥱ¡¼¥·¥ç¥ó¤ò¹½¤·¤¿¡¥ ËܹƤǤϡ¤¥桼¥¶¤ιÔư¥â¥ǥ뤬¥¢¥ץꥱ¡¼¥·¥ç¥ó¤ξðÊóÅÁãǽ¤ØͿ¤¨¤ë±ƶˤĤ¤¤ƥ·¥ߥå¥졼¥·¥ç¥ó¤ˤè¤êĴºº¤·¤¿¡¥ |
| Âê̾ | ºҳ²¤ˤè¤ë¥ͥåȥ¥¯ÉÔÀܳ»þ¤ÎDelay/Disruption Tolerant NetworkÀܳ¤òÍѤ¤¤¿°ÂÈݾðÊóÁ÷¿®ˡ |
| Ãø¼Ô | *»³²¼ ÎÊÇÏ, ¹⸫ °ì (ÁϲÁÂç³Ø ¹©³ØÉô ¾ðʹ¥ƥ³زÊ) |
| Page | pp. 43 - 48 |
| Keyword | Delay/Desruption Tolerant Network, ̵ÀþÄ̿®, ¾ðÊó±¿È¼Ô, ºҳ², °ÂÈݳÎǧ |
| Abstract | ¹°èºҳ²¤Ǥϡ¤ÀßÈ÷¾㳲¡¤ÅÅÎÏÉÔ¤Τ¿¤á·ÈÂÓÅÅÏÃÅù¤θø¶¦¤ι⤤Ä̿®¤ϡ¤¤¤¤Ĥâ¤Τ褦¤ˤÏÍøÍѤǤ¤ʤ¯¤ʤꡤÈïºÒÃϰèÆâ¤ΰÂÈݳÎǧ¤˻پ㤿¤¹¤³¤Ȥ¬ͽÁۤµ¤ì¤롥ËܹƤǤϡ¤ÈïºҼԤ¬·ÈÂÓüËö¤òÊݻý¤·¤Ƥ¤¤뤳¤ȤòÁÛÄꤷ¡¤¤½¤ì¤é¤ÎüËö¤ȵ߽õ¼ԤηÈÂÓüËöµڤÓÈòÆñ½ꥵ¡¼¥Ф¬DTN(Delay/Disruption Tolerant Network)¤ò¹½Ãۤ·¡¤°ÂÈݾðÊó¤ò½¸Ì뤿¤á¤ÎÈïºҼԤȾðÊó±¿È¼ԤγÆüËö´ֵڤӾðÊó±¿È¼ԤÈÈòÆñ½ê¤ÎüËö¤ȥµ¡¼¥д֤γƥץí¥ȥ³¥ë¤òÌ⽤·¤¿¡¥¤ޤ¿¡¤¥ͥåȥ¥¯¥·¥ߥå¥졼¥¿¤ËÄó°ƥץí¥ȥ³¥ë¤ò¼ÂÁơ¤1. 2km2¤ÎÈïºÒÃϰè¤ËÈïºҼԤò¥é¥ó¥à¤ËʬÉۤµ¤»¤¿¥â¥ǥë¤ò¹½Ãۤ·¤¿¡¥ÈïºҼԿðÊó±¿È¼Կô¡¤Åù¤òÊѲ½¤µ¤»¡¤°ÂÈݾðÊó¤ÎÈòÆñ½ê¤ޤǤÎÅþãΨ¤ȥǡ¼¥¿½¸Ìó²áÄø¤òɾ²·¡¤ÈïºҼԿô¤Î1/5ÄøÅ٤ξðÊó±¿È¼ԤòÇÛÈì¤С¤°ÂÈݾðÊó¤ò95¡ó°ʾ彸Ìó¤Ǥ¤뤳¤Ȥò³Îǧ¤·¤¿¡¥ |
| Âê̾ | ¸ÉΩLAN¤«¤é¤ÎHTTPÄ̿®¤ˤè¤륤¥¼¥ͥåÈÀܳ¤Τ¿¤á¤ÎMANETÃæ·ÑÊý¼° |
| Ãø¼Ô | *¿å ÌÀ, Åù¡¹ÎÏ ¹¨Ƿ, ¹⸫ °ì (ÁϲÁÂç³Ø ¹©³ØÉô ¾ðʹ¥ƥ³زÊ) |
| Page | pp. 49 - 55 |
| Keyword | MANET, ¸ÉΩLAN, HTTP, ¥롼¥ƥ£¥ó¥°, ¥¢¥ɥ쥹ÊѴ¹ |
| Abstract | ¶áǯ¡¤¸ÇÄꥤ¥ó¥եé¤òɬÍפȤ»¤º¡¤°ÜưüËöƱ»ΤÎľÀÜÄ̿®¤ˤè¤ꡤ°ì»þŪ¤˼«Χ·¿¤Υͥåȥ¥¯¤ò¹½¤¹¤ë¥â¥Х¤¥롦¥¢¥ɥۥ寡¦¥ͥåȥ¥¯(Mobile Ad-hoc Network : MANET)¤¬ÃíÌܤµ¤ì¤Ƥª¤ꡤºҳ²»þ¤ʤɤؤαþÍÑÊýˡ¤䡤MANET¤ȥ¤¥¼¥ͥåȤȤÎÁê¸ßÀܳ¤˴ؤ¹¤븡Ƥ¤â¹Ԥï¤ì¤Ƥ¤¤롥ËܹƤǤϡ¤ºҳ²»þ¤ι°è¥ͥåȥ¥¯¾㳲¡¢Åù¤ˤè¤ꥤ¥¼¥ͥåȤËÀܳÉÔǽ¤ʾõÂ֤˴٤ä¿LAN(°ʲ¼¡¤¸ÉΩLAN)¤ò¡¤MANET¤ò·Ðͳ¤·¤ƥ¤¥¼¥ͥåȤËÀܳ¤¹¤뤿¤á¤νêÍ¡ǽ¤ˤĤ¤¤Ƹ¡Ƥ¤·¤¿¡¥¶ñÂÎŪ¤ˤϡ¤¸ÉΩLAN¤ȥ¤¥¼¥ͥåÈÀܳÅËMANET·Ðͳµ¡ǽ¤ò¶ñÈ¿¥¢¥¯¥»¥¹¥ݥ¤¥ó¥È(Access Point : AP)¤òÇÛÃ֤·¡¤MAC¥¢¥ɥ쥹¥롼¥ƥ£¥¤MAC/IP¥¢¥ɥ쥹ÊѴ¹¡¤AP´֥ե¸æ¤γƵ¡ǽ¤òÄó°Ƥ·¤¿¡¥¤ޤ¿¡¤MANET¥¨¥ߥå¥졼¥¿¤ËÄó°Ƶ¡ǽ¤ò¼ÂÁÆHTTPÄ̿®¤ˤè¤êÄó°Ƶ¡ǽ¤Îͭ¸ú¤òɾ²·¤¿¡¥ |