Skip to Content

Entropy, Volume 17, Issue 6

2015 June - 43 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (43)

  • Article
  • Open Access
5 Citations
5,936 Views
26 Pages

Detecting Chronotaxic Systems from Single-Variable Time Series with Separable Amplitude and Phase

  • Gemma Lancaster,
  • Philip T. Clemson,
  • Yevhen F. Suprunenko,
  • Tomislav Stankovski and
  • Aneta Stefanovska

23 June 2015

The recent introduction of chronotaxic systems provides the means to describe nonautonomous systems with stable yet time-varying frequencies which are resistant to continuous external perturbations. This approach facilitates realistic characterizatio...

  • Article
  • Open Access
277 Citations
9,999 Views
15 Pages

23 June 2015

Using some investigations based on information theory, the model proposed by Keller and Segel was extended to the concept of fractional derivative using the derivative with fractional order without singular kernel recently proposed by Caputo and Fabr...

  • Article
  • Open Access
12 Citations
7,772 Views
31 Pages

Modeling Soil Moisture Profiles in Irrigated Fields by the Principle of Maximum Entropy

  • Vikalp Mishra,
  • Walter L. Ellenburg,
  • Osama Z. Al-Hamdan,
  • Josh Bruce and
  • James F. Cruise

23 June 2015

Vertical soil moisture profiles based on the principle of maximum entropy (POME) were validated using field and model data and applied to guide an irrigation cycle over a maize field in north central Alabama (USA). The results demonstrate that a simp...

  • Article
  • Open Access
29 Citations
7,666 Views
16 Pages

19 June 2015

In this study, we investigate some new analytical solutions to the (1 + 1)-dimensional nonlinear Dispersive Modified Benjamin–Bona–Mahony equation and the (2 + 1)-dimensional cubic Klein–Gordon equation by using the generalized Kudryashov method. Af...

  • Article
  • Open Access
41 Citations
7,553 Views
22 Pages

19 June 2015

The clear need for accurate landslide susceptibility mapping has led to multiple approaches. Physical models are easily interpreted and have high predictive capabilities but rely on spatially explicit and accurate parameterization, which is commonly...

  • Review
  • Open Access
35 Citations
9,554 Views
30 Pages

19 June 2015

Concurrence provides us an effective approach to quantify entanglement, which is quite important in quantum information processing applications. In the paper, we mainly review some direct concurrence measurement protocols of the two-qubit optical or...

  • Article
  • Open Access
20 Citations
6,066 Views
41 Pages

19 June 2015

Information Geometry generalizes to infinite dimension by modeling the tangent space of the relevant manifold of probability densities with exponential Orlicz spaces. We review here several properties of the exponential manifold on a suitable set Ɛ...

  • Article
  • Open Access
24 Citations
10,494 Views
49 Pages

19 June 2015

This work considers reasons for and implications of discarding the assumption of transitivity—the fundamental postulate in the utility theory of von Neumann and Morgenstern, the adiabatic accessibility principle of Caratheodory and most other theorie...

  • Article
  • Open Access
44 Citations
6,100 Views
13 Pages

18 June 2015

Specifically setting a time delay fractional financial system as the study object, this paper proposes a single controller method to eliminate the impact of model uncertainty and external disturbances on the system. The proposed method is based on th...

  • Article
  • Open Access
9 Citations
7,451 Views
40 Pages

18 June 2015

In this paper, we study Amari’s natural gradient flows of real functions defined on the densities belonging to an exponential family on a finite sample space. Our main example is the minimization of the expected value of a real function defined on th...

  • Article
  • Open Access
10 Citations
5,749 Views
21 Pages

General and Local: Averaged k-Dependence Bayesian Classifiers

  • Limin Wang,
  • Haoyu Zhao,
  • Minghui Sun and
  • Yue Ning

16 June 2015

The inference of a general Bayesian network has been shown to be an NP-hard problem, even for approximate solutions. Although k-dependence Bayesian (KDB) classifier can construct at arbitrary points (values of k) along the attribute dependence spectr...

  • Article
  • Open Access
14 Citations
6,725 Views
18 Pages

16 June 2015

We propose a wavelet-based approach to measure the Shannon entropy in the context of spatial point patterns. The method uses the fully anisotropic Morlet wavelet to estimate the energy distribution at different directions and scales. The spatial hete...

  • Article
  • Open Access
27 Citations
9,446 Views
29 Pages

Contribution to Transfer Entropy Estimation via the k-Nearest-Neighbors Approach

  • Jie Zhu,
  • Jean-Jacques Bellanger,
  • Huazhong Shu and
  • Régine Le Bouquin Jeannès

16 June 2015

This paper deals with the estimation of transfer entropy based on the k-nearest neighbors (k-NN) method. To this end, we first investigate the estimation of Shannon entropy involving a rectangular neighboring region, as suggested in already existing...

  • Article
  • Open Access
7 Citations
6,541 Views
24 Pages

15 June 2015

The main goal of this work is to determine a statistical non-equilibrium distribution function for the electron and holes in semiconductor heterostructures in steady-state conditions. Based on the postulates of local equilibrium, as well as on the in...

  • Article
  • Open Access
46 Citations
10,662 Views
39 Pages

12 June 2015

The main content of this review article is first to review the main inference tools using Bayes rule, the maximum entropy principle (MEP), information theory, relative entropy and the Kullback–Leibler (KL) divergence, Fisher information and its corre...

  • Article
  • Open Access
23 Citations
6,522 Views
12 Pages

12 June 2015

The different kinds of boundary conditions for standard and fractional diffusion and advection diffusion equations are analyzed. Near the interface between two phases there arises a transition region which state differs from the state of contacting m...

  • Article
  • Open Access
7 Citations
6,059 Views
24 Pages

12 June 2015

Stress-strength reliability problems arise frequently in applied statistics and related fields. Often they involve two independent and possibly small samples of measurements on strength and breakdown pressures (stress). The goal of the researcher is...

  • Article
  • Open Access
9 Citations
9,343 Views
19 Pages

Passive Decoy-State Quantum Key Distribution with Coherent Light

  • Marcos Curty,
  • Marc Jofre,
  • Valerio Pruneri and
  • Morgan W. Mitchell

12 June 2015

Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission ra...

  • Article
  • Open Access
6,061 Views
26 Pages

Most Likely Maximum Entropy for Population Analysis with Region-Censored Data

  • Youssef Bennani,
  • Luc Pronzato and
  • Maria João Rendas

11 June 2015

The paper proposes a new non-parametric density estimator from region-censored observations with application in the context of population studies, where standard maximum likelihood is affected by over-fitting and non-uniqueness problems. It is a maxi...

  • Article
  • Open Access
4 Citations
5,200 Views
15 Pages

10 June 2015

Based on geometric invariance properties, we derive an explicit prior distribution for the parameters of multivariate linear regression problems in the absence of further prior information. The problem is formulated as a rotationally-invariant distri...

  • Article
  • Open Access
19 Citations
8,836 Views
34 Pages

Entropy-Based Privacy against Profiling of User Mobility

  • Alicia Rodriguez-Carrion,
  • David Rebollo-Monedero,
  • Jordi Forné,
  • Celeste Campo,
  • Carlos Garcia-Rubio,
  • Javier Parra-Arnau and
  • Sajal K. Das

10 June 2015

Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by the LBS provider to build the user profile of visited locations, which might disc...

  • Article
  • Open Access
9 Citations
8,941 Views
16 Pages

10 June 2015

To log in to a mobile social network service (SNS) server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created...

  • Article
  • Open Access
7 Citations
7,384 Views
19 Pages

9 June 2015

The Fisher information constitutes a natural measure for the sensitivity of a probability distribution with respect to a set of parameters. An implementation of the stationarity principle for synaptic learning in terms of the Fisher information resul...

  • Article
  • Open Access
6 Citations
5,267 Views
20 Pages

9 June 2015

In this paper, a novel self-creating disk-cell-splitting (SCDCS) algorithm is proposed for training the radial wavelet neural network (RWNN) model. Combining with the least square (LS) method which determines the linear weight coefficients, SCDCS can...

  • Article
  • Open Access
43 Citations
6,564 Views
21 Pages

9 June 2015

An encryption scheme for colour images using a spatiotemporal chaotic system is proposed. Initially, we use the R, G and B components of a colour plain-image to form a matrix. Then the matrix is permutated by using zigzag path scrambling. The resulta...

  • Article
  • Open Access
8 Citations
5,473 Views
14 Pages

Maximum Entropy Rate Reconstruction of Markov Dynamics

  • Gregor Chliamovitch,
  • Alexandre Dupuis and
  • Bastien Chopard

8 June 2015

We develop ideas proposed by Van der Straeten to extend maximum entropy principles to Markov chains. We focus in particular on the convergence of such estimates in order to explain how our approach makes possible the estimation of transition probabil...

  • Article
  • Open Access
6 Citations
4,442 Views
14 Pages

8 June 2015

In this paper, the leader-following consensus algorithm, which is accompanied with compensations related to neighboring agents’ delayed states, is constructed for second-order multi-agent systems with communication delay. Using frequency-domain analy...

  • Article
  • Open Access
10 Citations
6,352 Views
21 Pages

8 June 2015

As one of the most common types of graphical models, the Bayesian classifier has become an extremely popular approach to dealing with uncertainty and complexity. The scoring functions once proposed and widely used for a Bayesian network are not appro...

  • Article
  • Open Access
2 Citations
5,647 Views
19 Pages

8 June 2015

In this work, we show a general approach for inhomogeneous composite thermoelectric systems, and as an illustrative case, we consider a dual thermoelectric cooler. This composite cooler consists of two thermoelectric modules (TEMs) connected thermall...

  • Article
  • Open Access
11 Citations
7,496 Views
32 Pages

8 June 2015

Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs) for peer authenticati...

  • Article
  • Open Access
33 Citations
7,868 Views
14 Pages

Entropy of Weighted Graphs with Randi´c Weights

  • Zengqiang Chen,
  • Matthias Dehmer,
  • Frank Emmert-Streib and
  • Yongtang Shi

5 June 2015

Shannon entropies for networks have been widely introduced. However, entropies for weighted graphs have been little investigated. Inspired by the work due to Eagle et al., we introduce the concept of graph entropy for special weighted graphs. Further...

  • Article
  • Open Access
20 Citations
14,498 Views
14 Pages

Tail Risk Constraints and Maximum Entropy

  • Donald Geman,
  • Hélyette Geman and
  • Nassim Nicholas Taleb

5 June 2015

Portfolio selection in the financial literature has essentially been analyzed under two central assumptions: full knowledge of the joint probability distribution of the returns of the securities that will comprise the target portfolio; and investors’...

  • Article
  • Open Access
3 Citations
5,471 Views
18 Pages

4 June 2015

Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing. There are m...

  • Article
  • Open Access
5 Citations
4,740 Views
23 Pages

A Robust Bayesian Approach to an Optimal Replacement Policy for Gas Pipelines

  • José Pablo Arias-Nicolás,
  • Jacinto Martín,
  • Fabrizio Ruggeri and
  • Alfonso Suárez-Llorens

3 June 2015

In the paper, we address Bayesian sensitivity issues when integrating experts’ judgments with available historical data in a case study about strategies for the preventive maintenance of low-pressure cast iron pipelines in an urban gas distribution n...

  • Article
  • Open Access
16 Citations
5,598 Views
26 Pages

Entropies from Markov Models as Complexity Measures of Embedded Attractors

  • Julián D. Arias-Londoño and
  • Juan I. Godino-Llorente

2 June 2015

This paper addresses the problem of measuring complexity from embedded attractors as a way to characterize changes in the dynamical behavior of different types of systems with a quasi-periodic behavior by observing their outputs. With the aim of meas...

  • Article
  • Open Access
10 Citations
4,471 Views
10 Pages

2 June 2015

Two novel schemes are proposed to teleport an unknown two-level quantum state probabilistically when the sender and the receiver only have partial information about the quantum channel, respectively. This is distinct from the fact that either the sen...

  • Article
  • Open Access
14 Citations
4,754 Views
14 Pages

2 June 2015

This paper studies consensus and \(H_\infty\) consensus problems for heterogeneous multi-agent systems composed of first-order and second-order integrator agents. We first rewrite the multi-agent systems into the corresponding reduced-order systems b...

  • Article
  • Open Access
3 Citations
7,924 Views
11 Pages

Entropy Production of Stars

  • Leonid M. Martyushev and
  • Sergey N. Zubarev

2 June 2015

The entropy production (inside the volume bounded by a photosphere) of main-sequence stars, subgiants, giants, and supergiants is calculated based on B–V photometry data. A non-linear inverse relationship of thermodynamic fluxes and forces as well a...

  • Article
  • Open Access
76 Citations
7,998 Views
29 Pages

Content Based Image Retrieval Using Embedded Neural Networks with Bandletized Regions

  • Rehan Ashraf,
  • Khalid Bashir,
  • Aun Irtaza and
  • Muhammad Tariq Mahmood

29 May 2015

One of the major requirements of content based image retrieval (CBIR) systems is to ensure meaningful image retrieval against query images. The performance of these systems is severely degraded by the inclusion of image content which does not contain...

  • Article
  • Open Access
8 Citations
5,865 Views
34 Pages

Entropy vs. Energy Waveform Processing: A Comparison Based on the Heat Equation

  • Michael S. Hughes,
  • John E. McCarthy,
  • Paul J. Bruillard,
  • Jon N. Marsh and
  • Samuel A. Wickline

25 May 2015

Virtually all modern imaging devices collect electromagnetic or acoustic waves and use the energy carried by these waves to determine pixel values to create what is basically an “energy” picture. However, waves also carry “information”, as quantified...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Entropy - ISSN 1099-4300