Suggested Topics within your search.
Showing 1,121 - 1,140 results of 1,826 for search '"entropy"', query time: 0.06s Refine Results
  1. 1121

    Statistical modeling based fast rate distortion estimation algorithm for HEVC by Xiang MENG, Haibing YIN, Xiaofeng HUANG

    Published 2021-01-01
    “…To reduce the coding computational complexity of the rate and distortion calculations in HEVC, a fast TU level rate model with higher accuracy was proposed.The contribution percentages of different syntax elements in entropy coding were evaluated, and syntax element-wise accurate rate models were individually developed to construct the whole TU level model.In addition, coefficient levels were weighted adaptively to distinguish the nonuniform contributions of different coefficients in terms of rate profiling.Moreover, position-wise parameter was defined to depict the distribution patterns for possible non-zero coefficients within one block.The final linear rate model was developed by fine-tuning the model parameters from great amounts of samples in a statistical way.Finally, the transform domain distortion model was also established to bypass unnecessary reconstruction process.Experimental results show that the proposed algorithm can achieve 49.76% complexity reduction with 1.74% BD-BR increase for RA configuration.…”
    Get full text
    Article
  2. 1122

    Probabilistic Double Hierarchy Linguistic TOPSIS Method for MAGDM and Its Application to Teaching Quality Evaluation of College English by Fengling Wang

    Published 2022-01-01
    “…On the one hand, we bring information entropy into the determination of target weight. The PDHL-TOPSIS technique is constructed and utilized for teaching level evaluation. …”
    Get full text
    Article
  3. 1123

    Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback by Lin ZHANG, Xinyan WEI, Xiping LIU, Haiping HUANG, Ruchuan WANG

    Published 2022-02-01
    “…Aiming at the security problem of edge server, a trust evaluation algorithm was proposed, which integrated server cooperation reputation and device user feedback to improve the security of edge computing context.In the process of interaction, a fusion algorithm based on objective information entropy theory was used to aggregate the cooperation reputation between servers, and a partial homomorphic encryption algorithm was used to prevent the leakage of user data in the process of interaction.After the interaction, the highly trusted device node was selected to calculate the feedback trust, which overcame the malicious feedback of the traditional mechanism.When calculating the global trust, the expected score of the server and the adaptive weight calculation method were considered, which overcame the limitations of the traditional trust scheme.The experimental results show that the proposed trust calculation scheme has low time complexity and spatial complexity, and can effectively resist the attack of malicious nodes.…”
    Get full text
    Article
  4. 1124

    A vestige of FZZ duality in higher dimensions by Chethan Krishnan, Sarthak Talukdar

    Published 2025-01-01
    “…At this critical point, the cigar has a puncture at the Euclidean horizon and the higher dimensional black hole entropy is correctly reproduced by the winding condensate.…”
    Get full text
    Article
  5. 1125

    An Intelligent Gray Prediction Model Based on Fuzzy Theory by Weili Wu

    Published 2022-01-01
    “…Moreover, this paper uses the entropy weight method to obtain the objective weight to correct the subjective weight, which makes the weight calculation more reasonable. …”
    Get full text
    Article
  6. 1126

    EW-CACTUs-MAML: A Robust Metalearning System for Rapid Classification on a Large Number of Tasks by Wen-Feng Wang, Jingjing Zhang, Peng An

    Published 2022-01-01
    “…The model-agnostic metalearning (MAML) with the CACTUs method (clustering to automatically construct tasks for unsupervised metalearning) is improved as EW-CACTUs-MAML after integrated with the entropy weight (EW) method. Few-shot mechanisms are introduced in the deep network for efficient learning of a large number of tasks. …”
    Get full text
    Article
  7. 1127

    Simulating quantum circuits using the multi-scale entanglement renormalization ansatz by A. V. Berezutskii, I. A. Luchnikov, A. K. Fedorov

    Published 2025-01-01
    “…The MERA is a tensor network, whose geometry together with orthogonality constraints imposed on its tensors allow approximating many-body quantum states lying beyond the area-law scaling of the entanglement entropy. We benchmark the proposed technique for brick-wall quantum circuits of up to 243 qubits with various depths up to 20 layers. …”
    Get full text
    Article
  8. 1128

    Thermodynamical Restrictions and Wave Propagation for a Class of Fractional Order Viscoelastic Rods by Teodor M. Atanacković, Sanja Konjik, Ljubica Oparnica, Dušan Zorica

    Published 2011-01-01
    “…The restrictions on coefficients are derived by using entropy inequality for isothermal processes. In addition, we study waves in a rod of finite length modelled by a linear fractional constitutive equation. …”
    Get full text
    Article
  9. 1129

    Transformasi Lontar Babad Lombok Menuju Digitalisasi Berbasis Natural Gradient Flexible (NGF) by Muhammad Tajuddin Anwar, Syahroni Hidayat, Ahmat Adil

    Published 2021-03-01
    “…Kualitas citra yang telah ditingkatkan diukur menggunakan metode MSE dan PSNR untuk tingkat kemiripannya, dan metode Entropi dan SSIM untuk informasi dan perspektif visual. …”
    Get full text
    Article
  10. 1130

    Corticomuscular Coupling Alterations During Elbow Isometric Contraction Correlated With Clinical Scores: An fNIRS-sEMG Study in Stroke Survivors by Xiaohan Wang, Weidong Li, Rong Song, Di Ao, Huijing Hu, Le Li

    Published 2025-01-01
    “…At matched force levels, the fuzzy approximate entropy values of both agonist and antagonistic muscles were notably lower in the affected group compared to the healthy group (P < 0.05). …”
    Get full text
    Article
  11. 1131

    Method based on contrastive learning for fine-grained unknown malicious traffic classification by Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN

    Published 2022-10-01
    “…In order to protect against unknown threats and evasion attacks, a new method based on contrastive learning for fine-grained unknown malicious traffic classification was proposed.Specifically, based on variational auto-encoder (CVAE), it included two classification stages, and cross entropy and reconstruction errors were used for known and unknown traffic classification respectively.Different form other methods, contrastive learning was adopted in different classification stages, which significantly improved the classification performance of the few-shot and unknown (zero-shot) classes.Moreover, some techniques (e.g., re-training and re-sample) combined with contrastive learning further improved the classification performance of the few-shot classes and the generalization ability of model.Experimental results indicate that the proposed method has increased the macro recall of few-shot classes by 20.3% and the recall of unknown attacks by 9.1% respectively, and it also has protected against evasion attacks on partial classes to some extent.…”
    Get full text
    Article
  12. 1132

    Multiscale regional calibration network for crowd counting by Jiamao Yu, Hexuan Hu

    Published 2025-01-01
    “…Additionally, we improve the loss function by combining L2 loss and binary cross-entropy loss to help MRCNet achieve excellent results. …”
    Get full text
    Article
  13. 1133

    Equilibrium and Kinetic Studies of the Adsorption of Zn(II) Ions onto Natural and Activated Kaolinites by Ali Riza Kul, Necla Caliskan

    Published 2009-02-01
    “…Thermodynamic parameters such as the enthalpy (ΔH 0 ), Gibbs' free energy (ΔG 0 ) and entropy (ΔS 0 ) were calculated for natural, thermally-activated and acid-activated kaolinite. …”
    Get full text
    Article
  14. 1134

    APPLICATION OF IMPROVED EXPERIENCE WAVELET TRANSFORM IN FAULT DIAGNOSIS OF WIND TURBINE GEARBOX by HU Xuan, LI Chun, YE KeHua

    Published 2022-01-01
    “…Aiming at the problems that the minor fault features of wind turbine gearbox bearings are easily submerged and difficult to extract under the background of strong noise, a continuous average spectral negative entropy(CASN) is proposed to improve the empirical wavelet transform(EWT). …”
    Get full text
    Article
  15. 1135

    Black string solutions in Lifshitz spacetime by L. A. Lessa, J. E. G. Silva, J. Furtado

    Published 2025-01-01
    “…The stability of these new solutions is investigated through the thermodynamic analysis of the charged black string. The temperature, entropy, and heat capacity indicate that these modified black strings are thermodynamically stable.…”
    Get full text
    Article
  16. 1136

    A Computable Measure of Algorithmic Probability by Finite Approximations with an Application to Integer Sequences by Fernando Soler-Toscano, Hector Zenil

    Published 2017-01-01
    “…Given the widespread use of lossless compression algorithms to approximate algorithmic (Kolmogorov-Chaitin) complexity and that, usually, generic lossless compression algorithms fall short at characterizing features other than statistical ones not different from entropy evaluations, here we explore an alternative and complementary approach. …”
    Get full text
    Article
  17. 1137

    Monocular Vision SLAM for Indoor Aerial Vehicles by Koray Çelik, Arun K. Somani

    Published 2013-01-01
    “…Experimental results show that the system is only limited by the capabilities of the camera and environmental entropy.…”
    Get full text
    Article
  18. 1138

    Packet Reordering Metrics to Enable Performance Comparison in IP-Networks by Pedro Rodrigues Torres-Jr, Eduardo Parente Ribeiro

    Published 2020-01-01
    “…We highlight good results with the Entropy reorder metric.…”
    Get full text
    Article
  19. 1139

    Enhanced Ehlers transformation and the Majumdar-Papapetrou-NUT spacetime by Marco Astorino

    Published 2020-01-01
    “…From the near-horizon analysis, its microscopic entropy, according to the Kerr/CFT correspondence, is found and the second law of black hole thermodynamics is discussed.…”
    Get full text
    Article
  20. 1140

    On Productions of Net-Baryons in Central Au-Au Collisions at RHIC Energies by Ya-Hui Chen, Guo-Xing Zhang, Fu-Hu Liu

    Published 2015-01-01
    “…Each source in the model is described by the Tsallis statistics to extract the effective temperature and entropy index from the transverse momentum distribution. …”
    Get full text
    Article