Box-Muller inverse transform and its application

The inverse Box-Muller transform, which allows you to transform a random sequence of Gaussian type into the corresponding sequence with a uniform distribution law. A two-stage scheme for testing statistically independent random variables using π-Test

Подобные документы

  • Natural Language Processing as a subfield of computer science and artificial intelligence is concerned with interactions between computers and human languages. The purpose of this paper, is to outline the linguistic and NLP methods for textual processing.

    статья, добавлен 18.05.2022

  • The modern computer technologies. Drawing of clock-pulse generator that from pulse sequence for all programming system. Engineering graphics OrCAD Capture. Projecting and design of principal schemes in electronics, microelectronics and electrotechniques.

    книга, добавлен 11.10.2014

  • Allocation and Sizing of Distribution Transformers and Feeders. Planning of Distribution Networks under Load Growth. Optimization Methods for Power System Problems. List of Tables, Principle Symbols and Acronyms. Statement of Original Authorship.

    реферат, добавлен 05.01.2014

  • Methods of traversal of high-level multi-threaded models formalized in the Use Case Map computer language. Advantages and disadvantages of this approach compared to existing ones. Generation character lines that are used to test software systems.

    статья, добавлен 28.02.2016

  • Features green orientation of modern CAD systems on the example of Altera Quartus II and built-in utilities "PowerPlay Power Analyzer Tool". Optimization and evaluation of FPGA projects on energy consumption based on the activity signals of the scheme.

    статья, добавлен 23.02.2016

  • Types of main memory: Random Access Memory and Read Only Memory. The operation of cache memory. Electrically Erasable Programmable Read Only Memory. Memory configurations for Intel CPU’s. Erasable Programmable Read Only Memory and Virtual memory.

    презентация, добавлен 03.06.2012

  • Synthesis SIS model with a uniform two-dimensional spatial distribution of individuals who are in the evolution of such discrete time Markov. The simple square lattice. Computer simulations of a stochastic model for the non-immune disease spread.

    статья, добавлен 14.01.2017

  • The creation of an intuitive family tree on the basis of the online service Coggle, which is designed to develop mental maps. The main criteria that should be in the program for mobile application development. Structure of the mobile application.

    статья, добавлен 06.06.2023

  • Назначение свойств Assistant, BrokenReference, Build, CodeContextObject, CommandBars, CurrentObjectName, CurrentObjectType, DBEngine, IsCompiled, MenuBar, Modules, ProductCode. Краткое описание наиболее показательных методов объекта Application.

    контрольная работа, добавлен 10.06.2011

  • There have been introduced the most commonly used electrical schemes of biological tissue, as well as their impedance phrases and application areas. An analysis of the adequate schemes and simulation of the MATLAB software environment has been performed.

    статья, добавлен 17.02.2021

  • Type theory introduced by Russell and Whitehead to overcome a paradox found in Frege’s work. The design of lambda-calculus in functional programming languages. The isomorphism between concepts of logic and concepts in type theory and programming.

    статья, добавлен 22.02.2021

  • Perform the comprehensive analysis of the GraphQL field by first outlining the GraphQL concept and its structure, followed by an organized mapping analysis of main studies. Delves and highlights the importance of adept testing in the GraphQL era.

    статья, добавлен 24.02.2024

  • Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.

    презентация, добавлен 06.02.2019

  • A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.

    статья, добавлен 28.10.2020

  • Загальна характеристика системи і основні функціональні можливості "Oracle Application". Модулі для управління фінансами, матеріальними потоками, виробництвом. Система інформаційної підтримки керівництва, фінансовий аналіз, планування і консолідація.

    контрольная работа, добавлен 25.05.2012

  • The structure chart of identification using n-th order volterra model in frequency domain using interpolation method. Numerical values of identification accuracy. The simulink model of the test system with noise generator, osillosopes. Wavelet function.

    статья, добавлен 28.08.2016

  • The massage recovery feature as independent of the choice of the signature equation and that all ElGamal type schemes have variants giving message recovery and archive five new signature schemes giving message recovery with different properties.

    статья, добавлен 15.09.2012

  • Процесс применимости технологии Test-Driven Development, сущность моделирования сетями Петри, их верификация. Характеристика и предназначение функции загрузки сети из файла, описание и отличительные черты методов выявления, разработки бизнес процессов.

    дипломная работа, добавлен 27.08.2016

  • Application of sorting to organize large data arrays. Data sorting algorithms. Study of the algorithm for parallel hyperfast sorting of data arrays in the C# programming language. Development of flow graph and program code. Using the test program.

    статья, добавлен 08.06.2024

  • Description of the development of a gaming mobile application that integrates augmented reality. Augmented reality and gamification "Formation of a holistic personality" as educational strategies in learning in the period of innovative technologies.

    статья, добавлен 11.07.2023

  • A Trojan as a hidden threat, much like the famed Trojan horse left by Odysseus on the shores of Troy. Targeting, distribution and activation mechanisms of the worms. Drive-by-Downloads, email, network intrusion, social engineering, business models.

    лекция, добавлен 23.05.2016

  • Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.

    дипломная работа, добавлен 13.07.2020

  • In primary order to satisfy the users' requirements for the productivity and efficiency of tasks implementation the grid-system should implement the effective algorithm of tasks distribution between the computing resources accessible at the moment.

    статья, добавлен 07.12.2016

  • Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.

    статья, добавлен 27.01.2019

  • Modeling attempts of unauthorized extraction of stegano content (halftone test images) for different variants of disintegration of the array of lengths of the series of reference blocks of the original images. Modeling using portrait and landscape.

    статья, добавлен 25.02.2024

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.