隨機數發生器 的英文怎麼說

中文拼音 [suíshǔshēng]
隨機數發生器 英文
random number generation
  • : Ⅰ動詞1 (跟; 跟隨) follow 2 (順從) comply with; adapt to 3 (任憑; 由著) let (sb do as he li...
  • : machineengine
  • : 數副詞(屢次) frequently; repeatedly
  • : 名詞(頭發) hair
  • : Ⅰ動詞1 (生育; 生殖) give birth to; bear 2 (出生) be born 3 (生長) grow 4 (生存; 活) live;...
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • 隨機 : random stochasticrandom
  1. This paper concerns with almost all kinds of generators such as the linear, nonlinear and inversive congruential methods, fibonacci and tausworthe sequences, add - with - carry and subtract - with - borrow methods, multiple prime generator and chaotic mapping

    目前國際上關于有很多熱門的理論和方法,除了傳統的線性同余法,還有非線性同余法、 fibonacci 、 tausworthe序列、進位加?借位減法等。
  2. To simulate the preparation of the secret - key, a gaussian random number generator in fpga is designed, which based on the analysis of ziggurat algorithm

    為了模擬密鑰的制備,在分析ziggurat演算法的基礎上完成了高斯隨機數發生器的fpga實現。
  3. The rsa key generator is made up of two parts : random number generator ( rng ) and the implementation of rsa key generation algorithm

    Rsa密鑰由兩大部分構成:硬體隨機數發生器和rsa密鑰成演算法的軟體實現。
  4. Random number generators are used in many areas including computer simulation, monte - carlo techniques on numerical analysis, test problem generation for the performance evaluation of computer algorithms, statistical sampling, and so on

    隨機數發生器在很多領域有廣泛的應用,包括計算模擬、值分析上的蒙特卡羅方法、評估演算法的測試問題、統計抽樣等等。
  5. Because the random numbers generators are the key of monte carlo methods and quasi - monte carlo methods. chapter 2 describes the pseudo - random number generators and quasi - random number generators

    因為隨機數發生器是蒙特卡羅和擬蒙特卡羅方法的核心之一,所以第2章介紹了偽和擬隨機數發生器
  6. A pile of practical issues get in the way of directly applying the theory. remember, stealing someone else s work whenever possible makes buffer overflow exploits much easier

    另一個極端是基於硬體的隨機數發生器,它可以執行非常好的性能,但通常由於其昂貴的價格或缺少普遍可用性而不實用。
  7. The security of the algorithm is analyzed from the randomness, linear complexity of the chaotic sequence and the intensity of initial key. the results show the randomness of the key sequence pass the frequency test, sequential test, poker test, autocorrelation test, runs test, etc. and the total level is better than the binary sequence generated by the prng of delphi 7. 0, logistic chaotic system and rc4, the linear complexity comes up to the expectation, the initial key has very strong intensity

    本文最後從混沌序列的性、線性復雜度和初始密鑰的強度三個方面對演算法進行了安全性分析,結果表明演算法產的密鑰序列的性完全通過了頻檢驗、序列檢驗、撲克檢驗、自相關檢驗和遊程檢驗等5種統計檢驗方法的檢驗,而且整體水平要好於delphi7 . 0中的偽隨機數發生器、 logistic混沌系統和rc4三種方法產的二進制序列,線性復雜度達到了學期望值。
  8. Taking the design and realization of trng as reference, this thesis make detail introduce of the three kinds of design flow

    本文結合模混合的真隨機數發生器ip的設計和實現,對這三套流程進行了比較詳盡的介紹。
  9. In this dissertation we study the important characteristic of monte carlo method - - - generation and testing of pseudo - random number 。 we programmed a program of uniform random - number generator and uniform random - vector generator, and simply test the performance of random - number generator

    研究了蒙特卡羅方法的重要特徵的產和檢驗,編寫了一個均勻向量程序,並對隨機數發生器進行了簡單檢驗。
  10. Talking about the random number generators, we discussed the details of the generating algorithm of the middle - square method, the linear congruential method, the chaos - mapping method, ansi x9. 17, dsa, and the intel generator

    成方面,本文討論了常用的隨機數發生器,包括平方取中法,線性同余法,混沌映射法,以及ansix9 . 17 , dsa ,和intel的序列
  11. Pseudo - random number generator, a mechanism used in a computer system to create, in as non - deterministic a manner as possible, a seed value from which a pseudo - random number will be derived

    隨機數發生器( pseudo - random number generator ) ,它是在計算系統中使用的以盡可能不確定的方式創建種子值的一種制,然後從該種子值派出偽
  12. On unix machines, the goal of the attacker is to get an interactive shell. this means typical attack code usually attempts to fire up

    直到世界上每臺計算都在硬體中安裝了隨機數發生器為止,總是需要一種盡可能接近真正性的軟體。
  13. Method of generating long period pseudo - random numbers based on a special property of prime numbers

    超素法長周期偽隨機數發生器的應用演算法
  14. Of course, we have to make sure that the address with this instruction does not contain a null byte itself

    然後,將這個種子值饋送給出色的偽隨機數發生器(我們將在下一部分中討論) 。
  15. As a result, it is necessary to add a digital interface to trng which is realized by analog circuit

    因此就需要為以模擬電路為核心的真隨機數發生器添加字介面,以符合規定的總線協議標準。
  16. Where gary and john introduce their philosophy of security, and explain why they re focusing on software security issues facing developers

    ,這是gary和john所撰寫的文章,討論有關如何通過軟體實現可靠的隨機數發生器
  17. It is widely accepted that the core of any truly random number generator ( trng ) must be an intrinsically random physical process

    傳統的真隨機數發生器,其核心是一個真正的物理過程;如利用噪聲產等。
  18. Crafting an exploit for a stack overflow is fairly difficult, even if you have mastered the underlying concepts covered in our series of articles

    一個極端是傳統的偽隨機數發生器,它很容易被攻破,因此不適合注重安全性的應用程序。
  19. With the development of the theory of nonlinear systems, the behavior of chaos has provided new theory foundation and realization for trng

    著非線性系統理論的展,非線性系統的混沌行為設計真隨機數發生器提供了新的理論基礎和實現方法。
  20. Unfortunately, we have to get the address exactly right, down to the byte, or the program will crash. coming up with the right address using the trial and error approach may take a while. to make things easier, we can insert lots of null operations in front of the shell code

    但是,問題的大部分是因為據很可能有統計偏差,因此大量精力花在了使用七個密碼散列和一個相當慢(但非常好)的偽隨機數發生器來消除此類問題上。
分享友人