Gotowa bibliografia na temat „Entropy source”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Entropy source”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Entropy source"

1

Flood, Matthew W., i Bernd Grimm. "EntropyHub: An open-source toolkit for entropic time series analysis". PLOS ONE 16, nr 11 (4.11.2021): e0259448. http://dx.doi.org/10.1371/journal.pone.0259448.

Pełny tekst źródła
Streszczenie:
An increasing number of studies across many research fields from biomedical engineering to finance are employing measures of entropy to quantify the regularity, variability or randomness of time series and image data. Entropy, as it relates to information theory and dynamical systems theory, can be estimated in many ways, with newly developed methods being continuously introduced in the scientific literature. Despite the growing interest in entropic time series and image analysis, there is a shortage of validated, open-source software tools that enable researchers to apply these methods. To date, packages for performing entropy analysis are often run using graphical user interfaces, lack the necessary supporting documentation, or do not include functions for more advanced entropy methods, such as cross-entropy, multiscale cross-entropy or bidimensional entropy. In light of this, this paper introduces EntropyHub, an open-source toolkit for performing entropic time series analysis in MATLAB, Python and Julia. EntropyHub (version 0.1) provides an extensive range of more than forty functions for estimating cross-, multiscale, multiscale cross-, and bidimensional entropy, each including a number of keyword arguments that allows the user to specify multiple parameters in the entropy calculation. Instructions for installation, descriptions of function syntax, and examples of use are fully detailed in the supporting documentation, available on the EntropyHub website– www.EntropyHub.xyz. Compatible with Windows, Mac and Linux operating systems, EntropyHub is hosted on GitHub, as well as the native package repository for MATLAB, Python and Julia, respectively. The goal of EntropyHub is to integrate the many established entropy methods into one complete resource, providing tools that make advanced entropic time series analysis straightforward and reproducible.
Style APA, Harvard, Vancouver, ISO itp.
2

Guyader, A., E. Fabre, C. Guillemot i M. Robert. "Joint source-channel turbo decoding of entropy-coded sources". IEEE Journal on Selected Areas in Communications 19, nr 9 (2001): 1680–96. http://dx.doi.org/10.1109/49.947033.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Chapeau-Blondeau, F., A. Delahaies i D. Rousseau. "Source coding with Tsallis entropy". Electronics Letters 47, nr 3 (2011): 187. http://dx.doi.org/10.1049/el.2010.2792.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Borysenko, Oleksiy. "ON COMBINATORIAL ENTROPY OF SOURCES OF BINARY INFORMATION". Grail of Science, nr 20 (6.10.2022): 90–96. http://dx.doi.org/10.36074/grail-of-science.30.09.2022.017.

Pełny tekst źródła
Streszczenie:
The paper considers the question of converting the entropy of a probabilistic information source generating binary sequences into combinatorial forms of its two constituent sources. One of them is basic, and the second has a conditional entropy with respect to the first. It is shown that together such sources make it possible to optimally encode information using numbering at the efficiency level of known methods of optimal coding. In terms of their functions, they are universal and can solve all the problems that are solved by the methods of coding probabilistic sources. However, unlike them, they do not require statistical tests before optimal coding, or they are carried out to a much lesser extent. They also simplify the calculation of the entropy of a probabilistic source of information, which is useful in solving many problems where it is necessary to know the value of the entropy of the source, for example, in error-correcting coding.
Style APA, Harvard, Vancouver, ISO itp.
5

Bercher, J. F. "Comment: Source coding with Tsallis entropy". Electronics Letters 47, nr 10 (2011): 597. http://dx.doi.org/10.1049/el.2011.0611.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Răstoceanu, Florin, Răzvan Rughiniș, Ștefan-Dan Ciocîrlan i Mihai Enache. "Sensor-Based Entropy Source Analysis and Validation for Use in IoT Environments". Electronics 10, nr 10 (14.05.2021): 1173. http://dx.doi.org/10.3390/electronics10101173.

Pełny tekst źródła
Streszczenie:
The IoT market has grown significantly in recent years, and it is estimated that it will continue to do so. For this reason, the need to identify new solutions to ensure security is vital for the future development in this field. Inadequate sources of entropy are one of the factors that negatively influence security. In this study, inspired by NIST’s latest entropy estimation recommendations, we proposed a methodology for analyzing and validating a sensor-based entropy source, highlighted by an innovative experiment design. Moreover, the proposed solution is analyzed in terms of resistance to multiple types of attacks. Following an analysis of the influence of sensor characteristics and settings on the entropy rate, we obtain a maximum entropy value of 0.63 per bit, and a throughput of 3.12 Kb/s, even when no motion is applied on the sensors. Our results show that a stable and resistant entropy source can be built based on the data obtained from the sensors. Our assessment of the proposed entropy source also achieves a higher complexity than previous studies, in terms of the variety of approached situations and the types of the performed experiments.
Style APA, Harvard, Vancouver, ISO itp.
7

Zhou, Li, i Yang Liu. "Optimization of Horizontal Plate Fin Heat Sink in Natural Convection for Electronics Cooling by Simulated Annealing Algorithm". Advanced Materials Research 1022 (sierpień 2014): 91–95. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.91.

Pełny tekst źródła
Streszczenie:
In this study, the simulated annealing (SA) algorithm was adopted to optimize the geometry of horizontal plate fin heat sink by the extreme entransy dissipation principle. The alculation of the entransy dissipation rate was presented in detail. Using the entransy dissipation rate as the objective condition, the geometry optimization of the fin heat sink was conducted. To verify the results, the heat source temperature and the entropy generation rate were also calculated in the procedure. It is found that the entrasy dissipation rate, entropy generation and heat source temperature have the similar trend. The extreme entransy dissipation principle and minimization of entropy generation play similar roles in the geometry optimization of plate fin heat sink.
Style APA, Harvard, Vancouver, ISO itp.
8

Contreras Rodríguez, Lianet, Evaristo José Madarro-Capó , Carlos Miguel Legón-Pérez , Omar Rojas i Guillermo Sosa-Gómez. "Selecting an Effective Entropy Estimator for Short Sequences of Bits and Bytes with Maximum Entropy". Entropy 23, nr 5 (30.04.2021): 561. http://dx.doi.org/10.3390/e23050561.

Pełny tekst źródła
Streszczenie:
Entropy makes it possible to measure the uncertainty about an information source from the distribution of its output symbols. It is known that the maximum Shannon’s entropy of a discrete source of information is reached when its symbols follow a Uniform distribution. In cryptography, these sources have great applications since they allow for the highest security standards to be reached. In this work, the most effective estimator is selected to estimate entropy in short samples of bytes and bits with maximum entropy. For this, 18 estimators were compared. Results concerning the comparisons published in the literature between these estimators are discussed. The most suitable estimator is determined experimentally, based on its bias, the mean square error short samples of bytes and bits.
Style APA, Harvard, Vancouver, ISO itp.
9

Lopez-Sauceda, Juan, Philipp von Bülow, Carlos Ortega-Laurel, Francisco Perez-Martinez, Kalina Miranda-Perkins i José Gerardo Carrillo González. "Entropy as a Geometrical Source of Information in Biological Organizations". Entropy 24, nr 10 (29.09.2022): 1390. http://dx.doi.org/10.3390/e24101390.

Pełny tekst źródła
Streszczenie:
Considering both biological and non-biological polygonal shape organizations, in this paper we introduce a quantitative method which is able to determine informational entropy as spatial differences between heterogeneity of internal areas from simulation and experimental samples. According to these data (i.e., heterogeneity), we are able to establish levels of informational entropy using statistical insights of spatial orders using discrete and continuous values. Given a particular state of entropy, we establish levels of information as a novel approach which can unveil general principles of biological organization. Thirty-five geometric aggregates are tested (biological, non-biological, and polygonal simulations) in order to obtain the theoretical and experimental results of their spatial heterogeneity. Geometrical aggregates (meshes) include a spectrum of organizations ranging from cell meshes to ecological patterns. Experimental results for discrete entropy using a bin width of 0.5 show that a particular range of informational entropy (0.08 to 0.27 bits) is intrinsically associated with low rates of heterogeneity, which indicates a high degree of uncertainty in finding non-homogeneous configurations. In contrast, differential entropy (continuous) results reflect negative entropy within a particular range (−0.4 to −0.9) for all bin widths. We conclude that the differential entropy of geometrical organizations is an important source of neglected information in biological systems.
Style APA, Harvard, Vancouver, ISO itp.
10

Silva, João B., Suzan S. Vasconcelos i Valeria C. Barbosa. "Apparent-magnetization mapping using entropic regularization". GEOPHYSICS 75, nr 2 (marzec 2010): L39—L50. http://dx.doi.org/10.1190/1.3358160.

Pełny tekst źródła
Streszczenie:
A new apparent-magnetization mapping method on the horizontal plane combines minimization of first-order entropy with maximization of zeroth-order entropy of the estimated magnetization. The interpretation model is a grid of vertical, juxtaposed prisms in both horizontal directions. To estimate the magnetization of the prisms, assume that the top and bottom of the magnetic sources are horizontal. Minimization of the first-order entropy favors solutions with sharp borders, and the maximization of zeroth-order entropy prevents the tendency of the estimated source to become a single prism with large magnetization. Thus, a judicious combination of both constraints can lead to solutions characterized by regions with virtually constant magnetizations separated by sharp discontinuities. This is applied to synthetic data from simulated intrusive bodies in sediments that have horizontal tops. By comparing the results with those obtained with the common Tikhonov regularization (smoothness constraint) method, it is shown that both methods produce good and equivalent locations of the central positions of the sources. However, entropic regularization delineates the boundaries of the bodies with greater detail. Both the proposed and the smoothness constraints are applied to real anomaly data over a magnetic skarn in Butte Valley, Nevada, U.S.A. Entropic regularization produced an estimated magnetization distribution with sharper boundaries, smaller volume, and higher apparent magnetization as compared with results produced by incorporating the smoothness constraint.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Entropy source"

1

Leone, Nicolò. "A quantum entropy source based on Single Photon Entanglement". Doctoral thesis, Università degli studi di Trento, 2022. https://hdl.handle.net/11572/339572.

Pełny tekst źródła
Streszczenie:
In this thesis, I report on how to use Single Photon Entanglement for generating certified quantum random numbers. Single Photon Entanglement is a particular type of entanglement which involves non-contextual correlations between two degrees of freedom of a single photon. In particular, here I consider momentum and polarization. The presence of the entanglement was validated using different attenuated coherent and incoherent sources of light by evaluating the Bell inequality, a well-known entanglement witness. Different non-idealities in the calculation of the inequality are discussed addressing them both theoretically and experimentally. Then, I discuss how to use the Single Photon Entanglement for generating certified quantum random numbers using a semi-device independent protocol. The protocol is based on a partial characterization of the experimental setup and the violation of the Bell's inequality. An analysis of the non-idealities of the devices employed in the experimental setup is also presented In the last part of the thesis, the integrated photonic version of the previously introduced experiments is discussed: first, it is presented how to generate single photon entangled states exploiting different degrees of freedom with respect to the bulk experiment. Second, I discuss how to perform an integrated test of the Bell's inequality.
Style APA, Harvard, Vancouver, ISO itp.
2

Hedrich, Tanguy. "Spatio temporal evaluation of entropy-based source localization in magnetoencephalography". Thesis, McGill University, 2014. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=121574.

Pełny tekst źródła
Streszczenie:
For 30% of patients affected by focal epilepsy, a surgical intervention is considered to remove the zone of the brain triggering the seizures. Interictal spikes are transient epileptic discharges, occurring between seizures. During presurgical investigation of patients affected by focal epilepsy, magnetoencephalography (MEG) source localization is used to detect the brain region where interictal spikes occur. The estimation of the size of the brain region generating the epileptic discharge may be a useful piece of information for the estimation of the resection area. Moreover, the interictal spike may propagate along the cortical surface. It is crucial during presurgical investigation to detect propagation pattern to identify the onset of the epileptic discharges. Maximum entropy on the mean (MEM) is a source localization method which allows one to introduce a reference distribution containing prior information about MEG data. This reference distribution is based on the assumption that the brain is divided into parcels of generators that can be considered as active or not. It has already been demonstrated that this method is sensitive to the spatial extent of the source. Coherent MEM (cMEM) is a version of MEM adding a spatial smoothness constraint within the parcels. In this thesis, MEM and cMEM were compared to a standard source localization technique: the minimum norm estimate (MNE). The first objective of the thesis was to test the performance to estimate the time course of a simulated epileptic spike. We simulated interictal spikes propagating along the cortical surface. Real MEG background data were used to corrupt noise-free simulations, thus providing realistic simulated data. We demonstrated that MEM and cMEM provided excellent spatial detection scores and a similar temporal accuracy to MNE. We then evaluated the spatial accuracy of the source localization methods using the resolution matrix, which can be seen as the set of all the point spread functions of the source localization methods. MEM and cMEM resolution matrices were estimated using Monte Carlo simulations. The results showed that MEM and cMEM have higher theoretical spatial resolution than MNE. Finally, a method was proposed to obtain a map of activation based on a non parametric statistical analysis. The map was performed using a bootstrap-based analysis in the time-frequency domain. We found that the results varied with the spatial extent of the source. However, the variance of the estimate of the null distribution seemed to be underestimated as the statistical map lacked specificity.
Pour 30% des patients touchés par une épilepsie focale, une intervention chirurgicale peut être envisagée en vue de réséquer la zone du cerveau provoquant les crises d'épilepsie. Les pointes intérictales sont des évennements épileptiques transitoires, se produisant entre les crises d'épilepsie. Pendant la prise en charge préchirurgicale de ces patients, la localisation de source en magnétoencéphalographie (MEG) est utilisée pour détecter la région du cerveau où les pointes intérictales se produisent. L'estimation de la taille des décharges épileptiques peut être une information utile pour l'estimation de la zone à réséquer. De plus, une pointe épileptique peut se propager le long de la surface corticale. Il est crucial pendant l'exploration préchirurgicale de localiser un tel circuit de propagation pour s'assurer d'identifier la zone initiale des décharges épileptiques. Le maximum d'entropie sur la moyenne (MEM) est une technique de localisation de source qui permet d'introduire une distribution de référence contenant des informations a priori sur les données MEG. Cette distribution de référence est basée sur l'hypothèse que le cerveau est divisé en parcelles de générateurs qui peuvent être considérées comme actives ou non. Il a déjà été prouvé que cette méthode était sensible à l'extention spatiale de la source. Le MEM cohérent (coherent MEM - cMEM) est une version du MEM qui ajoute une contrainte de lissage spatial à l'intérieur des parcelles. Pour ce mémoire, MEM et cMEM ont été comparés à une technique de localisation de source standard: l'estimation de norme minimale (minimum norm estimate - MNE). Le premier objectif de ce mémoire est de tester la performance de l'estimation du décours temporel d'une pointe. Nous avons généré des simulations de pointes interictales se propageant le long de la surface corticale, entachées par du bruit de fond réaliste. Nous avons montré que MEM et cMEM obtenaient d'excellents scores de détection spatiale, ainsi qu'une précision temporelle similaire au MNE. Ensuite, nous avons évalué la précision spatiale des méthodes de localisation de source en utilisant la matrice de résolution, qui peut être vue comme l'ensemble de toutes les fonctions d'étalement de point des méthodes de localisation de sources. Les matrices de résolution du MEM et du cMEM ont été estimées en utilisant des simulations de Monte Carlo. Les résultats ont montré que MEM et cMEM avaient une meilleure résolution spatiale théorique que MNE. Finalement, nous avons proposé une méthode visant à obtenir une carte d'activation se basant sur une analyse statistique non paramétrique. La réalisation de la carte statistique s'est faite avec une méthode utilisant le rééchantillonnage bootstrap dans le domaine temps-échelle. Nous avons trouvé que les résultats variaient avec l'extention spatiale de la source estimée. Cependant, la variance de l'estimation de la distribution de l'hypothèse nulle semblait être sous-estimée, étant donné que la carte statistique manquait de spécificité.
Style APA, Harvard, Vancouver, ISO itp.
3

Bafrnec, Matúš. "Hodnocení zdrojů entropie v běžných počítačích". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413100.

Pełny tekst źródła
Streszczenie:
This thesis is focused on entropy sources and their evaluation. It includes a brief introduction to the information theory, description of entropy sources, their parameters and characteristics and methods of evaluation based on the NIST organisation standard SP 800-90B. The following part of the thesis is dedicated to the description of two created programs and evaluation and comparison of entropy sources. Additionally, the last part describes the usage of hash functions in association with entropy sources.
Style APA, Harvard, Vancouver, ISO itp.
4

Blumenthal, Robert E. "A study of Hadamard transform, DPCM, and entropy coding techniques for a realizable hybrid video source coder /". Thesis, McGill University, 1986. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=65518.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Omer, Mohamoud. "Estimation of regularity and synchronism in parallel biomedical time series". Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=101879&source=NDLTD&language=en.

Pełny tekst źródła
Streszczenie:
Objectives: Self-monitoring in health applications has already been recognized as a part of the mobile crowdsensing concept, where subjects, equipped with adequate sensors, share and extract information for personal or common benefit. Limited data transmission resources force a local analysis at wearable devices, but it is incompatible with analytical tools that require stationary and artifact-free data. The key objective of this thesis is to explain a computationally efficient binarized cross-approximate entropy, (X)BinEn, for blind cardiovascular signal processing in environments where energy and processor resources are limited.Methods: The proposed method is a descendant of cross-approximate entropy ((X)ApEn). It operates over binary differentially encoded data series, split into m-sized binary vectors. Hamming distance is used as a distance measure, while a search for similarities is performed over the vector sets, instead of over the individual vectors. The procedure is tested in laboratory rats exposed to shaker and restraint stress and compared to the existing (X)ApEn results.Results: The number of processor operations is reduced. (X)BinEn captures entropy changes similarly to (X)ApEn. The coding coarseness has an adverse effect of reduced sensitivity, but it attenuates parameter inconsistency and binary bias. A special case of (X)BinEn is equivalent to Shannon entropy. A binary conditional m=1 entropy is embedded into the procedure and can serve as a complementary dynamic measure.Conclusion: (X)BinEn can be applied to a single time series as auto-entropy or, more generally, to a pair of time series, as cross-entropy. It is intended for mobile, battery operated self-attached sensing devices with limited power and processor resources.
Cilj: Snimanje sopstvenih zdravstveih prametara je postalo deo koncepta mobilnog ‘crowdsensing-a’ prema kojem učesnici sa nakačenim senzorima skupljaju i dele informacije, na ličnu ili opštu dobrobit. Međutim, ograničenja u prenosu podataka dovela su do koncepta lokalne obrade (na licu mesta). To je pak nespojivo sa uobičajenim metodama za koje je potrebno da podaci koji se obrađuju budu stacionarni i bez artefakata. Ključni deo ove teze je opis procesorski nezahtevne binarizovane unakrsne aproksimativne entropije (X)BinEn koja omogućava analizu kardiovaskularnih podataka bez prethodne predobrade, u uslovima ograničenog napajanja i procesorskih resursa.Metoda: (X)BinEn je nastao razradom postojećeg postupka unakrsne entropije ((X)ApEn). Definisan je nad binarnim diferencijalno kodovanim vremenskim nizovima, razdeljenim u binarne vektore dužine m. Za procenu razmaka između vektora koristi se Hemingovo rastojanje, a sličnost vektora se ne procenjuje između svakog vektora pojedinačno, već između skupova vektora. Procedura je testirana nad laboratorijskim pacovima izloženim različitim vrstova stresova i upoređena sa postojećim rezultatima.Rezultati: Broj potrebnih procesorskih operacija je značajno smanjen. (X)BinEn registruje promene entropije slično (X)ApEn. Beskonačno klipovanje je gruba kvantizacija i za posledicu ima smanjenu osetljivost na promene, ali, sa druge strane, prigušuje binarnu asimetriju i nekonzistentnan uticaj parametara. Za određeni skup parametara (X)BinEn je ekvivalentna Šenonovoj entropiji. Uslovna binarna m=1 entropija automatski se dobija kao uzgredni product binarizovane entropije, i može da se iskoristi kao komplementarna dinamička mera.Zaključak: (X)BinEn može da se koristi za jedan vremenski niz, kao auto-entropija, ili, u opštem slučaju, za dva vremenska niza kao unakrsna entropija. Namenjena je mobilnim uređajima sa baterijskim napajanjem za individualne korisnike, to jest za korisnike sa ograničenim napajanjem i procesorskim resursima.
Style APA, Harvard, Vancouver, ISO itp.
6

Taylor, Quinn Carlson. "Analysis and Characterization of Author Contribution Patterns in Open Source Software Development". BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2971.

Pełny tekst źródła
Streszczenie:
Software development is a process fraught with unpredictability, in part because software is created by people. Human interactions add complexity to development processes, and collaborative development can become a liability if not properly understood and managed. Recent years have seen an increase in the use of data mining techniques on publicly-available repository data with the goal of improving software development processes, and by extension, software quality. In this thesis, we introduce the concept of author entropy as a metric for quantifying interaction and collaboration (both within individual files and across projects), present results from two empirical observational studies of open-source projects, identify and analyze authorship and collaboration patterns within source code, demonstrate techniques for visualizing authorship patterns, and propose avenues for further research.
Style APA, Harvard, Vancouver, ISO itp.
7

Tamara, Škorić. "Automatsko određivanje i analitička provera parametara uzajamne entropije kardiovaskularnih vremenskih nizova". Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=104844&source=NDLTD&language=en.

Pełny tekst źródła
Streszczenie:
Unakrsna aproksimativna entropija kvantifikuje međusobnu uređenostdva istomvremeno snimljena vremenska niza. Iako je izvedena izveoma zastupljene entropije za procenu uređenosti jednog vremenskogniza, još uvek nije dostigla njenu reputaciju. Cilj ove disertacije jeda identifikuje probleme koji otežavaju širu primenu unakrsneentropije i da predloži skup rešenja. Validacija rezultata je rađenana kardiovaskularnim signalima, sistolnog krvnog pritiska i palsnoginetervala snimljenim na laboratorijskim pacovima i na signalimazdravih volontera.
Cross-approximate entropy (XApEn) quantifies a mutual orderliness of twosimultaneously recorded time series. Although derived from the firmlyestablishe solitary entropies, it has never reached their reputation anddeployment. The aim of this thesis is to identify the problems that precludewider XApEn implementation and to develop a set of solutions. Results werevalidated using the cardiovascular time series, systolic blood pressure andpulse interval, recorded from laboratories animals and also signals recordedfrom healthy human volunteers.
Style APA, Harvard, Vancouver, ISO itp.
8

Williams, Ryan Scott. "Lean Manufacturing as a Source of Competitive Advantage". BYU ScholarsArchive, 2010. https://scholarsarchive.byu.edu/etd/2333.

Pełny tekst źródła
Streszczenie:
The productivity advances generated from lean manufacturing are self-evident. Plants that adopt lean are more capable of achieving high levels of quality, shorter lead times, and less waste in the system. While it seems logical that higher levels of productivity and quality, as is common in lean companies, should result in positive financial performance, the research community has failed to establish the financial profitability of lean. Those researchers who have studied the financial returns issue report varying results. The goal of this research was to determine if a connection exists between lean and financial success and to discover why so many researchers are finding mixed results. Information Velocity (IV) was theorized to provide the solidifying link between lean and financial performance. Measured by combining the environmental volatility with a company's leanness, IV measures how fast a company can transmit information from the market into a customer-satisfying product in the hands of the consumer. This study analyzed over 530 publicly-traded manufacturing companies to validate the following hypotheses: 1) there is a positive relationship between leanness and financial returns, 2) there is a negative relationship between environmental volatility and financial returns, and 3) there is a positive relationship between IV and financial returns. Regression models were run in various combinations to determine the effect of lean, environmental instability, environmental unpredictability, and IV on financial performance indicators such as return on sales (ROS), return on assets (ROA), and quarter-closing stock price. The outcome of this study showed that financial rewards do result from lean, which positively affected financial performance in almost all scenarios. Environmental instability always negatively correlated with financial returns, and IV mostly shows a positive effect, but with mixed results. Lastly, IV does not explain why researchers find mixed results on the profitability measures of lean. The results of this thesis highlight the significance of implementing lean manufacturing, especially in a dynamic environment. As the instability in the environment increases, profitability decreases. Therefore, an increase in leanness by boosting inventory turns can compensate for the volatility and create enhanced productivity measures and financial results.
Style APA, Harvard, Vancouver, ISO itp.
9

Miodrag, Petković. "Prilog razvoju metode za detekciju napada ometanjem usluge na Internetu". Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2018. https://www.cris.uns.ac.rs/record.jsf?recordId=107396&source=NDLTD&language=en.

Pełny tekst źródła
Streszczenie:
U ovoj doktorskoj disertaciji predložen je i analiziran metod koji kombinuje primenu entropije odabranih obeležja mrežnog saobraćaja i Takagi-Sugeno-Kang (TSK) neuro-fazi modela u detekciji DoS napada. Entropija je primenjena jer omogućava detekciju širokog spektra statističkih anomalija uzrokovanih DoS napadima dok TSK neuro-fazi model daje dodatni kvalitet u konačnom određivanju tačaka početka i kraja napada povećavajući odnos ispravno i pogrešno detektovanih napada.
In this thesis a new method for DoS attack detection is proposed. This methodcombines the use of entropy of some characteristic parameters of network trafficand Takagi-Sugeno-Kang (TSK) neuro-fuzzy model. Entropy has been used becauseit enables detection of wide spectar of network anomalies caused by DoS attacks,while TSK adds new value to final detection of the start and the end of an attackincreasing ratio between true and false detections.
Style APA, Harvard, Vancouver, ISO itp.
10

Cavallini, Alessandro Giorgio. "Lean Six Sigma as a Source of Competitive Advantage". Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2656.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Entropy source"

1

Eliasson, Gunnar. Deregulation, innovative entry and rapid structural diversity as a source of stable and rapid economic growth. Stockholm: Industriens Utredningsinstitut, 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

R, Carr David, i Wiltshire Record Society, red. The first general entry book of the City of Salisbury, 1387-1452. Trowbridge: Wiltshire Record Society, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

R, Carr David, i Wiltshire Record Society, red. The first general entry book of the City of Salisbury, 1387-1452. Trowbridge: Wiltshire Record Society, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jin dai Zhejiang dui wai mao yi ji she hui bian qian: Ningbo, Wenzhou, Hangzhou hai guan mao yi bao gao yi bian. Ningbo Shi: Ningbo chu ban she, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

G, Wilson David, i SpringerLink (Online service), red. Nonlinear Power Flow Control Design: Utilizing Exergy, Entropy, Static and Dynamic Stability, and Lyapunov Analysis. London: Springer-Verlag London Limited, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Vergara, Walter. Wind energy in Colombia: A framework for market entry. Washington, D.C: World Bank, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Wu shi nian ge bu hai guan bao gao 1882-1931. Beijing Shi: Zhongguo hai guan chu ban she, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

O'Neill, Con. Britain's entry into the European Community: Report by Sir Con O'Neill on the negotiations 1970-1972. London: Whitehall History Pub. in association with F. Cass, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Jonathan, Edwards. The " miscellanies" (entry nos. 833-1152). New Haven, CT: Yale University Press, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kenneth, Hawkins, i United States. National Archives and Records Administration, red. Research in the land entry files of the General Land Office: Record Group 49. [Washington, D.C.]: National Archives and Records Administration, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Entropy source"

1

Landsberg, P. T., A. De Vos, P. Baruch i J. E. Parrott. "Multiple Source Photovoltaics". W Entropy and Entropy Generation, 175–95. Dordrecht: Springer Netherlands, 1996. http://dx.doi.org/10.1007/0-306-46932-4_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Gray, Robert M. "Source Coding Theorems". W Entropy and Information Theory, 241–75. New York, NY: Springer New York, 1990. http://dx.doi.org/10.1007/978-1-4757-3982-4_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Gray, Robert M. "Source Coding Theorems". W Entropy and Information Theory, 295–334. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-7970-4_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Krichevsky, Rafail. "Information Source and Entropy". W Universal Compression and Retrieval, 8–26. Dordrecht: Springer Netherlands, 1994. http://dx.doi.org/10.1007/978-94-017-3628-2_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Gray, Robert M. "Properties of Good Source Codes". W Entropy and Information Theory, 335–57. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-7970-4_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Pendock, Neil. "Bayesian Source Estimation from Potential Field Data". W Maximum Entropy and Bayesian Methods, 287–93. Dordrecht: Springer Netherlands, 1993. http://dx.doi.org/10.1007/978-94-017-2217-9_35.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Knuth, K. H., i H. G. Vaughan. "Convergent Bayesian Formulations of Blind Source Separation and Electromagnetic Source Estimation". W Maximum Entropy and Bayesian Methods Garching, Germany 1998, 217–26. Dordrecht: Springer Netherlands, 1999. http://dx.doi.org/10.1007/978-94-011-4710-1_23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Knuth, K. H. "Difficulties Applying Recent Blind Source Separation Techniques to EEG and MEG". W Maximum Entropy and Bayesian Methods, 209–22. Dordrecht: Springer Netherlands, 1998. http://dx.doi.org/10.1007/978-94-011-5028-6_17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

List, Beatrice, Markus Maucher, Uwe Schöning i Rainer Schuler. "Randomized Quicksort and the Entropy of the Random Source". W Lecture Notes in Computer Science, 450–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11533719_46.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Rethinam, Sivaraman, Sundararaman Rajagopalan, Sridevi Arumugham, Siva Janakiraman, C. Lakshmi i Amirtharajan Rengarajan. "Pyramid Entropy Source for True Random Number Generator on FPGA". W Advances in Intelligent Systems and Computing, 23–33. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1483-8_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Entropy source"

1

Le Gear, Andrew. "High entropy source models". W ECSAW '16: European Conference on Software Architecture Workshops. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2993412.3003395.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Gumhold, S. "Maximum entropy light source placement". W ACM SIGGRAPH 2002 conference abstracts and applications. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/1242073.1242228.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ichir, Mahieddine M. "Bayesian Blind Source Separation of Positive Non Stationary Sources". W BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING: 24th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering. AIP, 2004. http://dx.doi.org/10.1063/1.1835248.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Ichir, Mahieddine M. "Determination of the number of sources in blind source separation". W BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING: 25th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering. AIP, 2005. http://dx.doi.org/10.1063/1.2149804.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Wang, Jizhi, Jingshan Pan i Xueli Wu. "The entropy source of pseudo random number generators: from low entropy to high entropy". W 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2019. http://dx.doi.org/10.1109/isi.2019.8823457.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kaminska, A., M. Dudeck, Hans-Jürgen Hartfuss, Michel Dudeck, Jozef Musielok i Marek J. Sadowski. "Entropy in an Arc Plasma Source". W PLASMA 2007: International Conference on Research and Applications of Plasmas; 4th German-Polish Conference on Plasma Diagnostics for Fusion and Applications; 6th French-Polish Seminar on Thermal Plasma in Space and Laboratory. AIP, 2008. http://dx.doi.org/10.1063/1.2909140.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kobayashi, K., H. Morita i M. Hoshi. "A tree source and its entropy". W IEEE International Symposium on Information Theory, 2003. Proceedings. IEEE, 2003. http://dx.doi.org/10.1109/isit.2003.1228042.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Koh, Seong Ryong, Georg Geiser i Wolfgang Schröder. "Reformulation of Acoustic Entropy Source Terms". W 17th AIAA/CEAS Aeroacoustics Conference (32nd AIAA Aeroacoustics Conference). Reston, Virigina: American Institute of Aeronautics and Astronautics, 2011. http://dx.doi.org/10.2514/6.2011-2927.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Giron, Alexandre, i Ricardo Custódio. "An Entropy Source based on the Bluetooth Received Signal Strength Indicator". W Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19231.

Pełny tekst źródła
Streszczenie:
The Bluetooth Low Energy (BLE) is one of the popular communication technologies employed in the Internet of Things (IoT) context. IoT devices need random numbers to feed their security mechanisms, where the generation of random numbers presupposes the existence of entropy sources. However, there are few entropy sources available, due to the limited hardware resources of those devices. Given this scenario, this paper presents a scalable approach for gathering entropy, called Bluerandom. The approach is based on the Received Signal Strength Indicator (RSSI) within Bluetooth communications. The results show that Bluerandom can be used as an alternative source of entropy, improving the robustness of the cryptographic mechanisms for the IoT context.
Style APA, Harvard, Vancouver, ISO itp.
10

Liang, Wei, i Laibin Zhang. "A Study on Multi-Data Source Fusion Method for Petroleum Pipeline Leak Detection". W 2010 8th International Pipeline Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/ipc2010-31070.

Pełny tekst źródła
Streszczenie:
This paper describes a new approach of data source fusion based on process fusion entropy for leak detecting of product pipelines. Data sources are either single-channeled or multi-channeled: single-channeled data sources can be structured or semi-structured process steady entropy, whereas multi-channeled sources are singular spectrum entropy and power spectrum entropy. In order to develop data sources fusion systems for pipeline leak detection in real-time contexts, we need to study all issues raised by the matching paradigms. This challenging problem becomes crucial with the dominating role of the internet. Classical approaches of data integration, based on schemas mediation, are not suitable to the pipeline SCADA (Supervisory Control and Data Acquisition) environment where data is frequently modified or updated. Therefore, we develop a loosely integrated approach that takes into consideration both steady and transient states which must be separated correctly in order to integrate new data sources. Moreover, we introduce a process fusion entropy-based Multi-data source Fusion Method (MFM) that aims to define and retrieve conflicting data from multiple data sources.
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Entropy source"

1

Henson, I. H., i R. K. Cessaro. Source Multiplicity Examined with Minimum Entropy Deconvolution. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1992. http://dx.doi.org/10.21236/ada257523.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Henson, I. H., i R. K. Cessaro. Source Multiplicity Examined with Minimum Entropy Deconvolution. Fort Belvoir, VA: Defense Technical Information Center, październik 1992. http://dx.doi.org/10.21236/ada260033.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Henson, Ivan H., i R. K. Cessaro. Source Multiplicity Examined With Minimum Entropy Deconvolution. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1993. http://dx.doi.org/10.21236/ada268247.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kini, S., K. Kompella, S. Sivabalan, S. Litkowski, R. Shakir i J. Tantsura. Entropy Label for Source Packet Routing in Networking (SPRING) Tunnels. RFC Editor, grudzień 2019. http://dx.doi.org/10.17487/rfc8662.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Dolotii, Marharyta H., i Pavlo V. Merzlykin. Using the random number generator with a hardware entropy source for symmetric cryptography problems. [б. в.], grudzień 2018. http://dx.doi.org/10.31812/123456789/2883.

Pełny tekst źródła
Streszczenie:
The aim of the research is to test the possibility of using the developed random number generator [1], which utilizes the sound card noise as an entropy source, in the symmetric cryptography algorithms.
Style APA, Harvard, Vancouver, ISO itp.
6

Backus, David, Mikhail Chernov i Stanley Zin. Sources of Entropy in Representative Agent Models. Cambridge, MA: National Bureau of Economic Research, lipiec 2011. http://dx.doi.org/10.3386/w17219.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Turan, Meltem Sönmez, Elaine Barker, John Kelsey, Kerry A. McKay, Mary L. Baish i Mike Boyle. Recommendation for the entropy sources used for random bit generation. Gaithersburg, MD: National Institute of Standards and Technology, styczeń 2018. http://dx.doi.org/10.6028/nist.sp.800-90b.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Wen, Wen, Marco Ceccagnoli i Chris Forman. Patent Commons, Thickets, and Open Source Software Entry by Start-Up Firms. Cambridge, MA: National Bureau of Economic Research, sierpień 2013. http://dx.doi.org/10.3386/w19394.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Johra, Hicham. Performance overview of caloric heat pumps: magnetocaloric, elastocaloric, electrocaloric and barocaloric systems. Department of the Built Environment, Aalborg University, styczeń 2022. http://dx.doi.org/10.54337/aau467469997.

Pełny tekst źródła
Streszczenie:
Heat pumps are an excellent solution to supply heating and cooling for indoor space conditioning and domestic hot water production. Conventional heat pumps are typically electrically driven and operate with a vapour-compression thermodynamic cycle of refrigerant fluid to transfer heat from a cold source to a warmer sink. This mature technology is cost-effective and achieves appreciable coefficients of performance (COP). The heat pump market demand is driven up by the urge to improve the energy efficiency of building heating systems coupled with the increase of global cooling needs for air-conditioning. Unfortunately, the refrigerants used in current conventional heat pumps can have a large greenhouse or ozone-depletion effect. Alternative gaseous refrigerants have been identified but they present some issues regarding toxicity, flammability, explosivity, low energy efficiency or high cost. However, several non-vapour-compression heat pump technologies have been invented and could be promising alternatives to conventional systems, with potential for higher COP and without the aforementioned refrigerant drawbacks. Among those, the systems based on the so-called “caloric effects” of solid-state refrigerants are gaining large attention. These caloric effects are characterized by a phase transition varying entropy in the material, resulting in a large adiabatic temperature change. This phase transition is induced by a variation of a specific external field applied to the solid refrigerant. Therefore, the magnetocaloric, elastocaloric, electrocaloric and barocaloric effects are adiabatic temperature changes in specific materials when varying the magnetic field, uniaxial mechanical stress, electrical field or hydrostatic pressure, respectively. Heat pump cycle can be built from these caloric effects and several heating/cooling prototypes were developed and tested over the last few decades. Although not a mature technology yet, some of these caloric systems are well suited to become new efficient and sustainable solutions for indoor space conditioning and domestic hot water production. This technical report (and the paper to which this report is supplementary materials) aims to raise awareness in the building community about these innovative caloric systems. It sheds some light on the recent progress in that field and compares the performance of caloric systems with that of conventional vapour-compression heat pumps for building applications.
Style APA, Harvard, Vancouver, ISO itp.
10

Borrett, Veronica, Melissa Hanham, Gunnar Jeremias, Jonathan Forman, James Revill, John Borrie, Crister Åstot i in. Science and Technology for WMD Compliance Monitoring and Investigations. The United Nations Institute for Disarmament Research, grudzień 2020. http://dx.doi.org/10.37559/wmd/20/wmdce11.

Pełny tekst źródła
Streszczenie:
The integration of novel technologies for monitoring and investigating compliance can enhance the effectiveness of regimes related to weapons of mass destruction (WMD). This report looks at the potential role of four novel approaches based on recent technological advances – remote sensing tools; open-source satellite data; open-source trade data; and artificial intelligence (AI) – in monitoring and investigating compliance with WMD treaties. The report consists of short essays from leading experts that introduce particular technologies, discuss their applications in WMD regimes, and consider some of the wider economic and political requirements for their adoption. The growing number of space-based sensors is raising confidence in what open-source satellite systems can observe and record. These systems are being combined with local knowledge and technical expertise through social media platforms, resulting in dramatically improved coverage of the Earth’s surface. These open-source tools can complement and augment existing treaty verification and monitoring capabilities in the nuclear regime. Remote sensing tools, such as uncrewed vehicles, can assist investigators by enabling the remote collection of data and chemical samples. In turn, this data can provide valuable indicators, which, in combination with other data, can inform assessments of compliance with the chemical weapons regime. In addition, remote sensing tools can provide inspectors with real time two- or three-dimensional images of a site prior to entry or at the point of inspection. This can facilitate on-site investigations. In the past, trade data has proven valuable in informing assessments of non-compliance with the biological weapons regime. Today, it is possible to analyse trade data through online, public databases. In combination with other methods, open-source trade data could be used to detect anomalies in the biological weapons regime. AI and the digitization of data create new ways to enhance confidence in compliance with WMD regimes. In the context of the chemical weapons regime, the digitization of the chemical industry as part of a wider shift to Industry 4.0 presents possibilities for streamlining declarations under the Chemical Weapons Convention (CWC) and for facilitating CWC regulatory requirements.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii