Examples of using Pseudo-random number in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
This method yields what is called pseudo-random numbers.
And it turns out it's a pseudo-random number generator using deterministic chaos.
For instance, an unending sequence of pseudo-random numbers.
Random Functions| JMP 13.2 Generates a pseudo-random number from a beta distribution using two shape parameters, alpha and beta.
KNUTH has a classic exposition on pseudo-random numbers.
The goodness of traditional pseudo-random number generator algorithms is measured by statistical tests on such sequences.
The RANDEXP() function returns an exponentially-distributed pseudo-random number.
Math. random() Returns a pseudo-random number between 0 and 1.
The RANDBINOM() function returns a binomially-distributed pseudo-random number.
The current implementation employs a better pseudo-random number generator for the initial state calculation.
The RANDPOISSON() function returns a poisson-distributed pseudo-random number.
In the above-mentioned steps, the pseudo-random number generator 510 generates a large integrated bit string and collectively performs an encryption process.
The RANDBERNOULLI() function returns a Bernoulli-distributed pseudo-random number.
The RAND() function returns a pseudo-random number between 0 and 1.
The RANDNEGBINOM() function returns a negative binomially-distributed pseudo-random number.
In the context of scientific modeling, pseudo-random numbers are actually desirable.
Many modern pseudo-random number sources, such as those described in Sections 7.1.2 and 7.1.3 utilize the technique of maintaining a"pool" of bits and providing operations for strongly mixing input with some randomness into the pool and extracting pseudo-random bits from the pool.
GetConsensusData Get consensus data for this block(pseudo-random number generated by consensus node).
Depending on the form of the pseudo-random number generator, the sequence may be determinable from observation of a short portion of the sequence[SCHNEIER, STERN].
This allowed the cyber criminals to reverse engineer the pseudo-random number generator behind the spinning wheels.
On the other hand, stream cipher generates the pseudo-random number and encrypts by xor between the pseudo-random number and plaintext by the bit. The security of stream cipher is evaluated by the amount of the pseudo-random number that makes the key-recovery possible more efficiently than an exhaustive key search.
This document points out many pitfalls in using poor entropy sources ortraditional pseudo-random number generation techniques for generating such quantities.
By combining the XOR for m XOR k and the pseudo-random number sequence k(which is described as(m XOR k) XOR k) using XOR operation, the string is decrypted to derive the plaintext m.
Random Number Generation Functions-The library provides functions to generate either a single pseudo-random number, or a block of such numbers. .
Others, described in section 7.2, provide the pseudo-random number strong-sequence generator but assume the input of a random seed or input from a source of entropy.
In the model of security proofs, demonstrating the safety of the PRNG with entropy assumption that they can be secured,possibility of attack by the vulnerability of RC4 used to output a pseudo-random number sequence, the vulnerability due to an update interval of internal state and the possibility of the attack by the pseudo-random number generation in user mode.
Another serious strategyerror is to assume that a very complex pseudo-random number generation algorithm will produce strong random numbers when there has been no theory behind or analysis of the algorithm.
This paper points out many pitfalls in using traditional pseudo-random number generation techniques for choosing such quantities.
The latest results of Attribute-based electronic signature, the pseudo-random number generator, new public key cryptography and safety analysis of coding are were announced.