Pseudo-Random Number Generator
51,955 Followers
Recent papers in Pseudo-Random Number Generator
Abstrak Penelitian ini membahas tentang perancangan Visualisasi untuk melihat proses sinkronisasi antara generator sinkron dengan jala-jala PLN. Pada generatror sinkron dan jala-jala PLN dipasang 6 sensor tegangan dengan 3 sensor pada... more
Naukową refleksję nad zagadnieniem przypadku zwykło się utożsamiać z matematyką czy filozofią. W niniejszej pracy spojrzymy na ten problem z perspektywy sztuk wizualnych. Historia filozofii i nauki pokazuje, iż pojęcie przypadku rozumiane... more
A novel Mathematical Random Number Generator (MRNG) is presented here. In this case, "mathematical" refers to the fact that to construct that generator it is not necessary to resort to a physical phenomenon, such as the thermal... more
Additive Congruential Random Number (ACORN) generators represent an approach to generating uniformly distributed pseudo-random numbers that is straightforward to implement efficiently for arbitrarily large order and modulus; if it is... more
We deal with randomness-quantifiers and concentrate on their ability do discern the hallmark of chaos in time-series used in connection with pseudo random number generators (PRNG). Workers in the field are motivated to use chaotic maps... more
There is a lack of good pseudo-random number generators capable of utilizing the vector processing capabilities and multiprocessing capabilities of modern computers. A suitable generator must have a feedback path long enough to fit the... more
در این مقاله سعی شده است ارتقائی برای مولد نگاشت لوجستیک به عنوان مولد اعداد شبه تصادفی پیشنهاد شود. هدف استفاده از ویژگی اعشار طولانی دنباله نگاشت لوجستیک به شکلی که مشکلات محتمل آن برای کابرد واقعی مانند رمزنگاری و یا تولید اعداد تصادفی... more
Random walks have been created using the pseudo-random generators in di erent computer language compilers (BASIC, PASCAL, FORTRAN, C++) using a Pentium processor. All the obtained paths have apparently a random behavior for short walks... more
Pseudorandom generators are fundamental to many theoretical and applied aspects of computing. We show how to construct a pseudorandom generator from any one-way function. Since it is easy to construct a one-way function from a... more
Possibility of Perpetual Source of Energy
tales que a 1 < b 1 y a 2 < b 2. Supongamos que estamos interesados en calcular elárea de una región D en R 2 tal que
Mersenne Twister
A detailed comparison between pseudo-random number generators (PRNGs) based on cellular automata (CA) and linear feedback shift registers (LFSRs) is presented in this paper. Various statistical tests have been applied in order to reveal... more
Bu çalışmada, düşük kaynağa sahip Nesnelerin İnterneti (Internet of Things IoT) gibi cihazların güvenli kablosuz iletişiminde önemli bir yer tutan rastgele sayı üreteçleri için doğrusal geri beslemeli kaydırma yöntemi üzerine kurulu yeni... more
Security is considered the most important requirement for the success of electronic commerce, which is built based on the security of hash functions, encryption algorithms and pseudorandom number generators. Chaotic systems and... more
La Teoria del Caos applicata alla generazione di numeri casuali attraverso il circuito di Chua
Modular algebra is widely used for synthesis of pseudo-random number generators and in data cryptography. However, electronic components to carry out the operations of this algebra remains quite rare on market. In order to facilitate the... more
Abstrak Pengambilan sejumlah sampel dalam populasi tertentu mempergunakan random sampling memerlukan randomisasi atau pengacakan yang baik untuk menghindarkan terjadinya bias dan tidak tersebarnya sampel secara acak. Seringkali keacakan... more
Abstrak—Penggunaan random sampling dalam mengambil sejumlah sampel dari populasi tertentu memerlukan randomisasi atau pengacakan yang baik, agar mendapatkan ketersebaran sampel secara acak dan terhindarkan terjadinya bias. Seringkali... more
Traditional approaches to understanding prime numbers such as the Sieve of Eratosthenes, prime number theorem and Riemann hypotheses posit the existence of counting numbers and regard “primeness” as a feature or substructure thereof.... more
Since 1940s, and the pioneering research by Hilbert-Polya, many studies on the Riemann Zeta Function suggested a connection between the pattern of prime numbers along the critical line ½, and a quantum oscillator, according to the model... more
This paper presents the implementation and comparisons of uniform random number on Field Programable Gate Array (FPGA). Uniform random numbers are generated based on residue method. The circuit of generating uniform random number is... more
Steganography is the technique of hiding a confidential message in an ordinary message and the extraction of that secret message at its destination. Different carrier file formats can be used in steganography. Among these carrier file... more
For a long time, random numbers have been used in many fields of application. Much work has been conducted to generate truly random numbers and is still in progress. A popular method for generating random numbers is a linear-feedback... more
Generador Congruencial Aditivo Definición. Dada una semilla X 0 ∈ Z + , dos números m ∈ N y a ∈ Z + con a < m, definimos para i = 1, 2, 3,. .. X i = (X i−1 + a) mod m por lo que el i-ésimo número pseudoaleatorio queda definido como u i =... more
We introduce the Romu family of pseudo-random number generators (PRNGs) which combines the nonlinear operation of rotation with the linear operations of multiplication and (optionally) addition. Compared to conventional linear-only PRNGs,... more
In this paper, we investigate the use of some well-known randomised low-discrepancy sequences (Halton, Sobol, and Faure sequences) for initializing particle swarms. We experimented with the standard global-best particle swarm algorithm... more
Generator sinkron atau alternator adalah sebuah peralatan listrik yang berfungsi untuk mengubah energigerak (mekanis) menjadi energi listrik AC dimana kecepatan putaran medan dan kecepatan putaran rotornya sama atau tidak ada slip ARUS... more
For communication of secret information from one place to another two techniques are used i.e. Cryptography and Steganography. Steganography involves hiding secret data in an appropriate digital carrier e.g. image, audio and video files... more
Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random bits. We point out that this new approach could be particularly... more
We present an approach to procedural generation of 'pseudo infinite' virtual cities in real-time. The cities contain geometrically varied buildings that are generated as needed. The building generation parameters are created by a pseudo... more
Security of information transmitted through the Internet, against passive or active attacks is an international concern. The use of a chaos-based pseudo-random bit sequence to make it unrecognizable by an intruder, is a field of research... more
This is a survey on the One Time Pad (OTP) and its derivatives, from its origins to modern times. OTP, if used correctly, is (the only) cryptographic code that no computing power, present or future, can break. Naturally, the discussion... more
This is a survey on the One Time Pad (OTP) and its derivatives, from its origins to modern times. OTP, if used correctly, is (the only) cryptographic code that no computing power, present or future, can break. Naturally, the discussion... more
Sözde rastgele sayı üreteçleri uygulama kolaylığı sebebiyle tercih nedeni olmaktadır. Herhangi bir donanım olmaksızın rastgele sayı dizilerini hızlı bir şekilde üretebilmek önemli bir avantajdır. Üretilen sayıların kriptolojik uygulamalar... more
The concepts of randomness, unpredictability, complexity and entropy form the basis of modern cryptography and a cryptosystem can be interpreted as the design of a key-dependent bijective transformation that is unpredictable to an... more
The purpose of this paper is to present a novel Hybrid Random Number Generator (HRNG). Here "hybrid" refers to the fact that to construct this generator it is necessary to use 1) physical components-texts-and a physical process, and 2) a... more
In this paper, a secure and robust cryptographic CDMA watermark algorithm based on DWT2, YIQ color space and Arnold transform is proposed. In the approach, for more security of watermark, the binary watermark image W, after scrambling... more
Frequently, randomly organized data is needed to avoid an anomalous operation of other algorithms and computational processes. An analogy is that a deck of cards is ordered within the pack, but before a game of poker or solitaire the deck... more