User profiles for Einollah Pasha
Einollah PashaProfessor of Kharazmi University Verified email at srtc.ac.ir Cited by 460 |
Some properties of Rényi entropy and Rényi entropy rate
In this paper, we define the conditional Rényi entropy and show that the so-called chain rule
holds for the Rényi entropy. Then, we introduce a relation for the rate of Rényi entropy and …
holds for the Rényi entropy. Then, we introduce a relation for the rate of Rényi entropy and …
[HTML][HTML] The possibilistic moments of fuzzy numbers and their applications
A Saeidifar, E Pasha - Journal of computational and applied mathematics, 2009 - Elsevier
This paper, introduces the nearest weighted interval and point approximations of a fuzzy
number, and then suggests weighted possibilistic moments about these points of fuzzy numbers…
number, and then suggests weighted possibilistic moments about these points of fuzzy numbers…
Rényi entropy rate for Gaussian processes
L Golshani, E Pasha - Information Sciences, 2010 - Elsevier
In this paper, we introduce the definition of the conditional Rényi entropy for continuous
random variables and show that the so-called chain rule holds. Then, we use this rule to obtain …
random variables and show that the so-called chain rule holds. Then, we use this rule to obtain …
[PDF][PDF] Recurrence in breast cancer
Objective: To determine the value of known prognostic factors for metastasis in breast
cancer by accounting for patient-specific effect of patients who received surgical treatment …
cancer by accounting for patient-specific effect of patients who received surgical treatment …
[PDF][PDF] Fuzzy entropy as cost function in image processing
In this paper a new cost function is introduced by using the fuzzy entropy to choose a
threshold value in image denoising problem. The results are explained with pilot this cost …
threshold value in image denoising problem. The results are explained with pilot this cost …
Construction of New Families of MDS Diffusion Layers
Diffusion layers are crucial components of symmetric ciphers&# 8206;. &# 8206; These
components&# 8206;, &# 8206; along with suitable Sboxes&# 8206;, &# 8206; can make …
components&# 8206;, &# 8206; along with suitable Sboxes&# 8206;, &# 8206; can make …
Cryptographic Properties of Addition Modulo
The operation of modular addition modulo a power of two is one of the most applied operations
in symmetric cryptography. For example, modular addition is used in RC6, MARS and …
in symmetric cryptography. For example, modular addition is used in RC6, MARS and …
A warning threshold for monitoring tuberculosis surveillance data: an alternative to hidden Markov model
Objectives Although hidden Markov model ( HMM ) is known as a powerful tool for the detection
of epidemics based on the historical data, the frequent use of such a model poses some …
of epidemics based on the historical data, the frequent use of such a model poses some …
Goodness of fit test and test of Independence by entropy
To test whether a set of data has a specific distribution or not, we can use the GOODNESS
OF FIT TEST. This test can be done by one of Pearson X2-statistic or the likelihood ratio …
OF FIT TEST. This test can be done by one of Pearson X2-statistic or the likelihood ratio …
New concepts in design of lightweight MDS diffusion layers
Diffusion layers are an important part of most symmetric ciphers and MDS matrices can be
used to construct perfect diffusion layers. However, there are few techniques for constructing …
used to construct perfect diffusion layers. However, there are few techniques for constructing …