期刊文献+

对数正态分布伪随机数的产生与检验 被引量:2

Algorithms for Generating and Testing Lognormal Pseudorandom Numbers
下载PDF
导出
摘要 本文给出了一种产生对数正态分布伪随机数的算法以及相应的检验方法,产生的均匀分布随机序列,经近似抽样产生正态分布的随机数,再经变换抽样最终产生对数正态分布的随机序列。采用卡方检验验证其是否符合对数正态分布。计算实例表明,所给出的方法具有产生伪随机数速度快、数量大、方差小和较长的周期等特点,具有较大的工程实用价值。计算结果验证了所给方法的正确性。 Algorithms for generating and testing the lognormal pseudorandom numbers are given in the paper. First, an algorithm for generating (0,1) uniformly distributed pseudorandom numbers is introduced, and then the normally distributed pseudorandom numbers are obtained through approximate decimation. Furthermore, the lognormal pseudorandom numbers are generated through the transform of random deviates with a normal distribution. The method for X^2 test is given. The calculated example shows the validity of the given method. The methods can be used for engineering simulation.
出处 《天津商学院学报》 2007年第6期1-5,共5页 Journal of Tianjin University of Commerce
关键词 伪随机数 均匀分布 正态分布 对数正态分布 卡方检验 工程模拟 pseudorandom numbers uniform distribution normal distribution lognormal distribution X^2 test engineering simulation
  • 相关文献

参考文献5

二级参考文献15

  • 1林象平,雷达对抗原理,1985年
  • 2查光明 熊贤祚.扩频通信[M].西安:西安电子科大出版社,1999.158.
  • 3FIPS. FIPS140-2: Security requirements for Cryptographic Modules. http://csrc. nist. gov/publications/fips/fips140-2/fips1402.pdf. 2001
  • 4Tomassini M, et al. Generating high-quality random numbers in parallel by cellular automata. Future Generation Computer Systems, 1999, 16(2-3): 291~305
  • 5Tomassini M, Perrenoud M. Cryptography with cellular automata. Applied Soft Computing Journal, 2001, 1(2): 151~160
  • 6Seredynski F, Bouvry P, Zomaya A Y. Secret Key Cryptography with Cellular Automata. In: Proc. of the Intl. Parallel and Distributed Processing Symposium (IPDPS'03), Nice, France, 2003
  • 7ChopardB DrozM 祝玉学 赵学龙译.物理系统的元胞自动机模拟[M].北京:清华大学出版社,2003..
  • 8Mungkee D.Cryptographic random number generators[EB/OL].http://www.phrack.org/phrack/59/p59-0x0f.txt
  • 9Intel.Intel architecture software developer's manual volume 2:instruction set reference[EB/OL].http://www.intel.com/design/penti umi i/ manuals/ 2 4 3191.htm
  • 10Kaufman C.Intemet key exchange (IKE v2) protocol[EB/OL].IETF draft-ietf-ipsec-ikev2-17.txt.Sep,2004

共引文献35

同被引文献12

  • 1罗华,刘宏.TMS320C54X DSP引导过程加密方法的研究[J].哈尔滨商业大学学报(自然科学版),2003,19(6):644-647. 被引量:1
  • 2马华,张晓清,张鹏鸽.一种基于线性同余算法的伪随机数产生器[J].纯粹数学与应用数学,2005,21(3):206-209. 被引量:17
  • 3杨振海,程维虎.非均匀随机数产生[J].数理统计与管理,2006,25(6):750-756. 被引量:18
  • 4Devroye L. Non-uniform Random Vafiate Generation[M]. New York: Springer, 1986.
  • 5Robert C P, Casella G. Monte Carlo Statistical Methods[M]. New York: Springer, 2004.
  • 6Rajasekaran S,Ross K W. Fast Algorithms for Generating Discrete Random Variates with Changing Distributions[J]. ACM Transactions on Modeling and Computer Simulation, 1993, 3 (1) : 1-19.
  • 7Wu P, Huang K,Ouyang S. Bit-paraUel Random Number Generation for Discrete Uniform Distributions[J]. Computer Physics Communications, 2002,144 : 252-260.
  • 8Orlov M. Optimized Random Number Generation in an Interval [J]. Information Processing Letters, 2009,109 (13) : 722-725.
  • 9Geest P A. An Algorithm to Generate Samples of Multi-varlate Distributions with Correlated Marginals [J]. Computational Statistics & Data Analysis, 1998,27 :271-289.
  • 10Hu X,He J,Ly H. Generating Multivariate Nonnormal Distribution Random Numbers Based on Copula Function[J]. Journal of Information and Computing Science,2007,2(3) : 191-196.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部