نتایج جستجو برای: rng

تعداد نتایج: 866  

1998
Josef Leydold Hannes Leeb

In this paper we present the results of a rst empirical investigation on how the quality of non-uniform variates is innuenced by the underlying uniform RNG and the transformation method used. We use well known standard RNGs and transformation methods to the normal distribution as examples. We nd that except for transformed density rejection methods, which do not seem to introduce any additional...

2007
Mariusz Giero

We adopt the following rules: i, j, k, n denote natural numbers, a, b, c, x denote sets, and r denotes a real number. The following four propositions are true: (1) If 1 < i, then 0 < i − 1. (2) If 1 ¬ i, then i − 1 < i. (3) 1 is odd. (4) Let given n, f be a finite sequence of elements of E T , and given i. If 1 ¬ i and i + 1 ¬ len f, then fi ∈ rng f and fi+1 ∈ rng f. This work has been partiall...

Journal: :Formalized Mathematics 2008
Bing Xie Xiquan Liang Hongwei Li

For simplicity, we adopt the following convention: x, x0, y, y0, r are real numbers, z, z0 are elements of R2, Z is a subset of R2, f , f1, f2 are partial functions from R2 to R, R is a rest, and L is a linear function. Next we state two propositions: (1) domproj(1, 2) = R2 and rng proj(1, 2) = R and for all elements x, y of R holds (proj(1, 2))(〈x, y〉) = x. (2) domproj(2, 2) = R2 and rng proj(...

Journal: :Energies 2021

Public attention to climate change challenges our locked-in fossil fuel-dependent energy sector. Natural gas is replacing other fuels in mix. One way reduce the greenhouse (GHG) impact of natural replace it with renewable (RNG). The benefits utilizing RNG are that has no when combusted and utilized same applications as gas. can be injected into grid, used a transportation fuel, or for heating e...

2004
Grzegorz Bancerek

provide the notation and terminology for this paper. 1. POSET RETRACTS One can prove the following propositions: (1) For all binary relations a, b holds a · b = a b. (2) Let X be a set, L be a non empty relational structure, S be a non empty relational substruc-ture of L, f , g be functions from X into the carrier of S, and f , g be functions from X into the carrier of L. If f = f and g = g and...

2008
ITAI IVTZAN

This study evaluates the idea that consciousness is creating an influence on the environment in a way that makes random systems (Random Number Generator – RNG) become more ordered. This evaluation is combined with an exploration of two, potentially, influencing factors: distance from the target and awareness of the target. The experimental procedure was based upon data derived from meditating g...

2001
Clark Thomborson

We o er a set of public-domain tools to aid the development and test of pseudorandom Clanguage computer programs running under 4.3bsd Unix. Our tools make it easier to reproduce experimental results, to report them in a standardized format, and to check their validity by using a di erent random number generator (RNG). Furthermore, the tools should help users avoid some of the common pitfalls in...

2011
Behnaz AMINI Hasan KHALEGHI

In this research, the performance of nonlinear k-ε turbulence model in resolving the time delay between mean flow changes and its proportionate turbulent dissipation rate adjustment was investigated. For this purpose, the ability of Launder-Spalding linear, Suga non-linear, Yakhot RNG and Rietz modified RNG k-ε models are compared in the estimation of axial mean velocity profile and turbulent i...

1992
Harald Niederreiter Claus-Peter Schnorr

We call a distribution on n–bit strings (ε, e)–locally random, if for every choice of e ≤ n positions the induced distribution on e–bit strings is in the L1–norm at most ε away from the uniform distribution on e–bit strings. We establish local randomness in polynomial random number generators (RNG) that are candidate one–way functions. Let N be a squarefree integer and let f1, . . . , f` be pol...

Journal: :IACR Cryptology ePrint Archive 2016
Atakan Arslan Süleyman Kardas Sultan Aldirmaz Sarp Ertürk

Security and privacy concerns have been growing with the increased usage of the RFID technology in our daily lives. To mitigate these issues, numerous privacy-friendly authentication protocols have been published in the last decade. Random number generators (RNGs) are commonly used in RFID tags to provide security and privacy of RFID protocols. RNGs might be weak spot of a protocol scheme and m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید