-
1001
Bayesian Inference on the Shape Parameter and Future Observation of Exponentiated Family of Distributions
Published 2011-01-01“…The Bayes estimators of the shape parameter of exponentiated family of distributions have been derived by considering extension of Jeffreys' noninformative as well as conjugate priors under different scale-invariant loss functions, namely, weighted quadratic loss function, squared-log error loss function and general entropy loss function. The risk functions of these estimators have been studied. …”
Get full text
Article -
1002
Truncated Cauchy Power Odd Fréchet-G Family of Distributions: Theory and Applications
Published 2021-01-01“…Statistical properties of the new family are proposed, such as density function expansion, moments, incomplete moments, mean deviation, Bonferroni and Lorenz curves, and entropy. We investigate the maximum likelihood method for predicting model parameters of the new family. …”
Get full text
Article -
1003
Local Channels under Decomposition of Quantum Gates in Bipartite Systems
Published 2023-01-01“…Within this class of quantum channels, the paper characterizes those channels which preserve the Tsallis entropy of combinations of separable states through decomposing quantum gates, where the characterization is given in terms of the action of the channel on separable states.…”
Get full text
Article -
1004
Probing Fractionalized Charges
Published 2013-01-01“…Inspired by the holographic entanglement entropy, for geometries with nonzero abelian charges, we define a quantity which is sensitive to the background charges. …”
Get full text
Article -
1005
Alpha Power Transformed Log-Logistic Distribution with Application to Breaking Stress Data
Published 2020-01-01“…We derived some mathematical properties including moments, moment-generating function, quantile function, Rényi entropy, and order statistics of the new model. The model parameters are estimated using maximum likelihood method of estimation. …”
Get full text
Article -
1006
Thermodynamics of the substantial universe
Published 2024-06-01“…The equilibrium substantial Universe exists forever, preserving its enthalpy, entropy, mass and temperature. The main reason for the redshift of spectral lines of light from distant stars and galaxies is not the expansion of the substantial Universe, but its clouds of gas and dust, which reduce the energy of photons.…”
Get full text
Article -
1007
Quantum information and the C-theorem in de Sitter
Published 2025-01-01“…Additionally, using the relative entropy, we establish a Lorentzian bound on the entanglement and thermal entropies for a field theory inside the static patch. …”
Get full text
Article -
1008
A Correlation between the Kinetic and Thermodynamic Adsorption Characteristics of an Optical Brightener on a Pulp Surface
Published 2008-09-01“…An attempt to find a correlation between the kinetic and thermodynamic terms (e.g. activation energy, pre-exponential factor, isosteric heat, entropy, etc.) of the chemisorption process involved in a commercial optical brightener/pulp system is presented. …”
Get full text
Article -
1009
Net traffic identifier based on hierarchical clustering
Published 2014-10-01“…An improved net traffic identifier algorithm was proposed based on semi-supervised clustering.Symmetrical uncertainty was used to reduce the net flow attributes,and then kernel function was used to project the rest attributes to higher dimentional space.The train net flow was clustered in high dimentional space hierarchically.Smooth factor,sihouette coefficient and entropy controlled the cluster process to get a well result.Experiments show that the algorithm got flat clusters without any huge cluster and could identify most net flow even encrypted ones.…”
Get full text
Article -
1010
Delta Shock Waves for a Linearly Degenerate Hyperbolic System of Conservation Laws of Keyfitz-Kranzer Type
Published 2013-01-01“…Under suitable generalized Rankine-Hugoniot relation and entropy condition, the existence and uniqueness of delta shock solution are established. …”
Get full text
Article -
1011
Phosphate removal from aqueous solutions by using natural Jordanian zeolitic tuff
Published 2017-05-01“…Thermodynamic parameters such as Gibbs's free energy change, standard enthalpy change, and entropy change were evaluated and the results indicated that the sorption process is spontaneous, exothermic with small degree of randomness during the sorption process.…”
Get full text
Article -
1012
Theoretical foundation for jung's “Mandala Symbolism” based on discrete chaotic dynamics of interacting neurons
Published 2000-01-01“…Obtained patterns can be related to the space distributed chemicals according to the law of extended principle of maximum entropy, consideration of the information exchange during biochemical transformations, mass conservation law and discrete chaotic dynamics principles.…”
Get full text
Article -
1013
Key node identification algorithm for complex network based on improved grey wolf optimization
Published 2021-06-01“…In recent years, how to select the most influential key node for identification has become the most cutting-edge hot direction in network science.Formulating the problem of maximizing the influence of complex network nodes as an optimization problem whose cost function was expressed as the influence of nodes and the distance between them, measures user influence using Shannon entropy, and solved this problem using an improved gray wolf optimization algorithm.Finally, numerical examples were performed with real complex network datasets.The experimental results show that the proposed algorithm is more accurate and computationally efficient than the existing method.…”
Get full text
Article -
1014
Trends and technologies of video coding
Published 2017-08-01“…The current video coding uses block based hybrid architecture,which uses predictive,transform,quantization and entropy coding techniques to efficiently compress video signals.Further optimizations on current architectures provide more flexible processing and coding for local characteristics of video image signals.Video coding based on machine learning was expected to change the existing hybrid coding framework partially or comprehensively,and bring new research ideas to video coding.In addition to existing 2D video signal,the future of video also needs to spherical video coding and volumetric video coding for AR/VR applications,the new video source data format of the video encoding technology has brought new opportunities and challenges.…”
Get full text
Article -
1015
Dynamic Simulation of Low-Carbon Competitiveness from the Perspective of Circular Economy
Published 2021-01-01“…In accordance with the requirements of the circular economy in Guangxi (of PRC) and the characteristics of the drivers of low-carbon competitiveness in the regional construction industry, a causal flowchart of influencing factors of the low-carbon competitiveness in the Guangxi construction industry is constructed, and a model based on system dynamics is established. After the entropy weight method is used to determine the variable weight, VENSIM PLE software is used to simulate the development trend of the low-carbon competitiveness of the Guangxi construction industry. …”
Get full text
Article -
1016
Risk-adaptive access control model for big data in healthcare
Published 2015-12-01“…While dealing with the big data in healthcare,it was difficult for a policy maker to foresee what information a doctor may need,even to make an accurate access control policy.To deal with it,a risk-based access control model that regulates doctors’ access rights adaptively was proposed to protect patient privacy.This model analyzed the history of access,applies the EM algorithm and the information entropy technique to quantify the risk of privacy violation.Using the quantified risk,the model can detect and control the over-accessing and exceptional accessing of patients’ data.Experimental results show that this model is effective and more accurate than other models.…”
Get full text
Article -
1017
Synthesis of stochastic algorithms for image registration by the criterion of maximum mutual information
Published 2024-02-01“…The entropies are calculated using a Parzen window method. …”
Get full text
Article -
1018
A note on the non-planar corrections for the Page curve in the PSSY model via the IOP matrix model correspondence
Published 2024-12-01“…We also compare them with Page’s formula on entanglement entropy and discuss the contributions of extra-handle-in-bulk diagrams.…”
Get full text
Article -
1019
The "one-group-one-cipher" cryptograph of block-cipher based on chaotic
Published 2009-01-01“…The"one-group-one-cipher"algorithm used the sequence from chaotic mapping as sub-key for block cipher was presented to solve the problem of weak keys existing in currently combined cipher algorithms.The randomness of abstracted key sequence was validated in aspects of Shannon entropy.The"one-group-one-cipher"algorithm was de-signed and implemented based on hyper-chaos generalized Hénon mapping and IDEA algorithms, and its security was analyzed theoretically.Analysis shows that the algorithm is so secure that it can withstand brute force attack, and it was perfect secrecy.The disadvantages of key’s reuse of block ciphers are avoided, and the practicality and feasibility of chaos ciphers and one-time pad are improved.…”
Get full text
Article -
1020
Error mitigation in brainbox quantum autoencoders
Published 2025-01-01“…Finally, by analysing the Rényi entropy flow throughout the networks, we demonstrate that the localization of entanglement plays a central role in denoising through learning.…”
Get full text
Article