Academic literature on the topic 'Entropy source'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Entropy source.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Entropy source"

1

Flood, Matthew W., and Bernd Grimm. "EntropyHub: An open-source toolkit for entropic time series analysis." PLOS ONE 16, no. 11 (November 4, 2021): e0259448. http://dx.doi.org/10.1371/journal.pone.0259448.

Full text
Abstract:
An increasing number of studies across many research fields from biomedical engineering to finance are employing measures of entropy to quantify the regularity, variability or randomness of time series and image data. Entropy, as it relates to information theory and dynamical systems theory, can be estimated in many ways, with newly developed methods being continuously introduced in the scientific literature. Despite the growing interest in entropic time series and image analysis, there is a shortage of validated, open-source software tools that enable researchers to apply these methods. To date, packages for performing entropy analysis are often run using graphical user interfaces, lack the necessary supporting documentation, or do not include functions for more advanced entropy methods, such as cross-entropy, multiscale cross-entropy or bidimensional entropy. In light of this, this paper introduces EntropyHub, an open-source toolkit for performing entropic time series analysis in MATLAB, Python and Julia. EntropyHub (version 0.1) provides an extensive range of more than forty functions for estimating cross-, multiscale, multiscale cross-, and bidimensional entropy, each including a number of keyword arguments that allows the user to specify multiple parameters in the entropy calculation. Instructions for installation, descriptions of function syntax, and examples of use are fully detailed in the supporting documentation, available on the EntropyHub website– www.EntropyHub.xyz. Compatible with Windows, Mac and Linux operating systems, EntropyHub is hosted on GitHub, as well as the native package repository for MATLAB, Python and Julia, respectively. The goal of EntropyHub is to integrate the many established entropy methods into one complete resource, providing tools that make advanced entropic time series analysis straightforward and reproducible.
APA, Harvard, Vancouver, ISO, and other styles
2

Guyader, A., E. Fabre, C. Guillemot, and M. Robert. "Joint source-channel turbo decoding of entropy-coded sources." IEEE Journal on Selected Areas in Communications 19, no. 9 (2001): 1680–96. http://dx.doi.org/10.1109/49.947033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chapeau-Blondeau, F., A. Delahaies, and D. Rousseau. "Source coding with Tsallis entropy." Electronics Letters 47, no. 3 (2011): 187. http://dx.doi.org/10.1049/el.2010.2792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Borysenko, Oleksiy. "ON COMBINATORIAL ENTROPY OF SOURCES OF BINARY INFORMATION." Grail of Science, no. 20 (October 6, 2022): 90–96. http://dx.doi.org/10.36074/grail-of-science.30.09.2022.017.

Full text
Abstract:
The paper considers the question of converting the entropy of a probabilistic information source generating binary sequences into combinatorial forms of its two constituent sources. One of them is basic, and the second has a conditional entropy with respect to the first. It is shown that together such sources make it possible to optimally encode information using numbering at the efficiency level of known methods of optimal coding. In terms of their functions, they are universal and can solve all the problems that are solved by the methods of coding probabilistic sources. However, unlike them, they do not require statistical tests before optimal coding, or they are carried out to a much lesser extent. They also simplify the calculation of the entropy of a probabilistic source of information, which is useful in solving many problems where it is necessary to know the value of the entropy of the source, for example, in error-correcting coding.
APA, Harvard, Vancouver, ISO, and other styles
5

Bercher, J. F. "Comment: Source coding with Tsallis entropy." Electronics Letters 47, no. 10 (2011): 597. http://dx.doi.org/10.1049/el.2011.0611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Răstoceanu, Florin, Răzvan Rughiniș, Ștefan-Dan Ciocîrlan, and Mihai Enache. "Sensor-Based Entropy Source Analysis and Validation for Use in IoT Environments." Electronics 10, no. 10 (May 14, 2021): 1173. http://dx.doi.org/10.3390/electronics10101173.

Full text
Abstract:
The IoT market has grown significantly in recent years, and it is estimated that it will continue to do so. For this reason, the need to identify new solutions to ensure security is vital for the future development in this field. Inadequate sources of entropy are one of the factors that negatively influence security. In this study, inspired by NIST’s latest entropy estimation recommendations, we proposed a methodology for analyzing and validating a sensor-based entropy source, highlighted by an innovative experiment design. Moreover, the proposed solution is analyzed in terms of resistance to multiple types of attacks. Following an analysis of the influence of sensor characteristics and settings on the entropy rate, we obtain a maximum entropy value of 0.63 per bit, and a throughput of 3.12 Kb/s, even when no motion is applied on the sensors. Our results show that a stable and resistant entropy source can be built based on the data obtained from the sensors. Our assessment of the proposed entropy source also achieves a higher complexity than previous studies, in terms of the variety of approached situations and the types of the performed experiments.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Li, and Yang Liu. "Optimization of Horizontal Plate Fin Heat Sink in Natural Convection for Electronics Cooling by Simulated Annealing Algorithm." Advanced Materials Research 1022 (August 2014): 91–95. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.91.

Full text
Abstract:
In this study, the simulated annealing (SA) algorithm was adopted to optimize the geometry of horizontal plate fin heat sink by the extreme entransy dissipation principle. The alculation of the entransy dissipation rate was presented in detail. Using the entransy dissipation rate as the objective condition, the geometry optimization of the fin heat sink was conducted. To verify the results, the heat source temperature and the entropy generation rate were also calculated in the procedure. It is found that the entrasy dissipation rate, entropy generation and heat source temperature have the similar trend. The extreme entransy dissipation principle and minimization of entropy generation play similar roles in the geometry optimization of plate fin heat sink.
APA, Harvard, Vancouver, ISO, and other styles
8

Contreras Rodríguez, Lianet, Evaristo José Madarro-Capó , Carlos Miguel Legón-Pérez , Omar Rojas, and Guillermo Sosa-Gómez. "Selecting an Effective Entropy Estimator for Short Sequences of Bits and Bytes with Maximum Entropy." Entropy 23, no. 5 (April 30, 2021): 561. http://dx.doi.org/10.3390/e23050561.

Full text
Abstract:
Entropy makes it possible to measure the uncertainty about an information source from the distribution of its output symbols. It is known that the maximum Shannon’s entropy of a discrete source of information is reached when its symbols follow a Uniform distribution. In cryptography, these sources have great applications since they allow for the highest security standards to be reached. In this work, the most effective estimator is selected to estimate entropy in short samples of bytes and bits with maximum entropy. For this, 18 estimators were compared. Results concerning the comparisons published in the literature between these estimators are discussed. The most suitable estimator is determined experimentally, based on its bias, the mean square error short samples of bytes and bits.
APA, Harvard, Vancouver, ISO, and other styles
9

Lopez-Sauceda, Juan, Philipp von Bülow, Carlos Ortega-Laurel, Francisco Perez-Martinez, Kalina Miranda-Perkins, and José Gerardo Carrillo González. "Entropy as a Geometrical Source of Information in Biological Organizations." Entropy 24, no. 10 (September 29, 2022): 1390. http://dx.doi.org/10.3390/e24101390.

Full text
Abstract:
Considering both biological and non-biological polygonal shape organizations, in this paper we introduce a quantitative method which is able to determine informational entropy as spatial differences between heterogeneity of internal areas from simulation and experimental samples. According to these data (i.e., heterogeneity), we are able to establish levels of informational entropy using statistical insights of spatial orders using discrete and continuous values. Given a particular state of entropy, we establish levels of information as a novel approach which can unveil general principles of biological organization. Thirty-five geometric aggregates are tested (biological, non-biological, and polygonal simulations) in order to obtain the theoretical and experimental results of their spatial heterogeneity. Geometrical aggregates (meshes) include a spectrum of organizations ranging from cell meshes to ecological patterns. Experimental results for discrete entropy using a bin width of 0.5 show that a particular range of informational entropy (0.08 to 0.27 bits) is intrinsically associated with low rates of heterogeneity, which indicates a high degree of uncertainty in finding non-homogeneous configurations. In contrast, differential entropy (continuous) results reflect negative entropy within a particular range (−0.4 to −0.9) for all bin widths. We conclude that the differential entropy of geometrical organizations is an important source of neglected information in biological systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Silva, João B., Suzan S. Vasconcelos, and Valeria C. Barbosa. "Apparent-magnetization mapping using entropic regularization." GEOPHYSICS 75, no. 2 (March 2010): L39—L50. http://dx.doi.org/10.1190/1.3358160.

Full text
Abstract:
A new apparent-magnetization mapping method on the horizontal plane combines minimization of first-order entropy with maximization of zeroth-order entropy of the estimated magnetization. The interpretation model is a grid of vertical, juxtaposed prisms in both horizontal directions. To estimate the magnetization of the prisms, assume that the top and bottom of the magnetic sources are horizontal. Minimization of the first-order entropy favors solutions with sharp borders, and the maximization of zeroth-order entropy prevents the tendency of the estimated source to become a single prism with large magnetization. Thus, a judicious combination of both constraints can lead to solutions characterized by regions with virtually constant magnetizations separated by sharp discontinuities. This is applied to synthetic data from simulated intrusive bodies in sediments that have horizontal tops. By comparing the results with those obtained with the common Tikhonov regularization (smoothness constraint) method, it is shown that both methods produce good and equivalent locations of the central positions of the sources. However, entropic regularization delineates the boundaries of the bodies with greater detail. Both the proposed and the smoothness constraints are applied to real anomaly data over a magnetic skarn in Butte Valley, Nevada, U.S.A. Entropic regularization produced an estimated magnetization distribution with sharper boundaries, smaller volume, and higher apparent magnetization as compared with results produced by incorporating the smoothness constraint.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Entropy source"

1

Leone, Nicolò. "A quantum entropy source based on Single Photon Entanglement." Doctoral thesis, Università degli studi di Trento, 2022. https://hdl.handle.net/11572/339572.

Full text
Abstract:
In this thesis, I report on how to use Single Photon Entanglement for generating certified quantum random numbers. Single Photon Entanglement is a particular type of entanglement which involves non-contextual correlations between two degrees of freedom of a single photon. In particular, here I consider momentum and polarization. The presence of the entanglement was validated using different attenuated coherent and incoherent sources of light by evaluating the Bell inequality, a well-known entanglement witness. Different non-idealities in the calculation of the inequality are discussed addressing them both theoretically and experimentally. Then, I discuss how to use the Single Photon Entanglement for generating certified quantum random numbers using a semi-device independent protocol. The protocol is based on a partial characterization of the experimental setup and the violation of the Bell's inequality. An analysis of the non-idealities of the devices employed in the experimental setup is also presented In the last part of the thesis, the integrated photonic version of the previously introduced experiments is discussed: first, it is presented how to generate single photon entangled states exploiting different degrees of freedom with respect to the bulk experiment. Second, I discuss how to perform an integrated test of the Bell's inequality.
APA, Harvard, Vancouver, ISO, and other styles
2

Hedrich, Tanguy. "Spatio temporal evaluation of entropy-based source localization in magnetoencephalography." Thesis, McGill University, 2014. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=121574.

Full text
Abstract:
For 30% of patients affected by focal epilepsy, a surgical intervention is considered to remove the zone of the brain triggering the seizures. Interictal spikes are transient epileptic discharges, occurring between seizures. During presurgical investigation of patients affected by focal epilepsy, magnetoencephalography (MEG) source localization is used to detect the brain region where interictal spikes occur. The estimation of the size of the brain region generating the epileptic discharge may be a useful piece of information for the estimation of the resection area. Moreover, the interictal spike may propagate along the cortical surface. It is crucial during presurgical investigation to detect propagation pattern to identify the onset of the epileptic discharges. Maximum entropy on the mean (MEM) is a source localization method which allows one to introduce a reference distribution containing prior information about MEG data. This reference distribution is based on the assumption that the brain is divided into parcels of generators that can be considered as active or not. It has already been demonstrated that this method is sensitive to the spatial extent of the source. Coherent MEM (cMEM) is a version of MEM adding a spatial smoothness constraint within the parcels. In this thesis, MEM and cMEM were compared to a standard source localization technique: the minimum norm estimate (MNE). The first objective of the thesis was to test the performance to estimate the time course of a simulated epileptic spike. We simulated interictal spikes propagating along the cortical surface. Real MEG background data were used to corrupt noise-free simulations, thus providing realistic simulated data. We demonstrated that MEM and cMEM provided excellent spatial detection scores and a similar temporal accuracy to MNE. We then evaluated the spatial accuracy of the source localization methods using the resolution matrix, which can be seen as the set of all the point spread functions of the source localization methods. MEM and cMEM resolution matrices were estimated using Monte Carlo simulations. The results showed that MEM and cMEM have higher theoretical spatial resolution than MNE. Finally, a method was proposed to obtain a map of activation based on a non parametric statistical analysis. The map was performed using a bootstrap-based analysis in the time-frequency domain. We found that the results varied with the spatial extent of the source. However, the variance of the estimate of the null distribution seemed to be underestimated as the statistical map lacked specificity.
Pour 30% des patients touchés par une épilepsie focale, une intervention chirurgicale peut être envisagée en vue de réséquer la zone du cerveau provoquant les crises d'épilepsie. Les pointes intérictales sont des évennements épileptiques transitoires, se produisant entre les crises d'épilepsie. Pendant la prise en charge préchirurgicale de ces patients, la localisation de source en magnétoencéphalographie (MEG) est utilisée pour détecter la région du cerveau où les pointes intérictales se produisent. L'estimation de la taille des décharges épileptiques peut être une information utile pour l'estimation de la zone à réséquer. De plus, une pointe épileptique peut se propager le long de la surface corticale. Il est crucial pendant l'exploration préchirurgicale de localiser un tel circuit de propagation pour s'assurer d'identifier la zone initiale des décharges épileptiques. Le maximum d'entropie sur la moyenne (MEM) est une technique de localisation de source qui permet d'introduire une distribution de référence contenant des informations a priori sur les données MEG. Cette distribution de référence est basée sur l'hypothèse que le cerveau est divisé en parcelles de générateurs qui peuvent être considérées comme actives ou non. Il a déjà été prouvé que cette méthode était sensible à l'extention spatiale de la source. Le MEM cohérent (coherent MEM - cMEM) est une version du MEM qui ajoute une contrainte de lissage spatial à l'intérieur des parcelles. Pour ce mémoire, MEM et cMEM ont été comparés à une technique de localisation de source standard: l'estimation de norme minimale (minimum norm estimate - MNE). Le premier objectif de ce mémoire est de tester la performance de l'estimation du décours temporel d'une pointe. Nous avons généré des simulations de pointes interictales se propageant le long de la surface corticale, entachées par du bruit de fond réaliste. Nous avons montré que MEM et cMEM obtenaient d'excellents scores de détection spatiale, ainsi qu'une précision temporelle similaire au MNE. Ensuite, nous avons évalué la précision spatiale des méthodes de localisation de source en utilisant la matrice de résolution, qui peut être vue comme l'ensemble de toutes les fonctions d'étalement de point des méthodes de localisation de sources. Les matrices de résolution du MEM et du cMEM ont été estimées en utilisant des simulations de Monte Carlo. Les résultats ont montré que MEM et cMEM avaient une meilleure résolution spatiale théorique que MNE. Finalement, nous avons proposé une méthode visant à obtenir une carte d'activation se basant sur une analyse statistique non paramétrique. La réalisation de la carte statistique s'est faite avec une méthode utilisant le rééchantillonnage bootstrap dans le domaine temps-échelle. Nous avons trouvé que les résultats variaient avec l'extention spatiale de la source estimée. Cependant, la variance de l'estimation de la distribution de l'hypothèse nulle semblait être sous-estimée, étant donné que la carte statistique manquait de spécificité.
APA, Harvard, Vancouver, ISO, and other styles
3

Bafrnec, Matúš. "Hodnocení zdrojů entropie v běžných počítačích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413100.

Full text
Abstract:
This thesis is focused on entropy sources and their evaluation. It includes a brief introduction to the information theory, description of entropy sources, their parameters and characteristics and methods of evaluation based on the NIST organisation standard SP 800-90B. The following part of the thesis is dedicated to the description of two created programs and evaluation and comparison of entropy sources. Additionally, the last part describes the usage of hash functions in association with entropy sources.
APA, Harvard, Vancouver, ISO, and other styles
4

Blumenthal, Robert E. "A study of Hadamard transform, DPCM, and entropy coding techniques for a realizable hybrid video source coder /." Thesis, McGill University, 1986. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=65518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Omer, Mohamoud. "Estimation of regularity and synchronism in parallel biomedical time series." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=101879&source=NDLTD&language=en.

Full text
Abstract:
Objectives: Self-monitoring in health applications has already been recognized as a part of the mobile crowdsensing concept, where subjects, equipped with adequate sensors, share and extract information for personal or common benefit. Limited data transmission resources force a local analysis at wearable devices, but it is incompatible with analytical tools that require stationary and artifact-free data. The key objective of this thesis is to explain a computationally efficient binarized cross-approximate entropy, (X)BinEn, for blind cardiovascular signal processing in environments where energy and processor resources are limited.Methods: The proposed method is a descendant of cross-approximate entropy ((X)ApEn). It operates over binary differentially encoded data series, split into m-sized binary vectors. Hamming distance is used as a distance measure, while a search for similarities is performed over the vector sets, instead of over the individual vectors. The procedure is tested in laboratory rats exposed to shaker and restraint stress and compared to the existing (X)ApEn results.Results: The number of processor operations is reduced. (X)BinEn captures entropy changes similarly to (X)ApEn. The coding coarseness has an adverse effect of reduced sensitivity, but it attenuates parameter inconsistency and binary bias. A special case of (X)BinEn is equivalent to Shannon entropy. A binary conditional m=1 entropy is embedded into the procedure and can serve as a complementary dynamic measure.Conclusion: (X)BinEn can be applied to a single time series as auto-entropy or, more generally, to a pair of time series, as cross-entropy. It is intended for mobile, battery operated self-attached sensing devices with limited power and processor resources.
Cilj: Snimanje sopstvenih zdravstveih prametara je postalo deo koncepta mobilnog ‘crowdsensing-a’ prema kojem učesnici sa nakačenim senzorima skupljaju i dele informacije, na ličnu ili opštu dobrobit. Međutim, ograničenja u prenosu podataka dovela su do koncepta lokalne obrade (na licu mesta). To je pak nespojivo sa uobičajenim metodama za koje je potrebno da podaci koji se obrađuju budu stacionarni i bez artefakata. Ključni deo ove teze je opis procesorski nezahtevne binarizovane unakrsne aproksimativne entropije (X)BinEn koja omogućava analizu kardiovaskularnih podataka bez prethodne predobrade, u uslovima ograničenog napajanja i procesorskih resursa.Metoda: (X)BinEn je nastao razradom postojećeg postupka unakrsne entropije ((X)ApEn). Definisan je nad binarnim diferencijalno kodovanim vremenskim nizovima, razdeljenim u binarne vektore dužine m. Za procenu razmaka između vektora koristi se Hemingovo rastojanje, a sličnost vektora se ne procenjuje između svakog vektora pojedinačno, već između skupova vektora. Procedura je testirana nad laboratorijskim pacovima izloženim različitim vrstova stresova i upoređena sa postojećim rezultatima.Rezultati: Broj potrebnih procesorskih operacija je značajno smanjen. (X)BinEn registruje promene entropije slično (X)ApEn. Beskonačno klipovanje je gruba kvantizacija i za posledicu ima smanjenu osetljivost na promene, ali, sa druge strane, prigušuje binarnu asimetriju i nekonzistentnan uticaj parametara. Za određeni skup parametara (X)BinEn je ekvivalentna Šenonovoj entropiji. Uslovna binarna m=1 entropija automatski se dobija kao uzgredni product binarizovane entropije, i može da se iskoristi kao komplementarna dinamička mera.Zaključak: (X)BinEn može da se koristi za jedan vremenski niz, kao auto-entropija, ili, u opštem slučaju, za dva vremenska niza kao unakrsna entropija. Namenjena je mobilnim uređajima sa baterijskim napajanjem za individualne korisnike, to jest za korisnike sa ograničenim napajanjem i procesorskim resursima.
APA, Harvard, Vancouver, ISO, and other styles
6

Taylor, Quinn Carlson. "Analysis and Characterization of Author Contribution Patterns in Open Source Software Development." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2971.

Full text
Abstract:
Software development is a process fraught with unpredictability, in part because software is created by people. Human interactions add complexity to development processes, and collaborative development can become a liability if not properly understood and managed. Recent years have seen an increase in the use of data mining techniques on publicly-available repository data with the goal of improving software development processes, and by extension, software quality. In this thesis, we introduce the concept of author entropy as a metric for quantifying interaction and collaboration (both within individual files and across projects), present results from two empirical observational studies of open-source projects, identify and analyze authorship and collaboration patterns within source code, demonstrate techniques for visualizing authorship patterns, and propose avenues for further research.
APA, Harvard, Vancouver, ISO, and other styles
7

Tamara, Škorić. "Automatsko određivanje i analitička provera parametara uzajamne entropije kardiovaskularnih vremenskih nizova." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=104844&source=NDLTD&language=en.

Full text
Abstract:
Unakrsna aproksimativna entropija kvantifikuje međusobnu uređenostdva istomvremeno snimljena vremenska niza. Iako je izvedena izveoma zastupljene entropije za procenu uređenosti jednog vremenskogniza, još uvek nije dostigla njenu reputaciju. Cilj ove disertacije jeda identifikuje probleme koji otežavaju širu primenu unakrsneentropije i da predloži skup rešenja. Validacija rezultata je rađenana kardiovaskularnim signalima, sistolnog krvnog pritiska i palsnoginetervala snimljenim na laboratorijskim pacovima i na signalimazdravih volontera.
Cross-approximate entropy (XApEn) quantifies a mutual orderliness of twosimultaneously recorded time series. Although derived from the firmlyestablishe solitary entropies, it has never reached their reputation anddeployment. The aim of this thesis is to identify the problems that precludewider XApEn implementation and to develop a set of solutions. Results werevalidated using the cardiovascular time series, systolic blood pressure andpulse interval, recorded from laboratories animals and also signals recordedfrom healthy human volunteers.
APA, Harvard, Vancouver, ISO, and other styles
8

Williams, Ryan Scott. "Lean Manufacturing as a Source of Competitive Advantage." BYU ScholarsArchive, 2010. https://scholarsarchive.byu.edu/etd/2333.

Full text
Abstract:
The productivity advances generated from lean manufacturing are self-evident. Plants that adopt lean are more capable of achieving high levels of quality, shorter lead times, and less waste in the system. While it seems logical that higher levels of productivity and quality, as is common in lean companies, should result in positive financial performance, the research community has failed to establish the financial profitability of lean. Those researchers who have studied the financial returns issue report varying results. The goal of this research was to determine if a connection exists between lean and financial success and to discover why so many researchers are finding mixed results. Information Velocity (IV) was theorized to provide the solidifying link between lean and financial performance. Measured by combining the environmental volatility with a company's leanness, IV measures how fast a company can transmit information from the market into a customer-satisfying product in the hands of the consumer. This study analyzed over 530 publicly-traded manufacturing companies to validate the following hypotheses: 1) there is a positive relationship between leanness and financial returns, 2) there is a negative relationship between environmental volatility and financial returns, and 3) there is a positive relationship between IV and financial returns. Regression models were run in various combinations to determine the effect of lean, environmental instability, environmental unpredictability, and IV on financial performance indicators such as return on sales (ROS), return on assets (ROA), and quarter-closing stock price. The outcome of this study showed that financial rewards do result from lean, which positively affected financial performance in almost all scenarios. Environmental instability always negatively correlated with financial returns, and IV mostly shows a positive effect, but with mixed results. Lastly, IV does not explain why researchers find mixed results on the profitability measures of lean. The results of this thesis highlight the significance of implementing lean manufacturing, especially in a dynamic environment. As the instability in the environment increases, profitability decreases. Therefore, an increase in leanness by boosting inventory turns can compensate for the volatility and create enhanced productivity measures and financial results.
APA, Harvard, Vancouver, ISO, and other styles
9

Miodrag, Petković. "Prilog razvoju metode za detekciju napada ometanjem usluge na Internetu." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2018. https://www.cris.uns.ac.rs/record.jsf?recordId=107396&source=NDLTD&language=en.

Full text
Abstract:
U ovoj doktorskoj disertaciji predložen je i analiziran metod koji kombinuje primenu entropije odabranih obeležja mrežnog saobraćaja i Takagi-Sugeno-Kang (TSK) neuro-fazi modela u detekciji DoS napada. Entropija je primenjena jer omogućava detekciju širokog spektra statističkih anomalija uzrokovanih DoS napadima dok TSK neuro-fazi model daje dodatni kvalitet u konačnom određivanju tačaka početka i kraja napada povećavajući odnos ispravno i pogrešno detektovanih napada.
In this thesis a new method for DoS attack detection is proposed. This methodcombines the use of entropy of some characteristic parameters of network trafficand Takagi-Sugeno-Kang (TSK) neuro-fuzzy model. Entropy has been used becauseit enables detection of wide spectar of network anomalies caused by DoS attacks,while TSK adds new value to final detection of the start and the end of an attackincreasing ratio between true and false detections.
APA, Harvard, Vancouver, ISO, and other styles
10

Cavallini, Alessandro Giorgio. "Lean Six Sigma as a Source of Competitive Advantage." Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2656.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Entropy source"

1

Eliasson, Gunnar. Deregulation, innovative entry and rapid structural diversity as a source of stable and rapid economic growth. Stockholm: Industriens Utredningsinstitut, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

R, Carr David, and Wiltshire Record Society, eds. The first general entry book of the City of Salisbury, 1387-1452. Trowbridge: Wiltshire Record Society, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

R, Carr David, and Wiltshire Record Society, eds. The first general entry book of the City of Salisbury, 1387-1452. Trowbridge: Wiltshire Record Society, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jin dai Zhejiang dui wai mao yi ji she hui bian qian: Ningbo, Wenzhou, Hangzhou hai guan mao yi bao gao yi bian. Ningbo Shi: Ningbo chu ban she, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

G, Wilson David, and SpringerLink (Online service), eds. Nonlinear Power Flow Control Design: Utilizing Exergy, Entropy, Static and Dynamic Stability, and Lyapunov Analysis. London: Springer-Verlag London Limited, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vergara, Walter. Wind energy in Colombia: A framework for market entry. Washington, D.C: World Bank, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu shi nian ge bu hai guan bao gao 1882-1931. Beijing Shi: Zhongguo hai guan chu ban she, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

O'Neill, Con. Britain's entry into the European Community: Report by Sir Con O'Neill on the negotiations 1970-1972. London: Whitehall History Pub. in association with F. Cass, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jonathan, Edwards. The " miscellanies" (entry nos. 833-1152). New Haven, CT: Yale University Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kenneth, Hawkins, and United States. National Archives and Records Administration, eds. Research in the land entry files of the General Land Office: Record Group 49. [Washington, D.C.]: National Archives and Records Administration, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Entropy source"

1

Landsberg, P. T., A. De Vos, P. Baruch, and J. E. Parrott. "Multiple Source Photovoltaics." In Entropy and Entropy Generation, 175–95. Dordrecht: Springer Netherlands, 1996. http://dx.doi.org/10.1007/0-306-46932-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gray, Robert M. "Source Coding Theorems." In Entropy and Information Theory, 241–75. New York, NY: Springer New York, 1990. http://dx.doi.org/10.1007/978-1-4757-3982-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gray, Robert M. "Source Coding Theorems." In Entropy and Information Theory, 295–334. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-7970-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krichevsky, Rafail. "Information Source and Entropy." In Universal Compression and Retrieval, 8–26. Dordrecht: Springer Netherlands, 1994. http://dx.doi.org/10.1007/978-94-017-3628-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gray, Robert M. "Properties of Good Source Codes." In Entropy and Information Theory, 335–57. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-7970-4_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pendock, Neil. "Bayesian Source Estimation from Potential Field Data." In Maximum Entropy and Bayesian Methods, 287–93. Dordrecht: Springer Netherlands, 1993. http://dx.doi.org/10.1007/978-94-017-2217-9_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Knuth, K. H., and H. G. Vaughan. "Convergent Bayesian Formulations of Blind Source Separation and Electromagnetic Source Estimation." In Maximum Entropy and Bayesian Methods Garching, Germany 1998, 217–26. Dordrecht: Springer Netherlands, 1999. http://dx.doi.org/10.1007/978-94-011-4710-1_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Knuth, K. H. "Difficulties Applying Recent Blind Source Separation Techniques to EEG and MEG." In Maximum Entropy and Bayesian Methods, 209–22. Dordrecht: Springer Netherlands, 1998. http://dx.doi.org/10.1007/978-94-011-5028-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

List, Beatrice, Markus Maucher, Uwe Schöning, and Rainer Schuler. "Randomized Quicksort and the Entropy of the Random Source." In Lecture Notes in Computer Science, 450–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11533719_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rethinam, Sivaraman, Sundararaman Rajagopalan, Sridevi Arumugham, Siva Janakiraman, C. Lakshmi, and Amirtharajan Rengarajan. "Pyramid Entropy Source for True Random Number Generator on FPGA." In Advances in Intelligent Systems and Computing, 23–33. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1483-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Entropy source"

1

Le Gear, Andrew. "High entropy source models." In ECSAW '16: European Conference on Software Architecture Workshops. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2993412.3003395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gumhold, S. "Maximum entropy light source placement." In ACM SIGGRAPH 2002 conference abstracts and applications. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/1242073.1242228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ichir, Mahieddine M. "Bayesian Blind Source Separation of Positive Non Stationary Sources." In BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING: 24th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering. AIP, 2004. http://dx.doi.org/10.1063/1.1835248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ichir, Mahieddine M. "Determination of the number of sources in blind source separation." In BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING: 25th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering. AIP, 2005. http://dx.doi.org/10.1063/1.2149804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Jizhi, Jingshan Pan, and Xueli Wu. "The entropy source of pseudo random number generators: from low entropy to high entropy." In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2019. http://dx.doi.org/10.1109/isi.2019.8823457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kaminska, A., M. Dudeck, Hans-Jürgen Hartfuss, Michel Dudeck, Jozef Musielok, and Marek J. Sadowski. "Entropy in an Arc Plasma Source." In PLASMA 2007: International Conference on Research and Applications of Plasmas; 4th German-Polish Conference on Plasma Diagnostics for Fusion and Applications; 6th French-Polish Seminar on Thermal Plasma in Space and Laboratory. AIP, 2008. http://dx.doi.org/10.1063/1.2909140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kobayashi, K., H. Morita, and M. Hoshi. "A tree source and its entropy." In IEEE International Symposium on Information Theory, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/isit.2003.1228042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Koh, Seong Ryong, Georg Geiser, and Wolfgang Schröder. "Reformulation of Acoustic Entropy Source Terms." In 17th AIAA/CEAS Aeroacoustics Conference (32nd AIAA Aeroacoustics Conference). Reston, Virigina: American Institute of Aeronautics and Astronautics, 2011. http://dx.doi.org/10.2514/6.2011-2927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Giron, Alexandre, and Ricardo Custódio. "An Entropy Source based on the Bluetooth Received Signal Strength Indicator." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19231.

Full text
Abstract:
The Bluetooth Low Energy (BLE) is one of the popular communication technologies employed in the Internet of Things (IoT) context. IoT devices need random numbers to feed their security mechanisms, where the generation of random numbers presupposes the existence of entropy sources. However, there are few entropy sources available, due to the limited hardware resources of those devices. Given this scenario, this paper presents a scalable approach for gathering entropy, called Bluerandom. The approach is based on the Received Signal Strength Indicator (RSSI) within Bluetooth communications. The results show that Bluerandom can be used as an alternative source of entropy, improving the robustness of the cryptographic mechanisms for the IoT context.
APA, Harvard, Vancouver, ISO, and other styles
10

Liang, Wei, and Laibin Zhang. "A Study on Multi-Data Source Fusion Method for Petroleum Pipeline Leak Detection." In 2010 8th International Pipeline Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/ipc2010-31070.

Full text
Abstract:
This paper describes a new approach of data source fusion based on process fusion entropy for leak detecting of product pipelines. Data sources are either single-channeled or multi-channeled: single-channeled data sources can be structured or semi-structured process steady entropy, whereas multi-channeled sources are singular spectrum entropy and power spectrum entropy. In order to develop data sources fusion systems for pipeline leak detection in real-time contexts, we need to study all issues raised by the matching paradigms. This challenging problem becomes crucial with the dominating role of the internet. Classical approaches of data integration, based on schemas mediation, are not suitable to the pipeline SCADA (Supervisory Control and Data Acquisition) environment where data is frequently modified or updated. Therefore, we develop a loosely integrated approach that takes into consideration both steady and transient states which must be separated correctly in order to integrate new data sources. Moreover, we introduce a process fusion entropy-based Multi-data source Fusion Method (MFM) that aims to define and retrieve conflicting data from multiple data sources.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Entropy source"

1

Henson, I. H., and R. K. Cessaro. Source Multiplicity Examined with Minimum Entropy Deconvolution. Fort Belvoir, VA: Defense Technical Information Center, April 1992. http://dx.doi.org/10.21236/ada257523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Henson, I. H., and R. K. Cessaro. Source Multiplicity Examined with Minimum Entropy Deconvolution. Fort Belvoir, VA: Defense Technical Information Center, October 1992. http://dx.doi.org/10.21236/ada260033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Henson, Ivan H., and R. K. Cessaro. Source Multiplicity Examined With Minimum Entropy Deconvolution. Fort Belvoir, VA: Defense Technical Information Center, April 1993. http://dx.doi.org/10.21236/ada268247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kini, S., K. Kompella, S. Sivabalan, S. Litkowski, R. Shakir, and J. Tantsura. Entropy Label for Source Packet Routing in Networking (SPRING) Tunnels. RFC Editor, December 2019. http://dx.doi.org/10.17487/rfc8662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dolotii, Marharyta H., and Pavlo V. Merzlykin. Using the random number generator with a hardware entropy source for symmetric cryptography problems. [б. в.], December 2018. http://dx.doi.org/10.31812/123456789/2883.

Full text
Abstract:
The aim of the research is to test the possibility of using the developed random number generator [1], which utilizes the sound card noise as an entropy source, in the symmetric cryptography algorithms.
APA, Harvard, Vancouver, ISO, and other styles
6

Backus, David, Mikhail Chernov, and Stanley Zin. Sources of Entropy in Representative Agent Models. Cambridge, MA: National Bureau of Economic Research, July 2011. http://dx.doi.org/10.3386/w17219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Turan, Meltem Sönmez, Elaine Barker, John Kelsey, Kerry A. McKay, Mary L. Baish, and Mike Boyle. Recommendation for the entropy sources used for random bit generation. Gaithersburg, MD: National Institute of Standards and Technology, January 2018. http://dx.doi.org/10.6028/nist.sp.800-90b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wen, Wen, Marco Ceccagnoli, and Chris Forman. Patent Commons, Thickets, and Open Source Software Entry by Start-Up Firms. Cambridge, MA: National Bureau of Economic Research, August 2013. http://dx.doi.org/10.3386/w19394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Johra, Hicham. Performance overview of caloric heat pumps: magnetocaloric, elastocaloric, electrocaloric and barocaloric systems. Department of the Built Environment, Aalborg University, January 2022. http://dx.doi.org/10.54337/aau467469997.

Full text
Abstract:
Heat pumps are an excellent solution to supply heating and cooling for indoor space conditioning and domestic hot water production. Conventional heat pumps are typically electrically driven and operate with a vapour-compression thermodynamic cycle of refrigerant fluid to transfer heat from a cold source to a warmer sink. This mature technology is cost-effective and achieves appreciable coefficients of performance (COP). The heat pump market demand is driven up by the urge to improve the energy efficiency of building heating systems coupled with the increase of global cooling needs for air-conditioning. Unfortunately, the refrigerants used in current conventional heat pumps can have a large greenhouse or ozone-depletion effect. Alternative gaseous refrigerants have been identified but they present some issues regarding toxicity, flammability, explosivity, low energy efficiency or high cost. However, several non-vapour-compression heat pump technologies have been invented and could be promising alternatives to conventional systems, with potential for higher COP and without the aforementioned refrigerant drawbacks. Among those, the systems based on the so-called “caloric effects” of solid-state refrigerants are gaining large attention. These caloric effects are characterized by a phase transition varying entropy in the material, resulting in a large adiabatic temperature change. This phase transition is induced by a variation of a specific external field applied to the solid refrigerant. Therefore, the magnetocaloric, elastocaloric, electrocaloric and barocaloric effects are adiabatic temperature changes in specific materials when varying the magnetic field, uniaxial mechanical stress, electrical field or hydrostatic pressure, respectively. Heat pump cycle can be built from these caloric effects and several heating/cooling prototypes were developed and tested over the last few decades. Although not a mature technology yet, some of these caloric systems are well suited to become new efficient and sustainable solutions for indoor space conditioning and domestic hot water production. This technical report (and the paper to which this report is supplementary materials) aims to raise awareness in the building community about these innovative caloric systems. It sheds some light on the recent progress in that field and compares the performance of caloric systems with that of conventional vapour-compression heat pumps for building applications.
APA, Harvard, Vancouver, ISO, and other styles
10

Borrett, Veronica, Melissa Hanham, Gunnar Jeremias, Jonathan Forman, James Revill, John Borrie, Crister Åstot, et al. Science and Technology for WMD Compliance Monitoring and Investigations. The United Nations Institute for Disarmament Research, December 2020. http://dx.doi.org/10.37559/wmd/20/wmdce11.

Full text
Abstract:
The integration of novel technologies for monitoring and investigating compliance can enhance the effectiveness of regimes related to weapons of mass destruction (WMD). This report looks at the potential role of four novel approaches based on recent technological advances – remote sensing tools; open-source satellite data; open-source trade data; and artificial intelligence (AI) – in monitoring and investigating compliance with WMD treaties. The report consists of short essays from leading experts that introduce particular technologies, discuss their applications in WMD regimes, and consider some of the wider economic and political requirements for their adoption. The growing number of space-based sensors is raising confidence in what open-source satellite systems can observe and record. These systems are being combined with local knowledge and technical expertise through social media platforms, resulting in dramatically improved coverage of the Earth’s surface. These open-source tools can complement and augment existing treaty verification and monitoring capabilities in the nuclear regime. Remote sensing tools, such as uncrewed vehicles, can assist investigators by enabling the remote collection of data and chemical samples. In turn, this data can provide valuable indicators, which, in combination with other data, can inform assessments of compliance with the chemical weapons regime. In addition, remote sensing tools can provide inspectors with real time two- or three-dimensional images of a site prior to entry or at the point of inspection. This can facilitate on-site investigations. In the past, trade data has proven valuable in informing assessments of non-compliance with the biological weapons regime. Today, it is possible to analyse trade data through online, public databases. In combination with other methods, open-source trade data could be used to detect anomalies in the biological weapons regime. AI and the digitization of data create new ways to enhance confidence in compliance with WMD regimes. In the context of the chemical weapons regime, the digitization of the chemical industry as part of a wider shift to Industry 4.0 presents possibilities for streamlining declarations under the Chemical Weapons Convention (CWC) and for facilitating CWC regulatory requirements.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography