-
1101
Emergency Transportation Problem Based on Single-Valued Neutrosophic Set
Published 2020-01-01“…Firstly, the attribute weight is determined by using the entropy weight method; secondly, the scoring function of the single-valued neutrosophic fuzzy number is defined; thirdly, the TOPSIS method is used to rank the decision-making; finally, the feasibility and rationality of the proposed method are verified by an emergency operation example.…”
Get full text
Article -
1102
Evaluation on Security of Water Resources in Shiyan City Based on Water Poverty Index
Published 2020-01-01“…,determines the evaluation weights of each index by the entropy method, and builds the scientific andrational water resources security evaluation system to conduct a comprehensive and systemicevaluation for the security of water resources in Shiyan City. …”
Get full text
Article -
1103
Gear Fault Diagnosis based on EEMD and Choi-Williams Distribution
Published 2019-04-01“…Then, the false components are removed and IMFs are screened through the correlation coefficient and Shannon entropy. Finally, the selected IMF components are expressed in CWD time frequency graph, and the gear fault features are extracted with the characteristics of frequency and isochronous impact exhibited in the time-frequency domain. …”
Get full text
Article -
1104
Adsorption Thermodynamics and Kinetics of Mancozeb onto Poly--toluidine Th(IV) Phosphate — a Nano-composite Cation-exchanger — and its Application as a Mancozeb-sensitive Membrane...
Published 2009-07-01“…Some parameters such as the Freundlich constants, the thermodynamic equilibrium constant (K 0 ), the standard free energy change (ΔG 0 ), the standard enthalpy change (ΔH 0 ) and the standard entropy change (ΔS 0 ) were determined. Thermodynamic analysis revealed that the adsorption of Mancozeb onto poly- o -toluidine Th(IV) phosphate was exothermic, spontaneous and decreased as the temperature was increased from 25 °C to 45 °C. …”
Get full text
Article -
1105
Magnetoacoustic Heating in Nonisentropic Plasma Caused by Different Kinds of Heating-Cooling Function
Published 2018-01-01“…The nonlinear instantaneous equation which describes dynamics of nonwave entropy mode in the field of intense magnetoacoustic perturbations is the result of special projecting of the conservation equations in the differential form. …”
Get full text
Article -
1106
Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images
Published 2012-01-01“…In this context, the biometric feature information is calculated using the relative entropy between the intraclass and interclass feature distributions. …”
Get full text
Article -
1107
Self-corrected coefficient smoothing method based network security situation prediction
Published 2020-05-01“…In order to solve the problem of insufficient accuracy of current network security situation prediction methods,a new network security situation prediction model was proposed based on self-correcting coefficient smoothing.Firstly,a network security assessment quantification method was designed to transform the alarm information into situation real value time series based on the entropy correlation degree.Then,the adaptive solution of the static smoothing coefficient was calculated and the predicted initial value was obtained by using the variable domain space.Finally,based on the error category,the time-changing weighted Markov chain was built to modify the initial network situation prediction result and the prediction accuracy was further raised.The prediction model was tested with LL_DOS_1.0 dataset and the experimental results show that the proposed model has higher adaptability and prediction accuracy for network situation time series.…”
Get full text
Article -
1108
Nonlinear blind source separation algorithm based on spline interpolation and artificial bee colony optimization
Published 2017-07-01“…A post-nonlinear blind source separation algorithm based on spline interpolation fitting and artificial bee colony optimization was proposed for the more complicated nonlinear mixture situations.The separation model was constructed by using the spline interpolation to fit the inverse nonlinear distortion function and using entropy as the separation criterion.The spline interpolation node parameters were solved by the modified artificial bee colony optimization algorithm.The correlation constraint was added into the objective function for limiting the solution space and the outliers wuld be restricted in the separation process.The results of speech sounds separation experiment show that the proposed algorithm can effectively realize the signal separation for the nonlinear mixture.Compared with the traditional separation algorithm based on odd polynomial fitting,the proposed algorithm has higher separation accuracy.…”
Get full text
Article -
1109
Extraction of eco-friendly and biodegradable surfactant for inhibition of copper corrosion during acid pickling
Published 2019-10-01“…The thermodynamic of micellization, free energies of micellization (ΔG mic ) and entropy of micellization, was calculated and discussed. …”
Get full text
Article -
1110
Astrotheology: A proactive contextualization of novelty within space exploration
Published 2021-12-01“…We live in a universe where there is a space for contingency and novelty; yet a creation that is lawful; there is also a movement towards entropy, and, finally, certain aspects in creation will remain a mystery. …”
Get full text
Article -
1111
Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos
Published 2016-01-01“…Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.…”
Get full text
Article -
1112
Chemisorption of Hydrogen Ions on Aminosilica Surfaces at Different Temperatures
Published 2003-02-01“…Chemisorption of H + ions, accompanied by penetration of the counterions into the subsurface layer, was of an endothermic nature and associated with increasing entropy.…”
Get full text
Article -
1113
Three-Dimensional Poincaré Plot Analysis for Heart Rate Variability
Published 2022-01-01“…Thirdly, we propose the local distribution entropy, which can quantify the temporal and spatial patterns of the scatter points in novel space. …”
Get full text
Article -
1114
Fermionic entanglement in the presence of background electric and magnetic fields
Published 2025-01-01“…The correlations are quantified using entanglement entropy and Bell’s inequality violation for the vacuum state, while Bell’s inequality violation and mutual information are used for the maximally entangled state. …”
Get full text
Article -
1115
Tilings of the hyperbolic plane of substitutive origin as subshifts of finite type on Baumslag–Solitar groups $\mathit{BS}(1,n)$
Published 2024-05-01“…We present a technique to lift some tilings of the discrete hyperbolic plane –tilings defined by a 1D substitution– into a zero entropy subshift of finite type (SFT) on non-abelian amenable groups $\mathit{BS}(1,n)$ for $n\ge 2$. …”
Get full text
Article -
1116
Quantum Tunnelling for Hawking Radiation from Both Static and Dynamic Black Holes
Published 2014-01-01“…Finally, using the law of black hole mechanics, a general modified form of the black hole entropy is obtained considering modified Hawking temperature.…”
Get full text
Article -
1117
BCP-based joint delegation learning model and protocol
Published 2021-05-01“…In order to realize data security sharing and reduce the computing costs of clients in data mining process, a joint delegation learning model and protocol based on BCP homomorphic encryption algorithm was proposed.Firstly, a privacy preserving method based on false records was proposed for the security of decision tree model.Secondly, in view of the vertical and horizontal distribution of data, the corresponding delegation learning protocols based on privacy preserving delegation dot product algorithm and privacy preserving delegation entropy algorithm was proposed.Finally, the security proof and the performance analysis of delegation learning protocols and decision tree model structure were given.The results show that the privacy protection method based on false records does not affect the final model construction, and the final model obtained by each client is the same as that constructed by real data.…”
Get full text
Article -
1118
Chaining & counter-based block cipher mode for authentication
Published 2009-01-01“…For raising the operation efficiency of block cipher algorithms,a fast authentication mode based on chaining & counter(CCTR) was put forward;and its security was proved.Its speed was about 30% faster than that of authentication modes in common use(for example,CBC-MAC).The dependence test results accord with the demands.The CCTR mode is complete;its degree of avalanche effect is about 0.999 3;its degree of strict avalanche criterion is 0.992 or so.The frequency test results indicate that the output generated by the CCTR mode had uniformity.The binary matrix rank,Run,spectral,non-overlapping template matching,overlapping template matching,Maurer’s universal statistical test,Lempel-Ziv compression,linear complexity,serial,approximate entropy,cumulative sums,random excursions and random excursions variant tests results fulfilled the requirements all.Therefore,the CCTR mode has good pseudo-randomness,which the security of CCTR mode is verified by way of statistical evaluation.…”
Get full text
Article -
1119
Subspace-Based Anomaly Detection for Large-Scale Campus Network Traffic
Published 2023-01-01“…To solve this problem, a network traffic anomaly detection model based on subspace information entropy flow matrix and a subspace anomaly weight clustering network traffic anomaly detection model combined with density anomaly weight and clustering ideas are proposed. …”
Get full text
Article -
1120
ODC: a method for online detecting & classifying network-wide traffic anomalies
Published 2011-01-01“…A method for online detecting & classifying traffic anomalies(ODC for short) from a network-wide angle of view was put forward.This method constructed traffic matrix with a metric of traffic feature entropy incrementally,de-tected traffic anomalies online using incremental principal component analysis,and then classified traffic anomalies online using incremental k-means,from which network operators could benefit for taking corresponding countermeasures.Theoretical analysis and experiment analysis show that the method has lower storage and less computing time complexity,which could satisfy the requirements of real-time process.Analysis based on both measurement data from Abilene and simulation experiments demonstrate that the method has very good detection and classification performance.…”
Get full text
Article