24 resultados para random number generator

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The acceptance/rejection approach is widely used in universal nonuniform random number generators. Its key part is an accurate approximation of a given probability density from above by a hat function. This article uses a piecewise constant hat function, whose values are overestimates of the density on the elements of the partition of the domain. It uses a sawtooth overestimate of Lipschitz continuous densities, and then examines all local maximizers of such an overestimate. The method is applicable to multivariate multimodal distributions. It exhibits relatively short preprocessing time and fast generation of random variates from a very large class of distributions

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Lower approximation of Lipschitz functions plays an important role in deterministic global optimization. This article examines in detail the lower piecewise linear approximation which arises in the cutting angle method. All its local minima can be explicitly enumerated, and a special data structure was designed to process them very efficiently, improving previous results by several orders of magnitude. Further, some geometrical properties of the lower approximation have been studied, and regions on which this function is linear have been identified explicitly. Connection to a special distance function and Voronoi diagrams was established. An application of these results is a black-box multivariate random number generator, based on acceptance-rejection approach.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We take into account the computational constraints of EPC Class-1 Gen-2 passive RFID tags and only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are employed. Detailed security analysis of our scheme shows that it can offer robust security properties in terms of tag anonymity and tag untraceability while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the proposed scheme and its impact on authentication delay.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes generation of nonuniform random variates from Lipschitz-continuous densities using acceptance/rejection, and the class library ranlip which implements this method. It is assumed that the required distribution has Lipschitz-continuous density, which is either given analytically or as a black box. The algorithm builds a piecewise constant upper approximation to the density (the hat function), using a large number of its values and subdivision of the domain into hyperrectangles. The class library ranlip provides very competitive preprocessing and generation times, and yields small rejection constant, which is a measure of efficiency of the generation step. It exhibits good performance for up to five variables, and provides the user with a black box nonuniform random variate generator for a large class of distributions, in particular, multimodal distributions. It will be valuable for researchers who frequently face the task of sampling from unusual distributions, for which specialized random variate generators are not available.


Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill these gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations. Our protocol also provides additional protection by hiding the pseudo-random numbers during all transmissions using a blind-factor to prevent tracking attacks.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

RFID is a revolutionary remote technology which has many useful implications. Large scale implementation of RFID is seeking 100% information privacy and untraceability, for users and organizations, which is suitable for low cost RFID tag (Class1). To protect users and organization we are proposing an enhanced RFID mutual authentication scheme. In this protocol we use authentication based on shared unique parameters as a method to protect privacy. This protocol will be capable of handling forward and backward security, rouge reader better than existing protocols. In our new scheme we involved RFID reader’s hardware ID in addition to other shared secret information which uses hash to protect users and industries privacy. Moreover, we used LAMED as our PRNG (Pseudorandom Number Generator) which is faster and take less computational power.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Impulsivity is considered a core feature of problem gambling, however, self-reported impulsivity and inhibitory control may reflect disparate constructs. We examined self-reported impulsivity and inhibitory control in 39 treatment-seeking problem gamblers and 41 matched controls using a range of self-report questionnaires and laboratory inhibitory control tasks. We also investigated differences between treatment-seeking problem gamblers who prefer strategic (e.g., sports-betting) and non-strategic (e.g., electronic gaming machines) gambling activities. Treatment-seeking problem gamblers demonstrated elevated self-reported impulsivity, more go errors on the Stop Signal Task and a lower gap score on the Random Number Generation task than matched controls. However, overall we did not find strong evidence that treatment-seeking problem gamblers are more impulsive on laboratory inhibitory control measures. Furthermore, strategic and non-strategic problem gamblers did not differ from their respective controls on either self-reported impulsivity questionnaires or laboratory inhibitory control measures. Contrary to expectations, our results suggest that inhibitory dyscontrol may not be a key component for some treatment-seeking problem gamblers.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Several grouping proof protocols have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with EPC Class-1 Gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Also, synchronization of keys, forward security, proving simultaneity, creating dependence, detecting illegitimate tags, eliminating unwanted tag processing and denial-of-proof (DoP) attacks have not been fully addressed by many. Our protocol addresses these important gaps and is based on Quadratic Residues property where the tags are only required to use XOR, 128-bit Pseudo Random Number Generators (PRNG) and Modulo (MOD) operations which can be easily implemented on low-cost passive tags and hence achieves EPC C1G2 compliance.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Several grouping proof protocols have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with EPC Class-1 Gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, forward security, dependence, detecting illegitimate tags, eliminating unwanted tag processing and denial-of-proof (DoP) attacks have not been fully addressed by many. Our protocol addresses these important gaps and is based on simple XOR encryption and 128-bit Pseudo Random Number Generators (PRNG), operations that are easily implemented on low-cost passive tags and hence achieves EPC C1G2 compliance.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag and multi-owner RFID environment. Most of the existing work in this area do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since they use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill this gap by proposing a protocol based on simple XOR and 128-bit Pseudo Random Number Generators (PRNG), operations that can be easily implemented on low-cost passive RFID tags. The protocol thus achieves EPC C1G2 compliance while meeting the security requirements. Also, our protocol provides additional protection using a blind-factor to prevent tracking attacks.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Background: The implementation of healthy school canteen policies has been recommended as a strategy to help prevent unhealthy eating and excessive weight gain. Internationally, research suggests that schools often fail to implement practices consistent with healthy school canteen policies. Without a population wide implementation, the potential benefits of these policies will not be realised. The aim of this trial is to assess the effectiveness of an implementation intervention in increasing school canteen practices consistent with a healthy canteen policy of the New South Wales (NSW), Australia, government known as the 'Fresh Tastes @ School NSW Healthy School Canteen Strategy'.Methods/design: The parallel randomised trial will be conducted in 70 primary schools located in the Hunter region of New South Wales, Australia. Schools will be eligible to participate if they are not currently meeting key components of the healthy canteen policy. Schools will be randomly allocated after baseline data collection in a 1:1 ratio to either an intervention or control group using a computerised random number function in Microsoft Excel. Thirty-five schools will be selected to receive a multi-component intervention including implementation support from research staff, staff training, resources, recognition and incentives, consensus and leadership strategies, follow-up support and implementation feedback. The 35 schools allocated to the control group will not receive any intervention support as part of the research trial. The primary outcome measures will be i) the proportion of schools with a canteen menu that does not contain foods or beverages restricted from regular sale ('red' and 'banned' items) and ii) the proportion of schools where healthy canteen items ('green' items) represent the majority (>50%) of products listed on the menu. Outcome data will be collected via a comprehensive menu audit, conducted by dietitians blind to group allocation. Intervention effectiveness will be assessed using logistic regression models adjusting for baseline values.Discussion: The proposed trial will represent a novel contribution to the literature, being the first randomised trial internationally to examine the effectiveness of an intervention to facilitate implementation of a healthy canteen policy.