Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,389,628 papers from all fields of science
Search
Sign In
Create Free Account
Entropy (computing)
Known as:
Entropy (GNU/Linux)
, Entropy (disambiguation)
, Entropy (Unix)
Expand
In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
25 relations
Brute-force attack
Buffer overflow protection
Chipset
CryptGenRandom
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Segmentation of tomato leaf images based on adaptive clustering number of K-means algorithm
Kai Tian
,
Jiuhao Li
,
Jiefeng Zeng
,
Asenso Evans
,
Lina Zhang
Computers and Electronics in Agriculture
2019
Corpus ID: 202101023
2019
2019
Complexity of EEG Signals in Schizophrenia Syndromes
I. E. Kutepov
,
V. Krysko
,
+9 authors
N. Erofeev
GraphiCon' Proceedings. Volume 2
2019
Corpus ID: 208170508
In the present study, 45 patients with schizophrenia syndromes and 39 healthy subjects are studied with electroencephalogram (EEG…
Expand
Highly Cited
2018
Highly Cited
2018
Effects of repetitive SSVEPs on EEG complexity using multiscale inherent fuzzy entropy
Zehong Cao
,
Weiping Ding
,
Yu-kai Wang
,
F. Hussain
,
Adel Al-Jumaily
,
Chin-Teng Lin
Neurocomputing
2018
Corpus ID: 70025755
2015
2015
Using Entropy as a Parameter to Schedule Real-Time Tasks
C. Rincón C.
,
A. Cheng
IEEE Real-Time Systems Symposium
2015
Corpus ID: 30599422
The purpose of this paper is to present the mathematical background for using entropy in real-time scheduling as well as the…
Expand
2014
2014
Impervious surfaces estimation using dual-polarimetric SAR and optical data
Hongsheng Zhang
,
Hui Lin
,
Yu Li
,
Yuanzhi Zhang
IEEE Geoscience and Remote Sensing Symposium
2014
Corpus ID: 11528541
Synthetic Aperture Radar (SAR) data has been reported to be able to provide complementary information towards optical remote…
Expand
2013
2013
A New Fast and Simple Image Encryption Algorithm Using Scan Patterns and XOR
Reza Moradi Rad
,
Abdolrahman Attar
,
Reza Ebrahimi Atani
2013
Corpus ID: 32458687
In this paper, a new simple and fast algorithm for image encryption is proposed. It exploits the scan patterns and function XOR…
Expand
Highly Cited
2010
Highly Cited
2010
Generalized Beta-Generated Distributions
C. Alexander
,
G. Cordeiro
,
E. Ortega
,
J. Sarabia
Computational Statistics & Data Analysis
2010
Corpus ID: 7719769
This article introduces generalized beta-generated (GBG) distributions. Sub-models include all classical beta-generated…
Expand
2006
2006
An Entropy-based Clustering in Mobile Ad hoc Networks
K. Robinson
,
D. Turgut
,
M. Chatterjee
IEEE International Conference on Networking…
2006
Corpus ID: 16551958
The distributiveness of mobile ad hoc networks makes resource allocation strategies very challenging since there is no central…
Expand
2004
2004
Study on Method of Small Batch Order Evaluation Based on the Entropy
Liu Gui
2004
Corpus ID: 124899224
According to the characteristic of model of the multi-variety and small batch, an evaluating method based on the entropy concept…
Expand
Highly Cited
2003
Highly Cited
2003
A thermodynamic model for electrical current induced damage
C. Basaran
,
Minghui Lin
,
Hua Ye
Proceedings. 54th Electronic Components and…
2003
Corpus ID: 10931569
Electromigration induced damage, which is in principal an irreversible mass diffusion under high current density, has been a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE