Skip to Content

Entropy, Volume 25, Issue 1

2023 January - 179 articles

Cover Story: A molecular electronic wavefunction prepared at a highly excited adiabatic state embedded in a densely quasi-degenerate manifold quickly begins to undergo continual nonadiabatic mixing with other states, each of which in turn further mixes with other states. The mixing is caused by the so-called nonadiabatic interactions due to a significant breakdown of the Born–Oppenheimer approximations. The resultant electronic wavepacket penetrates into the broader domain in the Hilbert space, and thus, the dynamics looks like a fractional Brownian motion. A monotonically increasing Shannon entropy and other indicators highlight the presence of quantum chaos in the electronic state of molecules. This intensive chaos brings about peculiar characteristics in the dynamics of molecules. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (179)

  • Article
  • Open Access
5 Citations
2,803 Views
16 Pages

16 January 2023

Due to its simple structure and lack of moving parts, the supersonic air ejector has been widely applied in the fields of machinery, aerospace, and energy-saving. The performance of the ejector is influenced by the flow channel structure and the velo...

  • Article
  • Open Access
19 Citations
4,870 Views
29 Pages

16 January 2023

Multi-level thresholding image segmentation divides an image into multiple regions of interest and is a key step in image processing and image analysis. Aiming toward the problems of the low segmentation accuracy and slow convergence speed of traditi...

  • Article
  • Open Access
7 Citations
7,052 Views
22 Pages

16 January 2023

The term information is used in different meanings in different fields of study and daily life, causing misunderstanding and confusion. There is a need to clarify what information is and how it relates to knowledge. It is argued that information is m...

  • Article
  • Open Access
39 Citations
8,529 Views
17 Pages

Precision Machine Learning

  • Eric J. Michaud,
  • Ziming Liu and
  • Max Tegmark

15 January 2023

We explore unique considerations involved in fitting machine learning (ML) models to data with very high precision, as is often required for science applications. We empirically compare various function approximation methods and study how they scale...

  • Article
  • Open Access
12 Citations
3,910 Views
18 Pages

Long-Range Dependence Involutional Network for Logo Detection

  • Xingzhuo Li,
  • Sujuan Hou,
  • Baisong Zhang,
  • Jing Wang,
  • Weikuan Jia and
  • Yuanjie Zheng

15 January 2023

Logo detection is one of the crucial branches in computer vision due to various real-world applications, such as automatic logo detection and recognition, intelligent transportation, and trademark infringement detection. Compared with traditional han...

  • Article
  • Open Access
2,176 Views
16 Pages

15 January 2023

The stability and convergence analysis of a multivariable stochastic self-tuning system (STC) is very difficult because of its highly nonlinear structure. In this paper, based on the virtual equivalent system method, the structural nonlinear or nonli...

  • Article
  • Open Access
16 Citations
3,999 Views
24 Pages

A Semantic-Enhancement-Based Social Network User-Alignment Algorithm

  • Yuanhao Huang,
  • Pengcheng Zhao,
  • Qi Zhang,
  • Ling Xing,
  • Honghai Wu and
  • Huahong Ma

15 January 2023

User alignment can associate multiple social network accounts of the same user. It has important research implications. However, the same user has various behaviors and friends across different social networks. This will affect the accuracy of user a...

  • Article
  • Open Access
24 Citations
3,429 Views
16 Pages

Willow Catkin Optimization Algorithm Applied in the TDOA-FDOA Joint Location Problem

  • Jeng-Shyang Pan,
  • Si-Qi Zhang,
  • Shu-Chuan Chu,
  • Hong-Mei Yang and
  • Bin Yan

14 January 2023

The heuristic optimization algorithm is a popular optimization method for solving optimization problems. A novel meta-heuristic algorithm was proposed in this paper, which is called the Willow Catkin Optimization (WCO) algorithm. It mainly consists o...

  • Article
  • Open Access
5 Citations
2,490 Views
13 Pages

14 January 2023

Ion bombardment (IB) is a promising nanofabrication tool for self-organized nanostructures. When ions bombard a nominally flat solid surface, self-organized nanoripples can be induced on the irradiated target surface, which are called intrinsic nanor...

  • Article
  • Open Access
10 Citations
3,076 Views
16 Pages

14 January 2023

Multimodal image fusion aims to retain valid information from different modalities, remove redundant information to highlight critical targets, and maintain rich texture details in the fused image. However, current image fusion networks only use simp...

  • Article
  • Open Access
3 Citations
3,245 Views
14 Pages

13 January 2023

The Theory of the Adjacent Possible (TAP) equation has been proposed as an appropriate description of super-exponential growth phenomena, where a phase of slow growth is followed by a rapid increase, leading to a “hockey stick” curve. Thi...

  • Article
  • Open Access
2 Citations
2,567 Views
15 Pages

Image Registration for Visualizing Magnetic Flux Leakage Testing under Different Orientations of Magnetization

  • Shengping Li,
  • Jie Zhang,
  • Gaofei Liu,
  • Nanhui Chen,
  • Lulu Tian,
  • Libing Bai and
  • Cong Chen

13 January 2023

The Magnetic Flux Leakage (MFL) visualization technique is widely used in the surface defect inspection of ferromagnetic materials. However, the information of the images detected through the MFL method is incomplete when the defect (especially for t...

  • Article
  • Open Access
24 Citations
5,581 Views
25 Pages

A Pseudorandom Number Generator Based on the Chaotic Map and Quantum Random Walks

  • Wenbo Zhao,
  • Zhenhai Chang,
  • Caochuan Ma and
  • Zhuozhuo Shen

13 January 2023

In this paper, a surjective mapping that satisfies the Li–Yorke chaos in the unit area is constructed and a perturbation algorithm (disturbing its parameters and inputs through another high-dimensional chaos) is proposed to enhance the randomne...

  • Article
  • Open Access
5 Citations
2,958 Views
35 Pages

13 January 2023

In this manuscript, off-set strip fin structures are presented which are adapted to the possibilities of additive manufacturing. For this purpose, the geometric parameters, including fin height, fin spacing, fin length, and fin longitudinal displacem...

  • Article
  • Open Access
2 Citations
3,411 Views
16 Pages

13 January 2023

We establish a fluctuation theorem for an open quantum bipartite system that explicitly manifests the role played by quantum correlation. Generally quantum correlations may substantially modify the universality of classical thermodynamic relations in...

  • Article
  • Open Access
6 Citations
4,631 Views
12 Pages

13 January 2023

The second-order Kuramoto equation describes the synchronization of coupled oscillators with inertia, which occur, for example, in power grids. On the contrary to the first-order Kuramoto equation, its synchronization transition behavior is significa...

  • Article
  • Open Access
3 Citations
2,290 Views
11 Pages

Entropy, Graph Homomorphisms, and Dissociation Sets

  • Ziyuan Wang,
  • Jianhua Tu and
  • Rongling Lang

13 January 2023

Given two graphs G and H, the mapping of f:V(G)V(H) is called a graph homomorphism from G to H if it maps the adjacent vertices of G to the adjacent vertices of H. For the graph G, a subset of vertices is called a dissociation set of G if it in...

  • Article
  • Open Access
1 Citations
2,527 Views
12 Pages

13 January 2023

Assuming that there is no way of sending signals propagating faster than light and that free will exists, the loophole-free observed violation of Bell’s inequalities demonstrates that at least one of three fundamental hypotheses involved in the...

  • Article
  • Open Access
1 Citations
2,180 Views
12 Pages

13 January 2023

Weak scattering in a random disordered medium and the associated extreme-event statistics are of great interest in various physical contexts. Here, in the context of non-relativistic particle motion through a weakly correlated random potential, we sh...

  • Article
  • Open Access
1 Citations
2,884 Views
10 Pages

12 January 2023

The quantification of entropy in images is a topic of interest that has had different applications in the field of agronomy, product generation and medicine. Some algorithms have been proposed for the quantification of the irregularity present in an...

  • Article
  • Open Access
9 Citations
3,151 Views
19 Pages

12 January 2023

This paper presents a lossless image compression method with a fast decoding time and flexible adjustment of coder parameters affecting its implementation complexity. A comparison of several approaches for computing non-MMSE prediction coefficients w...

  • Article
  • Open Access
6 Citations
4,273 Views
10 Pages

12 January 2023

In 2019, Schilling et al. claimed that they achieved the supercooling of a body without external intervention in their thermoelectric experiments, thus arguing that the second law of thermodynamics was bent. Kostic suggested that their claim lacked f...

  • Article
  • Open Access
9 Citations
2,464 Views
39 Pages

12 January 2023

We deal with multidimensional regularized systems of equations for the one-velocity and one-temperature inert gas mixture dynamics consisting of the balance equations for the mass of components and the momentum and total energy of the mixture, with d...

  • Article
  • Open Access
3 Citations
3,045 Views
16 Pages

Dynamics of Quantum Networks in Noisy Environments

  • Chang-Yue Zhang,
  • Zhu-Jun Zheng,
  • Shao-Ming Fei and
  • Mang Feng

12 January 2023

Noise exists inherently in realistic quantum systems and affects the evolution of quantum systems. We investigate the dynamics of quantum networks in noisy environments by using the fidelity of the quantum evolved states and the classical percolation...

  • Article
  • Open Access
2 Citations
3,070 Views
39 Pages

12 January 2023

Kernel methods have played a major role in the last two decades in the modeling and visualization of complex problems in data science. The choice of kernel function remains an open research area and the reasons why some kernels perform better than ot...

  • Article
  • Open Access
2 Citations
2,856 Views
16 Pages

12 January 2023

Quantum routers will provide for important functionality in emerging quantum networks, and the deployment of quantum routing in real networks will initially be realized on low-complexity (few-qubit) noisy quantum devices. A true working quantum route...

  • Article
  • Open Access
5 Citations
3,846 Views
12 Pages

Heart Rate Complexity and Autonomic Modulation Are Associated with Psychological Response Inhibition in Healthy Subjects

  • Francesco Riganello,
  • Martina Vatrano,
  • Paolo Tonin,
  • Antonio Cerasa and
  • Maria Daniela Cortese

12 January 2023

Background: the ability to suppress/regulate impulsive reactions has been identified as common factor underlying the performance in all executive function tasks. We analyzed the HRV signals (power of high (HF) and low (LF) frequency, Sample Entropy (...

  • Article
  • Open Access
5 Citations
2,204 Views
16 Pages

Stochastic Particle Creation: From the Dynamical Casimir Effect to Cosmology

  • Matías Mantiñan,
  • Francisco D. Mazzitelli and
  • Leonardo G. Trombetta

11 January 2023

We study a stochastic version of the dynamical Casimir effect, computing the particle creation inside a cavity produced by a random motion of one of its walls. We first present a calculation perturbative in the amplitude of the motion. We compare the...

  • Article
  • Open Access
14 Citations
4,546 Views
16 Pages

Mining Mobile Network Fraudsters with Augmented Graph Neural Networks

  • Xinxin Hu,
  • Haotian Chen,
  • Hongchang Chen,
  • Xing Li,
  • Junjie Zhang and
  • Shuxin Liu

11 January 2023

With the rapid evolution of mobile communication networks, the number of subscribers and their communication practices is increasing dramatically worldwide. However, fraudsters are also sniffing out the benefits. Detecting fraudsters from the massive...

  • Article
  • Open Access
12 Citations
3,493 Views
15 Pages

11 January 2023

As one of the entropy-based methods, the k-Star algorithm benefits from information theory in computing the distances between data instances during the classification task. k-Star is a machine learning method with a high classification performance an...

  • Article
  • Open Access
2 Citations
2,070 Views
13 Pages

On the Image Reconstruction of Capacitively Coupled Electrical Resistance Tomography (CCERT) with Entropy Priors

  • Zenglan Su,
  • Manuchehr Soleimani,
  • Yandan Jiang,
  • Haifeng Ji and
  • Baoliang Wang

11 January 2023

Regularization with priors is an effective approach to solve the ill-posed inverse problem of electrical tomography. Entropy priors have been proven to be promising in radiation tomography but have received less attention in the literature of electri...

  • Article
  • Open Access
9 Citations
2,757 Views
19 Pages

11 January 2023

A numerical simulation method is used to optimize the removal of sand from a helicopter engine particle separator. First, the classic configuration of a particle separator based on the literature is simulated using two boundary conditions. The result...

  • Article
  • Open Access
2,537 Views
19 Pages

Pairing Optimization via Statistics: Algebraic Structure in Pairing Problems and Its Application to Performance Enhancement

  • Naoki Fujita,
  • André Röhm,
  • Takatomo Mihana,
  • Ryoichi Horisaki,
  • Aohan Li,
  • Mikio Hasegawa and
  • Makoto Naruse

11 January 2023

Fully pairing all elements of a set while attempting to maximize the total benefit is a combinatorically difficult problem. Such pairing problems naturally appear in various situations in science, technology, economics, and other fields. In our previ...

  • Article
  • Open Access
3 Citations
3,513 Views
34 Pages

10 January 2023

It has been demonstrated by using generalized phenomenological irreversible thermodynamic theory (GPITT) that by replacing the conventional composition variables {xk} by the quantum level composition variables {x˜k,j} corresponding to the nonequilibr...

  • Article
  • Open Access
15 Citations
4,061 Views
16 Pages

Image Restoration Quality Assessment Based on Regional Differential Information Entropy

  • Zhiyu Wang,
  • Jiayan Zhuang,
  • Sichao Ye,
  • Ningyuan Xu,
  • Jiangjian Xiao and
  • Chengbin Peng

10 January 2023

With the development of image recovery models, especially those based on adversarial and perceptual losses, the detailed texture portions of images are being recovered more naturally. However, these restored images are similar but not identical in de...

  • Article
  • Open Access
5 Citations
4,113 Views
21 Pages

10 January 2023

When we compare the influences of two causes on an outcome, if the conclusion from every group is against that from the conflation, we think there is Simpson’s Paradox. The Existing Causal Inference Theory (ECIT) can make the overall conclusion...

  • Article
  • Open Access
2 Citations
3,222 Views
18 Pages

Reconstructing Sparse Multiplex Networks with Application to Covert Networks

  • Jin-Zhu Yu,
  • Mincheng Wu,
  • Gisela Bichler,
  • Felipe Aros-Vera and
  • Jianxi Gao

10 January 2023

Network structure provides critical information for understanding the dynamic behavior of complex systems. However, the complete structure of real-world networks is often unavailable, thus it is crucially important to develop approaches to infer a mo...

  • Article
  • Open Access
6 Citations
2,783 Views
18 Pages

Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps

  • Mariam Abu Al-Atta,
  • Karim A. Said,
  • Mohamed A. Mohamed and
  • Walid Raslan

10 January 2023

Nonorthogonal multiple access (NOMA) is a relevant technology for realizing the primary goals of next-generation wireless networks, such as high connectivity and stability. Because a rising number of users are becoming connected, user data security h...

  • Article
  • Open Access
2 Citations
2,140 Views
12 Pages

10 January 2023

The emergence of economic blocks and the level of influence countries exert on each other are fundamental features of the 21st century globally interconnected economy. However, limited quantitative research exists measuring the level of influence amo...

  • Article
  • Open Access
6 Citations
2,948 Views
23 Pages

10 January 2023

In recent years, as more and more vehicles request service from roadside units (RSU), the vehicle-to-infrastructure (V2I) communication links are under tremendous pressure. This paper first proposes a dynamic dense traffic flow model under the condit...

  • Article
  • Open Access
9 Citations
3,750 Views
15 Pages

Forecast of Winter Precipitation Type Based on Machine Learning Method

  • Zhang Lang,
  • Qiuzi Han Wen,
  • Bo Yu,
  • Li Sang and
  • Yao Wang

10 January 2023

A winter precipitation-type prediction is a challenging problem due to the complexity in the physical mechanisms and computability in numerical modeling. In this study, we introduce a new method of precipitation-type prediction based on the machine l...

  • Article
  • Open Access
42 Citations
8,729 Views
13 Pages

10 January 2023

Since missing values in multivariate time series data are inevitable, many researchers have come up with methods to deal with the missing data. These include case deletion methods, statistics-based imputation methods, and machine learning-based imput...

  • Article
  • Open Access
2 Citations
3,361 Views
15 Pages

10 January 2023

Chaotic baseband wireless communication system (CBWCS) suffers bit error rate (BER) degradation due to their intrinsic intersymbol interference (ISI). To this end, an ISI-free chaotic filter based on root-raised-cosine (RRC) division is constructed t...

  • Article
  • Open Access
1 Citations
2,786 Views
22 Pages

Quantitative Study of Non-Linear Convection Diffusion Equations for a Rotating-Disc Electrode

  • Fahad Sameer Alshammari,
  • Hamad Jan,
  • Muhammad Sulaiman,
  • Din Prathumwan and
  • Ghaylen Laouini

9 January 2023

Rotating-disc electrodes (RDEs) are favored technologies for analyzing electrochemical processes in electrically charged cells and other revolving machines, such as engines, compressors, gearboxes, and generators. The model is based on the concept of...

  • Article
  • Open Access
30 Citations
4,626 Views
20 Pages

A Conceptual Multi-Layer Framework for the Detection of Nighttime Pedestrian in Autonomous Vehicles Using Deep Reinforcement Learning

  • Muhammad Shoaib Farooq,
  • Haris Khalid,
  • Ansif Arooj,
  • Tariq Umer,
  • Aamer Bilal Asghar,
  • Jawad Rasheed,
  • Raed M. Shubair and
  • Amani Yahyaoui

9 January 2023

The major challenge faced by autonomous vehicles today is driving through busy roads without getting into an accident, especially with a pedestrian. To avoid collision with pedestrians, the vehicle requires the ability to communicate with a pedestria...

  • Essay
  • Open Access
1 Citations
2,441 Views
14 Pages

9 January 2023

This study considers the change point testing problem in autoregressive moving average (ARMA) (p,q) models through the location and scale-based cumulative sum (LSCUSUM) method combined with neural network regression (NNR). We estimated the model para...

  • Article
  • Open Access
20 Citations
7,166 Views
19 Pages

9 January 2023

The aim of a recommender system is to suggest to the user certain products or services that most likely will interest them. Within the context of personalized recommender systems, a number of algorithms have been suggested to generate a ranking of it...

  • Article
  • Open Access
15 Citations
5,850 Views
22 Pages

9 January 2023

Biological genotypes do not code directly for phenotypes; developmental physiology is the control layer that separates genomes from capacities ascertained by selection. A key aspect is cellular competency, since cells are not passive materials but de...

  • Article
  • Open Access
3 Citations
2,464 Views
27 Pages

9 January 2023

Graph data are widely collected and exploited by organizations, providing convenient services from policy formation and market decisions to medical care and social interactions. Yet, recent exposures of private data abuses have caused huge financial...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Entropy - ISSN 1099-4300