Skip Content
You are currently on the new version of our website. Access the old version .

Entropy, Volume 17, Issue 1

2015 January - 25 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (25)

  • Letter
  • Open Access
5,371 Views
6 Pages

On an Objective Basis for the Maximum Entropy Principle

  • David J. Miller and
  • Hossein Soleimani

19 January 2015

In this letter, we elaborate on some of the issues raised by a recent paper by Neapolitan and Jiang concerning the maximum entropy (ME) principle and alternative principles for estimating probabilities consistent with known, measured constraint infor...

  • Article
  • Open Access
6 Citations
7,618 Views
18 Pages

Entropy, Age and Time Operator

  • Ilias Gialampoukidis and
  • Ioannis Antoniou

19 January 2015

The time operator and internal age are intrinsic features of entropy producing innovation processes. The innovation spaces at each stage are the eigenspaces of the time operator. The internal age is the average innovation time, analogous to lifetime...

  • Article
  • Open Access
3 Citations
7,321 Views
13 Pages

19 January 2015

The frequency distribution of surnames turns out to be a relevant issue not only in historical demography but also in population biology, and especially in genetics, since surnames tend to behave like neutral genes and propagate like Y chromosomes. T...

  • Article
  • Open Access
47 Citations
11,519 Views
33 Pages

A Recipe for the Estimation of Information Flow in a Dynamical System

  • Deniz Gencaga,
  • Kevin H. Knuth and
  • William B. Rossow

19 January 2015

Information-theoretic quantities, such as entropy and mutual information (MI), can be used to quantify the amount of information needed to describe a dataset or the information shared between two datasets. In the case of a dynamical system, the behav...

  • Article
  • Open Access
30 Citations
7,422 Views
12 Pages

19 January 2015

In this paper, we propose a novel two-stage rumor spreading Susceptible-Infected-Authoritative-Removed (SIAR) model for complex homogeneous and heterogeneous networks. The interaction Markov chains (IMC) mean-field equations based on the SIAR model a...

  • Article
  • Open Access
15 Citations
6,545 Views
22 Pages

14 January 2015

This paper is concerned with the robust H finite-time control for discrete delayed nonlinear systems with Markovian jumps and external disturbances. It is usually assumed that the disturbance affects the system states and outputs with the same influ...

  • Article
  • Open Access
6 Citations
7,420 Views
16 Pages

Message Authentication over Noisy Channels

  • Fanfan Zheng,
  • Zhiqing Xiao,
  • Shidong Zhou,
  • Jing Wang and
  • Lianfen Huang

14 January 2015

The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework...

  • Article
  • Open Access
38 Citations
6,742 Views
17 Pages

14 January 2015

In many situations, in all branches of physics, one encounters the power-like behavior of some variables, which is best described by a Tsallis distribution characterized by a nonextensivity parameter q and scale parameter T. However, there exist expe...

  • Article
  • Open Access
9 Citations
7,092 Views
42 Pages

13 January 2015

Information geometric optimization (IGO) is a general framework for stochastic optimization problems aiming at limiting the influence of arbitrary parametrization choices: the initial problem is transformed into the optimization of a smooth function...

  • Article
  • Open Access
34 Citations
8,025 Views
13 Pages

Multiscale Entropy Analysis of Heart Rate Variability for Assessing the Severity of Sleep Disordered Breathing

  • Wen-Yao Pan,
  • Mao-Chang Su,
  • Hsien-Tsai Wu,
  • Meng-Chih Lin,
  • I-Ting Tsai and
  • Cheuk-Kwan Sun

12 January 2015

Obstructive sleep apnea (OSA) is an independent cardiovascular risk factor to which autonomic nervous dysfunction has been reported to be an important contributor. Ninety subjects recruited from the sleep center of a single medical center were divide...

  • Article
  • Open Access
38 Citations
8,501 Views
20 Pages

12 January 2015

In this study, a four stroke four cylinder direct injection CI engine was run using three different injection pressures. In all measurements, the fuel quantity per cycle, the pre injection and main injection timing, the boost pressure and the engine...

  • Article
  • Open Access
9 Citations
5,201 Views
13 Pages

12 January 2015

This work is devoted to the development of a theoretical approach for the calculation of entropy in metals under plastic deformation. The thermodynamic analysis of the plastic deformation process allowed us to obtain the expression for determination...

  • Article
  • Open Access
131 Citations
12,011 Views
27 Pages

12 January 2015

In the framework of information dynamics, the temporal evolution of coupled systems can be studied by decomposing the predictive information about an assigned target system into amounts quantifying the information stored inside the system and the inf...

  • Article
  • Open Access
13 Citations
7,798 Views
17 Pages

9 January 2015

The 14 moments model for dense gases, introduced in the last few years by Arima, Taniguchi, Ruggeri and Sugiyama, is here extended up to 18 moments. They have found the closure of the balance equations up to a finite order with respect to equilibrium...

  • Article
  • Open Access
55 Citations
8,110 Views
16 Pages

8 January 2015

This paper proposes a new four-dimensional hyperchaotic map based on the Rabinovich system to realize chaotic encryption in higher dimension and improve the security. The chaotic sequences generated by Runge-Kutta method are combined with the chaotic...

  • Article
  • Open Access
3 Citations
7,779 Views
17 Pages

Deduction of Lorentz Transformations from Classical Thermodynamics

  • Angela M. Ares De Parga,
  • Fernado Angulo-Brown and
  • Gonzalo Ares De Parga

8 January 2015

The Lorentz transformations are obtained by assuming that the laws of classical thermodynamics are invariant under changes of inertial reference frames. As Maxwell equations are used in order to deduce a wave equation that shows the constancy of the...

  • Article
  • Open Access
43 Citations
14,087 Views
30 Pages

A Clustering Method Based on the Maximum Entropy Principle

  • Edwin Aldana-Bobadilla and
  • Angel Kuri-Morales

7 January 2015

Clustering is an unsupervised process to determine which unlabeled objects in a set share interesting properties. The objects are grouped into k subsets (clusters) whose elements optimize a proximity measure. Methods based on information theory have...

  • Article
  • Open Access
40 Citations
7,973 Views
19 Pages

Assessment of Time and Frequency Domain Entropies to Detect Sleep Apnoea in Heart Rate Variability Recordings from Men and Women

  • Gonzalo C. Gutiérrez-Tobal,
  • Daniel Álvarez,
  • Javier Gomez-Pilar,
  • Félix Del Campo and
  • Roberto Hornero

6 January 2015

Heart rate variability (HRV) provides useful information about heart dynamics both under healthy and pathological conditions. Entropy measures have shown their utility to characterize these dynamics. In this paper, we assess the ability of spectral e...

  • Article
  • Open Access
65 Citations
8,623 Views
21 Pages

5 January 2015

Recently, progressive hybrid censoring schemes have become quite popular in a life-testing problem and reliability analysis. However, the limitation of the progressive hybrid censoring scheme is that it cannot be applied when few failures occur befor...

  • Article
  • Open Access
10 Citations
9,183 Views
28 Pages

31 December 2014

Network security requires real-time monitoring of network traffic in order to detect new and unexpected attacks. Attack detection methods based on deep packet inspection are time consuming and costly, due to their high computational demands. This pap...

  • Article
  • Open Access
22 Citations
6,425 Views
13 Pages

30 December 2014

This paper is concerned with the problem of finite-time synchronization in complex networks with stochastic noise perturbations. By using a novel finite-time ℒ -operator differential inequality and other inequality techniques, some novel sufficient c...

  • Article
  • Open Access
1 Citations
6,716 Views
27 Pages

23 December 2014

A popular approach in the investigation of the short-term behavior of a non-stationary time series is to assume that the time series decomposes additively into a long-term trend and short-term fluctuations. A first step towards investigating the shor...

  • Article
  • Open Access
47 Citations
7,741 Views
11 Pages

23 December 2014

In this paper, a new color image encryption algorithm based on a fractional-order hyperchaotic system is proposed. Firstly, four chaotic sequences are generated by a fractional-order hyperchaotic system. The parameters of such a system, together with...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Entropy - ISSN 1099-4300