Suggested Topics within your search.
Showing 1,101 - 1,120 results of 1,826 for search '"entropy"', query time: 0.04s Refine Results
  1. 1101

    Emergency Transportation Problem Based on Single-Valued Neutrosophic Set by Lin Lu, Xiaochun Luo

    Published 2020-01-01
    “…Firstly, the attribute weight is determined by using the entropy weight method; secondly, the scoring function of the single-valued neutrosophic fuzzy number is defined; thirdly, the TOPSIS method is used to rank the decision-making; finally, the feasibility and rationality of the proposed method are verified by an emergency operation example.…”
    Get full text
    Article
  2. 1102

    Evaluation on Security of Water Resources in Shiyan City Based on Water Poverty Index by JIANG Huining, YAN Baowei, HUO Lei, CAO Chen

    Published 2020-01-01
    “…,determines the evaluation weights of each index by the entropy method, and builds the scientific andrational water resources security evaluation system to conduct a comprehensive and systemicevaluation for the security of water resources in Shiyan City. …”
    Get full text
    Article
  3. 1103

    Gear Fault Diagnosis based on EEMD and Choi-Williams Distribution by Xiaoyu Yang, Piao Sheng, Shuangxi Jing, Junfa Leng

    Published 2019-04-01
    “…Then, the false components are removed and IMFs are screened through the correlation coefficient and Shannon entropy. Finally, the selected IMF components are expressed in CWD time frequency graph, and the gear fault features are extracted with the characteristics of frequency and isochronous impact exhibited in the time-frequency domain. …”
    Get full text
    Article
  4. 1104

    Adsorption Thermodynamics and Kinetics of Mancozeb onto Poly--toluidine Th(IV) Phosphate — a Nano-composite Cation-exchanger — and its Application as a Mancozeb-sensitive Membrane... by Asif Ali Khan, Anish Khan

    Published 2009-07-01
    “…Some parameters such as the Freundlich constants, the thermodynamic equilibrium constant (K 0 ), the standard free energy change (ΔG 0 ), the standard enthalpy change (ΔH 0 ) and the standard entropy change (ΔS 0 ) were determined. Thermodynamic analysis revealed that the adsorption of Mancozeb onto poly- o -toluidine Th(IV) phosphate was exothermic, spontaneous and decreased as the temperature was increased from 25 °C to 45 °C. …”
    Get full text
    Article
  5. 1105

    Magnetoacoustic Heating in Nonisentropic Plasma Caused by Different Kinds of Heating-Cooling Function by Anna Perelomova

    Published 2018-01-01
    “…The nonlinear instantaneous equation which describes dynamics of nonwave entropy mode in the field of intense magnetoacoustic perturbations is the result of special projecting of the conservation equations in the differential form. …”
    Get full text
    Article
  6. 1106

    Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images by R. Youmaran, A. Adler

    Published 2012-01-01
    “…In this context, the biometric feature information is calculated using the relative entropy between the intraclass and interclass feature distributions. …”
    Get full text
    Article
  7. 1107

    Self-corrected coefficient smoothing method based network security situation prediction by Hongyu YANG, Xugao ZHANG

    Published 2020-05-01
    “…In order to solve the problem of insufficient accuracy of current network security situation prediction methods,a new network security situation prediction model was proposed based on self-correcting coefficient smoothing.Firstly,a network security assessment quantification method was designed to transform the alarm information into situation real value time series based on the entropy correlation degree.Then,the adaptive solution of the static smoothing coefficient was calculated and the predicted initial value was obtained by using the variable domain space.Finally,based on the error category,the time-changing weighted Markov chain was built to modify the initial network situation prediction result and the prediction accuracy was further raised.The prediction model was tested with LL_DOS_1.0 dataset and the experimental results show that the proposed model has higher adaptability and prediction accuracy for network situation time series.…”
    Get full text
    Article
  8. 1108

    Nonlinear blind source separation algorithm based on spline interpolation and artificial bee colony optimization by Lei CHEN, Shi-zhong GAN, Li-yi ZHANG, Guang-yan WANG

    Published 2017-07-01
    “…A post-nonlinear blind source separation algorithm based on spline interpolation fitting and artificial bee colony optimization was proposed for the more complicated nonlinear mixture situations.The separation model was constructed by using the spline interpolation to fit the inverse nonlinear distortion function and using entropy as the separation criterion.The spline interpolation node parameters were solved by the modified artificial bee colony optimization algorithm.The correlation constraint was added into the objective function for limiting the solution space and the outliers wuld be restricted in the separation process.The results of speech sounds separation experiment show that the proposed algorithm can effectively realize the signal separation for the nonlinear mixture.Compared with the traditional separation algorithm based on odd polynomial fitting,the proposed algorithm has higher separation accuracy.…”
    Get full text
    Article
  9. 1109

    Extraction of eco-friendly and biodegradable surfactant for inhibition of copper corrosion during acid pickling by Mervette Elbatouti, Howida A Fetouh

    Published 2019-10-01
    “…The thermodynamic of micellization, free energies of micellization (ΔG mic ) and entropy of micellization, was calculated and discussed. …”
    Get full text
    Article
  10. 1110

    Astrotheology: A proactive contextualization of novelty within space exploration by A.C. Pieterse

    Published 2021-12-01
    “…We live in a universe where there is a space for contingency and novelty; yet a creation that is lawful; there is also a movement towards entropy, and, finally, certain aspects in creation will remain a mystery. …”
    Get full text
    Article
  11. 1111

    Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos by Jian Wang

    Published 2016-01-01
    “…Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.…”
    Get full text
    Article
  12. 1112

    Chemisorption of Hydrogen Ions on Aminosilica Surfaces at Different Temperatures by Yuriy V. Kholin, Sergiy A. Myerniy, Yutta V. Shabaeva, Inna V. Khristenko, Anton A. Samoteikin, Nina R. Sumskaya

    Published 2003-02-01
    “…Chemisorption of H + ions, accompanied by penetration of the counterions into the subsurface layer, was of an endothermic nature and associated with increasing entropy.…”
    Get full text
    Article
  13. 1113

    Three-Dimensional Poincaré Plot Analysis for Heart Rate Variability by Bin Wang, Dewen Liu, Xin Gao, Yunlei Luo

    Published 2022-01-01
    “…Thirdly, we propose the local distribution entropy, which can quantify the temporal and spatial patterns of the scatter points in novel space. …”
    Get full text
    Article
  14. 1114

    Fermionic entanglement in the presence of background electric and magnetic fields by Shagun Kaushal

    Published 2025-01-01
    “…The correlations are quantified using entanglement entropy and Bell’s inequality violation for the vacuum state, while Bell’s inequality violation and mutual information are used for the maximally entangled state. …”
    Get full text
    Article
  15. 1115

    Tilings of the hyperbolic plane of substitutive origin as subshifts of finite type on Baumslag–Solitar groups $\mathit{BS}(1,n)$ by Aubrun, Nathalie, Schraudner, Michael

    Published 2024-05-01
    “…We present a technique to lift some tilings of the discrete hyperbolic plane –tilings defined by a 1D substitution– into a zero entropy subshift of finite type (SFT) on non-abelian amenable groups $\mathit{BS}(1,n)$ for $n\ge 2$. …”
    Get full text
    Article
  16. 1116

    Quantum Tunnelling for Hawking Radiation from Both Static and Dynamic Black Holes by Subenoy Chakraborty, Subhajit Saha

    Published 2014-01-01
    “…Finally, using the law of black hole mechanics, a general modified form of the black hole entropy is obtained considering modified Hawking temperature.…”
    Get full text
    Article
  17. 1117

    BCP-based joint delegation learning model and protocol by Sheng GAO, Kang XIANG, Youliang TIAN, Weijie TAN, Tao FENG, Xiaoxue WU

    Published 2021-05-01
    “…In order to realize data security sharing and reduce the computing costs of clients in data mining process, a joint delegation learning model and protocol based on BCP homomorphic encryption algorithm was proposed.Firstly, a privacy preserving method based on false records was proposed for the security of decision tree model.Secondly, in view of the vertical and horizontal distribution of data, the corresponding delegation learning protocols based on privacy preserving delegation dot product algorithm and privacy preserving delegation entropy algorithm was proposed.Finally, the security proof and the performance analysis of delegation learning protocols and decision tree model structure were given.The results show that the privacy protection method based on false records does not affect the final model construction, and the final model obtained by each client is the same as that constructed by real data.…”
    Get full text
    Article
  18. 1118

    Chaining & counter-based block cipher mode for authentication by HUANG Yu-hua1, HU Ai-qun2, WANG Jian-dong1

    Published 2009-01-01
    “…For raising the operation efficiency of block cipher algorithms,a fast authentication mode based on chaining & counter(CCTR) was put forward;and its security was proved.Its speed was about 30% faster than that of authentication modes in common use(for example,CBC-MAC).The dependence test results accord with the demands.The CCTR mode is complete;its degree of avalanche effect is about 0.999 3;its degree of strict avalanche criterion is 0.992 or so.The frequency test results indicate that the output generated by the CCTR mode had uniformity.The binary matrix rank,Run,spectral,non-overlapping template matching,overlapping template matching,Maurer’s universal statistical test,Lempel-Ziv compression,linear complexity,serial,approximate entropy,cumulative sums,random excursions and random excursions variant tests results fulfilled the requirements all.Therefore,the CCTR mode has good pseudo-randomness,which the security of CCTR mode is verified by way of statistical evaluation.…”
    Get full text
    Article
  19. 1119

    Subspace-Based Anomaly Detection for Large-Scale Campus Network Traffic by Xiaofeng Zhao, Qiubing Wu

    Published 2023-01-01
    “…To solve this problem, a network traffic anomaly detection model based on subspace information entropy flow matrix and a subspace anomaly weight clustering network traffic anomaly detection model combined with density anomaly weight and clustering ideas are proposed. …”
    Get full text
    Article
  20. 1120

    ODC: a method for online detecting & classifying network-wide traffic anomalies by QIAN Ye-kui1, CHEN Ming1, HAO Qiang2, LIU Feng-rong2, SHANG Wen-zhong2

    Published 2011-01-01
    “…A method for online detecting & classifying traffic anomalies(ODC for short) from a network-wide angle of view was put forward.This method constructed traffic matrix with a metric of traffic feature entropy incrementally,de-tected traffic anomalies online using incremental principal component analysis,and then classified traffic anomalies online using incremental k-means,from which network operators could benefit for taking corresponding countermeasures.Theoretical analysis and experiment analysis show that the method has lower storage and less computing time complexity,which could satisfy the requirements of real-time process.Analysis based on both measurement data from Abilene and simulation experiments demonstrate that the method has very good detection and classification performance.…”
    Get full text
    Article