Entropy 您所在的位置:网站首页 journal和paper Entropy

Entropy

2024-07-14 14:20| 来源: 网络整理| 查看: 265

Journals Active Journals Find a Journal Proceedings Series Topics Information For Authors For Reviewers For Editors For Librarians For Publishers For Societies For Conference Organizers Open Access Policy Institutional Open Access Program Special Issues Guidelines Editorial Process Research and Publication Ethics Article Processing Charges Awards Testimonials Author Services Initiatives Sciforum MDPI Books Preprints.org Scilit SciProfiles Encyclopedia JAMS Proceedings Series About Overview Contact Careers News Press Blog Sign In / Sign Up Notice clear Notice

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

Continue Cancel clear

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

Journals Active Journals Find a Journal Proceedings Series Topics Information For Authors For Reviewers For Editors For Librarians For Publishers For Societies For Conference Organizers Open Access Policy Institutional Open Access Program Special Issues Guidelines Editorial Process Research and Publication Ethics Article Processing Charges Awards Testimonials Author Services Initiatives Sciforum MDPI Books Preprints.org Scilit SciProfiles Encyclopedia JAMS Proceedings Series About Overview Contact Careers News Press Blog Sign In / Sign Up Submit     4.9 2.1 Journals Entropy Computational Issues of Quantum Heat Engines with Non-Harmonic Working Medium Computational Issues of Quantum Heat Engines with Non-Harmonic Working Medium Side Information Design in Zero-Error Coding for Computing Side Information Design in Zero-Error Coding for Computing Non-Thermal Solar Wind Electron Velocity Distribution Function Non-Thermal Solar Wind Electron Velocity Distribution Function Chaos in Opinion-Driven Disease Dynamics Chaos in Opinion-Driven Disease Dynamics Statistical Mechanics of Electrowetting Statistical Mechanics of Electrowetting Journal Description Entropy Entropy is an international and interdisciplinary peer-reviewed open access journal of entropy and information studies, published monthly online by MDPI. The International Society for the Study of Information (IS4SI) and Spanish Society of Biomedical Engineering (SEIB) are affiliated with Entropy and their members receive a discount on the article processing charge. Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions. High Visibility: indexed within Scopus, SCIE (Web of Science), Inspec, PubMed, PMC, Astrophysics Data System, and other databases. Journal Rank: JCR - Q2 (Physics, Multidisciplinary) / CiteScore - Q1 (Mathematical Physics) Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 22.4 days after submission; acceptance to publication is undertaken in 2.8 days (median values for papers published in this journal in the first half of 2024). Recognition of Reviewers: reviewers who provide timely, thorough peer-review reports receive vouchers entitling them to a discount on the APC of their next publication in any MDPI journal, in appreciation of the work done. Testimonials: See what our editors and authors say about Entropy. Companion journals for Entropy include: Foundations and Thermo. Impact Factor: 2.1 (2023); 5-Year Impact Factor: 2.2 (2023) subject Imprint Information    get_app Journal Flyer     Open Access     ISSN: 1099-4300 Latest Articles 31 pages, 28677 KiB   Open AccessArticle Color Image Encryption Based on an Evolutionary Codebook and Chaotic Systems by Yuan Cao and Yinglei Song Entropy 2024, 26(7), 597; https://doi.org/10.3390/e26070597 - 12 Jul 2024 Abstract Encryption of images is an important method that can effectively improve the security and privacy of crucial image data. Existing methods generally encrypt an image with a combination of scrambling and encoding operations. Currently, many applications require highly secure results for image encryption. [...] Read more. Encryption of images is an important method that can effectively improve the security and privacy of crucial image data. Existing methods generally encrypt an image with a combination of scrambling and encoding operations. Currently, many applications require highly secure results for image encryption. New methods that can achieve improved randomness for both the scrambling and encoding processes in encryption are thus needed to further enhance the security of a cipher image. This paper proposes a new method that can securely encrypt color images. As the first step of the proposed method, a complete bit-level operation is utilized to scramble the binary bits in a color image to a full extent. For the second step, the bits in the scrambled image are processed with a sweeping operation to improve the encryption security. In the final step of encryption, a codebook that varies with evolutionary operations based on several chaotic systems is utilized to encrypt the partially encrypted image obtained in the second step. Experimental results on benchmark color images suggest that this new approach can securely encrypt color images and generate cipher images that remain secure under different types of attacks. The proposed approach is compared with several other state-of-the-art encryption approaches and the results show that it can achieve improved encryption security for cipher images. Experimental results thus suggest that this new approach can possibly be utilized practically in applications where color images need to be encrypted for content protection. Full article (This article belongs to the Special Issue Image Encryption and Privacy Protection Based on Chaotic Systems—Second Edition) ►▼ Show Figures

Figure 1

24 pages, 517 KiB   Open AccessReview A Survey on Error Exponents in Distributed Hypothesis Testing: Connections with Information Theory, Interpretations, and Applications by Sebastián Espinosa, Jorge F. Silva and Sandra Céspedes Entropy 2024, 26(7), 596; https://doi.org/10.3390/e26070596 - 12 Jul 2024 Abstract A central challenge in hypothesis testing (HT) lies in determining the optimal balance between Type I (false positive) and Type II (non-detection or false negative) error probabilities. Analyzing these errors’ exponential rate of convergence, known as error exponents, provides crucial insights into system [...] Read more. A central challenge in hypothesis testing (HT) lies in determining the optimal balance between Type I (false positive) and Type II (non-detection or false negative) error probabilities. Analyzing these errors’ exponential rate of convergence, known as error exponents, provides crucial insights into system performance. Error exponents offer a lens through which we can understand how operational restrictions, such as resource constraints and impairments in communications, affect the accuracy of distributed inference in networked systems. This survey presents a comprehensive review of key results in HT, from the foundational Stein’s Lemma to recent advancements in distributed HT, all unified through the framework of error exponents. We explore asymptotic and non-asymptotic results, highlighting their implications for designing robust and efficient networked systems, such as event detection through lossy wireless sensor monitoring networks, collective perception-based object detection in vehicular environments, and clock synchronization in distributed environments, among others. We show that understanding the role of error exponents provides a valuable tool for optimizing decision-making and improving the reliability of networked systems. Full article (This article belongs to the Special Issue Entropy-Based Statistics and Their Applications) ►▼ Show Figures

Figure 1

11 pages, 1490 KiB   Open AccessArticle Characteristic Extraction and Assessment Methods for Transformers DC Bias Caused by Metro Stray Currents by Aimin Wang, Sheng Lin, Guoxing Wu, Xiaopeng Li and Tao Wang Entropy 2024, 26(7), 595; https://doi.org/10.3390/e26070595 - 11 Jul 2024 Abstract Metro stray currents flowing into transformer-neutral points cause the high neutral DC and a transformer to operate in the DC bias state.Because neutral DC caused by stray current varies with time, the neutral DC value cannot be used as the only characteristic indicator [...] Read more. Metro stray currents flowing into transformer-neutral points cause the high neutral DC and a transformer to operate in the DC bias state.Because neutral DC caused by stray current varies with time, the neutral DC value cannot be used as the only characteristic indicator to evaluate the DC bias risk level. Thus, unified characteristic extraction and assessment methods are proposed to evaluate the DC bias risk of a transformer caused by stray current, considering the signals of transformer-neutral DC and vibration. In the characteristic extraction method, the primary characteristics are obtained by comparing the magnitude and frequency distributions of transformer-neutral DC and vibration with and without metro stray current invasion. By analyzing the correlation coefficients, the final characteristics are obtained by clustering the primary characteristics with high correlation. Then, the magnitude and frequency characteristics are extracted and used as indicators to evaluate the DC bias risk. Moreover, to avoid the influence of manual experience on indicator weights, the entropy weight method (EWM) is used to establish the assessment model. Finally, the proposed methods are applied based on the neutral DC and vibration test data of a certain transformer. The results show that the characteristic indicators can be extracted, and the transformer DC bias risk can be evaluated by using the proposed methods. Full article (This article belongs to the Special Issue Signal Processing for Fault Detection and Diagnosis in Electric Machines and Energy Conversion Systems) 11 pages, 207 KiB   Open AccessArticle Temporal Direction, Intuitionism and Physics by Yuval Dolev Entropy 2024, 26(7), 594; https://doi.org/10.3390/e26070594 - 11 Jul 2024 Abstract In a recent paper, Nicolas Gisin suggests that by conducting physics with intuitionistic rather than classical mathematics, rich temporality—that is, passage and tense, and specifically the future’s openness—can be incorporated into physics. Physics based on classical mathematics is tenseless and deterministic, and that, [...] Read more. In a recent paper, Nicolas Gisin suggests that by conducting physics with intuitionistic rather than classical mathematics, rich temporality—that is, passage and tense, and specifically the future’s openness—can be incorporated into physics. Physics based on classical mathematics is tenseless and deterministic, and that, so he holds, renders it incongruent with experience. According to Gisin, physics ought to represent the indeterminate nature of reality, and he proposes that intuitionistic mathematics is the key to succeeding in doing so. While I share his insistence on the reality of passage and tense and on the future being real and open, I argue that the amendment he offers does not work. I show that, its attunement to time notwithstanding, intuitionistic mathematics is as tenseless as classical mathematics and that physics is bound to remain tenseless regardless of the math it employs. There is much to learn about tensed time, but the task belongs to phenomenology and not to physics. Full article (This article belongs to the Special Issue Time and Temporal Asymmetries) 16 pages, 479 KiB   Open AccessArticle NodeFlow: Towards End-to-End Flexible Probabilistic Regression on Tabular Data by Patryk Wielopolski, Oleksii Furman and Maciej Zięba Entropy 2024, 26(7), 593; https://doi.org/10.3390/e26070593 - 11 Jul 2024 Abstract We introduce NodeFlow, a flexible framework for probabilistic regression on tabular data that combines Neural Oblivious Decision Ensembles (NODEs) and Conditional Continuous Normalizing Flows (CNFs). It offers improved modeling capabilities for arbitrary probabilistic distributions, addressing the limitations of traditional parametric approaches. In NodeFlow, [...] Read more. We introduce NodeFlow, a flexible framework for probabilistic regression on tabular data that combines Neural Oblivious Decision Ensembles (NODEs) and Conditional Continuous Normalizing Flows (CNFs). It offers improved modeling capabilities for arbitrary probabilistic distributions, addressing the limitations of traditional parametric approaches. In NodeFlow, the NODE captures complex relationships in tabular data through a tree-like structure, while the conditional CNF utilizes the NODE’s output space as a conditioning factor. The training process of NodeFlow employs standard gradient-based learning, facilitating the end-to-end optimization of the NODEs and CNF-based density estimation. This approach ensures outstanding performance, ease of implementation, and scalability, making NodeFlow an appealing choice for practitioners and researchers. Comprehensive assessments on benchmark datasets underscore NodeFlow’s efficacy, revealing its achievement of state-of-the-art outcomes in multivariate probabilistic regression setup and its strong performance in univariate regression tasks. Furthermore, ablation studies are conducted to justify the design choices of NodeFlow. In conclusion, NodeFlow’s end-to-end training process and strong performance make it a compelling solution for practitioners and researchers. Additionally, it opens new avenues for research and application in the field of probabilistic regression on tabular data. Full article (This article belongs to the Special Issue Deep Generative Modeling: Theory and Applications) ►▼ Show Figures

Figure 1

26 pages, 5970 KiB   Open AccessReview Superconducting Quantum Simulation for Many-Body Physics beyond Equilibrium by Yunyan Yao and Liang Xiang Entropy 2024, 26(7), 592; https://doi.org/10.3390/e26070592 - 11 Jul 2024 Abstract Quantum computing is an exciting field that uses quantum principles, such as quantum superposition and entanglement, to tackle complex computational problems. Superconducting quantum circuits, based on Josephson junctions, is one of the most promising physical realizations to achieve the long-term goal of building [...] Read more. Quantum computing is an exciting field that uses quantum principles, such as quantum superposition and entanglement, to tackle complex computational problems. Superconducting quantum circuits, based on Josephson junctions, is one of the most promising physical realizations to achieve the long-term goal of building fault-tolerant quantum computers. The past decade has witnessed the rapid development of this field, where many intermediate-scale multi-qubit experiments emerged to simulate nonequilibrium quantum many-body dynamics that are challenging for classical computers. Here, we review the basic concepts of superconducting quantum simulation and their recent experimental progress in exploring exotic nonequilibrium quantum phenomena emerging in strongly interacting many-body systems, e.g., many-body localization, quantum many-body scars, and discrete time crystals. We further discuss the prospects of quantum simulation experiments to truly solve open problems in nonequilibrium many-body systems. Full article (This article belongs to the Special Issue Quantum Computing in the NISQ Era) ►▼ Show Figures

Figure 1

14 pages, 3225 KiB   Open AccessArticle ESE-YOLOv8: A Novel Object Detection Algorithm for Safety Belt Detection during Working at Heights by Qirui Zhou, Dandan Liu and Kang An Entropy 2024, 26(7), 591; https://doi.org/10.3390/e26070591 - 11 Jul 2024 Abstract To address the challenges associated with supervising workers who wear safety belts while working at heights, this study proposes a solution involving the utilization of an object detection model to replace manual supervision. A novel object detection model, named ESE-YOLOv8, is introduced. The [...] Read more. To address the challenges associated with supervising workers who wear safety belts while working at heights, this study proposes a solution involving the utilization of an object detection model to replace manual supervision. A novel object detection model, named ESE-YOLOv8, is introduced. The integration of the Efficient Multi-Scale Attention (EMA) mechanism within this model enhances information entropy through cross-channel interaction and encodes spatial information into the channels, thereby enabling the model to obtain rich and significant information during feature extraction. By employing GSConv to reconstruct the neck into a slim-neck configuration, the computational load of the neck is reduced without the loss of information entropy, allowing the attention mechanism to function more effectively, thereby improving accuracy. During the model training phase, a regression loss function named the Efficient Intersection over Union (EIoU) is employed to further refine the model’s object localization capabilities. Experimental results demonstrate that the ESE-YOLOv8 model achieves an average precision of 92.7% at an IoU threshold of 50% and an average precision of 75.7% within the IoU threshold range of 50% to 95%. These results surpass the performance of the baseline model, the widely utilized YOLOv5 and demonstrate competitiveness among state-of-the-art models. Ablation experiments further confirm the effectiveness of the model’s enhancements. Full article (This article belongs to the Section Multidisciplinary Applications) ►▼ Show Figures

Figure 1

29 pages, 1014 KiB   Open AccessArticle A Conditional Privacy-Preserving Identity-Authentication Scheme for Federated Learning in the Internet of Vehicles by Shengwei Xu and Runsheng Liu Entropy 2024, 26(7), 590; https://doi.org/10.3390/e26070590 - 10 Jul 2024 Abstract With the rapid development of artificial intelligence and Internet of Things (IoT) technologies, automotive companies are integrating federated learning into connected vehicles to provide users with smarter services. Federated learning enables vehicles to collaboratively train a global model without sharing sensitive local data, [...] Read more. With the rapid development of artificial intelligence and Internet of Things (IoT) technologies, automotive companies are integrating federated learning into connected vehicles to provide users with smarter services. Federated learning enables vehicles to collaboratively train a global model without sharing sensitive local data, thereby mitigating privacy risks. However, the dynamic and open nature of the Internet of Vehicles (IoV) makes it vulnerable to potential attacks, where attackers may intercept or tamper with transmitted local model parameters, compromising their integrity and exposing user privacy. Although existing solutions like differential privacy and encryption can address these issues, they may reduce data usability or increase computational complexity. To tackle these challenges, we propose a conditional privacy-preserving identity-authentication scheme, CPPA-SM2, to provide privacy protection for federated learning. Unlike existing methods, CPPA-SM2 allows vehicles to participate in training anonymously, thereby achieving efficient privacy protection. Performance evaluations and experimental results demonstrate that, compared to state-of-the-art schemes, CPPA-SM2 significantly reduces the overhead of signing, verification and communication while achieving more security features. Full article (This article belongs to the Section Information Theory, Probability and Statistics) 29 pages, 6201 KiB   Open AccessArticle BPT-PLR: A Balanced Partitioning and Training Framework with Pseudo-Label Relaxed Contrastive Loss for Noisy Label Learning by Qian Zhang, Ge Jin, Yi Zhu, Hongjian Wei and Qiu Chen Entropy 2024, 26(7), 589; https://doi.org/10.3390/e26070589 - 10 Jul 2024 Abstract While collecting training data, even with the manual verification of experts from crowdsourcing platforms, eliminating incorrect annotations (noisy labels) completely is difficult and expensive. In dealing with datasets that contain noisy labels, over-parameterized deep neural networks (DNNs) tend to overfit, leading to poor [...] Read more. While collecting training data, even with the manual verification of experts from crowdsourcing platforms, eliminating incorrect annotations (noisy labels) completely is difficult and expensive. In dealing with datasets that contain noisy labels, over-parameterized deep neural networks (DNNs) tend to overfit, leading to poor generalization and classification performance. As a result, noisy label learning (NLL) has received significant attention in recent years. Existing research shows that although DNNs eventually fit all training data, they first prioritize fitting clean samples, then gradually overfit to noisy samples. Mainstream methods utilize this characteristic to divide training data but face two issues: class imbalance in the segmented data subsets and the optimization conflict between unsupervised contrastive representation learning and supervised learning. To address these issues, we propose a Balanced Partitioning and Training framework with Pseudo-Label Relaxed contrastive loss called BPT-PLR, which includes two crucial processes: a balanced partitioning process with a two-dimensional Gaussian mixture model (BP-GMM) and a semi-supervised oversampling training process with a pseudo-label relaxed contrastive loss (SSO-PLR). The former utilizes both semantic feature information and model prediction results to identify noisy labels, introducing a balancing strategy to maintain class balance in the divided subsets as much as possible. The latter adopts the latest pseudo-label relaxed contrastive loss to replace unsupervised contrastive loss, reducing optimization conflicts between semi-supervised and unsupervised contrastive losses to improve performance. We validate the effectiveness of BPT-PLR on four benchmark datasets in the NLL field: CIFAR-10/100, Animal-10N, and Clothing1M. Extensive experiments comparing with state-of-the-art methods demonstrate that BPT-PLR can achieve optimal or near-optimal performance. Full article (This article belongs to the Section Information Theory, Probability and Statistics) ►▼ Show Figures

Figure 1

18 pages, 4135 KiB   Open AccessArticle Effective Temporal Graph Learning via Personalized PageRank by Ziyu Liao, Tao Liu, Yue He and Longlong Lin Entropy 2024, 26(7), 588; https://doi.org/10.3390/e26070588 - 10 Jul 2024 Abstract Graph representation learning aims to map nodes or edges within a graph using low-dimensional vectors, while preserving as much topological information as possible. During past decades, numerous algorithms for graph representation learning have emerged. Among them, proximity matrix representation methods have been shown [...] Read more. Graph representation learning aims to map nodes or edges within a graph using low-dimensional vectors, while preserving as much topological information as possible. During past decades, numerous algorithms for graph representation learning have emerged. Among them, proximity matrix representation methods have been shown to exhibit excellent performance in experiments and scale to large graphs with millions of nodes. However, with the rapid development of the Internet, information interactions are happening at the scale of billions every moment. Most methods for similarity matrix factorization still focus on static graphs, leading to incomplete similarity descriptions and low embedding quality. To enhance the embedding quality of temporal graph learning, we propose a temporal graph representation learning model based on the matrix factorization of Time-constrained Personalize PageRank (TPPR) matrices. TPPR, an extension of personalized PageRank (PPR) that incorporates temporal information, better captures node similarities in temporal graphs. Based on this, we use Single Value Decomposition or Nonnegative Matrix Factorization to decompose TPPR matrices to obtain embedding vectors for each node. Through experiments on tasks such as link prediction, node classification, and node clustering across multiple temporal graphs, as well as a comparison with various experimental methods, we find that graph representation learning algorithms based on TPPR matrix factorization achieve overall outstanding scores on multiple temporal datasets, highlighting their effectiveness. Full article (This article belongs to the Special Issue Community Detection and Clustering Complex Networks and Their Applications) ►▼ Show Figures

Figure 1

12 pages, 377 KiB   Open AccessArticle Biswas–Chatterjee–Sen Model on Solomon Networks with Two Three-Dimensional Lattices by Gessineide Sousa Oliveira, Tayroni Alencar Alves, Gladstone Alencar Alves, Francisco Welington Lima and Joao Antonio Plascak Entropy 2024, 26(7), 587; https://doi.org/10.3390/e26070587 - 10 Jul 2024 Abstract The Biswas–Chatterjee–Sen (BChS) model of opinion dynamics has been studied on three-dimensional Solomon networks by means of extensive Monte Carlo simulations. Finite-size scaling relations for different lattice sizes have been used in order to obtain the relevant quantities of the system in the [...] Read more. The Biswas–Chatterjee–Sen (BChS) model of opinion dynamics has been studied on three-dimensional Solomon networks by means of extensive Monte Carlo simulations. Finite-size scaling relations for different lattice sizes have been used in order to obtain the relevant quantities of the system in the thermodynamic limit. From the simulation data it is clear that the BChS model undergoes a second-order phase transition. At the transition point, the critical exponents describing the behavior of the order parameter, the corresponding order parameter susceptibility, and the correlation length, have been evaluated. From the values obtained for these critical exponents one can confidently conclude that the BChS model in three dimensions is in a different universality class to the respective model defined on one- and two-dimensional Solomon networks, as well as in a different universality class as the usual Ising model on the same networks. Full article (This article belongs to the Special Issue Violations of Hyperscaling in Phase Transitions and Critical Phenomena—in Memory of Prof. Ralph Kenna) ►▼ Show Figures

Figure 1

20 pages, 931 KiB   Open AccessArticle Synergistic Dynamical Decoupling and Circuit Design for Enhanced Algorithm Performance on Near-Term Quantum Devices by Yanjun Ji and Ilia Polian Entropy 2024, 26(7), 586; https://doi.org/10.3390/e26070586 - 10 Jul 2024 Abstract Dynamical decoupling (DD) is a promising technique for mitigating errors in near-term quantum devices. However, its effectiveness depends on both hardware characteristics and algorithm implementation details. This paper explores the synergistic effects of dynamical decoupling and optimized circuit design in maximizing the performance [...] Read more. Dynamical decoupling (DD) is a promising technique for mitigating errors in near-term quantum devices. However, its effectiveness depends on both hardware characteristics and algorithm implementation details. This paper explores the synergistic effects of dynamical decoupling and optimized circuit design in maximizing the performance and robustness of algorithms on near-term quantum devices. By utilizing eight IBM quantum devices, we analyze how hardware features and algorithm design impact the effectiveness of DD for error mitigation. Our analysis takes into account factors such as circuit fidelity, scheduling duration, and hardware-native gate set. We also examine the influence of algorithmic implementation details, including specific gate decompositions, DD sequences, and optimization levels. The results reveal an inverse relationship between the effectiveness of DD and the inherent performance of the algorithm. Furthermore, we emphasize the importance of gate directionality and circuit symmetry in improving performance. This study offers valuable insights for optimizing DD protocols and circuit designs, highlighting the significance of a holistic approach that leverages both hardware features and algorithm design for the high-quality and reliable execution of near-term quantum algorithms. Full article (This article belongs to the Special Issue Quantum Computing in the NISQ Era) ►▼ Show Figures

Figure 1

17 pages, 1350 KiB   Open AccessArticle Optimization and Evaluation of Tourism Mascot Design Based on Analytic Hierarchy Process–Entropy Weight Method by Jing Wang, Fangmin Cheng and Chen Chen Entropy 2024, 26(7), 585; https://doi.org/10.3390/e26070585 - 9 Jul 2024 Abstract With the tourism industry continuing to boom, the importance of tourism mascots in promoting and publicizing tourism destinations is becoming increasingly prominent. Three core dimensions, market trend, appearance design, and audience feedback, are numerically investigated for deeply iterating tourism mascot design. Further, a [...] Read more. With the tourism industry continuing to boom, the importance of tourism mascots in promoting and publicizing tourism destinations is becoming increasingly prominent. Three core dimensions, market trend, appearance design, and audience feedback, are numerically investigated for deeply iterating tourism mascot design. Further, a subjective and objective evaluation weighting model based on the hierarchical analysis method (AHP) and entropy weighting method is proposed, aiming to utilize the advantages of these methods and ensure the entireness and correctness of results. Taking the mascots of six famous tourist attractions in Xi’an as an example, the feasibility and effectiveness of the evaluation model are verified. Data analysis and modeling results confirm that the three core evaluation indexes of scalability, innovation, and recommendation should be focused on in the design of tourism mascots in the three dimensions of market trends, appearance design, and audience feedback. The evaluation index scores are 0.1235, 0.1170, and 0.1123, respectively, which further illustrates the priority of mascot design. The evaluation model constructed by the research provides decision-makers with a comprehensive evaluation tool from the perspective of tourist experience, and also effectively assists the optimization process of mascot design. In addition, the model has good versatility and adaptability in structural design and evaluation logic and can be widely used in the optimization and evaluation research of brand mascots. Full article (This article belongs to the Section Multidisciplinary Applications) ►▼ Show Figures

Figure 1

17 pages, 2914 KiB   Open AccessArticle Adaptive Segmented Aggregation and Rate Assignment Techniques for Flexible-Length Polar Codes by Souradip Saha, Shubham Mahajan, Marc Adrat and Wolfgang Gerstacker Entropy 2024, 26(7), 584; https://doi.org/10.3390/e26070584 (registering DOI) - 9 Jul 2024 Abstract Polar codes have garnered a lot of attention from the scientific community, owing to their low-complexity implementation and provable capacity achieving capability. They have been standardized to be used for encoding information on the control channels in 5G wireless networks due to their [...] Read more. Polar codes have garnered a lot of attention from the scientific community, owing to their low-complexity implementation and provable capacity achieving capability. They have been standardized to be used for encoding information on the control channels in 5G wireless networks due to their robustness for short codeword lengths. The conventional approach to generate polar codes is to recursively use 2×2 kernels and polarize channel capacities. This approach however, has a limitation of only having the ability to generate codewords of length Norig=2n form. In order to mitigate this limitation, multiple techniques have been developed, e.g., polarization kernels of larger sizes, multi-kernel polar codes, and downsizing techniques like puncturing or shortening. However, the availability of so many design options and parameters, in turn makes the choice of design parameters quite challenging. In this paper, the authors propose a novel polar code construction technique called Adaptive Segmented Aggregation which generates polar codewords of any arbitrary codeword length. This approach involves dividing the entire codeword into smaller segments that can be independently encoded and decoded, thereby aggregated for channel processing. Additionally a rate assignment methodology has been derived for the proposed technique, that is tuned to the design requirement. Full article (This article belongs to the Special Issue New Advances in Error-Correcting Codes) ►▼ Show Figures

Figure 1

15 pages, 10099 KiB   Open AccessArticle Separation and Extraction of Compound-Fault Signal Based on Multi-Constraint Non-Negative Matrix Factorization by Mengyang Wang, Wenbao Zhang, Mingzhen Shao and Guang Wang Entropy 2024, 26(7), 583; https://doi.org/10.3390/e26070583 (registering DOI) - 9 Jul 2024 Abstract To solve the separation of multi-source signals and detect their features from a single channel, a signal separation method using multi-constraint non-negative matrix factorization (NMF) is proposed. In view of the existing NMF algorithm not performing well in the underdetermined blind source separation, [...] Read more. To solve the separation of multi-source signals and detect their features from a single channel, a signal separation method using multi-constraint non-negative matrix factorization (NMF) is proposed. In view of the existing NMF algorithm not performing well in the underdetermined blind source separation, the β-divergence constraints and determinant constraints are introduced in the NMF algorithm, which can enhance local feature information and reduce redundant components by constraining the objective function. In addition, the Sine-bell window function is selected as the processing method for short-time Fourier transform (STFT), and it can preserve the overall feature distribution of the original signal. The original vibration signal is first transformed into time–frequency domain with the STFT, which describes the local characteristic of the signal from the time–frequency distribution. Then, the multi-constraint NMF is applied to reduce the dimensionality of the data and separate feature components in the low dimensional space. Meanwhile, the parameter WK is constructed to filter the reconstructed signal that recombined with the feature component in the time domain. Ultimately, the separated signals will be subjected to envelope spectrum analysis to detect fault features. The simulated and experimental results indicate the effectiveness of the proposed approach, which can realize the separation of multi-source signals and their fault diagnosis of bearings. In addition, it is also confirmed that the proposed method, juxtaposed with the NMF algorithm of the traditional objective function, is more applicable for compound fault diagnosis of the rotating machinery. Full article (This article belongs to the Special Issue Signal Processing for Fault Detection and Diagnosis in Electric Machines and Energy Conversion Systems) ►▼ Show Figures

Figure 1

13 pages, 270 KiB   Open AccessPerspective Active Inference for Learning and Development in Embodied Neuromorphic Agents by Sarah Hamburg, Alejandro Jimenez Rodriguez, Aung Htet and Alessandro Di Nuovo Entropy 2024, 26(7), 582; https://doi.org/10.3390/e26070582 - 9 Jul 2024 Abstract Taking inspiration from humans can help catalyse embodied AI solutions for important real-world applications. Current human-inspired tools include neuromorphic systems and the developmental approach to learning. However, this developmental neurorobotics approach is currently lacking important frameworks for human-like computation and learning. We propose [...] Read more. Taking inspiration from humans can help catalyse embodied AI solutions for important real-world applications. Current human-inspired tools include neuromorphic systems and the developmental approach to learning. However, this developmental neurorobotics approach is currently lacking important frameworks for human-like computation and learning. We propose that human-like computation is inherently embodied, with its interface to the world being neuromorphic, and its learning processes operating across different timescales. These constraints necessitate a unified framework: active inference, underpinned by the free energy principle (FEP). Herein, we describe theoretical and empirical support for leveraging this framework in embodied neuromorphic agents with autonomous mental development. We additionally outline current implementation approaches (including toolboxes) and challenges, and we provide suggestions for next steps to catalyse this important field. Full article (This article belongs to the Special Issue From Functional Imaging to Free Energy—Dedicated to Professor Karl Friston on the Occasion of His 65th Birthday) 19 pages, 520 KiB   Open AccessArticle Non-Equilibrium Enhancement of Classical Information Transmission by Qian Zeng and Jin Wang Entropy 2024, 26(7), 581; https://doi.org/10.3390/e26070581 - 8 Jul 2024 Abstract Information transmission plays a crucial role across various fields, including physics, engineering, biology, and society. The efficiency of this transmission is quantified by mutual information and its associated information capacity. While studies in closed systems have yielded significant progress, understanding the impact of [...] Read more. Information transmission plays a crucial role across various fields, including physics, engineering, biology, and society. The efficiency of this transmission is quantified by mutual information and its associated information capacity. While studies in closed systems have yielded significant progress, understanding the impact of non-equilibrium effects on open systems remains a challenge. These effects, characterized by the exchange of energy, information, and materials with the external environment, can influence both mutual information and information capacity. Here, we delve into this challenge by exploring non-equilibrium effects using the memoryless channel model, a cornerstone of information channel coding theories and methodology development. Our findings reveal that mutual information exhibits a convex relationship with non-equilibriumness, quantified by the non-equilibrium strength in transmission probabilities. Notably, channel information capacity is enhanced by non-equilibrium effects. Furthermore, we demonstrate that non-equilibrium thermodynamic cost, characterized by the entropy production rate, can actually improve both mutual information and information channel capacity, leading to a boost in overall information transmission efficiency. Our numerical results support our conclusions. Full article (This article belongs to the Collection Disorder and Biological Physics) ►▼ Show Figures

Figure 1

16 pages, 418 KiB   Open AccessArticle A Critical Candidate Node-Based Attack Model of Network Controllability by Wenli Huang, Liang Chen and Junli Li Entropy 2024, 26(7), 580; https://doi.org/10.3390/e26070580 - 8 Jul 2024 Abstract The controllability of complex networks is a core issue in network research. Assessing the controllability robustness of networks under destructive attacks holds significant practical importance. This paper studies the controllability of networks from the perspective of malicious attacks. A novel attack model is [...] Read more. The controllability of complex networks is a core issue in network research. Assessing the controllability robustness of networks under destructive attacks holds significant practical importance. This paper studies the controllability of networks from the perspective of malicious attacks. A novel attack model is proposed to evaluate and challenge network controllability. This method disrupts network controllability with high precision by identifying and targeting critical candidate nodes. The model is compared with traditional attack methods, including degree-based, betweenness-based, closeness-based, pagerank-based, and hierarchical attacks. Results show that the model outperforms these methods in both disruption effectiveness and computational efficiency. Extensive experiments on both synthetic and real-world networks validate the superior performance of this approach. This study provides valuable insights for identifying key nodes crucial for maintaining network controllability. It also offers a solid framework for enhancing network resilience against malicious attacks. Full article (This article belongs to the Section Complexity) ►▼ Show Figures

Figure 1

19 pages, 2258 KiB   Open AccessArticle Social Network Forensics Analysis Model Based on Network Representation Learning by Kuo Zhao, Huajian Zhang, Jiaxin Li, Qifu Pan, Li Lai, Yike Nie and Zhongfei Zhang Entropy 2024, 26(7), 579; https://doi.org/10.3390/e26070579 - 7 Jul 2024 Abstract The rapid evolution of computer technology and social networks has led to massive data generation through interpersonal communications, necessitating improved methods for information mining and relational analysis in areas such as criminal activity. This paper introduces a Social Network Forensic Analysis model that [...] Read more. The rapid evolution of computer technology and social networks has led to massive data generation through interpersonal communications, necessitating improved methods for information mining and relational analysis in areas such as criminal activity. This paper introduces a Social Network Forensic Analysis model that employs network representation learning to identify and analyze key figures within criminal networks, including leadership structures. The model incorporates traditional web forensics and community algorithms, utilizing concepts such as centrality and similarity measures and integrating the Deepwalk, Line, and Node2vec algorithms to map criminal networks into vector spaces. This maintains node features and structural information that are crucial for the relational analysis. The model refines node relationships through modified random walk sampling, using BFS and DFS, and employs a Continuous Bag-of-Words with Hierarchical Softmax for node vectorization, optimizing the value distribution via the Huffman tree. Hierarchical clustering and distance measures (cosine and Euclidean) were used to identify the key nodes and establish a hierarchy of influence. The findings demonstrate the effectiveness of the model in accurately vectorizing nodes, enhancing inter-node relationship precision, and optimizing clustering, thereby advancing the tools for combating complex criminal networks. Full article (This article belongs to the Section Complexity) ►▼ Show Figures

Figure 1

16 pages, 673 KiB   Open AccessArticle Data-Driven Identification of Stroke through Machine Learning Applied to Complexity Metrics in Multimodal Electromyography and Kinematics by Francesco Romano, Damiano Formenti, Daniela Cardone, Emanuele Francesco Russo, Paolo Castiglioni, Giampiero Merati, Arcangelo Merla and David Perpetuini Entropy 2024, 26(7), 578; https://doi.org/10.3390/e26070578 - 7 Jul 2024 Abstract A stroke represents a significant medical condition characterized by the sudden interruption of blood flow to the brain, leading to cellular damage or death. The impact of stroke on individuals can vary from mild impairments to severe disability. Treatment for stroke often focuses [...] Read more. A stroke represents a significant medical condition characterized by the sudden interruption of blood flow to the brain, leading to cellular damage or death. The impact of stroke on individuals can vary from mild impairments to severe disability. Treatment for stroke often focuses on gait rehabilitation. Notably, assessing muscle activation and kinematics patterns using electromyography (EMG) and stereophotogrammetry, respectively, during walking can provide information regarding pathological gait conditions. The concurrent measurement of EMG and kinematics can help in understanding disfunction in the contribution of specific muscles to different phases of gait. To this aim, complexity metrics (e.g., sample entropy; approximate entropy; spectral entropy) applied to EMG and kinematics have been demonstrated to be effective in identifying abnormal conditions. Moreover, the conditional entropy between EMG and kinematics can identify the relationship between gait data and muscle activation patterns. This study aims to utilize several machine learning classifiers to distinguish individuals with stroke from healthy controls based on kinematics and EMG complexity measures. The cubic support vector machine applied to EMG metrics delivered the best classification results reaching 99.85% of accuracy. This method could assist clinicians in monitoring the recovery of motor impairments for stroke patients. Full article (This article belongs to the Special Issue Entropy and Information in Biological Systems) ►▼ Show Figures

Figure 1

More Articles... entropy-logo Submit to Entropy Review for Entropy Share Journal Menu ► ▼ Journal Menu Entropy Home Aims & Scope Editorial Board Reviewer Board Topical Advisory Panel Video Exhibition Instructions for Authors Special Issues Topics Sections & Collections Article Processing Charge Indexing & Archiving Editor’s Choice Articles Most Cited & Viewed Journal Statistics Journal History Journal Awards Society Collaborations Conferences Editorial Office Journal Browser ► ▼ Journal Browser arrow_forward_ios Forthcoming issue arrow_forward_ios Current issue Vol. 26 (2024) Vol. 25 (2023) Vol. 24 (2022) Vol. 23 (2021) Vol. 22 (2020) Vol. 21 (2019) Vol. 20 (2018) Vol. 19 (2017) Vol. 18 (2016) Vol. 17 (2015) Vol. 16 (2014) Vol. 15 (2013) Vol. 14 (2012) Vol. 13 (2011) Vol. 12 (2010) Vol. 11 (2009) Vol. 10 (2008) Vol. 9 (2007) Vol. 8 (2006) Vol. 7 (2005) Vol. 6 (2004) Vol. 5 (2003) Vol. 4 (2002) Vol. 3 (2001) Vol. 2 (2000) Vol. 1 (1999) Highly Accessed Articles View More... Latest Books More Books and Reprints... E-Mail Alert News 12 July 2024 Entropy Student Awards for International School and Conference on Network Science (NetSci 2024)—Winners Announced 10 July 2024 MDPI's Newly Launched Journals in June 2024 3 July 2024 Entropy Best Poster Award for Quantum Information and Probability: From Foundations to Engineering (QIP24)—Winners Announced More News & Announcements... Topics Propose a Topic Topic in Actuators, Applied Sciences, Entropy Thermodynamics and Heat Transfers in Vacuum Tube Trains (Hyperloop) Topic Editors: Suyong Choi, Minki Cho, Jungyoul LimDeadline: 30 July 2024 Topic in Entropy, Fractal Fract, Dynamics, Symmetry, Algorithms Recent Trends in Nonlinear, Chaotic and Complex Systems Topic Editors: Christos Volos, Karthikeyan Rajagopal, Sajad Jafari, Jacques Kengne, Jesus M. Munoz-PachecoDeadline: 30 August 2024 Topic in Entropy, Fractal Fract, Dynamics, Mathematics, Computation, Axioms Advances in Nonlinear Dynamics: Methods and Applications Topic Editors: Ravi P. Agarwal, Maria Alessandra RagusaDeadline: 20 October 2024 Topic in BDCC, Entropy, Information, MCA, Mathematics New Advances in Granular Computing and Data Mining Topic Editors: Xibei Yang, Bin Xie, Pingxin Wang, Hengrong JuDeadline: 30 October 2024 More Topics loading... Conferences Announce Your Conference 22–26 November 2024 2024 International Conference on Science and Engineering of Electronics (ICSEE'2024) 22–26 July 2024 The Sixteenth Biennial IQSA Conference Quantum Structures 2024 2–6 September 2024 The Conference on Complex Systems 2024 (CCS’24) More Conferences... Special Issues Propose a Special Issue Special Issue in Entropy Information Theory for MIMO Systems Guest Editors: Lin Zhou, Lin BaiDeadline: 15 July 2024 Special Issue in Entropy Information-Theoretic Concepts in Physics Guest Editors: Michael Cuffaro, Stephan HartmannDeadline: 31 July 2024 Special Issue in Entropy Information-Theoretic Methods in Data Analytics Guest Editor: Kichun LeeDeadline: 17 August 2024 Special Issue in Entropy An Entropy Approach to the Structure and Performance of Interdependent Autonomous Human Machine Teams and Systems (A-HMT-S) Guest Editors: William Lawless, Donald Sofge, Daniel LofaroDeadline: 25 August 2024 More Special Issues Topical Collections Topical Collection in Entropy Social Sciences Collection Editor: Miguel A. Fuentes Topical Collection in Entropy Algorithmic Information Dynamics: A Computational Approach to Causality from Cells to Networks Collection Editors: Hector Zenil, Felipe Abrahão Topical Collection in Entropy Wavelets, Fractals and Information Theory Collection Editor: Carlo Cattani Topical Collection in Entropy Entropy in Image Analysis Collection Editor: Amelia Carolina Sparavigna More Topical Collections Entropy, EISSN 1099-4300, Published by MDPI RSS Content Alert Further Information Article Processing Charges Pay an Invoice Open Access Policy Contact MDPI Jobs at MDPI Guidelines For Authors For Reviewers For Editors For Librarians For Publishers For Societies For Conference Organizers MDPI Initiatives Sciforum MDPI Books Preprints.org Scilit SciProfiles Encyclopedia JAMS Proceedings Series Follow MDPI LinkedIn Facebook Twitter MDPI © 1996-2024 MDPI (Basel, Switzerland) unless otherwise stated Disclaimer Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. Terms and Conditions Privacy Policy We use cookies on our website to ensure you get the best experience. Read more about our cookies here. Accept Share Link Copy clear Share https://www.mdpi.com/journal/entropy clear Back to TopTop


【本文地址】

公司简介

联系我们

今日新闻

    推荐新闻

    专题文章
      CopyRight 2018-2019 实验室设备网 版权所有