[go: up one dir, main page]

 
 
entropy-logo

Journal Browser

Journal Browser

Computational Complexity

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Complexity".

Deadline for manuscript submissions: closed (30 April 2016) | Viewed by 75937

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Engineering, University of Porto, Rua Dr. Roberto Frias, 4200–465 Porto, Portugal
Interests: complex systems modelling; automation and robotics; fractional order systems modelling and control; data analysis and visualization
Special Issues, Collections and Topics in MDPI journals

grade Website
Guest Editor
Department of Electrical Engineering, Institute of Engineering, Polytechnic Institute of Porto, 4249-015 Porto, Portugal
Interests: nonlinear dynamics; fractional calculus; modeling; control; evolutionary computing; genomics; robotics, complex systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Complex systems (CS) are composed of many parts that interact dynamically with each other at different scales in time and space. They possess the capability to evolve, to adapt, and to self-organize, revealing a collective behavior that is much richer than the one exhibited by their individual components. The high sensitivity of CS to initial conditions and their characteristic emergent behavior, give rise to large-scale dynamics that cannot be described by a single rule, nor reduced to just one level of description. The issues in modeling CS have led to the development of novel computational and modeling tools with applications to a wide range of scientific areas. The computational problems posed by CS exhibit intrinsic difficulties, being a major concern in Computational Complexity Theory.

This Special Issue focuses on new theoretical and practical findings, and computational methods, applicable to difficult problems, whose solution demands for extensive and powerful resources, approaching the limits of the available computer systems. Submissions addressing novel issues, as well as those on more specific topics illustrating the broad impact of computational complexity theory in computer science, mathematics, physics, engineering, geophysics, social science, among others, are welcomed.

All papers should fit the scope of the journal Entropy. The topics of interest include (but are not limited to):

  • Agent based modeling and simulation
  • Advanced computational applications in geosciences, physics, mathematics, engineering, finance, economy, medicine, biology, and social science
  • Complex networks
  • Data mining and knowledge discovery
  • Intelligent systems
  • Probability and statistics in complex systems
  • Quantum information science
  • Novel computational schemes

Prof. Dr. J. A. Tenreiro Machado
Prof. Dr. António M. Lopes
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Complexity
  • Complex systems
  • Computation theory
  • Simulation and Modeling
  • Entropy
  • Information
  • Algorithms

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (13 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Research

627 KiB  
Editorial
Computational Complexity
by J. A. Tenreiro Machado and António M. Lopes
Entropy 2017, 19(2), 61; https://doi.org/10.3390/e19020061 - 7 Feb 2017
Cited by 1 | Viewed by 3544
Abstract
Complex systems (CS) involve many elements that interact at different scales in time and space. The challenges in modeling CS led to the development of novel computational tools with applications in a wide range of scientific areas. The computational problems posed by CS [...] Read more.
Complex systems (CS) involve many elements that interact at different scales in time and space. The challenges in modeling CS led to the development of novel computational tools with applications in a wide range of scientific areas. The computational problems posed by CS exhibit intrinsic difficulties that are a major concern in Computational Complexity Theory. [...]
Full article
(This article belongs to the Special Issue Computational Complexity)

Research

Jump to: Editorial

3453 KiB  
Article
Entropy Complexity and Stability of a Nonlinear Dynamic Game Model with Two Delays
by Zhihui Han, Junhai Ma, Fengshan Si and Wenbo Ren
Entropy 2016, 18(9), 317; https://doi.org/10.3390/e18090317 - 30 Aug 2016
Cited by 13 | Viewed by 4842
Abstract
In this paper, a duopoly game model with double delays in hydropower market is established, and the research focus on the influence of time delay parameter on the complexity of the system. Firstly, we established a game model for the enterprises considering both [...] Read more.
In this paper, a duopoly game model with double delays in hydropower market is established, and the research focus on the influence of time delay parameter on the complexity of the system. Firstly, we established a game model for the enterprises considering both the current and the historical output when making decisions. Secondly, the existence and stability of Hopf bifurcation are analyzed, and the conditions and main conclusions of Hopf bifurcation are given. Thirdly, numerical simulation and analysis are carried out to verify the conclusions of the theoretical analysis. The effect of delay parameter on the stability of the system is simulated by a bifurcation diagram, the Lyapunov exponent, and an entropic diagram; in addition, the stability region of the system is given by a 2D parameter bifurcation diagram and a 3D parameter bifurcation diagram. Finally, the method of delayed feedback control is used to control the chaotic system. The research results can provide a guideline for enterprise decision-making. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Figure 1

Figure 1
<p>The influence of <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> </mrow> </semantics> </math> on the stability of Equation (25) when <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0</mn> </mrow> </semantics> </math>. (<b>a</b>) Bifurcation diagram; (<b>b</b>) the Largest Lyapunov exponent.</p>
Full article ">Figure 2
<p>Equation (25) is stable when <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>2</mn> <mo>&lt;</mo> <msub> <mi>τ</mi> <mrow> <mn>20</mn> </mrow> </msub> <mo>=</mo> <mn>2.829</mn> </mrow> </semantics> </math> for <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0</mn> </mrow> </semantics> </math>. (<b>a</b>) Time series plot; (<b>b</b>) attractor.</p>
Full article ">Figure 3
<p>Equation (25) is instable when <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>3.5</mn> <mo>&gt;</mo> <msub> <mi>τ</mi> <mrow> <mn>20</mn> </mrow> </msub> <mo>=</mo> <mn>2.829</mn> </mrow> </semantics> </math> for <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0</mn> </mrow> </semantics> </math>. (<b>a</b>) Time series plot; (<b>b</b>) attractor.</p>
Full article ">Figure 4
<p>Entropy diagram with an increase of <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> </mrow> </semantics> </math> for <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 5
<p>The influence of <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> </mrow> </semantics> </math> on the stability of Equation (25) when <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1.5</mn> </mrow> </semantics> </math>. (<b>a</b>) Bifurcation diagram; (<b>b</b>) the Largest Lyapunov exponent.</p>
Full article ">Figure 6
<p>Equation (25) is stable when <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2</mn> <mo>&lt;</mo> <msub> <mi>τ</mi> <mrow> <mn>10</mn> </mrow> </msub> <mo>=</mo> <mn>2.648</mn> </mrow> </semantics> </math> for <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1.5</mn> </mrow> </semantics> </math>. (<b>a</b>) Time series plot; (<b>b</b>) attractor.</p>
Full article ">Figure 7
<p>Equation (25) is instable when <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>3</mn> <mo>&gt;</mo> <msub> <mi>τ</mi> <mrow> <mn>10</mn> </mrow> </msub> <mo>=</mo> <mn>2.648</mn> </mrow> </semantics> </math> for <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1.5</mn> </mrow> </semantics> </math>. (<b>a</b>) Time series plot; (<b>b</b>) attractor.</p>
Full article ">Figure 8
<p>The change of basin of attraction with an increase of <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> </mrow> </semantics> </math> for <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1.5</mn> </mrow> </semantics> </math>. (<b>a</b>) <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2.3</mn> </mrow> </semantics> </math>; (<b>b</b>) <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2.5</mn> </mrow> </semantics> </math>; (<b>c</b>) <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2.7</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 8 Cont.
<p>The change of basin of attraction with an increase of <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> </mrow> </semantics> </math> for <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1.5</mn> </mrow> </semantics> </math>. (<b>a</b>) <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2.3</mn> </mrow> </semantics> </math>; (<b>b</b>) <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2.5</mn> </mrow> </semantics> </math>; (<b>c</b>) <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2.7</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 9
<p>The influences of <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> </mrow> </semantics> </math> on <math display="inline"> <semantics> <mrow> <msub> <mi>q</mi> <mn>1</mn> </msub> </mrow> </semantics> </math>.</p>
Full article ">Figure 10
<p>2D parameter bifurcation in the (<math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> </mrow> </semantics> </math>) plane, where different colors represent different price regions: stability region (green) and chaotic region (blue). For interpretation of the references to color in this figure, the reader is referred to the web version of this article.</p>
Full article ">Figure 11
<p>Entropy diagram with increase of <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> </mrow> </semantics> </math>.</p>
Full article ">Figure 12
<p>The influence of <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <msub> <mi>μ</mi> <mn>1</mn> </msub> </mrow> </semantics> </math> on <math display="inline"> <semantics> <mrow> <msub> <mi>q</mi> <mn>1</mn> </msub> </mrow> </semantics> </math>.</p>
Full article ">Figure 13
<p>3D parameter bifurcation in the (<math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>2</mn> </msub> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <msub> <mi>μ</mi> <mn>1</mn> </msub> </mrow> </semantics> </math>) plane, where different colors represent different regions of <math display="inline"> <semantics> <mrow> <msub> <mi>q</mi> <mn>1</mn> </msub> </mrow> </semantics> </math>: stability region (green) and chaotic region (blue). For interpretation of the references to color in this figure, the reader is referred to the web version of this article.</p>
Full article ">Figure 14
<p>The influence of <math display="inline"> <semantics> <mi>μ</mi> </semantics> </math> on the stability of Equation (26). (<b>a</b>) Bifurcation diagram; (<b>b</b>) the Largest Lyapunov exponent.</p>
Full article ">Figure 15
<p>Equation (26) is instable when <math display="inline"> <semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>0.03</mn> <mo>&lt;</mo> <mn>0.07909</mn> </mrow> </semantics> </math> for <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>3</mn> <mo>,</mo> <msub> <mi>τ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1.5</mn> </mrow> </semantics> </math>. (<b>a</b>) Time series plot; (<b>b</b>) attractor.</p>
Full article ">Figure 16
<p>Equation (26) is stable when <math display="inline"> <semantics> <mrow> <mi>μ</mi> <mo>=</mo> <mn>0.15</mn> <mo>&gt;</mo> <mn>0.07909</mn> </mrow> </semantics> </math> for <math display="inline"> <semantics> <mrow> <msub> <mi>τ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>3</mn> <mo>,</mo> <msub> <mi>τ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1.5</mn> </mrow> </semantics> </math>. (<b>a</b>) Time series plot; (<b>b</b>) attractor.</p>
Full article ">
2079 KiB  
Article
Normalized Minimum Error Entropy Algorithm with Recursive Power Estimation
by Namyong Kim and Kihyeon Kwon
Entropy 2016, 18(7), 239; https://doi.org/10.3390/e18070239 - 24 Jun 2016
Cited by 3 | Viewed by 4813
Abstract
The minimum error entropy (MEE) algorithm is known to be superior in signal processing applications under impulsive noise. In this paper, based on the analysis of behavior of the optimum weight and the properties of robustness against impulsive noise, a normalized [...] Read more.
The minimum error entropy (MEE) algorithm is known to be superior in signal processing applications under impulsive noise. In this paper, based on the analysis of behavior of the optimum weight and the properties of robustness against impulsive noise, a normalized version of the MEE algorithm is proposed. The step size of the MEE algorithm is normalized with the power of input entropy that is estimated recursively for reducing its computational complexity. The proposed algorithm yields lower minimum MSE (mean squared error) and faster convergence speed simultaneously than the original MEE algorithm does in the equalization simulation. On the condition of the same convergence speed, its performance enhancement in steady state MSE is above 3 dB. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Overall communication system model.</p>
Full article ">Figure 2
<p>Error space <span class="html-italic">E</span> and error entropy samples generated from error pairs.</p>
Full article ">Figure 3
<p>Magnitude controller for <span class="html-italic">IE</span>.</p>
Full article ">Figure 4
<p>The impulse and background noise for the simulation for the behavior of optimum weight.</p>
Full article ">Figure 5
<p>The behavior of weight values of <span class="html-italic">w</span><sub>4,<span class="html-italic">k</span></sub> and <span class="html-italic">w</span><sub>5,<span class="html-italic">k</span></sub> with impulsive noise being added in the steady state.</p>
Full article ">Figure 6
<p>The Comparison of <span class="html-italic">MSE</span> learning curves under impulsive noise (square: <span class="html-italic">LMS</span> with <span class="html-italic">μ<sub>LMS</sub></span> = 0.001, circle: <span class="html-italic">MEE</span> with <span class="html-italic">μ<sub>MEE</sub></span> = 0.01, triangle: <span class="html-italic">MEE</span> with <span class="html-italic">μ<sub>MEE</sub></span> = 0.02, thick line: <span class="html-italic">NMEE</span> with <span class="html-italic">β</span> = 0.9 and <span class="html-italic">μ</span> = 6<span class="html-italic">μ<sub>MEE</sub></span>).</p>
Full article ">Figure 7
<p>The trace of <span class="html-italic">MCIE</span> power <span class="html-italic">P</span>(<span class="html-italic">k</span>) of the <span class="html-italic">MEE</span> algorithm under the same simulation conditions used for <a href="#entropy-18-00239-f006" class="html-fig">Figure 6</a>.</p>
Full article ">Figure 8
<p>Learning curves of <span class="html-italic">NMEE</span> and <span class="html-italic">NMEE2</span> algorithms for comparison of the two methods of input power normalization.</p>
Full article ">Figure 9
<p>Learning curves of <span class="html-italic">MEE</span> and <span class="html-italic">NMEE</span> for system identification.</p>
Full article ">
530 KiB  
Article
Empirical Laws and Foreseeing the Future of Technological Progress
by António M. Lopes, José A. Tenreiro Machado and Alexandra M. Galhano
Entropy 2016, 18(6), 217; https://doi.org/10.3390/e18060217 - 2 Jun 2016
Cited by 8 | Viewed by 6095
Abstract
The Moore’s law (ML) is one of many empirical expressions that is used to characterize natural and artificial phenomena. The ML addresses technological progress and is expected to predict future trends. Yet, the “art” of predicting is often confused with the accurate fitting [...] Read more.
The Moore’s law (ML) is one of many empirical expressions that is used to characterize natural and artificial phenomena. The ML addresses technological progress and is expected to predict future trends. Yet, the “art” of predicting is often confused with the accurate fitting of trendlines to past events. Presently, data-series of multiple sources are available for scientific and computational processing. The data can be described by means of mathematical expressions that, in some cases, follow simple expressions and empirical laws. However, the extrapolation toward the future is considered with skepticism by the scientific community, particularly in the case of phenomena involving complex behavior. This paper addresses these issues in the light of entropy and pseudo-state space. The statistical and dynamical techniques lead to a more assertive perspective on the adoption of a given candidate law. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Figure 1

Figure 1
<p>Correlogram for the data-series <math display="inline"> <semantics> <msub> <mover accent="true"> <mi>y</mi> <mo stretchy="false">˜</mo> </mover> <mi>i</mi> </msub> </semantics> </math>: (<b>a</b>) GDP; (<b>b</b>) PPS; (<b>c</b>) TPM; (<b>d</b>) USP.</p>
Full article ">Figure 2
<p>Time evolution of the logarithm of the data-series, <math display="inline"> <semantics> <msub> <mover accent="true"> <mi>y</mi> <mo stretchy="false">˜</mo> </mover> <mi>i</mi> </msub> </semantics> </math>, and the model approximations, <math display="inline"> <semantics> <msub> <mover accent="true"> <mi>y</mi> <mo stretchy="false">^</mo> </mover> <mi>i</mi> </msub> </semantics> </math>: (<b>a</b>) GDP; (<b>b</b>) PPS; (<b>c</b>) TPM; (<b>d</b>) USP.</p>
Full article ">Figure 2 Cont.
<p>Time evolution of the logarithm of the data-series, <math display="inline"> <semantics> <msub> <mover accent="true"> <mi>y</mi> <mo stretchy="false">˜</mo> </mover> <mi>i</mi> </msub> </semantics> </math>, and the model approximations, <math display="inline"> <semantics> <msub> <mover accent="true"> <mi>y</mi> <mo stretchy="false">^</mo> </mover> <mi>i</mi> </msub> </semantics> </math>: (<b>a</b>) GDP; (<b>b</b>) PPS; (<b>c</b>) TPM; (<b>d</b>) USP.</p>
Full article ">Figure 3
<p>Residuals <math display="inline"> <semantics> <msup> <mrow> <mo>(</mo> <msub> <mover accent="true"> <mi>y</mi> <mo stretchy="false">˜</mo> </mover> <mi>i</mi> </msub> <mo>-</mo> <msub> <mover accent="true"> <mi>y</mi> <mo stretchy="false">^</mo> </mover> <mi>i</mi> </msub> <mo>)</mo> </mrow> <mn>2</mn> </msup> </semantics> </math> of the fits generated by nonlinear least-squares: (<b>a</b>) GDP; (<b>b</b>) PPS; (<b>c</b>) TPM; (<b>d</b>) USP.</p>
Full article ">Figure 3 Cont.
<p>Residuals <math display="inline"> <semantics> <msup> <mrow> <mo>(</mo> <msub> <mover accent="true"> <mi>y</mi> <mo stretchy="false">˜</mo> </mover> <mi>i</mi> </msub> <mo>-</mo> <msub> <mover accent="true"> <mi>y</mi> <mo stretchy="false">^</mo> </mover> <mi>i</mi> </msub> <mo>)</mo> </mrow> <mn>2</mn> </msup> </semantics> </math> of the fits generated by nonlinear least-squares: (<b>a</b>) GDP; (<b>b</b>) PPS; (<b>c</b>) TPM; (<b>d</b>) USP.</p>
Full article ">Figure 4
<p>Entropy per window for the 6 model approximations: (<b>a</b>) GDP; (<b>b</b>) PPS; (<b>c</b>) TPM; (<b>d</b>) USP.</p>
Full article ">Figure 5
<p>Real and model approximated PSS plots (in log units): (<b>a</b>) GDP; (<b>b</b>) PPS; (<b>c</b>) TPM; (<b>d</b>) USP.</p>
Full article ">
1354 KiB  
Article
Multi-Level Formation of Complex Software Systems
by Hui Li, Li-Ying Hao and Rong Chen
Entropy 2016, 18(5), 178; https://doi.org/10.3390/e18050178 - 12 May 2016
Cited by 10 | Viewed by 5336
Abstract
We present a multi-level formation model for complex software systems. The previous works extract the software systems to software networks for further studies, but usually investigate the software networks at the class level. In contrast to these works, our treatment of software systems [...] Read more.
We present a multi-level formation model for complex software systems. The previous works extract the software systems to software networks for further studies, but usually investigate the software networks at the class level. In contrast to these works, our treatment of software systems as multi-level networks is more realistic. In particular, the software networks are organized by three levels of granularity, which represents the modularity and hierarchy in the formation process of real-world software systems. More importantly, simulations based on this model have generated more realistic structural properties of software networks, such as power-law, clustering and modularization. On the basis of this model, how the structure of software systems effects software design principles is then explored, and it could be helpful for understanding software evolution and software engineering practices. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>An example of the extraction from a software system to a software network. (<b>a</b>) The Unified Modeling Language (UML) graph of the simple software program; (<b>b</b>) the software network extracted by the software program on the left.</p>
Full article ">Figure 2
<p>Most commonly-used motifs in software networks. (<b>a</b>–<b>d</b>) are 3-node motifs; (<b>e</b>–<b>n</b>) are 4-node motifs. All of the motifs are sparse graphs and not directed cycle.</p>
Full article ">Figure 3
<p>Structure and evolutionary mechanism of a multi-level software system.</p>
Full article ">Figure 4
<p>Degree distributions produced by our multi-level model (○ points) (the scale of the vertical axis is logarithmic). The corresponding distributions of real software systems (△ points) are also plotted here for comparison. (<b>a</b>) Blender 2.64; (<b>b</b>) Doxygen 1.8.2; (<b>c</b>) Eclipse 3.6.2; (<b>d</b>) Firefox 8.0; (<b>e</b>) JEdit 5.0; (<b>f</b>) Koffice 2.3.2; (<b>g</b>) Spring 3.1; (<b>h</b>) Squirrel 3.2.1; (<b>i</b>) Tomcat 7.0.20; (<b>j</b>) VTK 5.10.</p>
Full article ">Figure 4 Cont.
<p>Degree distributions produced by our multi-level model (○ points) (the scale of the vertical axis is logarithmic). The corresponding distributions of real software systems (△ points) are also plotted here for comparison. (<b>a</b>) Blender 2.64; (<b>b</b>) Doxygen 1.8.2; (<b>c</b>) Eclipse 3.6.2; (<b>d</b>) Firefox 8.0; (<b>e</b>) JEdit 5.0; (<b>f</b>) Koffice 2.3.2; (<b>g</b>) Spring 3.1; (<b>h</b>) Squirrel 3.2.1; (<b>i</b>) Tomcat 7.0.20; (<b>j</b>) VTK 5.10.</p>
Full article ">Figure 5
<p>In-degree distributions produced by our multi-level model (○ points) (the scale of the vertical axis is logarithmic). The corresponding distributions of real software systems (△ points) are also plotted here for comparison. (<b>a</b>) Blender 2.64; (<b>b</b>) Doxygen 1.8.2; (<b>c</b>) Eclipse 3.6.2; (<b>d</b>) Firefox 8.0; (<b>e</b>) JEdit 5.0; (<b>f</b>) Koffice 2.3.2; (<b>g</b>) Spring 3.1; (<b>h</b>) Squirrel 3.2.1; (<b>i</b>) Tomcat 7.0.20; (<b>j</b>) VTK 5.10.</p>
Full article ">Figure 5 Cont.
<p>In-degree distributions produced by our multi-level model (○ points) (the scale of the vertical axis is logarithmic). The corresponding distributions of real software systems (△ points) are also plotted here for comparison. (<b>a</b>) Blender 2.64; (<b>b</b>) Doxygen 1.8.2; (<b>c</b>) Eclipse 3.6.2; (<b>d</b>) Firefox 8.0; (<b>e</b>) JEdit 5.0; (<b>f</b>) Koffice 2.3.2; (<b>g</b>) Spring 3.1; (<b>h</b>) Squirrel 3.2.1; (<b>i</b>) Tomcat 7.0.20; (<b>j</b>) VTK 5.10.</p>
Full article ">Figure 6
<p>Out-degree distributions produced by our multi-level model (○ points) (the scale of the vertical axis is logarithmic). The corresponding distributions of real software systems (△ points) are also plotted here for comparison. (<b>a</b>) Blender 2.64; (<b>b</b>) Doxygen 1.8.2; (<b>c</b>) Eclipse 3.6.2; (<b>d</b>) Firefox 8.0; (<b>e</b>) JEdit 5.0; (<b>f</b>) Koffice 2.3.2; (<b>g</b>) Spring 3.1; (<b>h</b>) Squirrel 3.2.1; (<b>i</b>) Tomcat 7.0.20; (<b>j</b>) VTK 5.10.</p>
Full article ">Figure 6 Cont.
<p>Out-degree distributions produced by our multi-level model (○ points) (the scale of the vertical axis is logarithmic). The corresponding distributions of real software systems (△ points) are also plotted here for comparison. (<b>a</b>) Blender 2.64; (<b>b</b>) Doxygen 1.8.2; (<b>c</b>) Eclipse 3.6.2; (<b>d</b>) Firefox 8.0; (<b>e</b>) JEdit 5.0; (<b>f</b>) Koffice 2.3.2; (<b>g</b>) Spring 3.1; (<b>h</b>) Squirrel 3.2.1; (<b>i</b>) Tomcat 7.0.20; (<b>j</b>) VTK 5.10.</p>
Full article ">Figure 7
<p>Simulated in-degrees against corresponding out-degrees. The corresponding data obtained from the real software networks (+ points) and those of simulations (× points) are also plotted here for comparison. (<b>a</b>) Blender 2.64; (<b>b</b>) Doxygen 1.8.2; (<b>c</b>) Eclipse 3.6.2; (<b>d</b>) Firefox 8.0; (<b>e</b>) JEdit 5.0; (<b>f</b>) Koffice 2.3.2; (<b>g</b>) Spring 3.1; (<b>h</b>) Squirrel 3.2.1; (<b>i</b>) Tomcat 7.0.20; (<b>j</b>) VTK 5.10.</p>
Full article ">Figure 7 Cont.
<p>Simulated in-degrees against corresponding out-degrees. The corresponding data obtained from the real software networks (+ points) and those of simulations (× points) are also plotted here for comparison. (<b>a</b>) Blender 2.64; (<b>b</b>) Doxygen 1.8.2; (<b>c</b>) Eclipse 3.6.2; (<b>d</b>) Firefox 8.0; (<b>e</b>) JEdit 5.0; (<b>f</b>) Koffice 2.3.2; (<b>g</b>) Spring 3.1; (<b>h</b>) Squirrel 3.2.1; (<b>i</b>) Tomcat 7.0.20; (<b>j</b>) VTK 5.10.</p>
Full article ">Figure 8
<p>Negative correlation between two measurements and coupling ratio Λ. (<b>a</b>) The correlation between clustering coefficient <span class="html-italic">C</span> and coupling ratio Λ; (<b>b</b>) The correlation between modularity <span class="html-italic">Q</span> and coupling ratio Λ.</p>
Full article ">Figure 9
<p>The structure of the Level I network for different values of coupling ratio Λ. (<b>a</b>) <math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Λ</mi> <mo>=</mo> <mn>0</mn> <mo>.</mo> <mn>1</mn> </mrow> </semantics> </math>; (<b>b</b>) <math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Λ</mi> <mo>=</mo> <mn>0</mn> <mo>.</mo> <mn>3</mn> </mrow> </semantics> </math>; (<b>c</b>) <math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Λ</mi> <mo>=</mo> <mn>0</mn> <mo>.</mo> <mn>5</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 10
<p>The influence of motifs on the values of the clustering of Level I networks.</p>
Full article ">
492 KiB  
Article
Forecasting Energy Value at Risk Using Multiscale Dependence Based Methodology
by Kaijian He, Rui Zha, Yanhui Chen and Kin Keung Lai
Entropy 2016, 18(5), 170; https://doi.org/10.3390/e18050170 - 4 May 2016
Cited by 9 | Viewed by 5174
Abstract
In this paper, we propose a multiscale dependence-based methodology to analyze the dependence structure and to estimate the downside portfolio risk measures in the energy markets. More specifically, under this methodology, we formulate a new bivariate Empirical Mode Decomposition (EMD) copula based approach [...] Read more.
In this paper, we propose a multiscale dependence-based methodology to analyze the dependence structure and to estimate the downside portfolio risk measures in the energy markets. More specifically, under this methodology, we formulate a new bivariate Empirical Mode Decomposition (EMD) copula based approach to analyze and model the multiscale dependence structure in the energy markets. The proposed model constructs the Copula-based dependence structure formulation in the Bivariate Empirical Mode Decomposition (BEMD)-based multiscale domain. Results from the empirical studies using the typical Australian electricity daily prices show that there exists a multiscale dependence structure between different regional markets across different scales. The proposed model taking into account the multiscale dependence structure demonstrates statistically significantly-improved performance in terms of accuracy and reliability measures. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Figure 1

Figure 1
<p>A multiscale integrated Portfolio Value at Risk (PVaR) methodology.</p>
Full article ">
5074 KiB  
Article
Operational Complexity of Supplier-Customer Systems Measured by Entropy—Case Studies
by Ladislav Lukáš and Jiří Hofman
Entropy 2016, 18(4), 137; https://doi.org/10.3390/e18040137 - 14 Apr 2016
Cited by 4 | Viewed by 4748
Abstract
This paper discusses a unified entropy-based approach for the quantitative measurement of operational complexity of company supplier-customer relations. Classical Shannon entropy is utilized. Beside this quantification tool, we also explore the relations between Shannon entropy and (c,d)-entropy in more [...] Read more.
This paper discusses a unified entropy-based approach for the quantitative measurement of operational complexity of company supplier-customer relations. Classical Shannon entropy is utilized. Beside this quantification tool, we also explore the relations between Shannon entropy and (c,d)-entropy in more details. An analytic description of so called iso-quant curves is given, too. We present five case studies, albeit in an anonymous setting, describing various details of general procedures for measuring the operational complexity of supplier-customer systems. In general, we assume a problem-oriented database exists, which contains detailed records of all product forecasts, orders and deliveries both in quantity and time, scheduled and realized, too. Data processing detects important flow variations both in volumes and times, e.g., order—forecast, delivery—order, and actual production—scheduled one. The unifying quantity used for entropy computation is the time gap between actual delivery time and order issue time, which is nothing else but a lead time in inventory control models. After data consistency checks, histograms and empirical distribution functions are constructed. Finally, the entropy, information-theoretic measure of supplier-customer operational complexity, is calculated. Basic steps of the algorithm are mentioned briefly, too. Results of supplier-customer system analysis from selected Czech small and medium-sized enterprises (SMEs) are presented in various computational and managerial decision making details. An enterprise is ranked as SME one, if it has at most 250 employees and its turnover does not exceed 50 million USD per year, or its balance sheet total does not exceed 43 million USD per year, alternatively. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Figure 1

Figure 1
<p>Plot of functions <math display="inline"> <semantics> <mrow> <msubsup> <mi>S</mi> <mrow> <mi>c</mi> <mo>,</mo> <mi>d</mi> </mrow> <mo>*</mo> </msubsup> <mrow> <mo>(</mo> <mi>ϕ</mi> <mo>)</mo> </mrow> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <msub> <mi>S</mi> <mrow> <mtext>BGS</mtext> </mrow> </msub> <mrow> <mo>(</mo> <mi>ϕ</mi> <mo>)</mo> </mrow> </mrow> </semantics> </math> over (<span class="html-italic">c</span>,<span class="html-italic">d</span>) <math display="inline"> <semantics> <mi>ϵ</mi> </semantics> </math> Ω for given <math display="inline"> <semantics> <mi>ϕ</mi> </semantics> </math> .</p>
Full article ">Figure 2
<p>Curves representing the intersection <math display="inline"> <semantics> <mrow> <msubsup> <mi>S</mi> <mrow> <mi>c</mi> <mo>,</mo> <mi>d</mi> </mrow> <mo>*</mo> </msubsup> <mrow> <mo>(</mo> <mi>ϕ</mi> <mo>)</mo> </mrow> </mrow> </semantics> </math> <math display="inline"> <semantics> <mrow> <mstyle mathsize="140%" displaystyle="true"> <mo>∩</mo> </mstyle> </mrow> </semantics> </math> <math display="inline"> <semantics> <mrow> <msub> <mi>S</mi> <mrow> <mtext>BGS</mtext> </mrow> </msub> <mrow> <mo>(</mo> <mi>ϕ</mi> <mo>)</mo> </mrow> </mrow> </semantics> </math> over (<span class="html-italic">c</span>,<span class="html-italic">d</span>) <math display="inline"> <semantics> <mi>ϵ</mi> </semantics> </math> Ω.</p>
Full article ">Figure 3
<p>Information scheme of a supplier-customer system.</p>
Full article ">Figure 4
<p>S1fA: concrete TrC 16–20, time gaps <math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>T</mi> <mrow> <mi>d</mi> <mo>,</mo> <mi>o</mi> </mrow> </msub> </mrow> </semantics> </math>; (<b>a</b>) EDF; (<b>b</b>) values with outlier, continuous piecewise linear function.</p>
Full article ">Figure 5
<p>S2fA: concrete TrC 16–20, time gaps <math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>T</mi> <mrow> <mi>d</mi> <mo>,</mo> <mi>o</mi> </mrow> </msub> </mrow> </semantics> </math>; (<b>a</b>) EDF; (<b>b</b>) discrete values without outlier.</p>
Full article ">Figure 6
<p>S1fA: solid brick CP 290 × 140 × 65, time gaps <math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>T</mi> <mrow> <mi>d</mi> <mo>,</mo> <mi>o</mi> </mrow> </msub> </mrow> </semantics> </math>; (<b>a</b>) EDF; (<b>b</b>) empirical frequencies.</p>
Full article ">Figure 7
<p>S2fA: Solid brick CP 290 × 140 × 65, time gaps <math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>T</mi> <mrow> <mi>d</mi> <mo>,</mo> <mi>o</mi> </mrow> </msub> </mrow> </semantics> </math>; (<b>a</b>) EDF; (<b>b</b>) values with outlier, continuous piecewise linear function.</p>
Full article ">Figure 8
<p>3-D bar plot of entropy ratios <span class="html-italic">h</span> of products (1—concrete, 2—solid brick, 3—building block) summarized by suppliers S1fA and S2fA laterally.</p>
Full article ">Figure 9
<p>3-D bar plot of entropy ratios <span class="html-italic">h</span> of products (1—blouses, 2—dresses, 3—skirts) summarized by suppliers S1fB and S2fB laterally.</p>
Full article ">Figure 10
<p>3-D bar plot of entropy ratios <span class="html-italic">h</span> of products (1—Tank G100, 2—Mast LTA, 3—Exchanger P12) summarized by suppliers S1fC and S2fC laterally.</p>
Full article ">Figure 11
<p><math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>T</mi> <mrow> <mi>d</mi> <mo>,</mo> <mi>o</mi> </mrow> </msub> </mrow> </semantics> </math> values; (<b>a</b>) from unfiltered data, set [<span class="html-italic">b<sub>d</sub></span>, <span class="html-italic">b<sub>u</sub></span>] = [0, 0]; (<b>b</b>) EDF.</p>
Full article ">Figure 12
<p><math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>T</mi> <mrow> <mi>d</mi> <mo>,</mo> <mi>o</mi> </mrow> </msub> </mrow> </semantics> </math> values; (<b>a</b>) from filtered data, set [<span class="html-italic">b<sub>d</sub></span>, <span class="html-italic">b<sub>u</sub></span>] = [0, 7]; (<b>b</b>) EDF.</p>
Full article ">Figure 13
<p><math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>T</mi> <mrow> <mi>d</mi> <mo>,</mo> <mi>o</mi> </mrow> </msub> </mrow> </semantics> </math> values; (<b>a</b>) from filtered data, set [<span class="html-italic">b<sub>d</sub></span>, <span class="html-italic">b<sub>u</sub></span>] = [0, 14]; (<b>b</b>) EDF.</p>
Full article ">Figure 14
<p>Entropy ratio <span class="html-italic">h</span>(<span class="html-italic">b</span>) = <span class="html-italic">H</span>(<span class="html-italic">b</span>)/<span class="html-italic">H<sub>u</sub></span>(<span class="html-italic">b</span>) from data filtered by [0, <span class="html-italic">b</span>], <span class="html-italic">b</span> = 0, 1, …,14 days.</p>
Full article ">Figure 15
<p>Fractal character of <math display="inline"> <semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>T</mi> <mrow> <mi>d</mi> <mo>,</mo> <mi>o</mi> </mrow> </msub> </mrow> </semantics> </math> values plot containing all deliveries from 1 January 2007 till 31 December 2010.</p>
Full article ">
3850 KiB  
Article
A Comparison of Classification Methods for Telediagnosis of Parkinson’s Disease
by Haydar Ozkan
Entropy 2016, 18(4), 115; https://doi.org/10.3390/e18040115 - 30 Mar 2016
Cited by 34 | Viewed by 7714
Abstract
Parkinson’s disease (PD) is a progressive and chronic nervous system disease that impairs the ability of speech, gait, and complex muscle-and-nerve actions. Early diagnosis of PD is quite important for alleviating the symptoms. Cost effective and convenient telemedicine technology helps to distinguish the [...] Read more.
Parkinson’s disease (PD) is a progressive and chronic nervous system disease that impairs the ability of speech, gait, and complex muscle-and-nerve actions. Early diagnosis of PD is quite important for alleviating the symptoms. Cost effective and convenient telemedicine technology helps to distinguish the patients with PD from healthy people using variations of dysphonia, gait or motor skills. In this study, a novel telemedicine technology was developed to detect PD remotely using dysphonia features. Feature transformation and several machine learning (ML) methods with 2-, 5- and 10-fold cross-validations were implemented on the vocal features. It was observed that the combination of principal component analysis (PCA) as a feature transformation (FT) and k-nearest neighbor (k-NN) as a classifier with 10-fold cross-validation has the best accuracy as 99.1%. All ML processes were applied to the prerecorded PD dataset using a newly created program named ParkDet 2.0. Additionally, the blind test interface was created on the ParkDet so that users could detect new patients with PD in future. Clinicians or medical technicians, without any knowledge of ML, will be able to use the blind test interface to detect PD at a clinic or remote location utilizing internet as a telemedicine application. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Figure 1

Figure 1
<p>The relationship among interfaces of ParkDet.</p>
Full article ">Figure 2
<p>Three interfaces of ParkDet 2.0 (<b>a</b>) Main menu (<b>b</b>) All data application (<b>c</b>) Blind test.</p>
Full article ">Figure 3
<p>Variance corresponding to the first eight principal components.</p>
Full article ">Figure 4
<p>The comparisons between PCs (<b>a</b>) PC1 <span class="html-italic">versus</span> PC2 (<b>b</b>) PC2 <span class="html-italic">versus</span> PC3 (<b>c</b>) PC1 <span class="html-italic">versus</span> PC3 (<b>d</b>) 3D PC1 <span class="html-italic">versus</span> PC2 <span class="html-italic">versus</span> PC2.</p>
Full article ">Figure 5
<p>The comparisons of LFs (<b>a</b>) LF1 <span class="html-italic">versus</span> LF2 (<b>b</b>) LF2 <span class="html-italic">versus</span> LF3 (<b>c</b>) LF1 <span class="html-italic">versus</span> LF3 (<b>d</b>) 3D LF1 <span class="html-italic">versus</span> LF2 <span class="html-italic">versus</span> LF2.</p>
Full article ">Figure 6
<p>Views of the ML results (<b>a</b>) All data application (<b>b</b>) Blind test.</p>
Full article ">Figure 7
<p>The AUC achieved of classifiers (<b>a</b>) When the original dataset is used (<b>b</b>) When reduced features via FA is applied (<b>c</b>) When reduced features via PCA is used for classifications with 2-, 5-, and 10-fold cross-validations.</p>
Full article ">
3390 KiB  
Article
A Complexity-Based Approach for the Detection of Weak Signals in Ocean Ambient Noise
by Shashidhar Siddagangaiah, Yaan Li, Xijing Guo, Xiao Chen, Qunfei Zhang, Kunde Yang and Yixin Yang
Entropy 2016, 18(3), 101; https://doi.org/10.3390/e18030101 - 18 Mar 2016
Cited by 52 | Viewed by 7349
Abstract
There are numerous studies showing that there is a constant increase in the ocean ambient noise level and the ever-growing demand for developing algorithms for detecting weak signals in ambient noise. In this study, we utilize dynamical and statistical complexity to detect the [...] Read more.
There are numerous studies showing that there is a constant increase in the ocean ambient noise level and the ever-growing demand for developing algorithms for detecting weak signals in ambient noise. In this study, we utilize dynamical and statistical complexity to detect the presence of weak ship noise embedded in ambient noise. The ambient noise and ship noise were recorded in the South China Sea. The multiscale entropy (MSE) method and the complexity-entropy causality plane (C-H plane) were used to quantify the dynamical and statistical complexity of the measured time series, respectively. We generated signals with varying signal-to-noise ratio (SNR) by varying the amplification of a ship signal. The simulation results indicate that the complexity is sensitive to change in the information in the ambient noise and the change in SNR, a finding that enables the detection of weak ship signals in strong background ambient noise. The simulation results also illustrate that complexity is better than the traditional spectrogram method, particularly effective for detecting low SNR signals in ambient noise. In addition, complexity-based MSE and C-H plane methods are simple, robust and do not assume any underlying dynamics in time series. Hence, complexity should be used in practical situations. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Figure 1

Figure 1
<p>Recordings of (<b>a</b>) ocean ambient noise, and (<b>b</b>,<b>c</b>) the ship at 2.5 km and 1 km away from the hydrophone for a duration of 60 s and a sampling frequency of 16 kHz, respectively.</p>
Full article ">Figure 2
<p>Spectrogram of ambient noise, the ship signal, and varying SNRs of the ship signal.</p>
Full article ">Figure 3
<p>(<b>a</b>) Location of ambient noise, ship and varying SNRs of the ship on the <span class="html-italic">C-H</span> plane, the upper (lower) line represent the maximum (minimum) values of <span class="html-italic">C<sub>SCM</sub></span> as a function of <span class="html-italic">H<sub>SCM</sub></span> for <span class="html-italic">M</span> = 4; (<b>b</b>) Representation of variation of statistical complexity measure as a function of varying SNRs of the ship; (<b>c</b>) Representation of variation of statistical complexity measure and entropy as a function of varying SNRs of the ship.</p>
Full article ">Figure 3 Cont.
<p>(<b>a</b>) Location of ambient noise, ship and varying SNRs of the ship on the <span class="html-italic">C-H</span> plane, the upper (lower) line represent the maximum (minimum) values of <span class="html-italic">C<sub>SCM</sub></span> as a function of <span class="html-italic">H<sub>SCM</sub></span> for <span class="html-italic">M</span> = 4; (<b>b</b>) Representation of variation of statistical complexity measure as a function of varying SNRs of the ship; (<b>c</b>) Representation of variation of statistical complexity measure and entropy as a function of varying SNRs of the ship.</p>
Full article ">Figure 4
<p>Represents the location of ambient noise and ship signal with SNR −19.2 dB on the <span class="html-italic">C-H</span> plane, the upper (lower) line represent the maximum (minimum) values of <span class="html-italic">C<sub>SCM</sub></span> as a function of <span class="html-italic">H<sub>SCM</sub></span> for <span class="html-italic">M</span> = 4. The red line represent the threshold of detection between ship signal and ambient noise.</p>
Full article ">Figure 5
<p>Location of various ambient noises on the <span class="html-italic">C-H</span> plane. The upper (lower) line represents the maximum (minimum) values of <span class="html-italic">C<sub>SCM</sub></span> as a function of <span class="html-italic">H<sub>SCM</sub></span> for <span class="html-italic">M</span> = 4.</p>
Full article ">Figure 6
<p>(<b>a</b>) Location of ambient noise, ship and varying SNRs of the ship on the <span class="html-italic">C-H</span> plane. the upper (lower) line represents the maximum (minimum) values of <span class="html-italic">C<sub>SCM</sub></span> as a function of <span class="html-italic">H<sub>SCM</sub></span> for <span class="html-italic">M</span> = 4; (<b>b</b>) representation of variation of statistical complexity measure and entropy as a function of varying SNRs of the ship.</p>
Full article ">Figure 7
<p>(<b>a</b>) MSE analysis of ship signal with varying SNRs evaluated for <span class="html-italic">m</span> = 4 and <span class="html-italic">r</span> = 0.15; (<b>b</b>) dynamical complexity measure (sum of sample entropy values for scale 1–20, inclusively) <span class="html-italic">vs</span>. varying SNRs of the ship signal.</p>
Full article ">Figure 8
<p>Representation of normalized DCM and SCM as a function of varying SNRs of the ship signal and percentage of ship signal in ambient noise respectively.</p>
Full article ">
7269 KiB  
Article
Selected Remarks about Computer Processing in Terms of Flow Control and Statistical Mechanics
by Dominik Strzałka
Entropy 2016, 18(3), 93; https://doi.org/10.3390/e18030093 - 12 Mar 2016
Cited by 3 | Viewed by 6014
Abstract
Despite the fact that much has been said about processing in computer science, it seems that there is still much to do. A classical approach assumes that the computations done by computers are a kind of mathematical operation (calculations of functions values) and [...] Read more.
Despite the fact that much has been said about processing in computer science, it seems that there is still much to do. A classical approach assumes that the computations done by computers are a kind of mathematical operation (calculations of functions values) and have no special relations to energy transformation and flow. However, there is a possibility to get a new view on selected topics, and as a special case, the sorting problem is presented; we know many different sorting algorithms, including those that have complexity equal to O(n lg(n)) , which means that this problem is algorithmically closed, but it is also possible to focus on the problem of sorting in terms of flow control, entropy and statistical mechanics. This is done in relation to the existing definitions of sorting, connections between sorting and ordering and some important aspects of computer processing understood as a flow that are not taken into account in many theoretical considerations in computer science. The proposed new view is an attempt to change the paradigm in the description of algorithms’ performance by computational complexity and processing, taking into account the existing references between the idea of Turing machines and their physical implementations. This proposal can be expressed as a physics of computer processing; a reference point to further analysis of algorithmic and interactive processing in computer systems. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Figure 1

Figure 1
<p>Diagram flow for the insertion-sort algorithm.</p>
Full article ">Figure 2
<p>Modified diagram flow for the insertion-sort algorithm with a parasite path. The solid (green) line stands for algorithm behavior in the optimistic case, path P1; the dotted (blue) line expresses the flow in pessimistic case, path P2; and the dashed (red) line shows the flow of sorted keys in other cases, path P3.</p>
Full article ">Figure 3
<p>One possible example of sorting processing. For each sorted key from the input set (blue line), the exact number of dominant operations was recorded (black line). As can be seen, when there is a falling trend in the input set, the number of dominant operations rises; when there is a rising trend in the input set, the number of operations falls. The red line shows how the algorithm should behave if we follow asymptotic analysis for the worst case.</p>
Full article ">Figure 4
<p>Entropy <math display="inline"> <msub> <mi>S</mi> <mi>i</mi> </msub> </math> production for successive keys <math display="inline"> <msub> <mi>n</mi> <mi>i</mi> </msub> </math> (solid line with open squares) with the approximation given by Equation (<a href="#FD7-entropy-18-00093" class="html-disp-formula">7</a>) (line with open circles).</p>
Full article ">Figure 5
<p>Example of entropy production during sorting. The dark blue line denotes the number of dominant operations; light blue line, the amount of produced entropy according to Equation (<a href="#FD12-entropy-18-00093" class="html-disp-formula">12</a>); red line, maximal number of dominant operations (pessimistic case); black line, the number of dominant operations in the average case; green line, predicted amount of produced entropy according to Equation (<a href="#FD7-entropy-18-00093" class="html-disp-formula">7</a>).</p>
Full article ">Figure 6
<p>Dependencies between one trajectory of fractional Brownian motion (fBm) <math display="inline"> <mrow> <mi>X</mi> <mo>(</mo> <mi>n</mi> <mo>)</mo> </mrow> </math> and the number of dominant operations <math display="inline"> <mrow> <mi>Y</mi> <mo>(</mo> <mi>n</mi> <mo>)</mo> </mrow> </math> required for its sorting. Red lines show falling (global and minor trends) in the input set, while green lines refer to local and global rising trends. The blue line shows the number of dominant operations; it is clear that each falling trend in the input set (inversions in the input set) denotes the growth of the number of dominant operations, whereas rising trends (runs in the input set) are related to a decrease of the dominant operations.</p>
Full article ">Figure 7
<p>Dependencies between one trajectory of fBm <math display="inline"> <mrow> <mi>X</mi> <mo>(</mo> <mi>n</mi> <mo>)</mo> </mrow> </math> and the amount of produced entropy during its sorting. It is very visible (compared to <a href="#entropy-18-00093-f006" class="html-fig">Figure 6</a>) that the levels of produced entropy <math display="inline"> <msub> <mi>S</mi> <mi>i</mi> </msub> </math> depend not only on the values of sorted keys (indirectly, on the number of dominant operations), but also on the change of trends (inversions and runs) in the input set.</p>
Full article ">Figure 8
<p>Direct relation between the values of sorted keys <math display="inline"> <mrow> <mi>X</mi> <mo>(</mo> <mi>n</mi> <mo>)</mo> </mrow> </math> and the number of dominant operations <math display="inline"> <mrow> <mi>Y</mi> <mo>(</mo> <mi>n</mi> <mo>)</mo> </mrow> </math> needed for their sorting. The whole graph shows bifurcations in the algorithm behavior in relation to existing feedback.</p>
Full article ">Figure 9
<p>The direct relation between the values of sorted keys <math display="inline"> <mrow> <mi>X</mi> <mo>(</mo> <mi>n</mi> <mo>)</mo> </mrow> </math> and the amount of produced entropy during their sorting <math display="inline"> <msub> <mi>S</mi> <mi>i</mi> </msub> </math>. Produced entropy depends not only on key values, but also on existing feedback.</p>
Full article ">
3246 KiB  
Article
Tea Category Identification Using a Novel Fractional Fourier Entropy and Jaya Algorithm
by Yudong Zhang, Xiaojun Yang, Carlo Cattani, Ravipudi Venkata Rao, Shuihua Wang and Preetha Phillips
Entropy 2016, 18(3), 77; https://doi.org/10.3390/e18030077 - 27 Feb 2016
Cited by 99 | Viewed by 9730
Abstract
This work proposes a tea-category identification (TCI) system, which can automatically determine tea category from images captured by a 3 charge-coupled device (CCD) digital camera. Three-hundred tea images were acquired as the dataset. Apart from the 64 traditional color histogram features that were [...] Read more.
This work proposes a tea-category identification (TCI) system, which can automatically determine tea category from images captured by a 3 charge-coupled device (CCD) digital camera. Three-hundred tea images were acquired as the dataset. Apart from the 64 traditional color histogram features that were extracted, we also introduced a relatively new feature as fractional Fourier entropy (FRFE) and extracted 25 FRFE features from each tea image. Furthermore, the kernel principal component analysis (KPCA) was harnessed to reduce 64 + 25 = 89 features. The four reduced features were fed into a feedforward neural network (FNN). Its optimal weights were obtained by Jaya algorithm. The 10 × 10-fold stratified cross-validation (SCV) showed that our TCI system obtains an overall average sensitivity rate of 97.9%, which was higher than seven existing approaches. In addition, we used only four features less than or equal to state-of-the-art approaches. Our proposed system is efficient in terms of tea-category identification. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Figure 1

Figure 1
<p>Tea image acquiring system.</p>
Full article ">Figure 2
<p>Fractional Fourier transform (FRFT) of tri(<span class="html-italic">t</span>).</p>
Full article ">Figure 3
<p>Flowchart of feature processing.</p>
Full article ">Figure 4
<p>Diagram of one-hidden-layer feedforward neural network (OHL-FNN).</p>
Full article ">Figure 5
<p>Diagram of Jaya algorithm.</p>
Full article ">Figure 6
<p>Color histogram of green, Oolong, and black tea [<a href="#B28-entropy-18-00077" class="html-bibr">28</a>].</p>
Full article ">Figure 7
<p>2D-FRFT of an image of Oolong tea.</p>
Full article ">Figure 8
<p>Comparing KPCA with PCA over 3D simulation data. (<b>a</b>) 3D Simulation Data; (<b>b</b>) PCA Result with 2 PCs; (<b>c</b>) POL-KPCA with 2 PCs; (<b>d</b>) RBF-KPCA with 2 PCs.</p>
Full article ">Figure 9
<p>Curve of accumulated variance <span class="html-italic">versus</span> principal component number.</p>
Full article ">Figure 10
<p>Comparison of different FNN training methods.</p>
Full article ">
378 KiB  
Article
Perturbation of Fractional Multi-Agent Systems in Cloud Entropy Computing
by Rabha W. Ibrahim, Hamid A. Jalab and Abdullah Gani
Entropy 2016, 18(1), 31; https://doi.org/10.3390/e18010031 - 19 Jan 2016
Cited by 11 | Viewed by 4268
Abstract
A perturbed multi-agent system is a scheme self-possessed of multiple networking agents within a location. This scheme can be used to discuss problems that are impossible or difficult for a specific agent to solve. Intelligence cloud entropy management systems involve functions, methods, procedural [...] Read more.
A perturbed multi-agent system is a scheme self-possessed of multiple networking agents within a location. This scheme can be used to discuss problems that are impossible or difficult for a specific agent to solve. Intelligence cloud entropy management systems involve functions, methods, procedural approaches, and algorithms. In this study, we introduce a new perturbed algorithm based on the fractional Poisson process. The discrete dynamics are suggested by using fractional entropy and fractional type Tsallis entropy. Moreover, we study the algorithm stability. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Figure 1

Figure 1
<p>Structure of a perturbation cloud entropy system.</p>
Full article ">Figure 2
<p>The proposed algorithm.</p>
Full article ">
5294 KiB  
Article
Evolution Characteristics of Complex Fund Network and Fund Strategy Identification
by Honglin Yang, Penglan Fang, Hong Wan, Yucan Liu and Hui Lei
Entropy 2015, 17(12), 8073-8088; https://doi.org/10.3390/e17127861 - 8 Dec 2015
Cited by 5 | Viewed by 5214
Abstract
Earlier investment practices show that there lies a discrepancy between the actual fund strategy and stated fund strategy. Using a minimum spanning tree (MST) and planar maximally-filtered graph (PMFG), we build a network of open-ended funds in China’s market and investigate the evolution [...] Read more.
Earlier investment practices show that there lies a discrepancy between the actual fund strategy and stated fund strategy. Using a minimum spanning tree (MST) and planar maximally-filtered graph (PMFG), we build a network of open-ended funds in China’s market and investigate the evolution characteristics of the networks over multiple time periods and timescales. The evolution characteristics, especially the locations of clustering central nodes, show that the actual strategy of the open-ended funds in China’s market significantly differs from the original stated strategy. When the investment horizon and timescale extend, the funds approach an identical actual strategy. This work introduces a novel network-based quantitative method to help investors identify the actual strategy of open-ended funds. Full article
(This article belongs to the Special Issue Computational Complexity)
Show Figures

Figure 1

Figure 1
<p>Illustration of two minimum spanning trees (MSTs) and their hierarchical tree (HT).</p>
Full article ">Figure 2
<p>MST of 94 open-ended contract funds over the time period of 2005–2009.</p>
Full article ">Figure 3
<p>MST of 94 open-ended contract funds over the time period of 2005–2010.</p>
Full article ">Figure 4
<p>MST of 94 open-ended contract funds over the time period of 2005–2011.</p>
Full article ">Figure 5
<p>MST of 94 open-ended contract funds over the time period of 2005–2012.</p>
Full article ">Figure 6
<p>Planar maximally-filtered graph (PMFG) of 94 open-ended contract funds over the time period of 2005–2009.</p>
Full article ">Figure 7
<p>PMFG of 94 open-ended contract funds over the time period of 2005–2012.</p>
Full article ">Figure 8
<p>Comparison of the characteristic indicators of MST with PMFG over 2009–2012. (<b>a</b>) Evolution of correlation coefficient; (<b>b</b>) Evolution of correlation coefficient variance; (<b>c</b>) Evolution of normalized tree length; (<b>d</b>) Evolution of average path length; (<b>e</b>) Evolution of degree of central node.</p>
Full article ">Figure 8 Cont.
<p>Comparison of the characteristic indicators of MST with PMFG over 2009–2012. (<b>a</b>) Evolution of correlation coefficient; (<b>b</b>) Evolution of correlation coefficient variance; (<b>c</b>) Evolution of normalized tree length; (<b>d</b>) Evolution of average path length; (<b>e</b>) Evolution of degree of central node.</p>
Full article ">Figure 9
<p>The distributions of the node degree for MST over four time periods.</p>
Full article ">Figure 10
<p>The distributions of the node degree for PMFG over four time periods.</p>
Full article ">Figure 11
<p>MST of 94 open-ended contract funds on a daily timescale over the time period of 2009–2012.</p>
Full article ">Figure 12
<p>MST of 94 open-ended contract funds on a quarterly timescale over the time period of 2009–2012.</p>
Full article ">Figure 13
<p>Hierarchical tree on a quarterly scale over the time period 2005–2012.</p>
Full article ">Figure 14
<p>The distribution of the node degree of MST on two timescales over the time period of 2009–2012.</p>
Full article ">
Back to TopTop