[go: up one dir, main page]

Next Issue
Volume 20, February
Previous Issue
Volume 19, December
 
 
entropy-logo

Journal Browser

Journal Browser

Entropy, Volume 20, Issue 1 (January 2018) – 77 articles

Cover Story (view full-size image): Deltas are undergoing change due to natural and anthropogenic impacts, thus there is a need to model their evolution. Model validation ensures the results capture the system of interest. We use transfer entropy (TE), a measure of directional information transfer between variables, to quantify couplings between river discharge, tides, wind, and water levels at the Wax Lake Delta, LA, USA, and assess whether the model is able to reproduce these couplings. Multi-scale delta dynamics are captured using TE, gaining insight into model performance and needs for improvement. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
24 pages, 654 KiB  
Article
Macroscopic Internal Variables and Mesoscopic Theory: A Comparison Considering Liquid Crystals
by Christina Papenfuss and Wolfgang Muschik
Entropy 2018, 20(1), 81; https://doi.org/10.3390/e20010081 - 22 Jan 2018
Cited by 4 | Viewed by 4216
Abstract
Internal and mesoscopic variables differ fundamentally from each other: both are state space variables, but mesoscopic variables are additionally equipped with a distribution function introducing a statistical item into consideration which is missing in connection with internal variables. Thus, the alignment tensor of [...] Read more.
Internal and mesoscopic variables differ fundamentally from each other: both are state space variables, but mesoscopic variables are additionally equipped with a distribution function introducing a statistical item into consideration which is missing in connection with internal variables. Thus, the alignment tensor of the liquid crystal theory can be introduced as an internal variable or as one generated by a mesoscopic background using the microscopic director as a mesoscopic variable. Because the mesoscopic variable is part of the state space, the corresponding balance equations change into mesoscopic balances, and additionally an evolution equation of the mesoscopic distribution function appears. The flexibility of the mesoscopic concept is not only demonstrated for liquid crystals, but is also discussed for dipolar media and flexible fibers. Full article
(This article belongs to the Special Issue Phenomenological Thermodynamics of Irreversible Processes)
Show Figures

Figure 1

Figure 1
<p>The orientation distribution function (ODF) in the uniaxial and biaxial liquid crystalline phases. In the isotropic phase, all orientations are equally probable, whereas, in the liquid crystalline phases, the ODF is anisotropic.</p>
Full article ">Figure 2
<p>Time evolution for the crack-length distribution function for stepwise initial condition.</p>
Full article ">
7 pages, 243 KiB  
Article
Entanglement Entropy of the Spin-1 Condensates at Zero Temperature
by Zhibing Li, Yimin Liu, Wei Zheng and Chengguang Bao
Entropy 2018, 20(1), 80; https://doi.org/10.3390/e20010080 - 22 Jan 2018
Cited by 1 | Viewed by 3780
Abstract
For spin-1 condensates, the spatial degrees of freedom can be considered as being frozen at temperature zero, while the spin-degrees of freedom remain free. Under this condition, the entanglement entropy has been derived exactly with an analytical form. The entanglement entropy is found [...] Read more.
For spin-1 condensates, the spatial degrees of freedom can be considered as being frozen at temperature zero, while the spin-degrees of freedom remain free. Under this condition, the entanglement entropy has been derived exactly with an analytical form. The entanglement entropy is found to decrease monotonically with the increase of the magnetic polarization as expected. However, for the ground state in polar phase, an extremely steep fall of the entropy is found when the polarization emerges from zero. Then the fall becomes a gentle descent after the polarization exceeds a turning point. Full article
(This article belongs to the Special Issue Residual Entropy and Nonequilibrium States)
Show Figures

Figure 1

Figure 1
<p>(color online) The entanglement entropy <math display="inline"> <semantics> <msubsup> <mi>S</mi> <mrow> <mi>e</mi> <mi>e</mi> </mrow> <mrow> <mo stretchy="false">(</mo> <mn>1</mn> <mo stretchy="false">)</mo> </mrow> </msubsup> </semantics> </math> of the g.s. in polar phase against <math display="inline"> <semantics> <mrow> <mi>M</mi> <mo>/</mo> <mi>N</mi> </mrow> </semantics> </math>. The solid, dash, and dash-dot lines have <span class="html-italic">N</span> = 10<sup>2</sup>, 10<sup>3</sup>, and 10<sup>4</sup>, respectively.</p>
Full article ">Figure 2
<p>(color online) The entanglement entropy <math display="inline"> <semantics> <msubsup> <mi>S</mi> <mrow> <mi>e</mi> <mi>e</mi> </mrow> <mrow> <mo stretchy="false">(</mo> <mn>2</mn> <mo stretchy="false">)</mo> </mrow> </msubsup> </semantics> </math> of the g.s. in polar phase against <math display="inline"> <semantics> <mrow> <mi>M</mi> <mo>/</mo> <mi>N</mi> </mrow> </semantics> </math>. The solid, dash, and dash-dot lines have <span class="html-italic">N</span> = 10<sup>2</sup>, 10<sup>3</sup>, and 10<sup>4</sup>, respectively.</p>
Full article ">Figure 3
<p>(color online) The entanglement entropy <math display="inline"> <semantics> <msubsup> <mi>S</mi> <mrow> <mi>e</mi> <mi>e</mi> </mrow> <mrow> <mo stretchy="false">(</mo> <mn>1</mn> <mo stretchy="false">)</mo> </mrow> </msubsup> </semantics> </math> and <math display="inline"> <semantics> <msubsup> <mi>S</mi> <mrow> <mi>e</mi> <mi>e</mi> </mrow> <mrow> <mo stretchy="false">(</mo> <mn>2</mn> <mo stretchy="false">)</mo> </mrow> </msubsup> </semantics> </math> of the g.s. in ferromagnetic phase against <math display="inline"> <semantics> <mrow> <mi>M</mi> <mo>/</mo> <mi>N</mi> </mrow> </semantics> </math>. Curves for <span class="html-italic">N</span> = 10<sup>2</sup>, 10<sup>3</sup>, and 10<sup>4</sup> are plotted. Dependence on <span class="html-italic">N</span> is not observable.</p>
Full article ">
14 pages, 1207 KiB  
Article
A Newly Secure Solution to MIMOME OFDM-Based SWIPT Frameworks: A Two-Stage Stackelberg Game for a Multi-User Strategy
by Makan Zamanipour
Entropy 2018, 20(1), 79; https://doi.org/10.3390/e20010079 - 22 Jan 2018
Viewed by 4595
Abstract
The paper technically proposes a newly secure scheme for simultaneous wireless power and information transfer (SWIPT) frameworks. We take into account an orthogonal frequency division multiplexing (OFDM)-based game which is in relation to a multi-input multi-output multi-antenna Eavesdropper (MIMOME) strategy. The transceiver is [...] Read more.
The paper technically proposes a newly secure scheme for simultaneous wireless power and information transfer (SWIPT) frameworks. We take into account an orthogonal frequency division multiplexing (OFDM)-based game which is in relation to a multi-input multi-output multi-antenna Eavesdropper (MIMOME) strategy. The transceiver is generally able to witness the case imperfect channel state information (ICSI) at the transmitter side. Transferring power and information are conducted via orthogonally provided sub-carriers. We propose a two-step Stackelberg game to optimise the Utility Functions of both power and information parts. The price for the first stage (in connection with information) is the total power of the other sub-carriers over which the energy is supported. In this stage, the sum secrecy rate should be essentially maximised. The second level of the proposed Stackelberg game is in association with the energy part. In this stage, the price essentially is the total power of the other sub-carriers over which the information is transferred. In this stage, additionally, the total power transferred is fundamentally maximised. Subsequently, the optimally and near-optimally mathematical solutions are derived, for some special cases such as ICSI one. Finally, the simulations validate our scheme as well, authenticating our contribution’s tightness and efficiency. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

Figure 1
<p>MIMOME OFDM-based Transceiver in downlink.</p>
Full article ">Figure 2
<p>Secrecy capacity vs. iterations’ number.</p>
Full article ">Figure 3
<p>Secrecy capacity vs. the interception channel’s norm.</p>
Full article ">Figure 4
<p>Secrecy capacity vs. <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>N</mi> <mi>R</mi> <mo>(</mo> <mi>d</mi> <mi>B</mi> <mo>)</mo> </mrow> </semantics> </math>. (<b>a</b>) Complete <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>N</mi> <mi>R</mi> <mo>(</mo> <mi>d</mi> <mi>B</mi> <mo>)</mo> </mrow> </semantics> </math> regime; (<b>b</b>) Low <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>N</mi> <mi>R</mi> <mo>(</mo> <mi>d</mi> <mi>B</mi> <mo>)</mo> </mrow> </semantics> </math> regime.</p>
Full article ">Figure 5
<p>Cumulative distribution function vs. the secrecy capacity.</p>
Full article ">Figure 6
<p>Goodput vs. <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>N</mi> <mi>R</mi> <mo>(</mo> <mi>d</mi> <mi>B</mi> <mo>)</mo> </mrow> </semantics> </math>.</p>
Full article ">
8 pages, 653 KiB  
Article
Anomalous Advection-Dispersion Equations within General Fractional-Order Derivatives: Models and Series Solutions
by Xin Liang, Yu-Gui Yang, Feng Gao, Xiao-Jun Yang and Yi Xue
Entropy 2018, 20(1), 78; https://doi.org/10.3390/e20010078 - 22 Jan 2018
Cited by 6 | Viewed by 5174
Abstract
In this paper, an anomalous advection-dispersion model involving a new general Liouville–Caputo fractional-order derivative is addressed for the first time. The series solutions of the general fractional advection-dispersion equations are obtained with the aid of the Laplace transform. The results are given to [...] Read more.
In this paper, an anomalous advection-dispersion model involving a new general Liouville–Caputo fractional-order derivative is addressed for the first time. The series solutions of the general fractional advection-dispersion equations are obtained with the aid of the Laplace transform. The results are given to demonstrate the efficiency of the proposed formulations to describe the anomalous advection dispersion processes. Full article
(This article belongs to the Special Issue Wavelets, Fractals and Information Theory III)
Show Figures

Figure 1

Figure 1
<p>The mathematical model of the advection dispersion of the chemical pollutants in shale gas extraction involving general Liouville–Caputo fractional-order derivative of Wiman type.</p>
Full article ">Figure 2
<p>The concentration of chemical pollutants in the aquifers for the values <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics> </math> and 5, and the parameters <math display="inline"> <semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>c</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>ϖ</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>ϑ</mi> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 3
<p>The changes of the concentration of chemical pollutants in the aquifers for the values <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics> </math> and 5, and the parameters <math display="inline"> <semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>5</mn> <mo>,</mo> <mi>k</mi> <mo>=</mo> <mn>0.8</mn> <mo>,</mo> <mi>c</mi> <mo>=</mo> <mn>0.5</mn> <mo>,</mo> <mi>ρ</mi> <mo>=</mo> <mn>2</mn> <mo>,</mo> <mi>β</mi> <mo>=</mo> <mn>0.4</mn> <mo>,</mo> <mi>ϖ</mi> <mo>=</mo> <mn>0.5</mn> <mo>,</mo> <mi>ϑ</mi> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics> </math> in the spaces <math display="inline"> <semantics> <mrow> <mi>x</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>x</mi> <mo>=</mo> <mn>0.6</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>x</mi> <mo>=</mo> <mn>0.7</mn> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mi>x</mi> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 4
<p>The change plot of the concentration of chemical pollutants in the aquifers for the values <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics> </math> and 5, and the parameters <math display="inline"> <semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>5</mn> <mo>,</mo> <mi>k</mi> <mo>=</mo> <mn>0.8</mn> <mo>,</mo> <mi>c</mi> <mo>=</mo> <mn>0.5</mn> <mo>,</mo> <mi>ρ</mi> <mo>=</mo> <mn>2</mn> <mo>,</mo> <mi>β</mi> <mo>=</mo> <mn>0.4</mn> <mo>,</mo> <mi>ϖ</mi> <mo>=</mo> <mn>0.5</mn> <mo>,</mo> <mi>ϑ</mi> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics> </math> in the times <math display="inline"> <semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>2.5</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>2.6</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>2.7</mn> </mrow> </semantics> </math>, and <math display="inline"> <semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>2.8</mn> </mrow> </semantics> </math>.</p>
Full article ">
15 pages, 3113 KiB  
Article
Using Entropy in Web Usage Data Preprocessing
by Michal Munk and Lubomir Benko
Entropy 2018, 20(1), 67; https://doi.org/10.3390/e20010067 - 22 Jan 2018
Cited by 5 | Viewed by 5085
Abstract
The paper is focused on an examination of the use of entropy in the field of web usage mining. Entropy creates an alternative possibility of determining the ratio of auxiliary pages in the session identification using the Reference Length method. The experiment was [...] Read more.
The paper is focused on an examination of the use of entropy in the field of web usage mining. Entropy creates an alternative possibility of determining the ratio of auxiliary pages in the session identification using the Reference Length method. The experiment was conducted on two different web portals. The first log file was obtained from a course of virtual learning environment web portal. The second log file was received from the web portal with anonymous access. A comparison of the results of entropy estimation of the ratio of auxiliary pages and a sitemap estimation of the ratio of auxiliary pages showed that in the case of sitemap abundance, entropy could be a full-valued substitution for the estimate of the ratio of auxiliary pages. Full article
(This article belongs to the Special Issue Entropy-based Data Mining)
Show Figures

Figure 1

Figure 1
<p>Distribution of the variable <span class="html-italic">RLength</span>.</p>
Full article ">Figure 2
<p>Reference Length method.</p>
Full article ">Figure 3
<p>Application of data preparation to the log file of Virtual Learning Environment (VLE).</p>
Full article ">Figure 4
<p>Application of data preparation to the log file of web portal.</p>
Full article ">Figure 5
<p>Ratio of auxiliary and content pages based on different estimates of the ratio of auxiliary pages for VLE web portal.</p>
Full article ">Figure 6
<p>Ratio of auxiliary and content pages based on different estimates of the ratio of auxiliary pages for web portal with anonymous access.</p>
Full article ">Figure 7
<p>Algorithm of Reference Length method using Entropy.</p>
Full article ">
18 pages, 18367 KiB  
Article
Adaptive Diagnosis for Rotating Machineries Using Information Geometrical Kernel-ELM Based on VMD-SVD
by Zhipeng Wang, Limin Jia and Yong Qin
Entropy 2018, 20(1), 73; https://doi.org/10.3390/e20010073 - 21 Jan 2018
Cited by 29 | Viewed by 4915
Abstract
Rotating machineries often work under severe and variable operation conditions, which brings challenges to fault diagnosis. To deal with this challenge, this paper discusses the concept of adaptive diagnosis, which means to diagnose faults under variable operation conditions with self-adaptively and little prior [...] Read more.
Rotating machineries often work under severe and variable operation conditions, which brings challenges to fault diagnosis. To deal with this challenge, this paper discusses the concept of adaptive diagnosis, which means to diagnose faults under variable operation conditions with self-adaptively and little prior knowledge or human intervention. To this end, a novel algorithm is proposed, information geometrical extreme learning machine with kernel (IG-KELM). From the perspective of information geometry, the structure and Riemannian metric of Kernel-ELM is specified. Based on the geometrical structure, an IG-based conformal transformation is created to improve the generalization ability and self-adaptability of KELM. The proposed IG-KELM, in conjunction with variation mode decomposition (VMD) and singular value decomposition (SVD) is utilized for adaptive diagnosis: (1) VMD, as a new self-adaptive signal processing algorithm is used to decompose the raw signals into several intrinsic mode functions (IMFs). (2) SVD is used to extract the intrinsic characteristics from the matrix constructed with IMFs. (3) IG-KELM is used to diagnose faults under variable conditions self-adaptively with no requirement of prior knowledge or human intervention. Finally, the proposed method was applied on fault diagnosis of a bearing and hydraulic pump. The results show that the proposed method outperforms the conventional method by up to 7.25% and 7.78% respectively, in percentages of accuracy. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

Figure 1
<p>The architecture of ELM.</p>
Full article ">Figure 2
<p>The scheme of IG-KELM.</p>
Full article ">Figure 3
<p>500 training samples of simulation experiment.</p>
Full article ">Figure 4
<p>Optimization of parameters by using 5-fold cross-validation (CV) method.</p>
Full article ">Figure 5
<p>Comparison of test accuracy rates of KELM (blue curve) and IG-KELM (red curve) with the RBF kernel.</p>
Full article ">Figure 6
<p>Comparison of test accuracy rates of KELM (blue curve) and IG-KELM (red curve) with the Polynomial kernel.</p>
Full article ">Figure 7
<p>Experimental test rig in bearing data center.</p>
Full article ">Figure 8
<p>IMFs obtained by VMD from the normal signal.</p>
Full article ">Figure 9
<p>IMFs obtained by EMD from the normal signal.</p>
Full article ">Figure 10
<p>Singular values obtained by VMD-SVD.</p>
Full article ">Figure 11
<p>Singular values obtained by EMD-SVD.</p>
Full article ">Figure 12
<p>Experimental test rig of SCY hydraulic plunger pump.</p>
Full article ">
19 pages, 1072 KiB  
Article
Characterizing Normal and Pathological Gait through Permutation Entropy
by Massimiliano Zanin, David Gómez-Andrés, Irene Pulido-Valdeolivas, Juan Andrés Martín-Gonzalo, Javier López-López, Samuel Ignacio Pascual-Pascual and Estrella Rausell
Entropy 2018, 20(1), 77; https://doi.org/10.3390/e20010077 - 19 Jan 2018
Cited by 17 | Viewed by 5750
Abstract
Cerebral palsy is a physical impairment stemming from a brain lesion at perinatal time, most of the time resulting in gait abnormalities: the first cause of severe disability in childhood. Gait study, and instrumental gait analysis in particular, has been receiving increasing attention [...] Read more.
Cerebral palsy is a physical impairment stemming from a brain lesion at perinatal time, most of the time resulting in gait abnormalities: the first cause of severe disability in childhood. Gait study, and instrumental gait analysis in particular, has been receiving increasing attention in the last few years, for being the complex result of the interactions between different brain motor areas and thus a proxy in the understanding of the underlying neural dynamics. Yet, and in spite of its importance, little is still known about how the brain adapts to cerebral palsy and to its impaired gait and, consequently, about the best strategies for mitigating the disability. In this contribution, we present the hitherto first analysis of joint kinematics data using permutation entropy, comparing cerebral palsy children with a set of matched control subjects. We find a significant increase in the permutation entropy for the former group, thus indicating a more complex and erratic neural control of joints and a non-trivial relationship between the permutation entropy and the gait speed. We further show how this information theory measure can be used to train a data mining model able to forecast the child’s condition. We finally discuss the relevance of these results in clinical applications and specifically in the design of personalized medicine interventions. Full article
(This article belongs to the Special Issue Information Theory Applied to Physiological Signals)
Show Figures

Figure 1

Figure 1
<p>Probability distributions of the Permutation Entropy (PE), as calculated in control subjects and Cerebral Palsy (CP) patients, the latter including aggregated and disaggregated (w.r.t. the Gross Motor Function Classification System (GMFCS) scale) results. Rows, from top to bottom, respectively correspond to pelvis, hip, knee, ankle and forefoot; columns, from left to right, to the abduction-adduction, sagittal and rotational axes.</p>
Full article ">Figure 2
<p>Forest plots showing the beta coefficients of linear mixed models comparing gait PE values according to the patient’s GMFCS level. Squares represent the mean value of each beta coefficient and horizontal lines the corresponding <math display="inline"> <semantics> <mrow> <mn>95</mn> <mo>%</mo> </mrow> </semantics> </math> bias-corrected and accelerated bootstrap intervals. See main text and <a href="#sec4dot3-entropy-20-00077" class="html-sec">Section 4.3</a> for details.</p>
Full article ">Figure 3
<p>Permutation entropy as a function of the normalized walking speed, for control subjects (black dots) and CP patients (red dots). Each panel corresponds to the same joint/axis as in <a href="#entropy-20-00077-f001" class="html-fig">Figure 1</a>.</p>
Full article ">Figure 4
<p>Forest plots showing the beta coefficients of linear mixed models comparing gait PE values according to normalized walking speed (left panel), condition (using healthy as the reference, central panel) and the interaction of normalized walking speed with condition (right panel). The magnitudes of the effects are indicated on the X axis. Squares represent the mean values of each beta coefficient and horizontal lines the corresponding <math display="inline"> <semantics> <mrow> <mn>95</mn> <mo>%</mo> </mrow> </semantics> </math> bias-corrected and accelerated bootstrap intervals. See <a href="#sec4dot3-entropy-20-00077" class="html-sec">Section 4.3</a> for further details.</p>
Full article ">Figure 5
<p>Forest plots showing the beta coefficients of linear mixed models that measure the effect of PE on the Gait Deviation Index (GDI, left), the Global Profile Score (GPS, center) and elements of the Movement Analysis Profile (MAP, right). The magnitudes of the effects are indicated in the X axis. Squares represent the mean values of each beta coefficient and horizontal lines the corresponding <math display="inline"> <semantics> <mrow> <mn>95</mn> <mo>%</mo> </mrow> </semantics> </math> bias-corrected and accelerated bootstrap intervals. See <a href="#sec4dot3-entropy-20-00077" class="html-sec">Section 4.3</a> for further details.</p>
Full article ">Figure 6
<p>(Top) Multi-scale PE, for control subjects (black lines) and CP patients (red lines), as a function of the down-sampling <math display="inline"> <semantics> <mi>υ</mi> </semantics> </math>; see <a href="#sec4dot2dot2-entropy-20-00077" class="html-sec">Section 4.2.2</a> for details. Each panel corresponds to the same joint/axis as in <a href="#entropy-20-00077-f001" class="html-fig">Figure 1</a>. (Bottom) <math display="inline"> <semantics> <mo>Δ</mo> </semantics> </math>MSE for all joint/axis pairs; see Equation (<a href="#FD1-entropy-20-00077" class="html-disp-formula">1</a>).</p>
Full article ">Figure 7
<p>Classifying patients according to their gait entropy. The left panel depicts the Receiver Operating Characteristic (ROC) curve (blue solid line), obtained through a random forest model; the dashed grey line represents the result obtained by a random classification. The right panel depicts the drop in the Area Under the Curve (AUC) when individual features (joint/axis pairs) are deleted from the dataset; the higher the value, the more important is the considered feature.</p>
Full article ">Figure 8
<p>Random forest classification of the patients’ GMFCS stage according to the PE of the joint time series. The left panel shows the importance of the individual features. The higher the value in the X axis of the left panel, the more important the corresponding feature is for an accurate classification. Importance is estimated according to the increase in the classification error when this feature is randomly permuted. The right panels show the adjusted class probability for healthy, GMFCS I, GMFCS II, GMFCS III and GMFCS IV stages according to an RF classification. In the X axis, values of PE of hip flexion (upper plot) and ankle flexion (lower plot) are shown. Different values presented in the split are shown by a small mark in the axis. The left Y axis of the panel indicates the adjusted class probability, while the right one shows the proportion of cycles of the different classes.</p>
Full article ">
20 pages, 901 KiB  
Article
Maximum Entropy Expectation-Maximization Algorithm for Fitting Latent-Variable Graphical Models to Multivariate Time Series
by Saïd Maanan, Bogdan Dumitrescu and Ciprian Doru Giurcăneanu
Entropy 2018, 20(1), 76; https://doi.org/10.3390/e20010076 - 19 Jan 2018
Cited by 8 | Viewed by 4451
Abstract
This work is focused on latent-variable graphical models for multivariate time series. We show how an algorithm which was originally used for finding zeros in the inverse of the covariance matrix can be generalized such that to identify the sparsity pattern of the [...] Read more.
This work is focused on latent-variable graphical models for multivariate time series. We show how an algorithm which was originally used for finding zeros in the inverse of the covariance matrix can be generalized such that to identify the sparsity pattern of the inverse of spectral density matrix. When applied to a given time series, the algorithm produces a set of candidate models. Various information theoretic (IT) criteria are employed for deciding the winner. A novel IT criterion, which is tailored to our model selection problem, is introduced. Some options for reducing the computational burden are proposed and tested via numerical examples. We conduct an empirical study in which the algorithm is compared with the state-of-the-art. The results are good, and the major advantage is that the subjective choices made by the user are less important than in the case of other methods. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

Figure 1
<p>Sparsity patterns for the ISDM of the generated data: <math display="inline"> <semantics> <mi>KS</mi> </semantics> </math> is the number of non-zero entries in the lower triangular part of <math display="inline"> <semantics> <mi>SP</mi> </semantics> </math>. The black dots represent the locations of the non-zero entries, whereas the light grey dots are the zero entries.</p>
Full article ">Figure 2
<p>Results for <math display="inline"> <semantics> <mi>VAR</mi> </semantics> </math>-models with <math display="inline"> <semantics> <mrow> <mi>KS</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics> </math>, for which the true sparsity pattern is shown in <a href="#entropy-20-00076-f001" class="html-fig">Figure 1</a>c. With the convention that dist denotes the distance between the estimated sparsity pattern and the true one, we plot mean(dist) ±1 standard deviation(dist) versus the parameter <math display="inline"> <semantics> <mi>λ</mi> </semantics> </math>. The statistics are computed from <math display="inline"> <semantics> <mrow> <msub> <mi>N</mi> <mi>tr</mi> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics> </math> trials, for both the <span class="html-italic">adaptive</span> and the <span class="html-italic">non-adaptive</span> case.</p>
Full article ">Figure 3
<p>Impact of <math display="inline"> <semantics> <msub> <mi>N</mi> <mi>it</mi> </msub> </semantics> </math> on the performance of AlgoEM: Evaluation is done by replacing in AlgoEM the IT criterion with an oracle having full knowledge about the true sparsity pattern. For each <math display="inline"> <semantics> <mi>KS</mi> </semantics> </math> and for each <math display="inline"> <semantics> <msub> <mi>N</mi> <mi>it</mi> </msub> </semantics> </math>, we run <math display="inline"> <semantics> <mrow> <msub> <mi>N</mi> <mi>tr</mi> </msub> <mo>=</mo> <mn>10</mn> </mrow> </semantics> </math> trials for calculating the average distance between the true sparsity pattern and the sparsity pattern selected by oracle.</p>
Full article ">Figure 4
<p>Performance of IT criteria compared to that of an oracle: (<b>a</b>) Only the first major loop, MEEM(Pen), of AlgoEM is executed; (<b>b</b>) Both MEEM(Pen) and MEEM(Con) are executed.</p>
Full article ">Figure 5
<p>Estimation results obtained when AlgoSL is applied to the same time series which have been used to evaluate the performance of AlgoEM in <a href="#entropy-20-00076-f004" class="html-fig">Figure 4</a>. For selection of the sparsity pattern, we employ the score functions in (<a href="#FD33-entropy-20-00076" class="html-disp-formula">33</a>)–(<a href="#FD35-entropy-20-00076" class="html-disp-formula">35</a>) and the IT criteria from <a href="#sec4-entropy-20-00076" class="html-sec">Section 4</a>. Score function <math display="inline"> <semantics> <msub> <mi>SF</mi> <mn>2</mn> </msub> </semantics> </math> is not shown in the graph because it leads to large values of the average distance: 102.4 for <math display="inline"> <semantics> <mrow> <mi>KS</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>, 101.5 for <math display="inline"> <semantics> <mrow> <mi>KS</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics> </math>, and 89.1 for <math display="inline"> <semantics> <mrow> <mi>KS</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 6
<p>Estimation results when sample size is small (<math display="inline"> <semantics> <mrow> <mi>T</mi> <mo>=</mo> <mn>500</mn> </mrow> </semantics> </math>).</p>
Full article ">Figure 7
<p>Distances computed for sparsity patterns which are estimated from a time series of length <math display="inline"> <semantics> <mrow> <mi>T</mi> <mo>=</mo> <mn>500</mn> </mrow> </semantics> </math>; the value of <math display="inline"> <semantics> <mi>KS</mi> </semantics> </math> for the true sparsity pattern is 15. (<b>a</b>) AlgoEM (<span class="html-italic">r</span> is the number of latent variables used in estimation); (<b>b</b>) AlgoSL.</p>
Full article ">Figure 8
<p>International stock markets data: Comparison between the sparsity pattern for manifest variables from [<a href="#B10-entropy-20-00076" class="html-bibr">10</a>] and the pattern produced by AlgoEM when either <math display="inline"> <semantics> <msub> <mi>SF</mi> <mn>1</mn> </msub> </semantics> </math> or one of the following IT criteria is used: <math display="inline"> <semantics> <mi>SBC</mi> </semantics> </math>, <math display="inline"> <semantics> <mi>EBIC</mi> </semantics> </math>, <math display="inline"> <semantics> <msub> <mi>EBIC</mi> <mi>FD</mi> </msub> </semantics> </math>, <math display="inline"> <semantics> <mi>FPE</mi> </semantics> </math>, <math display="inline"> <semantics> <mi>RNML</mi> </semantics> </math>, <math display="inline"> <semantics> <msub> <mi>RNML</mi> <mi>FD</mi> </msub> </semantics> </math>.</p>
Full article ">
24 pages, 4590 KiB  
Article
Finite-Time Thermodynamic Modeling and a Comparative Performance Analysis for Irreversible Otto, Miller and Atkinson Cycles
by Jinxing Zhao and Fangchang Xu
Entropy 2018, 20(1), 75; https://doi.org/10.3390/e20010075 - 19 Jan 2018
Cited by 15 | Viewed by 4723
Abstract
Finite-time thermodynamic models for an Otto cycle, an Atkinson cycle, an over-expansion Miller cycle (M1), an LIVC Miller cycle through late intake valve closure (M2) and an LIVC Miller cycle with constant compression ratio (M3) have been established. The models for the two [...] Read more.
Finite-time thermodynamic models for an Otto cycle, an Atkinson cycle, an over-expansion Miller cycle (M1), an LIVC Miller cycle through late intake valve closure (M2) and an LIVC Miller cycle with constant compression ratio (M3) have been established. The models for the two LIVC Miller cycles are first developed; and the heat-transfer and friction losses are considered with the effects of real engine parameters. A comparative analysis for the energy losses and performances has been conducted. The optimum compression-ratio ranges for the efficiency and effective power are different. The comparative results of cycle performances are influenced together by the ratios of the energy losses and the cycle types. The Atkinson cycle has the maximum peak power and efficiency, but the minimum power density; and the M1 cycle can achieve the optimum comprehensive performances. The less net fuel amount and the high peak cylinder pressure (M3 cycle) have a significantly adverse effect on the loss ratios of the heat-transfer and friction of the M2 and M3 cycles; and the effective power and energy efficiency are always lower than the M1 and Atkinson cycles. When greatly reducing the weights of the heat-transfer and friction, the M3 cycle has significant advantage in the energy efficiency. The results obtained can provide guidance for selecting the cycle type and optimizing the performances of a real engine. Full article
(This article belongs to the Section Thermodynamics)
Show Figures

Figure 1

Figure 1
<p>P-V diagrams for the Otto, Atkinson and Miller cycles.</p>
Full article ">Figure 2
<p>Effective power at different heat-transfer weights.</p>
Full article ">Figure 3
<p>Energy efficiency at different heat-transfer weights.</p>
Full article ">Figure 4
<p>Power density at different heat-transfer weights.</p>
Full article ">Figure 4 Cont.
<p>Power density at different heat-transfer weights.</p>
Full article ">Figure 5
<p>Ratios of heat-transfer loss for different heat-transfer weights.</p>
Full article ">Figure 5 Cont.
<p>Ratios of heat-transfer loss for different heat-transfer weights.</p>
Full article ">Figure 6
<p>Peak cylinder pressure for different heat-transfer weights.</p>
Full article ">Figure 6 Cont.
<p>Peak cylinder pressure for different heat-transfer weights.</p>
Full article ">Figure 7
<p>Peak in-cylinder gas temperature for different heat-transfer weights.</p>
Full article ">Figure 8
<p>Ratios of exhaust loss for different heat-transfer weights.</p>
Full article ">Figure 9
<p>Ratios of friction loss for different heat-transfer weights.</p>
Full article ">Figure 10
<p>Energy efficiency for different friction factors.</p>
Full article ">Figure 11
<p>Ratios of friction loss for different friction factors.</p>
Full article ">
15 pages, 6335 KiB  
Review
Constructal Optimizations for Heat and Mass Transfers Based on the Entransy Dissipation Extremum Principle, Performed at the Naval University of Engineering: A Review
by Lingen Chen, Qinghua Xiao and Huijun Feng
Entropy 2018, 20(1), 74; https://doi.org/10.3390/e20010074 - 19 Jan 2018
Cited by 40 | Viewed by 4253
Abstract
Combining entransy theory with constructal theory, this mini-review paper summarizes the constructal optimization work of heat conduction, convective heat transfer, and mass transfer problems during the authors’ working time in the Naval University of Engineering. The entransy dissipation extremum principle (EDEP) is applied [...] Read more.
Combining entransy theory with constructal theory, this mini-review paper summarizes the constructal optimization work of heat conduction, convective heat transfer, and mass transfer problems during the authors’ working time in the Naval University of Engineering. The entransy dissipation extremum principle (EDEP) is applied in constructal optimizations, and this paper is divided into three parts. The first part is constructal entransy dissipation rate minimizations of heat conduction and finned cooling problems. It includes constructal optimization for a “volume-to-point” heat-conduction assembly with a tapered element, constructal optimizations for “disc-to-point” heat-conduction assemblies with the premise of an optimized last-order construct and without this premise, and constructal optimizations for four kinds of fin assemblies: T-, Y-, umbrella-, and tree-shaped fins. The second part is constructal entransy dissipation rate minimizations of cooling channel and steam generator problems. It includes constructal optimizations for heat generating volumes with tree-shaped and parallel channels, constructal optimization for heat generating volume cooled by forced convection, and constructal optimization for a steam generator. The third part is constructal entransy dissipation rate minimizations of mass transfer problems. It includes constructal optimizations for “volume-to-point” rectangular assemblies with constant and tapered channels, and constructal optimizations for “disc-to-point” assemblies with the premise of an optimized last-order construct and without this premise. The results of the three parts show that the mean heat transfer temperature differences of the heat conduction assemblies are not always decreased when their internal complexity increases. The average heat transfer rate of the steam generator obtained by entransy dissipation rate maximization is increased by 58.7% compared with that obtained by heat transfer rate maximization. Compared with the rectangular mass transfer assembly with a constant high permeability pathway (HPP), the maximum pressure drops of the element and first-order assembly with tapered HPPs are decreased by 6% and 11%, respectively. The global transfer performances of the transfer bodies are improved after optimizations, and new design guidelines derived by EDEP, which are different from the conventional optimization objectives, are provided. Full article
(This article belongs to the Section Thermodynamics)
Show Figures

Figure 1

Figure 1
<p>Tapered second-order assembly [<a href="#B55-entropy-20-00074" class="html-bibr">55</a>].</p>
Full article ">Figure 2
<p>First-order assembly of a disc [<a href="#B56-entropy-20-00074" class="html-bibr">56</a>].</p>
Full article ">Figure 3
<p>Tree-shaped assembly of fins [<a href="#B61-entropy-20-00074" class="html-bibr">61</a>].</p>
Full article ">Figure 4
<p>Mean temperature differences for the element and first-order assembly [<a href="#B55-entropy-20-00074" class="html-bibr">55</a>].</p>
Full article ">Figure 5
<p>Optimal results of a disc-shaped assembly based on different optimization objectives [<a href="#B56-entropy-20-00074" class="html-bibr">56</a>].</p>
Full article ">Figure 6
<p>Characteristic of equivalent thermal resistance versus branch number [<a href="#B61-entropy-20-00074" class="html-bibr">61</a>].</p>
Full article ">Figure 7
<p>Third-order assembly with constant channels [<a href="#B74-entropy-20-00074" class="html-bibr">74</a>].</p>
Full article ">Figure 8
<p>Model of heat-generating volume [<a href="#B75-entropy-20-00074" class="html-bibr">75</a>].</p>
Full article ">Figure 9
<p>Model of a steam generator [<a href="#B76-entropy-20-00074" class="html-bibr">76</a>].</p>
Full article ">Figure 10
<p>Third-order assembly with tapered channels [<a href="#B74-entropy-20-00074" class="html-bibr">74</a>].</p>
Full article ">Figure 11
<p>Optimal constructs based on the two optimization objectives [<a href="#B75-entropy-20-00074" class="html-bibr">75</a>].</p>
Full article ">Figure 12
<p>Number of riser and downcomer tubes [<a href="#B76-entropy-20-00074" class="html-bibr">76</a>].</p>
Full article ">Figure 13
<p>Mass transfer model in a rectangular element [<a href="#B86-entropy-20-00074" class="html-bibr">86</a>].</p>
Full article ">Figure 14
<p>Mass transfer model in a radial-patterned disc [<a href="#B86-entropy-20-00074" class="html-bibr">86</a>].</p>
Full article ">Figure 15
<p>Optimal results with different optimization objectives [<a href="#B86-entropy-20-00074" class="html-bibr">86</a>].</p>
Full article ">Figure 16
<p>Effect of a dimensionless radiuson the optimal construct [<a href="#B86-entropy-20-00074" class="html-bibr">86</a>].</p>
Full article ">
12 pages, 266 KiB  
Article
Non-Gaussian Closed Form Solutions for Geometric Average Asian Options in the Framework of Non-Extensive Statistical Mechanics
by Pan Zhao, Benda Zhou and Jixia Wang
Entropy 2018, 20(1), 71; https://doi.org/10.3390/e20010071 - 18 Jan 2018
Cited by 7 | Viewed by 3661
Abstract
In this paper we consider pricing problems of the geometric average Asian options under a non-Gaussian model, in which the underlying stock price is driven by a process based on non-extensive statistical mechanics. The model can describe the peak and fat tail characteristics [...] Read more.
In this paper we consider pricing problems of the geometric average Asian options under a non-Gaussian model, in which the underlying stock price is driven by a process based on non-extensive statistical mechanics. The model can describe the peak and fat tail characteristics of returns. Thus, the description of underlying asset price and the pricing of options are more accurate. Moreover, using the martingale method, we obtain closed form solutions for geometric average Asian options. Furthermore, the numerical analysis shows that the model can avoid underestimating risks relative to the Black-Scholes model. Full article
(This article belongs to the Special Issue Nonadditive Entropies and Complex Systems)
Show Figures

Figure 1

Figure 1
<p>Call option price versus strike price. The dashed curve is for the Black-Scholes model. The solid curve is for our model.</p>
Full article ">Figure 2
<p>Put option price versus strike price. The dashed curve is for the Black-Scholes model. The solid curve is for our model.</p>
Full article ">Figure 3
<p>Call option price versus strike price, for different values of <span class="html-italic">q</span>. The dashed curve is for <math display="inline"> <semantics> <mrow> <mi>q</mi> <mo>=</mo> <mn>1.5</mn> </mrow> </semantics> </math>. The Solid Curve is for <math display="inline"> <semantics> <mrow> <mi>q</mi> <mo>=</mo> <mn>1.4</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 4
<p>Put option price versus strike price, for different values of <span class="html-italic">q</span>. The dashed curve is for <math display="inline"> <semantics> <mrow> <mi>q</mi> <mo>=</mo> <mn>1.5</mn> </mrow> </semantics> </math>. The Solid Curve is for <math display="inline"> <semantics> <mrow> <mi>q</mi> <mo>=</mo> <mn>1.4</mn> </mrow> </semantics> </math>.</p>
Full article ">
19 pages, 8006 KiB  
Article
An Operation Reduction Using Fast Computation of an Iteration-Based Simulation Method with Microsimulation-Semi-Symbolic Analysis
by Vladimir Mladenovic, Danijela Milosevic, Miroslav Lutovac, Yigang Cen and Matjaz Debevc
Entropy 2018, 20(1), 62; https://doi.org/10.3390/e20010062 - 18 Jan 2018
Cited by 4 | Viewed by 4414
Abstract
This paper presents a method for shortening the computation time and reducing the number of math operations required in complex calculations for the analysis, simulation, and design of processes and systems. The method is suitable for education and engineering applications. The efficacy of [...] Read more.
This paper presents a method for shortening the computation time and reducing the number of math operations required in complex calculations for the analysis, simulation, and design of processes and systems. The method is suitable for education and engineering applications. The efficacy of the method is illustrated with a case study of a complex wireless communication system. The computer algebra system (CAS) was applied to formulate hypotheses and define the joint probability density function of a certain modulation technique. This innovative method was used to prepare microsimulation-semi-symbolic analyses to fully specify the wireless system. The development of an iteration-based simulation method that provides closed form solutions is presented. Previously, expressions were solved using time-consuming numerical methods. Students can apply this method for performance analysis and to understand data transfer processes. Engineers and researchers may use the method to gain insight into the impact of the parameters necessary to properly transmit and detect information, unlike traditional numerical methods. This research contributes to this field by improving the ability to obtain closed form solutions of the probability density function, outage probability, and considerably improves time efficiency with shortened computation time and reducing the number of calculation operations. Full article
(This article belongs to the Special Issue Symbolic Entropy Analysis and Its Applications)
Show Figures

Figure 1

Figure 1
<p>Wolfram language code for a Riemann sum.</p>
Full article ">Figure 2
<p>Steps of the speeding up and operation reduction process.</p>
Full article ">Figure 3
<p>Non-coherent amplitude shift keying (ASK) system with interference <span class="html-italic">i</span><sub>1</sub>(<span class="html-italic">t</span>).</p>
Full article ">Figure 4
<p>Condition joint probability density function using Wolfram language for shadowing and interference.</p>
Full article ">Figure 5
<p>Changing of coefficients for simplification.</p>
Full article ">Figure 6
<p>Rayleigh distribution for interference coded by Wolfram language.</p>
Full article ">Figure 7
<p>Log-normal distribution for non-coherent ASK in the presence of shadowing and interference.</p>
Full article ">Figure 8
<p>Closed form solution of probability density function (<span class="html-italic">PDF<sub>outage</sub></span>) of a non-coherent ASK system.</p>
Full article ">Figure 9
<p>Closed form solution of outage probability <span class="html-italic">P<sub>outage</sub></span> of a non-coherent ASK system with shadowing and interference.</p>
Full article ">Figure 10
<p>General term in a series of <span class="html-italic">P<sub>outage</sub></span> marked as <span class="html-italic">a<sub>k</sub></span>.</p>
Full article ">Figure 11
<p>The element Kummer’s transformation <span class="html-italic">ρ</span>.</p>
Full article ">Figure 12
<p>The number of iterations in term of envelope <span class="html-italic">z</span>.</p>
Full article ">Figure 13
<p>Relative error functions in term of the envelope <span class="html-italic">z</span>.</p>
Full article ">Figure 14
<p>Comparative characteristics of <span class="html-italic">P<sub>outage</sub></span> and accelerated outage probability <span class="html-italic">s</span>.</p>
Full article ">Figure 15
<p>Number of operations in terms of number of iterations <span class="html-italic">q</span> for fast computation. The number of iterations is fixed with <span class="html-italic">q</span> = 500 for <span class="html-italic">P<sub>outage</sub></span>.</p>
Full article ">Figure 16
<p>General term of the level crossing rate (LCR) marked as <span class="html-italic">a<sub>k</sub></span>.</p>
Full article ">Figure 17
<p>The element Kummer’s transformation <span class="html-italic">ρ</span>.</p>
Full article ">Figure 18
<p>Comparative characteristics of LCR and accelerated LCR.</p>
Full article ">Figure 19
<p>Relative error function of LCR in term of the envelope <span class="html-italic">z</span>.</p>
Full article ">Figure 20
<p>Comparative characteristics of the average fade duration (AFD) and accelerated AFD.</p>
Full article ">Figure 21
<p>Relative error function of AFD in terms of envelope <span class="html-italic">z.</span></p>
Full article ">
13 pages, 2725 KiB  
Article
Energetic and Exergetic Analysis of a Transcritical N2O Refrigeration Cycle with an Expander
by Ze Zhang, Yu Hou and Francis A. Kulacki
Entropy 2018, 20(1), 31; https://doi.org/10.3390/e20010031 - 18 Jan 2018
Cited by 6 | Viewed by 4895
Abstract
Comparative energy and exergy investigations are reported for a transcritical N2O refrigeration cycle with a throttling valve or with an expander when the gas cooler exit temperature varies from 30 to 55 °C and the evaporating temperature varies from −40 to [...] Read more.
Comparative energy and exergy investigations are reported for a transcritical N2O refrigeration cycle with a throttling valve or with an expander when the gas cooler exit temperature varies from 30 to 55 °C and the evaporating temperature varies from −40 to 10 °C. The system performance is also compared with that of similar cycles using CO2. Results show that the N2O expander cycle exhibits a larger maximum cooling coefficient of performance (COP) and lower optimum discharge pressure than that of the CO2 expander cycle and N2O throttling valve cycle. It is found that in the N2O throttling valve cycle, the irreversibility of the throttling valve is maximum and the exergy losses of the gas cooler and compressor are ordered second and third, respectively. In the N2O expander cycle, the largest exergy loss occurs in the gas cooler, followed by the compressor and the expander. Compared with the CO2 expander cycle and N2O throttling valve cycle, the N2O expander cycle has the smallest component-specific exergy loss and the highest exergy efficiency at the same operating conditions and at the optimum discharge pressure. It is also proven that the maximum COP and the maximum exergy efficiency cannot be obtained at the same time for the investigated cycles. Full article
(This article belongs to the Special Issue Phenomenological Thermodynamics of Irreversible Processes)
Show Figures

Figure 1

Figure 1
<p>Schematic of the throttling valve cycle (TVC) and the expander cycle (EC). (<b>a</b>) Throttling valve cycle and (<b>b</b>) expander cycle.</p>
Full article ">Figure 2
<p>Temperature–entropy diagram of two cycles: the throttling valve cycle (1–2–3–4h–1) and the expander cycle (1–2–3–4–1).</p>
Full article ">Figure 3
<p>Pressure–enthalpy diagrams and isotherms of CO<sub>2</sub> and N<sub>2</sub>O.</p>
Full article ">Figure 4
<p>Effects of the evaporating and gas cooler exit temperatures on the performance of the two cycles. (<b>a</b>) Effect of the evaporating temperature on system performance; (<b>b</b>) effect of the gas cooler exit temperature on system performance.</p>
Full article ">Figure 5
<p>Effects of the evaporating and gas cooler exit temperatures on the performance of the two cycles. (<b>a</b>) Effect of the evaporating temperature on system performance; (<b>b</b>) effect of the gas cooler exit temperature on system performance.</p>
Full article ">Figure 6
<p>Effect of expander isentropic efficiency on the performance of the two cycles.</p>
Full article ">Figure 7
<p>Effects of the evaporating and gas cooler exit temperatures on the specific exergy loss of each component for the throttling valve cycle and expander cycle. (<b>a</b>) Effect of the evaporating temperature on specific exergy loss; (<b>b</b>) effect of the gas cooler exit temperature on specific exergy loss.</p>
Full article ">Figure 8
<p>Effect of the evaporating temperature on the percentage of exergy loss for each component for the two cycles with the gas cooler exit temperature at 40 °C and at the optimal discharge pressure. (<b>a</b>) Throttling valve cycle; (<b>b</b>) expander cycle.</p>
Full article ">Figure 9
<p>Effect of the gas cooler exit temperature on the percentage of exergy loss of each component for the two cycles with the evaporating temperature at 5 °C and at the optimal discharge pressure. (<b>a</b>) Throttling valve cycle; (<b>b</b>) expander cycle.</p>
Full article ">Figure 10
<p>Effects of the evaporating and gas cooler exit temperatures on exergy efficiency for the throttling valve cycle and expander cycle. (<b>a</b>) Effect of the evaporating temperature on exergy efficiency; (<b>b</b>) effect of the gas cooler exit temperature on exergy efficiency.</p>
Full article ">Figure 11
<p>Effects of the evaporating and gas cooler exit temperatures on specific exergy loss of each component for the expander cycle using N<sub>2</sub>O and CO<sub>2</sub> as refrigerants. (<b>a</b>) Effect of the evaporating temperature on specific exergy loss; (<b>b</b>) effect of the gas cooler exit temperature on specific exergy loss.</p>
Full article ">Figure 12
<p>Effects of the evaporating and gas cooler exit temperatures on exergy efficiency for the expander cycles using N<sub>2</sub>O and CO<sub>2</sub> as refrigerants. (<b>a</b>) Effect of the evaporating temperature on exergy efficiency; (<b>b</b>) effect of the gas cooler exit temperature on exergy efficiency.</p>
Full article ">Figure 13
<p>Effect of expander isentropic efficiency on exergy efficiency and the specific exergy loss of each component for expander cycles using N<sub>2</sub>O and CO<sub>2</sub> as refrigerants. (<b>a</b>) Effect of expander isentropic efficiency on exergy efficiency; (<b>b</b>) effect of expander isentropic efficiency on specific exergy loss.</p>
Full article ">
18 pages, 334 KiB  
Article
The Fractality of Polar and Reed–Muller Codes
by Bernhard C. Geiger
Entropy 2018, 20(1), 70; https://doi.org/10.3390/e20010070 - 17 Jan 2018
Cited by 4 | Viewed by 3790
Abstract
The generator matrices of polar codes and Reed–Muller codes are submatrices of the Kronecker product of a lower-triangular binary square matrix. For polar codes, the submatrix is generated by selecting rows according to their Bhattacharyya parameter, which is related to the error probability [...] Read more.
The generator matrices of polar codes and Reed–Muller codes are submatrices of the Kronecker product of a lower-triangular binary square matrix. For polar codes, the submatrix is generated by selecting rows according to their Bhattacharyya parameter, which is related to the error probability of sequential decoding. For Reed–Muller codes, the submatrix is generated by selecting rows according to their Hamming weight. In this work, we investigate the properties of the index sets selecting those rows, in the limit as the blocklength tends to infinity. We compute the Lebesgue measure and the Hausdorff dimension of these sets. We furthermore show that these sets are finely structured and self-similar in a well-defined sense, i.e., they have properties that are common to fractals. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

Figure 1
<p>The polar fractal. The center plot shows the thresholds <math display="inline"> <semantics> <mrow> <mi>ϑ</mi> <mo>(</mo> <mi>x</mi> <mo>)</mo> </mrow> </semantics> </math> for a finite set of values <math display="inline"> <semantics> <mrow> <mi>x</mi> <mo>∈</mo> <mo>[</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>]</mo> </mrow> </semantics> </math>; the bottom and the top plots show thresholds for equally many values in the sets <math display="inline"> <semantics> <mrow> <mo>[</mo> <mn>0</mn> <mo>,</mo> <mn>0.5</mn> <mo>]</mo> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mo>[</mo> <mn>0.5</mn> <mo>,</mo> <mn>1</mn> <mo>]</mo> </mrow> </semantics> </math>, respectively. One can observe how the thresholds are ordered, i.e., thresholds in the top plot exceed those in the center plot, which exceed those in the bottom plot. For a binary erasure channel (BEC) <span class="html-italic">W</span>, the indicator function of <math display="inline"> <semantics> <mi mathvariant="script">G</mi> </semantics> </math> is obtained by setting each value in the plot to one (zero) if the Bhattacharyya parameter <math display="inline"> <semantics> <mrow> <mi>Z</mi> <mo>(</mo> <mi>W</mi> <mo>)</mo> </mrow> </semantics> </math> is smaller (larger) than the threshold. Note that this plot illustrates the behavior of <math display="inline"> <semantics> <mi mathvariant="script">G</mi> </semantics> </math> in the limit <math display="inline"> <semantics> <mrow> <mi>n</mi> <mo>→</mo> <mo>∞</mo> </mrow> </semantics> </math>. Note further that the figure illustrates the symmetry of <math display="inline"> <semantics> <mrow> <mi>ϑ</mi> <mo>(</mo> <mi>x</mi> <mo>)</mo> </mrow> </semantics> </math> claimed in Proposition 3. The MATLAB code to generate these thresholds is available as <a href="#app20-entropy-20-00070" class="html-app">Supplementary Material</a>.</p>
Full article ">
15 pages, 7227 KiB  
Article
An Entropic Model for the Assessment of Streamwise Velocity Dip in Wide Open Channels
by Domenica Mirauda, Marilena Pannone and Annamaria De Vincenzo
Entropy 2018, 20(1), 69; https://doi.org/10.3390/e20010069 - 17 Jan 2018
Cited by 20 | Viewed by 4148
Abstract
The three-dimensional structure of river flow and the presence of secondary currents, mainly near walls, often cause the maximum cross-sectional velocity to occur below the free surface, which is known as the “dip” phenomenon. The present study proposes a theoretical model derived from [...] Read more.
The three-dimensional structure of river flow and the presence of secondary currents, mainly near walls, often cause the maximum cross-sectional velocity to occur below the free surface, which is known as the “dip” phenomenon. The present study proposes a theoretical model derived from the entropy theory to predict the velocity dip position along with the corresponding velocity value. Field data, collected at three ungauged sections located along the Alzette river in the Grand Duchy of Luxembourg and at three gauged sections located along three large rivers in Basilicata (southern Italy), were used to test its validity. The results show that the model is in good agreement with the experimental measurements and, when compared with other models documented in the literature, yields the least percentage error. Full article
Show Figures

Figure 1

Figure 1
<p>Ungauged sections along the Alzette river.</p>
Full article ">Figure 2
<p>Gauged stations along the Basento, Agri, and Sinni rivers.</p>
Full article ">Figure 3
<p>Velocity profile at the Mersch cross-section for <span class="html-italic">Q</span> = 16.2 m<sup>3</sup>/s.</p>
Full article ">Figure 4
<p>Velocity profile at the Mersch cross-section for <span class="html-italic">Q</span> = 26.0 m<sup>3</sup>/s.</p>
Full article ">Figure 5
<p>Velocity profile at the Mersch cross-section for <span class="html-italic">Q</span> = 44.3 m<sup>3</sup>/s.</p>
Full article ">Figure 6
<p>Velocity profile at the Torre Accio cross-section for <span class="html-italic">Q</span> = 75.5 m<sup>3</sup>/s.</p>
Full article ">Figure 7
<p>Velocity profile at the Torre Accio cross-section for <span class="html-italic">Q</span> = 121.3 m<sup>3</sup>/s.</p>
Full article ">Figure 8
<p>Velocity profile at the Torre Accio cross-section for <span class="html-italic">Q</span> = 197.9 m<sup>3</sup>/s.</p>
Full article ">Figure 9
<p>Predicted and measured dimensionless dip positions for different flow conditions at the investigated cross-sections.</p>
Full article ">
26 pages, 505 KiB  
Article
Multi-Attribute Decision-Making Based on Bonferroni Mean Operators under Cubic Intuitionistic Fuzzy Set Environment
by Gagandeep Kaur and Harish Garg
Entropy 2018, 20(1), 65; https://doi.org/10.3390/e20010065 - 17 Jan 2018
Cited by 112 | Viewed by 5915
Abstract
Cubic intuitionistic fuzzy (CIF) set is the hybrid set which can contain much more information to express an interval-valued intuitionistic fuzzy set and an intuitionistic fuzzy set simultaneously for handling the uncertainties in the data. Unfortunately, there has been no research on the [...] Read more.
Cubic intuitionistic fuzzy (CIF) set is the hybrid set which can contain much more information to express an interval-valued intuitionistic fuzzy set and an intuitionistic fuzzy set simultaneously for handling the uncertainties in the data. Unfortunately, there has been no research on the aggregation operators on CIF sets so far. Since an aggregation operator is an important mathematical tool in decision-making problems, the present paper proposes some new Bonferroni mean and weighted Bonferroni mean averaging operators between the cubic intuitionistic fuzzy numbers for aggregating the different preferences of the decision-maker. Then, we develop a decision-making method based on the proposed operators under the cubic intuitionistic fuzzy environment and illustrated with a numerical example. Finally, a comparison analysis between the proposed and the existing approaches have been performed to illustrate the applicability and feasibility of the developed decision-making method. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

Figure 1
<p>Effect of the parameter <italic>q</italic> on to the score value by fixing the parameter <italic>p</italic>.</p>
Full article ">Figure 2
<p>Score values of alternative for different values of <italic>p</italic> and <italic>q</italic>.</p>
Full article ">
10 pages, 904 KiB  
Article
Changes in the Complexity of Heart Rate Variability with Exercise Training Measured by Multiscale Entropy-Based Measurements
by Frederico Sassoli Fazan, Fernanda Brognara, Rubens Fazan Junior, Luiz Otavio Murta Junior and Luiz Eduardo Virgilio Silva
Entropy 2018, 20(1), 47; https://doi.org/10.3390/e20010047 - 17 Jan 2018
Cited by 18 | Viewed by 5982
Abstract
Quantifying complexity from heart rate variability (HRV) series is a challenging task, and multiscale entropy (MSE), along with its variants, has been demonstrated to be one of the most robust approaches to achieve this goal. Although physical training is known to be beneficial, [...] Read more.
Quantifying complexity from heart rate variability (HRV) series is a challenging task, and multiscale entropy (MSE), along with its variants, has been demonstrated to be one of the most robust approaches to achieve this goal. Although physical training is known to be beneficial, there is little information about the long-term complexity changes induced by the physical conditioning. The present study aimed to quantify the changes in physiological complexity elicited by physical training through multiscale entropy-based complexity measurements. Rats were subject to a protocol of medium intensity training ( n = 13 ) or a sedentary protocol ( n = 12 ). One-hour HRV series were obtained from all conscious rats five days after the experimental protocol. We estimated MSE, multiscale dispersion entropy (MDE) and multiscale SDiff q from HRV series. Multiscale SDiff q is a recent approach that accounts for entropy differences between a given time series and its shuffled dynamics. From SDiff q , three attributes (q-attributes) were derived, namely SDiff q m a x , q m a x and q z e r o . MSE, MDE and multiscale q-attributes presented similar profiles, except for SDiff q m a x . q m a x showed significant differences between trained and sedentary groups on Time Scales 6 to 20. Results suggest that physical training increases the system complexity and that multiscale q-attributes provide valuable information about the physiological complexity. Full article
Show Figures

Figure 1

Figure 1
<p>MSE or MDE did not detect differences between HRV complexity from trained and sedentary rats. Curve profiles are presented for MSE (<b>A</b>) and MDE (<b>B</b>), obtained from trained and sedentary groups. Bar graphs show mean entropy values obtained from MSE (<b>C</b>) and MDE (<b>D</b>) curves, grouped by short (1 to 5) and long (6 to 20) time scales. MSE: multiscale sample entropy; MDE: multiscale dispersion entropy; SampEn: sample entropy; DispEn: dispersion entropy; HRV: heart rate variability. Bars represent the mean ± standard error.</p>
Full article ">Figure 2
<p>Multiscale <span class="html-italic">q</span>-attributes calculated from HRV series of trained and sedentary rats. Curve profiles are presented for SDiff<math display="inline"> <semantics> <msub> <mrow/> <msub> <mi>q</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </msub> </semantics> </math> (<b>A</b>), <math display="inline"> <semantics> <msub> <mi>q</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </semantics> </math> (<b>B</b>) and <math display="inline"> <semantics> <msub> <mi>q</mi> <mrow> <mi>z</mi> <mi>e</mi> <mi>r</mi> <mi>o</mi> </mrow> </msub> </semantics> </math> (<b>C</b>), obtained from trained and sedentary rats. Bar graphs show mean <span class="html-italic">q</span>-attributes values, obtained from SDiff<math display="inline"> <semantics> <msub> <mrow/> <msub> <mi>q</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </msub> </semantics> </math> (<b>D</b>), <math display="inline"> <semantics> <msub> <mi>q</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </semantics> </math> (<b>E</b>) and <math display="inline"> <semantics> <msub> <mi>q</mi> <mrow> <mi>z</mi> <mi>e</mi> <mi>r</mi> <mi>o</mi> </mrow> </msub> </semantics> </math> (<b>F</b>), grouped by short (1 to 5) and long (6 to 20) time scales. SDiff<math display="inline"> <semantics> <msub> <mrow/> <msub> <mi>q</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </msub> </semantics> </math>: maximal SDiff<math display="inline"> <semantics> <msub> <mrow/> <mi>q</mi> </msub> </semantics> </math>; <math display="inline"> <semantics> <msub> <mi>q</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </semantics> </math>: <span class="html-italic">q</span> value where SDiff<math display="inline"> <semantics> <msub> <mrow/> <mi>q</mi> </msub> </semantics> </math> is maximal; <math display="inline"> <semantics> <msub> <mi>q</mi> <mrow> <mi>z</mi> <mi>e</mi> <mi>r</mi> <mi>o</mi> </mrow> </msub> </semantics> </math>: <span class="html-italic">q</span> value where SDiff<math display="inline"> <semantics> <msub> <mrow/> <mi>q</mi> </msub> </semantics> </math> is zero; HRV: heart rate variability. Bars represent the mean ± standard error. * <span class="html-italic">p</span> &lt; 0.05 when compared to the trained group.</p>
Full article ">
15 pages, 276 KiB  
Article
Analytical Solutions for Multi-Time Scale Fractional Stochastic Differential Equations Driven by Fractional Brownian Motion and Their Applications
by Xiao-Li Ding and Juan J. Nieto
Entropy 2018, 20(1), 63; https://doi.org/10.3390/e20010063 - 16 Jan 2018
Cited by 19 | Viewed by 4600
Abstract
In this paper, we investigate analytical solutions of multi-time scale fractional stochastic differential equations driven by fractional Brownian motions. We firstly decompose homogeneous multi-time scale fractional stochastic differential equations driven by fractional Brownian motions into independent differential subequations, and give their analytical solutions. [...] Read more.
In this paper, we investigate analytical solutions of multi-time scale fractional stochastic differential equations driven by fractional Brownian motions. We firstly decompose homogeneous multi-time scale fractional stochastic differential equations driven by fractional Brownian motions into independent differential subequations, and give their analytical solutions. Then, we use the variation of constant parameters to obtain the solutions of nonhomogeneous multi-time scale fractional stochastic differential equations driven by fractional Brownian motions. Finally, we give three examples to demonstrate the applicability of our obtained results. Full article
(This article belongs to the Special Issue Entropy in Dynamic Systems)
22 pages, 184 KiB  
Editorial
Acknowledgement to Reviewers of Entropy in 2017
by Entropy Editorial Office
Entropy 2018, 20(1), 66; https://doi.org/10.3390/e20010066 - 15 Jan 2018
Viewed by 5126
Abstract
Peer review is an essential part in the publication process, ensuring that Entropy maintains high quality standards for its published papers.[...] Full article
24 pages, 1686 KiB  
Article
Joint Content Recommendation and Delivery in Mobile Wireless Networks with Outage Management
by Yaodong Li, Lingyu Chen, Haibin Shi, Xuemin Hong and Jianghong Shi
Entropy 2018, 20(1), 64; https://doi.org/10.3390/e20010064 - 15 Jan 2018
Cited by 5 | Viewed by 4101
Abstract
Personalized content retrieval service has become a major information service that consumes a large portion of mobile Internet traffic. Joint content recommendation and delivery is a promising design philosophy that could effectively improve the overall user experience with personalized content retrieval services. Existing [...] Read more.
Personalized content retrieval service has become a major information service that consumes a large portion of mobile Internet traffic. Joint content recommendation and delivery is a promising design philosophy that could effectively improve the overall user experience with personalized content retrieval services. Existing research mostly focused on a push-type design paradigm called proactive caching, which, however, has multiple inherent drawbacks such as high device cost and low energy efficiency. This paper proposes a novel, interactive joint content recommendation and delivery system as an alternative to overcome the drawbacks of proactive caching systems. We present several optimal and heuristic algorithms for the proposed system and analyze the system performance in terms of user interest and transmission outage probability. Some theoretical performance bounds of the system are also derived. The effectiveness of the proposed system and algorithms is validated by simulation results. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of the proactive caching protocol, the conventional pull-type protocol and the proposed content retrieval protocol.</p>
Full article ">Figure 2
<p>Comparison of the exact outage probability obtained by Monte Carlo simulations and the estimated outage probability calculated by Algorithm 3 (the file size distribution is subject to <math display="inline"> <semantics> <mrow> <mi>L</mi> <mi>o</mi> <mi>g</mi> <mi>n</mi> <mi>o</mi> <mi>r</mi> <mi>m</mi> <mo>(</mo> <mn>10</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>U</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>F</mi> <mo>=</mo> <mn>500</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>50</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>256</mn> </mrow> </semantics> </math>).</p>
Full article ">Figure 3
<p>Comparison of the empirical value and the numerical value of the upper limit of outage, where <math display="inline"> <semantics> <mrow> <mi>U</mi> <mo>(</mo> <mi>x</mi> <mo>,</mo> <mi>y</mi> <mo>)</mo> </mrow> </semantics> </math> represents a uniform distribution in <math display="inline"> <semantics> <mrow> <mo>[</mo> <mi>x</mi> <mo>,</mo> <mi>y</mi> <mo>]</mo> </mrow> </semantics> </math>.</p>
Full article ">Figure 4
<p>Performance comparison of different algorithms and theoretical performance bounds (simple model). Opt, optimal; Heu, heuristic.</p>
Full article ">Figure 5
<p>Performance comparison of different algorithms (file size distribution is subject to <math display="inline"> <semantics> <mrow> <mi>L</mi> <mi>o</mi> <mi>g</mi> <mi>n</mi> <mi>o</mi> <mi>r</mi> <mi>m</mi> <mo>(</mo> <mn>9.357</mn> <mo>,</mo> <mn>1.318</mn> <mo>)</mo> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <msub> <mi>P</mi> <mi>T</mi> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics> </math> W).</p>
Full article ">Figure 6
<p>The effect of time constraint <math display="inline"> <semantics> <msub> <mi>T</mi> <mi>s</mi> </msub> </semantics> </math> on the performance (the file size distribution is subject to <math display="inline"> <semantics> <mrow> <mi>L</mi> <mi>o</mi> <mi>g</mi> <mi>n</mi> <mi>o</mi> <mi>r</mi> <mi>m</mi> <mo>(</mo> <mn>9.357</mn> <mo>,</mo> <mn>1.318</mn> <mo>)</mo> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <msub> <mi>P</mi> <mi>T</mi> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics> </math> W).</p>
Full article ">Figure 7
<p>Performance comparison of different algorithms with varying power constraint <math display="inline"> <semantics> <msub> <mi>P</mi> <mi>T</mi> </msub> </semantics> </math> (file size distribution is subject to <math display="inline"> <semantics> <mrow> <mi>L</mi> <mi>o</mi> <mi>g</mi> <mi>n</mi> <mi>o</mi> <mi>r</mi> <mi>m</mi> <mo>(</mo> <mn>9.357</mn> <mo>,</mo> <mn>1.318</mn> <mo>)</mo> </mrow> </semantics> </math>).</p>
Full article ">Figure 8
<p>Performance comparison of different algorithms with varying file size distributions (<math display="inline"> <semantics> <mrow> <msub> <mi>P</mi> <mi>T</mi> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math> W).</p>
Full article ">Figure 9
<p>Performance comparison with different distributions of individual user’s interest in a piece of content across multiple users (file size distribution is subject to <math display="inline"> <semantics> <mrow> <mi>L</mi> <mi>o</mi> <mi>g</mi> <mi>n</mi> <mi>o</mi> <mi>r</mi> <mi>m</mi> <mo>(</mo> <mn>9.357</mn> <mo>,</mo> <mn>1.318</mn> <mo>)</mo> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <msub> <mi>P</mi> <mi>T</mi> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics> </math> W).</p>
Full article ">
15 pages, 464 KiB  
Article
Low Computational Cost for Sample Entropy
by George Manis, Md Aktaruzzaman and Roberto Sassi
Entropy 2018, 20(1), 61; https://doi.org/10.3390/e20010061 - 13 Jan 2018
Cited by 51 | Viewed by 6608
Abstract
Sample Entropy is the most popular definition of entropy and is widely used as a measure of the regularity/complexity of a time series. On the other hand, it is a computationally expensive method which may require a large amount of time when used [...] Read more.
Sample Entropy is the most popular definition of entropy and is widely used as a measure of the regularity/complexity of a time series. On the other hand, it is a computationally expensive method which may require a large amount of time when used in long series or with a large number of signals. The computationally intensive part is the similarity check between points in m dimensional space. In this paper, we propose new algorithms or extend already proposed ones, aiming to compute Sample Entropy quickly. All algorithms return exactly the same value for Sample Entropy, and no approximation techniques are used. We compare and evaluate them using cardiac inter-beat (RR) time series. We investigate three algorithms. The first one is an extension of the k d -trees algorithm, customized for Sample Entropy. The second one is an extension of an algorithm initially proposed for Approximate Entropy, again customized for Sample Entropy, but also improved to present even faster results. The last one is a completely new algorithm, presenting the fastest execution times for specific values of m, r, time series length, and signal characteristics. These algorithms are compared with the straightforward implementation, directly resulting from the definition of Sample Entropy, in order to give a clear image of the speedups achieved. All algorithms assume the classical approach to the metric, in which the maximum norm is used. The key idea of the two last suggested algorithms is to avoid unnecessary comparisons by detecting them early. We use the term unnecessary to refer to those comparisons for which we know a priori that they will fail at the similarity check. The number of avoided comparisons is proved to be very large, resulting in an analogous large reduction of execution time, making them the fastest algorithms available today for the computation of Sample Entropy. Full article
Show Figures

Figure 1

Figure 1
<p>Example of the bucket-assisted algorithm. The integrated signal is depicted here. Points between the solid lines <span class="html-italic">B</span> and <span class="html-italic">C</span> can be similar only to those points laying between the dashed lines <span class="html-italic">A</span> and <span class="html-italic">D</span>. However, it is sufficient to check for similarity only in those points located between lines <math display="inline"> <semantics> <mrow> <mi>B</mi> <mspace width="-0.166667em"/> <mo>−</mo> <mspace width="-0.166667em"/> <mi>C</mi> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mi>A</mi> <mspace width="-0.166667em"/> <mo>−</mo> <mspace width="-0.166667em"/> <mi>B</mi> </mrow> </semantics> </math>.</p>
Full article ">Figure 2
<p>Splitting large buckets into smaller ones. Asterisks are points of the integrated signal. This splitting of the buckets into smaller ones can lead to an increased number of avoided comparisons. For example, for the point marked by the small circle belonging to the bucket <math display="inline"> <semantics> <mrow> <mi>b</mi> <mn>19</mn> </mrow> </semantics> </math>, comparisons are reduced by approximately 20%.</p>
Full article ">Figure 3
<p>Execution time of all algorithms for the typical values of parameters <span class="html-italic">m</span> and <span class="html-italic">r</span> (<math display="inline"> <semantics> <mrow> <mi>m</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>2</mn> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mi>r</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>0.2</mn> </mrow> </semantics> </math>) and various signal lengths (<span class="html-italic">N</span>).</p>
Full article ">Figure 4
<p>Execution time of all algorithms as a speedup gained from the simple one. Typical values of parameters <span class="html-italic">m</span> and <span class="html-italic">r</span> (<math display="inline"> <semantics> <mrow> <mi>m</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>2</mn> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mi>r</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>0.2</mn> </mrow> </semantics> </math>) have been selected. The <span class="html-italic">x</span>-axis is in a logarithmic scale.</p>
Full article ">Figure 5
<p>Execution time of all algorithms as a speedup gained from the simple one, when <math display="inline"> <semantics> <mrow> <mi>m</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>1</mn> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mi>r</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>0.2</mn> </mrow> </semantics> </math>. The <span class="html-italic">x</span>-axis is in a logarithmic scale.</p>
Full article ">Figure 6
<p>Execution time of all algorithms as a speedup gained from the simple one, when <math display="inline"> <semantics> <mrow> <mi>m</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>2</mn> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mi>r</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>0.1</mn> </mrow> </semantics> </math>. The <span class="html-italic">x</span>-axis is in a logarithmic scale.</p>
Full article ">
24 pages, 2986 KiB  
Article
k-Same-Net: k-Anonymity with Generative Deep Neural Networks for Face Deidentification
by Blaž Meden, Žiga Emeršič, Vitomir Štruc and Peter Peer
Entropy 2018, 20(1), 60; https://doi.org/10.3390/e20010060 - 13 Jan 2018
Cited by 56 | Viewed by 10287
Abstract
Image and video data are today being shared between government entities and other relevant stakeholders on a regular basis and require careful handling of the personal information contained therein. A popular approach to ensure privacy protection in such data is the use of [...] Read more.
Image and video data are today being shared between government entities and other relevant stakeholders on a regular basis and require careful handling of the personal information contained therein. A popular approach to ensure privacy protection in such data is the use of deidentification techniques, which aim at concealing the identity of individuals in the imagery while still preserving certain aspects of the data after deidentification. In this work, we propose a novel approach towards face deidentification, called k-Same-Net, which combines recent Generative Neural Networks (GNNs) with the well-known k-Anonymitymechanism and provides formal guarantees regarding privacy protection on a closed set of identities. Our GNN is able to generate synthetic surrogate face images for deidentification by seamlessly combining features of identities used to train the GNN model. Furthermore, it allows us to control the image-generation process with a small set of appearance-related parameters that can be used to alter specific aspects (e.g., facial expressions, age, gender) of the synthesized surrogate images. We demonstrate the feasibility of k-Same-Net in comprehensive experiments on the XM2VTS and CK+ datasets. We evaluate the efficacy of the proposed approach through reidentification experiments with recent recognition models and compare our results with competing deidentification techniques from the literature. We also present facial expression recognition experiments to demonstrate the utility-preservation capabilities of k-Same-Net. Our experimental results suggest that k-Same-Net is a viable option for facial deidentification that exhibits several desirable characteristics when compared to existing solutions in this area. Full article
(This article belongs to the Special Issue Selected Papers from IWOBI—Entropy-Based Applied Signal Processing)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>The motivation behind deidentification: to prevent misuse of personal information and ensure privacy protection when data are shared between government entities or other relevant stakeholders, the data need to be appropriately deidentified before being shared.</p>
Full article ">Figure 2
<p>Illustration of the idea behind the <span class="html-italic">k</span>-Anonymity mechanisms. The input image set <math display="inline"> <semantics> <mi mathvariant="script">I</mi> </semantics> </math> on the left is mapped to the deidentified image set <math display="inline"> <semantics> <mi mathvariant="script">D</mi> </semantics> </math> on the right. Anonymity is ensured by replacing <span class="html-italic">k</span> images from <math display="inline"> <semantics> <mi mathvariant="script">I</mi> </semantics> </math> with the same surrogate image. To preserve some of the information content of the original images, the surrogate images are computed as cluster centroids of the original images in <math display="inline"> <semantics> <mi mathvariant="script">I</mi> </semantics> </math>. The figure shows an example for <math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 3
<p>Overview of the <span class="html-italic">k</span>-Same-Net deidentification approach. Similar to other <span class="html-italic">k</span>-Same algorithms, each image in the input set <math display="inline"> <semantics> <mi mathvariant="script">I</mi> </semantics> </math> on the left is mapped to an image in the deidentified image set <math display="inline"> <semantics> <mi mathvariant="script">D</mi> </semantics> </math> on the right with <span class="html-italic">k</span> images from <math display="inline"> <semantics> <mi mathvariant="script">I</mi> </semantics> </math> mapping to the same image in <math display="inline"> <semantics> <mi mathvariant="script">D</mi> </semantics> </math>. The surrogate faces in <math display="inline"> <semantics> <mi mathvariant="script">D</mi> </semantics> </math> are generated by a Generative Neural Network (GNN) that is trained to produce identities from a proxy image set <math display="inline"> <semantics> <mi mathvariant="script">P</mi> </semantics> </math>. Other visual characteristics of the generated surrogate faces (pertaining, for example, to facial expressions, age, gender, etc.) are defined by a set of non-identity-related parameters of the GNN and depending on the application can be easily modified during the deidentification with <span class="html-italic">k</span>-Same-Net.</p>
Full article ">Figure 4
<p>Our GNN architecture is built using fully connected (dense) layers (denoted as FC1, FC2, FC3) and concatenation layer (denoted as C1), followed by six deconvolutional layers (performing upsampling and convolution, from layer UP1 to UP6 as denoted in the figure). Final layers in the network include combination of max pooling and upsampling (denoted as MaxUP) layers and the three-channel convolution (denoted as ToRGB) layer, respectively. Inputs to the GNN are one-hot encoded, which means that many input combinations are possible (e.g., multiple identities). On the output, GNN renders a colored face image through the layer ToRGB as illustrated in the figure.</p>
Full article ">Figure 5
<p>Sample images from the three datasets used for our experiments: (<b>a</b>) RaFD [<a href="#B54-entropy-20-00060" class="html-bibr">54</a>]; (<b>b</b>) XM2VTS [<a href="#B55-entropy-20-00060" class="html-bibr">55</a>]; and (<b>c</b>) CK+ [<a href="#B56-entropy-20-00060" class="html-bibr">56</a>]. We use the RaFD dataset to train our generative network and the XM2VTS and CK+ datasets to highlight the merits of <span class="html-italic">k</span>-Same-Net.</p>
Full article ">Figure 6
<p>Examples of synthetic images generated by the GNN. The GNN can produce various facial expressions for every identity. Each synthesized face shown is a mixture of <span class="html-italic">k</span> identities from the training (or proxy) set with <math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math> for the presented examples. Note that all images appear natural and show no visible artifacts (such as ghosting or other non-natural looking distortions).</p>
Full article ">Figure 7
<p>Qualitative deidentification results (from top to bottom): the original images, pixelated images, the <span class="html-italic">k</span>-Same-Pixel algorithm (<math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>), the <span class="html-italic">k</span>-Same-M algorithm (<math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>) and the <span class="html-italic">k</span>-Same-Net approach (<math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>). Note how the deidentification schemes differ in the visual quality of the deidentified images, as well as the amount of preserved information content.</p>
Full article ">Figure 8
<p>Preserving data utility. The top row shows the original images from the subject-specific input set <math display="inline"> <semantics> <mi mathvariant="script">I</mi> </semantics> </math>; the second row shows images deidentified with <span class="html-italic">k</span>-Same-Net without preserving any of the input information; and the last row shows <span class="html-italic">k</span>-Same-Net results where the facial expressions of the originals are retained in the deidentified images. Note that the two images that are marked red belong to the same cluster (<math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>) and have been deidentified in the last row using the same artificial target identity, but a different facial expression.</p>
Full article ">Figure 9
<p>Recognition and reidentification experiments: (<b>a</b>) average Cumulative Match Characteristics (CMC) curves of the recognition experiments on the original images of the XM2VTS dataset with five recognition techniques; (<b>b</b>) average Rank-1 recognition rates for all tested recognition approaches after deidentification as a function of <span class="html-italic">k</span>. The results show that the original identities are correctly determined most of the time on the original images with all techniques considered, while the performance is close to random after <span class="html-italic">k</span>-Same-Net deidentification regardless of the value of <span class="html-italic">k</span>. The graphs are best viewed in color.</p>
Full article ">Figure 10
<p>Average Rank-1 recognition (reidentification) rates obtained on the deidentified probe sets over five experimental repetitions with five competing deidentification approaches as a function of <span class="html-italic">k</span>: (<b>a</b>) results with the InceptionV3 face recognition model; (<b>b</b>) results for the POEM-based recognition approach. The results show that <span class="html-italic">k</span>-Same-Net is effective and offers high levels of privacy protection compared to competing techniques, while having desirable properties as shown in <a href="#sec4dot6-entropy-20-00060" class="html-sec">Section 4.6</a>.</p>
Full article ">Figure 11
<p>Confusion matrices of the utility-preservation experiments for the DeXpression model: (<b>a</b>) the reference matrix generated on the original CK+ images; confusion matrices after deidentification with <span class="html-italic">k</span>-Same-Net for: (<b>b</b>) <math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics> </math>; (<b>c</b>) <math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics> </math>; (<b>d</b>); <math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics> </math>; (<b>e</b>) <math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>7</mn> </mrow> </semantics> </math>; and (<b>f</b>) <math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>9</mn> </mrow> </semantics> </math>. Note that a high expression recognition performance can still be achieved on the deidentified data.</p>
Full article ">
18 pages, 1520 KiB  
Article
Exergetic Analysis, Optimization and Comparison of LNG Cold Exergy Recovery Systems for Transportation
by Paweł Dorosz, Paweł Wojcieszak and Ziemowit Malecha
Entropy 2018, 20(1), 59; https://doi.org/10.3390/e20010059 - 13 Jan 2018
Cited by 33 | Viewed by 7597
Abstract
LNG (Liquefied Natural Gas) shares in the global energy market is steadily increasing. One possible application of LNG is as a fuel for transportation. Stricter air pollution regulations and emission controls have made the natural gas a promising alternative to liquid petroleum fuels, [...] Read more.
LNG (Liquefied Natural Gas) shares in the global energy market is steadily increasing. One possible application of LNG is as a fuel for transportation. Stricter air pollution regulations and emission controls have made the natural gas a promising alternative to liquid petroleum fuels, especially in the case of heavy transport. However, in most LNG-fueled vehicles, the physical exergy of LNG is destroyed in the regasification process. This paper investigates possible LNG exergy recovery systems for transportation. The analyses focus on “cold energy” recovery systems as the enthalpy of LNG, which may be used as cooling power in air conditioning or refrigeration. Moreover, four exergy recovery systems that use LNG as a low temperature heat sink to produce electric power are analyzed. This includes single-stage and two-stage direct expansion systems, an ORC (Organic Rankine Cycle) system, and a combined system (ORC + direct expansion). The optimization of the above-mentioned LNG power cycles and exergy analyses are also discussed, with the identification of exergy loss in all components. The analyzed systems achieved exergetic efficiencies in the range of 20 % to 36 % , which corresponds to a net work in the range of 214 to 380 kJ/kg L N G . Full article
(This article belongs to the Special Issue Work Availability and Exergy Analysis)
Show Figures

Figure 1

Figure 1
<p>Recoverable cooling power from LNG, depending on the mass stream and pressure in the storage tank.</p>
Full article ">Figure 2
<p>Scheme of the direct expansion system.</p>
Full article ">Figure 3
<p>The exergetic efficiency of the direct expansion system depends on pumping pressure. The black arrows, associated with each curve, points to the corresponding vertical axis.</p>
Full article ">Figure 4
<p>Exergy loss in the components of the direct expansion system depending on pumping pressure.</p>
Full article ">Figure 5
<p>Exergy flowchart for the direct expansion cycle at an optimal pressure of 67 bar.</p>
Full article ">Figure 6
<p>The scheme of the two-stage direct expansion exergy recovery system.</p>
Full article ">Figure 7
<p>Exergetic efficiency of the two-stage direct expansion exergy recovery system.</p>
Full article ">Figure 8
<p>Analysis of losses in the components of the two-stage direct expansion exergy recovery system.</p>
Full article ">Figure 9
<p>Exergy flowchart of the two-stage direct expansion cycle for an optimal pumping pressure of 100 bar.</p>
Full article ">Figure 10
<p>Scheme of the LNG exergy recovery system using the Organic Rankine Cycle.</p>
Full article ">Figure 11
<p>Exergetic efficiency of the ORC exergy recovery system for the considered working fluids as a function of the pumping pressure.</p>
Full article ">Figure 12
<p>Comparison of the individual exergy losses in the components of the ORC exergy recovery system for the optimal pumping pressure and for every considered working fluid in the ORC cycle.</p>
Full article ">Figure 13
<p>Exergy flowchart of the ORC system using methane as a working fluid for optimal pressure 79 bar.</p>
Full article ">Figure 14
<p>Scheme of the combined exergy recovery system consisting of the direct expansion and the ORC cycle.</p>
Full article ">Figure 15
<p>Exergetic efficiency for the combined system using ethane as the working fluid for the ORC cycle.</p>
Full article ">Figure 16
<p>Exergetic efficiency for the combined system using propane as the working fluid for the ORC cycle.</p>
Full article ">Figure 17
<p>Exergetic efficiency for the combined system using HFC-23 as the working fluid for the ORC cycle.</p>
Full article ">Figure 18
<p>Exergetic efficiency for the combined system using PFC-14 as the working fluid for the ORC cycle.</p>
Full article ">Figure 19
<p>Exergy losses in the components of the combined exergy recovery system for the considered working fluids of the ORC cycle.</p>
Full article ">Figure 20
<p>Exergy flowchart of the combined system using ethane as the working fluid in the ORC cycle for an optimal LNG pumping pressure of 21 bar and ORC pumping pressure of 36 bar.</p>
Full article ">Figure 21
<p>A comparison of exergetic efficiencies for the considered exergy recovery systems.</p>
Full article ">
21 pages, 1581 KiB  
Article
Biological Networks Entropies: Examples in Neural Memory Networks, Genetic Regulation Networks and Social Epidemic Networks
by Jacques Demongeot, Mariem Jelassi, Hana Hazgui, Slimane Ben Miled, Narjes Bellamine Ben Saoud and Carla Taramasco
Entropy 2018, 20(1), 36; https://doi.org/10.3390/e20010036 - 13 Jan 2018
Cited by 6 | Viewed by 5564
Abstract
Networks used in biological applications at different scales (molecule, cell and population) are of different types: neuronal, genetic, and social, but they share the same dynamical concepts, in their continuous differential versions (e.g., non-linear Wilson-Cowan system) as well as in their discrete Boolean [...] Read more.
Networks used in biological applications at different scales (molecule, cell and population) are of different types: neuronal, genetic, and social, but they share the same dynamical concepts, in their continuous differential versions (e.g., non-linear Wilson-Cowan system) as well as in their discrete Boolean versions (e.g., non-linear Hopfield system); in both cases, the notion of interaction graph G(J) associated to its Jacobian matrix J, and also the concepts of frustrated nodes, positive or negative circuits of G(J), kinetic energy, entropy, attractors, structural stability, etc., are relevant and useful for studying the dynamics and the robustness of these systems. We will give some general results available for both continuous and discrete biological networks, and then study some specific applications of three new notions of entropy: (i) attractor entropy, (ii) isochronal entropy and (iii) entropy centrality; in three domains: a neural network involved in the memory evocation, a genetic network responsible of the iron control and a social network accounting for the obesity spread in high school environment. Full article
(This article belongs to the Section Statistical Physics)
Show Figures

Figure 1

Figure 1
<p>Top left : Attractor A is invariant for the composed operator LoB. Top right: Shadow trajectory between x and y. Bottom: State of the attractor A returning to A after a perturbation in the attraction basin B(A).</p>
Full article ">Figure 2
<p>Top left: interaction graph of a network made of a 3-switch (system made of three genes fully inhibited except the auto-activations) representing morphogens linked to a regulon representing chromatin clock genes. Top middle: the updating graph corresponding to a block-parallel dynamics ruling the network. Top right: a part of the trajectory graph exhibiting a limit-cycle of period 12 having internally a cycle of period four for the chromatin clock genes. Bottom: updating graphs corresponding successively (from the left to the right) to the parallel, sequential and block-sequential dynamics.</p>
Full article ">Figure 3
<p>Top: Logic neural network with local transition rules ⊕, ∨ and ∧. Bottom: Discrete trajectory graph in the state space <math display="inline"> <semantics> <mrow> <mi>E</mi> <mo>=</mo> <msup> <mfenced separators="" open="{" close="}"> <mn>0.1</mn> </mfenced> <mn>5</mn> </msup> </mrow> </semantics> </math> with indication of the values of <math display="inline"> <semantics> <mrow> <mn>64</mn> <mi>L</mi> </mrow> </semantics> </math>, where <span class="html-italic">L</span> is the Lyapunov function (in red).</p>
Full article ">Figure 4
<p>Top: asymptotic phase shift between two close isochrons in false colors from 0 to <math display="inline"> <semantics> <mrow> <mn>2</mn> <mi>π</mi> </mrow> </semantics> </math>, when an instantaneous perturbation is made on the Wilson-Cowan oscillator. Bottom left: perturbations of same intensity made at two different phases <math display="inline"> <semantics> <msub> <mi>φ</mi> <mn>1</mn> </msub> </semantics> </math> and <math display="inline"> <semantics> <msub> <mi>φ</mi> <mn>2</mn> </msub> </semantics> </math> on the limit-cycle of the Wilson-Cowan oscillator. Bottom right: value of the period of the limit-cycle in false colors depending on the values of the parameters <math display="inline"> <semantics> <msub> <mi>τ</mi> <mi>x</mi> </msub> </semantics> </math> and <math display="inline"> <semantics> <msub> <mi>τ</mi> <mi>y</mi> </msub> </semantics> </math> from 3.5 to 7.</p>
Full article ">Figure 5
<p>The interaction graph of the iron regulatory network, whose interactions can be activatory (+) or inhibitory (−), such as those of microRNAs, like miR-485.</p>
Full article ">Figure 6
<p>Top left: social graphs related to the friendship relationships between pupils (overweight or obese in red, not obese in blue) of a French high school in 5th and 4th classes, corresponding to ages from 11 to 13 years. Top right: analogue graph for corresponding classes in a Tunisian high school in Tunis. Middle: histograms of the number of friends for pupils from French (left) and Tunisian (right) high schools. Bottom left: mean weight (in black, surrounded by the 95%-confidence interval in green) of pupils coming back to an acceptable “normality”, due to a preventive education of 10% of the betweenness central nodes obese, calculated for two sub-populations of tolerance h = 1 (top) and h = 0 (bottom). Bottom right: percentage of obese in these two sub-populations.</p>
Full article ">Figure 7
<p>Comparison between two classical types of centrality in the graph of the Tunisian high school between eigenvector (left) and total degree (right) centralities (node size is proportional to its centrality).</p>
Full article ">Figure 8
<p>Top: representation of the whole graph of the French high school. The size of the nodes corresponds to their centrality in-degree (left), eigenvector (middle) and total degree (right). Bottom: threshold for a therapeutic education leading back to the normal weight state the N obese individuals having the entropic centrality maximum: after stabilization of the social network dynamics, we get all individuals overweight or obese in red (left) if N = 20 and all individuals normal in green (right) if N = 21, this number constituting the success threshold of the education.</p>
Full article ">Figure 9
<p>Description of the attractors of circuits of length 8 for which Boolean local transition functions are either identity or negation.</p>
Full article ">Figure 10
<p>Frustrated pairs of nodes belonging to positive circuits of length 2 in the genetic network controlling the flowering of Arabidopsis thaliana. The network evolves by diminishing the global frustration until the attractor (here a fixed configuration, whose last changes are indicated in red) on which the frustration remains constant.</p>
Full article ">
24 pages, 4193 KiB  
Article
Transfer Entropy as a Tool for Hydrodynamic Model Validation
by Alicia Sendrowski, Kazi Sadid, Ehab Meselhe, Wayne Wagner, David Mohrig and Paola Passalacqua
Entropy 2018, 20(1), 58; https://doi.org/10.3390/e20010058 - 12 Jan 2018
Cited by 19 | Viewed by 5921
Abstract
The validation of numerical models is an important component of modeling to ensure reliability of model outputs under prescribed conditions. In river deltas, robust validation of models is paramount given that models are used to forecast land change and to track water, solid, [...] Read more.
The validation of numerical models is an important component of modeling to ensure reliability of model outputs under prescribed conditions. In river deltas, robust validation of models is paramount given that models are used to forecast land change and to track water, solid, and solute transport through the deltaic network. We propose using transfer entropy (TE) to validate model results. TE quantifies the information transferred between variables in terms of strength, timescale, and direction. Using water level data collected in the distributary channels and inter-channel islands of Wax Lake Delta, Louisiana, USA, along with modeled water level data generated for the same locations using Delft3D, we assess how well couplings between external drivers (river discharge, tides, wind) and modeled water levels reproduce the observed data couplings. We perform this operation through time using ten-day windows. Modeled and observed couplings compare well; their differences reflect the spatial parameterization of wind and roughness in the model, which prevents the model from capturing high frequency fluctuations of water level. The model captures couplings better in channels than on islands, suggesting that mechanisms of channel-island connectivity are not fully represented in the model. Overall, TE serves as an additional validation tool to quantify the couplings of the system of interest at multiple spatial and temporal scales. Full article
(This article belongs to the Special Issue Transfer Entropy II)
Show Figures

Figure 1

Figure 1
<p>Map of Wax Lake Delta (WLD) showing the locations of the field and modeling analysis. The circles are from the summer field campaign measuring water level on five islands and one channel from 3 May to 16 August 2014. The yellow squares are channel data from a field campaign from 8 November 2013 to 5 February 2014. Image is a Landsat 8 satellite photo from 19 June 2014, courtesy of the United States Geological Survey (USGS). Inset images show location of Louisiana in the USA and the location of WLD in Louisiana.</p>
Full article ">Figure 2
<p>Time series of water level, modeled water level, tide, filtered wind, and filtered discharge for two time periods (<b>a</b>–<b>e</b>) 19–28 May and (<b>f</b>–<b>j</b>) 17–26 June 2014. For the water levels, PI = Pintail Island, PC = Pintail Channel, and CG = Campground Island. Wind and discharge are filtered using a 5th order Butterworth filter.</p>
Full article ">Figure 3
<p>Process networks depicting statistically significant TE from tides, discharge, and wind (-WCosA) to the high frequency water level fluctuations (HLocation) and among high frequency water level fluctuations for the (<b>a</b>,<b>b</b>) field and (<b>c</b>,<b>d</b>) modeled island data for two time periods: 19–28 May and 17–26 June 2014. Within a network, arrows from tide, discharge, and wind are arranged in order of most persistent (thickest line) to least persistent (dashed line) for each location. The color of the arrow identifies the driver node. Among water levels, the biggest arrowheads refer to the most persistent relationships. For the water levels, CG = Campground Island, PI = Pintail Island, PC = Pintail Channel.</p>
Full article ">Figure 4
<p>The number of statistically significant transfer entropy (TE) couplings for all windows investigated in the study, for the field (solid line) and modeled (dashed line) data. The circles show the window for the process networks depicted in <a href="#entropy-20-00058-f003" class="html-fig">Figure 3</a>.</p>
Full article ">Figure 5
<p>Transfer entropy (TE) results within a window. Dashed lines are 95% confidence limits. (<b>a</b>) Information transfer from filtered discharge (Q) to high frequency modeled and field water level for Pintail Channel (HPC) for the window 19–28 May; (<b>b</b>) TE from tide to Sherman Island high frequency water level (HSher), for field and model data, for the 19–28 May window; (<b>c</b>) TE from high frequency water level on Mike (HMike) to high frequency water level on Greg (HGreg) from 17–26 June; (<b>d</b>) TE from high frequency water level fluctuations on Sherman Island (HSher) to high frequency water level fluctuations on Pintail Island (HPI) from 17–26 June. Each window also shows the mutual information (MI) value for that relationship.</p>
Full article ">Figure 6
<p>Time series of water level, modeled water level, tide, filtered wind, and filtered discharge for two time periods (<b>a</b>–<b>e</b>) 17–26 November and (<b>f</b>–<b>j</b>) 26 November–5 December 2013. Wind and discharge are filtered using a 5th order Butterworth filter.</p>
Full article ">Figure 7
<p>Process networks for high frequency water levels (HLocation) showing the (<b>a</b>,<b>b</b>) field and (<b>c</b>,<b>d</b>) modeled process connections for two time periods: 17–26 November and 26 November–5 December 2013. Within a network, arrows from wind (-WCosA), tide, and discharge are arranged in order of most persistent (thickest line) to least persistent (dashed line) for each location. The color of the arrow identifies the driver node. Among water levels, the biggest arrowheads refer to the most persistent relationships.</p>
Full article ">Figure 8
<p>The number of statistically significant transfer entropy (TE) couplings for all windows investigated in the study for the field (solid line) and modeled (dashed line) data. The circles show the window for the process networks depicted in <a href="#entropy-20-00058-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 9
<p>Transfer entropy (TE) results within a window. Dashed lines are 95% confidence limits. (<b>a</b>) Information transfer from filtered wind (FWCosA) to high frequency modeled and field water level for East Pass (HEast) for the window 17–26 November; (<b>b</b>) TE from filtered discharge (Q) to Main Pass high frequency water level (HMain), for field and modeled data, for the 17–26 November window; (<b>c</b>) TE from high frequency water level on Main (HMain) to high frequency water level at Apex (HApex) from 26 November–December 5; (<b>d</b>) TE from high frequency water level fluctuations at East Pass (HEast) to high frequency water level fluctuations at Main Pass (HMain) from 26 November–5 December. Each window also shows the mutual information (MI) value for that relationship.</p>
Full article ">
15 pages, 664 KiB  
Article
Granger Causality and Jensen–Shannon Divergence to Determine Dominant Atrial Area in Atrial Fibrillation
by Raquel Cervigón, Francisco Castells, José Manuel Gómez-Pulido, Julián Pérez-Villacastín and Javier Moreno
Entropy 2018, 20(1), 57; https://doi.org/10.3390/e20010057 - 12 Jan 2018
Cited by 8 | Viewed by 5471
Abstract
Atrial fibrillation (AF) is already the most commonly occurring arrhythmia. Catheter pulmonary vein ablation has emerged as a treatment that is able to make the arrhythmia disappear; nevertheless, recurrence to arrhythmia is very frequent. In this study, it is proposed to perform an [...] Read more.
Atrial fibrillation (AF) is already the most commonly occurring arrhythmia. Catheter pulmonary vein ablation has emerged as a treatment that is able to make the arrhythmia disappear; nevertheless, recurrence to arrhythmia is very frequent. In this study, it is proposed to perform an analysis of the electrical signals recorded from bipolar catheters at three locations, pulmonary veins and the right and left atria, before to and during the ablation procedure. Principal Component Analysis (PCA) was applied to reduce data dimension and Granger causality and divergence techniques were applied to analyse connectivity along the atria, in three main regions: pulmonary veins, left atrium (LA) and right atrium (RA). The results showed that, before the procedure, patients with recurrence in the arrhythmia had greater connectivity between atrial areas. Moreover, during the ablation procedure, in patients with recurrence in the arrhythmial both atria were more connected than in patients that maintained sinus rhythms. These results can be helpful for procedures designing to end AF. Full article
(This article belongs to the Special Issue Entropy in Signal Analysis)
Show Figures

Figure 1

Figure 1
<p>Diagrammatic representation illustrating Orbiter and Lasso catheters’ distribution of electric poles along both atria and a pulmonary vein. The lower right figure represents the anatomic relation of the four cardiac heart chambers, showing atria and ventricles and one pulmonary vein.</p>
Full article ">Figure 2
<p>Four original RA electrogram signals (<b>top</b>) and pre-processing signals using the Botteron pre-processing chain (<b>bottom</b>).</p>
Full article ">Figure 3
<p>Five Gaussian-shaped pulses with increasing delays (<b>a</b>) and PC decomposition (<b>b</b>).</p>
Full article ">Figure 4
<p>Variance content of the first component vs. delay between activations.</p>
Full article ">Figure 5
<p>G-Causality in relation to atrial area in AF recurrent patients (red) and patients that maintain sinus rhythm (blue).</p>
Full article ">Figure 6
<p>Jensen–Shannon divergence in relation to atrial area in recurrent AF patients (red) and patients that maintain sinus rhythm (blue).</p>
Full article ">Figure 7
<p>Granger causality in relation to all the phases in recurrent AF patients (red) and patients that maintain sinus rhythm (blue).</p>
Full article ">Figure 8
<p>Jensen–Shannon Divergence between LA and RA along the for phases in recurrent AF patients (red) and patients in sinus rhythm (blue).</p>
Full article ">
17 pages, 296 KiB  
Article
Entropy of Iterated Function Systems and Their Relations with Black Holes and Bohr-Like Black Holes Entropies
by Christian Corda, Mehdi FatehiNia, MohammadReza Molaei and Yamin Sayyari
Entropy 2018, 20(1), 56; https://doi.org/10.3390/e20010056 - 12 Jan 2018
Cited by 15 | Viewed by 4460
Abstract
In this paper we consider the metric entropies of the maps of an iterated function system deduced from a black hole which are known the Bekenstein–Hawking entropies and its subleading corrections. More precisely, we consider the recent model of a Bohr-like black hole [...] Read more.
In this paper we consider the metric entropies of the maps of an iterated function system deduced from a black hole which are known the Bekenstein–Hawking entropies and its subleading corrections. More precisely, we consider the recent model of a Bohr-like black hole that has been recently analysed in some papers in the literature, obtaining the intriguing result that the metric entropies of a black hole are created by the metric entropies of the functions, created by the black hole principal quantum numbers, i.e., by the black hole quantum levels. We present a new type of topological entropy for general iterated function systems based on a new kind of the inverse of covers. Then the notion of metric entropy for an Iterated Function System ( I F S ) is considered, and we prove that these definitions for topological entropy of IFS’s are equivalent. It is shown that this kind of topological entropy keeps some properties which are hold by the classic definition of topological entropy for a continuous map. We also consider average entropy as another type of topological entropy for an I F S which is based on the topological entropies of its elements and it is also an invariant object under topological conjugacy. The relation between Axiom A and the average entropy is investigated. Full article
20 pages, 29827 KiB  
Article
A Sequential Algorithm for Signal Segmentation
by Paulo Hubert, Linilson Padovese and Julio Michael Stern
Entropy 2018, 20(1), 55; https://doi.org/10.3390/e20010055 - 12 Jan 2018
Cited by 10 | Viewed by 7095
Abstract
The problem of event detection in general noisy signals arises in many applications; usually, either a functional form of the event is available, or a previous annotated sample with instances of the event that can be used to train a classification algorithm. There [...] Read more.
The problem of event detection in general noisy signals arises in many applications; usually, either a functional form of the event is available, or a previous annotated sample with instances of the event that can be used to train a classification algorithm. There are situations, however, where neither functional forms nor annotated samples are available; then, it is necessary to apply other strategies to separate and characterize events. In this work, we analyze 15-min samples of an acoustic signal, and are interested in separating sections, or segments, of the signal which are likely to contain significant events. For that, we apply a sequential algorithm with the only assumption that an event alters the energy of the signal. The algorithm is entirely based on Bayesian methods. Full article
Show Figures

Figure 1

Figure 1
<p>Posterior distribution for <math display="inline"> <semantics> <mover accent="true"> <mi>t</mi> <mo stretchy="false">¯</mo> </mover> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>δ</mi> <mo>=</mo> <mn>1.1</mn> <mo>.</mo> </mrow> </semantics> </math></p>
Full article ">Figure 2
<p>Posterior distribution for <math display="inline"> <semantics> <mover accent="true"> <mi>t</mi> <mo stretchy="false">¯</mo> </mover> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>δ</mi> <mo>=</mo> <mn>1.5</mn> <mo>.</mo> </mrow> </semantics> </math></p>
Full article ">Figure 3
<p>Posterior distribution for <math display="inline"> <semantics> <mover accent="true"> <mi>t</mi> <mo stretchy="false">¯</mo> </mover> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>δ</mi> <mo>=</mo> <mn>2</mn> <mo>.</mo> </mrow> </semantics> </math></p>
Full article ">Figure 4
<p>Segmentation point estimated for a signal with two power changes; see text for details.</p>
Full article ">Figure 5
<p>One step of the sequential segmentation algorithm.</p>
Full article ">Figure 6
<p>Waveform and spectrogram of the first sample: noise only.</p>
Full article ">Figure 7
<p>Waveform and spectrogram of the second sample: one long duration event.</p>
Full article ">Figure 8
<p>Waveform and spectrogram of the third sample: many short events.</p>
Full article ">Figure 9
<p>Segmentation using the SeqSeg algorithm with <math display="inline"> <semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>3</mn> <msup> <mi>e</mi> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> </mrow> </semantics> </math>.</p>
Full article ">Figure 9 Cont.
<p>Segmentation using the SeqSeg algorithm with <math display="inline"> <semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>3</mn> <msup> <mi>e</mi> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> </mrow> </semantics> </math>.</p>
Full article ">Figure 10
<p>Segmentation using the SeqSeg algorithm with <math display="inline"> <semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>1</mn> <msup> <mi>e</mi> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> </mrow> </semantics> </math>.</p>
Full article ">Figure 11
<p>Segmentation using Palshikar’s algorithm with <math display="inline"> <semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 12
<p>Segmentation using Palshikar’s algorithm with <math display="inline"> <semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics> </math>.</p>
Full article ">
16 pages, 2660 KiB  
Article
Synchronization in Fractional-Order Complex-Valued Delayed Neural Networks
by Weiwei Zhang, Jinde Cao, Dingyuan Chen and Fuad E. Alsaadi
Entropy 2018, 20(1), 54; https://doi.org/10.3390/e20010054 - 12 Jan 2018
Cited by 30 | Viewed by 4234
Abstract
This paper discusses the synchronization of fractional order complex valued neural networks (FOCVNN) at the presence of time delay. Synchronization criterions are achieved through the employment of a linear feedback control and comparison theorem of fractional order linear systems with delay. Feasibility and [...] Read more.
This paper discusses the synchronization of fractional order complex valued neural networks (FOCVNN) at the presence of time delay. Synchronization criterions are achieved through the employment of a linear feedback control and comparison theorem of fractional order linear systems with delay. Feasibility and effectiveness of the proposed system are validated through numerical simulations. Full article
(This article belongs to the Special Issue Research Frontier in Chaos Theory and Complex Networks)
Show Figures

Figure 1

Figure 1
<p>Curves of <math display="inline"> <semantics> <mrow> <msub> <mi>z</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>z</mi> <mn>2</mn> </msub> <mo>,</mo> <msubsup> <mi>z</mi> <mn>1</mn> <mo>′</mo> </msubsup> <mo>,</mo> <msubsup> <mi>z</mi> <mn>2</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> in 3-dimensional space without control.</p>
Full article ">Figure 2
<p>Curves of <math display="inline"> <semantics> <mrow> <msub> <mi>z</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>z</mi> <mn>2</mn> </msub> <mo>,</mo> <msubsup> <mi>z</mi> <mn>1</mn> <mo>′</mo> </msubsup> <mo>,</mo> <msubsup> <mi>z</mi> <mn>2</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> in 2-dimensional space without control.</p>
Full article ">Figure 3
<p>The trajectories of <math display="inline"> <semantics> <mrow> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <msubsup> <mi>x</mi> <mn>1</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> without control.</p>
Full article ">Figure 4
<p>The trajectories of <math display="inline"> <semantics> <mrow> <msub> <mi>x</mi> <mn>2</mn> </msub> <mo>,</mo> <msubsup> <mi>x</mi> <mn>2</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> without control.</p>
Full article ">Figure 5
<p>The trajectories of <math display="inline"> <semantics> <mrow> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>,</mo> <msubsup> <mi>y</mi> <mn>1</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> without control.</p>
Full article ">Figure 6
<p>The trajectories of <math display="inline"> <semantics> <mrow> <msub> <mi>y</mi> <mn>2</mn> </msub> <mo>,</mo> <msubsup> <mi>y</mi> <mn>2</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> without control.</p>
Full article ">Figure 7
<p>Curves of <math display="inline"> <semantics> <mrow> <msub> <mi>z</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>z</mi> <mn>2</mn> </msub> <mo>,</mo> <msubsup> <mi>z</mi> <mn>1</mn> <mo>′</mo> </msubsup> <mo>,</mo> <msubsup> <mi>z</mi> <mn>2</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> in 3-dimensional space with controller.</p>
Full article ">Figure 8
<p>Curves of <math display="inline"> <semantics> <mrow> <msub> <mi>z</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>z</mi> <mn>2</mn> </msub> <mo>,</mo> <msubsup> <mi>z</mi> <mn>1</mn> <mo>′</mo> </msubsup> <mo>,</mo> <msubsup> <mi>z</mi> <mn>2</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> in 2-dimensional space with controller.</p>
Full article ">Figure 9
<p>The synchronization trajectories of <math display="inline"> <semantics> <mrow> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <msubsup> <mi>x</mi> <mn>1</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> with controller.</p>
Full article ">Figure 10
<p>The synchronization trajectories of <math display="inline"> <semantics> <mrow> <msub> <mi>x</mi> <mn>2</mn> </msub> <mo>,</mo> <msubsup> <mi>x</mi> <mn>2</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> with controller.</p>
Full article ">Figure 11
<p>The synchronization trajectories of <math display="inline"> <semantics> <mrow> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>,</mo> <msubsup> <mi>y</mi> <mn>1</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> with controller.</p>
Full article ">Figure 12
<p>The synchronization trajectories of <math display="inline"> <semantics> <mrow> <msub> <mi>y</mi> <mn>2</mn> </msub> <mo>,</mo> <msubsup> <mi>y</mi> <mn>2</mn> <mo>′</mo> </msubsup> </mrow> </semantics> </math> with controller.</p>
Full article ">Figure 13
<p>The synchronization error <math display="inline"> <semantics> <msubsup> <mi>e</mi> <mn>1</mn> <mi>R</mi> </msubsup> </semantics> </math> state.</p>
Full article ">Figure 14
<p>The synchronization error <math display="inline"> <semantics> <msubsup> <mi>e</mi> <mn>2</mn> <mi>R</mi> </msubsup> </semantics> </math> state.</p>
Full article ">Figure 15
<p>The synchronization error <math display="inline"> <semantics> <msubsup> <mi>e</mi> <mn>1</mn> <mi>I</mi> </msubsup> </semantics> </math> state.</p>
Full article ">Figure 16
<p>The synchronization error <math display="inline"> <semantics> <msubsup> <mi>e</mi> <mn>2</mn> <mi>I</mi> </msubsup> </semantics> </math> state.</p>
Full article ">
14 pages, 6244 KiB  
Article
Chaotic Dynamics of the Fractional-Love Model with an External Environment
by Linyun Huang and Youngchul Bae
Entropy 2018, 20(1), 53; https://doi.org/10.3390/e20010053 - 12 Jan 2018
Cited by 22 | Viewed by 4520
Abstract
Based on the fractional order of nonlinear system for love model with a periodic function as an external environment, we analyze the characteristics of the chaotic dynamic. We analyze the relationship between the chaotic dynamic of the fractional order love model with an [...] Read more.
Based on the fractional order of nonlinear system for love model with a periodic function as an external environment, we analyze the characteristics of the chaotic dynamic. We analyze the relationship between the chaotic dynamic of the fractional order love model with an external environment and the value of fractional order (α, β) when the parameters are fixed. Meanwhile, we also study the relationship between the chaotic dynamic of the fractional order love model with an external environment and the parameters (a, b, c, d) when the fractional order of the system is fixed. When the parameters of fractional order love model are fixed, the fractional order (α, β) of fractional order love model system exhibit segmented chaotic states with the different fractional orders of the system. When the fractional order (α = β) of the system is fixed, the system shows the periodic state and the chaotic state as the parameter is changing as a result. Full article
(This article belongs to the Special Issue Theoretical Aspect of Nonlinear Statistical Physics)
Show Figures

Figure 1

Figure 1
<p>Time series of the system with different fractional order <span class="html-italic">q</span> values, and subfigures (<b>a</b>–<b>k</b>) are the fractional order <span class="html-italic">q</span> changed from 1 to 0.5 by 0.05 steps.</p>
Full article ">Figure 2
<p>Phase portrait of the system with different fractional order <span class="html-italic">q</span> values, and subfigures (<b>a</b>–<b>k</b>) are the fractional order <span class="html-italic">q</span> changed from 1 to 0.5 by 0.05 steps.</p>
Full article ">Figure 3
<p>Power spectrum of the system with different fractional order <span class="html-italic">q</span> values, and subfigures (<b>a</b>–<b>k</b>) are the fractional order <span class="html-italic">q</span> changed from 1 to 0.5 by 0.05 steps.</p>
Full article ">Figure 4
<p>Poincaré map of the system with different fractional order <span class="html-italic">q</span> values, and subfigures (<b>a</b>–<b>k</b>) are the fractional order <span class="html-italic">q</span> changed from 1 to 0.5 by 0.05 steps.</p>
Full article ">Figure 5
<p>Time series (<b>a</b>), phase portrait (<b>b</b>), power spectrum (<b>c</b>), and Poincaré map (<b>d</b>) of the system when <span class="html-italic">a</span> = −5.</p>
Full article ">Figure 6
<p>Time series (<b>a</b>), phase portrait (<b>b</b>), power spectrum (<b>c</b>), and Poincaré map (<b>d</b>) of the system when <span class="html-italic">a</span> = −2.42.</p>
Full article ">Figure 7
<p>Time series (<b>a</b>), phase portrait (<b>b</b>), power spectrum (<b>c</b>), and Poincaré map (<b>d</b>) of the system when <span class="html-italic">a</span> = −2.</p>
Full article ">Figure 8
<p>Time series (<b>a</b>), phase portrait (<b>b</b>), power spectrum (<b>c</b>), and Poincaré map (<b>d</b>) of the system when <span class="html-italic">a</span> = −1.76.</p>
Full article ">Figure 9
<p>Time series (<b>a</b>), phase portrait (<b>b</b>), power spectrum (<b>c</b>), and Poincaré map (<b>d</b>) of the system when <span class="html-italic">a</span> = −1.53.</p>
Full article ">Figure 10
<p>Time series (<b>a</b>), phase portrait (<b>b</b>), power spectrum (<b>c</b>), and Poincaré map (<b>d</b>) of the system when <span class="html-italic">a</span> = −1.45.</p>
Full article ">Figure 11
<p>The bifurcation diagram and MLE of the system when parameter “<span class="html-italic">a</span>” changed from −6 to −1.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop