Results 11 to 20 of about 496,846 (263)
Grossversuch IV is a large and well documented experiment on hail suppression by silver iodide seeding. The original 1986 evaluation remained vague, although indicating a tendency to increase hail when seeding.
Armin Auf der Maur, Urs Germann
doaj +1 more source
Surface electromyography (sEMG) is a valuable technique that helps provide functional and structural information about the electric activity of muscles. As sEMG measures output of complex living systems characterized by multiscale and nonlinear behaviors,
Philippe Ravier +3 more
doaj +1 more source
Calculating Permutation Entropy without Permutations [PDF]
A method for analyzing sequential data sets, similar to the permutation entropy one, is discussed. The characteristic features of this method are as follows: it preserves information about equal values, if any, in the embedding vectors; it is exempt from combinatorics; and it delivers the same entropy value as does the permutation method, provided the ...
openaire +3 more sources
The worn-out nozzles of field sprayers cause agricultural treatment to be uneven and therefore ineffective. Spray nozzles are consumable elements of the field sprayer that are subject to inspection and in the event of their excessive wear should be ...
Jacek Wawrzosek, Stanisław Parafiniuk
doaj +1 more source
Scale Invariant Digital Color Image Encryption Using a 3D Modular Chaotic Map
Cryptography is one of the most important security mechanisms for the transmission of digital media on the Internet. Most proposed cryptographic image methods based on chaotic maps are dependent upon image sizes and most of them worked on square images ...
Ali Momeni Asl +2 more
doaj +1 more source
Dynamic S-Box Design Using a Novel Square Polynomial Transformation and Permutation
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for the plaintext in the encryption phase and transforming the ciphertext on the receiver side into original plaintext in the decryption phase.
Amjad Hussain Zahid +11 more
doaj +1 more source
As we know, improving security is one of the most important motivations for designing new image encryption schemes. However, the security of some new image encryption schemes has not been fully analyzed and evaluated.
Wei Feng, Jing Zhang
doaj +1 more source
Twisted Permutation Codes [PDF]
We introduce twisted permutation codes, which are frequency permutation arrays analogous to repetition permutation codes, namely, codes obtained from the repetition construction applied to a permutation code. In particular, we show that a lower bound for
Gillespie, Neil I. +2 more
core +4 more sources
PerMallows: An R Package for Mallows and Generalized Mallows Models
In this paper we present the R package PerMallows, which is a complete toolbox to work with permutations, distances and some of the most popular probability models for permutations: Mallows and the Generalized Mallows models.
Ekhine Irurozki +2 more
doaj +1 more source
Statistical dependence and shape of Young tableau
Given two continuous random variables, X and Y, we study the relationship between their statistical dependence and the Young tableau of the permutation defined from the graph of a bivariate sample coming from (X, Y). From a sample of size n of (X, Y), we
García Jesús E. +2 more
doaj +1 more source

