• 제목/요약/키워드: Random Numbers

검색결과 446건 처리시간 0.032초

A UNIFORM LAW OF LARGE MUNBERS FOR PRODUCT RANDOM MEASURES

  • Kil, Byung-Mun;Kwon, Joong-Sung
    • 대한수학회보
    • /
    • 제32권2호
    • /
    • pp.221-231
    • /
    • 1995
  • Let $Z_1, Z_2, \ldots, Z_l$ be random set functions or intergrals. Then it is possible to discuss their products. In the case of random integrals, $Z_i$ is a random set function indexed y a family, $G_i$ say, of real valued functions g on $S_i$ for which the integrals $Z_i(g) = \smallint gdZ_i$ are well defined. If $g_i = \in g_i (i = 1, 2, \ldots, l) and g_1 \otimes \cdots \otimes g_l$ denotes the tensor product $g(s) = g_1(s_1)g_2(s_2) \cdots g_l(s_l) for s = (s_1, s_2, \ldots, s_l) and s_i \in S_i$, then we can defined $Z(g) = (Z_1 \times Z_2 \times \cdots \times Z_l)(g) = Z_1(g_1)Z_2(g_2) \cdots Z_l(g_l)$.

  • PDF

A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number

  • Sivakumar, T;Venkatesan, R
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권6호
    • /
    • pp.2317-2337
    • /
    • 2015
  • Cryptography provides an effective solution to secure the communication over public networks. The communication over public networks that includes electronic commerce, business and military services, necessitates the requirement of simple and robust encryption techniques. In this paper, a novel image encryption method which employs calligraphy based hybrid scan and random number is presented. The original image is scrambled by pixel position permutation with calligraphy based diagonal and novel calligraphy based scan patterns. The cipher image is obtained by XORing the scrambled image with random numbers. The suggested method resists statistical, differential, entropy, and noise attacks which have been demonstrated with a set of standard images.

무아레 무늬를 이용한 참 난수 생성 방법 (True Random Number Generation Method by using the Moire Fringe)

  • 강혁;이근호
    • 사물인터넷융복합논문지
    • /
    • 제2권1호
    • /
    • pp.23-27
    • /
    • 2016
  • 빛의 물리적 성질 중의 하나인 파동의 회절 현상을 설명하는 프레넬 회절과 간섭에 의해 생성되는 무아레 무늬가 있다. 본 논문에서는 무아레 무늬에서 생성되어지는 값들을 암호 시스템에서 사용되는 키로, 의사 난수 발생기에서 생성한 난수가 아닌 참난수로 만들어 사용할 수 있음을 제안한다.

Review on the Limiting Behavior of Tail Series of Independent Summands

  • Nam, Eun-Woo
    • 한국통계학회:학술대회논문집
    • /
    • 한국통계학회 2005년도 춘계 학술발표회 논문집
    • /
    • pp.185-190
    • /
    • 2005
  • For the almost certainly convergent series $S_n$ of independent random variables the limiting behavior of tail series ${T_n}{\equiv}S-S_{n-1}$ is reviewed. More specifically, tail series strong laws of large number and tail series weak laws of large numbers will be introduced, and their relationship will be investigated. Then, the relationship will also be extended to the case of Banach space valued random elements, by investigating the duality between the limiting behavior of the tail series of random variables and that of random elements.

  • PDF

Comparison of Latin Hypercube Sampling and Simple Random Sampling Applied to Neural Network Modeling of HfO2 Thin Film Fabrication

  • Lee, Jung-Hwan;Ko, Young-Don;Yun, Il-Gu;Han, Kyong-Hee
    • Transactions on Electrical and Electronic Materials
    • /
    • 제7권4호
    • /
    • pp.210-214
    • /
    • 2006
  • In this paper, two sampling methods which are Latin hypercube sampling (LHS) and simple random sampling were. compared to improve the modeling speed of neural network model. Sampling method was used to generate initial weights and bias set. Electrical characteristic data for $HfO_2$ thin film was used as modeling data. 10 initial parameter sets which are initial weights and bias sets were generated using LHS and simple random sampling, respectively. Modeling was performed with generated initial parameters and measured epoch number. The other network parameters were fixed. The iterative 20 minimum epoch numbers for LHS and simple random sampling were analyzed by nonparametric method because of their nonnormality.

ALMOST SURE CONVERGENCE FOR WEIGHTED SUMS OF NA RANDOM VARIABLES

  • BAEK J. I.;NIU S. L.;LIM P. K.;AHN Y. Y.;CHUNG S. M.
    • Journal of the Korean Statistical Society
    • /
    • 제34권4호
    • /
    • pp.263-272
    • /
    • 2005
  • Let {$X_n,\;n{\ge}1$} be a sequence of negatively associated random variables which are dominated randomly by another random variable. We discuss the limit properties of weighted sums ${\Sigma}^n_{i=1}a_{ni}X_i$ under some appropriate conditions, where {$a_{ni},\;1{\le}\;i\;{\le}\;n,\;n\;{\ge}\;1$} is an array of constants. As corollary, the results of Bai and Cheng (2000) and Sung (2001) are extended from the i.i.d. case to not necessarily identically distributed negatively associated setting. The corresponding results of Chow and Lai (1973) also are extended.

이진 알고리즘을 이용한 변형 시리얼테스트 설계에 관한 연구 (Design variation serial test using binary algorithm)

  • 최진석;이성주
    • 한국지능시스템학회논문지
    • /
    • 제20권1호
    • /
    • pp.76-80
    • /
    • 2010
  • 급변하는 정보의 홍수 속에서 정보의 보안과 이를 가공하고 전송하는 것이 중요한 과제로 떠오르고 있다. 초기 정보보호이론과 암호화 전송단계에서는 간단한 치환과 수학적 계산 알고리즘을 적용한 암 복호화 과정을 이용하였다. 완벽한 정보보호는 One-time pad를 이용하는 것이나 이를 적용하기에는 하드웨어와 금전적 손실이 너무 크기에 실난수가 아닌 난수성을 만족하는 의사난수를 사용하고 있다. 본고에서 제안하는 변형 시리얼 테스트는 의사난수성을 입증하는 테스트 중 시리얼테스트에서 변형된 것으로 연산속도와 효율성 면에서 보다 더 강력한 난수성임을 입증하고 있다.

전화조사 상황에서 무선표집절차의 적용결과: 단계별 응답특성을 중심으로 (Application of Random Sampling Procedures in a Telephone Survey)

  • 조성겸;조은희
    • 한국조사연구학회지:조사연구
    • /
    • 제11권2호
    • /
    • pp.141-160
    • /
    • 2010
  • 본 연구는 전화조사 상황에서 무선표집절차를 적용하여 조사를 실시한 후 그 결과를 분석한 것이다. 2009년 10월 26일부터 11월 18일까지 무선표집방법을 이용하여 전화조사를 실시한 결과, 전화번호 수 2,454개 가운데 조사성공 637건, 조사실패 1,817건으로 나타났다. 조사결과를 조사성공률, 성공 및 실패사례의 응답자의 인구학적 특성, 응답단계별 이슈에 대한 응답특성 등을 중심으로 분석했다. 분석결과 부재중을 제외한 조사 성공비율은 45.7%로 나타났다. 조사실패의 가장 큰 원인은 부재중이었으며, 조사단계가 올라가도 젊은 층의 응답률 저조는 개선되지 않았다. 응답단계에 따라 응답자의 이슈에 대한 인지도나 능동성이 달라지지는 않았으나 전반적으로 단계를 높일수록 다양한 시각의 응답이 포함되는 경향이 나타났다. 무선표집은 비접촉자의 문제를 완화할 수 있고 조사정확도를 높이기 위한 해결책을 찾아 나갈 수 있다는 점에서 후속연구가 이어질 필요가 있다.

  • PDF

실제 환경에 최적화된 MIFARE Classic 공격 절차 (Optimal MIFARE Classic Attack Flow on Actual Environment)

  • 안현진;이예림;이수진;한동국
    • 전기학회논문지
    • /
    • 제65권12호
    • /
    • pp.2240-2250
    • /
    • 2016
  • MIFARE Classic is the most popular contactless smart card, which is primarily used in the management of access control and public transport payment systems. It has several security features such as the proprietary stream cipher Crypto 1, a challenge-response mutual authentication protocol, and a random number generator. Unfortunately, multiple studies have reported structural flaws in its security features. Furthermore, various attack methods that target genuine MIFARE Classic cards or readers have been proposed to crack the card. From a practical perspective, these attacks can be partitioned according to the attacker's ability. However, this measure is insufficient to determine the optimal attack flow due to the refined random number generator. Most card-only attack methods assume a predicted or fixed random number, whereas several commercial cards use unpredictable and unfixable random numbers. In this paper, we propose optimal MIFARE Classic attack procedures with regards to the type of random number generator, as well as an adversary's ability. In addition, we show actual attack results from our portable experimental setup, which is comprised of a commercially developed attack device, a smartphone, and our own application retrieving secret data and sector key.