• In Press of Proceedings of MobileHCI '23 Companion , Association for Computing Machinery, September 2023. (rwth-aachen.de)
  • In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems , CHI EA '23, pages 7, Association for Computing Machinery, New York, NY, USA, April 2023. (rwth-aachen.de)
  • Secondly, the cross-entropy loss function is improved to a weighted cross entropy loss function, and at last it is applied to intrusion detection to improve the accuracy of intrusion detection. (scirp.org)
  • The experimental results show that the model using the weighted cross-entropy loss function combined with the Gelu activation function under the deep neural network architecture improves the evaluation parameters by about 2% compared with the ordinary cross-entropy loss function model. (scirp.org)
  • Experiments prove that the weighted cross-entropy loss function can enhance the model's ability to discriminate samples. (scirp.org)
  • Zhou, Z. , Huang, H. and Fang, B. (2021) Application of Weighted Cross-Entropy Loss Function in Intrusion Detection. (scirp.org)
  • Improving Neural Response Diversity with Frequency-Aware Cross-Entropy Loss. (uva.nl)
  • find that the Shannon entropy is not a decreasing function of developmental systems biology, biomathematics pseudo-time but instead it increases towards the time point of commitment before decreasing again. (lu.se)
  • Shannon entropy, where the latter measures the amount of randomness in a probability distribution [2] . (lu.se)
  • For each 5 min time-series of RR intervals we then calculated Shannon entropy, high spectral entropy, high spectral Detrended Fluctuation Analysis, spectral Multi-Taper Method as well as the standard deviation and two commonly used complexity measures: Approximate Entropy and Sample Entropy. (bvsalud.org)
  • http://dx.doi.org/10.1098/rsfs.2018.0040 an analogy to the concept of entropy in statistical mechanics. (lu.se)
  • Average RR series characteristics (mean, rmssd and sample entropy) and average atrial fibrillatory rate (AFR) were obtained from 24 patients during supine, head-down tilt (HDT), and head-up tilt (HUT). (lu.se)
  • The clinical RR mean, RR rmssd and RR sample entropy decreased from supine to HDT and decreased further from HDT to HUT. (lu.se)
  • Cross-sectional imaging, such as computed tomography (CT) scanning and magnetic resonance imaging (MRI), has shown that adrenal metastases occur more frequently than previously believed. (medscape.com)
  • To determine whether quantitative computed tomography texture analysis (CTTA) can be used to differentiate metastases from benign adrenal masses on single-energy CT images, Shi et al performed a retrospective study of 225 patients with 265 histologically confirmed adrenal masses (101 metastases, 98 pheochromocytomas, and 66 lipid-poor adenomas). (medscape.com)
  • Evaluation of COVID-19 chest computed tomography: A texture analysis based on three-dimensional entropy. (cdc.gov)
  • In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data. (wikipedia.org)
  • Entropy is a statistical measure of randomness that can be used to characterize the texture of the input image. (mathworks.com)
  • Entropy is a scientific concept that is most commonly associated with a state of disorder, randomness, or uncertainty. (wikipedia.org)
  • Austrian physicist Ludwig Boltzmann explained entropy as the measure of the number of possible microscopic arrangements or states of individual atoms and molecules of a system that comply with the macroscopic condition of the system. (wikipedia.org)
  • We find that the behaviour of this entropy measure is in contrast to these predictions. (lu.se)
  • Entropy in statistical mechanics is a measure of disorder in oy the macrostate of a system. (lu.se)
  • Furthermore, one can use the HAVEGE algorithm through haveged to pool entropy. (wikipedia.org)
  • In this algorithm, the entropy value is calculated to detect DDoS attack. (researchbib.com)
  • In this paper we present a detection system of HTTP DDoS attacks in a Cloud environment based on Information Theoretic Entropy and Random Forest ensemble learning algorithm. (hindawi.com)
  • A time-based sliding window algorithm is used to estimate the entropy of the network header features of the incoming network traffic. (hindawi.com)
  • The list of similar examples is long, and may include computing itself. (donationcoder.com)
  • I am still new to sage, I am trying to compute use sage to do some symbolic computation. (sagemath.org)
  • Entropy can handle symbolic data. (wolfram.com)
  • As a result, isolated systems evolve toward thermodynamic equilibrium , where the entropy is highest. (wikipedia.org)
  • Computing this fundamental thermodynamic property from atomistic simulations is notoriously difficult because of the convergence issues involved in free energy methods and finite size effects. (aip.org)
  • Entropy generation is commonly applied to describe the evolution of irreversible processes, such as heat transfer and turbulence. (mdpi.com)
  • Association for Computing Machinery. (uva.nl)
  • This Communication presents the so-called S0 method, which can be used to obtain chemical potentials from static structure factors computed from equilibrium molecular dynamics simulations under the isothermal-isobaric ensemble. (aip.org)
  • In practice, only the static structure factors computed from equilibrium isothermal-isobaric (NPT) molecular dynamics (MD) simulations at different solute concentrations are needed. (aip.org)
  • Here, we propose a generic, easy-to-use method (the S0 method) for computing chemical potentials of solutes at different concentrations in solutions. (aip.org)
  • The whole NPT ensemble is used to compute the structure factors. (aip.org)
  • Note that this will be the standard error of a single simulation, compared to an ensemble average that we usually compute. (lu.se)
  • Programmers using CAPI can get entropy by calling CAPI's CryptGenRandom(), after properly initializing it. (wikipedia.org)
  • Quantum Computing Stack Exchange is a question and answer site for engineers, scientists, programmers, and computing professionals interested in quantum computing. (stackexchange.com)
  • Wolfram Research (2008), Entropy, Wolfram Language function, https://reference.wolfram.com/language/ref/Entropy.html. (wolfram.com)
  • The entropy values are taken from the second group. (lu.se)
  • The second set of groups should contain entropy values. (lu.se)
  • If two files are given (without any ~), the script will take the entropy values from the second file. (lu.se)
  • Despite their massive importance, computing the chemical potential of solutions from atomistic simulations is notoriously difficult and has not become a routine task. (aip.org)
  • The Linux kernel generates entropy from keyboard timings, mouse movements, and integrated drive electronics (IDE) timings and makes the random character data available to other operating system processes through the special files /dev/random and /dev/urandom. (wikipedia.org)
  • The audio_entropyd project, which is included in some operating systems such as Fedora, allows audio data to be used as an entropy source. (wikipedia.org)
  • Also available are video_entropyd, which calculates random data from a video-source and entropybroker, which includes these three and can be used to distribute the entropy data to systems not capable of running any of these (e.g. virtual machines). (wikipedia.org)
  • clarification needed] This made depletion of random data by userland programs impossible on OpenBSD once enough entropy has initially been gathered. (wikipedia.org)
  • Jinglai Li's current research interests are in scientific computing, computational statistics, uncertainty quantification, and data science. (birmingham.ac.uk)
  • Thanks for contributing an answer to Quantum Computing Stack Exchange! (stackexchange.com)
  • It was thought that the number of weak keys found would have been far higher if simple and often attacker determinable one-time unique identifiers had not been incorporated into the entropy of some of these systems. (wikipedia.org)
  • Entropy is central to the second law of thermodynamics , which states that the entropy of an isolated system left to spontaneous evolution cannot decrease with time. (wikipedia.org)
  • Everything seems very complicated right now in all facets of computing, so I've backed off quite a bit, hoping that, in time, things will become simple again. (donationcoder.com)
  • OpenBSD has integrated cryptography as one of its main goals and has always worked on increasing its entropy for encryption but also for randomising many parts of the OS, including various internal operations of its kernel. (wikipedia.org)
  • The course is an elective course for second-cycle studies for a Degree of Master of Science in mathematics with specialization in Numerical Analysis, and an alternative- compulsory course for a degree of Master of Science in Computational Science with specialisation in Geoscience, Scientific Computing and Physics. (lu.se)
  • Chern-Simons theory the Wilson line observables compute the Jones polynomial of the given curve. (ncatlab.org)
  • Information theory provides a framework for quantifying these notions, in terms of entropy, mutual information, and the like. (mdpi.com)
  • Single cells in these populations exhibit different com- stem cell differentiation, Shannon information binations of regulator activity that suggest the presence of multiple theory, entropy configurations of a potential differentiation network as a result of multiple entry points into the committed state. (lu.se)
  • My research area is scientific computing for a sustainable world. (lu.se)
  • I am one of the two co-chairs of the research school COMPUTE , that focuses on scientific discovery using computing in the widest sense. (lu.se)
  • In this context, in the undifferentiated state, the entropy would be large since fewer constraints exist on the gene expression programmes of the cell. (lu.se)
  • Accepted: 12 September 2018 tiation progresses, gene expression programmes become more and more constrained and thus the entropy would be expected to decrease. (lu.se)
  • SIAM Journal on Computing, 35 (1). (lse.ac.uk)
  • SIAM Journal on Scientific Computing, 43(5), pp.A3607-A3626. (birmingham.ac.uk)
  • SIAM Journal on Scientific Computing , 36 (3), pp.A1163-A1186. (birmingham.ac.uk)
  • However, using a jackknife entropy test, the MaxEnt model yielded a 97% success rate. (lu.se)
  • The parallel computing package for Matlab only costs students $29 and allows them to run parallel code on an unlimited number of cores. (fight-entropy.com)
  • In some systems, network interrupts can be used as an entropy source as well. (wikipedia.org)
  • Embedded devices often lack rotating disk drives, human interface devices, and even fans, and the network interface, if any, will not have been active for long enough to provide much entropy. (wikipedia.org)
  • Cloud Computing aims to provide convenient and on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interactions [ 1 ]. (hindawi.com)
  • Common entropy sources may not exist on these devices, or will not have been active long enough during boot to ensure sufficient entropy exists. (wikipedia.org)
  • is unecessary if the entropy files exist (they will just be ignored), but if they do not exists, one has to give this flag. (lu.se)
  • I took the linearization of the log function $\log (x) = x-1$ in an attempt to get the linear cross entropy (following the derivation of Linear entropy ). (stackexchange.com)
  • Brighter pixels in the filtered image correspond to neighborhoods in the original image with higher entropy. (mathworks.com)
  • CLP granulocytes alsocietypublishing.org monocytes visited the higher the entropy. (lu.se)
  • Lacking easy access to entropy, some devices may use hard-coded keys to seed random generators, or seed random generators from easily-guessed unique identifiers such as the device's MAC address. (wikipedia.org)
  • The following is a list of all publications from the Media Computing Group. (rwth-aachen.de)
  • f , Entropy [ list , … ] applies f to pairs of elements in list to determine whether they should be considered equivalent. (wolfram.com)