Showing 3,261 - 3,280 results of 17,304 for search '"random"', query time: 0.15s Refine Results
  1. 3261

    Perfect secrecy cryptosystem with nonuniform distribution of keys by Chuanjun TIAN

    Published 2018-11-01
    “…More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its applications.How to design a basic cryptosystem by using a group of orthogonal Latin squares was first studied and an example to illustrate how to design nonlinear encryption transformations for a basic cryptosystem was given.Then,how to design the sequence of keys by using random method with nonuniform distribution was discussed,and it was strictly proven in theory that the infinite random “one-time pad” cryptosystem based on the designed basic cryptosystem was of perfect secrecy.Since the obtained result generalizes the existing one for random “one-time pad” cryptosystem to be perfect by using a basic cryptosystem with modulo addition,it may be used as a wider ideal simulated prototype to design stream cipher algorithms.Since the number of basic cryptosystems that can be designed is much more than one of the common basic cryptosystems with modulo addition,the obtained result is effective supplement and perfection to mainstream design method for the current stream cryptosystems.…”
    Get full text
    Article
  2. 3262

    Probabilistic degenerate Bernstein polynomials by Jinyu Wang, Yuankui Ma, Taekyun Kim, Dae San Kim

    Published 2025-12-01
    “…In addition, we treat the special cases of the Poisson random variable, the Bernoulli random variable and of the binomial random variable.…”
    Get full text
    Article
  3. 3263

    STATISTICAL PROCESSING OF RESULTS OF TESTING OF STUDENTS by Yulia V. Gumennikova, Elena N. Ryabinova, Ruzilya N. Chernitsina

    Published 2015-10-01
    “…By type of line empiric density statistic put forward the hypothesis of normal distribution of the random variable. To test this hypothesis using one of the criteria for approval - a specially selected random variable, exact or approximate distribution, is known. …”
    Get full text
    Article
  4. 3264
  5. 3265

    A refinement of normal approximation to Poisson binomial by K. Neammanee

    Published 2005-01-01
    “…Let X1,X2,…,Xn be independent Bernoulli random variables with P(Xj=1)=1−P(Xj=0)=pj and let Sn:=X1+X2+⋯+Xn. …”
    Get full text
    Article
  6. 3266

    On the continuity of the vector valued and set valued conditional expectations by Nikolaos S. Papageorgiou

    Published 1989-01-01
    “…In this paper we study the dependence of the vector valued conditional expectation (for both single valued and set valued random variables), on the σ–field and random variable that determine it. …”
    Get full text
    Article
  7. 3267

    An Analytical Study of the External Environment of the Coevolution between Manufacturing and Logistics Based on the Logistic Model by Yunfei Zhou, Li Yan

    Published 2021-01-01
    “…This paper first constructs a dynamic model of the external environmental capacity of the coevolution system by using the logistic model and then simulates the effects of two factors: one factor is the institutional environment affected by the random interference factors of policy and the other factor is the industrial environment affected by the random interference factors of the industrial economy on the coevolution system. …”
    Get full text
    Article
  8. 3268

    Study on generation of turbulence-distorted received signals in OAM optical communications obeying dual Johnson S<sub>B</sub>distribution by Chunyi CHEN, Qinqin XIONG, Haiyang YU, Haifeng YAO, Jiaxue SONG, Yan LOU

    Published 2020-11-01
    “…In order to analyze the performance of atmospheric OAM optical communication systems by Monte Carlo method,a method was proposed to simulate turbulence-distorted received signals in OAM optical communications,which possessed the given temporal auto-correlation and obeyed the dual Johnson S&lt;sub&gt;B&lt;/sub&gt;distribution.A Gaussian random sequence with given temporal auto-correlation was first created by using an auto regression (AR) model,and meanwhile a white noise random sample sequence obeying the dual Johnson S&lt;sub&gt;B&lt;/sub&gt;distribution was generated.Then the white noise random sample sequence was rearranged according to the statistical rank of the auto-correlated Gaussian random sequence to match the given temporal auto-correlation.By performing the simulation experiments,it was found that the statistical distribution of the simulated signals was in excellent agreement with the dual Johnson S&lt;sub&gt;B&lt;/sub&gt;distribution,and the temporal auto-correlation of the signals matched the given temporal auto-correlation function.The results demonstrate that the proposed method can be used to simulate time-domain received signals in OAM optical communications impaired by turbulence-induced distortions.…”
    Get full text
    Article
  9. 3269

    RELIABILITY TOPOLOGY OPTIMIZATION DESIGN OF PISTON LATTICE STRUCTURE FOR INTERNAL COMBUSTION ENGINE (MT) by CHEN JianLiang, ZHAO QingHai, LI XinQing, ZHANG HongXin

    Published 2023-01-01
    “…The failure probability constraint was transformed into a reliability index constraint according to the first second-order moment method, and then the random variables were transformed into standard normal variables, and the random variables were corrected and designed for deterministic topology optimization according to the sensitivity information of the random variables relative to the performance index. …”
    Get full text
    Article
  10. 3270

    Stochastic Dynamic Model of Sulfate Corrosion Reactions in Concrete Materials considering the Effects of Colored Gaussian Noises by Tao Li, Bin Zhang

    Published 2019-01-01
    “…The concentration evolution process of sulfate corrosion products is a random process. The experimental data are only some samples of the random process. …”
    Get full text
    Article
  11. 3271

    Indifferentiable hash functions in the standard model by Juha Partala

    Published 2021-07-01
    “…However, it is often overlooked that such considerations only hold in the random oracle model and do not give any guarantee in the standard model. …”
    Get full text
    Article
  12. 3272

    Direct anterior approach (DAA) vs. conventional approaches in total hip arthroplasty: A RCT meta-analysis with an overview of related meta-analyses. by Philip Lazaru, Simon Bueschges, Nikolai Ramadanov

    Published 2021-01-01
    “…Our aim was to draw definitive conclusions by conducting both a fixed and random model meta-analysis of quality randomized controlled trials (RCTs) and by comparison with related meta-analyses.…”
    Get full text
    Article
  13. 3273

    Target sampling based on routing behavior analysis in network topology measurement by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li

    Published 2009-01-01
    “…In order to investigate the insufficiency of target sampling in current network topology measurement practice and the distortion of measurement models,a sort of target sampling methods based on routing behavior analysis were pre-sented,namely,the uniform random sampling as a benchmark method,the minimum cover sampling as an optimal method,the last-hop sampling for the path diversity,and the bisection sampling for the destination prefix diversity.Ex-periments based on real measurement data show that a half of topology information can be missed in the traditional ‘1 per /24’ random sampling,of which 10% of missed information is caused by the path diversity and the rest is caused by des-tination prefix diversity.The minimum cover sampling is robust to the routing dynamics and performs better than the uniform random sampling at the long-term practice.…”
    Get full text
    Article
  14. 3274

    Provable secure mutual authentication protocol for RFID in the standard model by Feng XIAO, Ya-jian, ZHOU, Jing-xian ZHOU, Xin-xin NIU

    Published 2013-04-01
    “…The security issue of RFID is becoming more and more serious,in order to protect the RFID's information security and privacy,a mutual authentication protocol for RFID based on HB protocol was proposed in the standard model.The security proofs for this novel protocol was given by using the reduction method,and attacker's hardness was reduced to the indistinguishability between pseudo-random function and real random function.The implementation of proposed protocol only required lightweight pseudo-random generator and vector dot product operation and provided higher security and efficiency.The comparisons of security and performance were also given with other authentication protocols,the results show that the proposed protocol is feasible for RFID tags which are low cost and resource-constrained.…”
    Get full text
    Article
  15. 3275

    INTERVAL ESTIMATION OF THE VOLUMES OF RESOURCE CONSUMPTION AT THE STOCHASTIC BASIC DATA by Y. Gagarin, S. Gagarina

    Published 2018-12-01
    “…The method of interval estimation of resource consumption volumes is considered with the random nature of a multitude of random factors. The necessity of taking into account errors in the values of functions and arguments when estimating the parameters of mathematical models is shown. …”
    Get full text
    Article
  16. 3276

    Spectral properties, localization transition and multifractal eigenvectors of the Laplacian on heterogeneous networks by Jeferson D. da Silva, Diego Tapias, Peter Sollich, Fernando L. Metz

    Published 2025-02-01
    “…We study the spectral properties and eigenvector statistics of the Laplacian on highly-connected networks with random coupling strengths and a gamma distribution of rescaled degrees. …”
    Get full text
    Article
  17. 3277

    New approach against Sybil attack in wireless sensor networks by FENG Tao1, MA Jian-feng2

    Published 2008-01-01
    “…A particularly harmful attack against many sensor network applications is known as the Sybil attack.A novel approach which is sensor node identity witness information validation for random secret information predistribution to defend against the Sybil attack was proposed,and their comprehensive performance was analyzed.In random secret in-formation predistribution,new secret information assignment schemes were proposed and assign a random set of key-related information to each sensor node based on one-way accumulators.In the common keys set-up phase,node-to-node identity witness authentication and key exchange protocols(IDW-AKE)which are provably secure against the active adversaries in universally composable model was proposed.Using IDW-AKE protocols,each node can com-pute the unique common keys it shares with its neighbors.…”
    Get full text
    Article
  18. 3278

    Generalized Synchronization of Stochastic Discrete Chaotic System with Poisson Distribution Coefficient by Shao-juan Ma, Duan Dong, Jie Zheng

    Published 2013-01-01
    “…Firstly, based on the orthogonal polynomial approximation theory of discrete random function in Hilbert spaces, the discrete chaotic system with random parameter is transformed into its equivalent deterministic system. …”
    Get full text
    Article
  19. 3279

    Comparing Two Strategies to Model Uncertainties in Structural Dynamics by Rubens Sampaio, Edson Cataldo

    Published 2010-01-01
    “…The second strategy (called nonparametric strategy) is more general and considers the whole stiffness matrix as uncertain, and associates a random matrix to it. In both cases, the probability density functions either of the random parameters or of the random matrix are deduced from the Maximum Entropy Principle using only the available information. …”
    Get full text
    Article
  20. 3280

    Fast reconstruction method for compressed sensing model with semi-tensor product by Jinming WANG, Shiping YE, Lizhe YU, Sen XU, Yanjun JIANG

    Published 2018-07-01
    “…To reduce the storage space of random measurement matrix and improve the reconstruction efficiency for compressed sensing (CS),a new sampling approach for CS with semi-tensor product (STP-CS) was proposed.The proposed approach generated a low dimensional random measurement matrix to sample the sparse signals.Then the solutions of the sparse vector were estimated group by group with a l<sub>q</sub>-minimization (0&lt;q&lt;1) iteratively re-weighted least-squares (IRLS) algorithm.Compared with traditional compressed sensing methods,the proposed approach outperformed conventional CS in speed of reconstruction and that it also obtained comparable quality in the reconstruction.Numerical experiments were conducted using gray-scale images,the peak signal-to-noise ratio (PSNR) and the reconstruction time of the reconstruction images were compared with the random matrices with different dimensions.Comparisons were also conducted with other low storage techniques.Numerical experiment results show that the STP-CS can effectively reduce the storage space of the random measurement matrix to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>M</mi> <mi>t</mi> </mfrac> <mtext>×</mtext><mfrac> <mi>N</mi> <mi>t</mi> </mfrac> </math></inline-formula> and decrease tow orders of magnitude of time that for conventional CS,while maintaining the reconstruction quality.Numerical results also show that the reconstruction time can be effectively improved 260 for the image size of 1 024×1 024.…”
    Get full text
    Article