You are currently viewing a new version of our website. To view the old version click .

Entropy, Volume 23, Issue 12

December 2021 - 151 articles

Cover Story: Historically, quantifying the complexity of graphs and networks has been of great interest to scientists in different fields. In this paper, we have tackled this problem using Kolmogorov complexity as the metric. Firstly, ‘Kolmogorov basic graphs’ are defined as those with the least possible Kolmogorov complexity. These graphs are then seen as the building blocks for constructing any given graph. Consequently, the complexity of a graph is estimated by decomposing it into a set of Kolmogorov basic graphs. The result is an algorithm, called ‘Kolmogorov graph covering’, which takes a graph as an input and returns an upper bound for its Kolmogorov complexity. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (151)

  • Article
  • Open Access
9 Citations
4,131 Views
28 Pages

Whether the Support Region of Three-Bit Uniform Quantizer Has a Strong Impact on Post-Training Quantization for MNIST Dataset?

  • Jelena Nikolić,
  • Zoran Perić,
  • Danijela Aleksić,
  • Stefan Tomić and
  • Aleksandra Jovanović

20 December 2021

Driven by the need for the compression of weights in neural networks (NNs), which is especially beneficial for edge devices with a constrained resource, and by the need to utilize the simplest possible quantization model, in this paper, we study the...

  • Article
  • Open Access
42 Citations
4,255 Views
32 Pages

20 December 2021

Image segmentation is a fundamental but essential step in image processing because it dramatically influences posterior image analysis. Multilevel thresholding image segmentation is one of the most popular image segmentation techniques, and many rese...

  • Concept Paper
  • Open Access
6 Citations
7,645 Views
37 Pages

20 December 2021

What do bacteria, cells, organs, people, and social communities have in common? At first sight, perhaps not much. They involve totally different agents and scale levels of observation. On second thought, however, perhaps they share everything. A grow...

  • Article
  • Open Access
4 Citations
3,144 Views
14 Pages

20 December 2021

Active object recognition (AOR) aims at collecting additional information to improve recognition performance by purposefully adjusting the viewpoint of an agent. How to determine the next best viewpoint of the agent, i.e., viewpoint planning (VP), is...

  • Article
  • Open Access
31 Citations
4,164 Views
25 Pages

20 December 2021

Earlier studies have shown that classification accuracies of Bayesian networks (BNs) obtained by maximizing the conditional log likelihood (CLL) of a class variable, given the feature variables, were higher than those obtained by maximizing the margi...

  • Article
  • Open Access
14 Citations
4,203 Views
17 Pages

20 December 2021

The multi-disc wet clutch is widely used in transmission systems as it transfers the torque and power between the gearbox and the driving engine. During service, the buckling of the friction components in the wet clutch is inevitable, which can short...

  • Article
  • Open Access
6 Citations
3,663 Views
12 Pages

19 December 2021

We perform security analysis of a passive continuous-variable quantum key distribution (CV-QKD) protocol by considering the finite-size effect. In the passive CV-QKD scheme, Alice utilizes thermal sources to passively make preparation of quantum stat...

  • Article
  • Open Access
5 Citations
4,662 Views
20 Pages

18 December 2021

The main purpose of the study is to investigate how price fluctuations of a sovereign currency are transmitted among currencies and what network traits and currency relationships are formed in this process under the background of economic globalizati...

  • Article
  • Open Access
7 Citations
4,123 Views
21 Pages

18 December 2021

This article presents the author’s own metaheuristic cryptanalytic attack based on the use of differential cryptanalysis (DC) methods and memetic algorithms (MA) that improve the local search process through simulated annealing (SA). The sugges...

of 16

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Entropy - ISSN 1099-4300