Academic literature on the topic 'Entropy source'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Entropy source.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Entropy source"
Flood, Matthew W., and Bernd Grimm. "EntropyHub: An open-source toolkit for entropic time series analysis." PLOS ONE 16, no. 11 (November 4, 2021): e0259448. http://dx.doi.org/10.1371/journal.pone.0259448.
Full textGuyader, A., E. Fabre, C. Guillemot, and M. Robert. "Joint source-channel turbo decoding of entropy-coded sources." IEEE Journal on Selected Areas in Communications 19, no. 9 (2001): 1680–96. http://dx.doi.org/10.1109/49.947033.
Full textChapeau-Blondeau, F., A. Delahaies, and D. Rousseau. "Source coding with Tsallis entropy." Electronics Letters 47, no. 3 (2011): 187. http://dx.doi.org/10.1049/el.2010.2792.
Full textBorysenko, Oleksiy. "ON COMBINATORIAL ENTROPY OF SOURCES OF BINARY INFORMATION." Grail of Science, no. 20 (October 6, 2022): 90–96. http://dx.doi.org/10.36074/grail-of-science.30.09.2022.017.
Full textBercher, J. F. "Comment: Source coding with Tsallis entropy." Electronics Letters 47, no. 10 (2011): 597. http://dx.doi.org/10.1049/el.2011.0611.
Full textRăstoceanu, Florin, Răzvan Rughiniș, Ștefan-Dan Ciocîrlan, and Mihai Enache. "Sensor-Based Entropy Source Analysis and Validation for Use in IoT Environments." Electronics 10, no. 10 (May 14, 2021): 1173. http://dx.doi.org/10.3390/electronics10101173.
Full textZhou, Li, and Yang Liu. "Optimization of Horizontal Plate Fin Heat Sink in Natural Convection for Electronics Cooling by Simulated Annealing Algorithm." Advanced Materials Research 1022 (August 2014): 91–95. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.91.
Full textContreras Rodríguez, Lianet, Evaristo José Madarro-Capó , Carlos Miguel Legón-Pérez , Omar Rojas, and Guillermo Sosa-Gómez. "Selecting an Effective Entropy Estimator for Short Sequences of Bits and Bytes with Maximum Entropy." Entropy 23, no. 5 (April 30, 2021): 561. http://dx.doi.org/10.3390/e23050561.
Full textLopez-Sauceda, Juan, Philipp von Bülow, Carlos Ortega-Laurel, Francisco Perez-Martinez, Kalina Miranda-Perkins, and José Gerardo Carrillo González. "Entropy as a Geometrical Source of Information in Biological Organizations." Entropy 24, no. 10 (September 29, 2022): 1390. http://dx.doi.org/10.3390/e24101390.
Full textSilva, João B., Suzan S. Vasconcelos, and Valeria C. Barbosa. "Apparent-magnetization mapping using entropic regularization." GEOPHYSICS 75, no. 2 (March 2010): L39—L50. http://dx.doi.org/10.1190/1.3358160.
Full textDissertations / Theses on the topic "Entropy source"
Leone, Nicolò. "A quantum entropy source based on Single Photon Entanglement." Doctoral thesis, Università degli studi di Trento, 2022. https://hdl.handle.net/11572/339572.
Full textHedrich, Tanguy. "Spatio temporal evaluation of entropy-based source localization in magnetoencephalography." Thesis, McGill University, 2014. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=121574.
Full textPour 30% des patients touchés par une épilepsie focale, une intervention chirurgicale peut être envisagée en vue de réséquer la zone du cerveau provoquant les crises d'épilepsie. Les pointes intérictales sont des évennements épileptiques transitoires, se produisant entre les crises d'épilepsie. Pendant la prise en charge préchirurgicale de ces patients, la localisation de source en magnétoencéphalographie (MEG) est utilisée pour détecter la région du cerveau où les pointes intérictales se produisent. L'estimation de la taille des décharges épileptiques peut être une information utile pour l'estimation de la zone à réséquer. De plus, une pointe épileptique peut se propager le long de la surface corticale. Il est crucial pendant l'exploration préchirurgicale de localiser un tel circuit de propagation pour s'assurer d'identifier la zone initiale des décharges épileptiques. Le maximum d'entropie sur la moyenne (MEM) est une technique de localisation de source qui permet d'introduire une distribution de référence contenant des informations a priori sur les données MEG. Cette distribution de référence est basée sur l'hypothèse que le cerveau est divisé en parcelles de générateurs qui peuvent être considérées comme actives ou non. Il a déjà été prouvé que cette méthode était sensible à l'extention spatiale de la source. Le MEM cohérent (coherent MEM - cMEM) est une version du MEM qui ajoute une contrainte de lissage spatial à l'intérieur des parcelles. Pour ce mémoire, MEM et cMEM ont été comparés à une technique de localisation de source standard: l'estimation de norme minimale (minimum norm estimate - MNE). Le premier objectif de ce mémoire est de tester la performance de l'estimation du décours temporel d'une pointe. Nous avons généré des simulations de pointes interictales se propageant le long de la surface corticale, entachées par du bruit de fond réaliste. Nous avons montré que MEM et cMEM obtenaient d'excellents scores de détection spatiale, ainsi qu'une précision temporelle similaire au MNE. Ensuite, nous avons évalué la précision spatiale des méthodes de localisation de source en utilisant la matrice de résolution, qui peut être vue comme l'ensemble de toutes les fonctions d'étalement de point des méthodes de localisation de sources. Les matrices de résolution du MEM et du cMEM ont été estimées en utilisant des simulations de Monte Carlo. Les résultats ont montré que MEM et cMEM avaient une meilleure résolution spatiale théorique que MNE. Finalement, nous avons proposé une méthode visant à obtenir une carte d'activation se basant sur une analyse statistique non paramétrique. La réalisation de la carte statistique s'est faite avec une méthode utilisant le rééchantillonnage bootstrap dans le domaine temps-échelle. Nous avons trouvé que les résultats variaient avec l'extention spatiale de la source estimée. Cependant, la variance de l'estimation de la distribution de l'hypothèse nulle semblait être sous-estimée, étant donné que la carte statistique manquait de spécificité.
Bafrnec, Matúš. "Hodnocení zdrojů entropie v běžných počítačích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413100.
Full textBlumenthal, Robert E. "A study of Hadamard transform, DPCM, and entropy coding techniques for a realizable hybrid video source coder /." Thesis, McGill University, 1986. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=65518.
Full textOmer, Mohamoud. "Estimation of regularity and synchronism in parallel biomedical time series." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=101879&source=NDLTD&language=en.
Full textCilj: Snimanje sopstvenih zdravstveih prametara je postalo deo koncepta mobilnog ‘crowdsensing-a’ prema kojem učesnici sa nakačenim senzorima skupljaju i dele informacije, na ličnu ili opštu dobrobit. Međutim, ograničenja u prenosu podataka dovela su do koncepta lokalne obrade (na licu mesta). To je pak nespojivo sa uobičajenim metodama za koje je potrebno da podaci koji se obrađuju budu stacionarni i bez artefakata. Ključni deo ove teze je opis procesorski nezahtevne binarizovane unakrsne aproksimativne entropije (X)BinEn koja omogućava analizu kardiovaskularnih podataka bez prethodne predobrade, u uslovima ograničenog napajanja i procesorskih resursa.Metoda: (X)BinEn je nastao razradom postojećeg postupka unakrsne entropije ((X)ApEn). Definisan je nad binarnim diferencijalno kodovanim vremenskim nizovima, razdeljenim u binarne vektore dužine m. Za procenu razmaka između vektora koristi se Hemingovo rastojanje, a sličnost vektora se ne procenjuje između svakog vektora pojedinačno, već između skupova vektora. Procedura je testirana nad laboratorijskim pacovima izloženim različitim vrstova stresova i upoređena sa postojećim rezultatima.Rezultati: Broj potrebnih procesorskih operacija je značajno smanjen. (X)BinEn registruje promene entropije slično (X)ApEn. Beskonačno klipovanje je gruba kvantizacija i za posledicu ima smanjenu osetljivost na promene, ali, sa druge strane, prigušuje binarnu asimetriju i nekonzistentnan uticaj parametara. Za određeni skup parametara (X)BinEn je ekvivalentna Šenonovoj entropiji. Uslovna binarna m=1 entropija automatski se dobija kao uzgredni product binarizovane entropije, i može da se iskoristi kao komplementarna dinamička mera.Zaključak: (X)BinEn može da se koristi za jedan vremenski niz, kao auto-entropija, ili, u opštem slučaju, za dva vremenska niza kao unakrsna entropija. Namenjena je mobilnim uređajima sa baterijskim napajanjem za individualne korisnike, to jest za korisnike sa ograničenim napajanjem i procesorskim resursima.
Taylor, Quinn Carlson. "Analysis and Characterization of Author Contribution Patterns in Open Source Software Development." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2971.
Full textTamara, Škorić. "Automatsko određivanje i analitička provera parametara uzajamne entropije kardiovaskularnih vremenskih nizova." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=104844&source=NDLTD&language=en.
Full textCross-approximate entropy (XApEn) quantifies a mutual orderliness of twosimultaneously recorded time series. Although derived from the firmlyestablishe solitary entropies, it has never reached their reputation anddeployment. The aim of this thesis is to identify the problems that precludewider XApEn implementation and to develop a set of solutions. Results werevalidated using the cardiovascular time series, systolic blood pressure andpulse interval, recorded from laboratories animals and also signals recordedfrom healthy human volunteers.
Williams, Ryan Scott. "Lean Manufacturing as a Source of Competitive Advantage." BYU ScholarsArchive, 2010. https://scholarsarchive.byu.edu/etd/2333.
Full textMiodrag, Petković. "Prilog razvoju metode za detekciju napada ometanjem usluge na Internetu." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2018. https://www.cris.uns.ac.rs/record.jsf?recordId=107396&source=NDLTD&language=en.
Full textIn this thesis a new method for DoS attack detection is proposed. This methodcombines the use of entropy of some characteristic parameters of network trafficand Takagi-Sugeno-Kang (TSK) neuro-fuzzy model. Entropy has been used becauseit enables detection of wide spectar of network anomalies caused by DoS attacks,while TSK adds new value to final detection of the start and the end of an attackincreasing ratio between true and false detections.
Cavallini, Alessandro Giorgio. "Lean Six Sigma as a Source of Competitive Advantage." Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2656.pdf.
Full textBooks on the topic "Entropy source"
Eliasson, Gunnar. Deregulation, innovative entry and rapid structural diversity as a source of stable and rapid economic growth. Stockholm: Industriens Utredningsinstitut, 1991.
Find full textR, Carr David, and Wiltshire Record Society, eds. The first general entry book of the City of Salisbury, 1387-1452. Trowbridge: Wiltshire Record Society, 2001.
Find full textR, Carr David, and Wiltshire Record Society, eds. The first general entry book of the City of Salisbury, 1387-1452. Trowbridge: Wiltshire Record Society, 2001.
Find full textJin dai Zhejiang dui wai mao yi ji she hui bian qian: Ningbo, Wenzhou, Hangzhou hai guan mao yi bao gao yi bian. Ningbo Shi: Ningbo chu ban she, 2003.
Find full textG, Wilson David, and SpringerLink (Online service), eds. Nonlinear Power Flow Control Design: Utilizing Exergy, Entropy, Static and Dynamic Stability, and Lyapunov Analysis. London: Springer-Verlag London Limited, 2011.
Find full textVergara, Walter. Wind energy in Colombia: A framework for market entry. Washington, D.C: World Bank, 2010.
Find full textWu shi nian ge bu hai guan bao gao 1882-1931. Beijing Shi: Zhongguo hai guan chu ban she, 2009.
Find full textO'Neill, Con. Britain's entry into the European Community: Report by Sir Con O'Neill on the negotiations 1970-1972. London: Whitehall History Pub. in association with F. Cass, 2000.
Find full textJonathan, Edwards. The " miscellanies" (entry nos. 833-1152). New Haven, CT: Yale University Press, 2002.
Find full textKenneth, Hawkins, and United States. National Archives and Records Administration, eds. Research in the land entry files of the General Land Office: Record Group 49. [Washington, D.C.]: National Archives and Records Administration, 1998.
Find full textBook chapters on the topic "Entropy source"
Landsberg, P. T., A. De Vos, P. Baruch, and J. E. Parrott. "Multiple Source Photovoltaics." In Entropy and Entropy Generation, 175–95. Dordrecht: Springer Netherlands, 1996. http://dx.doi.org/10.1007/0-306-46932-4_12.
Full textGray, Robert M. "Source Coding Theorems." In Entropy and Information Theory, 241–75. New York, NY: Springer New York, 1990. http://dx.doi.org/10.1007/978-1-4757-3982-4_11.
Full textGray, Robert M. "Source Coding Theorems." In Entropy and Information Theory, 295–334. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-7970-4_12.
Full textKrichevsky, Rafail. "Information Source and Entropy." In Universal Compression and Retrieval, 8–26. Dordrecht: Springer Netherlands, 1994. http://dx.doi.org/10.1007/978-94-017-3628-2_3.
Full textGray, Robert M. "Properties of Good Source Codes." In Entropy and Information Theory, 335–57. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-7970-4_13.
Full textPendock, Neil. "Bayesian Source Estimation from Potential Field Data." In Maximum Entropy and Bayesian Methods, 287–93. Dordrecht: Springer Netherlands, 1993. http://dx.doi.org/10.1007/978-94-017-2217-9_35.
Full textKnuth, K. H., and H. G. Vaughan. "Convergent Bayesian Formulations of Blind Source Separation and Electromagnetic Source Estimation." In Maximum Entropy and Bayesian Methods Garching, Germany 1998, 217–26. Dordrecht: Springer Netherlands, 1999. http://dx.doi.org/10.1007/978-94-011-4710-1_23.
Full textKnuth, K. H. "Difficulties Applying Recent Blind Source Separation Techniques to EEG and MEG." In Maximum Entropy and Bayesian Methods, 209–22. Dordrecht: Springer Netherlands, 1998. http://dx.doi.org/10.1007/978-94-011-5028-6_17.
Full textList, Beatrice, Markus Maucher, Uwe Schöning, and Rainer Schuler. "Randomized Quicksort and the Entropy of the Random Source." In Lecture Notes in Computer Science, 450–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11533719_46.
Full textRethinam, Sivaraman, Sundararaman Rajagopalan, Sridevi Arumugham, Siva Janakiraman, C. Lakshmi, and Amirtharajan Rengarajan. "Pyramid Entropy Source for True Random Number Generator on FPGA." In Advances in Intelligent Systems and Computing, 23–33. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1483-8_3.
Full textConference papers on the topic "Entropy source"
Le Gear, Andrew. "High entropy source models." In ECSAW '16: European Conference on Software Architecture Workshops. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2993412.3003395.
Full textGumhold, S. "Maximum entropy light source placement." In ACM SIGGRAPH 2002 conference abstracts and applications. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/1242073.1242228.
Full textIchir, Mahieddine M. "Bayesian Blind Source Separation of Positive Non Stationary Sources." In BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING: 24th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering. AIP, 2004. http://dx.doi.org/10.1063/1.1835248.
Full textIchir, Mahieddine M. "Determination of the number of sources in blind source separation." In BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING: 25th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering. AIP, 2005. http://dx.doi.org/10.1063/1.2149804.
Full textWang, Jizhi, Jingshan Pan, and Xueli Wu. "The entropy source of pseudo random number generators: from low entropy to high entropy." In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2019. http://dx.doi.org/10.1109/isi.2019.8823457.
Full textKaminska, A., M. Dudeck, Hans-Jürgen Hartfuss, Michel Dudeck, Jozef Musielok, and Marek J. Sadowski. "Entropy in an Arc Plasma Source." In PLASMA 2007: International Conference on Research and Applications of Plasmas; 4th German-Polish Conference on Plasma Diagnostics for Fusion and Applications; 6th French-Polish Seminar on Thermal Plasma in Space and Laboratory. AIP, 2008. http://dx.doi.org/10.1063/1.2909140.
Full textKobayashi, K., H. Morita, and M. Hoshi. "A tree source and its entropy." In IEEE International Symposium on Information Theory, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/isit.2003.1228042.
Full textKoh, Seong Ryong, Georg Geiser, and Wolfgang Schröder. "Reformulation of Acoustic Entropy Source Terms." In 17th AIAA/CEAS Aeroacoustics Conference (32nd AIAA Aeroacoustics Conference). Reston, Virigina: American Institute of Aeronautics and Astronautics, 2011. http://dx.doi.org/10.2514/6.2011-2927.
Full textGiron, Alexandre, and Ricardo Custódio. "An Entropy Source based on the Bluetooth Received Signal Strength Indicator." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19231.
Full textLiang, Wei, and Laibin Zhang. "A Study on Multi-Data Source Fusion Method for Petroleum Pipeline Leak Detection." In 2010 8th International Pipeline Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/ipc2010-31070.
Full textReports on the topic "Entropy source"
Henson, I. H., and R. K. Cessaro. Source Multiplicity Examined with Minimum Entropy Deconvolution. Fort Belvoir, VA: Defense Technical Information Center, April 1992. http://dx.doi.org/10.21236/ada257523.
Full textHenson, I. H., and R. K. Cessaro. Source Multiplicity Examined with Minimum Entropy Deconvolution. Fort Belvoir, VA: Defense Technical Information Center, October 1992. http://dx.doi.org/10.21236/ada260033.
Full textHenson, Ivan H., and R. K. Cessaro. Source Multiplicity Examined With Minimum Entropy Deconvolution. Fort Belvoir, VA: Defense Technical Information Center, April 1993. http://dx.doi.org/10.21236/ada268247.
Full textKini, S., K. Kompella, S. Sivabalan, S. Litkowski, R. Shakir, and J. Tantsura. Entropy Label for Source Packet Routing in Networking (SPRING) Tunnels. RFC Editor, December 2019. http://dx.doi.org/10.17487/rfc8662.
Full textDolotii, Marharyta H., and Pavlo V. Merzlykin. Using the random number generator with a hardware entropy source for symmetric cryptography problems. [б. в.], December 2018. http://dx.doi.org/10.31812/123456789/2883.
Full textBackus, David, Mikhail Chernov, and Stanley Zin. Sources of Entropy in Representative Agent Models. Cambridge, MA: National Bureau of Economic Research, July 2011. http://dx.doi.org/10.3386/w17219.
Full textTuran, Meltem Sönmez, Elaine Barker, John Kelsey, Kerry A. McKay, Mary L. Baish, and Mike Boyle. Recommendation for the entropy sources used for random bit generation. Gaithersburg, MD: National Institute of Standards and Technology, January 2018. http://dx.doi.org/10.6028/nist.sp.800-90b.
Full textWen, Wen, Marco Ceccagnoli, and Chris Forman. Patent Commons, Thickets, and Open Source Software Entry by Start-Up Firms. Cambridge, MA: National Bureau of Economic Research, August 2013. http://dx.doi.org/10.3386/w19394.
Full textJohra, Hicham. Performance overview of caloric heat pumps: magnetocaloric, elastocaloric, electrocaloric and barocaloric systems. Department of the Built Environment, Aalborg University, January 2022. http://dx.doi.org/10.54337/aau467469997.
Full textBorrett, Veronica, Melissa Hanham, Gunnar Jeremias, Jonathan Forman, James Revill, John Borrie, Crister Åstot, et al. Science and Technology for WMD Compliance Monitoring and Investigations. The United Nations Institute for Disarmament Research, December 2020. http://dx.doi.org/10.37559/wmd/20/wmdce11.
Full text