Box-Muller inverse transform and its application

The inverse Box-Muller transform, which allows you to transform a random sequence of Gaussian type into the corresponding sequence with a uniform distribution law. A two-stage scheme for testing statistically independent random variables using π-Test

Подобные документы

  • ??????? ???????????? ??????? ???????????? ???????????. ????????????? ??????? ???????????? ??????????? Forcing variables. ???????????? ?????? ? ???????, ?????????? ???????? ? ?????? S???. ??????????????? ? ????????????????? ??????????????? ?????????.

    ??????, добавлен 28.12.2013

  • ??????????????? ??? ???????????? ???????, ?????????? ????????? ??????????? ? ???? ???????? ????????????, ???????? ????: Uniform Memory Access, Cache Only Memory Access. ?????????????? ????? ???? SIMD. ?????? ?????????? ??????? ?????????????????? ??????.

    ???????, добавлен 11.11.2012

  • ????????????? ?????? Java-?????????: ??????, ?????? (methods), ?????????? (variables) ? ?????? (package). ??????????? ??????????, ?????????? ? ???? ???? ??? ????????????? ????????? ????????, ????????? ???????? ? ????????? (????????, ??????????) ????????.

    ???????, добавлен 28.05.2018

  • ??????????, ???????, ??????. ???? ? ??????. ?????? ?? ????????. ?????????? ??????????????? ????????. ?????? ? ???????? ?????? ??????????????? ??????. ???????? ????? ? ????? ?????, ???????????? ?? ??????? ??? ?????? ?????????. ???????? ?? ????????.

    ??????, добавлен 18.09.2014

  • Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.

    ???? ??????, добавлен 08.03.2014

  • Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.

    ??????, добавлен 13.02.2016

  • Extremalization functional object as the calculus of variations. Difficulties solution of variational problems. Using nonlinear compromise scheme on the basis of rational organization to address this multi-task. Examples of these mathematical models.

    ??????, добавлен 29.07.2016

  • Signature schemes and anonymous credentials from bilinear maps. Asymptotically optimal communication for torus-based cryptography. Paradigm of hybrid encryption scheme. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness.

    ?????, добавлен 08.03.2014

  • Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.

    ?????, добавлен 08.03.2014

  • Programming of Intel microprocessors. Studying systems on universal microprocessors and problems of its programming. The scheme and the description of laboratory installation, variants of tasks and order of the laboratory work execution are presented.

    ???????????? ??????, добавлен 11.10.2014

  • Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

    ?????, добавлен 08.03.2014

  • One Useful Logic That Defines Its Own Truth. On Synchronous and Asynchronous Interaction in Distributed Systems. A Robust Class of Regular Languages. Deterministic Models of Communication Faults. The Maximum Independent Set Problem in Planar Graphs.

    ?????, добавлен 08.03.2014

  • ???????? ?????????? ???????? ?????? ??????? ?? ????? VHDL. ???????? ??????????? ????????? (Test Bench). ?????????????? ??????????? (Behavioral simulation). ?????????? ????????? ? ?? ??????????????. ?????????? ???????? ??????? ?????????? ?573??5.

    ???????????? ??????, добавлен 18.10.2017

  • ??????????? ??????????? ???????????? ???????????????? ????????????? ?????????. ?????? ???????? ???????? ??? ??????????. ?????????? ? ????????????? ????-??????. ???????????? ????????? @Test. ??????? ???????? ???????????? ???????????? ???????????.

    ????????? ??????, добавлен 30.08.2016

  • Proposed a new concept of keyless encryption, "Amorphic scheme", which is semantically secured and has "Perfect Secrecy" level. Briefly run on well-known cryptographic attacks in order to clearly show how strong the amorphic encryption concept is.

    ??????, добавлен 18.02.2021

  • Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.

    ????????? ???????????, добавлен 08.03.2014

  • ???????????? ???????, ???????????? ??????? ? ????? ? ??????? Unit-??????. ???????????? ???????? ? ???????????? ?????????? ?????? Test-Driven-Development. ?????????????? ????? ?????? ? ????? ??????. ???????? ????????? ????????? ???????? ???????? ???????.

    ???????????? ??????, добавлен 23.05.2022

  • Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.

    ??????, добавлен 06.05.2018

  • Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.

    ??????, добавлен 17.12.2022

  • Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.

    ???????????, добавлен 28.12.2013

  • ?????????????????? ?????????????? ??????? ???????? ?????? Easy Test. ????????? ??? ? ???????? ?????? ??????????????. ??????? ???? ?????? ?????? ????????????. ?????? ?????? ????? ????????????????. ?????????? ?????????? ????????? ???????????? ? Delphi.

    ????????? ??????, добавлен 04.02.2013

  • The use of mobile smart tools - a factor that contributes to the introduction of the remote control method and smooth adjustment of key parameters of the diagnostic process. Components of a software package for determining a person's visual fatigue.

    ??????, добавлен 21.12.2021

  • ???????? ?????????? COM - ??????????????? .NET, ?? ?????????????? ??? ????????? ???????? ??????? ??????????. ???????????? .NET, ?? ??????. ?????? DLL ??? EXE. ??????????? ??????? ????? (Common Type System, CTS). ???????????? ???????. ????? .NET Framework.

    ???????????, добавлен 18.10.2013

  • Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.

    ??????, добавлен 29.07.2016

  • ????????-?????????? ? ???????? ????????. ???????? ?????????????? ?????????-?????????? ?????????? ? ?????????. ??????????? ???????? ?????????? ??????????. ???????? ?????????? ?????????? ? ???????? ????????????? ???????? ?? ????????? "Web-Test ????????????"

    ???????? ??????, добавлен 13.11.2017

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.