Skip to Content

Entropy, Volume 24, Issue 10

2022 October - 184 articles

Cover Story: Quantum physics, in its current formulation, is time-reversible. We propose a definition of quantum entropy that accounts for uncertainty in the specification of a quantum state and the probabilistic nature of its observables. This entropy increases monotonically during a time evolution of fermions in coherent states. We review some physical scenarios believed to demonstrate the reversibility of quantum physics, and we show that the entropy increases. We hypothesize that the entropy of a closed system never decreases, i.e., that randomness cannot be reduced, thus inducing a time arrow in quantum physics. We also suggest that creations and annihilations of particles are triggered to bar the entropy from decreasing. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (184)

  • Article
  • Open Access
4 Citations
3,265 Views
16 Pages

21 October 2022

Venture capital (VC) is a form of private equity financing provided by VC institutions to startups with high growth potential due to innovative technology or novel business models but also high risks. To against uncertainties and benefit from mutual...

  • Article
  • Open Access
21 Citations
6,637 Views
24 Pages

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

  • Simon R. Davies,
  • Richard Macfarlane and
  • William J. Buchanan

21 October 2022

Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by...

  • Article
  • Open Access
2,309 Views
10 Pages

21 October 2022

We address minimization of information leakage from continuous-variable quantum channels. It is known, that regime of minimum leakage can be accessible for the modulated signal states with variance equivalent to a shot noise, i.e., vacuum fluctuation...

  • Article
  • Open Access
3,813 Views
21 Pages

20 October 2022

In this work, we formulate the image in-painting as a matrix completion problem. Traditional matrix completion methods are generally based on linear models, assuming that the matrix is low rank. When the original matrix is large scale and the observe...

  • Article
  • Open Access
1 Citations
2,177 Views
13 Pages

20 October 2022

Blaum–Roth Codes are binary maximum distance separable (MDS) array codes over the binary quotient ring F2[x]/(Mp(x)), where Mp(x)=1+x++xp1, and p is a prime number. Two existing all-erasure decoding methods for Blaum–Roth co...

  • Article
  • Open Access
7 Citations
10,597 Views
17 Pages

20 October 2022

The neural systems’ electric activities are fundamental for the phenomenology of consciousness. Sensory perception triggers an information/energy exchange with the environment, but the brain’s recurrent activations maintain a resting stat...

  • Article
  • Open Access
1 Citations
2,786 Views
10 Pages

Behavioral Capital Theory via Canonical Quantization

  • Raymond J. Hawkins and
  • Joseph L. D’Anna

20 October 2022

We show how a behavioral form of capital theory can be derived using canonical quantization. In particular, we introduce quantum cognition into capital theory by applying Dirac’s canonical quantization approach to Weitzman’s Hamiltonian f...

  • Article
  • Open Access
7 Citations
3,379 Views
18 Pages

Multi-Task Learning and Improved TextRank for Knowledge Graph Completion

  • Hao Tian,
  • Xiaoxiong Zhang,
  • Yuhan Wang and
  • Daojian Zeng

20 October 2022

Knowledge graph completion is an important technology for supplementing knowledge graphs and improving data quality. However, the existing knowledge graph completion methods ignore the features of triple relations, and the introduced entity descripti...

  • Article
  • Open Access
7 Citations
2,561 Views
18 Pages

19 October 2022

In this research work, we deal with the stabilization of uncertain fractional-order neutral systems with delayed input. To tackle this problem, the guaranteed cost control method is considered. The purpose is to design a proportional–differenti...

  • Article
  • Open Access
9 Citations
2,692 Views
30 Pages

19 October 2022

The purpose of our research is to extend the formal representation of the human mind to the concept of the complex q-rung orthopair fuzzy hypersoft set (Cq-ROFHSS), a more general hybrid theory. A great deal of imprecision and ambiguity can be captur...

  • Feature Paper
  • Article
  • Open Access
3 Citations
2,967 Views
40 Pages

19 October 2022

The Reynolds transport theorem occupies a central place in continuum mechanics, providing a generalized integral conservation equation for the transport of any conserved quantity within a fluid or material volume, which can be connected to its corres...

  • Article
  • Open Access
4 Citations
2,490 Views
16 Pages

The Interpretation of Graphical Information in Word Processing

  • Mária Csernoch,
  • János Máth and
  • Tímea Nagy

19 October 2022

Word processing is one of the most popular digital activities. Despite its popularity, it is haunted by false assumptions, misconceptions, and ineffective and inefficient practices leading to erroneous digital text-based documents. The focus of the p...

  • Article
  • Open Access
7 Citations
2,438 Views
18 Pages

19 October 2022

This paper combines the mechanical efficiency theory and finite time thermodynamic theory to perform optimization on an irreversible Stirling heat-engine cycle, in which heat transfer between working fluid and heat reservoir obeys linear phenomenolog...

  • Article
  • Open Access
20 Citations
3,560 Views
15 Pages

19 October 2022

Automatic speech recognition (ASR) in children is a rapidly evolving field, as children become more accustomed to interacting with virtual assistants, such as Amazon Echo, Cortana, and other smart speakers, and it has advanced the human–compute...

  • Article
  • Open Access
9 Citations
3,362 Views
15 Pages

Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation

  • Yajing Chang,
  • Yingjian Yan,
  • Chunsheng Zhu and
  • Pengfei Guo

18 October 2022

The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography. Based on the leakage mechanism in the decapsulation stage of LWE/LWR-based post-quantum crypto...

  • Feature Paper
  • Article
  • Open Access
3 Citations
3,255 Views
9 Pages

18 October 2022

Quantum key distribution, initialized in 1984, is a commercialized secure communication method that enables two parties to produce a shared random secret key using quantum mechanics. We propose a QQUIC (Quantum-assisted Quick UDP Internet Connections...

  • Article
  • Open Access
10 Citations
3,445 Views
19 Pages

18 October 2022

The digital watermarking technique is a quite promising technique for both image copyright protection and secure transmission. However, many existing techniques are not as one might have expected for robustness and capacity simultaneously. In this pa...

  • Article
  • Open Access
27 Citations
9,629 Views
29 Pages

Predicting Bitcoin (BTC) Price in the Context of Economic Theories: A Machine Learning Approach

  • Sahar Erfanian,
  • Yewang Zhou,
  • Amar Razzaq,
  • Azhar Abbas,
  • Asif Ali Safeer and
  • Teng Li

18 October 2022

Bitcoin (BTC)—the first cryptocurrency—is a decentralized network used to make private, anonymous, peer-to-peer transactions worldwide, yet there are numerous issues in its pricing due to its arbitrary nature, thus limiting its use due to...

  • Feature Paper
  • Review
  • Open Access
9 Citations
3,482 Views
30 Pages

18 October 2022

This review paper is devoted to a brief overview of results and models concerning flows in networks and channels of networks. First of all, we conduct a survey of the literature in several areas of research connected to these flows. Then, we mention...

  • Feature Paper
  • Article
  • Open Access
13 Citations
4,482 Views
12 Pages

18 October 2022

What are the mechanisms by which groups with certain opinions gain public voice and force others holding a different view into silence? Furthermore, how does social media play into this? Drawing on neuroscientific insights into the processing of soci...

  • Feature Paper
  • Article
  • Open Access
4 Citations
2,406 Views
18 Pages

18 October 2022

When choosing between two candidate models, classical hypothesis testing presents two main limitations: first, the models being tested have to be nested, and second, one of the candidate models must subsume the structure of the true data-generating m...

  • Feature Paper
  • Article
  • Open Access
5 Citations
2,755 Views
15 Pages

18 October 2022

We introduce simplicial persistence, a measure of time evolution of motifs in networks obtained from correlation filtering. We observe long memory in the evolution of structures, with a two power law decay regimes in the number of persistent simplici...

  • Article
  • Open Access
5 Citations
3,002 Views
9 Pages

17 October 2022

In the status forecasting problem, classification models such as logistic regression with input variables such as physiological, diagnostic, and treatment variables are typical ways of modeling. However, the parameter value and model performance diff...

  • Article
  • Open Access
3 Citations
2,512 Views
19 Pages

17 October 2022

In order to effectively extract the key feature information hidden in the original vibration signal, this paper proposes a fault feature extraction method combining adaptive uniform phase local mean decomposition (AUPLMD) and refined time-shift multi...

  • Article
  • Open Access
5 Citations
3,531 Views
17 Pages

17 October 2022

Crowd evacuation has gained increasing attention due to its importance in the day-to-day management of public areas. During an emergency evacuation, there are a variety of factors that need to be considered when designing a practical evacuation model...

  • Feature Paper
  • Article
  • Open Access
18 Citations
4,297 Views
18 Pages

17 October 2022

A comprehensive overview of the irreversible port-Hamiltonian system’s formulation for finite and infinite dimensional systems defined on 1D spatial domains is provided in a unified manner. The irreversible port-Hamiltonian system formulation s...

  • Article
  • Open Access
3 Citations
3,000 Views
14 Pages

17 October 2022

Early time series classification (ETSC) is crucial for real-world time-sensitive applications. This task aims to classify time series data with least timestamps at the desired accuracy. Early methods used fixed-length time series to train the deep mo...

  • Article
  • Open Access
3 Citations
2,752 Views
16 Pages

Modelling Worldviews as Stable Metabolisms

  • Tomas Veloz and
  • Pedro Maldonado

17 October 2022

The emergence and evolution of worldviews is a complex phenomenon that requires strong and rigorous scientific attention in our hyperconnected world. On the one hand, cognitive theories have proposed reasonable frameworks but have not reached general...

  • Article
  • Open Access
3 Citations
2,801 Views
16 Pages

17 October 2022

Recently, cross-dataset facial expression recognition (FER) has obtained wide attention from researchers. Thanks to the emergence of large-scale facial expression datasets, cross-dataset FER has made great progress. Nevertheless, facial images in lar...

  • Article
  • Open Access
20 Citations
3,148 Views
21 Pages

A Novel Color Image Encryption Scheme Based on Hyperchaos and Hopfield Chaotic Neural Network

  • Yanan Wu,
  • Jian Zeng,
  • Wenjie Dong,
  • Xinyu Li,
  • Danyang Qin and
  • Qun Ding

17 October 2022

Problems such as insufficient key space, lack of a one-time pad, and a simple encryption structure may emerge in existing encryption schemes. To solve these problems, and keep sensitive information safe, this paper proposes a plaintext-related color...

  • Article
  • Open Access
6 Citations
3,023 Views
16 Pages

Bounds for Coding Theory over Rings

  • Niklas Gassner,
  • Marcus Greferath,
  • Joachim Rosenthal and
  • Violetta Weger

16 October 2022

Coding theory where the alphabet is identified with the elements of a ring or a module has become an important research topic over the last 30 years. It has been well established that, with the generalization of the algebraic structure to rings, ther...

  • Article
  • Open Access
2,274 Views
13 Pages

16 October 2022

Numerous methods have been developed for longitudinal binomial data in the literature. These traditional methods are reasonable for longitudinal binomial data with a negative association between the number of successes and the number of failures over...

  • Article
  • Open Access
3 Citations
2,165 Views
22 Pages

15 October 2022

Due to their wide application in many disciplines, how to make an efficient ranking for nodes, especially for nodes in graph data, has aroused lots of attention. To overcome the shortcoming that most traditional ranking methods only consider the mutu...

  • Article
  • Open Access
7 Citations
1,990 Views
26 Pages

Four-Objective Optimization of an Irreversible Magnetohydrodynamic Cycle

  • Qingkun Wu,
  • Lingen Chen,
  • Yanlin Ge and
  • Huijun Feng

14 October 2022

Based on the existing model of an irreversible magnetohydrodynamic cycle, this paper uses finite time thermodynamic theory and multi-objective genetic algorithm (NSGA-II), introduces heat exchanger thermal conductance distribution and isentropic temp...

  • Article
  • Open Access
7 Citations
4,049 Views
31 Pages

A Formal Framework for Knowledge Acquisition: Going beyond Machine Learning

  • Ola Hössjer,
  • Daniel Andrés Díaz-Pachón and
  • J. Sunil Rao

14 October 2022

Philosophers frequently define knowledge as justified, true belief. We built a mathematical framework that makes it possible to define learning (increasing number of true beliefs) and knowledge of an agent in precise ways, by phrasing belief in terms...

  • Review
  • Open Access
18 Citations
9,923 Views
17 Pages

SoK: Benchmarking the Performance of a Quantum Computer

  • Junchao Wang,
  • Guoping Guo and
  • Zheng Shan

14 October 2022

The quantum computer has been claimed to show more quantum advantage than the classical computer in solving some specific problems. Many companies and research institutes try to develop quantum computers with different physical implementations. Curre...

  • Article
  • Open Access
2 Citations
2,370 Views
15 Pages

14 October 2022

In the development of simplex mixed-effects models, random effects in these mixed-effects models are generally distributed in normal distribution. The normality assumption may be violated in an analysis of skewed and multimodal longitudinal data. In...

  • Article
  • Open Access
2 Citations
2,071 Views
17 Pages

A Parallelizable Task Offloading Model with Trajectory-Prediction for Mobile Edge Networks

  • Pu Han,
  • Lin Han,
  • Bo Yuan,
  • Jeng-Shyang Pan and
  • Jiandong Shang

14 October 2022

As an emerging computing model, edge computing greatly expands the collaboration capabilities of the servers. It makes full use of the available resources around the users to quickly complete the task request coming from the terminal devices. Task of...

  • Article
  • Open Access
1 Citations
1,889 Views
25 Pages

14 October 2022

Classical link prediction methods mainly utilize vertex information and topological structure to predict missing links in networks. However, accessing vertex information in real-world networks, such as social networks, is still challenging. Moreover,...

  • Article
  • Open Access
7 Citations
2,639 Views
14 Pages

13 October 2022

Long block length rate-compatible low-density parity-compatible (LDPC) codes are designed to solve the problems of great variation of quantum channel noise and extremely low signal-to-noise ratio in continuous-variable quantum key distribution (CV-QK...

  • Article
  • Open Access
10 Citations
8,925 Views
23 Pages

13 October 2022

With the development of quantitative finance, machine learning methods used in the financial fields have been given significant attention among researchers, investors, and traders. However, in the field of stock index spot–futures arbitrage, re...

  • Article
  • Open Access
1 Citations
2,895 Views
17 Pages

13 October 2022

Large Eddy Simulation (LES) and Thermodynamic study have been performed on Organic Rankine Cycle (ORC) components (boiler, evaporator, turbine, pump, and condenser). The petroleum Coke burner provided the heat flux needed for the butane evaporator. H...

  • Article
  • Open Access
4 Citations
1,981 Views
18 Pages

13 October 2022

The finite-time synchronization (FNTS) problem for a class of delayed fractional-order fully complex-valued dynamic networks (FFCDNs) with internal delay and non-delayed and delayed couplings is studied by directly constructing Lyapunov functions ins...

  • Article
  • Open Access
9 Citations
1,942 Views
18 Pages

13 October 2022

To address the difficulty of extracting the features of composite-fault signals under a low signal-to-noise ratio and complex noise conditions, a feature-extraction method based on phase-space reconstruction and maximum correlation Re’nyi entro...

  • Article
  • Open Access
8 Citations
3,616 Views
19 Pages

Bath Engineering Enhanced Quantum Critical Engines

  • Revathy B.S,
  • Victor Mukherjee and
  • Uma Divakaran

13 October 2022

Driving a quantum system across quantum critical points leads to non-adiabatic excitations in the system. This in turn may adversely affect the functioning of a quantum machine which uses a quantum critical substance as its working medium. Here we pr...

  • Article
  • Open Access
1,715 Views
16 Pages

On the Effects of Kernel Configuration in Multi-Kernel Polar Codes

  • Souradip Saha,
  • Luis Maßny,
  • Marc Adrat and
  • Peter Jax

12 October 2022

Polar codes are a relatively new family of linear block codes which have garnered a lot of attention from the scientific community, owing to their low-complexity implementation and provably capacity achieving capability. They have been proposed to be...

  • Article
  • Open Access
10 Citations
2,713 Views
9 Pages

12 October 2022

Many time series entropy calculation methods have been proposed in the last few years. They are mainly used as numerical features for signal classification in any scientific field where data series are involved. We recently proposed a new method, Slo...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Entropy - ISSN 1099-4300