{"id":222,"date":"2024-11-15T15:43:29","date_gmt":"2024-11-15T06:43:29","guid":{"rendered":"https:\/\/c-mng.cwh.hokudai.ac.jp\/security-hp-test.security\/Root\/?page_id=222"},"modified":"2024-12-17T14:05:47","modified_gmt":"2024-12-17T05:05:47","slug":"rinrin-j","status":"publish","type":"page","link":"https:\/\/c-mng.cwh.hokudai.ac.jp\/security-hp-test.security\/Root\/rinrin-j.html","title":{"rendered":"\u502b\u502b\u59eb\u306e\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6559\u5ba4
\u53d7\u8b1b\u30ac\u30a4\u30c9"},"content":{"rendered":"\n

English site<\/a><\/p>\n\n\n\n

\u502b\u502b\u59eb\u306e\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6559\u5ba4\u3068\u306f<\/strong><\/p>\n\n\n\n

\u56fd\u7acb\u60c5\u5831\u5b66\u7814\u7a76\u6240\uff08National Institute of Informatics:NII\uff09<\/a>\u304c\u516c\u958b\u3057\u3066\u3044\u308b\u5927\u5b66\u751f\u6d3b\u3067\u3088\u304f\u3042\u308b\u8eab\u8fd1\u306a\u4f1a\u8a71\u304b\u3089\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5b66\u3076\u3001\u30aa\u30f3\u30e9\u30a4\u30f3\u6559\u5ba4\u3067\u3059<\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

\u5b66\u7fd2\u306e\u30b9\u30b9\u30e1<\/strong><\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n
\"\"<\/figure>\n\n\n\n

 <\/p>\n\n\n\n

\u5b66\u7fd2\u65b9\u6cd5<\/strong><\/p>\n\n\n\n

\uff11\uff0e\u502b\u502b\u59eb\u306e\u30b5\u30a4\u30c8\u3078\u30a2\u30af\u30bb\u30b9<\/strong><\/h5>\n\n\n\n