scholarly journals Heuristic Relative Entropy Principles with Complex Measures: Large-Degree Asymptotics of a Family of Multi-variate Normal Random Polynomials

2017 ◽  
Vol 169 (1) ◽  
pp. 63-106
Author(s):  
Michael Karl-Heinz Kiessling
2019 ◽  
Vol 223 (2) ◽  
pp. 195-249
Author(s):  
Emmanuel Breuillard ◽  
Péter P. Varjú

Author(s):  
D.P. Malta ◽  
S.A. Willard ◽  
R.A. Rudder ◽  
G.C. Hudson ◽  
J.B. Posthill ◽  
...  

Semiconducting diamond films have the potential for use as a material in which to build active electronic devices capable of operating at high temperatures or in high radiation environments. A major goal of current device-related diamond research is to achieve a high quality epitaxial film on an inexpensive, readily available, non-native substrate. One step in the process of achieving this goal is understanding the nucleation and growth processes of diamond films on diamond substrates. Electron microscopy has already proven invaluable for assessing polycrystalline diamond films grown on nonnative surfaces.The quality of the grown diamond film depends on several factors, one of which is the quality of the diamond substrate. Substrates commercially available today have often been found to have scratched surfaces resulting from the polishing process (Fig. 1a). Electron beam-induced current (EBIC) imaging shows that electrically active sub-surface defects can be present to a large degree (Fig. 1c). Growth of homoepitaxial diamond films by rf plasma-enhanced chemical vapor deposition (PECVD) has been found to planarize the scratched substrate surface (Fig. 1b).


Author(s):  
Satvir Singh

Steganography is the special art of hidding important and confidential information in appropriate multimedia carrier. It also restrict the detection of  hidden messages. In this paper we proposes steganographic method based on dct and entropy thresholding technique. The steganographic algorithm uses random function in order to select block of the image where the elements of the binary sequence of a secret message will be inserted. Insertion takes place at the lower frequency  AC coefficients of the  block. Before we insert the secret  message. Image under goes dc transformations after insertion of the secret message we apply inverse dc transformations. Secret message will only be inserted into a particular block if  entropy value of that particular block is greater then threshold value of the entropy and if block is selected by the random function. In  Experimental work we calculated the peak signal to noise ratio(PSNR), Absolute difference , Relative entropy. Proposed algorithm give high value of PSNR  and low value of Absolute difference which clearly indicate level of distortion in image due to insertion of secret message is reduced. Also value of  relative entropy is close to zero which clearly indicate proposed algorithm is sufficiently secure. 


2019 ◽  
Author(s):  
Sushrut Thorat

A mediolateral gradation in neural responses for images spanning animals to artificial objects is observed in the ventral temporal cortex (VTC). Which information streams drive this organisation is an ongoing debate. Recently, in Proklova et al. (2016), the visual shape and category (“animacy”) dimensions in a set of stimuli were dissociated using a behavioural measure of visual feature information. fMRI responses revealed a neural cluster (extra-visual animacy cluster - xVAC) which encoded category information unexplained by visual feature information, suggesting extra-visual contributions to the organisation in the ventral visual stream. We reassess these findings using Convolutional Neural Networks (CNNs) as models for the ventral visual stream. The visual features developed in the CNN layers can categorise the shape-matched stimuli from Proklova et al. (2016) in contrast to the behavioural measures used in the study. The category organisations in xVAC and VTC are explained to a large degree by the CNN visual feature differences, casting doubt over the suggestion that visual feature differences cannot account for the animacy organisation. To inform the debate further, we designed a set of stimuli with animal images to dissociate the animacy organisation driven by the CNN visual features from the degree of familiarity and agency (thoughtfulness and feelings). Preliminary results from a new fMRI experiment designed to understand the contribution of these non-visual features are presented.


1981 ◽  
Vol 46 (2) ◽  
pp. 452-456
Author(s):  
Milan Šolc

The successive time derivatives of relative entropy and entropy production for a system with a reversible first-order reaction alternate in sign. It is proved that the relative entropy for reactions with an equilibrium constant smaller than or equal to one is completely monotonic in the whole definition interval, and for reactions with an equilibrium constant larger than one this function is completely monotonic at the beginning of the reaction and near to equilibrium.


Author(s):  
Mark Vellend

This chapter highlights the scale dependence of biodiversity change over time and its consequences for arguments about the instrumental value of biodiversity. While biodiversity is in decline on a global scale, the temporal trends on regional and local scales include cases of biodiversity increase, no change, and decline. Environmental change, anthropogenic or otherwise, causes both local extirpation and colonization of species, and thus turnover in species composition, but not necessarily declines in biodiversity. In some situations, such as plants at the regional scale, human-mediated colonizations have greatly outnumbered extinctions, thus causing a marked increase in species richness. Since the potential influence of biodiversity on ecosystem function and services is mediated to a large degree by local or neighborhood species interactions, these results challenge the generality of the argument that biodiversity loss is putting at risk the ecosystem service benefits people receive from nature.


Author(s):  
J.S. Grewal

On Lord Wavell’s initiative, the Simla Conference was held to discuss the proposal of a new executive council and a new constitution for India after the war. Master Tara Singh represented the Sikh community at the Simla Conference. The Conference failed due to Jinnah’s insistence that the Muslim League alone had the right to nominate Muslim representatives on the Executive Council. The failure of the Conference made the general elections of 1945–6 all the more important. The general elections resulted in a large degree of polarization between the Hindus, Muslims, and Sikhs. The Muslim League got Muslim mandate in favour of Pakistan. The Congress got a mandate of Hindus and a considerable proportion of the Sikhs for independence without partition. The Akalis got support of the large majority of the Sikhs for an independent political entity of the Sikhs. This polarization was of crucial importance for the future.


2021 ◽  
Vol 40 (1) ◽  
pp. 235-250
Author(s):  
Liuxin Chen ◽  
Nanfang Luo ◽  
Xiaoling Gou

In the real multi-criteria group decision making (MCGDM) problems, there will be an interactive relationship among different decision makers (DMs). To identify the overall influence, we define the Shapley value as the DM’s weight. Entropy is a measure which makes it better than similarity measures to recognize a group decision making problem. Since we propose a relative entropy to measure the difference between two systems, which improves the accuracy of the distance measure.In this paper, a MCGDM approach named as TODIM is presented under q-rung orthopair fuzzy information.The proposed TODIM approach is developed for correlative MCGDM problems, in which the weights of the DMs are calculated in terms of Shapley values and the dominance matrices are evaluated based on relative entropy measure with q-rung orthopair fuzzy information.Furthermore, the efficacy of the proposed Gq-ROFWA operator and the novel TODIM is demonstrated through a selection problem of modern enterprises risk investment. A comparative analysis with existing methods is presented to validate the efficiency of the approach.


Cryptography ◽  
2020 ◽  
Vol 4 (3) ◽  
pp. 20 ◽  
Author(s):  
Donghoe Heo ◽  
Suhri Kim ◽  
Kisoon Yoon ◽  
Young-Ho Park ◽  
Seokhie Hong

The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when recovering the coefficient of the image curve for large degree isogenies. Because the Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) requires odd-degree isogenies up to at least 587, this inefficiency is the main bottleneck of using a Montgomery curve for CSIDH. In this paper, we present a new optimization method for faster CSIDH protocols entirely on Montgomery curves. To this end, we present a new parameter for CSIDH, in which the three rational two-torsion points exist. By using the proposed parameters, the CSIDH moves around the surface. The curve coefficient of the image curve can be recovered by a two-torsion point. We also proved that the CSIDH while using the proposed parameter guarantees a free and transitive group action. Additionally, we present the implementation result using our method. We demonstrated that our method is 6.4% faster than the original CSIDH. Our works show that quite higher performance of CSIDH is achieved while only using Montgomery curves.


Sign in / Sign up

Export Citation Format

Share Document