random generation
Recently Published Documents


TOTAL DOCUMENTS

300
(FIVE YEARS 49)

H-INDEX

30
(FIVE YEARS 2)

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Marc-André Schulz ◽  
Sebastian Baier ◽  
Benjamin Timmermann ◽  
Danilo Bzdok ◽  
Karsten Witt

AbstractIs the cognitive process of random number generation implemented via person-specific strategies corresponding to highly individual random generation behaviour? We examined random number sequences of 115 healthy participants and developed a method to quantify the similarity between two number sequences on the basis of Damerau and Levenshtein’s edit distance. “Same-author” and “different author” sequence pairs could be distinguished (96.5% AUC) based on 300 pseudo-random digits alone. We show that this phenomenon is driven by individual preference and inhibition of patterns and stays constant over a period of 1 week, forming a cognitive fingerprint.


Author(s):  
Huda M. Salih ◽  
Raghda Salam Al Mahdawi

Digital technologies grow more rapidly; information security threats are becoming increasingly dangerous. Advanced and various cyber-attacks and security threats, like targeted emails, and information exploitation, pose a critical threat that basically undermines our trust in the digital society. Rivest cipher 4 (RC4) algorithm is a significant cipher of a stream that could be utilized with protocols of the internet, the advantage of the RC4 algorithm is that it is simple and effective. There are several weak, especially after the pseudo-random generation algorithm (PRGA), PRGA's initially 256 rounds (the amount of the RC4 permutation). Several modified RC4 studies have been published thus far, however, they all face either standard privacy or achievement evaluation issues. This paper proposes a new RC4 algorithm that is based on the user's retina (RC4-Retina), which has solved both of these weak points it was indicated in the standard RC4 algorithm. The novelty of retina key scheduling algorithm (RKSA), which is generated by relying on the user's retina of the algorithm will modify the matrix of permutation used to configure the keys. The efficiency of the improved algorithm was measured by depending on the average security of ciphertext of different keys and different messages, results were good compared to the standard algorithm.


2021 ◽  
pp. 1-19
Author(s):  
Lyle Regenwetter ◽  
Brent Curry ◽  
Faez Ahmed

Abstract In this paper, we present “BIKED,” a dataset comprised of 4500 individually designed bicycle models sourced from hundreds of designers. We expect BIKED to enable a variety of data-driven design applications for bicycles and support the development of data-driven design methods. The dataset is comprised of a variety of design information including assembly images, component images, numerical design parameters, and class labels. In this paper, we first discuss the processing of the dataset, then highlight some prominent research questions that BIKED can help address. Of these questions, we further explore the following in detail: 1) How can we explore, understand, and visualize the current design space of bicycles and utilize this information? We apply unsupervised embedding methods to study the design space and identify key takeaways from this analysis. 2) When designing bikes using algorithms, under what conditions can machines understand the design of a given bike? We train a multitude of classifiers to understand designs, then examine the behavior of these classifiers through confusion matrices and permutation-based interpretability analysis. 3) Can machines learn to synthesize new bicycle designs by studying existing ones? We test Variational Autoencoders on random generation, interpolation, and extrapolation tasks after training on BIKED data. The dataset and code are available at http://decode.mit.edu/projects/biked/


Radiotekhnika ◽  
2021 ◽  
pp. 53-63
Author(s):  
A.A. Kuznetsov ◽  
N.A. Poluyanenko ◽  
V.A. Katrich ◽  
S.O. Kandii ◽  
Yu.A. Zaichenko

Nonlinear substitutions (S-boxes) are used in most modern symmetric cryptoalgorithms. They are designed to mix input data and play a significant role in ensuring resistance against known cryptanalytic attacks (differential, linear, algebraic and other cryptanalysis methods). However, random generation of nonlinear substitutions with the desired indicators is an extremely difficult mathematical problem. This article explores the heuristic techniques for S-boxes informed search, in particular, discusses various cost functions used in most of the known algorithms (for example, local search, hill climbing, simulated annealing, genetic search, etc.). The aim of the study is to determine the specific parameters of heuristic functions, which, on the one hand, do not reduce the degree of awareness of the search nodes, and on the other hand, do not require significant computational costs. The article examines the influence of individual parameters on the value of the cost function and complexity of its calculation. It also provides specific recommendations for the formation of parameters for heuristic search for S-boxes, which significantly affect the efficiency of generating nonlinear substitutions for symmetric cryptography.


2021 ◽  
Vol 11 (2) ◽  
pp. 167-195
Author(s):  
Ilana Shapiro ◽  
Mark Huber

Random generation of music goes back at least to the 1700s with the introduction of Musical Dice Games. More recently, Markov chain models have been used as a way of extracting information from a piece of music and generating new music. We explain this approach and give Python code for using it to first draw out a model of the music and then create new music with that model.


2021 ◽  
pp. 1-20
Author(s):  
Anne-Kristin Solbakk ◽  
James Lubell ◽  
Sabine Leske ◽  
Ingrid Funderud ◽  
Anaïs Llorens ◽  
...  

Abstract Anticipation, monitoring, and evaluation of the outcome of one's actions are at the core of proactive control. Individuals with lesions to OFC often demonstrate behaviors that indicate a lack of recognition or concern for the negative effects of their actions. Altered action timing has also been reported in these patients. We investigated the role of OFC in predicting and monitoring the sensory outcomes of self-paced actions. We studied patients with focal OFC lesions (n = 15) and healthy controls (n = 20) while they produced actions that infrequently evoked unexpected outcomes. Participants performed a self-paced, random generation task where they repeatedly pressed right and left buttons that were associated with specific sensory outcomes: a 1- and 2-kHz tone, respectively. Occasional unexpected action outcomes occurred (mismatch) that inverted the learned button–tone association (match). We analyzed ERPs to the expected and unexpected outcomes as well as action timing. Neither group showed post-mismatch slowing of button presses, but OFC patients had a higher number of fast button presses, indicating that they were inferior to controls at producing regularly timed actions. Mismatch trials elicited enhanced N2b-P3a responses across groups as indicated by the significant main effect of task condition. Planned within-group analyses showed, however, that patients did not have a significant condition effect, suggesting that the result of the omnibus analysis was driven primarily by the controls. Altogether, our findings indicate that monitoring of action timing and the sensory outcomes of self-paced actions as indexed by ERPs is impacted by OFC damage.


Sign in / Sign up

Export Citation Format

Share Document