- Editorial
Nonadditive Entropies and Complex Systems
- Andrea Rapisarda,
- Stefan Thurner and
- Constantino Tsallis
An entropic functional S is said additive if it satisfies, for any two probabilistically independent systems A and B, that
2019 May - 103 articles
An entropic functional S is said additive if it satisfies, for any two probabilistically independent systems A and B, that
The Tsallis entropy is a useful one-parameter generalization to the standard von Neumann entropy in quantum information theory. In this work, we study the variance of the Tsallis entropy of bipartite quantum systems in a random pure state. The main r...
In this paper, we examine Khinchin’s entropy for two weakly nonlinear systems of oscillators. We study a system of coupled Duffing oscillators and a set of Henon–Heiles oscillators. It is shown that the general method of deriving the Khin...
Machine learning techniques have shown superior predictive power, among which Bayesian network classifiers (BNCs) have remained of great interest due to its capacity to demonstrate complex dependence relationships. Most traditional BNCs tend to build...
The stochastic nonlinear model based on Itô diffusion is proposed as a mathematical model for price dynamics of financial markets. We study this model with relation to concrete stylised facts about financial markets. We investigate the behavior...
A matrix information-geometric method was developed to detect the change-points of rigid body motions. Note that the set of all rigid body motions is the special Euclidean group
One of the most relevant features of musical pieces is the selection and utilization of musical elements by composers. For connecting the musical properties of a melodic line as a whole with those of its constituent elements, we propose a representat...
The real world is full of rich and valuable complex networks. Community structure is an important feature in complex networks, which makes possible the discovery of some structure or hidden related information for an in-depth study of complex network...
Summoning is a task between two parties, Alice and Bob, with distributed networks of agents in space-time. Bob gives Alice a random quantum state, known to him but not her, at some point. She is required to return the state at some later point, belon...
In this paper, inspired by a newly proposed two-dimensional nonlinear oscillator with an infinite number of coexisting attractors, a modified nonlinear oscillator is proposed. The original system has an exciting feature of having layer–layer co...
Complex networks of coupled maps of matrices (NCMM) are investigated in this paper. It is shown that a NCMM can evolve into two different steady states—the quiet state or the state of divergence. It appears that chimera states of spatiotemporal diver...
Information integration theory has been developed to quantify consciousness. Since conscious thought requires the integration of information, the degree of this integration can be used as a neural correlate (
Integrated information theory (IIT) proposes a measure of integrated information, termed Phi (Φ), to capture the level of consciousness of a physical system in a given state. Unfortunately, calculating Φ itself is currently possible only for...
Heart rate variability (HRV; variability of the RR interval of the electrocardiogram) results from the activity of several coexisting control mechanisms, which involve the influence of respiration (RESP) and systolic blood pressure (SBP) oscillations...
We present studies of the electron transport and circular currents induced by the bias voltage and the magnetic flux threading a ring of three quantum dots coupled with two electrodes. Quantum interference of electron waves passing through the states...
Information definitions across many disciplines commonly treat information as a physical world entity. Information measures are used along with other physical variables undistinguished for modeling physical systems. Building on previous work, this re...
The core objective of the present study is to examine entropy generation minimization via Hall current and Ohmic heating. Carreau fluid considerations interpret the unavailability of systems’ thermal energy (for mechanical work). The magneto hy...
We present a study of natural language using the recurrence network method. In our approach, the repetition of patterns of characters is evaluated without considering the word structure in written texts from different natural languages. Our dataset c...
In this paper, a quantum identity authentication protocol is presented based on the counterfactual quantum key distribution system. Utilizing the proposed protocol, two participants can verify each other’s identity through the counterfactual qu...
This work presents a review of previous articles dealing with an original turbulence theory proposed by the author and provides new theoretical insights into some related issues. The new theoretical procedures and methodological approaches confirm an...
We ask a question about the possibility of a discontinuous phase transition and the related social hysteresis within the q-voter model with anticonformity. Previously, it was claimed that within the q-voter model the social hysteresis can emerge only...
Aimed at distinguishing different fault categories of severity of rolling bearings, a novel method based on feature space reconstruction and multiscale permutation entropy is proposed in the study. Firstly, the ensemble empirical mode decomposition a...
In the context of river dynamics, some experimental results have shown that particle velocity is different from fluid velocity along the stream-wise direction for uniform sediment-laden open-channel flows; this velocity difference has been termed vel...
In this paper, we consider a
We study the arbitrarily varying relay channel, which models communication with relaying in the presence of an active adversary. We establish the cutset bound and partial decode-forward bound on the random code capacity. We further determine the rand...
The quality of anti-virus software relies on simple patterns extracted from binary files. Although these patterns have proven to work on detecting the specifics of software, they are extremely sensitive to concealment strategies, such as polymorphism...
This paper looks at entropy generation during ice slurry flow in straight pipes and typical heat exchanger structures used in refrigeration and air-conditioning technology. A dimensionless relationship was proposed to determine the interdependency be...
We introduce a new three-parameter lifetime distribution, the exponentiated Lindley geometric distribution, which exhibits increasing, decreasing, unimodal, and bathtub shaped hazard rates. We provide statistical properties of the new distribution, i...
The aim of this paper is to provide new theoretical and computational understanding on two loss regularizations employed in deep learning, known as local entropy and heat regularization. For both regularized losses, we introduce variational character...
We studied the performance of classical and quantum magnetic Otto cycle with a working substance composed of a single quantum dot using the Fock–Darwin model with the inclusion of the Zeeman interaction. Modulating an external/perpendicular mag...
This paper develops a fourth order entropy stable scheme to approximate the entropy solution of one-dimensional hyperbolic conservation laws. The scheme is constructed by employing a high order entropy conservative flux of order four in conjunction w...
The subject of this paper is to analyse the Mathematical Principia of Economic 3D Black Holes in Roegenian economics. In detail, we study two main problems: (i) mathematical origin of economic 3D black holes; and (ii) entropy and internal political s...
Warships play an important role in the modern sea battlefield. Research on the line spectrum features of warship radio noise signals is helpful to realize the classification and recognition of different types of warships, and provides critical inform...
This is the Editorial article summarizing the scope and contents of the Special Issue, Non-Equilibrium Thermodynamics of Micro Technologies.
Image analysis is playing a very essential role in numerous research areas in the fields of science and technology, ranging from medical imaging to the computer science of automatic vision [...]
A general comment is made on the existence of various baths in quantum thermodynamics, and a brief explanation is presented about the concept of weak invariants. Then, the isoenergetic process is studied for a spin in a magnetic field that slowly var...
In this paper, the properties of the classical confusion–substitution structure and some recently proposed pseudorandom number generators using one-dimensional chaotic maps are investigated. To solve the low security problem of the original str...
The success of the ensemble Kalman filter has triggered a strong interest in expanding its scope beyond classical state estimation problems. In this paper, we focus on continuous-time data assimilation where the model and measurement errors are corre...
The human microbiome is an extremely complex ecosystem considering the number of bacterial species, their interactions, and its variability over space and time. Here, we untangle the complexity of the human microbiome for the Irritable Bowel Syndrome...
Contemporary neurodynamical frameworks, such as coordination dynamics and winnerless competition, posit that the brain approximates symbolic computation by transitioning between metastable attractive states. This article integrates these accounts wit...
Consider
The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventional...
Background: This study compared the correlation of bispectral index (BIS) or entropy with different sevoflurane concentrations between children with and without cerebral palsy (CP) during induction. Methods: For eighty-two children (40 CP and 42 non-...
The study of the lead-lag relationship between the Hong Kong offshore Renminbi (CNH) spot market and onshore (CNY) spot market is of great importance for its wide application in market risk management. In this paper, we study the correlation between...
Informational Structures (IS) and Informational Fields (IF) have been recently introduced to deal with a continuous dynamical systems-based approach to Integrated Information Theory (IIT). IS and IF contain all the geometrical and topological constra...
Global optimization, especially on a large scale, is challenging to solve due to its nonlinearity and multimodality. In this paper, in order to enhance the global searching ability of the firefly algorithm (FA) inspired by bionics, a novel hybrid met...
Uncertain information exists in each procedure of an air combat situation assessment. To address this issue, this paper proposes an improved method to address the uncertain information fusion of air combat situation assessment in the Dempster–S...
Sensor technology provides the real-time monitoring of data in several scenarios that contribute to the improved security of life and property. Crowd condition monitoring is an area that has benefited from this. The basic context-aware framework (BCF...
The Gini coefficient is generally used to measure and summarize inequality over the entire income distribution function (IDF). Unfortunately, it is widely held that the Gini does not detect changes in the tails of the IDF particularly well. This pape...
The rolling bearings often suffer from compound fault in practice. Compared with single fault, compound fault contains multiple fault features that are coupled together and make it difficult to detect and extract all fault features by traditional met...
of 3