• Title/Summary/Keyword: Shannon entropy

Search Result 81, Processing Time 0.028 seconds

Automatic Detection of Congestive Heart Failure and Atrial Fibrillation with Short RR Interval Time Series

  • Yoon, Kwon-Ha;Nam, Yunyoung;Thap, Tharoeun;Jeong, Changwon;Kim, Nam Ho;Ko, Joem Seok;Noh, Se-Eung;Lee, Jinseok
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.1
    • /
    • pp.346-355
    • /
    • 2017
  • Atrial fibrillation (AF) and Congestive heart failure (CHF) are increasingly widespread, costly, deadly diseases and are associated with significant morbidity and mortality. In this study, we analyzed three statistical methods for automatic detection of AF and CHF based on the randomness, variability and complexity of the heart beat interval, which is RRI time series. Specifically, we used short RRI time series with 16 beats and employed the normalized root mean square of successive RR differences (RMSSD), the sample entropy and the Shannon entropy. The detection performance was analyzed using four large well documented databases, namely the MIT-BIH Atrial fibrillation (n=23), the MIT-BIH Normal Sinus Rhythm (n=18), the BIDMC Congestive Heart Failure (n=13) and the Congestive Heart Failure RRI databases (n=25). Using thresholds by Receiver Operating Characteristic (ROC) curves, we found that the normalized RMSSD provided the highest accuracy. The overall sensitivity, specificity and accuracy for AF and CHF were 0.8649, 0.9331 and 0.9104, respectively. Regarding CHF detection, the detection rate of CHF (NYHA III-IV) was 0.9113 while CHF (NYHA I-II) was 0.7312, which shows that the detection rate of CHF with higher severity is higher than that of CHF with lower severity. For the clinical 24 hour data (n=42), the overall sensitivity, specificity and accuracy for AF and CHF were 0.8809, 0.9406 and 0.9108, respectively, using normalized RMSSD.

Reduction of Air-pumping Noise based on a Genetic Algorithm (유전자 알고리즘을 이용한 타이어 공력소음의 저감)

  • Kim, Eui-Youl;Hwang, Sung-Wook;Kim, Byung-Hyun;Lee, Sang-Kwon
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.22 no.1
    • /
    • pp.61-73
    • /
    • 2012
  • The paper presents the novel approach to solve some problems occurred in application of the genetic algorithm to the determination of the optimal tire pattern sequence in order to reduce the tire air-pumping noise which is generated by the repeated compression and expansion of the air cavity between tire pattern and road surface. The genetic algorithm has been used to find the optimal tire pattern sequence having a low level of tire air-pumping noise using the image based air-pumping model. In the genetic algorithm used in the previous researches, there are some problems in the encoding structure and the selection of objective function. The paper proposed single encoding element with five integers, divergent objective function based on evolutionary process and the optimal evolutionary rate based on Shannon entropy to solve the problems. The results of the proposed genetic algorithm with evolutionary process are compared with those of the randomized algorithm without evolutionary process on the two-dimensional normal distribution. It is confirmed that the genetic algorithm is more effective to reduce the peak value of the predicted tire air-pumping noise and the consistency and cohesion of the obtained simulation results are also improved in terms of probability.

Generalized half-logistic Poisson distributions

  • Muhammad, Mustapha
    • Communications for Statistical Applications and Methods
    • /
    • v.24 no.4
    • /
    • pp.353-365
    • /
    • 2017
  • In this article, we proposed a new three-parameter distribution called generalized half-logistic Poisson distribution with a failure rate function that can be increasing, decreasing or upside-down bathtub-shaped depending on its parameters. The new model extends the half-logistic Poisson distribution and has exponentiated half-logistic as its limiting distribution. A comprehensive mathematical and statistical treatment of the new distribution is provided. We provide an explicit expression for the $r^{th}$ moment, moment generating function, Shannon entropy and $R{\acute{e}}nyi$ entropy. The model parameter estimation was conducted via a maximum likelihood method; in addition, the existence and uniqueness of maximum likelihood estimations are analyzed under potential conditions. Finally, an application of the new distribution to a real dataset shows the flexibility and potentiality of the proposed distribution.

Mutual Information Applied to Anomaly Detection

  • Kopylova, Yuliya;Buell, Duncan A.;Huang, Chin-Tser;Janies, Jeff
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.89-97
    • /
    • 2008
  • Anomaly detection systems playa significant role in protection mechanism against attacks launched on a network. The greatest challenge in designing systems detecting anomalous exploits is defining what to measure. Effective yet simple, Shannon entropy metrics have been successfully used to detect specific types of malicious traffic in a number of commercially available IDS's. We believe that Renyi entropy measures can also adequately describe the characteristics of a network as a whole as well as detect abnormal traces in the observed traffic. In addition, Renyi entropy metrics might boost sensitivity of the methods when disambiguating certain anomalous patterns. In this paper we describe our efforts to understand how Renyi mutual information can be applied to anomaly detection as an offline computation. An initial analysis has been performed to determine how well fast spreading worms (Slammer, Code Red, and Welchia) can be detected using our technique. We use both synthetic and real data audits to illustrate the potentials of our method and provide a tentative explanation of the results.

Detecting ShellCode Using Entropy (엔트로피를 이용한 ShellCode 탐지 방법)

  • Kim, Woosuk;Kang, Sunghoon;Kim, Kyungshin;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.3
    • /
    • pp.87-96
    • /
    • 2014
  • Hackers try to achieve their purpose in a variety of ways, such as operating own website and hacking a website. Hackers seize a large amount of private information after they have made a zombie PC by using malicious code to upload the website and it would be used another hacking. Almost detection technique is the use Snort rule. When unknown code and the patterns in IDS/IPS devices are matching on network, it detects unknown code as malicious code. However, if unknown code is not matching, unknown code would be normal and it would attack system. Hackers try to find patterns and make shellcode to avoid patterns. So, new method is needed to detect that kinds of shellcode. In this paper, we proposed a noble method to detect the shellcode by using Shannon's information entropy.

Efficient and Secure Sound-Based Hybrid Authentication Factor with High Usability

  • Mohinder Singh B;Jaisankar N.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2844-2861
    • /
    • 2023
  • Internet is the most prevailing word being used nowadays. Over the years, people are becoming more dependent on the internet as it makes their job easier. This became a part of everyone's life as a means of communication in almost every area like financial transactions, education, and personal-health operations. A lot of data is being converted to digital and made online. Many researchers have proposed different authentication factors - biometric and/or non-biometric authentication factors - as the first line of defense to secure online data. Among all those factors, passwords and passphrases are being used by many users around the world. However, the usability of these factors is low. Also, the passwords are easily susceptible to brute force and dictionary attacks. This paper proposes the generation of a novel passcode from the hybrid authentication factor - sound. The proposed passcode is evaluated for its strength to resist brute-force and dictionary attacks using the Shannon entropy and Passcode (or password) entropy formulae. Also, the passcode is evaluated for its usability. The entropy value of the proposed is 658.2. This is higher than that of other authentication factors. Like, for a 6-digit pin - the entropy value was 13.2, 101.4 for Password with Passphrase combined with Keystroke dynamics and 193 for fingerprint, and 30 for voice biometrics. The proposed novel passcode is far much better than other authentication factors when compared with their corresponding strength and usability values.

Characterization of New Two Parametric Generalized Useful Information Measure

  • Bhat, Ashiq Hussain;Baig, M. A. K.
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.4
    • /
    • pp.64-74
    • /
    • 2016
  • In this paper we define a two parametric new generalized useful average code-word length $L_{\alpha}^{\beta}$(P;U) and its relationship with two parametric new generalized useful information measure $H_{\alpha}^{\beta}$(P;U) has been discussed. The lower and upper bound of $L_{\alpha}^{\beta}$(P;U), in terms of $H_{\alpha}^{\beta}$(P;U) are derived for a discrete noiseless channel. The measures defined in this communication are not only new but some well known measures are the particular cases of our proposed measures that already exist in the literature of useful information theory. The noiseless coding theorems for discrete channel proved in this paper are verified by considering Huffman and Shannon-Fano coding schemes on taking empirical data. Also we study the monotonic behavior of $H_{\alpha}^{\beta}$(P;U) with respect to parameters ${\alpha}$ and ${\beta}$. The important properties of $H_{{\alpha}}^{{\beta}}$(P;U) have also been studied.

A Fast Method for Finding the Optimal Threshold for Image Segmentation (영상분할의 최적 임계치를 구하는 빠른 방법)

  • 신용식;이정훈
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.109-112
    • /
    • 2001
  • 영상분할에 있어서 최적의 임계치를 구하는 것은 영상을 구성하고 있는 픽셀들을 의미있는 집단으로 나누는 거와 같으며 이를 위하여 퍼지화 정도를 측정하여 최소의 퍼지화 정도를 갖는 임계치를 최적의 임계치로 설정한다. 일반적으로 소속도는 하나의 픽셀과 그 픽셀이 속한 영역의 관계로 표현될 수 있는데 소속도 계산을 위한 엔트로피로 샤논(Shannon)함수를 사용한다[1]. Liang-Kai Huang에 의하여 제안된 알고리즘은 그 수렴속도 면에 있어서 많은 문제점을 갖고 있다[2]. 본 논문에서는 이런 수렴속도를 좀더 개선하기 위하여 SPOI(Simplified Fixed Point Iteration)를 제안하고 여러 가지 실험영상을 사용하여 졔안된 논문의 우수성을 보이고자 한다. 실험결과 적절한 임계치를 구하면서도 기존의 논문보다 속도면에서 상당히 우수한 특성을 보이고 있다.

  • PDF

The Probabilities and Entropies of HANGUL Elements including the sopace (공백소를 포함한 한글 자소발생 확률과 엔트로피)

  • 안수길;안지환
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.17 no.2
    • /
    • pp.23-28
    • /
    • 1980
  • The foundation of information theory mainly established by C. E. Shannon , opened the way to profuse studies on the linguistics of various languages. The statistics of Korean letters composed of elements and space are analyzed. The Korean alphabetic elements including the space have their probabilities . And information techniques can be applied to them. This paper extended the previous statistics of Korean letters to include the space. We have also calculated the entropies and redundancy for the case. The result can be used to modify the evaluation of Korean letter information processing devices and used as the basis for letter coding method for eventual future information processors.

  • PDF

Groundwater vulnerability assessment in the southern coastal sedimentary basin of Benin using DRASTIC, modified DRASTIC, Entropy Weight DRASTIC and AVI

  • Agossou, Amos;Yang, Jeong-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.152-152
    • /
    • 2021
  • The importance of groundwater has long been recognized, but the ground water potential to become contaminated as a result of human activities has only been recognized in recently. Before 1980 it was thought that soils served as filters, preventing harmful substances deposited at the surface from migrating into groundwater. Today it is known that soils have a finite capacity to protect groundwater. It can be contaminated from divers sources. Therefore, Assessment of aquifer vulnerability to pollution is essential for the protection and management of groundwater and land use planning. In this study, we used DRASTIC and AVI for groundwater vulnerability to contamination assessment. the different methods were applied to the southern coastal sedimentary basin of Benin and DRASTIC method was modified in two different steps. First, we modified DRASTIC by adding land use parameter to include the actual pollution sources (DRASTICLcLu) and second, classic DRASTIC weights was modified using Shannon's entropy (Entropy weight DRASTIC). The reliability of the applied approaches was verified using nitrate (NO3-) concentration and by comparing the overall vulnerability maps to the previous researches in the study area and in the world. The results from validation showed that the addition of landcover/land use parameter to the classic DRASTIC helps to improve the method for better definition of the vulnerable areas in the basin and also, the weight modification using entropy improved better the method because Entropy weight DRASTICLcLu showed the highest correlation with nitrate concentration in the study basin. In summary the weight modification using entropy approach reduced the uncertainty of the human subjectivity in assigning weights and ratings in the standard DRASTIC.

  • PDF