Convergence versus Divergence Behaviors of Asynchronous Iterations, and Their Applications in Concrete Situations
Abstract
:1. Introduction
2. An Historical Perspective of the Convergence Study
2.1. Introduction the Asynchronous Iterations
2.2. Three Historical Models
2.2.1. The Chazan and Miranker Model
2.2.2. Asynchronous Iterations with Memory
- , for all ;
- tends to infinity when j tends to infinity; and
- i appears an infinite number of times in S.
2.2.3. Bertsekas Model
- some sets, and .
- some functions, and defined from to .
- Hypothesis of total asynchronism. The sets are infinite. Moreover, if is a sub-series of elements of that tends to infinity, then , for all .
- Partial asynchronism hypothesis. There is a positive integer B, called asynchronism character, such as:
- For any , and for any t, at least one element of the set belongs to : each component is refreshed at least once during an interval containing B refreshes.
- , , and : the information used to update a component has a maximum delay of B.
- : when updating the component assigned to it, each processor uses the last value of the same component.
2.3. On the Usefulness of Convergence Situations
2.3.1. Case of Equation Systems
2.3.2. Fixed Point Problems
- F has a fixed point in ,
- and F is contracting in for the vectorial norm φ,
2.3.3. Bertsekas’ Asynchronous Convergence Theorem
- ,
- if x is a sequence of vectors such as for all j, then x tends to a fixed point of F.
2.4. The Problem of Algorithm Termination
3. Theoretical Foundations of the Divergence
3.1. Asynchronous Iterations as a Dynamical System
3.2. The Mathematical Theory of Chaos
3.2.1. Notations and Terminologies
3.2.2. Devaney-Based Approaches
- Transitivity: For each couple of open sets , s.t. .
- Regularity: periodic points are dense in .
- Sensitivity to the initial conditions: s.t.
- •
- is unstable if all its points are unstable: and .
- •
- is expansive if
- •
- Topological mixing: for all pairs of open disjointed sets that are not empty , s.t. .
- •
- Strong transitivity:
- •
- Total transitivity: , the composition is transitive.
- •
- Undecomposable: it is not the union of two closed, non-empty subsets that are positively invariant ().
3.2.3. Approach from Li and Yorke
3.2.4. Lyapunov Exponent
3.2.5. Topological Entropy
3.3. The Disorder of Asynchronous Iterations
4. Applications of the Divergence
4.1. Some Theoretical Developments
4.2. Asynchronous Iterations as Randomness Generators
4.2.1. Qualitative Relations between Topological Properties and Statistical Tests
- Regularity. As recalled earlier in this article, a chaotic dynamical system must have an element of regularity. Depending on the chosen definition of chaos, this element can be the existence of a dense orbit, the density of periodic points, etc. The key idea is that a dynamical system with no periodicity is not as chaotic as a system having periodic orbits: in the first situation, we can predict something and gain knowledge about the behavior of the system, that is, it never enters into a loop. Similar importance for periodicity is emphasized in the two following NIST tests [46]:
- -
- Non-overlapping Template Matching Test. Detect the production of too many occurrences of a given non-periodic (aperiodic) pattern.
- -
- Discrete Fourier Transform (Spectral) Test. Detect periodic features (i.e., repetitive patterns that are close one to another) in the tested sequence that would indicate a deviation from the assumption of randomness.
- Transitivity. This topological property previously introduced states where the dynamical system is intrinsically complicated: it cannot be simplified into two subsystems that do not interact, as we can find in any neighborhood of any point another point whose orbit visits the whole phase space. This focus on the places visited by the orbits of the dynamical system takes various nonequivalent formulations in the mathematical theory of chaos, namely: transitivity, strong transitivity, total transitivity, topological mixing, and so on. Similar attention is brought on the states visited during a random walk in the two tests below [46]:
- -
- Random Excursions Variant Test. Detect deviations from the expected number of visits to various states in the random walk.
- -
- Random Excursions Test. Determine if the number of visits to a particular state within a cycle deviates from what one would expect for a random sequence.
- Chaos according to Li and Yorke. We recalled that two points of the phase space define a couple of Li–Yorke when and , meaning that their orbits always oscillate as the iterations pass. When a system is compact and contains an uncountable set of such points, it is claimed as chaotic according to Li–Yorke [30,48]. A similar property is regarded in the following NIST test [46].
- -
- Runs Test. To determine whether the number of runs of ones and zeros of various lengths is as expected for a random sequence. In particular, this test determines whether the oscillation between such zeros and ones is too fast or too slow.
- Topological entropy. The desire to formulate an equivalency of the thermodynamics entropy has emerged both in the topological and statistical fields. Once again, a similar objective has led to two different rewritings of an entropy-based disorder: the famous Shannon definition is approximated in the statistical approach, whereas topological entropy has been defined previously. This value measures the average exponential growth of the number of distinguishable orbit segments. In this sense, it measures the complexity of the topological dynamical system, whereas the Shannon approach comes to mind when defining the following test [46]:
- -
- Approximate Entropy Test. Compare the frequency of the overlapping blocks of two consecutive/adjacent lengths (m and ) against the expected result for a random sequence.
- Non-linearity, complexity. Finally, let us remark that non-linearity and complexity are not only sought in general to obtain chaos, but they are also required for randomness, as illustrated by the two tests below [46].
- -
- Binary Matrix Rank Test. Check for linear dependence among fixed-length substrings of the original sequence.
- -
- Linear Complexity Test. Determine whether or not the sequence is complex enough to be considered random.
4.2.2. The CIPRNGs: Asynchronous Iterations Based PRNGs
CIPRNG, Version 1
- Some asynchronous iterations are fulfilled, with the vectorial negation and PRNG1 as strategy, to generate a sequence of Boolean vectors: the successive internal states of the iterated system.
- Some of these vectors are randomly extracted with PRNG2 and their components constitute our pseudorandom bit flow. Algorithm 1 provides the way to produce one output.
Algorithm 1: An arbitrary round of CIPRNG(PRNG1,PRNG2) version 1 |
Input: The internal state x (an array of 1-bit words) Output: An array of 1-bit words 1: for do 2: ; 3: ; 4: return x; |
XOR CIPRNG
4.2.3. Preserving Security
Theoretical Proof of Security
Practical Security Evaluation
4.3. Other Concrete Applications
4.3.1. Information Security Field
4.3.2. Biological Modeling
5. Conclusions
Funding
Conflicts of Interest
References
- Kozyakin, V. A short introduction to asynchronous systems. In Sixth International Conference on Difference Equations; CRC: Boca Raton, FL, USA, 2004; pp. 153–165. [Google Scholar]
- Wolfson-Pou, J.; Chow, E. Convergence models and surprising results for the asynchronous Jacobi method. In Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS), Vancouver, BC, Canada, 21–25 May 2018; pp. 940–949. [Google Scholar]
- Wolfson-Pou, J.; Chow, E. Modeling the asynchronous Jacobi method without communication delays. J. Parallel Distrib. Comput. 2019, 128, 84–98. [Google Scholar] [CrossRef]
- Guyeux, C. An update on the topological and ergodic properties of asynchronous iterations. In Proceedings of the Sixth International Conference on Parallel, Distributed, GPU and Cloud Computing for Engineering, Pécs, Hungary, 4–5 June 2019; Iványi, P., Topping, B.H.V., Eds.; Civil-Comp Press: Stirlingshire, UK, 2019. [Google Scholar]
- Robert, F. Discrete Iterations, a Metric Study; Volume 6 of Series in Computational Mathematics; Springer: Heidelberg, Germany, 1986. [Google Scholar]
- Kaszkurewicz, E.; Bhaya, A. Matrix Diagonal Stability in Systems and Computation; Springer Science & Business Media: New York, NY, USA, 2012. [Google Scholar]
- Kozyakin, V. An Annotated Bibliography on Convergence of Matrix Products and the Theory of Joint/Generalized Spectral Radius. Available online: https://drive.google.com/file/d/0Bxw63g5l4P7pLXgwcWxVZ3RoTVk/view?usp=sharing (accessed on 16 October 2020).
- Guyeux, C. Le Désordre des Itérations Chaotiques—Applications aux Réseaux de Capteurs, à la Dissimulation D’information, et aux Fonctions de Hachage; Éditions Universitaires Européennes: Saarbrücken, Germany, 2012; p. 362. ISBN 978-3-8417-9417-8. [Google Scholar]
- Miellou, J.-C.; Spitéri, P. Un critère de convergence pour des méthodes générales de point fixe. Rairo Modélisation Mathématique Anal. Numérique 1985, 19, 645–669. [Google Scholar] [CrossRef] [Green Version]
- Spitéri, P. Contribution à L’étude de la Stabilite au Sens de Liapounov de Certains Systemes Differentiels Non Lineaires. Ph.D. Thesis, Université de Franche-Comté, Besançon, France, 1974. [Google Scholar]
- Chazan, D.; Miranker, W. Chaotic relaxation. Linear Algebra Appl. 1969, 2, 199–222. [Google Scholar] [CrossRef] [Green Version]
- Miellou, J.-C. Algorithmes de relaxation chaotique à retards. Rairo 1975, 9, 148–162. [Google Scholar] [CrossRef] [Green Version]
- Baudet, G.M. Asynchronous iterative methods for multiprocessors. J. ACM 1978, 25, 226–244. [Google Scholar] [CrossRef]
- Miellou, J.-C. Itérations chaotiques à retards, étude de la convergence dans le cas d’espaces partiellement ordonnés. C. R. Acad. Sci. Paris 1975, 280, 233–236. [Google Scholar]
- El Tarazi, M.N. Contraction et Ordre Partiel Pour l’Etude d’Algorithmes Synchrones et Asynchrones en Analyse Numérique. Ph.D. Thesis, Faculté des Sciences et Techniques de l’Université de Franche-Comté, Besançon, France, 1981. [Google Scholar]
- El Baz, D. Contribution à l’Algorithmique Parallèle. Le Concept d’Asynchronisme: Étude Théorique, Mise en œuvre, et Application. Ph.D. Thesis, Habilitation à Diriger des Recherches, Institut National Polytechnique de Toulouse, Paris, France, 1998. [Google Scholar]
- Bertsekas, D.P.; Tsitsiklis, J.N. Parallel and Distributed Iterative Algorithms: A Selective Survey. Available online: https://www.researchgate.net/publication/37594457_Parallel_and_distributed_iterative_algorithms_a_selective_survey (accessed on 16 October 2020).
- Bahi, J.M. Algorithmes Asynchrones Pour des Systèmes Différentiels-Algébriques. Simulation Numérique sur des Exemples de Circuits Électriques. Ph.D. Thesis, Université de Franche-Comté, Besançon, France, 1991. [Google Scholar]
- Bahi, J.M. Méthodes Itératives Dans des Espaces Produits. Application au Calcul Parallèle; Habilitation à Diriger des Recherches, Université de Franche-Comté: Besançon, France, 1998. [Google Scholar]
- El Tarazi, M.N. Some convergence results for asynchronous algorithms. Numer. Math. 1982, 39, 325–340. [Google Scholar] [CrossRef]
- El Tarazi, M.N. Algorithmes mixtes asynchrones. Etude de convergence monotone. Numer. Math. 1984, 44, 363–369. [Google Scholar] [CrossRef]
- Jacquemard, C. Contribution à l’Etude d’Algorithmes à Convergence Monotone. Ph.D. Thesis, Université de Franche-Comté, Besançon, France, 1977. [Google Scholar]
- Bertsekas, D.P.; Tsitsiklis, J.N. Parallel and Distributed Computation: Numerical Methods; Prentice-Hall, Inc.: Upper Saddle River, NJ, USA, 1989. [Google Scholar]
- Lubachevsky, B.; Mitra, D. A chaotic asynchronous algorithm for computing the fixed point of a nonnegative matrix of unit spectral radius. J. ACM 1986, 33, 130–150. [Google Scholar] [CrossRef]
- Frommer, A.; Szyld, D.B. Asynchronous two-stage iterative methods. Numer. Math. 1994, 69, 141–153. [Google Scholar] [CrossRef]
- Frommer, A.; Schwandt, H.; Szyld, D.B. Asynchronous weighted additive Schwarz methods. Electron. Trans. Numer. Anal. 1997, 5, 48–61. [Google Scholar]
- Chajakis, E.D.; Zenios, S.A. Synchronous and asynchronous implementations of relaxation algorithms for nonlinear network optimization. Parallel Comput. 1991, 17, 873–894. [Google Scholar] [CrossRef]
- Guyeux, C.; Bahi, J. A topological study of chaotic iterations. Application to hash functions. In Computational Intelligence for Privacy and Security; Springer: Berlin/Heidelberg, Germany, 2012; pp. 51–73. [Google Scholar]
- Formenti, E. Automates Cellulaires et Chaos: De la Vision Topologique à la Vision Algorithmique. Ph.D. Thesis, École Normale Supérieure de Lyon, Lyon, France, 1998. [Google Scholar]
- Li, T.Y.; Yorke, J.A. Period three implies chaos. Am. Math. Mon. 1975, 82, 985–992. [Google Scholar] [CrossRef]
- Bahi, J.; Couchot, J.-F.; Guyeux, C.; Richard, A. On the link between strongly connected iteration graphs and chaotic boolean discrete-time dynamical systems. In Proceedings of the 18th International Symposium on Fundamentals of Computation Theory, Oslo, Norway, 22–25 August 2011; Volume 6914, pp. 126–137. [Google Scholar]
- Bahi, J.; Couchot, J.-F.; Guyeux, C. Quality analysis of a chaotic proven keyed hash function. Int. J. Adv. Internet Technol. 2012, 5, 26–33. [Google Scholar]
- Guyeux, C.; Bahi, J.M. A new chaos-based watermarking algorithm. In Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), Athens, Greece, 26–28 July 2010; pp. 1–4. [Google Scholar]
- Bahi, J.; Guyeux, C. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications; Chapman & Hall, CRC Press: Boca Raton, FL, USA, 2013; p. 212. [Google Scholar]
- Guyeux, C.; Wang, Q.; Fang, X.; Bahi, J. Introducing the truly chaotic finite state machines and their applications in security field. In Proceedings of the 2014 24th International Symposium on Nonlinear Theory and its Applications (NOLTA), Luzern, Switzerland, 14–18 September 2014. [Google Scholar]
- Bahi, J.M.; Couchot, J.-F.; Guyeux, C. Steganography: A class of algorithms having secure properties. In Proceedings of the 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Dalian, China, 14–16 October 2011; pp. 209–212. [Google Scholar]
- Couchot, J.-F.; Couturier, R.; Guyeux, C. Stabylo: Steganography with adaptive, Bbs, and binary embedding at low cost. Ann. Telecommun.-Ann. Télécommun. 2015, 70, 441–449. [Google Scholar] [CrossRef]
- Guyeux, C.; Bahi, J.M. An improved watermarking scheme for internet applications. In Proceedings of the 2010 2nd International Conference on Evolving Internet, Porto, Portugal, 18–22 October 2010; pp. 119–124. [Google Scholar]
- Bahi, J.M.; Friot, N.; Guyeux, C. Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure. In Proceedings of the 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus, Greece, 18–20 July 2012; pp. 359–362. [Google Scholar]
- Lin, Z.; Guyeux, C.; Yu, S.; Wang, Q.; Cai, S. On the use of chaotic iterations to design keyed hash function. Clust. Comput. 2019, 22, 905–919. [Google Scholar] [CrossRef]
- Contassot-Vivier, S.; Couchot, J.-F.; Guyeux, C.; Heam, P.-C. Random walk in a n-cube without Hamiltonian cycle to chaotic pseudorandom number generation: Theoretical and practical considerations. Int. J. Bifurc. Chaos 2017, 27, 1750014. [Google Scholar] [CrossRef]
- Couchot, J.-F.; Heam, P.-C.; Guyeux, C.; Wang, Q.; Bahi, J.M. Pseudorandom number generators with balanced gray codes. In Proceedings of the 2014 11th International Conference on Security and Cryptography (SECRYPT), Vienna, Austria, 28–30 August 2014; pp. 1–7. [Google Scholar]
- Bahi, J.; Guyeux, C.; Salomon, M. Building a chaotic proven neural network. In Proceedings of the IEEE International Conference on Computer Applications and Network Security (ICCANS 2011), Malé, Maldives, 27–29 May 2011. [Google Scholar]
- Bahi, J.M.; Couchot, J.-F.; Guyeux, C.; Salomon, M. Neural networks and chaos: Construction, evaluation of chaotic networks, and prediction of chaos with multilayer feedforward network. Chaos 2012, 22, 013122. [Google Scholar] [CrossRef] [Green Version]
- Salomon, M.; Couturier, R.; Guyeux, C.; Couchot, J.-F.; Bahi, J.M. Steganalysis via a convolutional neural network using large convolution filters for embedding process with same stego key: A deep learning approach for telemedicine. La Rech. Eur. En Télémédecine 2017, 6, 79–92. [Google Scholar] [CrossRef]
- Barker, E.; Roginsky, A. Draft NIST Special Publication 800-131 Recommendation for the Transitioning of Cryptographic Algorithms And Key Sizes. Available online: https://csrc.nist.gov/CSRC/media/Publications/sp/800-131a/rev-2/draft/documents/sp800-131Ar2-draft.pdf (accessed on 16 October 2020).
- Bahi, J.; Fang, X.; Guyeux, C. An optimization technique on pseudorandom generators based on chaotic iterations. In Proceedings of the 2012 4th International Conference on Evolving Internet (INTERNET), Venice, Italy, 24–29 June 2012; pp. 31–36. [Google Scholar]
- Ruette, S. Chaos en Dynamique Topologique, en Particulier sur l’Intervalle, Mesures d’Entropie Maximale. Ph.D. Thesis, Université d’Aix-Marseille II, Marseille, France, 2001. [Google Scholar]
- Bahi, J.M.; Guyeux, C.; Wang, Q. Improving random number generators by chaotic iterations. Application in data hiding. In Proceedings of the International Conference on Computer Application and System Modeling (ICCASM 2010), Taiyuan, China, 22–24 October 2010. [Google Scholar]
- Wang, Q.; Guyeux, C.; Bahi, J.M. A novel pseudo-random number generator based on discrete chaotic iterations. In Proceedings of the 2009 First International Conference on Evolving Internet, Cannes, France, 23–29 August 2009; IEEE Computer Society: Washington, DC, USA, 2009; pp. 71–76. [Google Scholar]
- Marsaglia, G. Diehard: A Battery of Tests of Randomness. 1996. Available online: http://stat.fsu.edu/~geo/diehard.html (accessed on 16 October 2020).
- Simard, R.; De Montréal, U. Testu01: A C library for empirical testing of random number generators. ACM Trans. Math. Softw. 2007, 33. [Google Scholar] [CrossRef]
- Bahi, J.M.; Couturier, R.; Guyeux, C.; Héam, P.-C. Efficient and Cryptographically Secure Generation of Chaotic Pseudorandom Numbers on GPU. CoRR 2011. Available online: https://arxiv.org/abs/1112.5239 (accessed on 16 October 2020).
- Goldreich, O. Foundations of Cryptography: Basic Tools; Cambridge University Press: Cambridge, UK, 2007. [Google Scholar]
- Knuth, D.E. The Art of Computer Programming, Volume 3: Seminumerical Algorithms, 3rd ed.; Addison-Wesley: Reading, MA, USA, 1997. [Google Scholar]
- Fischlin, R.; Schnorr, C.P. Stronger security proofs for rsa and rabin bits. In Advances in Cryptology—EUROCRYPT’97, Proceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques, Konstanz, Germany, 11–15 May 1997; Springer: Berlin/Heidelberg, Germany, 1997; pp. 267–279. [Google Scholar]
- Guyeux, C.; Friot, N.; Bahi, J.M. Chaotic iterations versus spread-spectrum: Chaos and stego security. In Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 15–17 October 2010. [Google Scholar]
- Guyeux, C.; Bahi, J.M. Hash functions using chaotic iterations. J. Algorithms Comput. Technol. 2010, 4, 167–182. [Google Scholar]
- Lin, Z.; Guyeux, C.; Wang, Q.; Yu, S. Diffusion and confusion of chaotic iteration based hash functions. In Proceedings of the 2016 19th IEEE International Conference on Computational Science and Engineering (CSE), Paris, France, 24–26 August 2016; pp. 444–447. [Google Scholar]
- Lin, Z.; Guyeux, C.; Yu, S.; Wang, Q. Design and evaluation of chaotic iterations based keyed hash function. In Proceedings of the 2017 8th iCatse Conference on Information Science and Applications (ICISA), Macau, China, 20–23 March 2017; Volume 424, pp. 404–414. [Google Scholar]
- Bahi, J.; Couchot, J.-F.; Guyeux, C. Performance analysis of a keyed hash function based on discrete and chaotic proven iterations. In Proceedings of the 2011 3rd International Conference on Evolving Internet (INTERNET), Luxembourg, 19–24 June 2011; pp. 52–57. [Google Scholar]
- Bahi, J.M.; Côté, N.; Guyeux, C. Chaos of protein folding. In Proceedings of the 2011 International Joint Conference on Neural Networks, San Jose, CA, USA, 31 July–5 August 2011; pp. 1948–1954. [Google Scholar]
- Bahi, J.; Côté, N.; Guyeux, C.; Salomon, M. Protein folding in the 2D hydrophobic-hydrophilic (HP) square lattice model is chaotic. Cogn. Comput. 2012, 4, 98–114. [Google Scholar] [CrossRef]
- Berger, B.; Leighton, T. Protein folding in the hydrophobic-hydrophilic (HP) is HP-complete. In Proceedings of the Second Annual International Conference on Computational Molecular Biology, New York, NY, USA, 22–25 March 1998; ACM: New York, NY, USA, 1998; pp. 30–39. [Google Scholar]
- Bahi, J.M.; Guyeux, C.; Mazouzi, K.; Philippe, L. Computational investigations of folded self-avoiding walks related to protein folding. Comput. Biol. Chem. 2013, 47, 246–256. [Google Scholar] [CrossRef]
- Guyeux, C.; Côté, N.; Bienia, W.; Bahi, J.M. Is protein folding problem really a np-complete one? first investigations. J. Bioinform. Comput. Biol. 2014, 12, 1350017. [Google Scholar] [CrossRef] [Green Version]
- Faver, J.C.; Benson, M.L.; He, X.; Roberts, B.P.; Wang, B.; Marshall, M.S.; Sherrill, C.D.; Merz, K.M. The Energy Computation Paradox and ab initio Protein Folding. PLoS ONE 2011, 6, e18868. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Bornberg-Bauer, E. Chain growth algorithms for HP-type lattice proteins. In Proceedings of the First Annual International Conference on Computational Molecular Biology, Santa Fé, NM, USA, 19–22 January 1997; ACM: New York, NY, USA, 1997; pp. 47–55. [Google Scholar]
- Guyeux, C.; Nicod, J.-M.; Philippe, L.; Bahi, J.M. The study of unfoldable self-avoiding walks—Application to protein structure prediction software. J. Bioinform. Comput. Biol. 2015, 13, 1550009. [Google Scholar] [CrossRef] [PubMed]
- Braxenthaler, M.; Unger, R.R.; Auerbach, D.; Moult, J. Chaos in protein dynamics. Proteins Struct. Funct. Bioinform. 1997, 29, 417–425. [Google Scholar] [CrossRef]
- Bahi, J.M.; Guyeux, C.; Perasso, A. Chaos in DNA evolution. Int. J. Biomath. 2016, 9, 1650076. [Google Scholar] [CrossRef] [Green Version]
- Bahi, J.M.; Guyeux, C.; Perasso, A. Relaxing the hypotheses of symmetry and time-reversibility in genome evolutionary models. Br. J. Math. Comput. Sci. 2015, 5, 439–455. [Google Scholar] [CrossRef] [Green Version]
- Bahi, J.M.; Guyeux, C.; Perasso, A. Predicting the evolution of two genes in the yeast saccharomyces cerevisiae. Procedia Comput. Sci. 2012, 11, 4–16. [Google Scholar] [CrossRef]
Logistic | XORshift | ISAAC | |
---|---|---|---|
NIST SP 800-22 (15 tests) | 14 | 14 | 15 |
DieHARD (18 tests) | 16 | 15 | 18 |
TestU01 (516 tests) | 250 | 370 | 516 |
Test Name | CIPRNG Version 1 | |||
---|---|---|---|---|
Logistic | XORshift | ISAAC | ISAAC | |
+ | + | + | + | |
Logistic | XORshift | XORshift | ISAAC | |
NIST (15) | 15 | 15 | 15 | 15 |
DieHARD (18) | 18 | 18 | 18 | 18 |
TestU01 (516) | 378 | 507 | 516 | 516 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Guyeux, C. Convergence versus Divergence Behaviors of Asynchronous Iterations, and Their Applications in Concrete Situations. Math. Comput. Appl. 2020, 25, 69. https://doi.org/10.3390/mca25040069
Guyeux C. Convergence versus Divergence Behaviors of Asynchronous Iterations, and Their Applications in Concrete Situations. Mathematical and Computational Applications. 2020; 25(4):69. https://doi.org/10.3390/mca25040069
Chicago/Turabian StyleGuyeux, Christophe. 2020. "Convergence versus Divergence Behaviors of Asynchronous Iterations, and Their Applications in Concrete Situations" Mathematical and Computational Applications 25, no. 4: 69. https://doi.org/10.3390/mca25040069
APA StyleGuyeux, C. (2020). Convergence versus Divergence Behaviors of Asynchronous Iterations, and Their Applications in Concrete Situations. Mathematical and Computational Applications, 25(4), 69. https://doi.org/10.3390/mca25040069