You are currently viewing a new version of our website. To view the old version click .

Entropy, Volume 25, Issue 2

February 2023 - 211 articles

Cover Story: The quest to invent thermal machines at the nanoscale has led to the new field of quantum thermodynamics. Recent technological advancement has enabled the experimental realization of quantum thermal machines powered by measurements and feedback, such as Maxwell’s demons and Szilard’s engines. These are devices where measurements and feedback allow, respectively, the extraction of heat or work from a single thermal bath. We study two different configurations of coupled-qubit-based thermal devices powered by discrete as well as continuous weak quantum measurements, namely a quantum Maxwell’s demon, and a measurement-assisted refrigerator. The measurement-assisted refrigerator extracts heat from a cold bath, exploiting the combination of external work and invasive quantum measurements. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (211)

  • Article
  • Open Access
4 Citations
3,125 Views
19 Pages

17 February 2023

The ability to build more robust clustering from many clustering models with different solutions is relevant in scenarios with privacy-preserving constraints, where data features have a different nature or where these features are not available in a...

  • Article
  • Open Access
4 Citations
2,239 Views
18 Pages

17 February 2023

Linear codes with a few weights have been extensively studied due to their wide applications in secret sharing schemes, strongly regular graphs, association schemes, and authentication codes. In this paper, we choose the defining sets from two distin...

  • Article
  • Open Access
7 Citations
2,570 Views
16 Pages

Chaos and Predictability in Ionospheric Time Series

  • Massimo Materassi,
  • Tommaso Alberti,
  • Yenca Migoya-Orué,
  • Sandro Maria Radicella and
  • Giuseppe Consolini

17 February 2023

Modelling the Earth’s ionosphere is a big challenge, due to the complexity of the system. Different first principle models have been developed over the last 50 years, based on ionospheric physics and chemistry, mostly controlled by Space Weathe...

  • Article
  • Open Access
2,355 Views
17 Pages

17 February 2023

In this paper, a quantity that describes a response of a system’s eigenstates to a very small perturbation of physical relevance is studied as a measure for characterizing crossover from integrable to chaotic quantum systems. It is computed fro...

  • Article
  • Open Access
1 Citations
2,300 Views
21 Pages

16 February 2023

In order to abstract away a network model from some real-world networks, such as navigation satellite networks and mobile call networks, we proposed an Isochronal-Evolution Random Matching Network (IERMN) model. An IERMN is a dynamic network that evo...

  • Article
  • Open Access
10 Citations
2,582 Views
15 Pages

16 February 2023

Discovering communities in complex networks is essential in performing analyses, such as dynamics of political fragmentation and echo chambers in social networks. In this work, we study the problem of quantifying the significance of edges in a comple...

  • Article
  • Open Access
24 Citations
2,684 Views
32 Pages

Distribution of the Age of Gossip in Networks

  • Mohamed A. Abd-Elmagid and
  • Harpreet S. Dhillon

16 February 2023

We study a general setting of gossip networks in which a source node forwards its measurements (in the form of status updates) about some observed physical process to a set of monitoring nodes according to independent Poisson processes. Furthermore,...

  • Article
  • Open Access
4 Citations
2,269 Views
17 Pages

15 February 2023

In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems. To provide an authorization mechanism to limit the comparison of...

  • Article
  • Open Access
2 Citations
3,437 Views
19 Pages

15 February 2023

Hash is one of the most widely used methods for computing efficiency and storage efficiency. With the development of deep learning, the deep hash method shows more advantages than traditional methods. This paper proposes a method to convert entities...

of 22

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Entropy - ISSN 1099-4300