Skip to Content

Entropy, Volume 27, Issue 5

2025 May - 95 articles

Cover Story: This picture shows the uncertainty sets associated with received codewords in a communication system. Each set represents a possible received signal, and to achieve capacity at a given level of confidence, the sets are tightly packed in space and partially overlap. In this paper, we demonstrate that the highest rate of communication at a given level of confidence corresponds to a non-stochastic notion of mutual information between transmitted and received signals, expressed in terms of the quantization of the range of uncertainty of one signal given knowledge of the other. This provides a generalization of Kolmogorov’s capacity to sets with partial overlap and an information-theoretic interpretation of this quantity that admits the possibility of decoding errors, as in classical information theory, while retaining the worst-case, non-stochastic character of Kolmogorov’s approach. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (95)

  • Article
  • Open Access
1 Citations
1,576 Views
21 Pages

21 May 2025

To promote the inheritance of traditional culture, a variety of emerging methods rooted in machine learning and deep learning have been introduced. Dunhuang patterns, an important part of traditional Chinese culture, are difficult to collect in large...

  • Article
  • Open Access
1,575 Views
27 Pages

21 May 2025

The rapid development of deepfake facial technology has led to facial fraud, posing a significant threat to social security. With the advent of diffusion models, the realism of forged facial images has increased, making detection increasingly challen...

  • Article
  • Open Access
1 Citations
1,012 Views
27 Pages

21 May 2025

Image segmentation is a crucial step in image processing and analysis, with multi-level thresholding being one of the important techniques for image segmentation. Existing approaches predominantly rely on metaheuristic optimization algorithms, which...

  • Article
  • Open Access
1,082 Views
13 Pages

21 May 2025

This study simulates the spread of epidemics on university campuses using a multilayer temporal network model combined with the SEIR (Susceptible–Exposed–Infectious–Recovered) transmission model. The proposed approach explicitly cap...

  • Feature Paper
  • Article
  • Open Access
1,265 Views
21 Pages

21 May 2025

Trolling behavior is not simply a result of ‘bad actors’, an individual trait, or a linguistic phenomenon, but emerges from complex contagious social dynamics. This study uses formal concepts from information theory and complexity science...

  • Feature Paper
  • Article
  • Open Access
4 Citations
1,228 Views
24 Pages

Cost-Efficient Distributed Learning via Combinatorial Multi-Armed Bandits

  • Maximilian Egger,
  • Rawad Bitar,
  • Antonia Wachter-Zeh and
  • Deniz Gündüz

20 May 2025

We consider the distributed stochastic gradient descent problem, where a main node distributes gradient calculations among n workers. By assigning tasks to all workers and waiting only for the k fastest ones, the main node can trade off the algorithm...

  • Article
  • Open Access
1 Citations
2,339 Views
23 Pages

20 May 2025

The sharing economy is an inevitable trend in cold chain logistics. Most cold chain logistics enterprises are small and operate independently, with limited collaboration. Joint distribution is key to integrating cold chain logistics and the sharing e...

  • Article
  • Open Access
1 Citations
1,080 Views
13 Pages

A Two-State Random Walk Model of Sperm Search on Confined Domains

  • Martin Bier,
  • Maciej Majka and
  • Cameron Schmidt

19 May 2025

Mammalian fertilization depends on sperm successfully navigating a spatially and chemically complex microenvironment in the female reproductive tract. This process is often conceptualized as a competitive race, but is better understood as a collectiv...

  • Article
  • Open Access
1,079 Views
24 Pages

17 May 2025

This paper proposes a fixed-time formation-tracking control problem for a heterogeneous multi-agent system (MAS) consisting of six unmanned aerial vehicles (UAVs) and three unmanned ground vehicles (UGVs) under actuator attacks, external disturbances...

  • Article
  • Open Access
2,091 Views
19 Pages

17 May 2025

This paper investigates the construction of confidence intervals for multiple change points in linear regression models. First, we detect multiple change points by performing variable selection on blocks of the input sequence; second, we re-estimate...

  • Article
  • Open Access
1 Citations
877 Views
12 Pages

Using Nearest-Neighbor Distributions to Quantify Machine Learning of Materials’ Microstructures

  • Jeffrey M. Rickman,
  • Katayun Barmak,
  • Matthew J. Patrick and
  • Godfred Adomako Mensah

17 May 2025

Machine learning strategies for the semantic segmentation of materials’ micrographs, such as U-Net, have been employed in recent years to enable the automated identification of grain-boundary networks in polycrystals. For example, most recently...

  • Article
  • Open Access
4 Citations
1,577 Views
22 Pages

17 May 2025

Image forgery localization is critical in defending against the malicious manipulation of image content, and is attracting increasing attention worldwide. In this paper, we propose a Dual-domain Fusion Swin Transformer U-Net (DFST-UNet) for image for...

  • Article
  • Open Access
622 Views
18 Pages

Investigation of the Internal Structure of Hard-to-Reach Objects Using a Hybrid Algorithm on the Example of Walls

  • Rafał Brociek,
  • Józef Szczotka,
  • Mariusz Pleszczyński,
  • Francesca Nanni and
  • Christian Napoli

16 May 2025

The article presents research on the application of computed tomography with an incomplete dataset to the problem of examining the internal structure of walls. The case of incomplete information in computed tomography often occurs in various applicat...

  • Article
  • Open Access
1 Citations
1,754 Views
19 Pages

16 May 2025

With the acceleration of globalization, the connections between emerging market economies are becoming increasingly intricate, making it crucial to understand the mechanisms of risk transmission. This study employs the transfer entropy model to analy...

  • Article
  • Open Access
2 Citations
1,028 Views
23 Pages

Exergetic Analysis and Design of a Mechanical Compression Stage—Application for a Cryogenic Air Separation Plant

  • Adalia Andreea Percembli (Chelmuș),
  • Arthur Dupuy,
  • Lavinia Grosu,
  • Daniel Dima and
  • Alexandru Dobrovicescu

16 May 2025

This study focuses on the compression area of a cryogenic air separation unit (ASU). The mechanism of exergy consumption in the compressor was revealed. The influence of the compression ratio and of the isentropic efficiency per stage give arguments...

  • Article
  • Open Access
1 Citations
1,208 Views
10 Pages

16 May 2025

In the present paper, we discuss the thermodynamic and dynamic phase transition properties of the kinetic Blume–Capel model with spin-1, defined on non-regular lattices, namely decorated simple cubic, decorated triangular, and decorated square...

  • Feature Paper
  • Article
  • Open Access
948 Views
15 Pages

15 May 2025

We present a simple argument to derive the transformation of the quantum stochastic calculus formalism between inertial observers and derive the quantum open system dynamics for a system moving in a vacuum (or, more generally, a coherent) quantum fie...

  • Feature Paper
  • Article
  • Open Access
1 Citations
820 Views
23 Pages

15 May 2025

The exact response theory based on the Dissipation Function applies to general dynamical systems and has yielded excellent results in various applications. In this article, we propose a method to apply it to quantum mechanics. In many quantum systems...

  • Article
  • Open Access
2 Citations
2,035 Views
29 Pages

A Novel Entropy-Based Approach for Thermal Image Segmentation Using Multilevel Thresholding

  • Thaweesak Trongtirakul,
  • Karen Panetta,
  • Artyom M. Grigoryan and
  • Sos S. Agaian

14 May 2025

Image segmentation is a fundamental challenge in computer vision, transforming complex image representations into meaningful, analyzable components. While entropy-based multilevel thresholding techniques, including Otsu, Shannon, fuzzy, Tsallis, Reny...

  • Article
  • Open Access
1 Citations
1,812 Views
15 Pages

14 May 2025

We revisit the question of the existence of a potential function, the Cole–Hopf transform of the stationary measure, for nonequilibrium steady states, in particular those found in active matter systems. This has been the subject of ongoing rese...

  • Article
  • Open Access
1,435 Views
39 Pages

14 May 2025

In everyday scenarios, there are many challenges involving multi-objective optimization. As the count of objective functions rises to four or beyond, the problem’s complexity intensifies considerably, often making it challenging for traditional...

  • Article
  • Open Access
3 Citations
2,006 Views
22 Pages

14 May 2025

To examine the spillover of tail-risk information across global stock markets, we select nine major stock markets for the period spanning from June 2014 to May 2024 as the sample data. First, we employ effective Rényi transfer entropy to measu...

  • Article
  • Open Access
1 Citations
2,208 Views
18 Pages

14 May 2025

Power operates across multiple scales, from physical action to complex social dynamics, and is constrained by fundamental principles. In the social realm, power is shaped by interactions and cognitive capacity: socially-facilitated empowerment enhanc...

  • Article
  • Open Access
946 Views
22 Pages

13 May 2025

Non-terminal and terminal events in semi-competing risks data are typically associated and may be influenced by covariates. We employed regression modeling for semi-competing risks data under a copula-based framework to evaluate the effects of covari...

  • Article
  • Open Access
1 Citations
1,132 Views
23 Pages

Design of Covert Communication Waveform Based on Phase Randomization

  • Wenjie Zhou,
  • Zhenyong Wang,
  • Jun Shi and
  • Qing Guo

13 May 2025

Covert wireless communication is designed to securely transmit hidden information between two devices. Its primary objective is to conceal the existence of transmitted data, rendering communication signals difficult for unauthorized parties to detect...

  • Article
  • Open Access
956 Views
46 Pages

Towards Nonlinearity: The p-Regularity Theory

  • Ewa Bednarczuk,
  • Olga Brezhneva,
  • Krzysztof Leśniewski,
  • Agnieszka Prusińska and
  • Alexey A. Tret’yakov

12 May 2025

We present recent advances in the analysis of nonlinear problems involving singular (degenerate) operators. The results are obtained within the framework of p-regularity theory, which has been successfully developed over the past four decades. We ill...

  • Article
  • Open Access
3 Citations
1,638 Views
21 Pages

12 May 2025

Current methods for public opinion propagation prediction struggle to jointly model temporal dynamics, structural complexity, and dynamic node influence in evolving social networks. To overcome these limitations, this paper proposes a public opinion...

  • Article
  • Open Access
1 Citations
1,486 Views
18 Pages

Entropy of the Quantum–Classical Interface: A Potential Metric for Security

  • Sarah Chehade,
  • Joel A. Dawson,
  • Stacy Prowell and
  • Ali Passian

12 May 2025

Hybrid quantum–classical systems are emerging as key platforms in quantum computing, sensing, and communication technologies, but the quantum–classical interface (QCI)—the boundary enabling these systems—introduces unique and...

  • Article
  • Open Access
5 Citations
1,178 Views
20 Pages

A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding

  • Linqing Huang,
  • Qingye Huang,
  • Han Chen,
  • Shuting Cai,
  • Xiaoming Xiong and
  • Jian Yang

10 May 2025

Continuous advancements in digital image transmission technology within network environments have heightened the necessity for secure, convenient, and well-suited image encryption systems. Base64 encoding possesses the ability to convert raw data int...

  • Article
  • Open Access
4 Citations
901 Views
22 Pages

10 May 2025

Efficient extraction and classification of fault features remain critical challenges in planetary gearbox fault diagnosis. A fault diagnosis framework is proposed that integrates hierarchical refined composite multiscale fuzzy entropy (HRCMFE) for fe...

  • Article
  • Open Access
3 Citations
1,543 Views
18 Pages

Characterization of the Performance of an XXZ Three-Spin Quantum Battery

  • Suman Chand,
  • Dario Ferraro and
  • Niccolò Traverso Ziani

10 May 2025

Quantum batteries represent a new and promising technological application of quantum mechanics, offering the potential for enhanced energy storage and fast charging. In this work, we study a quantum battery composed of three two-level systems with XX...

  • Feature Paper
  • Article
  • Open Access
835 Views
16 Pages

9 May 2025

In this paper, an underlying perturbed Ricci flow construction is made within the metric operator space, originating from the Heisenberg dynamical equations, to formulate a method which appears to provide a new geometric approach for the geometric fo...

  • Review
  • Open Access
2,204 Views
57 Pages

9 May 2025

The explanation of thermodynamics through geometric models was initiated by seminal figures such as Carnot, Gibbs, Duhem, Reeb, and Carathéodory. Only recently, however, has the symplectic foliation model, introduced within the domain of geome...

  • Article
  • Open Access
979 Views
16 Pages

9 May 2025

We study the topological defects and spin structures of rotating SU(3) spin–orbit-coupled spin F=1 Bose–Einstein condensates (BECs) in an in-plane quadrupole field with ferromagnetic spin interaction, and the BECs is confined by a harmoni...

  • Article
  • Open Access
2 Citations
1,775 Views
22 Pages

Integrating Human Mobility Models with Epidemic Modeling: A Framework for Generating Synthetic Temporal Contact Networks

  • Diaoulé Diallo,
  • Jurij Schoenfeld,
  • René Schmieding,
  • Sascha Korf,
  • Martin J. Kühn and
  • Tobias Hecking

8 May 2025

High-resolution temporal contact networks are useful ingredients for realistic epidemic simulations. Existing solutions typically rely either on empirical studies that capture fine-grained interactions via Bluetooth or wearable sensors in confined se...

  • Article
  • Open Access
1,324 Views
21 Pages

Karatsuba Algorithm Revisited for 2D Convolution Computation Optimization

  • Qi Wang,
  • Jianghan Zhu,
  • Can He,
  • Shihang Wang,
  • Xingbo Wang,
  • Yuan Ren and
  • Terry Tao Ye

8 May 2025

Convolution plays a significant role in many scientific and technological computations, such as artificial intelligence and signal processing. Convolutional computations consist of many dot-product operations (multiplication–accumulation, or MA...

  • Article
  • Open Access
2 Citations
1,381 Views
18 Pages

8 May 2025

An estimate of the trigger effect of the proton flux on seismicity was obtained. The proton flux time series with a time step of 5 min, 2000–2024, was analyzed. In each time interval of 5 days, statistics of the proton flux time series were cal...

  • Article
  • Open Access
1 Citations
968 Views
19 Pages

Forensic Support for Abraham et al.’s BB Protocol

  • Qidi You,
  • Hongjian Yang,
  • Xiyong Zhang,
  • Xiaotong Jiang,
  • Kaiwen Guo and
  • Kexin Hu

8 May 2025

The consensus protocol is a fundamental building block in distributed computing and has been widely used in blockchain systems in recent years. Paxos, introduced by Lamport, stands out as one of the most widely adopted consensus protocols and has fou...

  • Article
  • Open Access
1 Citations
1,077 Views
20 Pages

7 May 2025

This paper proposes a feature-driven topology reconfiguration framework to enhance the resilience of Industrial Internet of Things (IIoT) systems against heterogeneous attacks. By dynamically partitioning IIoT into subnetworks based on localized atta...

  • Article
  • Open Access
1,701 Views
19 Pages

7 May 2025

This author is not a philosopher nor a historian of science, but an engineering thermodynamicist. In that regard, and in addition to various philosophical “why and how” treatises and existing historical analyses, the physical and logical...

  • Feature Paper
  • Article
  • Open Access
827 Views
12 Pages

Network and Phase Symmetries Reveal That Amplitude Dynamics Stabilize Decoupled Oscillator Clusters

  • Jeffrey Emenheiser,
  • Anastasiya Salova,
  • Jordan Snyder,
  • James P. Crutchfield and
  • Raissa M. D’Souza

7 May 2025

Oscillator networks display intricate synchronization patterns. Determining their stability typically requires incorporating the symmetries of the network coupling. Going beyond analyses that appeal only to a network’s automorphism group, we ex...

  • Article
  • Open Access
4 Citations
1,430 Views
26 Pages

6 May 2025

Various fields within biological and psychological inquiry recognize the significance of exploring long-range temporal correlations to study phenomena. However, these fields face challenges during this transition, primarily stemming from the impracti...

  • Article
  • Open Access
827 Views
10 Pages

6 May 2025

Permutation entropy is customarily implemented to quantify the intrinsic indeterminacy of complex time series, under the assumption that determinism manifests itself by lowering the (permutation) entropy of the resulting symbolic sequence. We expect...

  • Feature Paper
  • Article
  • Open Access
2 Citations
1,245 Views
13 Pages

Scalable Structure for Chiral Quantum Routing

  • Giovanni Ragazzi,
  • Simone Cavazzoni,
  • Claudia Benedetti,
  • Paolo Bordone and
  • Matteo G. A. Paris

5 May 2025

We address the problem of routing quantum and classical information from one sender to many possible receivers in a network. By employing the formalism of quantum walks, we describe the dynamics on a discrete structure based on a complete graph, wher...

  • Article
  • Open Access
2 Citations
2,534 Views
14 Pages

4 May 2025

Predicting the evolution of financial data, if at all possible, would be very beneficial in revealing the ways in which different aspects of a global environment can impact local economies. We employ an iterative stochastic differential equation that...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Entropy - ISSN 1099-4300