-
1121
Statistical modeling based fast rate distortion estimation algorithm for HEVC
Published 2021-01-01“…To reduce the coding computational complexity of the rate and distortion calculations in HEVC, a fast TU level rate model with higher accuracy was proposed.The contribution percentages of different syntax elements in entropy coding were evaluated, and syntax element-wise accurate rate models were individually developed to construct the whole TU level model.In addition, coefficient levels were weighted adaptively to distinguish the nonuniform contributions of different coefficients in terms of rate profiling.Moreover, position-wise parameter was defined to depict the distribution patterns for possible non-zero coefficients within one block.The final linear rate model was developed by fine-tuning the model parameters from great amounts of samples in a statistical way.Finally, the transform domain distortion model was also established to bypass unnecessary reconstruction process.Experimental results show that the proposed algorithm can achieve 49.76% complexity reduction with 1.74% BD-BR increase for RA configuration.…”
Get full text
Article -
1122
Probabilistic Double Hierarchy Linguistic TOPSIS Method for MAGDM and Its Application to Teaching Quality Evaluation of College English
Published 2022-01-01“…On the one hand, we bring information entropy into the determination of target weight. The PDHL-TOPSIS technique is constructed and utilized for teaching level evaluation. …”
Get full text
Article -
1123
Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback
Published 2022-02-01“…Aiming at the security problem of edge server, a trust evaluation algorithm was proposed, which integrated server cooperation reputation and device user feedback to improve the security of edge computing context.In the process of interaction, a fusion algorithm based on objective information entropy theory was used to aggregate the cooperation reputation between servers, and a partial homomorphic encryption algorithm was used to prevent the leakage of user data in the process of interaction.After the interaction, the highly trusted device node was selected to calculate the feedback trust, which overcame the malicious feedback of the traditional mechanism.When calculating the global trust, the expected score of the server and the adaptive weight calculation method were considered, which overcame the limitations of the traditional trust scheme.The experimental results show that the proposed trust calculation scheme has low time complexity and spatial complexity, and can effectively resist the attack of malicious nodes.…”
Get full text
Article -
1124
A vestige of FZZ duality in higher dimensions
Published 2025-01-01“…At this critical point, the cigar has a puncture at the Euclidean horizon and the higher dimensional black hole entropy is correctly reproduced by the winding condensate.…”
Get full text
Article -
1125
An Intelligent Gray Prediction Model Based on Fuzzy Theory
Published 2022-01-01“…Moreover, this paper uses the entropy weight method to obtain the objective weight to correct the subjective weight, which makes the weight calculation more reasonable. …”
Get full text
Article -
1126
EW-CACTUs-MAML: A Robust Metalearning System for Rapid Classification on a Large Number of Tasks
Published 2022-01-01“…The model-agnostic metalearning (MAML) with the CACTUs method (clustering to automatically construct tasks for unsupervised metalearning) is improved as EW-CACTUs-MAML after integrated with the entropy weight (EW) method. Few-shot mechanisms are introduced in the deep network for efficient learning of a large number of tasks. …”
Get full text
Article -
1127
Simulating quantum circuits using the multi-scale entanglement renormalization ansatz
Published 2025-01-01“…The MERA is a tensor network, whose geometry together with orthogonality constraints imposed on its tensors allow approximating many-body quantum states lying beyond the area-law scaling of the entanglement entropy. We benchmark the proposed technique for brick-wall quantum circuits of up to 243 qubits with various depths up to 20 layers. …”
Get full text
Article -
1128
Thermodynamical Restrictions and Wave Propagation for a Class of Fractional Order Viscoelastic Rods
Published 2011-01-01“…The restrictions on coefficients are derived by using entropy inequality for isothermal processes. In addition, we study waves in a rod of finite length modelled by a linear fractional constitutive equation. …”
Get full text
Article -
1129
Transformasi Lontar Babad Lombok Menuju Digitalisasi Berbasis Natural Gradient Flexible (NGF)
Published 2021-03-01“…Kualitas citra yang telah ditingkatkan diukur menggunakan metode MSE dan PSNR untuk tingkat kemiripannya, dan metode Entropi dan SSIM untuk informasi dan perspektif visual. …”
Get full text
Article -
1130
Corticomuscular Coupling Alterations During Elbow Isometric Contraction Correlated With Clinical Scores: An fNIRS-sEMG Study in Stroke Survivors
Published 2025-01-01“…At matched force levels, the fuzzy approximate entropy values of both agonist and antagonistic muscles were notably lower in the affected group compared to the healthy group (P < 0.05). …”
Get full text
Article -
1131
Method based on contrastive learning for fine-grained unknown malicious traffic classification
Published 2022-10-01“…In order to protect against unknown threats and evasion attacks, a new method based on contrastive learning for fine-grained unknown malicious traffic classification was proposed.Specifically, based on variational auto-encoder (CVAE), it included two classification stages, and cross entropy and reconstruction errors were used for known and unknown traffic classification respectively.Different form other methods, contrastive learning was adopted in different classification stages, which significantly improved the classification performance of the few-shot and unknown (zero-shot) classes.Moreover, some techniques (e.g., re-training and re-sample) combined with contrastive learning further improved the classification performance of the few-shot classes and the generalization ability of model.Experimental results indicate that the proposed method has increased the macro recall of few-shot classes by 20.3% and the recall of unknown attacks by 9.1% respectively, and it also has protected against evasion attacks on partial classes to some extent.…”
Get full text
Article -
1132
Multiscale regional calibration network for crowd counting
Published 2025-01-01“…Additionally, we improve the loss function by combining L2 loss and binary cross-entropy loss to help MRCNet achieve excellent results. …”
Get full text
Article -
1133
Equilibrium and Kinetic Studies of the Adsorption of Zn(II) Ions onto Natural and Activated Kaolinites
Published 2009-02-01“…Thermodynamic parameters such as the enthalpy (ΔH 0 ), Gibbs' free energy (ΔG 0 ) and entropy (ΔS 0 ) were calculated for natural, thermally-activated and acid-activated kaolinite. …”
Get full text
Article -
1134
APPLICATION OF IMPROVED EXPERIENCE WAVELET TRANSFORM IN FAULT DIAGNOSIS OF WIND TURBINE GEARBOX
Published 2022-01-01“…Aiming at the problems that the minor fault features of wind turbine gearbox bearings are easily submerged and difficult to extract under the background of strong noise, a continuous average spectral negative entropy(CASN) is proposed to improve the empirical wavelet transform(EWT). …”
Get full text
Article -
1135
Black string solutions in Lifshitz spacetime
Published 2025-01-01“…The stability of these new solutions is investigated through the thermodynamic analysis of the charged black string. The temperature, entropy, and heat capacity indicate that these modified black strings are thermodynamically stable.…”
Get full text
Article -
1136
A Computable Measure of Algorithmic Probability by Finite Approximations with an Application to Integer Sequences
Published 2017-01-01“…Given the widespread use of lossless compression algorithms to approximate algorithmic (Kolmogorov-Chaitin) complexity and that, usually, generic lossless compression algorithms fall short at characterizing features other than statistical ones not different from entropy evaluations, here we explore an alternative and complementary approach. …”
Get full text
Article -
1137
Monocular Vision SLAM for Indoor Aerial Vehicles
Published 2013-01-01“…Experimental results show that the system is only limited by the capabilities of the camera and environmental entropy.…”
Get full text
Article -
1138
Packet Reordering Metrics to Enable Performance Comparison in IP-Networks
Published 2020-01-01“…We highlight good results with the Entropy reorder metric.…”
Get full text
Article -
1139
Enhanced Ehlers transformation and the Majumdar-Papapetrou-NUT spacetime
Published 2020-01-01“…From the near-horizon analysis, its microscopic entropy, according to the Kerr/CFT correspondence, is found and the second law of black hole thermodynamics is discussed.…”
Get full text
Article -
1140
On Productions of Net-Baryons in Central Au-Au Collisions at RHIC Energies
Published 2015-01-01“…Each source in the model is described by the Tsallis statistics to extract the effective temperature and entropy index from the transverse momentum distribution. …”
Get full text
Article