43 articles in this issue
Vikalp Mishra, Walter L. Ellenburg, Osama Z. Al-Hamdan, Josh Bruce and James F. Cruise
Vertical soil moisture profiles based on the principle of maximum entropy (POME) were validated using field and model data and applied to guide an irrigation cycle over a maize field in north central Alabama (USA). The results demonstrate that a simple tw... see more
Abdon Atangana and Badr Saad T. Alkahtani
Using some investigations based on information theory, the model proposed by Keller and Segel was extended to the concept of fractional derivative using the derivative with fractional order without singular kernel recently proposed by Caputo and Fabrizio.... see more
Gemma Lancaster, Philip T. Clemson, Yevhen F. Suprunenko, Tomislav Stankovski and Aneta Stefanovska
The recent introduction of chronotaxic systems provides the means to describe nonautonomous systems with stable yet time-varying frequencies which are resistant to continuous external perturbations. This approach facilitates realistic characterization of ... see more
Alexander Y. Klimenko
This work considers reasons for and implications of discarding the assumption of transitivity—the fundamental postulate in the utility theory of von Neumann and Morgenstern, the adiabatic accessibility principle of Caratheodory and most other theories rel... see more
Bertrand Lods and Giovanni Pistone
Information Geometry generalizes to infinite dimension by modeling the tangent space of the relevant manifold of probability densities with exponential Orlicz spaces. We review here several properties of the exponential manifold on a suitable set EEE of m... see more
Lan Zhou and Yu-Bo Sheng
Concurrence provides us an effective approach to quantify entanglement, which is quite important in quantum information processing applications. In the paper, we mainly review some direct concurrence measurement protocols of the two-qubit optical or atomi... see more
Jerry Davis and Leonhard Blesius
The clear need for accurate landslide susceptibility mapping has led to multiple approaches. Physical models are easily interpreted and have high predictive capabilities but rely on spatially explicit and accurate parameterization, which is commonly not p... see more
Haci Mehmet Baskonus and Hasan Bulut
In this study, we investigate some new analytical solutions to the (1 + 1)-dimensional nonlinear Dispersive Modified Benjamin–Bona–Mahony equation and the (2 + 1)-dimensional cubic Klein–Gordon equation by using the generalized Kudryashov method. After we... see more
Luigi Malagò and Giovanni Pistone
In this paper, we study Amari’s natural gradient flows of real functions defined on the densities belonging to an exponential family on a finite sample space. Our main example is the minimization of the expected value of a real function defined on the sam... see more
Haorui Liu and Juan Yang
Specifically setting a time delay fractional financial system as the study object, this paper proposes a single controller method to eliminate the impact of model uncertainty and external disturbances on the system. The proposed method is based on the sta... see more
Jie Zhu, Jean-Jacques Bellanger, Huazhong Shu and Régine Le Bouquin Jeannès
This paper deals with the estimation of transfer entropy based on the k-nearest neighbors (k-NN) method. To this end, we first investigate the estimation of Shannon entropy involving a rectangular neighboring region, as suggested in already existing liter... see more
Orietta Nicolis and Jorge Mateu
We propose a wavelet-based approach to measure the Shannon entropy in the context of spatial point patterns. The method uses the fully anisotropic Morlet wavelet to estimate the energy distribution at different directions and scales. The spatial heterogen... see more
Limin Wang, Haoyu Zhao, Minghui Sun and Yue Ning
The inference of a general Bayesian network has been shown to be an NP-hard problem, even for approximate solutions. Although k-dependence Bayesian (KDB) classifier can construct at arbitrary points (values of k) along the attribute dependence spectrum, i... see more
Krzysztof J?zwikowska, Alina J?zwikowska and Michal Nietopiel
The main goal of this work is to determine a statistical non-equilibrium distribution function for the electron and holes in semiconductor heterostructures in steady-state conditions. Based on the postulates of local equilibrium, as well as on the integra... see more
Samir D. Mathur
Suppose we allow a system to fall freely from infinity to a point near (but not beyond) the horizon of a black hole. We note that in a sense the information in the system is already lost to an observer at infinity. Once the system is too close to the hori... see more
Marcos Curty, Marc Jofre, Valerio Pruneri and Morgan W. Mitchell
Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, ... see more
Barry Smith, Steven Wang, Augustine Wong and Xiaofeng Zhou
Stress-strength reliability problems arise frequently in applied statistics and related fields. Often they involve two independent and possibly small samples of measurements on strength and breakdown pressures (stress). The goal of the researcher is to us... see more
Yuriy Povstenko
The different kinds of boundary conditions for standard and fractional diffusion and advection diffusion equations are analyzed. Near the interface between two phases there arises a transition region which state differs from the state of contacting media ... see more
Ali Mohammad-Djafari
Youssef Bennani, Luc Pronzato and Maria João Rendas
The paper proposes a new non-parametric density estimator from region-censored observations with application in the context of population studies, where standard maximum likelihood is affected by over-fitting and non-uniqueness problems. It is a maximum e... see more
Jongwon Choi, Haehyun Cho and Jeong Hyun Yi
To log in to a mobile social network service (SNS) server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created on th... see more
Alicia Rodriguez-Carrion, David Rebollo-Monedero, Jordi Forné, Celeste Campo, Carlos Garcia-Rubio, Javier Parra-Arnau and Sajal K. Das
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by the LBS provider to build the user profile of visited locations, which might disclose ... see more
Udo Von Toussaint
Based on geometric invariance properties, we derive an explicit prior distribution for the parameters of multivariate linear regression problems in the absence of further prior information. The problem is formulated as a rotationally-invariant distributio... see more
Xing-Yuan Wang, Ying-Qian Zhang and Xue-Mei Bao
An encryption scheme for colour images using a spatiotemporal chaotic system is proposed. Initially, we use the R, G and B components of a colour plain-image to form a matrix. Then the matrix is permutated by using zigzag path scrambling. The resultant ma... see more
Rong Cheng, Yanping Bai, Hongping Hu and Xiuhui Tan
In this paper, a novel self-creating disk-cell-splitting (SCDCS) algorithm is proposed for training the radial wavelet neural network (RWNN) model. Combining with the least square (LS) method which determines the linear weight coefficients, SCDCS can crea... see more
Rodrigo Echeveste, Samuel Eckmann and Claudius Gros
The Fisher information constitutes a natural measure for the sensitivity of a probability distribution with respect to a set of parameters. An implementation of the stationarity principle for synaptic learning in terms of the Fisher information results in... see more
Xiaojing Gu and Xingsheng Gu
Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs) for peer authentication. U... see more
Cuautli Yanehowi Flores-Niño, Miguel Angel Olivares-Robles and Igor Loboda
In this work, we show a general approach for inhomogeneous composite thermoelectric systems, and as an illustrative case, we consider a dual thermoelectric cooler. This composite cooler consists of two thermoelectric modules (TEMs) connected thermally in ... see more
Limin Wang and Haoyu Zhao
As one of the most common types of graphical models, the Bayesian classifier has become an extremely popular approach to dealing with uncertainty and complexity. The scoring functions once proposed and widely used for a Bayesian network are not appropriat... see more
Cheng-Lin Liu and Fei Liu
In this paper, the leader-following consensus algorithm, which is accompanied with compensations related to neighboring agents’ delayed states, is constructed for second-order multi-agent systems with communication delay. Using frequency-domain analysis, ... see more
Gregor Chliamovitch, Alexandre Dupuis and Bastien Chopard
We develop ideas proposed by Van der Straeten to extend maximum entropy principles to Markov chains. We focus in particular on the convergence of such estimates in order to explain how our approach makes possible the estimation of transition probabilities... see more
Donald Geman, Hélyette Geman and Nassim Nicholas Taleb
Portfolio selection in the financial literature has essentially been analyzed under two central assumptions: full knowledge of the joint probability distribution of the returns of the securities that will comprise the target portfolio; and investors’ pref... see more
Zengqiang Chen, Matthias Dehmer, Frank Emmert-Streib and Yongtang Shi
Shannon entropies for networks have been widely introduced. However, entropies for weighted graphs have been little investigated. Inspired by the work due to Eagle et al., we introduce the concept of graph entropy for special weighted graphs. Furthermore,... see more
Jun Choi, Dukjae Moon, Seokhie Hong and Jaechul Sung
Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing. There are many a... see more
Wei Dang and Keming Yu
This paper develops a class of density regression models based on proportional hazards family, namely, Gamma transformation proportional hazard (Gt-PH) model. Exact inference for the regression parameters and hazard ratio is derived. These estimators enjo... see more
José Pablo Arias-Nicolás, Jacinto Martín, Fabrizio Ruggeri and Alfonso Suárez-Llorens
In the paper, we address Bayesian sensitivity issues when integrating experts’ judgments with available historical data in a case study about strategies for the preventive maintenance of low-pressure cast iron pipelines in an urban gas distribution networ... see more
Leonid M. Martyushev and Sergey N. Zubarev
The entropy production (inside the volume bounded by a photosphere) of main-sequence stars, subgiants, giants, and supergiants is calculated based on B–V photometry data. A non-linear inverse relationship of thermodynamic fluxes and forces as well as an a... see more
Beibei Wang and Yuangong Sun
This paper studies consensus and H8 consensus problems for heterogeneous multi-agent systems composed of first-order and second-order integrator agents. We first rewrite the multi-agent systems into the corresponding reduced-order systems based on the gra... see more
Desheng Liu, Zhiping Huang and Xiaojun Guo
Two novel schemes are proposed to teleport an unknown two-level quantum state probabilistically when the sender and the receiver only have partial information about the quantum channel, respectively. This is distinct from the fact that either the sender o... see more
Julián D. Arias-Londoño and Juan I. Godino-Llorente
This paper addresses the problem of measuring complexity from embedded attractors as a way to characterize changes in the dynamical behavior of different types of systems with a quasi-periodic behavior by observing their outputs. With the aim of measuring... see more
Paul O'Hara and Lamberto Rondoni
We construct a model of Brownian motion in Minkowski space. There are two aspects of the problem. The first is to define a sequence of stopping times associated with the Brownian “kicks” or impulses. The second is to define the dynamics of the particle al... see more
Rehan Ashraf, Khalid Bashir, Aun Irtaza and Muhammad Tariq Mahmood
One of the major requirements of content based image retrieval (CBIR) systems is to ensure meaningful image retrieval against query images. The performance of these systems is severely degraded by the inclusion of image content which does not contain the ... see more
Michael S. Hughes, John E. McCarthy, Paul J. Bruillard, Jon N. Marsh and Samuel A. Wickline
Virtually all modern imaging devices collect electromagnetic or acoustic waves and use the energy carried by these waves to determine pixel values to create what is basically an “energy” picture. However, waves also carry “information”, as quantified by s... see more