Results 11 to 20 of about 496,846 (263)

A Re-Evaluation of the Swiss Hail Suppression Experiment Using Permutation Techniques Shows Enhancement of Hail Energies When Seeding

open access: yesAtmosphere, 2021
Grossversuch IV is a large and well documented experiment on hail suppression by silver iodide seeding. The original 1986 evaluation remained vague, although indicating a tendency to increase hail when seeding.
Armin Auf der Maur, Urs Germann
doaj   +1 more source

The Refined Composite Downsampling Permutation Entropy Is a Relevant Tool in the Muscle Fatigue Study Using sEMG Signals

open access: yesEntropy, 2021
Surface electromyography (sEMG) is a valuable technique that helps provide functional and structural information about the electric activity of muscles. As sEMG measures output of complex living systems characterized by multiscale and nonlinear behaviors,
Philippe Ravier   +3 more
doaj   +1 more source

Calculating Permutation Entropy without Permutations [PDF]

open access: yesComplexity, 2020
A method for analyzing sequential data sets, similar to the permutation entropy one, is discussed. The characteristic features of this method are as follows: it preserves information about equal values, if any, in the embedding vectors; it is exempt from combinatorics; and it delivers the same entropy value as does the permutation method, provided the ...
openaire   +3 more sources

The Use of the Permutation Algorithm for Suboptimising the Position of Used Nozzles on the Field Sprayer Boom

open access: yesApplied Sciences, 2022
The worn-out nozzles of field sprayers cause agricultural treatment to be uneven and therefore ineffective. Spray nozzles are consumable elements of the field sprayer that are subject to inspection and in the event of their excessive wear should be ...
Jacek Wawrzosek, Stanisław Parafiniuk
doaj   +1 more source

Scale Invariant Digital Color Image Encryption Using a 3D Modular Chaotic Map

open access: yesIEEE Access, 2021
Cryptography is one of the most important security mechanisms for the transmission of digital media on the Internet. Most proposed cryptographic image methods based on chaotic maps are dependent upon image sizes and most of them worked on square images ...
Ali Momeni Asl   +2 more
doaj   +1 more source

Dynamic S-Box Design Using a Novel Square Polynomial Transformation and Permutation

open access: yesIEEE Access, 2021
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for the plaintext in the encryption phase and transforming the ciphertext on the receiver side into original plaintext in the decryption phase.
Amjad Hussain Zahid   +11 more
doaj   +1 more source

Cryptanalzing a Novel Hyper-Chaotic Image Encryption Scheme Based on Pixel-Level Filtering and DNA-Level Diffusion

open access: yesIEEE Access, 2020
As we know, improving security is one of the most important motivations for designing new image encryption schemes. However, the security of some new image encryption schemes has not been fully analyzed and evaluated.
Wei Feng, Jing Zhang
doaj   +1 more source

Twisted Permutation Codes [PDF]

open access: yes, 2014
We introduce twisted permutation codes, which are frequency permutation arrays analogous to repetition permutation codes, namely, codes obtained from the repetition construction applied to a permutation code. In particular, we show that a lower bound for
Gillespie, Neil I.   +2 more
core   +4 more sources

PerMallows: An R Package for Mallows and Generalized Mallows Models

open access: yesJournal of Statistical Software, 2016
In this paper we present the R package PerMallows, which is a complete toolbox to work with permutations, distances and some of the most popular probability models for permutations: Mallows and the Generalized Mallows models.
Ekhine Irurozki   +2 more
doaj   +1 more source

Statistical dependence and shape of Young tableau

open access: yes4 open, 2023
Given two continuous random variables, X and Y, we study the relationship between their statistical dependence and the Young tableau of the permutation defined from the graph of a bivariate sample coming from (X, Y). From a sample of size n of (X, Y), we
García Jesús E.   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy