User profiles for Einollah Pasha

Einollah Pasha

Professor of Kharazmi University
Verified email at srtc.ac.ir
Cited by 460

Some properties of Rényi entropy and Rényi entropy rate

L Golshani, E Pasha, G Yari - Information Sciences, 2009 - Elsevier
In this paper, we define the conditional Rényi entropy and show that the so-called chain rule
holds for the Rényi entropy. Then, we introduce a relation for the rate of Rényi entropy and …

[HTML][HTML] The possibilistic moments of fuzzy numbers and their applications

A Saeidifar, E Pasha - Journal of computational and applied mathematics, 2009 - Elsevier
This paper, introduces the nearest weighted interval and point approximations of a fuzzy
number, and then suggests weighted possibilistic moments about these points of fuzzy numbers…

Rényi entropy rate for Gaussian processes

L Golshani, E Pasha - Information Sciences, 2010 - Elsevier
In this paper, we introduce the definition of the conditional Rényi entropy for continuous
random variables and show that the so-called chain rule holds. Then, we use this rule to obtain …

[PDF][PDF] Recurrence in breast cancer

MR Gohari, M Mahmoudi, K Mohammed, E Pasha… - Saudi Med …, 2006 - researchgate.net
Objective: To determine the value of known prognostic factors for metastasis in breast
cancer by accounting for patient-specific effect of patients who received surgical treatment …

[PDF][PDF] Fuzzy entropy as cost function in image processing

E Pasha, R Farnoosh, A Fatemi - Proc. of the 2nd IMT-GT regional …, 2006 - academia.edu
In this paper a new cost function is introduced by using the fuzzy entropy to choose a
threshold value in image denoising problem. The results are explained with pilot this cost …

Construction of New Families of‎ MDS‎ Diffusion Layers

…, MRM Shamsabad, H Maimani, E Pasha - Cryptology ePrint …, 2014 - eprint.iacr.org
Diffusion layers are crucial components of symmetric ciphers&# 8206;. &# 8206; These
components&# 8206;, &# 8206; along with suitable Sboxes&# 8206;, &# 8206; can make …

Cryptographic Properties of Addition Modulo

…, MRM Shamsabad, H Maimani, E Pasha - Cryptology ePrint …, 2016 - eprint.iacr.org
The operation of modular addition modulo a power of two is one of the most applied operations
in symmetric cryptography. For example, modular addition is used in RC6, MARS and …

A warning threshold for monitoring tuberculosis surveillance data: an alternative to hidden Markov model

A Rafei, E Pasha… - Tropical Medicine & …, 2015 - Wiley Online Library
Objectives Although hidden Markov model ( HMM ) is known as a powerful tool for the detection
of epidemics based on the historical data, the frequent use of such a model poses some …

Goodness of fit test and test of Independence by entropy

To test whether a set of data has a specific distribution or not, we can use the GOODNESS
OF FIT TEST. This test can be done by one of Pearson X2-statistic or the likelihood ratio …

New concepts in design of lightweight MDS diffusion layers

…, MRM Shamsabad, H Maimani, E Pasha - … ISC Conference on …, 2014 - ieeexplore.ieee.org
Diffusion layers are an important part of most symmetric ciphers and MDS matrices can be
used to construct perfect diffusion layers. However, there are few techniques for constructing …