Entropy最新文献

筛选
英文 中文
Edge-Centric Embeddings of Digraphs: Properties and Stability Under Sparsification.
IF 2.1 3区 物理与天体物理
Entropy Pub Date : 2025-03-14 DOI: 10.3390/e27030304
Ahmed Begga, Francisco Escolano Ruiz, Miguel Ángel Lozano
{"title":"Edge-Centric Embeddings of Digraphs: Properties and Stability Under Sparsification.","authors":"Ahmed Begga, Francisco Escolano Ruiz, Miguel Ángel Lozano","doi":"10.3390/e27030304","DOIUrl":"10.3390/e27030304","url":null,"abstract":"<p><p>In this paper, we define and characterize the embedding of edges and higher-order entities in directed graphs (digraphs) and relate these embeddings to those of nodes. Our edge-centric approach consists of the following: (a) Embedding line digraphs (or their iterated versions); (b) Exploiting the rank properties of these embeddings to show that edge/path similarity can be posed as a linear combination of node similarities; (c) Solving scalability issues through digraph sparsification; (d) Evaluating the performance of these embeddings for classification and clustering. We commence by identifying the motive behind the need for edge-centric approaches. Then we proceed to introduce all the elements of the approach, and finally, we validate it. Our edge-centric embedding entails a top-down mining of links, instead of inferring them from the similarities of node embeddings. This analysis is key to discovering inter-subgraph links that hold the whole graph connected, i.e., central edges. Using directed graphs (digraphs) allows us to cluster edge-like hubs and authorities. In addition, since directed edges inherit their labels from destination (origin) nodes, their embedding provides a proxy representation for node classification and clustering as well. This representation is obtained by embedding the line digraph of the original one. The line digraph provides nice formal properties with respect to the original graph; in particular, it produces more entropic latent spaces. With these properties at hand, we can relate edge embeddings to node embeddings. The main contribution of this paper is to set and prove the <i>linearity theorem</i>, which poses each element of the transition matrix for an edge embedding as a linear combination of the elements of the transition matrix for the node embedding. As a result, the <i>rank preservation property</i> explains why embedding the line digraph and using the labels of the destination nodes provides better classification and clustering performances than embedding the nodes of the original graph. In other words, we do not only facilitate edge mining but enforce node classification and clustering. However, computing the line digraph is challenging, and a sparsification strategy is implemented for the sake of scalability. Our experimental results show that the line digraph representation of the sparsified input graph is quite stable as we increase the sparsification level, and also that it outperforms the original (node-centric) representation. For the sake of simplicity, our theorem relies on node2vec-like (factorization) embeddings. However, we also include several experiments showing how line digraphs may improve the performance of Graph Neural Networks (GNNs), also following the principle of maximum entropy.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"27 3","pages":""},"PeriodicalIF":2.1,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11941605/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143729349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biswas-Chatterjee-Sen Model Defined on Solomon Networks in (1 ≤ D ≤ 6)-Dimensional Lattices.
IF 2.1 3区 物理与天体物理
Entropy Pub Date : 2025-03-14 DOI: 10.3390/e27030300
Gessineide Sousa Oliveira, David Santana Alencar, Tayroni Alencar Alves, José Ferreira da Silva Neto, Gladstone Alencar Alves, Antônio Macedo-Filho, Ronan S Ferreira, Francisco Welington Lima, João Antônio Plascak
{"title":"Biswas-Chatterjee-Sen Model Defined on Solomon Networks in (1 ≤ <i>D</i> ≤ 6)-Dimensional Lattices.","authors":"Gessineide Sousa Oliveira, David Santana Alencar, Tayroni Alencar Alves, José Ferreira da Silva Neto, Gladstone Alencar Alves, Antônio Macedo-Filho, Ronan S Ferreira, Francisco Welington Lima, João Antônio Plascak","doi":"10.3390/e27030300","DOIUrl":"10.3390/e27030300","url":null,"abstract":"<p><p>The discrete version of the Biswas-Chatterjee-Sen model, defined on <i>D</i>-dimensional hypercubic Solomon networks, with 1≤D≤6, has been studied by means of extensive Monte Carlo simulations. Thermodynamic-like variables have been computed as a function of the external noise probability. Finite-size scaling theory, applied to different network sizes, has been utilized in order to characterize the phase transition of the system in the thermodynamic limit. The results show that the model presents a phase transition of the second order for all considered dimensions. Despite the lower critical dimension being zero, this dynamical system seems not to have any upper critical dimension since the critical exponents change with <i>D</i> and go away from the expected mean-field values. Although larger networks could not be simulated because the number of sites drastically increases with the dimension <i>D</i>, the scaling regime has been achieved when computing the critical exponent ratios and the corresponding critical noise probability.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"27 3","pages":""},"PeriodicalIF":2.1,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11940923/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143729196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Consistent Approach to Modeling Quantum Observers.
IF 2.1 3区 物理与天体物理
Entropy Pub Date : 2025-03-14 DOI: 10.3390/e27030302
David W Ring
{"title":"A Consistent Approach to Modeling Quantum Observers.","authors":"David W Ring","doi":"10.3390/e27030302","DOIUrl":"10.3390/e27030302","url":null,"abstract":"<p><p>A number of no-go theorems have shown that Wigner's Friend scenarios combined with various metaphysical assumptions lead to contradictions in any version of quantum theory. We present an alternative constructive approach that only assumes that agents make properly qualified true statements. Quantum observers are modeled rigorously, although simplistically, using quantum circuits. Terminology is suggested to help avoid contradictions. Our methodology is applied to the Frauchiger-Renner paradox and results in statements by all agents that are both true and consistent. Quantum theory evades the no-go theorems because they make an incorrect implicit assumption about how quantum agents behave.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"27 3","pages":""},"PeriodicalIF":2.1,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11941582/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143729475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Power Procurement for Green Cellular Wireless Networks Under Uncertainty and Chance Constraints.
IF 2.1 3区 物理与天体物理
Entropy Pub Date : 2025-03-14 DOI: 10.3390/e27030308
Nadhir Ben Rached, Shyam Mohan Subbiah Pillai, Raúl Tempone
{"title":"Optimal Power Procurement for Green Cellular Wireless Networks Under Uncertainty and Chance Constraints.","authors":"Nadhir Ben Rached, Shyam Mohan Subbiah Pillai, Raúl Tempone","doi":"10.3390/e27030308","DOIUrl":"10.3390/e27030308","url":null,"abstract":"<p><p>Given the increasing global emphasis on sustainable energy usage and the rising energy demands of cellular wireless networks, this work seeks an optimal short-term, continuous-time power-procurement schedule to minimize operating expenditure and the carbon footprint of cellular wireless networks equipped with energy-storage capacity, and hybrid energy systems comprising uncertain renewable energy sources. Despite the stochastic nature of wireless fading channels, the network operator must ensure a certain quality-of-service (QoS) constraint with high probability. This probabilistic constraint prevents using the dynamic programming principle to solve the stochastic optimal control problem. This work introduces a novel time-continuous Lagrangian relaxation approach tailored for real-time, near-optimal energy procurement in cellular networks, overcoming tractability problems associated with the probabilistic QoS constraint. The numerical solution procedure includes an efficient upwind finite-difference solver for the Hamilton-Jacobi-Bellman equation corresponding to the relaxed problem, and an effective combination of the limited memory bundle method (LMBM) for handling nonsmooth optimization and the stochastic subgradient method (SSM) to navigate the stochasticity of the dual problem. Numerical results, based on the German power system and daily cellular traffic data, demonstrate the computational efficiency of the proposed numerical approach, providing a near-optimal policy in a practical timeframe.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"27 3","pages":""},"PeriodicalIF":2.1,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11941223/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143729331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restart Mechanisms for the Successive-Cancellation List-Flip Decoding of Polar Codes.
IF 2.1 3区 物理与天体物理
Entropy Pub Date : 2025-03-14 DOI: 10.3390/e27030309
Charles Pillet, Ilshat Sagitov, Alexios Balatsoukas-Stimming, Pascal Giard
{"title":"Restart Mechanisms for the Successive-Cancellation List-Flip Decoding of Polar Codes.","authors":"Charles Pillet, Ilshat Sagitov, Alexios Balatsoukas-Stimming, Pascal Giard","doi":"10.3390/e27030309","DOIUrl":"10.3390/e27030309","url":null,"abstract":"<p><p>Polar codes concatenated with a cyclic redundancy check (CRC) code have been selected in the 5G standard with the successive-cancellation list (SCL) of list size L = 8 as the baseline algorithm. Despite providing great error-correction performance, a large list size increases the hardware complexity of the SCL decoder. Alternatively, flip decoding algorithms were proposed to improve the error-correction performance with a low-complexity hardware implementation. The combination of list and flip algorithms, the successive-cancellation list flip (SCLF) and dynamic SCLF (DSCLF) algorithms, provides error-correction performance close to SCL-32 with a list size L = 2 and Tmax = 300 maximum additional trials. However, these decoders have a variable execution time, a characteristic that poses a challenge to some practical applications. In this work, we propose a restart mechanism for list-flip algorithms that allows us to skip parts of the decoding computations without affecting the error-correction performance. We show that the restart location cannot realistically be allowed to occur at any location in a codeword as it would lead to an unreasonable memory overhead under DSCLF. Hence, we propose a mechanism where the possible restart locations are limited to a set and propose various construction methods for that set. The construction methods are compared, and the tradeoffs are discussed. For a polar code of length N = 1024 and rate ¼, under DSCLF decoding with a list size L = 2 and a maximum number of trials Tmax = 300, our proposed approach is shown to reduce the average execution time by 41.7% with four restart locations at the cost of approximately 1.5% in memory overhead.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"27 3","pages":""},"PeriodicalIF":2.1,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11941189/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143729355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Monitoring and Fault Diagnosis for High-Dimensional Stream with Application in Electron Probe X-Ray Microanalysis.
IF 2.1 3区 物理与天体物理
Entropy Pub Date : 2025-03-13 DOI: 10.3390/e27030297
Tao Wang, Yunfei Guo, Fubo Zhu, Zhonghua Li
{"title":"Online Monitoring and Fault Diagnosis for High-Dimensional Stream with Application in Electron Probe X-Ray Microanalysis.","authors":"Tao Wang, Yunfei Guo, Fubo Zhu, Zhonghua Li","doi":"10.3390/e27030297","DOIUrl":"10.3390/e27030297","url":null,"abstract":"<p><p>This study introduces an innovative two-stage framework for monitoring and diagnosing high-dimensional data streams with sparse changes. The first stage utilizes an exponentially weighted moving average (EWMA) statistic for online monitoring, identifying change points through extreme value theory and multiple hypothesis testing. The second stage involves a fault diagnosis mechanism that accurately pinpoints abnormal components upon detecting anomalies. Through extensive numerical simulations and electron probe X-ray microanalysis applications, the method demonstrates exceptional performance. It rapidly detects anomalies, often within one or two sampling intervals post-change, achieves near 100% detection power, and maintains type-I error rates around the nominal 5%. The fault diagnosis mechanism shows a 99.1% accuracy in identifying components in 200-dimensional anomaly streams, surpassing principal component analysis (PCA)-based methods by 28.0% in precision and controlling the false discovery rate within 3%. Case analyses confirm the method's effectiveness in monitoring and identifying abnormal data, aligning with previous studies. These findings represent significant progress in managing high-dimensional sparse-change data streams over existing methods.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"27 3","pages":""},"PeriodicalIF":2.1,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11941262/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143729324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HA: An Influential Node Identification Algorithm Based on Hub-Triggered Neighborhood Decomposition and Asymmetric Order-by-Order Recurrence Model.
IF 2.1 3区 物理与天体物理
Entropy Pub Date : 2025-03-13 DOI: 10.3390/e27030298
Min Zhao, Junhan Ye, Jiayun Li, Yuzhuo Dai, Tianze Zhao, Gengchen Zhang
{"title":"HA: An Influential Node Identification Algorithm Based on Hub-Triggered Neighborhood Decomposition and Asymmetric Order-by-Order Recurrence Model.","authors":"Min Zhao, Junhan Ye, Jiayun Li, Yuzhuo Dai, Tianze Zhao, Gengchen Zhang","doi":"10.3390/e27030298","DOIUrl":"10.3390/e27030298","url":null,"abstract":"<p><p>In recent years, the rise of power network security incidents caused by malicious attacks has drawn considerable attention to identifying influential nodes in power networks. Power networks are a special class of complex networks characterized by a high relative clustering coefficient, which reflects a more intricate connection between nodes. This paper proposes a novel node influence evaluation algorithm based on hub-triggered neighborhood decomposition and asymmetric order-by-order recurrence model. First, the concepts of network directionalization strategy and hub-triggered neighborhood decomposition are introduced to distinguish the functional differences among nodes in the virus-spreading process. Second, this paper proposes the concepts of infected and infecting potential, then constructs a calculation model with asymmetric characteristics based on the order-by-order recurrence method to fully use the information in the connection structure of the adjacent neighborhood. Finally, the influence of the hub node is evaluated by integrating the infected potential and infecting potential of neighbors of multiple orders. We compare our method with the traditional and state-of-the-art algorithms on six power networks regarding Susceptible-Infected-Recovered (SIR) correlation coefficients, imprecision functions, and algorithmic resolution. The experimental results show that the algorithm proposed in this paper is superior in the above aspects.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"27 3","pages":""},"PeriodicalIF":2.1,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11941631/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143729391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperchaotic System-Based PRNG and S-Box Design for a Novel Secure Image Encryption.
IF 2.1 3区 物理与天体物理
Entropy Pub Date : 2025-03-13 DOI: 10.3390/e27030299
Erman Özpolat, Vedat Çelik, Arif Gülten
{"title":"Hyperchaotic System-Based PRNG and S-Box Design for a Novel Secure Image Encryption.","authors":"Erman Özpolat, Vedat Çelik, Arif Gülten","doi":"10.3390/e27030299","DOIUrl":"10.3390/e27030299","url":null,"abstract":"<p><p>A hyperchaotic system was analyzed in this study, and its hyperchaotic behavior was confirmed through dynamic analysis. The system was utilized to develop a pseudo-random number generator (PRNG), whose statistical reliability was validated through NIST SP800-22 tests, demonstrating its suitability for cryptographic applications. Additionally, a 16 × 16 S-box was constructed based on the hyperchaotic system, ensuring high nonlinearity and strong cryptographic performance. A comparative analysis revealed that the proposed S-box structure outperforms existing designs in terms of security and efficiency. A new image encryption algorithm was designed using the PRNG and S-box, and its performance was evaluated on 512 × 512 grayscale images, including the commonly used baboon and pepper images. The decryption process successfully restored the original images, confirming the encryption scheme's reliability. Security evaluations, including histogram analysis, entropy measurement, correlation analysis, and resistance to differential and noise attacks, were conducted. The findings showed that the suggested encryption algorithm outperforms current techniques in terms of security and efficiency. This study contributes to the advancement of robust PRNG generation, secure S-box design, and efficient image encryption algorithms using hyperchaotic systems, offering a promising approach for secure communication and data protection.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"27 3","pages":""},"PeriodicalIF":2.1,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11941561/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143729413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Diffusion of Elongated Particles Through a Narrowing Channel.
IF 2.1 3区 物理与天体物理
Entropy Pub Date : 2025-03-12 DOI: 10.3390/e27030293
Anna Strzelewicz, Michał Cieśla, Bartłomiej Dybiec, Monika Krasowska
{"title":"Modeling Diffusion of Elongated Particles Through a Narrowing Channel.","authors":"Anna Strzelewicz, Michał Cieśla, Bartłomiej Dybiec, Monika Krasowska","doi":"10.3390/e27030293","DOIUrl":"10.3390/e27030293","url":null,"abstract":"<p><p>Simulations of the Brownian dynamics of diffusing particles in complex environments provide important information about the characteristics of the medium and the properties of biological processes. Notable examples include the diffusion of ions and macromolecular solutes through channels of varying cross-section, such as pores in biological membranes, living tissues, zeolites, carbon nanotubes, and synthetic porous materials. In these systems, the observed diffusion can exhibit anomalous behavior characterized by a nonlinear increase in the mean squared displacement. In this article, we present a toy model of the diffusion of rod-shaped particles through a narrowing, conical pore with a trapezoidal longitudinal cross-section. Particles of different sizes undergo a random walk due to interactions with the environment (modeled as noise). We study how the diffusion properties change with particle size as a function of pore width. The numerical analysis of diffusion-driven transport through narrowing conical channels reveals its effective subdiffusive, i.e., anomalous, character.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"27 3","pages":""},"PeriodicalIF":2.1,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11941187/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143729481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ESfix: An Embedded Program Repair Tool for Effective Removal of Concurrency Defects.
IF 2.1 3区 物理与天体物理
Entropy Pub Date : 2025-03-12 DOI: 10.3390/e27030294
Jingwen Zhao, Yanxia Wu, Yan Fu, Shuyong Liu
{"title":"ESfix: An Embedded Program Repair Tool for Effective Removal of Concurrency Defects.","authors":"Jingwen Zhao, Yanxia Wu, Yan Fu, Shuyong Liu","doi":"10.3390/e27030294","DOIUrl":"10.3390/e27030294","url":null,"abstract":"<p><p>Embedded programs are not only inseparable from our daily lives but are also widely used in aerospace, medical devices, and other fields that require very high security and stability. The uncertainty and randomness of the large amount of data generated by these systems during operation can be quantified by entropy. Traditional repair methods for concurrency defects may introduce new issues such as deadlocks, original semantic destruction, and high performance overhead. To overcome the limitations of the existing methods and help developers reduce the time and effort spent on fixing software defects, this paper proposes ESfix, a defect fixing technique applied to embedded software. ESfix first utilizes the bug information reported by the defect detection tool to locate the repair region and extracts the node information corresponding to the defective code. Then, ESfix optimizes the interrupt disable/enable strategies and lock strategies to repair data race and reduce bugs in information transmission, thereby reducing system entropy and improving data certainty and reliability. Finally, ESfix repairs atomicity violation defects using the reordering repair strategy, reducing information entropy by adjusting the order of information to ensure its integrity and consistency. ESfix conducts semantic analysis by analyzing the dependency graph in the control flow graph (CFG) to ensure that no new defects are introduced during the repair process, and to maintain the efficiency and accuracy of information transmission between different parts of the code. We evaluate the effectiveness of repair strategies through information entropy, and the experimental results show that ESfix not only improves performance but also reduces potential risks and losses.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"27 3","pages":""},"PeriodicalIF":2.1,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11941405/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143729363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信