You are currently viewing a new version of our website. To view the old version click .

Entropy, Volume 24, Issue 7

July 2022 - 163 articles

Cover Story: Permutation entropy (PE) is a popular tool to analyze time series in order to either estimate the degree of randomness of a time series source or to detect changes in its dynamics. However, most works that rely on PE neglect the crucial problem of considering the statistical significance of a PE assessment, or, equivalently, of estimating its uncertainty—a task that is hardly feasible in most cases. A new, viable approach to carry out this estimation exploits the technique of surrogate data generation. Using the technique as a proxy generator of the source’s dynamics allows us to assess its statistical properties. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (163)

  • Article
  • Open Access
2,581 Views
19 Pages

17 July 2022

In a blind adaptive deconvolution problem, the convolutional noise observed at the output of the deconvolution process, in addition to the required source signal, is—according to the literature—assumed to be a Gaussian process when the de...

  • Article
  • Open Access
2 Citations
2,058 Views
18 Pages

17 July 2022

In order to overcome the spectral interference of the conventional Fourier transform in the International Electrotechnical Commission framework, this paper introduces a Bregman-split-based compressive sensing (BSCS) method to estimate the Taylor&ndas...

  • Article
  • Open Access
2 Citations
2,086 Views
20 Pages

17 July 2022

Based on the examination of the fundamental characteristics of structures, structural health monitoring (SHM) has received increased attention in recent years. Studies have shown that the SHM method using entropy analysis can precisely identify the d...

  • Article
  • Open Access
3 Citations
2,330 Views
31 Pages

17 July 2022

In recent years, research on applications of three-way decision (e.g., TWD) has attracted the attention of many scholars. In this paper, we combine TWD with multi-attribute decision-making (MADM). First, we utilize the essential idea of TOPSIS in MAD...

  • Feature Paper
  • Article
  • Open Access
1 Citations
2,974 Views
32 Pages

An Algorithmic Approach to Emergence

  • Charles Alexandre Bédard and
  • Geoffroy Bergeron

16 July 2022

We suggest a quantitative and objective notion of emergence. Our proposal uses algorithmic information theory as a basis for an objective framework in which a bit string encodes observational data. A plurality of drops in the Kolmogorov structure fun...

  • Article
  • Open Access
8 Citations
2,403 Views
14 Pages

16 July 2022

In actual driving scenes, recognizing and preventing drivers’ non-standard driving behavior is helpful in reducing traffic accidents. To resolve the problems of various driving behaviors, a large range of action, and the low recognition accurac...

  • Article
  • Open Access
12 Citations
2,887 Views
15 Pages

16 July 2022

In this work, we address the question of the role of the influence of group size on the emergence of various collective social phenomena, such as consensus, polarization and social hysteresis. To answer this question, we study the three-state noisy q...

  • Article
  • Open Access
29 Citations
2,756 Views
25 Pages

15 July 2022

In wireless sensor networks (WSN), most sensor nodes are powered by batteries with limited power, meaning the quality of the network may deteriorate at any time. Therefore, to reduce the energy consumption of sensor nodes and extend the lifetime of t...

  • Article
  • Open Access
4 Citations
3,920 Views
28 Pages

15 July 2022

Steganography is one of the most crucial methods for information hiding, which embeds secret data on an ordinary file or a cover message for avoiding detection. We designed a novel rate-distortion-based large-capacity secure steganographic system, ca...

of 17

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Entropy - ISSN 1099-4300