Journal title

Entropy  

ISSN: 1099-4300    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 17 Part 6 Year 2015

43 articles in this issue 

Vikalp Mishra, Walter L. Ellenburg, Osama Z. Al-Hamdan, Josh Bruce and James F. Cruise

Vertical soil moisture profiles based on the principle of maximum entropy (POME) were validated using field and model data and applied to guide an irrigation cycle over a maize field in north central Alabama (USA). The results demonstrate that a simple tw... see more

Pags. 0 - 0  

Abdon Atangana and Badr Saad T. Alkahtani

Using some investigations based on information theory, the model proposed by Keller and Segel was extended to the concept of fractional derivative using the derivative with fractional order without singular kernel recently proposed by Caputo and Fabrizio.... see more

Pags. 0 - 0  

Gemma Lancaster, Philip T. Clemson, Yevhen F. Suprunenko, Tomislav Stankovski and Aneta Stefanovska

The recent introduction of chronotaxic systems provides the means to describe nonautonomous systems with stable yet time-varying frequencies which are resistant to continuous external perturbations. This approach facilitates realistic characterization of ... see more

Pags. 0 - 0  

Alexander Y. Klimenko

This work considers reasons for and implications of discarding the assumption of transitivity—the fundamental postulate in the utility theory of von Neumann and Morgenstern, the adiabatic accessibility principle of Caratheodory and most other theories rel... see more

Pags. 0 - 0  

Bertrand Lods and Giovanni Pistone

Information Geometry generalizes to infinite dimension by modeling the tangent space of the relevant manifold of probability densities with exponential Orlicz spaces. We review here several properties of the exponential manifold on a suitable set EEE of m... see more

Pags. 0 - 0  

Lan Zhou and Yu-Bo Sheng

Concurrence provides us an effective approach to quantify entanglement, which is quite important in quantum information processing applications. In the paper, we mainly review some direct concurrence measurement protocols of the two-qubit optical or atomi... see more

Pags. 0 - 0  

Jerry Davis and Leonhard Blesius

The clear need for accurate landslide susceptibility mapping has led to multiple approaches. Physical models are easily interpreted and have high predictive capabilities but rely on spatially explicit and accurate parameterization, which is commonly not p... see more

Pags. 0 - 0  

Luigi Malagò and Giovanni Pistone

In this paper, we study Amari’s natural gradient flows of real functions defined on the densities belonging to an exponential family on a finite sample space. Our main example is the minimization of the expected value of a real function defined on the sam... see more

Pags. 0 - 0  

Haorui Liu and Juan Yang

Specifically setting a time delay fractional financial system as the study object, this paper proposes a single controller method to eliminate the impact of model uncertainty and external disturbances on the system. The proposed method is based on the sta... see more

Pags. 0 - 0  

Jie Zhu, Jean-Jacques Bellanger, Huazhong Shu and Régine Le Bouquin Jeannès

This paper deals with the estimation of transfer entropy based on the k-nearest neighbors (k-NN) method. To this end, we first investigate the estimation of Shannon entropy involving a rectangular neighboring region, as suggested in already existing liter... see more

Pags. 0 - 0  

Orietta Nicolis and Jorge Mateu

We propose a wavelet-based approach to measure the Shannon entropy in the context of spatial point patterns. The method uses the fully anisotropic Morlet wavelet to estimate the energy distribution at different directions and scales. The spatial heterogen... see more

Pags. 0 - 0  

Limin Wang, Haoyu Zhao, Minghui Sun and Yue Ning

The inference of a general Bayesian network has been shown to be an NP-hard problem, even for approximate solutions. Although k-dependence Bayesian (KDB) classifier can construct at arbitrary points (values of k) along the attribute dependence spectrum, i... see more

Pags. 0 - 0  

Krzysztof J?zwikowska, Alina J?zwikowska and Michal Nietopiel

The main goal of this work is to determine a statistical non-equilibrium distribution function for the electron and holes in semiconductor heterostructures in steady-state conditions. Based on the postulates of local equilibrium, as well as on the integra... see more

Pags. 0 - 0  

Samir D. Mathur

Suppose we allow a system to fall freely from infinity to a point near (but not beyond) the horizon of a black hole. We note that in a sense the information in the system is already lost to an observer at infinity. Once the system is too close to the hori... see more

Pags. 0 - 0  

Marcos Curty, Marc Jofre, Valerio Pruneri and Morgan W. Mitchell

Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, ... see more

Pags. 0 - 0  

Barry Smith, Steven Wang, Augustine Wong and Xiaofeng Zhou

Stress-strength reliability problems arise frequently in applied statistics and related fields. Often they involve two independent and possibly small samples of measurements on strength and breakdown pressures (stress). The goal of the researcher is to us... see more

Pags. 0 - 0  

Yuriy Povstenko

The different kinds of boundary conditions for standard and fractional diffusion and advection diffusion equations are analyzed. Near the interface between two phases there arises a transition region which state differs from the state of contacting media ... see more

Pags. 0 - 0  

Youssef Bennani, Luc Pronzato and Maria João Rendas

The paper proposes a new non-parametric density estimator from region-censored observations with application in the context of population studies, where standard maximum likelihood is affected by over-fitting and non-uniqueness problems. It is a maximum e... see more

Pags. 0 - 0  

Jongwon Choi, Haehyun Cho and Jeong Hyun Yi

To log in to a mobile social network service (SNS) server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created on th... see more

Pags. 0 - 0  

Alicia Rodriguez-Carrion, David Rebollo-Monedero, Jordi Forné, Celeste Campo, Carlos Garcia-Rubio, Javier Parra-Arnau and Sajal K. Das

Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by the LBS provider to build the user profile of visited locations, which might disclose ... see more

Pags. 0 - 0  

Udo Von Toussaint

Based on geometric invariance properties, we derive an explicit prior distribution for the parameters of multivariate linear regression problems in the absence of further prior information. The problem is formulated as a rotationally-invariant distributio... see more

Pags. 0 - 0  

Xing-Yuan Wang, Ying-Qian Zhang and Xue-Mei Bao

An encryption scheme for colour images using a spatiotemporal chaotic system is proposed. Initially, we use the R, G and B components of a colour plain-image to form a matrix. Then the matrix is permutated by using zigzag path scrambling. The resultant ma... see more

Pags. 0 - 0  

Rong Cheng, Yanping Bai, Hongping Hu and Xiuhui Tan

In this paper, a novel self-creating disk-cell-splitting (SCDCS) algorithm is proposed for training the radial wavelet neural network (RWNN) model. Combining with the least square (LS) method which determines the linear weight coefficients, SCDCS can crea... see more

Pags. 0 - 0  

Rodrigo Echeveste, Samuel Eckmann and Claudius Gros

The Fisher information constitutes a natural measure for the sensitivity of a probability distribution with respect to a set of parameters. An implementation of the stationarity principle for synaptic learning in terms of the Fisher information results in... see more

Pags. 0 - 0  

Xiaojing Gu and Xingsheng Gu

Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs) for peer authentication. U... see more

Pags. 0 - 0  

Cuautli Yanehowi Flores-Niño, Miguel Angel Olivares-Robles and Igor Loboda

In this work, we show a general approach for inhomogeneous composite thermoelectric systems, and as an illustrative case, we consider a dual thermoelectric cooler. This composite cooler consists of two thermoelectric modules (TEMs) connected thermally in ... see more

Pags. 0 - 0  

Limin Wang and Haoyu Zhao

As one of the most common types of graphical models, the Bayesian classifier has become an extremely popular approach to dealing with uncertainty and complexity. The scoring functions once proposed and widely used for a Bayesian network are not appropriat... see more

Pags. 0 - 0  

Cheng-Lin Liu and Fei Liu

In this paper, the leader-following consensus algorithm, which is accompanied with compensations related to neighboring agents’ delayed states, is constructed for second-order multi-agent systems with communication delay. Using frequency-domain analysis, ... see more

Pags. 0 - 0  

Gregor Chliamovitch, Alexandre Dupuis and Bastien Chopard

We develop ideas proposed by Van der Straeten to extend maximum entropy principles to Markov chains. We focus in particular on the convergence of such estimates in order to explain how our approach makes possible the estimation of transition probabilities... see more

Pags. 0 - 0  

Donald Geman, Hélyette Geman and Nassim Nicholas Taleb

Portfolio selection in the financial literature has essentially been analyzed under two central assumptions: full knowledge of the joint probability distribution of the returns of the securities that will comprise the target portfolio; and investors’ pref... see more

Pags. 0 - 0  

Zengqiang Chen, Matthias Dehmer, Frank Emmert-Streib and Yongtang Shi

Shannon entropies for networks have been widely introduced. However, entropies for weighted graphs have been little investigated. Inspired by the work due to Eagle et al., we introduce the concept of graph entropy for special weighted graphs. Furthermore,... see more

Pags. 0 - 0  

Jun Choi, Dukjae Moon, Seokhie Hong and Jaechul Sung

Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing. There are many a... see more

Pags. 0 - 0  

Wei Dang and Keming Yu

This paper develops a class of density regression models based on proportional hazards family, namely, Gamma transformation proportional hazard (Gt-PH) model. Exact inference for the regression parameters and hazard ratio is derived. These estimators enjo... see more

Pags. 0 - 0  

José Pablo Arias-Nicolás, Jacinto Martín, Fabrizio Ruggeri and Alfonso Suárez-Llorens

In the paper, we address Bayesian sensitivity issues when integrating experts’ judgments with available historical data in a case study about strategies for the preventive maintenance of low-pressure cast iron pipelines in an urban gas distribution networ... see more

Pags. 0 - 0  

Leonid M. Martyushev and Sergey N. Zubarev

The entropy production (inside the volume bounded by a photosphere) of main-sequence stars, subgiants, giants, and supergiants is calculated based on B–V photometry data. A non-linear inverse relationship of thermodynamic fluxes and forces as well as an a... see more

Pags. 0 - 0  

Beibei Wang and Yuangong Sun

This paper studies consensus and H8 consensus problems for heterogeneous multi-agent systems composed of first-order and second-order integrator agents. We first rewrite the multi-agent systems into the corresponding reduced-order systems based on the gra... see more

Pags. 0 - 0  

Desheng Liu, Zhiping Huang and Xiaojun Guo

Two novel schemes are proposed to teleport an unknown two-level quantum state probabilistically when the sender and the receiver only have partial information about the quantum channel, respectively. This is distinct from the fact that either the sender o... see more

Pags. 0 - 0  

Julián D. Arias-Londoño and Juan I. Godino-Llorente

This paper addresses the problem of measuring complexity from embedded attractors as a way to characterize changes in the dynamical behavior of different types of systems with a quasi-periodic behavior by observing their outputs. With the aim of measuring... see more

Pags. 0 - 0  

Paul O'Hara and Lamberto Rondoni

We construct a model of Brownian motion in Minkowski space. There are two aspects of the problem. The first is to define a sequence of stopping times associated with the Brownian “kicks” or impulses. The second is to define the dynamics of the particle al... see more

Pags. 0 - 0  

Rehan Ashraf, Khalid Bashir, Aun Irtaza and Muhammad Tariq Mahmood

One of the major requirements of content based image retrieval (CBIR) systems is to ensure meaningful image retrieval against query images. The performance of these systems is severely degraded by the inclusion of image content which does not contain the ... see more

Pags. 0 - 0  

Michael S. Hughes, John E. McCarthy, Paul J. Bruillard, Jon N. Marsh and Samuel A. Wickline

Virtually all modern imaging devices collect electromagnetic or acoustic waves and use the energy carried by these waves to determine pixel values to create what is basically an “energy” picture. However, waves also carry “information”, as quantified by s... see more

Pags. 0 - 0