Skip to Content

Entropy, Volume 27, Issue 12

2025 December - 85 articles

Cover Story: Quantum technologies across platforms, from trapped ions to superconducting circuits, confront a shared challenge: electric field noise originating at material surfaces limits coherence and restricts scalability in size and dimension. In trapped-ion systems, this surface-induced noise manifests as anomalous heating that degrades motional control. We demonstrate that in situ argon-ion treatment of multi-material surface electrodes produces competing, non-monotonic effects: initial cleaning improves field stability while increasing heating, whereas continued exposure reverses both trends, defining narrow operational windows set by surface morphology and redeposition dynamics. These results define actionable strategies for systematic surface engineering, underscoring materials–physics collaboration as a prerequisite for extendable quantum technologies. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (85)

  • Article
  • Open Access
480 Views
44 Pages

The Capacity Gains of Gaussian Channels with Unstable Versus Stable Autoregressive Noise

  • Charalambos D. Charalambous,
  • Christos Kourtellaris,
  • Stelios Louka and
  • Sergey Loyka

18 December 2025

In this paper, we consider Cover’s and Pombra’s formulation of feedback capacity of additive Gaussian noise (AGN) channels, with jointly Gaussian nonstationary and nonergodic noise. We derive closed-form feedback capacity formulas, using...

  • Article
  • Open Access
1 Citations
705 Views
31 Pages

18 December 2025

Detecting low-altitude, slow-speed, small (LSS) UAVs is especially challenging in low-visibility scenes (low light, haze, motion blur), where inherent uncertainties in sensor data and object appearance dominate. We propose GAME-YOLO, a novel detector...

  • Article
  • Open Access
290 Views
15 Pages

Transfer Irreversibilities in the Lenoir Cycle: FTT Design Criteria with εNTU

  • Ricardo T. Páez-Hernández,
  • Juan Carlos Pacheco-Paez,
  • Juan Carlos Chimal-Eguía,
  • Delfino Ladino-Luna and
  • Javier Contreras-Sánchez

18 December 2025

This work extends the steady flow Lenoir cycle within finite-time thermodynamics (FTT) by incorporating heat transfer irreversibilities through the εNTU formalism and a non-isentropic expansion modeled via the expander isentropic effic...

  • Article
  • Open Access
341 Views
27 Pages

16 December 2025

The accurate extraction of damage information around airport runways is crucial for the rapid development of subsequent damage effect assessment work and the timely formulation of the ensuing operational plan. However, the presence of dark interferen...

  • Article
  • Open Access
360 Views
12 Pages

15 December 2025

The spin-one Ising model on the honeycomb lattice has never been solved exactly in spite of its simplicity. Even its exact critical temperature is not known. The exact integer values for the density of states of the spin-one Ising model on the L&time...

  • Perspective
  • Open Access
809 Views
25 Pages

15 December 2025

Classical thermodynamics (CT) has become integrated into everyday life, especially through its applications in engineering. In contrast, out-of-equilibrium thermodynamics (OET) is often viewed as a fundamental science that seems distant from daily ex...

  • Article
  • Open Access
372 Views
18 Pages

Construction of Space-Filling Asymmetrical Marginally Coupled Designs

  • Weiping Zhou,
  • Miaomiao Meng,
  • Min Li and
  • Xue Yang

13 December 2025

Marginally coupled designs (MCDs) are very suitable for computer experiments with both qualitative and quantitative factors. An MCD consisting of two subdesigns—one for the qualitative factors and the other for the quantitative factors—is...

  • Article
  • Open Access
508 Views
11 Pages

13 December 2025

The dynamics of systems near tipping points attract considerable attention in the context of climate change, ecological regime shifts, disease spreading, and other complex systems undergoing transitions. In particular, the duration and cause of trans...

  • Article
  • Open Access
1 Citations
1,024 Views
22 Pages

Measuring Statistical Dependence via Characteristic Function IPM

  • Povilas Daniušis,
  • Shubham Juneja,
  • Lukas Kuzma and
  • Virginijus Marcinkevičius

12 December 2025

We study statistical dependence in the frequency domain using the integral probability metric (IPM) framework. We propose the uniform Fourier dependence measure (UFDM) defined as the uniform norm of the difference between the joint and product-margin...

  • Article
  • Open Access
358 Views
35 Pages

12 December 2025

Using the dynamics of charged test particles, we study the interplay of extremely strong gravitational and magnetic fields acting on ionized Keplerian disks. We assume a Schwarzschild spacetime of mass M combined with a dipole magnetic field represen...

  • Article
  • Open Access
506 Views
29 Pages

11 December 2025

In recent years, the frequent emergence of Android malware has posed a significant threat to user security. The redundancy of features in malicious software samples and the instability of individual model performance have also introduced numerous cha...

  • Feature Paper
  • Article
  • Open Access
606 Views
9 Pages

11 December 2025

We derive an explicit analytic expression for the first quantum correction to the second virial coefficient of a d-dimensional fluid whose particles interact via the generalized Lennard-Jones (2n,n) potential. By introducing an appropriate change of...

  • Article
  • Open Access
417 Views
15 Pages

11 December 2025

The present study investigates the problem of determining sharp bounds for key reliability and distributional characteristics associated with order statistics. We establish pointwise sharp two-sided bounds for linear combinations of joint distributio...

  • Article
  • Open Access
448 Views
20 Pages

11 December 2025

The Loop-Back Quantum Key Distribution (LB-QKD) protocol establishes a bidirectional architecture in which a single photon travels forth and back through the same optical channel. Unlike conventional one-way schemes such as BB84, Alice performs both...

  • Article
  • Open Access
593 Views
20 Pages

11 December 2025

Background: Climate change, urbanization, and global mobility increase the risk of emerging infectious diseases with pandemic potential. There is a need for rapid methods that can assess their long-term effects on human health. In silico approaches a...

  • Article
  • Open Access
398 Views
19 Pages

11 December 2025

The focus of this research is the qualitative behavior of a reaction–diffusion neural network with distributed delays and conformable derivatives under impulsive perturbations. In particular, the almost periodic behavior of the proposed model i...

  • Feature Paper
  • Article
  • Open Access
554 Views
20 Pages

On Best Erasure Wiretap Codes: Equivocation Matrices and Design Principles

  • Willie K. Harrison,
  • Truman Welling,
  • Andrew Swain and
  • Morteza Shoushtari

9 December 2025

Physical-layer security can aid in establishing secure telecommunication networks including cellular, Internet of Things, and telemetry networks, among others. Channel sounding techniques and/or telemetry systems for reporting channel conditions, cou...

  • Feature Paper
  • Article
  • Open Access
1,205 Views
25 Pages

Mirror Descent and Exponentiated Gradient Algorithms Using Trace-Form Entropies

  • Andrzej Cichocki,
  • Toshihisa Tanaka,
  • Frank Nielsen and
  • Sergio Cruces

8 December 2025

This paper introduces a broad class of Mirror Descent (MD) and Generalized Exponentiated Gradient (GEG) algorithms derived from trace-form entropies defined via deformed logarithms. Leveraging these generalized entropies yields MD and GEG algorithms...

  • Article
  • Open Access
1 Citations
1,107 Views
28 Pages

8 December 2025

TLS 1.3 is a crucial protocol for securing modern internet communications. To facilitate a smooth transition to post-quantum security, hybrid key exchange, which combines classical key exchange algorithms with post-quantum key encapsulation mechanism...

  • Article
  • Open Access
699 Views
34 Pages

8 December 2025

As a major economic engine of China, the Yangtze River Delta (YRD) region is pivotal in driving innovation across the scientific, technological, and digital economies. This study constructs the spatial associative network for digital economy innovati...

  • Article
  • Open Access
631 Views
18 Pages

8 December 2025

This study investigates the complex dynamics of public discourse surrounding Confucius Institutes (CIs) across the hybrid social networks of mainstream news and social platforms from 2010 to 2023. Employing a longitudinal, multi-platform design, we a...

  • Feature Paper
  • Article
  • Open Access
426 Views
18 Pages

8 December 2025

We consider the transfer of continuous-variable entangled states in coupled oscillator chains embedded in a generic environment. We demonstrate high-fidelity transfer via optimal control in two configurations—a linear chain and an X-shaped chai...

  • Article
  • Open Access
1 Citations
386 Views
34 Pages

7 December 2025

The rapid advancement of artificial technology is giving rise to new forms of cyber threats like memorization-based APT attacks, which not only pose significant risks to critical infrastructure but also present serious challenges to conventional secu...

  • Article
  • Open Access
645 Views
23 Pages

IE-MAS: Internal–External Multi-Agent Steering for Controllable Image Captioning

  • Tiecheng Cai,
  • Chao Chen,
  • Shanshan Lin,
  • Sibo Ju and
  • Xiangwen Liao

7 December 2025

Controllable Image Captioning (CIC) aims to generate coherent and semantically faithful textual descriptions of images while adhering to user-specified constraints. Existing methods have achieved promising results under individual constraints such as...

  • Feature Paper
  • Article
  • Open Access
846 Views
19 Pages

Detrended Cross-Correlations and Their Random Matrix Limit: An Example from the Cryptocurrency Market

  • Stanisław Drożdż,
  • Paweł Jarosz,
  • Jarosław Kwapień,
  • Maria Skupień and
  • Marcin Wątorek

6 December 2025

Correlations in complex systems are often obscured by nonstationarity, long-range memory, and heavy-tailed fluctuations, which limit the usefulness of traditional covariance-based analyses. To address these challenges, we construct scale- and fluctua...

  • Article
  • Open Access
322 Views
22 Pages

5 December 2025

This paper introduces novel non-parametric entropy-based evidence functions and associated test statistics for assessing the dilation order of probability distributions constructed from cumulative residual entropy and cumulative entropy. The proposed...

  • Article
  • Open Access
472 Views
13 Pages

5 December 2025

This study examines the heterogeneous timing of market responses to financial news and its implications for informational uncertainty in price-adjustment dynamics. Empirically, stocks do not incorporate positive and negative sentiment at the same spe...

  • Article
  • Open Access
594 Views
18 Pages

Prediction, Uncertainty Quantification, and ANN-Assisted Operation of Anaerobic Digestion Guided by Entropy Using Machine Learning

  • Zhipeng Zhuang,
  • Xiaoshan Liu,
  • Jing Jin,
  • Ziwen Li,
  • Yanheng Liu,
  • Adriano Tavares and
  • Dalin Li

5 December 2025

Anaerobic digestion (AD) is a nonlinear and disturbance-sensitive process in which instability is often induced by feedstock variability and biological fluctuations. To address this challenge, this study develops an entropy-guided machine learning fr...

  • Article
  • Open Access
503 Views
21 Pages

5 December 2025

Approximate query on knowledge graphs (KGs) is an important and common task in real-world applications, where the goal is to return more results on KGs that match the query criteria. Previous approximate query methods have focused on static KGs. Howe...

  • Article
  • Open Access
381 Views
17 Pages

5 December 2025

We study the problem of locally encoded secure distributed batch matrix multiplication (LESDBMM), where M pairs of sources each encode their respective batches of massive matrices and distribute the generated shares to a subset of N worker nodes. Eac...

  • Article
  • Open Access
676 Views
14 Pages

Fusing Semantic and Structural Features for Code Error Detection

  • Yiwen Zhang,
  • Wei Liu,
  • Fazhong Jiang,
  • Jiquan Ma and
  • Jingtai Cao

4 December 2025

Large Language Models of the Transformer architecture display great promise in automated code error detection based on their strength in processing sequential data. Nevertheless, their efficacy could be further improved by addressing the inherent wea...

  • Article
  • Open Access
480 Views
15 Pages

4 December 2025

Serrin’s works provided a new perspective on classical thermodynamics through his statements of the first law and the accumulation function, and of the second law and the accumulation theorem, as well as the subsequent result by Huilgol that th...

  • Feature Paper
  • Article
  • Open Access
4,168 Views
25 Pages

3 December 2025

Are your perceptions, memories and observations merely a statistical fluctuation arising from of the thermal equilibrium of the universe, bearing no correlation to the actual past state of the universe? Arguments are given in the literature for and a...

  • Article
  • Open Access
496 Views
20 Pages

3 December 2025

The Random Domino Automaton—a stochastic cellular automaton forest-fire model—is formulated for the Bethe lattice geometry. The equations describing the stationary state of the system are derived using combinatorial analysis. The special...

  • Article
  • Open Access
518 Views
23 Pages

Multi-Function Computation over a Directed Acyclic Network

  • Xiufang Sun,
  • Ruze Zhang,
  • Dan Li and
  • Xuan Guang

3 December 2025

The problem of multi-function computation over a directed acyclic network is investigated in this paper. In such a network, a sink node is required to compute with zero error multiple vector-linear functions, where each vector-linear function has dis...

  • Article
  • Open Access
1 Citations
1,273 Views
26 Pages

2 December 2025

Image steganography is crucial for secure communication, enabling covert data embedding within cover images. While traditional methods such as LSB embedding are vulnerable to detection, deep learning techniques like GANs and autoencoders have improve...

  • Article
  • Open Access
810 Views
18 Pages

Explainable Structured Pruning of BERT via Mutual Information

  • Hanjuan Huang,
  • Hao-Jia Song and
  • Qiling Zhao

2 December 2025

Bidirectional Encoder Representations from Transformers (BERT) excels in natural language processing (NLP) but is costly on edge devices. We introduce an unsupervised, retraining-free structured pruning scheme for BERT, guided by mutual information (...

  • Article
  • Open Access
369 Views
15 Pages

1 December 2025

As a foundational analytical tool, the discernibility matrix plays a pivotal role in the systematic reduction of knowledge in rough set-based systems. Recent advancements in rough set theory have witnessed the proliferation of discernibility matrix-b...

  • Article
  • Open Access
569 Views
26 Pages

1 December 2025

Images, as carriers of rich information, are generated, stored, and transmitted in various forms across diverse scenarios. It has become an important issue in the field of information security today to encrypt images to ensure information security. T...

  • Article
  • Open Access
661 Views
20 Pages

1 December 2025

Low-light image enhancement (LLIE) degradation arises from insufficient illumination, reflectance occlusion, and noise coupling, and it manifests in the frequency domain as suppressed amplitudes with relatively stable phases. To address the fact that...

  • Review
  • Open Access
441 Views
25 Pages

29 November 2025

Thermodynamic laws and principles overarch all domains of physics, chemistry and biology. In this broad perspective, further generalizations with respect to the “state-of-the-art” of current theories are still viable considering all aspec...

  • Article
  • Open Access
514 Views
17 Pages

Handwritten Digit Recognition with Flood Simulation and Topological Feature Extraction

  • Rafał Brociek,
  • Mariusz Pleszczyński,
  • Jakub Błaszczyk,
  • Maciej Czaicki and
  • Christian Napoli

29 November 2025

This paper introduces a novel approach to handwritten digit recognition based on directional flood simulation and topological feature extraction. While traditional pixel-based methods often struggle with noise, partial occlusion, and limited data, ou...

  • Article
  • Open Access
1 Citations
662 Views
24 Pages

29 November 2025

This study tackles state estimation challenges in guidance information extraction. These challenges arise from non-Gaussian noise. We propose a robust framework to address them. The IMCIF framework effectively handles non-Gaussian noise in seeker mea...

  • Article
  • Open Access
545 Views
26 Pages

28 November 2025

Tree-Augmented Naive Bayes (TAN) is an interpretable graphical structure model. However, its structure learning for continuous attributes depends on the class-conditional mutual information, which is sensitive to one-dimensional or two-dimensional de...

  • Article
  • Open Access
421 Views
14 Pages

28 November 2025

Random walks with stochastic resetting, where walkers periodically return to a designated node, have emerged as an important framework for understanding transport processes in complex networks. While resetting is known to optimize search times, its e...

of 2

XFacebookLinkedIn
Entropy - ISSN 1099-4300