Suggested Topics within your search.
Showing 1,021 - 1,040 results of 1,826 for search '"entropy"', query time: 0.05s Refine Results
  1. 1021

    Glucose and Fat Oxidation: Bomb Calorimeter Be Damned by Christopher B. Scott

    Published 2012-01-01
    “…Yet, the addition of anaerobic metabolism with ATP resynthesis to complete respiratory glucose oxidation further contributes to energy loss in the form of entropy changes that are not measured or quantified by calorimetry; combustion and respiratory fat/lactate oxidation lack this anaerobic component. …”
    Get full text
    Article
  2. 1022

    How Can the Modified Dispersion Relation Affect Friedmann Equations? by A. S. Sefiedgar

    Published 2014-01-01
    “…In this letter, we obtain the corrected entropy-area relation of the apparent horizon of FRW universe by utilizing the extra dimensional form of MDR, leading to the modification of Friedmann equations. …”
    Get full text
    Article
  3. 1023

    An Information-Based Classification of Elementary Cellular Automata by Enrico Borriello, Sara Imari Walker

    Published 2017-01-01
    “…The classification scheme proposed circumvents the problems associated with isolating whether complexity is in fact intrinsic to a dynamical rule, or if it arises merely as a product of a complex initial state. Transfer entropy variations processed by cellular automata split the 256 elementary rules into three information classes, based on sensitivity to initial conditions. …”
    Get full text
    Article
  4. 1024

    Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks by Wei-dong YANG, Yun-hua HE, Li-min SUN

    Published 2013-08-01
    “…Also ability of an adversary and the goal that a defender wants to achieve by the information entropy were quantified. By the analysis of true traces, the Nash equilibrium point under the game of complete information and an optimal defense strategy providing the user with the best privacy level for each at-tack strategy were presented.…”
    Get full text
    Article
  5. 1025

    Combined Diagnosis of PD Based on the Multidimensional Parameters by Mohammad Heidari

    Published 2016-01-01
    “…Diagnose signals are found with the method based on information fusion and semisupervised learning for HFC PD, adaptive mutation parameters of particle entropy for ultrasonic signals, and IIA-ART2A neural network for UHF signals. …”
    Get full text
    Article
  6. 1026

    Surface sliding mode controller for chaotic oscillation in power system with power disturbance by Fuhong MIN, Hanyuan MA, Yaoda WANG

    Published 2019-01-01
    “…With the rapid development of the power industry,the possibility of chaotic oscillation increases in the power system,and the importance of maintaining the stability of the power system is prominent.Through a fourth-order power system model with power perturbation term built,the Lyapunov exponent spectrum,bifurcation diagram and spectral entropy were analyzed,respectively.The influence of power disturbance terms on power system motion was discussed in detail.Moreover,a dynamic surface sliding mode controller was designed based on the switching function with relay characteristics.Simulation results show that the controller can suppress the chaotic oscillation quickly and smoothly,and effectively avoid chattering and own strong robustness.…”
    Get full text
    Article
  7. 1027

    Study on the Corrosion Kinetics of Iron in Acid and Base Medium by D. B. Patil, A. R. Sharma

    Published 2011-01-01
    “…Further the specific reaction rate, half-life time, energy of activation, entropy of activation and enthalpy of activation was also evaluated.…”
    Get full text
    Article
  8. 1028

    Impact of Molecular and Crystal Structure on the Melting Points in Halo-Substituted Phenyl-Quinazolinones by Ivica Đilović, Nenad Judaš, Mario Komar, Maja Molnar, Marta Počkaj, Tomislav Balić

    Published 2024-12-01
    “…To address this, a concept related to entropy called the functional group rotation influence, which relates to a decrease in fusion entropy caused by the rotational freedom of polyatomic groups, was introduced. …”
    Get full text
    Article
  9. 1029

    Study on the Regulation Effect of Optogenetic Technology on LFP of the Basal Ganglia Nucleus in Rotenone-Treated Rats by Zongya Zhao, Yanxiang Niu, Peiqi Chen, Yu Zhu, Liangliang Shi, Xuewei Zhao, Chang Wang, Yehong Zhang, Zhixian Gao, Wenshuai Jiang, Wu Ren, Renjun Gu, Yi Yu

    Published 2021-01-01
    “…LFP results showed that approximate entropy and fractal dimension of rats in the control group were significantly greater than those in the experimental group after light treatment (p<0.05). …”
    Get full text
    Article
  10. 1030

    Determination of Novel Estimations for the Slater Difference and Applications by Muhammad Adil Khan, Hidayat Ullah, Tareq Saeed, Zaid M. M. M. Sayed, Salha Alshaikey, Emad E. Mahmoud

    Published 2024-01-01
    “…We present a diverse type of applications that stem from the main findings related to power means, Zipf–Mandelbrot entropy, and within the field of information theory. …”
    Get full text
    Article
  11. 1031

    A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform by Srinivas Koppu, V. Madhu Viswanatham

    Published 2017-01-01
    “…Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. Simulation results show that the proposed methods give better result in protecting images with low-time complexity.…”
    Get full text
    Article
  12. 1032

    Image Encryption Using a Lightweight Stream Encryption Algorithm by Saeed Bahrami, Majid Naderi

    Published 2012-01-01
    “…These tests include visual test, histogram analysis, information entropy, encryption quality, correlation analysis, differential analysis, and performance analysis. …”
    Get full text
    Article
  13. 1033

    Research on protection technology for location privacy in VANET by Jian-ming ZHANG, Yu-juan ZHAO, Hao-bin JIANG, Xue-dan JIA, Liang-min WANG

    Published 2012-08-01
    “…Location-based services in VANET solved the problem of road safety,and provided the convenient services to drivers and passengers.But it also brought new problems of privacy protection.The content of privacy protection was analyzed,and put emphasis on two kinds of privacy protection technology based on pseudonyms and signature respectively.Pseudonym-based schemes were classified as special-area based,silence-period,cryptographic mix-zones and mix-zones communication proxy based schemes.Signature-based schemes were also divided into two classes:group-signature and ring-signature.The evaluation methods for privacy protection level were surveyed,in which anonymity set,entropy metric,mathematical analysis theory and formal analysis were discussed and compared.…”
    Get full text
    Article
  14. 1034

    Analysis of Nonlinear Characteristic and Performance Continuity Reliability of Rolling Bearing Vibration by Cheng Li, Xia Xintao, Ye Liang

    Published 2019-01-01
    “…Simultaneously, based on the maximum entropy principle and Poisson counting principle, the vibration performance continuity reliability model of the rolling bearing is established, and then the matching sequence of nonlinear characteristics and the vibration performance continuity reliability of the rolling bearing vibration are established. …”
    Get full text
    Article
  15. 1035

    An Optimal Credit Scoring Model Based on the Maximum Default Identification Ability for Chinese Small Business by Xuepeng Bai, Zhichong Zhao

    Published 2022-01-01
    “…The five weighting methods of “Wilks’ lambda method,” “AUC value method,” “G1 method,” “entropy method,” and “mean square variance method” are compared. …”
    Get full text
    Article
  16. 1036

    Conflict evidence combination method based on clustering weighting by Yu DONG, Youpeng ZHANG

    Published 2023-03-01
    “…Aiming at the failure of the combination of highly conflicting evidence, the combination of the relationship between evidences and the characteristics of evidence itself was considered, and a method of conflicting evidence combination based on clustering weighting was proposed.Firstly, the similarity coefficient was constructed to cluster the evidence, and the inter-class weight was determined by class capacity to reflect the differences among classes.Then the information entropy was used to obtain the intra-class weight of each evidence.The modified weight of the evidence was obtained by combining the inter-class weight and intra-class weight.Finally, the conflict evidence was modified according to the weight, and the combination rule of evidence theory was used to achieve the final synthesis of the modified evidence.The results of the example show that the proposed method can reasonably carry out evidence correction, and the combined results have better focusing effect than other methods.…”
    Get full text
    Article
  17. 1037

    Dissipative electrically driven fluids by Andrea Amoretti, Daniel K. Brattan, Luca Martinoia, Jonas Rongen

    Published 2024-12-01
    “…Abstract We consider entropy generating flows for fluids that achieve a steady state in the presence of a driving electric field. …”
    Get full text
    Article
  18. 1038

    A density clustering-based network performance failure big data analysis algorithm by Xiang LI, Yuan LI, Zifei ZHANG, Zhe YANG

    Published 2020-09-01
    “…Facing frequent network security incidents,how to quickly find abnormal data in massive monitoring database and carry out network failure analysis becomes a research difficulty.A density-based network performance failure big data analysis algorithm was proposed,which extracted key performance characteristic indicators through entropy weight analysis,implemented data shaping through data cleaning and standardization,and extracted abnormal performance data on the basis of DBSCAN clustering algorithm.Relying on the real-time massive backbone network link performance data of multiple domestic operators to validated this algorithm,the results shows that compared with the manually manner,the recognition accuracy of the algorithm proposed to the network performance abnormal data is more than 90%,which can well fit for the analysis of real-time Internet network operation failure.…”
    Get full text
    Article
  19. 1039

    Bandwidth allocation games based on network selection for video communication by Shu-zhi WEI, Qi ZHU

    Published 2015-02-01
    “…A bandwidth allocation game based on network selection (BAG-NS) was proposed for video communication in heterogeneous wireless networks.Firstly,according to the video characteristics of different users and current network conditions,the algorithm calculated the weights of network factors and selected the optimum network by combining analytic hierarchy process and entropy theory.Secondly,the user’s utility function with payoff and cost was designed,and a distributed iterative algorithm is used to obtain the Nash equilibrium.Then the existence and uniqueness of the Nash equilibrium are proved.Simulation results show that the proposed algorithm enables different users to reasonably distribute in different networks and takes users’ fairness and network congestion control into consideration,which increases the utilization of network resources,reduces the users’ video distortion,and improves the users’ video quality.…”
    Get full text
    Article
  20. 1040

    Evaluation of Key Factors of Logistics Risks for Overseas EPC Projects by Jingshi He, Dai Han

    Published 2022-01-01
    “…An evaluation index system for the logistics risk factors of overseas EPC projects was established, and the entropy-DEA (Data Envelopment Analysis) method used to evaluate and sort risk decision-making unit (DMU) with risk likelihood and risk consequences as decision variables. …”
    Get full text
    Article