Journal title

Entropy  

ISSN: 1099-4300    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 27 Part 1 Year 2025

96 articles in this issue 

Jiawen Li, Guanyuan Feng, Chen Ling, Ximing Ren, Xin Liu, Shuang Zhang, Leijun Wang, Yanmei Chen, Xianxian Zeng and Rongjun Chen

Emotion recognition is an advanced technology for understanding human behavior and psychological states, with extensive applications for mental health monitoring, human–computer interaction, and affective computing. Based on electroencephalography (EEG), ... see more

Pags. 0 - 0  

Ana M. Montero, Santos B. Yuste, Andrés Santos and Mariano López de Haro

This paper explores how competing interactions in the intermolecular potential of fluids affect their structural transitions. This study employs a versatile potential model with a hard core followed by two constant steps, representing wells or shoulders, ... see more

Pags. 0 - 0  

Jiahui Zhou, Han Liang, Tian Wu, Xiaoxi Zhang, Yu Jiang and Chee Wei Tan

Vertical Federated Learning (VFL) is a promising category of Federated Learning that enables collaborative model training among distributed parties with data privacy protection. Due to its unique training architecture, a key challenge of VFL is high commu... see more

Pags. 0 - 0  

Xutong Zhang, Maxime Savoie, Mark K. Quinn, Ben Parslew and Alistair Revell

This study investigates the flow field around a finite rectangular prism using both experimental and computational methods, with a particular focus on the influence of the turbulence approach adopted, the mesh resolution employed, and different subgrid le... see more

Pags. 0 - 0  

Daixin Wang and Shaoyong Lai

A kinetic exchange model is developed to investigate wealth distribution in a market. The model incorporates a value function that captures the agents’ psychological traits, governing their wealth allocation based on behavioral responses to perceived pote... see more

Pags. 0 - 0  

Daniel Gaetano Riviello, Giusi Alfano and Roberto Garello

Quadratic forms with random kernel matrices are ubiquitous in applications of multivariate statistics, ranging from signal processing to time series analysis, biomedical systems design, wireless communications performance analysis, and other fields. Their... see more

Pags. 0 - 0  

Yan Gu and Jiao Wang

We show that the theory of quantum statistical mechanics is a special model in the framework of the quantum probability theory developed by mathematicians, by extending the characteristic function in the classical probability theory to the quantum probabi... see more

Pags. 0 - 0  

Javier Garcia-Barcos and Ruben Martinez-Cantin

Optimizing complex systems usually involves costly and time-consuming experiments, where selecting the experiments to perform is fundamental. Bayesian optimization (BO) has proved to be a suitable optimization method in these situations thanks to its samp... see more

Pags. 0 - 0  

David M. Schneider and Damián H. Zanette

We study the structural properties of networks formed by random sets of bit strings—namely the ordered arrays of binary variables representing, for instance, genetic information or cultural profiles. Two bit strings are connected by a network link when th... see more

Pags. 0 - 0  

Kwang Soo Cho

This study is the application of the Onsager variational principle to viscoelasticity and viscoplasticity with the minimization of the assumptions which are popularly used in conventional approaches. The conventional approaches assume Kröner–Lee decomposi... see more

Pags. 0 - 0  

Mladen Pavicic

Quantum contextuality plays a significant role in supporting quantum computation and quantum information theory. The key tools for this are the Kochen–Specker and non-Kochen–Specker contextual sets. Traditionally, their representation has been predominant... see more

Pags. 0 - 0  

Julie Nijs, Freek Van de Velde and Hubert Cuyckens

This study examines the relationship between morphological complexity and word order rigidity, addressing a gap in the literature regarding causality in linguistic changes. While prior research suggests that the loss of inflectional morphology correlates ... see more

Pags. 0 - 0  

Tetsuo Kawakami, Hiroki Kawahara, Toshihiko Okamura and Wakako Maeda

We demonstrated the coexistence of an S-band CV-QKD signal with fully loaded C+L-band classical signals for the first time. The secret key rate of the S-band QKD system was 986 kbps with the C+L-band WDM signals transmitted through a 20 km G.654.E fiber l... see more

Pags. 0 - 0  

Chongchong Jin and Yeyao Chen

Arbitrary translational Six Degrees of Freedom (6DoF) video represents a transitional stage towards immersive terminal videos, allowing users to freely switch viewpoints for a 3D scene experience. However, the increased freedom of movement introduces new ... see more

Pags. 0 - 0  

Raphael D. Levine

A quantitative expression for the value of information within the framework of information theory and of the maximal entropy formulation is discussed. We examine both a local, differential measure and an integral, global measure for the value of the chang... see more

Pags. 0 - 0  

Lin Ge, Hailin Sang and Qi-Man Shao

In this paper, we study self-normalized moderate deviations for degenerate U-statistics of order 2. Let {Xi,i≥1}" role="presentation">{????,??=1}{Xi,i=1} { X i , i = 1 } be i.i.d. random variables and consider symmetric and deg... see more

Pags. 0 - 0  

Yuzhuo Zhao, Qiqin Shi and Qun Ding

In recent years, many chaotic image encryption algorithms have been cracked by chosen plaintext attack. Therefore, the method of associating the key with the plaintext to resist the cryptanalysis has received extensive attention from designers. This paper... see more

Pags. 0 - 0  

Yinglong Dang, Xiaoguang Gao and Zidong Wang

Artificial intelligence plays an indispensable role in improving productivity and promoting social development, and causal discovery is one of the extremely important research directions in this field. Acyclic directed graphs (DAGs) are the most commonly ... see more

Pags. 0 - 0  

Diana Monteoliva, Angelo Plastino and Angel Ricardo Plastino

In this study, we utilize information theory tools to investigate notable features of the quantum degree of mixedness (Cf" role="presentation" style="position: relative;">????Cf C f ) in a finite model of N interacting fermions. This model serves as... see more

Pags. 0 - 0  

Zbigniew S. Szewczak

The Komlós–Révész strong law of large numbers (SLLN) is proved for ψ" role="presentation">??? ? -mixing sequences without a rate assumption.

Pags. 0 - 0  

Evans Teiko Tetteh and Beata Zielosko

This study introduces a greedy algorithm for deriving decision rules from decision tree ensembles, targeting enhanced interpretability and generalization in distributed data environments. Decision rules, known for their transparency, provide an accessible... see more

Pags. 0 - 0  

Karl Grill

Consider a coin-tossing sequence, i.e., a sequence of independent variables, taking values 0 and 1 with probability 1/2" role="presentation">1/21/2 1 / 2 . The famous Erdos-Rényi law of large numbers implies that the longest run of ones in the firs... see more

Pags. 0 - 0  

István Fazekas, Borbála Fazekas and László Fórián

In this paper, we study the usual coin tossing experiment. We call a run at most T-contaminated, if it contains at most T tails. We approximate the distribution of the length of the longest at most T-contaminated runs. We offer a more precise approximatio... see more

Pags. 0 - 0  

Yuan Zhai, Tao Wang, Yanwei Zhou, Feng Zhu and Bo Yang

With the development and application of the Internet of Things (IoT), the volume of data generated daily by IoT devices is growing exponentially. These IoT devices, such as smart wearable devices, produce data containing sensitive personal information. Ho... see more

Pags. 0 - 0  

Jan A. Bergstra and John V. Tucker

Classic formulae for entropy and cross-entropy contain operations x0" role="presentation" style="position: relative;">??0x0 x 0 and log2x" role="presentation" style="position: relative;">log2??log2x log 2 x that are not defined on a... see more

Pags. 0 - 0  

Kentaro Kato

The limitations of cloning and discriminating quantum states are related to the non-orthogonality of the states. Hence, understanding the collective features of quantum states is essential for the future development of quantum communications technology. T... see more

Pags. 0 - 0  

Pradeep Kr. Banerjee

The problem of constructing information measures with a well-defined interpretation is of fundamental significance in information theory. A good definition of an information measure entails certain desirable properties while also providing answers to oper... see more

Pags. 0 - 0  

Xuan Li, Dejie Cheng, Luheng Zhang, Chengfang Zhang and Ziliang Feng

Graph anomaly detection is crucial in many high-impact applications across diverse fields. In anomaly detection tasks, collecting plenty of annotated data tends to be costly and laborious. As a result, few-shot learning has been explored to address the is... see more

Pags. 0 - 0  

Ian Nodurft, Alejandro Rodriguez Perez, Naveed Naimipour and Harry C. Shaw

Polarization mode dispersion can introduce quantum decoherence in polarization encoded information, limiting the range of quantum communications protocols. Therefore, strategies to nullify the effect would reduce quantum decoherence and potentially increa... see more

Pags. 0 - 0  

Qiuyue Zhang, Yili Lin, Yu Cao and Long Luo

This study estimates regional economic resilience in China from 2000 to 2022, focusing on economic resistance resilience, recovery resilience, and reorientation resilience. The entropy method, kernel density estimation, and spatial Durbin model are applie... see more

Pags. 0 - 0  

Harrison Crecraft

Vopson and Lepadatu recently proposed the Second Law of Infodynamics. The law states that while the total entropy increases, information entropy declines over time. They state that the law has applications over a wide range of disciplines, but they leave ... see more

Pags. 0 - 0  

Tamás Szabados

The paper gives a wide range, uniform, local approximation of symmetric binomial distribution. The result clearly shows how one has to modify the classical de Moivre–Laplace normal approximation in order to give an estimate at the tail as well as to minim... see more

Pags. 0 - 0  

Dmytro Svyetlichnyy

Functionally graded materials (FGMs) show continuous variations in properties and offer unique multifunctional capabilities. This study presents a simulation of the powder bed fusion (PBF) process for FGM fabrication using a combination of Unity-based dep... see more

Pags. 0 - 0  

Zhijian Zhang, Yuqing Sun, Yayun Liu, Lin Jiang and Zhengmi Li

Currently, the rapid development of social media enables people to communicate more and more frequently in the network. Classifying user activities in social networks helps to better understand user behavior in social networks. This paper first creates an... see more

Pags. 0 - 0  

Renai Chen and Galen T. Craven

A stochastic energetics framework is applied to examine how periodically shifting the frequency of a time-dependent oscillating temperature gradient affects heat transport in a nanoscale molecular model. We specifically examine the effects that frequency ... see more

Pags. 0 - 0  

Jianchang Zheng, Zhengshuai Zhang and Xiaohan Li

The 2019 Ridgecrest MW7.1 earthquake has received significant attention due to its complex fault activity. It is also noticeable for its MW6.4 foreshock sequence. There are intricate dynamic relationships between earthquakes in such vigorous sequences. Ba... see more

Pags. 0 - 0  

Lukasz Matuszewski, Mieczyslaw Jessa and Jakub Nikonowicz

In this paper, we propose a method to enhance the performance of a random number generator (RNG) that exploits ring oscillators (ROs). Our approach employs additional phase detectors to extract more entropy; thus, RNG uses fewer resources to produce bit s... see more

Pags. 0 - 0  

Chanzi Liu, Jianjian Wu and Qingfeng Zhou

In this paper, we propose a random frequency division multiplexing (RFDM) method for multicarrier modulation in mobile time-varying channels. Inspired by compressed sensing (CS) technology which use a sensing matrix (with far fewer rows than columns) to s... see more

Pags. 0 - 0  

Xinmin Ding, Zenghui Zhang, Kun Wang, Xiaolin Xiao and Minpeng Xu

Brain–computer interfaces (BCI) are an effective tool for recognizing motor imagery and have been widely applied in the motor control and assistive operation domains. However, traditional intention-recognition methods face several challenges, such as prol... see more

Pags. 0 - 0  

Daniel Areán, David Garcia-Fariña and Karl Landsteiner

Non-Hermitian quantum field theories are a promising tool to study open quantum systems. These theories preserve unitarity if PT" role="presentation">????PT PT symmetry is respected, and in that case, an equivalent Hermitian description exists via the s... see more

Pags. 0 - 0  

Wafa Labidi, Yaning Zhao, Christian Deppe and Holger Boche

In the identification (ID) scheme proposed by Ahlswede and Dueck, the receiver’s goal is simply to verify whether a specific message of interest was sent. Unlike Shannon’s transmission codes, which aim for message decoding, ID codes for a discrete memoryl... see more

Pags. 0 - 0  

Michel Aguilera, Sergio Pino-Alarcón, Francisco J. Peña, Eugenio E. Vogel, Natalia Cortés and Patricio Vargas

In this work, we study the magnetocaloric effect (MCE) in a working substance corresponding to a square lattice of spins with Q possible orientations, known as the “Q-state clock model”. When the Q-state clock model has Q≥5" role="presentation"... see more

Pags. 0 - 0  

Yu Wan, Shaochen Lin, Chuanling Jin, Yan Gao and Yang Yang

During long-term operation in complex environments, the pressure pipeline systems are prone to damage and faults, and serious safety accidents may occur without real-time condition monitoring. Moreover, in traditional non-contact monitoring approaches, ac... see more

Pags. 0 - 0  

Esteban R. Valverde, Victoria Vampa, Osvaldo A. Rosso and Pedro D. Arini

Myocardial ischaemia is a decompensation of the oxygen supply and demand ratio, often caused by coronary atherosclerosis. During the initial stage of ischaemia, the electrical activity of the heart is disrupted, increasing the risk of malignant arrhythmia... see more

Pags. 0 - 0  

Yongli Tang, Menghao Guo, Binyong Li, Kaixin Geng, Jinxia Yu and Baodong Qin

Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and the s... see more

Pags. 0 - 0  

Zihao Wen and David L. Dowe

Species distribution modeling is fundamental to biodiversity, evolution, conservation science, and the study of invasive species. Given environmental data and species distribution data, model selection techniques are frequently used to help identify relev... see more

Pags. 0 - 0  

Zensho Yoshida

A topological constraint, characterized by the Casimir invariant, imparts non-trivial structures in a complex system. We construct a kinetic theory in a constrained phase space (infinite-dimensional function space of macroscopic fields), and characterize ... see more

Pags. 0 - 0  

Marios Andreou and Nan Chen

The conditional Gaussian nonlinear system (CGNS) is a broad class of nonlinear stochastic dynamical systems. Given the trajectories for a subset of state variables, the remaining follow a Gaussian distribution. Despite the conditionally linear structure, ... see more

Pags. 0 - 0  

Xiaobo Hu, Yanyan Yu, Yinzi Tu, Jing Wang, Shi Chen, Yuqi Bao, Tengyuan Zhang, Yaowen Xing and Shihui Zheng

Differential Computation Analysis (DCA) leverages memory traces to extract secret keys, bypassing countermeasures employed in white-box designs, such as encodings. Although researchers have made great efforts to enhance security against DCA, most solution... see more

Pags. 0 - 0