936 resultados para pseudo-random number generator
Resumo:
Thermal fluctuation approach is widely used to monitor association kinetics of surface-bound receptor-ligand interactions. Various protocols such as sliding standard deviation (SD) analysis (SSA) and Page's test analysis (PTA) have been used to estimate two-dimensional (2D) kinetic rates from the time course of displacement of molecular carrier. In the current work, we compared the estimations from both SSA and modified PTA using measured data from an optical trap assay and simulated data from a random number generator. Our results indicated that both SSA and PTA were reliable in estimating 2D kinetic rates. Parametric analysis also demonstrated that such the estimations were sensitive to parameters such as sampling rate, sliding window size, and threshold. These results furthered the understandings in quantifying the biophysics of receptor-ligand interactions.
Resumo:
Single-electron devices (SEDs) have ultra-low power dissipation and high integration density, which make them promising candidates as basic circuit elements of the next generation VLSI circuits. In this paper, we propose two novel circuit single-electron architectures: the single-electron simulated annealing algorithm (SAA) circuit and the single-electron cellular neural network (CNN). We used the MOSFET-based single-electron turnstile [1] as the basic circuit element. The SAA circuit consists of the voltage-controlled single-electron random number generator [2] and the single-electron multiple-valued memories (SEMVs) [3]. The random-number generation and variable variations in SAA are easily achieved by transferring electrons using the single-electron turnstile. The CNN circuit used the floating-gate single-electron turnstile as the neural synapses, and the number of electrons is used to represent the cells states. These novel circuits are promising in future nanoscale integrated circuits.
Resumo:
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic transactions being transferred and stored over and on insecure media has increased dramatically in recent years. The growing demand for cryptographic systems to secure this data, across a multitude of platforms, ranging from large servers to small mobile devices and smart cards, has necessitated research into low cost, flexible and secure solutions. As constraints on architectures such as area, speed and power become key factors in choosing a cryptosystem, methods for speeding up the development and evaluation process are necessary. This thesis investigates flexible hardware architectures for the main components of a cryptographic system. Dedicated hardware accelerators can provide significant performance improvements when compared to implementations on general purpose processors. Each of the designs proposed are analysed in terms of speed, area, power, energy and efficiency. Field Programmable Gate Arrays (FPGAs) are chosen as the development platform due to their fast development time and reconfigurable nature. Firstly, a reconfigurable architecture for performing elliptic curve point scalar multiplication on an FPGA is presented. Elliptic curve cryptography is one such method to secure data, offering similar security levels to traditional systems, such as RSA, but with smaller key sizes, translating into lower memory and bandwidth requirements. The architecture is implemented using different underlying algorithms and coordinates for dedicated Double-and-Add algorithms, twisted Edwards algorithms and SPA secure algorithms, and its power consumption and energy on an FPGA measured. Hardware implementation results for these new algorithms are compared against their software counterparts and the best choices for minimum area-time and area-energy circuits are then identified and examined for larger key and field sizes. Secondly, implementation methods for another component of a cryptographic system, namely hash functions, developed in the recently concluded SHA-3 hash competition are presented. Various designs from the three rounds of the NIST run competition are implemented on FPGA along with an interface to allow fair comparison of the different hash functions when operating in a standardised and constrained environment. Different methods of implementation for the designs and their subsequent performance is examined in terms of throughput, area and energy costs using various constraint metrics. Comparing many different implementation methods and algorithms is nontrivial. Another aim of this thesis is the development of generic interfaces used both to reduce implementation and test time and also to enable fair baseline comparisons of different algorithms when operating in a standardised and constrained environment. Finally, a hardware-software co-design cryptographic architecture is presented. This architecture is capable of supporting multiple types of cryptographic algorithms and is described through an application for performing public key cryptography, namely the Elliptic Curve Digital Signature Algorithm (ECDSA). This architecture makes use of the elliptic curve architecture and the hash functions described previously. These components, along with a random number generator, provide hardware acceleration for a Microblaze based cryptographic system. The trade-off in terms of performance for flexibility is discussed using dedicated software, and hardware-software co-design implementations of the elliptic curve point scalar multiplication block. Results are then presented in terms of the overall cryptographic system.
Resumo:
In the field of embedded systems design, coprocessors play an important role as a component to increase performance. Many embedded systems are built around a small General Purpose Processor (GPP). If the GPP cannot meet the performance requirements for a certain operation, a coprocessor can be included in the design. The GPP can then offload the computationally intensive operation to the coprocessor; thus increasing the performance of the overall system. A common application of coprocessors is the acceleration of cryptographic algorithms. The work presented in this thesis discusses coprocessor architectures for various cryptographic algorithms that are found in many cryptographic protocols. Their performance is then analysed on a Field Programmable Gate Array (FPGA) platform. Firstly, the acceleration of Elliptic Curve Cryptography (ECC) algorithms is investigated through the use of instruction set extension of a GPP. The performance of these algorithms in a full hardware implementation is then investigated, and an architecture for the acceleration the ECC based digital signature algorithm is developed. Hash functions are also an important component of a cryptographic system. The FPGA implementation of recent hash function designs from the SHA-3 competition are discussed and a fair comparison methodology for hash functions presented. Many cryptographic protocols involve the generation of random data, for keys or nonces. This requires a True Random Number Generator (TRNG) to be present in the system. Various TRNG designs are discussed and a secure implementation, including post-processing and failure detection, is introduced. Finally, a coprocessor for the acceleration of operations at the protocol level will be discussed, where, a novel aspect of the design is the secure method in which private-key data is handled
Resumo:
Background: Studies evaluating acceptability of simplified follow-up after medical abortion have focused on high-resource or urban settings where telephones, road connections, and modes of transport are available and where women have formal education. Objective: To investigate women's acceptability of home-assessment of abortion and whether acceptability of medical abortion differs by in-clinic or home-assessment of abortion outcome in a low-resource setting in India. Design: Secondary outcome of a randomised, controlled, non-inferiority trial. Setting Outpatient primary health care clinics in rural and urban Rajasthan, India. Population: Women were eligible if they sought abortion with a gestation up to 9 weeks, lived within defined study area and agreed to follow-up. Women were ineligible if they had known contraindications to medical abortion, haemoglobin < 85mg/l and were below 18 years. Methods: Abortion outcome assessment through routine clinic follow-up by a doctor was compared with home-assessment using a low-sensitivity pregnancy test and a pictorial instruction sheet. A computerized random number generator generated the randomisation sequence (1: 1) in blocks of six. Research assistants randomly allocated eligible women who opted for medical abortion (mifepristone and misoprostol), using opaque sealed envelopes. Blinding during outcome assessment was not possible. Main outcome measures: Women's acceptability of home-assessment was measured as future preference of follow-up. Overall satisfaction, expectations, and comparison with previous abortion experiences were compared between study groups. Results: 731 women were randomized to the clinic follow-up group (n = 353) or home-assessment group (n = 378). 623 (85%) women were successfully followed up, of those 597 (96%) were satisfied and 592 (95%) found the abortion better or as expected, with no difference between study groups. The majority, 355 (57%) women, preferred home-assessment in the event of a future abortion. Significantly more women, 284 (82%), in the home-assessment group preferred home-assessment in the future, as compared with 188 (70%) of women in the clinic follow-up group, who preferred clinic follow-up in the future (p < 0.001). Conclusion: Home-assessment is highly acceptable among women in low-resource, and rural, settings. The choice to follow-up an early medical abortion according to women's preference should be offered to foster women's reproductive autonomy.
Resumo:
The objective is to analyze the relationship between risk and number of stocks of a portfolio for an individual investor when stocks are chosen by "naive strategy". For this, we carried out an experiment in which individuals select actions to reproduce this relationship. 126 participants were informed that the risk of first choice would be an asset average of all standard deviations of the portfolios consist of a single asset, and the same procedure should be used for portfolios composed of two, three and so on, up to 30 actions . They selected the assets they want in their portfolios without the support of a financial analysis. For comparison we also tested a hypothetical simulation of 126 investors who selected shares the same universe, through a random number generator. Thus, each real participant is compensated for random hypothetical investor facing the same opportunity. Patterns were observed in the portfolios of individual participants, characterizing the curves for the components of the samples. Because these groupings are somewhat arbitrary, it was used a more objective measure of behavior: a simple linear regression for each participant, in order to predict the variance of the portfolio depending on the number of assets. In addition, we conducted a pooled regression on all observations by analyzing cross-section. The result of pattern occurs on average but not for most individuals, many of which effectively "de-diversify" when adding seemingly random bonds. Furthermore, the results are slightly worse using a random number generator. This finding challenges the belief that only a small number of titles is necessary for diversification and shows that there is only applicable to a large sample. The implications are important since many individual investors holding few stocks in their portfolios
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
Bei der Simulation von Logistik- und Produktionssystem werden Zufallszahlengeneratoren verwendet, um stochastische Einflüsse zu modellieren. Ein wichtiges Qualitätsmerkmal dieser Generatoren ist die Er-zeugung möglichst unabhängiger Zufallszahlen. Werden jedoch reale Prozesse betrachtet, so sind die Daten im Allgemeinen nicht unabhängig. Diese Arbeit befasst sich mit der Analyse von Praxisdaten bezüglich des Auftretens von Abhängigkeiten. Dazu werden Korrelationsstrukturen gesucht. Außerdem wird gezeigt, dass unabhängige Zufallszahlen in der Regel ungeeignet sind, um stochastische Prozesse mit ausgeprägten Abhängigkeiten zu modellieren.
Resumo:
Machine and Statistical Learning techniques are used in almost all online advertisement systems. The problem of discovering which content is more demanded (e.g. receive more clicks) can be modeled as a multi-armed bandit problem. Contextual bandits (i.e., bandits with covariates, side information or associative reinforcement learning) associate, to each specific content, several features that define the “context” in which it appears (e.g. user, web page, time, region). This problem can be studied in the stochastic/statistical setting by means of the conditional probability paradigm using the Bayes’ theorem. However, for very large contextual information and/or real-time constraints, the exact calculation of the Bayes’ rule is computationally infeasible. In this article, we present a method that is able to handle large contextual information for learning in contextual-bandits problems. This method was tested in the Challenge on Yahoo! dataset at ICML2012’s Workshop “new Challenges for Exploration & Exploitation 3”, obtaining the second place. Its basic exploration policy is deterministic in the sense that for the same input data (as a time-series) the same results are obtained. We address the deterministic exploration vs. exploitation issue, explaining the way in which the proposed method deterministically finds an effective dynamic trade-off based solely in the input-data, in contrast to other methods that use a random number generator.
Resumo:
In the Monte Carlo simulation of both lattice field theories and of models of statistical mechanics, identities verified by exact mean values, such as Schwinger-Dyson equations, Guerra relations, Callen identities, etc., provide well-known and sensitive tests of thermalization bias as well as checks of pseudo-random-number generators. We point out that they can be further exploited as control variates to reduce statistical errors. The strategy is general, very simple, and almost costless in CPU time. The method is demonstrated in the twodimensional Ising model at criticality, where the CPU gain factor lies between 2 and 4.
Resumo:
Background & aims It has been suggested that retinal lutein may improve visual acuity for images that are illuminated by white light. Our aim was to determine the effect of a lutein and antioxidant dietary supplement on visual function. Methods A prospective, 9- and 18-month, double-masked randomised controlled trial. For the 9-month trial, 46 healthy participants were randomised (using a random number generator) to placebo (n=25) or active (n=21) groups. Twenty-nine of these subjects went on to complete 18 months of supplementation, 15 from the placebo group, and 14 from the active group. The active group supplemented daily with 6mg lutein combined with vitamins and minerals. Outcome measures were distance and near visual acuity, contrast sensitivity, and photostress recovery time. The study had 80% power at the 5% significance level for each outcome measure. Data were collected at baseline, 9, and 18 months. Results There were no statistically significant differences between groups for any of the outcome measures over 9 or 18 months. Conclusion There was no evidence of effect of 9 or 18 months of daily supplementation with a lutein-based nutritional supplement on visual function in this group of people with healthy eyes. ISRCTN78467674.
Resumo:
Objective: The aim of the study is to determine the effect of lutein combined with vitamin and mineral supplementation on contrast sensitivity in people with age-related macular disease (ARMD). Design: A prospective, 9-month, double-masked randomized controlled trial. Setting: Aston University, Birmingham, UK and a UK optometric clinical practice. Subjects: Age-related maculopathy (ARM) and atrophic age-related macular degeneration (AMD) participants were randomized (using a random number generator) to either placebo (n = 10) or active (n=15) groups. Three of the placebo group and two of the active group dropped out. Interventions: The active group supplemented daily with 6 mg lutein combined with vitamins and minerals. The outcome measure was contrast sensitivity (CS) measured using the Pelli-Robson chart, for which the study had 80% power at the 5% significance level to detect a change of 0.3log units. Results: The CS score increased by 0.07 ± 0.07 and decreased by 0.02 ± 0.18 log units for the placebo and active groups, respectively. The difference between these values is not statistically significant (z = 0.903, P = 0.376). Conclusion: The results suggest that 6 mg of lutein supplementation in combination with other antioxidants is not beneficial for this group. Further work is required to establish optimum dosage levels.
Resumo:
Background: Age-related macular disease is the leading cause of blind registration in the developed world. One aetiological hypothesis involves oxidation, and the intrinsic vulnerability of the retina to damage via this process. This has prompted interest in the role of antioxidants, particularly the carotenoids lutein and zeaxanthin, in the prevention and treatment of this eye disease. Methods: The aim of this randomised controlled trial is to determine the effect of a nutritional supplement containing lutein, vitamins A, C and E, zinc, and copper on measures of visual function in people with and without age-related macular disease. Outcome measures are distance and near visual acuity, contrast sensitivity, colour vision, macular visual field, glare recovery, and fundus photography. Randomisation is achieved via a random number generator, and masking achieved by third party coding of the active and placebo containers. Data collection will take place at nine and 18 months, and statistical analysis will employ Student's t test. Discussion: A paucity of treatment modalities for age-related macular disease has prompted research into the development of prevention strategies. A positive effect on normals may be indicative of a role of nutritional supplementation in preventing or delaying onset of the condition. An observed benefit in the age-related macular disease group may indicate a potential role of supplementation in prevention of progression, or even a degree reversal of the visual effects caused by this condition.
Resumo:
2000 Mathematics Subject Classification: 94A29, 94B70
Resumo:
BACKGROUND: Post-abortion contraceptive use in India is low and the use of modern methods of contraception is rare, especially in rural areas. This study primarily compares contraceptive use among women whose abortion outcome was assessed in-clinic with women who assessed their abortion outcome at home, in a low-resource, primary health care setting. Moreover, it investigates how background characteristics and abortion service provision influences contraceptive use post-abortion. METHODS: A randomized controlled, non-inferiority, trial (RCT) compared clinic follow-up with home-assessment of abortion outcome at 2 weeks post-abortion. Additionally, contraceptive-use at 3 months post-abortion was investigated through a cross-sectional follow-up interview with a largely urban sub-sample of women from the RCT. Women seeking abortion with a gestational age of up to 9 weeks and who agreed to a 2-week follow-up were included (n = 731). Women with known contraindications to medical abortions, Hb < 85 mg/l and aged below 18 were excluded. Data were collected between April 2013 and August 2014 in six primary health-care clinics in Rajasthan. A computerised random number generator created the randomisation sequence (1:1) in blocks of six. Contraceptive use was measured at 2 weeks among women successfully followed-up (n = 623) and 3 months in the sub-set of women who were included if they were recruited at one of the urban study sites, owned a phone and agreed to a 3-month follow-up (n = 114). RESULTS: There were no differences between contraceptive use and continuation between study groups at 3 months (76 % clinic follow-up, 77 % home-assessment), however women in the clinic follow-up group were most likely to adopt a contraceptive method at 2 weeks (62 ± 12 %), while women in the home-assessment group were most likely to adopt a method after next menstruation (60 ± 13 %). Fifty-two per cent of women who initiated a method at 2 weeks chose the 3-month injection or the copper intrauterine device. Only 4 % of women preferred sterilization. Caste, educational attainment, or type of residence did not influence contraceptive use. CONCLUSIONS: Simplified follow-up after early medical abortion will not change women's opportunities to access contraception in a low-resource setting, if contraceptive services are provided as intra-abortion services as early as on day one. Women's postabortion contraceptive use at 3 months is unlikely to be affected by mode of followup after medical abortion, also in a low-resource setting. Clinical guidelines need to encourage intra-abortion contraception, offering the full spectrum of evidence-based methods, especially long-acting reversible methods. TRIAL REGISTRATION: Clinicaltrials.gov NCT01827995.