Nothing Special   »   [go: up one dir, main page]

Next Issue
Volume 25, December
Previous Issue
Volume 25, October
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
entropy-logo

Journal Browser

Journal Browser

Entropy, Volume 25, Issue 11 (November 2023) – 90 articles

Cover Story (view full-size image): The dynamics and equilibrium properties of classical particle systems are determined by the forces between particles. For forces mediated by an interaction potential (in this case a Lennard-Jones potential), we construct a dynamic network from the system. Particles are represented as nodes and binary undirected links define a two-level approximation of the potential, one value within an interaction range where links are active and one outside where they are not. In thermodynamic equilibrium, this approximation connects the physical properties of the particle system to the topological properties of the network representation through the partition function of the approximated potential and allows for further characterisation of the system. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
26 pages, 381 KiB  
Article
Bild Conception of Scientific Theory Structuring in Classical and Quantum Physics: From Hertz and Boltzmann to Schrödinger and De Broglie
by Andrei Khrennikov
Entropy 2023, 25(11), 1565; https://doi.org/10.3390/e25111565 - 20 Nov 2023
Cited by 2 | Viewed by 1428
Abstract
We start with a methodological analysis of the notion of scientific theory and its interrelation with reality. This analysis is based on the works of Helmholtz, Hertz, Boltzmann, and Schrödinger (and reviews of D’Agostino). Following Helmholtz, Hertz established the “Bild conception” for scientific [...] Read more.
We start with a methodological analysis of the notion of scientific theory and its interrelation with reality. This analysis is based on the works of Helmholtz, Hertz, Boltzmann, and Schrödinger (and reviews of D’Agostino). Following Helmholtz, Hertz established the “Bild conception” for scientific theories. Here, “Bild” (“picture”) carries the meaning “model” (mathematical). The main aim of natural sciences is construction of the causal theoretical models (CTMs) of natural phenomena. Hertz claimed that a CTM cannot be designed solely on the basis of observational data; it typically contains hidden quantities. Experimental data can be described by an observational model (OM), often based on the price of acausality. CTM-OM interrelation can be tricky. Schrödinger used the Bild concept to create a CTM for quantum mechanics (QM), and QM was treated as OM. We follow him and suggest a special CTM for QM, so-called prequantum classical statistical field theory (PCSFT). QM can be considered as a PCSFT image, but not as straightforward as in Bell’s model with hidden variables. The common interpretation of the violation of the Bell inequality is criticized from the perspective of the two-level structuring of scientific theories. Such critical analysis of von Neumann and Bell no-go theorems for hidden variables was performed already by De Broglie (and Lochak) in the 1970s. The Bild approach is applied to the two-level CTM-OM modeling of Brownian motion: the overdamped regime corresponds to OM. In classical mechanics, CTM=OM; on the one hand, this is very convenient; on the other hand, this exceptional coincidence blurred the general CTM-OM structuring of scientific theories. We briefly discuss ontic–epistemic structuring of scientific theories (Primas–Atmanspacher) and its relation to the Bild concept. Interestingly, Atmanspacher as well as Hertz claim that even classical physical theories should be presented on the basic of two-level structuring. Full article
37 pages, 1823 KiB  
Review
Percolation Theories for Quantum Networks
by Xiangyi Meng, Xinqi Hu, Yu Tian, Gaogao Dong, Renaud Lambiotte, Jianxi Gao and Shlomo Havlin
Entropy 2023, 25(11), 1564; https://doi.org/10.3390/e25111564 - 20 Nov 2023
Cited by 7 | Viewed by 3594
Abstract
Quantum networks have experienced rapid advancements in both theoretical and experimental domains over the last decade, making it increasingly important to understand their large-scale features from the viewpoint of statistical physics. This review paper discusses a fundamental question: how can entanglement be effectively [...] Read more.
Quantum networks have experienced rapid advancements in both theoretical and experimental domains over the last decade, making it increasingly important to understand their large-scale features from the viewpoint of statistical physics. This review paper discusses a fundamental question: how can entanglement be effectively and indirectly (e.g., through intermediate nodes) distributed between distant nodes in an imperfect quantum network, where the connections are only partially entangled and subject to quantum noise? We survey recent studies addressing this issue by drawing exact or approximate mappings to percolation theory, a branch of statistical physics centered on network connectivity. Notably, we show that the classical percolation frameworks do not uniquely define the network’s indirect connectivity. This realization leads to the emergence of an alternative theory called “concurrence percolation”, which uncovers a previously unrecognized quantum advantage that emerges at large scales, suggesting that quantum networks are more resilient than initially assumed within classical percolation contexts, offering refreshing insights into future quantum network design. Full article
(This article belongs to the Special Issue Classical and Quantum Networks: Theory, Modeling and Optimization)
Show Figures

Figure 1

Figure 1
<p>A pure-state quantum network (QN) consists of nodes (purple) and links (gray line). Each node comprises a collection of qubits (gray dots) that are entangled with qubits belonging to other nodes, and each link represents a bipartite entangled pure state <math display="inline"><semantics> <mfenced open="|" close="&#x232A;"> <mi>ϕ</mi> </mfenced> </semantics></math> connecting the two qubits at its endpoints. This QN model can be extended to <span class="html-italic">d</span>-dimensional qudits (bottom left), which allow higher bandwidth for transmitting information, or to tensor networks (bottom middle) by employing linear transformations <math display="inline"><semantics> <msub> <mi mathvariant="script">T</mi> <mi>i</mi> </msub> </semantics></math> at each node <span class="html-italic">i</span>. Moreover, the QN can be adapted to higher-order graphs (bottom right), where each link manifests as a hyperedge, denoting a multipartite entangled pure state.</p>
Full article ">Figure 2
<p>Schematic demonstration of first- and second-order percolation transitions. In the second-order case, the giant component is continuously approaching zero at the percolation threshold <math display="inline"><semantics> <mrow> <mi>p</mi> <mo>=</mo> <msub> <mi>p</mi> <mi>th</mi> </msub> </mrow> </semantics></math>. In the first-order case, the giant component approaches zero discontinuously.</p>
Full article ">Figure 3
<p>Entanglement transmission on quantum networks can be understood from two different mappings. In classical percolation (bottom left), each link is present or absent with probability <span class="html-italic">p</span> or <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>−</mo> <mi>p</mi> </mrow> </semantics></math>, respectively. Only the paths in which all links are fully present contribute to the connectivity. This forms the basis of the classical/quantum entanglement percolation (CEP/QEP) schemes [<a href="#B10-entropy-25-01564" class="html-bibr">10</a>], with the goal of securing a singlet between source <span class="html-italic">s</span> and target <span class="html-italic">t</span> through a “gambling” approach. In concurrence percolation (bottom right), every path contributes to the connectivity. This mapping forms the basis of the deterministic entanglement transmission (DET) scheme [<a href="#B149-entropy-25-01564" class="html-bibr">149</a>], where the aim is not to obtain a singlet probabilistically but to establish a partially entangled state deterministically.</p>
Full article ">Figure 4
<p>The DET series/parallel rules outperform the CEP series/parallel rules.</p>
Full article ">Figure 5
<p>Classical percolation and concurrence percolation on the Bethe lattice. (<b>a</b>) The Bethe lattice (<math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>). (<b>b</b>) The sponge-crossing probability <math display="inline"><semantics> <msub> <mi>P</mi> <mi>SC</mi> </msub> </semantics></math> (brown) between sets <span class="html-italic">S</span> (the root) and <span class="html-italic">T</span> (the collection of all leaf nodes) as a function of <math display="inline"><semantics> <mi>θ</mi> </semantics></math>. Driven by classical percolation, a transition threshold is found at <math display="inline"><semantics> <mrow> <mi>θ</mi> <mo>=</mo> <mi>π</mi> <mo>/</mo> <mn>6</mn> </mrow> </semantics></math>, or <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mi>th</mi> </msub> <mo>=</mo> <mn>2</mn> <msup> <mo form="prefix">sin</mo> <mn>2</mn> </msup> <mi>θ</mi> <mo>=</mo> <mn>1</mn> <mo>/</mo> <mn>2</mn> </mrow> </semantics></math>. As a comparison, the sponge-crossing concurrence <math display="inline"><semantics> <msub> <mi>C</mi> <mi>SC</mi> </msub> </semantics></math> (red), driven by concurrence percolation, shows a similar but lower threshold at <math display="inline"><semantics> <mrow> <mi>θ</mi> <mo>=</mo> <mi>π</mi> <mo>/</mo> <mn>8</mn> </mrow> </semantics></math>, or <math display="inline"><semantics> <mrow> <msub> <mi>c</mi> <mi>th</mi> </msub> <mo>=</mo> <mo form="prefix">sin</mo> <mn>2</mn> <mi>θ</mi> <mo>=</mo> <mn>1</mn> <mo>/</mo> <msqrt> <mn>2</mn> </msqrt> </mrow> </semantics></math>. Moreover, a saturation point at <math display="inline"><semantics> <mrow> <mi>θ</mi> <mo>=</mo> <mn>0.633</mn> <mfenced separators="" open="(" close=")"> <mi>π</mi> <mo>/</mo> <mn>4</mn> </mfenced> </mrow> </semantics></math>, or <math display="inline"><semantics> <mrow> <msub> <mi>c</mi> <mi>sat</mi> </msub> <mo>≈</mo> <mn>0.838</mn> </mrow> </semantics></math> also exists, beyond which we already have <math display="inline"><semantics> <mrow> <msub> <mi>C</mi> <mi>SC</mi> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>. This saturating feature has no counterpart in classical percolation. (The pink dashed line represents another nonphysical solution.)</p>
Full article ">Figure 6
<p>Classical percolation and concurrence percolation on (<b>a</b>,<b>b</b>) the square lattice, (<b>c</b>,<b>d</b>) the honeycomb lattice, and (<b>e</b>,<b>f</b>) the triangular lattice, The sponge-crossing probability <math display="inline"><semantics> <msub> <mi>P</mi> <mi>SC</mi> </msub> </semantics></math> (brown) and sponge-crossing concurrence <math display="inline"><semantics> <msub> <mi>C</mi> <mi>SC</mi> </msub> </semantics></math> (red) are defined between sets <span class="html-italic">S</span> (the collection of nodes on the left boundary) and <span class="html-italic">T</span> (the collection of nodes on the right boundary) as a function of <math display="inline"><semantics> <mi>θ</mi> </semantics></math>. The brown and red vertical lines denote the finite-size thresholds <math display="inline"><semantics> <msub> <mi>p</mi> <mi>th</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>c</mi> <mi>th</mi> </msub> </semantics></math>, respectively.</p>
Full article ">Figure 7
<p>Critical phenomena of (<b>a</b>–<b>e</b>) classical percolation and (<b>f</b>–<b>j</b>) concurrence percolation theories in the Bethe lattice.</p>
Full article ">Figure 8
<p>Different QN topologies between <span class="html-italic">S</span> and <span class="html-italic">T</span>. (<b>a</b>) Series. (<b>b</b>) Parallel. (<b>c</b>) Parallel-then-series. (<b>d</b>) Series-then-parallel. (<b>e</b>) Series–parallel. (<b>f</b>) Non-series–parallel.</p>
Full article ">Figure 9
<p>The decomposition of a series–parallel network to the final base graph (from i to viii). At each step, the links that the series rule and the parallel rule are applied to are highlighted in orange and cyan, respectively.</p>
Full article ">Figure 10
<p>Demonstration of calculating the classical percolation between nodes 1 and 6, in the following steps: (<b>a</b>) Original lattice. (<b>b</b>,<b>c</b>) Series rules. (<b>d</b>) Star-mesh transform on the star graph (with edges <math display="inline"><semantics> <mrow> <mn>4</mn> <mo>↔</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mn>4</mn> <mo>↔</mo> <mn>3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mn>4</mn> <mo>↔</mo> <mn>6</mn> </mrow> </semantics></math>), converting it to a complete graph (with edges <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>↔</mo> <mn>3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mn>3</mn> <mo>↔</mo> <mn>6</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mn>6</mn> <mo>↔</mo> <mn>1</mn> </mrow> </semantics></math>), then parallel rule for the double edges <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>↔</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mn>3</mn> <mo>↔</mo> <mn>6</mn> </mrow> </semantics></math>. (<b>e</b>) Series rule for edges <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>↔</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mn>3</mn> <mo>↔</mo> <mn>6</mn> </mrow> </semantics></math>, then parallel rule for edge <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>↔</mo> <mn>6</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 11
<p>Demonstration of calculating the concurrence percolation between nodes 1 and 6 (cf. <a href="#entropy-25-01564-f010" class="html-fig">Figure 10</a>).</p>
Full article ">Figure 12
<p>Approximations for calculating the sponge-crossing concurrence <math display="inline"><semantics> <msub> <mi>C</mi> <mi>SC</mi> </msub> </semantics></math>. In the <math display="inline"><semantics> <msub> <mi>S</mi> <mi>m</mi> </msub> </semantics></math> approximation, one defines <math display="inline"><semantics> <msub> <mi>S</mi> <mi>m</mi> </msub> </semantics></math> as the set which contains up to the <span class="html-italic">m</span>-th shortest paths (i.e., the shortest paths, the 2nd shortest paths, and so on up to the <span class="html-italic">m</span>-th shortest paths) between <span class="html-italic">s</span> and <span class="html-italic">t</span> for all <math display="inline"><semantics> <mrow> <mi>s</mi> <mo>∈</mo> <mi>S</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>∈</mo> <mi>T</mi> </mrow> </semantics></math>. In the parallel approximation, one treats all paths in <math display="inline"><semantics> <msub> <mi>S</mi> <mi>m</mi> </msub> </semantics></math> as parallel and non-overlapping. Thus, the network topology reduces to series-then-parallel, and the sponge-crossing concurrence can be calculated using the series/parallel rules (<a href="#entropy-25-01564-t002" class="html-table">Table 2</a>).</p>
Full article ">Figure 13
<p>The sponge-crossing concurrence <math display="inline"><semantics> <msub> <mi>C</mi> <mi>SC</mi> </msub> </semantics></math> for the Bethe lattice under the parallel approximation. Results are shown for coordination numbers (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> and (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>. As the number of layers, <span class="html-italic">L</span>, in the network become larger, the numerical concurrence percolation threshold approaches the analytical value, <math display="inline"><semantics> <mrow> <msub> <mi>θ</mi> <mi>th</mi> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>2</mn> <mo>/</mo> <mi>π</mi> <mo>)</mo> </mrow> <msup> <mo form="prefix">sin</mo> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>/</mo> <msqrt> <mrow> <mi>k</mi> <mo>−</mo> <mn>1</mn> </mrow> </msqrt> <mo>)</mo> </mrow> </mrow> </semantics></math>. The solid black lines represent the exact <math display="inline"><semantics> <msub> <mi>C</mi> <mi>SC</mi> </msub> </semantics></math> for the Bethe lattice (cf. <a href="#entropy-25-01564-f005" class="html-fig">Figure 5</a>).</p>
Full article ">Figure 14
<p>The sponge-crossing concurrence <math display="inline"><semantics> <msub> <mi>C</mi> <mi>SC</mi> </msub> </semantics></math> for 2D square lattices under the <math display="inline"><semantics> <msub> <mi>S</mi> <mi>m</mi> </msub> </semantics></math> and parallel approximations. (<b>a</b>) Sponge-crossing concurrence <math display="inline"><semantics> <msub> <mi>C</mi> <mi>SC</mi> </msub> </semantics></math> as a function of link’s entanglement <math display="inline"><semantics> <mi>θ</mi> </semantics></math> under the <math display="inline"><semantics> <msub> <mi>S</mi> <mn>3</mn> </msub> </semantics></math> approximation. The results of <math display="inline"><semantics> <msub> <mi>S</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>S</mi> <mn>2</mn> </msub> </semantics></math> are nearly identical to <math display="inline"><semantics> <msub> <mi>S</mi> <mn>3</mn> </msub> </semantics></math> and not plotted. (<b>b</b>) Numerical concurrence percolation threshold <math display="inline"><semantics> <msub> <mi>θ</mi> <mi>th</mi> </msub> </semantics></math> under the <math display="inline"><semantics> <msub> <mi>S</mi> <mi>m</mi> </msub> </semantics></math> approximation. As the approximation order <span class="html-italic">m</span> increases, <math display="inline"><semantics> <msub> <mi>θ</mi> <mi>th</mi> </msub> </semantics></math> approaches a constant value. (<b>c</b>) <math display="inline"><semantics> <msub> <mi>θ</mi> <mi>th</mi> </msub> </semantics></math> for different size <span class="html-italic">N</span>. (<b>d</b>) Same as (<b>c</b>) but for larger <span class="html-italic">N</span>. The results of <math display="inline"><semantics> <msub> <mi>S</mi> <mn>3</mn> </msub> </semantics></math> are not shown because it becomes too computationally intensive to calculate for <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>&gt;</mo> <msup> <mn>20</mn> <mn>2</mn> </msup> </mrow> </semantics></math>. As <span class="html-italic">N</span> increases, <math display="inline"><semantics> <msub> <mi>θ</mi> <mi>th</mi> </msub> </semantics></math> also approaches a constant value.</p>
Full article ">Figure 15
<p>The speed-up obtained by the approximations over the star-mesh transform. The figure shows the computing time (in seconds) to calculate the sponge-crossing concurrence between two nodes <span class="html-italic">s</span> and <span class="html-italic">t</span> on 2D square lattices with <span class="html-italic">N</span> nodes, using the <math display="inline"><semantics> <msub> <mi>S</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>S</mi> <mn>2</mn> </msub> </semantics></math> approximation. In contrast to the star-mesh transform, we can see that the approximations speed up the calculation over the star-mesh transform approach by two orders of magnitude.</p>
Full article ">
12 pages, 2228 KiB  
Article
Machine Learning Approach to Analyze the Heavy Quark Diffusion Coefficient in Relativistic Heavy Ion Collisions
by Rui Guo, Yonghui Li and Baoyi Chen
Entropy 2023, 25(11), 1563; https://doi.org/10.3390/e25111563 - 20 Nov 2023
Cited by 4 | Viewed by 1483
Abstract
The diffusion coefficient of heavy quarks in a deconfined medium is examined in this research using a deep convolutional neural network (CNN) that is trained with data from relativistic heavy ion collisions involving heavy flavor hadrons. The CNN is trained using observables such [...] Read more.
The diffusion coefficient of heavy quarks in a deconfined medium is examined in this research using a deep convolutional neural network (CNN) that is trained with data from relativistic heavy ion collisions involving heavy flavor hadrons. The CNN is trained using observables such as the nuclear modification factor RAA and the elliptic flow v2 of non-prompt J/ψ from the B-hadron decay in different centralities, where B meson evolutions are calculated using the Langevin equation and the instantaneous coalescence model. The CNN outputs the parameters, thereby characterizing the temperature and momentum dependence of the heavy quark diffusion coefficient. By inputting the experimental data of the non-prompt J/ψ(RAA,v2) from various collision centralities into multiple channels of a well-trained network, we derive the values of the diffusion coefficient parameters. Additionally, we evaluate the uncertainty in determining the diffusion coefficient by taking into account the uncertainties present in the experimental data (RAA,v2), which serve as inputs to the deep neural network. Full article
(This article belongs to the Section Statistical Physics)
Show Figures

Figure 1

Figure 1
<p>Schematic figure that shows the structure of the convolutional neural network. The <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mrow> <mi>A</mi> <mi>A</mi> </mrow> </msub> <mrow> <mo>(</mo> <msub> <mi>p</mi> <mi>T</mi> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math> in the three centralities and the one <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mn>2</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>p</mi> <mi>T</mi> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math> are taken as four channels of the input layer, while the parameters related to the spatial diffusion coefficient are the output.</p>
Full article ">Figure 2
<p>Some of the events that were randomly selected from one channel of the training dataset. The lines represent the nuclear modification factors of the non-prompt <math display="inline"><semantics> <mrow> <mi>J</mi> <mo>/</mo> <mi>ψ</mi> </mrow> </semantics></math>, which was calculated with different parameter values in the centrality of 30–100% in the 5.02 TeV Pb–Pb collisions.</p>
Full article ">Figure 3
<p>The loss of the CNN model as a function of the training epochs. The loss of the model calculated with the training datasets and the validation datasets are respectively plotted.</p>
Full article ">Figure 4
<p>To consider the error bars of the experimental data about non-prompt <math display="inline"><semantics> <mrow> <mi>J</mi> <mo>/</mo> <mi>ψ</mi> </mrow> </semantics></math> in the 5.02 TeV Pb–Pb collisions, we sampled the values of <math display="inline"><semantics> <msub> <mi>R</mi> <mrow> <mi>A</mi> <mi>A</mi> </mrow> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>v</mi> <mn>2</mn> </msub> </semantics></math> within the error bars of each data point, and we took them as inputs of the deep neural network. Some of the lines representing random events are plotted in the figures. The four figures represent the four channels of the network. The experimental data were cited from CMS Collaboration [<a href="#B34-entropy-25-01563" class="html-bibr">34</a>,<a href="#B35-entropy-25-01563" class="html-bibr">35</a>].</p>
Full article ">Figure 5
<p>The distribution of the parameter values <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>α</mi> <mo>,</mo> <mi>β</mi> <mo>)</mo> </mrow> </semantics></math> from the CNN. The x-axis represents <math display="inline"><semantics> <mi>α</mi> </semantics></math>, while the y-axis represents <math display="inline"><semantics> <mi>β</mi> </semantics></math>. Each point represents one event.</p>
Full article ">Figure 6
<p>The distribution of the parameter values <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>S</mi> <mo>,</mo> <mi>γ</mi> <mo>)</mo> </mrow> </semantics></math> obtained from the CNN model is shown in the plot. The x-axis corresponds to the values of <span class="html-italic">S</span> or <math display="inline"><semantics> <mi>γ</mi> </semantics></math>, while the y-axis represents the number of events.</p>
Full article ">
20 pages, 3572 KiB  
Article
Multiscale Cumulative Residual Dispersion Entropy with Applications to Cardiovascular Signals
by Youngjun Kim and Young-Seok Choi
Entropy 2023, 25(11), 1562; https://doi.org/10.3390/e25111562 - 20 Nov 2023
Cited by 2 | Viewed by 1601
Abstract
Heart rate variability (HRV) is used as an index reflecting the adaptability of the autonomic nervous system to external stimuli and can be used to detect various heart diseases. Since HRVs are the time series signal with nonlinear property, entropy has been an [...] Read more.
Heart rate variability (HRV) is used as an index reflecting the adaptability of the autonomic nervous system to external stimuli and can be used to detect various heart diseases. Since HRVs are the time series signal with nonlinear property, entropy has been an attractive analysis method. Among the various entropy methods, dispersion entropy (DE) has been preferred due to its ability to quantify the time series’ underlying complexity with low computational cost. However, the order between patterns is not considered in the probability distribution of dispersion patterns for computing the DE value. Here, a multiscale cumulative residual dispersion entropy (MCRDE), which employs a cumulative residual entropy and DE estimation in multiple temporal scales, is presented. Thus, a generalized and fast estimation of complexity in temporal structures is inherited in the proposed MCRDE. To verify the performance of the proposed MCRDE, the complexity of inter-beat interval obtained from ECG signals of congestive heart failure (CHF), atrial fibrillation (AF), and the healthy group was compared. The experimental results show that MCRDE is more capable of quantifying physiological conditions than preceding multiscale entropy methods in that MCRDE achieves more statistically significant cases in terms of p-value from the Mann–Whitney test. Full article
(This article belongs to the Special Issue Entropy in Biomedical Engineering, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Examples of the DE algorithm using series <math display="inline"><semantics> <mrow> <mi mathvariant="normal">x</mi> <mo>=</mo> <mfenced open="{" close="}" separators="|"> <mrow> <mn>0.1</mn> <mo> </mo> <mn>2</mn> <mo> </mo> <mn>3</mn> <mo> </mo> <mn>2.2</mn> <mo> </mo> <mn>3.5</mn> <mo> </mo> <mn>5.7</mn> <mo> </mo> <mn>2.5</mn> <mo> </mo> <mn>3.4</mn> <mo> </mo> <mn>7.3</mn> <mo> </mo> <mn>1</mn> </mrow> </mfenced> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>c</mi> <mo>=</mo> <mn>3</mn> <mo>,</mo> <mo> </mo> <mi>m</mi> <mo>=</mo> <mn>2</mn> <mo>,</mo> <mo> </mo> <mi>τ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Examples of synthetic signals: (<b>a</b>) 1/f noise and (<b>b</b>) WGN.</p>
Full article ">Figure 3
<p>Representative inter-beat (RR) intervals extracted from the electrocardiogram (ECG) dataset: (<b>a</b>) congestive heart failure (CHF) group, (<b>b</b>) atrial fibrillation (AF) group, (<b>c</b>) healthy group.</p>
Full article ">Figure 4
<p>The histogram for possible dispersion patterns and cumulative distribution curves (the solid red line) for synthetic signals: (<b>a</b>) WGN, N = 1000 and (<b>b</b>) 1/f noise, N = 1000.</p>
Full article ">Figure 5
<p>Entropy values for synthetic signals: (<b>a</b>) results of MDE for N = 1000; (<b>b</b>) results of MCRDE for N = 1000; scale range of 1–25 are used, and the value at each scale represents a mean <math display="inline"><semantics> <mrow> <mo>±</mo> </mrow> </semantics></math> standard deviation.</p>
Full article ">Figure 6
<p>The histogram for possible dispersion patterns and cumulative distribution curves (the solid red line) for RR intervals of three groups: (<b>a</b>) CHF patient, (<b>b</b>) AF patient, and (<b>c</b>) healthy subject.</p>
Full article ">Figure 7
<p>MSE, MDE, and MCRDE results of RR intervals for CHF patients, AF patients and healthy group: (<b>a</b>) MSE for N = 100; (<b>b</b>) MDE for N = 100; (<b>c</b>) MCRDE for N = 100; (<b>d</b>) MSE for N = 250; (<b>e</b>) MDE for N = 250; (<b>f</b>) MCRDE for N = 250; (<b>g</b>) MSE for N = 500; (<b>h</b>) MDE for N = 500; (<b>i</b>) MCRDE for N = 500; (<b>j</b>) MSE for N = 100; (<b>k</b>) MDE for N = 500; (<b>l</b>) MCRDE for N = 500. The scale factor ranges from 1 to 25. The entropy value at each scale factor represents a mean <math display="inline"><semantics> <mrow> <mo>±</mo> </mrow> </semantics></math> standard deviation. The asterisks indicate a significant difference between groups obtained via Mann–Whitney U test (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 7 Cont.
<p>MSE, MDE, and MCRDE results of RR intervals for CHF patients, AF patients and healthy group: (<b>a</b>) MSE for N = 100; (<b>b</b>) MDE for N = 100; (<b>c</b>) MCRDE for N = 100; (<b>d</b>) MSE for N = 250; (<b>e</b>) MDE for N = 250; (<b>f</b>) MCRDE for N = 250; (<b>g</b>) MSE for N = 500; (<b>h</b>) MDE for N = 500; (<b>i</b>) MCRDE for N = 500; (<b>j</b>) MSE for N = 100; (<b>k</b>) MDE for N = 500; (<b>l</b>) MCRDE for N = 500. The scale factor ranges from 1 to 25. The entropy value at each scale factor represents a mean <math display="inline"><semantics> <mrow> <mo>±</mo> </mrow> </semantics></math> standard deviation. The asterisks indicate a significant difference between groups obtained via Mann–Whitney U test (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 8
<p>MSE, MDE, and MCRDE results of RR intervals for healthy and old group: (<b>a</b>) MSE for <span class="html-italic">N</span> = 100; (<b>b</b>) MDE for <span class="html-italic">N</span> = 100; (<b>c</b>) MCRD for N = 100; (<b>d</b>) MSE for <span class="html-italic">N</span> = 250; (<b>e</b>) MDE for <span class="html-italic">N</span> = 250; (<b>f</b>) MCRDE for <span class="html-italic">N</span> = 250; (<b>g</b>) MSE for <span class="html-italic">N</span> = 500; (<b>h</b>) MDE for <span class="html-italic">N</span> = 500; (<b>i</b>) MCRDE for <span class="html-italic">N</span> = 500; (<b>j</b>) MSE for <span class="html-italic">N</span> = 100; (<b>k</b>) MDE for <span class="html-italic">N</span> = 500; (<b>l</b>) MCRDE for <span class="html-italic">N</span> = 500. The scale factor ranges from 1 to 25. The entropy value at each scale factor represents a mean <math display="inline"><semantics> <mrow> <mo>±</mo> </mrow> </semantics></math> standard deviation. The asterisks indicate a significant difference between groups obtained via the Mann–Whitney U test (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 8 Cont.
<p>MSE, MDE, and MCRDE results of RR intervals for healthy and old group: (<b>a</b>) MSE for <span class="html-italic">N</span> = 100; (<b>b</b>) MDE for <span class="html-italic">N</span> = 100; (<b>c</b>) MCRD for N = 100; (<b>d</b>) MSE for <span class="html-italic">N</span> = 250; (<b>e</b>) MDE for <span class="html-italic">N</span> = 250; (<b>f</b>) MCRDE for <span class="html-italic">N</span> = 250; (<b>g</b>) MSE for <span class="html-italic">N</span> = 500; (<b>h</b>) MDE for <span class="html-italic">N</span> = 500; (<b>i</b>) MCRDE for <span class="html-italic">N</span> = 500; (<b>j</b>) MSE for <span class="html-italic">N</span> = 100; (<b>k</b>) MDE for <span class="html-italic">N</span> = 500; (<b>l</b>) MCRDE for <span class="html-italic">N</span> = 500. The scale factor ranges from 1 to 25. The entropy value at each scale factor represents a mean <math display="inline"><semantics> <mrow> <mo>±</mo> </mrow> </semantics></math> standard deviation. The asterisks indicate a significant difference between groups obtained via the Mann–Whitney U test (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">
9 pages, 1127 KiB  
Article
Non-Linear Measures of Postural Control in Response to Painful and Non-Painful Visual Stimuli
by Alexandre Vonesch, Cassandre Duhot, Thierry Lelard, Guillaume Léonard, Michalina Błażkiewicz and Harold Mouras
Entropy 2023, 25(11), 1561; https://doi.org/10.3390/e25111561 - 19 Nov 2023
Cited by 2 | Viewed by 1603
Abstract
Over the past decade, researchers have focused on studying the functional context of perceiving painful stimuli, particularly concerning the posturographic correlates of emotional processing. The aim of this study was to investigate the differential modulation of non-linear measures characterizing postural control in the [...] Read more.
Over the past decade, researchers have focused on studying the functional context of perceiving painful stimuli, particularly concerning the posturographic correlates of emotional processing. The aim of this study was to investigate the differential modulation of non-linear measures characterizing postural control in the context of perceiving painful stimuli. The study involved 36 healthy young participants who, while standing, viewed images depicting feet and hands in painful or non-painful situations, both actively (by imagining themselves affected by the situation) and passively. For Center of Pressure (COP) displacement, three non-linear measures (Sample Entropy, Fractal Dimension, and Lyapunov exponent) were calculated. The results suggest lower values of FD and LyE in response to active stimulation compared to those recorded for passive stimulation. Above all, our results pledge for the usefulness of the Lyapunov exponent for assessing postural modulation dynamics in response to painful stimuli perception. The feasibility of this calculation could provide an interesting insight in the collection of biomarkers related to postural correlates of emotional processes and their modulation in neurological disease where socio-affective functions can be often impaired before cognitive ones. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

Figure 1
<p>ANOVA results, mean and standard deviations for the stimulation (passive, active) and valence (painful, non-painful) factors for (<b>A</b>). Sample Entropy (SampEn), (<b>B</b>). the Lyapunov exponent (LyE) and (<b>C</b>). Fractal Dimension (FD) for the time series COP in anteroposterior (AP) direction.</p>
Full article ">Figure 2
<p>ANOVA results, mean and standard deviations for the stimulation (passive, active) and valence (painful, non-painful) factors for (<b>A</b>). Sample Entropy (SampEn), (<b>B</b>). the Lyapunov exponent (LyE) and (<b>C</b>). Fractal Dimension (FD) for the time series COP in the mediolateral (ML) direction.</p>
Full article ">
18 pages, 2447 KiB  
Article
How Do Heterogeneous Networks Affect a Firm’s Innovation Performance? A Research Analysis Based on Clustering and Classification
by Liping Zhang, Hanhui Qiu, Jinyi Chen, Wenhao Zhou and Hailin Li
Entropy 2023, 25(11), 1560; https://doi.org/10.3390/e25111560 - 19 Nov 2023
Cited by 3 | Viewed by 2034
Abstract
Based on authorized patents of China’s artificial intelligence industry from 2013 to 2022, this paper constructs an Industry–University–Research institution (IUR) collaboration network and an Inter-Firm (IF) collaboration network and used the entropy weight method to take both the quantity and quality of patents [...] Read more.
Based on authorized patents of China’s artificial intelligence industry from 2013 to 2022, this paper constructs an Industry–University–Research institution (IUR) collaboration network and an Inter-Firm (IF) collaboration network and used the entropy weight method to take both the quantity and quality of patents into account to calculate the innovation performance of firms. Through the hierarchical clustering algorithm and classification and regression trees (CART) algorithm, in-depth analysis has been conducted on the intricate non-linear influence mechanisms between multiple variables and a firm’s innovation performance. The findings indicate the following: (1) Based on the network centrality (NC), structural hole (SH), collaboration breadth (CB), and collaboration depth (CD) of both IUR and IF collaboration networks, two types of focal firms are identified. (2) For different types of focal firms, the combinations of network characteristics affecting their innovation performance are various. (3) In the IUR collaboration network, focal firms with a wide range of heterogeneous collaborative partners can obtain high innovation performance. However, focal firms in the IF collaboration network can achieve the same aim by maintaining deep collaboration with other focal firms. This paper not only helps firms make scientific decisions for development but also provides valuable suggestions for government policymakers. Full article
Show Figures

Figure 1

Figure 1
<p>Research framework.</p>
Full article ">Figure 2
<p>Correlation analysis of network characteristics and innovation performance.</p>
Full article ">Figure 3
<p>Radar map of NC, SH, CB, and CD, in IUR and IF collaboration networks.</p>
Full article ">Figure 4
<p>Cluster I of IUR collaboration network.</p>
Full article ">Figure 5
<p>Cluster II of IUR collaboration network.</p>
Full article ">Figure 6
<p>Cluster I of IF collaboration network.</p>
Full article ">Figure 7
<p>Cluster II of IF collaboration network.</p>
Full article ">
11 pages, 9899 KiB  
Article
Evaluating the Adiabatic Invariants in Magnetized Plasmas Using a Classical Ehrenfest Theorem
by Abiam Tamburrini, Sergio Davis and Pablo S. Moya
Entropy 2023, 25(11), 1559; https://doi.org/10.3390/e25111559 - 18 Nov 2023
Viewed by 1530
Abstract
In this article, we address the reliance on probability density functions to obtain macroscopic properties in systems with multiple degrees of freedom as plasmas, and the limitations of expensive techniques for solving Equations such as Vlasov’s. We introduce the Ehrenfest procedure as an [...] Read more.
In this article, we address the reliance on probability density functions to obtain macroscopic properties in systems with multiple degrees of freedom as plasmas, and the limitations of expensive techniques for solving Equations such as Vlasov’s. We introduce the Ehrenfest procedure as an alternative tool that promises to address these challenges more efficiently. Based on the conjugate variable theorem and the well-known fluctuation-dissipation theorem, this procedure offers a less expensive way of deriving time evolution Equations for macroscopic properties in systems far from equilibrium. We investigate the application of the Ehrenfest procedure for the study of adiabatic invariants in magnetized plasmas. We consider charged particles trapped in a dipole magnetic field and apply the procedure to the study of adiabatic invariants in magnetized plasmas and derive Equations for the magnetic moment, longitudinal invariant, and magnetic flux. We validate our theoretical predictions using a test particle simulation, showing good agreement between theory and numerical results for these observables. Although we observed small differences due to time scales and simulation limitations, our research supports the utility of the Ehrenfest procedure for understanding and modeling the behavior of particles in magnetized plasmas. We conclude that this procedure provides a powerful tool for the study of dynamical systems and statistical mechanics out of equilibrium, and opens perspectives for applications in other systems with probabilistic continuity. Full article
(This article belongs to the Special Issue 180th Anniversary of Ludwig Boltzmann)
Show Figures

Figure 1

Figure 1
<p>Particle trajectories in the <math display="inline"><semantics> <mover accent="true"> <mi>x</mi> <mo stretchy="false">^</mo> </mover> </semantics></math>-<math display="inline"><semantics> <mover accent="true"> <mi>y</mi> <mo stretchy="false">^</mo> </mover> </semantics></math> plane in the left panel and <math display="inline"><semantics> <mover accent="true"> <mi>x</mi> <mo stretchy="false">^</mo> </mover> </semantics></math>-<math display="inline"><semantics> <mover accent="true"> <mi>z</mi> <mo stretchy="false">^</mo> </mover> </semantics></math> plane in the right panel, in four different time steps: <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mn>500</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> </mrow> </semantics></math> 20,000.</p>
Full article ">Figure 2
<p>Application of the Ehrenfest procedure to particles trapped in a dipole magnetic field. Left: time series of the left-hand (blue) and right-hand (red) sides of Equation (<a href="#FD4-entropy-25-01559" class="html-disp-formula">4</a>) using data extracted from the simulation. From top to bottom, each panel corresponds to the Ehrenfest procedure applied to the magnetic moment, pitch angle, and radial distance, respectively. Right: correlations between left- and right-hand sides of each relation. In each scatter plot, the solid black line represents the maximum in each column, and black dashed lines represent the tendency and identity, respectively.</p>
Full article ">Figure 3
<p>The upper panel shows the change in the slope of the linear fit for each quantity as we increase the particle statistics of the problem in steps of an order of magnitude. The lower panel shows the variation of the Pearson correlation coefficient by increasing the number of particles. The error associated with each data is on the order of <math display="inline"><semantics> <mrow> <mn>0.02</mn> <mo>%</mo> </mrow> </semantics></math> on average; therefore, the error bars are not distinguishable on the scale of the figure.</p>
Full article ">
21 pages, 3707 KiB  
Article
Modelling and Research on Intuitionistic Fuzzy Goal-Based Attack and Defence Game for Infrastructure Networks
by Zhe Li, Jin Liu, Yibo Dong, Jiaqi Ren and Weili Li
Entropy 2023, 25(11), 1558; https://doi.org/10.3390/e25111558 - 18 Nov 2023
Cited by 1 | Viewed by 1493
Abstract
Network attack and defence games are gradually becoming a new approach through which to study the protection of infrastructure networks such as power grids and transportation networks. Uncertainty factors, such as the subjective decision preferences of attackers and defenders, are not considered in [...] Read more.
Network attack and defence games are gradually becoming a new approach through which to study the protection of infrastructure networks such as power grids and transportation networks. Uncertainty factors, such as the subjective decision preferences of attackers and defenders, are not considered in existing attack and defence game studies for infrastructure networks. In this paper, we introduce, respectively, the attacker’s and defender’s expectation value, rejection value, and hesitation degree of the target, as well as construct an intuitionistic fuzzy goal-based attack and defence game model for infrastructure networks that are based on the maximum connectivity slice size, which is a network performance index. The intuitionistic fuzzy two-player, zero-sum game model is converted into a linear programming problem for solving, and the results are analysed to verify the applicability and feasibility of the model proposed in this paper. Furthermore, different situations, such as single-round games and multi-round repeated games, are also considered. The experimental results show that, when attacking the network, the attacker rarely attacks the nodes with higher importance in the network, but instead pays more attention to the nodes that are not prominent in the network neutrality and median; meanwhile, the defender is more inclined to protect the more important nodes in the network to ensure the normal performance of the network. Full article
(This article belongs to the Special Issue Uncertainty Management in Intelligent Information Processing)
Show Figures

Figure 1

Figure 1
<p>This figure shows the process of attack and defense game for infrastructure networks. The nodes in this picture that are covered in blue are those that the defender chooses to defend, and the nodes that are covered in red are those that the attacker decides to attack. The nodes with the red dotted line indicate that the attacker has successfully attacked them when it is not defended, and the nodes with the blue solid line indicate that the defender has successfully defended them.</p>
Full article ">Figure 2
<p>This figure shows the membership function and non-membership function image of player <math display="inline"><semantics> <msub> <mi>p</mi> <mn>1</mn> </msub> </semantics></math>. And the membership function monotonically non-decreasing as the payment value increases; While the non-membership function monotonically non-increasing as the payment value increases.</p>
Full article ">Figure 3
<p>This figure shows the membership function and non-membership function image of player <math display="inline"><semantics> <msub> <mi>p</mi> <mn>2</mn> </msub> </semantics></math>. And the membership function monotonically non-increasing as the payment value increases; While the non-membership function monotonically non-decreasing as the payment value increases.</p>
Full article ">Figure 4
<p>This figure shows the topology of the target infrastructure network. Nodes represent stations with specialized purposes in real-world complex networks, such as high-speed train stations, airports, and power stations; A linked edge is defined as a physical or logical connection between two nodes that allows them to exchange information or matter.</p>
Full article ">Figure 5
<p>This figure shows the image of the attacker’s membership function and non-membership function. And the image of attacker’s membership and non-membership function are obtained with <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mi>a</mi> </msub> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mi>a</mi> </msub> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>0.25</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>This figure shows the image of the defender’s membership function and non-membership function. And the image of defender’s membership and non-membership function are obtained with <math display="inline"><semantics> <mrow> <msub> <mi>w</mi> <mi>a</mi> </msub> <mo>=</mo> <mn>0.1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>q</mi> <mi>a</mi> </msub> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>w</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>0.15</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>q</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>0.25</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>This picture shows the probability of different nodes being attacked or defended. The darker the colour is, the greater the probability that the node is attacked or defended. And a node with no color indicates that it is not selected by attackers or defenders. (<b>a</b>) The probability of different nodes being defended. (<b>b</b>) The probability of different nodes being attacked.</p>
Full article ">Figure 8
<p>This picture shows the specific process of each round of a game in the process of a repeated game. Among them, the picture of the left column represents the topology of the infrastructure network at the beginning of each round of the attack and defence game. The picture in the right column shows the strategy choice of each round of attackers and defenders. The marked red node represents the node that successfully attacked, the green node represents the node that successfully defended, and the blue node represents the node that was defended but not attacked. (<b>a</b>) Topology of the first round of the complex network. (<b>b</b>) The first round of attack and defence strategy. (<b>c</b>) Topology of the second round of the complex network. (<b>d</b>) The second round of attack and defence strategy. (<b>e</b>) Topology of the third round of the complex network. (<b>f</b>) The third round of attack and defence strategy. (<b>g</b>) Topology of the fourth round of the complex network. (<b>h</b>) The fourth round of attack and defence strategy. (<b>i</b>) Topology of the fifth round of the complex network. (<b>j</b>) The fifth round of attack and defence strategy.</p>
Full article ">Figure 8 Cont.
<p>This picture shows the specific process of each round of a game in the process of a repeated game. Among them, the picture of the left column represents the topology of the infrastructure network at the beginning of each round of the attack and defence game. The picture in the right column shows the strategy choice of each round of attackers and defenders. The marked red node represents the node that successfully attacked, the green node represents the node that successfully defended, and the blue node represents the node that was defended but not attacked. (<b>a</b>) Topology of the first round of the complex network. (<b>b</b>) The first round of attack and defence strategy. (<b>c</b>) Topology of the second round of the complex network. (<b>d</b>) The second round of attack and defence strategy. (<b>e</b>) Topology of the third round of the complex network. (<b>f</b>) The third round of attack and defence strategy. (<b>g</b>) Topology of the fourth round of the complex network. (<b>h</b>) The fourth round of attack and defence strategy. (<b>i</b>) Topology of the fifth round of the complex network. (<b>j</b>) The fifth round of attack and defence strategy.</p>
Full article ">Figure 9
<p>This figure shows the comparison between the actual earnings and the equilibrium earnings under the repeated game. The theoretical equilibrium and actual earnings of each game are shown by the blue box and red triangle nodes. And the blue dotted and red dotted lines represent the average equilibrium earnings and the average actual earnings.</p>
Full article ">
9 pages, 597 KiB  
Article
Topological Dimensions from Disorder and Quantum Mechanics?
by Ivan Horváth and Peter Markoš
Entropy 2023, 25(11), 1557; https://doi.org/10.3390/e25111557 - 17 Nov 2023
Cited by 6 | Viewed by 1339
Abstract
We have recently shown that the critical Anderson electron in D=3 dimensions effectively occupies a spatial region of the infrared (IR) scaling dimension dIR8/3. Here, we inquire about the dimensional substructure involved. We partition space [...] Read more.
We have recently shown that the critical Anderson electron in D=3 dimensions effectively occupies a spatial region of the infrared (IR) scaling dimension dIR8/3. Here, we inquire about the dimensional substructure involved. We partition space into regions of equal quantum occurrence probabilities, such that the points comprising a region are of similar relevance, and calculate the IR scaling dimension d of each. This allows us to infer the probability density p(d) for dimension d to be accessed by the electron. We find that p(d) has a strong peak at d very close to two. In fact, our data suggest that p(d) is non-zero on the interval [dmin,dmax][4/3,8/3] and may develop a discrete part (δ-function) at d=2 in the infinite-volume limit. The latter invokes the possibility that a combination of quantum mechanics and pure disorder can lead to the emergence of integer (topological) dimensions. Although dIR is based on effective counting, of which p(d) has no a priori knowledge, dIRdmax is an exact feature of the ensuing formalism. A possible connection of our results to the recent findings of dIR2 in Dirac near-zero modes of thermal quantum chromodynamics is emphasized. Full article
(This article belongs to the Special Issue Recent Advances in the Theory of Disordered Systems)
Show Figures

Figure 1

Figure 1
<p>The “shovel” (<b>left</b>) and <math display="inline"><semantics> <mrow> <mi>d</mi> <mo>(</mo> <mi>q</mi> <mo>)</mo> </mrow> </semantics></math> (<b>right</b>) associated with its UV dimension content in <math display="inline"><semantics> <msup> <mrow> <mi mathvariant="double-struck">R</mi> </mrow> <mn>3</mn> </msup> </semantics></math>. See the discussion in the text.</p>
Full article ">Figure 2
<p>Function <math display="inline"><semantics> <mrow> <mi>d</mi> <mo>(</mo> <mi>q</mi> <mo>,</mo> <mi>ϵ</mi> <mo>,</mo> <mi>L</mi> <mo>)</mo> </mrow> </semantics></math> at <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </mrow> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>L</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>40</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>L</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>144</mn> </mrow> </semantics></math> (largest) systems. Shaded region marks the range <math display="inline"><semantics> <mrow> <mi>d</mi> <mspace width="-0.166667em"/> <mo>∈</mo> <mspace width="-0.166667em"/> <mo>[</mo> <mn>4</mn> <mo>/</mo> <mn>3</mn> <mo>,</mo> <mn>8</mn> <mo>/</mo> <mn>3</mn> <mo>]</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Function <math display="inline"><semantics> <mrow> <mi>p</mi> <mo>(</mo> <mi>d</mi> <mo>,</mo> <mi>ϵ</mi> <mo>,</mo> <mi>L</mi> <mo>)</mo> </mrow> </semantics></math> at <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </mrow> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>L</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>40</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>L</mi> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>144</mn> </mrow> </semantics></math> (largest) systems. Shaded region marks the range <math display="inline"><semantics> <mrow> <mi>d</mi> <mspace width="-0.166667em"/> <mo>∈</mo> <mspace width="-0.166667em"/> <mo>[</mo> <mn>4</mn> <mo>/</mo> <mn>3</mn> <mo>,</mo> <mn>8</mn> <mo>/</mo> <mn>3</mn> <mo>]</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Probabilities <math display="inline"><semantics> <mrow> <mi>p</mi> <mo>(</mo> <mi>d</mi> <mspace width="-0.166667em"/> <mo>&lt;</mo> <mspace width="-0.166667em"/> <msub> <mi>d</mi> <mn>0</mn> </msub> <mo>)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>p</mi> <mo>(</mo> <mi>d</mi> <mspace width="-0.166667em"/> <mo>&gt;</mo> <mspace width="-0.166667em"/> <msub> <mi>d</mi> <mn>0</mn> </msub> <mo>)</mo> </mrow> </semantics></math> (panels (<b>a</b>,<b>b</b>)) in <math display="inline"><semantics> <mrow> <mi>L</mi> <mspace width="-0.166667em"/> <mo>→</mo> <mspace width="-0.166667em"/> <mo>∞</mo> </mrow> </semantics></math> limit. Panels (<b>c</b>,<b>d</b>) show extrapolations for <math display="inline"><semantics> <mrow> <msub> <mi>d</mi> <mn>0</mn> </msub> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>4</mn> <mo>/</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>d</mi> <mn>0</mn> </msub> <mspace width="-0.166667em"/> <mo>=</mo> <mspace width="-0.166667em"/> <mn>8</mn> <mo>/</mo> <mn>3</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Function <math display="inline"><semantics> <mrow> <mi>I</mi> <mo>(</mo> <mi>ρ</mi> <mo>,</mo> <mi>L</mi> <mspace width="-0.166667em"/> <mo>→</mo> <mspace width="-0.166667em"/> <mo>∞</mo> <mo>)</mo> </mrow> </semantics></math> obtained by fitting in <span class="html-italic">L</span>-ranges containing increasingly larger lattices. Inset shows example of a fit in the vicinity of <math display="inline"><semantics> <msub> <mi>ρ</mi> <mn>0</mn> </msub> </semantics></math> such that <math display="inline"><semantics> <mrow> <mi>I</mi> <mo>(</mo> <msub> <mi>ρ</mi> <mn>0</mn> </msub> <mo>)</mo> <mspace width="-0.166667em"/> <mo>≈</mo> <mspace width="-0.166667em"/> <mn>0</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Schematic representation of the concluded function <math display="inline"><semantics> <mrow> <mi>d</mi> <mo>(</mo> <mi>q</mi> <mo>)</mo> </mrow> </semantics></math> (panel (<b>a</b>)) and the dimensional content <math display="inline"><semantics> <mrow> <mi>p</mi> <mo>(</mo> <mi>d</mi> <mo>)</mo> </mrow> </semantics></math> (panel (<b>b</b>)) at Anderson criticality. The narrow spike in (<b>b</b>) represents the <math display="inline"><semantics> <mi>δ</mi> </semantics></math>-function.</p>
Full article ">
18 pages, 1211 KiB  
Article
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
by Aleksei Reutov, Andrey Tayduganov, Vladimir Mayboroda and Oleg Fat’yanov
Entropy 2023, 25(11), 1556; https://doi.org/10.3390/e25111556 - 17 Nov 2023
Cited by 3 | Viewed by 2162
Abstract
The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol [...] Read more.
The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by the experimental characterization of intensity and phase distributions. Full article
Show Figures

Figure 1

Figure 1
<p>The optical scheme of weak coherent state preparation of given intensity and polarization: Light source—DFB laser, IM—intensity modulator Optilab IMP-1550-10-PM, PM—phase modulator IXblue MPZ-LN-10, BS—beamsplitter with the split ratio of 1:99, PwM—power meter Thorlabs PM100USB+S154C, VOA—electronic variable optical attenuator. The cyan line denotes polarization-maintaining optical fiber. The connector to PM is rotated by 45<math display="inline"><semantics> <msup> <mrow/> <mo>∘</mo> </msup> </semantics></math> angle with respect to the PM crystal axes.</p>
Full article ">Figure 2
<p>The measured probability density function of pulse intensity (mean photon number per pulse). The signal (<math display="inline"><semantics> <mi>μ</mi> </semantics></math>) and two decoy (<math display="inline"><semantics> <msub> <mi>ν</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>2</mn> </mrow> </msub> </semantics></math>) states are generated randomly with the probabilities of <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mi>μ</mi> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <msub> <mi>ν</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>2</mn> </mrow> </msub> </msub> <mo>=</mo> <mn>0.25</mn> </mrow> </semantics></math>, respectively. The non-physical negative values of the vacuum decoy peak are caused by photodetector noise.</p>
Full article ">Figure 3
<p>The simulated secret key length <math display="inline"><semantics> <msub> <mo>ℓ</mo> <mi>sec</mi> </msub> </semantics></math>, normalized to the verified key length <math display="inline"><semantics> <msub> <mo>ℓ</mo> <mi>ver</mi> </msub> </semantics></math>, for the scenarios of perfect (<math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>,</mo> <msub> <mi>ν</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>ν</mi> <mn>2</mn> </msub> </mrow> </semantics></math> are constant) and imperfect (<math display="inline"><semantics> <mrow> <mi>μ</mi> <mo>,</mo> <msub> <mi>ν</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>ν</mi> <mn>2</mn> </msub> </mrow> </semantics></math> fluctuate following the normal distribution) pulse intensity modulation. The red curve represents the result of the method introduced by Wang et al. in [<a href="#B30-entropy-25-01556" class="html-bibr">30</a>,<a href="#B31-entropy-25-01556" class="html-bibr">31</a>] with the intensities bounded with their <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> <mi>σ</mi> </mrow> </semantics></math> uncertainties.</p>
Full article ">Figure 4
<p>Alice’s output polarization states on the Bloch sphere. The blue and orange dots mark the perfectly prepared states (<a href="#FD12-entropy-25-01556" class="html-disp-formula">12</a>), while the realistic states (<a href="#FD13-entropy-25-01556" class="html-disp-formula">13</a>) are schematically depicted as solid angle surface areas.</p>
Full article ">Figure 5
<p>The measured polarization states (<a href="#FD13-entropy-25-01556" class="html-disp-formula">13</a>) on the Poincaré sphere, made in the Stokes parameter coordinates <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>S</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>S</mi> <mn>2</mn> </msub> <mo>,</mo> <msub> <mi>S</mi> <mn>3</mn> </msub> <mo>)</mo> </mrow> </semantics></math>. The plot on the right shows the zoomed equatorial area of the sphere. The red circle is the best-fit circle given 3D points.</p>
Full article ">Figure 6
<p>The experimental angular distributions, obtained from the spherical coordinates of the data points on the Poincaré sphere in <a href="#entropy-25-01556-f004" class="html-fig">Figure 4</a>.</p>
Full article ">Figure 6 Cont.
<p>The experimental angular distributions, obtained from the spherical coordinates of the data points on the Poincaré sphere in <a href="#entropy-25-01556-f004" class="html-fig">Figure 4</a>.</p>
Full article ">Figure 7
<p>(<b>Left</b>): The simulated secret key length <math display="inline"><semantics> <msub> <mo>ℓ</mo> <mi>sec</mi> </msub> </semantics></math>, normalized to the verified key length <math display="inline"><semantics> <msub> <mo>ℓ</mo> <mi>ver</mi> </msub> </semantics></math>, for scenarios of perfect and imperfect phase modulation. The orange solid (dashed) line corresponds to the fitted Gaussian (experimental binned) probability density function of angular distributions. (<b>Right</b>): The simulated <math display="inline"><semantics> <mrow> <msub> <mo>ℓ</mo> <mi>sec</mi> </msub> <mo>/</mo> <msub> <mo>ℓ</mo> <mi>ver</mi> </msub> </mrow> </semantics></math> ratio for various values of quantum coin imbalance <math display="inline"><semantics> <mo>Δ</mo> </semantics></math>.</p>
Full article ">
11 pages, 992 KiB  
Article
Connectivity of Random Geometric Hypergraphs
by Henry-Louis de Kergorlay and Desmond J. Higham
Entropy 2023, 25(11), 1555; https://doi.org/10.3390/e25111555 - 17 Nov 2023
Cited by 1 | Viewed by 1338
Abstract
We consider a random geometric hypergraph model based on an underlying bipartite graph. Nodes and hyperedges are sampled uniformly in a domain, and a node is assigned to those hyperedges that lie within a certain radius. From a modelling perspective, we explain how [...] Read more.
We consider a random geometric hypergraph model based on an underlying bipartite graph. Nodes and hyperedges are sampled uniformly in a domain, and a node is assigned to those hyperedges that lie within a certain radius. From a modelling perspective, we explain how the model captures higher-order connections that arise in real data sets. Our main contribution is to study the connectivity properties of the model. In an asymptotic limit where the number of nodes and hyperedges grow in tandem, we give a condition on the radius that guarantees connectivity. Full article
Show Figures

Figure 1

Figure 1
<p>When this construction is regarded as a bipartite graph, the solid circles and solid stars represent two types of nodes. Edges are created only between nodes of a different type; this happens if and only if they are close enough in Euclidean distance. When regarded as a hypergraph, the solid circles represent nodes and the solid stars represent “centres” of hyperedges. A node is a member of a hyperedge if and only if it is sufficiently close to the corresponding centre. Mathematically, the resulting hypergraph may be defined by labelling the nodes <math display="inline"><semantics> <mrow> <mo>{</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>4</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>6</mn> <mo>,</mo> <mn>7</mn> <mo>}</mo> </mrow> </semantics></math> and listing the hyperedges as <math display="inline"><semantics> <mrow> <mo>{</mo> <mn>1</mn> <mo>}</mo> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mo>{</mo> <mn>2</mn> <mo>,</mo> <mn>3</mn> <mo>}</mo> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mo>{</mo> <mn>4</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>6</mn> <mo>,</mo> <mn>7</mn> <mo>}</mo> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mo>{</mo> <mn>5</mn> <mo>,</mo> <mn>6</mn> <mo>,</mo> <mn>7</mn> <mo>}</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Euclidean distance at which random geometric hypergraph becomes connected. Here, we have <math display="inline"><semantics> <mrow> <mn>0.8</mn> <mi>n</mi> </mrow> </semantics></math> nodes and <math display="inline"><semantics> <mrow> <mn>0.2</mn> <mi>n</mi> </mrow> </semantics></math> hyperedge centres in <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">R</mi> <mn>2</mn> </msup> </semantics></math>, for values of <span class="html-italic">n</span> between <math display="inline"><semantics> <msup> <mn>10</mn> <mn>3</mn> </msup> </semantics></math> and <math display="inline"><semantics> <msup> <mn>10</mn> <mn>4</mn> </msup> </semantics></math>. The plots show the mean, maximum, and minimum value of this distance over 500 independent trials. A reference slope corresponding to <math display="inline"><semantics> <mrow> <mi>C</mi> <msup> <mi>n</mi> <mrow> <mo>−</mo> <mstyle scriptlevel="1" displaystyle="false"> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> </mstyle> </mrow> </msup> </mrow> </semantics></math> is shown. Axes are logarithmically scaled. Largest standard error for the mean computations was below <math display="inline"><semantics> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </semantics></math>.</p>
Full article ">Figure 3
<p>As for <a href="#entropy-25-01555-f002" class="html-fig">Figure 2</a>, with nodes embedded in <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">R</mi> <mn>4</mn> </msup> </semantics></math> and a reference slope corresponding to <math display="inline"><semantics> <mrow> <mi>C</mi> <msup> <mi>n</mi> <mrow> <mo>−</mo> <mstyle scriptlevel="1" displaystyle="false"> <mfrac> <mn>1</mn> <mn>4</mn> </mfrac> </mstyle> </mrow> </msup> </mrow> </semantics></math>. Largest standard error for the mean computations was below <math display="inline"><semantics> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </semantics></math>.</p>
Full article ">Figure 4
<p>As for <a href="#entropy-25-01555-f002" class="html-fig">Figure 2</a>, with nodes embedded in <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">R</mi> <mn>10</mn> </msup> </semantics></math> and a reference slope corresponding to <math display="inline"><semantics> <mrow> <mi>C</mi> <msup> <mi>n</mi> <mrow> <mo>−</mo> <mstyle scriptlevel="1" displaystyle="false"> <mfrac> <mn>1</mn> <mn>10</mn> </mfrac> </mstyle> </mrow> </msup> </mrow> </semantics></math>. Largest standard error for the mean computations was below <math display="inline"><semantics> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </semantics></math>.</p>
Full article ">Figure 5
<p>For the geometric random hypergraphs in <a href="#entropy-25-01555-f002" class="html-fig">Figure 2</a>, we show the mean node degree and mean hyperedge degree. A reference slope corresponding to <math display="inline"><semantics> <mrow> <mi>C</mi> <mo form="prefix">log</mo> <mi>n</mi> </mrow> </semantics></math> is also plotted. Axes are logarithmically scaled. Largest standard error for the mean computations was below <math display="inline"><semantics> <mrow> <mn>0.2</mn> </mrow> </semantics></math> for nodal degree and below <math display="inline"><semantics> <mrow> <mn>0.6</mn> </mrow> </semantics></math> for hyperedge degree.</p>
Full article ">Figure 6
<p>As for <a href="#entropy-25-01555-f005" class="html-fig">Figure 5</a>, with nodes embedded in <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">R</mi> <mn>4</mn> </msup> </semantics></math>. Largest standard error for the mean computations was below <math display="inline"><semantics> <mrow> <mn>0.3</mn> </mrow> </semantics></math> for nodal degree and below 1 for hyperedge degree.</p>
Full article ">Figure 7
<p>As for <a href="#entropy-25-01555-f005" class="html-fig">Figure 5</a>, with nodes embedded in <math display="inline"><semantics> <msup> <mi mathvariant="double-struck">R</mi> <mn>10</mn> </msup> </semantics></math>. Largest standard error for the mean computations was below <math display="inline"><semantics> <mrow> <mn>0.5</mn> </mrow> </semantics></math> for nodal degree and below 2 for hyperedge degree.</p>
Full article ">
18 pages, 952 KiB  
Article
Causal Factor Disentanglement for Few-Shot Domain Adaptation in Video Prediction
by Nathan Cornille, Katrien Laenen, Jingyuan Sun and Marie-Francine Moens
Entropy 2023, 25(11), 1554; https://doi.org/10.3390/e25111554 - 17 Nov 2023
Viewed by 1593
Abstract
An important challenge in machine learning is performing with accuracy when few training samples are available from the target distribution. If a large number of training samples from a related distribution are available, transfer learning can be used to improve the performance. This [...] Read more.
An important challenge in machine learning is performing with accuracy when few training samples are available from the target distribution. If a large number of training samples from a related distribution are available, transfer learning can be used to improve the performance. This paper investigates how to do transfer learning more effectively if the source and target distributions are related through a Sparse Mechanism Shift for the application of next-frame prediction. We create Sparse Mechanism Shift-TempoRal Intervened Sequences (SMS-TRIS), a benchmark to evaluate transfer learning for next-frame prediction derived from the TRIS datasets. We then propose to exploit the Sparse Mechanism Shift property of the distribution shift by disentangling the model parameters with regard to the true causal mechanisms underlying the data. We use the Causal Identifiability from TempoRal Intervened Sequences (CITRIS) model to achieve this disentanglement via causal representation learning. We show that encouraging disentanglement with the CITRIS extensions can improve performance, but their effectiveness varies depending on the dataset and backbone used. We find that it is effective only when encouraging disentanglement actually succeeds in increasing disentanglement. We also show that an alternative method designed for domain adaptation does not help, indicating the challenging nature of the SMS-TRIS benchmark. Full article
(This article belongs to the Special Issue Causality and Complex Systems)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Causal mechanism disentanglement for three latent dimensions of <math display="inline"><semantics> <msup> <mrow> <mi mathvariant="bold-italic">z</mi> </mrow> <mi>t</mi> </msup> </semantics></math> and two true causal factors <math display="inline"><semantics> <msubsup> <mi>c</mi> <mi>k</mi> <mi>t</mi> </msubsup> </semantics></math>, with sample frames from the Shapes dataset. The top part shows the true factors and mechanisms along with the observation function <span class="html-italic">h</span> that produces the observed frames. The bottom part shows the modeled latents and parameters. The alignment between true factors <math display="inline"><semantics> <msubsup> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> <mi>k</mi> <mi>t</mi> </msubsup> </semantics></math> and disentangled dimensions of the model activations <math display="inline"><semantics> <msubsup> <mrow> <mi mathvariant="bold-italic">z</mi> </mrow> <mi>i</mi> <mi>t</mi> </msubsup> </semantics></math> is indicated with full bold-colored outlines (<span style="color: #9900FF">purple</span> for factor 1 and <math display="inline"><semantics> <msup> <mrow> <mi mathvariant="bold-italic">z</mi> </mrow> <mi>t</mi> </msup> </semantics></math> dimensions 0 and 1; <span style="color: #FF00FF">pink</span> for factor 2 and <math display="inline"><semantics> <msup> <mrow> <mi mathvariant="bold-italic">z</mi> </mrow> <mi>t</mi> </msup> </semantics></math> dimension 2). (<b>b</b>) In the target domain, the shifted mechanism <math display="inline"><semantics> <msub> <mi>g</mi> <mn>1</mn> </msub> </semantics></math>, with a green background, leads to a shift in <math display="inline"><semantics> <mrow> <mi>P</mi> <mo>(</mo> <msubsup> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> <mn>1</mn> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>∣</mo> <mi>P</mi> <mi>a</mi> <mrow> <mo>(</mo> <msubsup> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> <mn>1</mn> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>)</mo> </mrow> <mo>)</mo> </mrow> </semantics></math>. If the encoder <math display="inline"><semantics> <msub> <mi>e</mi> <mi>θ</mi> </msub> </semantics></math> disentangles different causal factors into different subsets of the latent <math display="inline"><semantics> <msup> <mrow> <mi mathvariant="bold-italic">z</mi> </mrow> <mi>t</mi> </msup> </semantics></math>, this leads to a shift only in <math display="inline"><semantics> <mrow> <mi>P</mi> <mo>(</mo> <msubsup> <mrow> <mi mathvariant="bold-italic">z</mi> </mrow> <msub> <mi>ψ</mi> <mn>1</mn> </msub> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>∣</mo> <mi>P</mi> <mi>a</mi> <mrow> <mo>(</mo> <msubsup> <mrow> <mi mathvariant="bold-italic">z</mi> </mrow> <msub> <mi>ψ</mi> <mn>1</mn> </msub> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>)</mo> </mrow> <mo>)</mo> </mrow> </semantics></math>. It is then possible to adapt to this change during transfer learning by updating only <math display="inline"><semantics> <msub> <mi>p</mi> <mrow> <mi>ϕ</mi> <mo>,</mo> <msub> <mi>ψ</mi> <mn>1</mn> </msub> </mrow> </msub> </semantics></math>. This work evaluates whether this isolation of the parameters that need to update can be exploited to improve few-shot domain adaptation.</p>
Full article ">Figure 2
<p>Temporal Intervened Sequence (TRIS) data setup for <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math> causal factors, for which <math display="inline"><semantics> <mrow> <mi>P</mi> <mi>a</mi> <mrow> <mo>(</mo> <msubsup> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> <mn>1</mn> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>)</mo> </mrow> <mo>=</mo> <mrow> <mo>{</mo> <msubsup> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> <mn>1</mn> <mi>t</mi> </msubsup> <mo>,</mo> <msubsup> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> <mn>2</mn> <mi>t</mi> </msubsup> <mo>}</mo> </mrow> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>P</mi> <mi>a</mi> <mrow> <mo>(</mo> <msubsup> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> <mn>2</mn> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>)</mo> </mrow> <mo>=</mo> <msubsup> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> <mn>2</mn> <mi>t</mi> </msubsup> </mrow> </semantics></math>. The mechanism governing the evolution of the causal factors is the natural mechanism <math display="inline"><semantics> <msub> <mi>f</mi> <mi>k</mi> </msub> </semantics></math> if <math display="inline"><semantics> <mrow> <msubsup> <mi>ι</mi> <mi>k</mi> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, and the intervened mechanism <math display="inline"><semantics> <msubsup> <mi>f</mi> <mi>k</mi> <mi mathvariant="bold-italic">ι</mi> </msubsup> </semantics></math> is otherwise.</p>
Full article ">Figure 3
<p>The 0-shot OOD error and 200-shot OOD error (lower is better) that a model achieves if the source-domain pretraining checkpoint at the epoch indicated on the x-axis is taken. The Standard models (St-VAE and St-NF) are shown in orange/red and the CITRIS models (CI-VAE and CI-NF) in green/olive. The left figures show results for the Shapes dataset and the right for the Pong dataset. The top figures show the Normalizing flow backbone and the bottom figures the VAE backbone. The line indicates the average of five runs, with the shaded areas indicating the standard deviation.</p>
Full article ">Figure 4
<p>In-domain error, 0-shot error, and few-shot error of models after pretraining for 500 epochs. The Standard models are shown in red/orange and the CITRIS models in green/olive. The left figures show results for the Shapes dataset and the right for the Pong dataset. The top figures show the NF backbone and the bottom figures the VAE backbone. The average of five runs is shown, with the error bars/shaded areas indicating the standard deviation. The x-axis indicates in-domain or zero-shot out-of-domain for the bar charts and the number of shots used for the line plots.</p>
Full article ">Figure 5
<p>Correlation between few-shot prediction performance and Causal Factor Disentanglement. The y-axis shows 100-shot prediction error after pretraining for 500 epochs. The x-axis shows the CFD Score. Results for the Shapes dataset are on the left, and for Pong, on the right.</p>
Full article ">Figure 6
<p>The effect of Deep CORAL on in-domain error, 0-shot error, and few-shot error of models after pretraining for 50 epochs. The Standard models are shown in shades of red and the CITRIS models in shades of green. The left figure shows results for the Shapes dataset and the right for the Pong dataset. The average of five runs is shown, with the error bars/shaded areas indicating the standard deviation. The x-axis indicates in-domain or zero-shot out-of-domain for the bar charts and the number of shots used for the line plots.</p>
Full article ">Figure A1
<p>Example subsequence of the Shapes dataset.</p>
Full article ">Figure A2
<p>Example subsequence of the Pong dataset.</p>
Full article ">
11 pages, 1626 KiB  
Article
Evolution Dynamics Model of Private Enterprises under Simultaneous and Sequential Innovation Decisions
by Chi Zhang, Yutong Wang and Tingqiang Chen
Entropy 2023, 25(11), 1553; https://doi.org/10.3390/e25111553 - 17 Nov 2023
Cited by 1 | Viewed by 1131
Abstract
The innovation of private enterprises plays a crucial role. This study focuses on the impacts of market information asymmetry, the technology spillover effect, and the order of innovation research and development (R&D) decisions on the evolution of private enterprises’ innovation. This study constructs [...] Read more.
The innovation of private enterprises plays a crucial role. This study focuses on the impacts of market information asymmetry, the technology spillover effect, and the order of innovation research and development (R&D) decisions on the evolution of private enterprises’ innovation. This study constructs a dynamic model to analyze how the innovation decision-making order of private enterprises influences their profits and intertemporal innovation decision making. First, we derive the equilibrium point under sequential decisions and the stability of the system at the equilibrium point. Second, we investigate the impact of sequential and simultaneous innovation decisions on the evolution of the dynamic system and its economic implications. Finally, we study the evolutionary dynamics of the attractor with the rate of innovation adjustment and point to the existence of multiple equilibria. The results suggest that the speed of the innovation R&D cost change should be moderate, and the asynchronous updating of the innovation R&D strategy can prevent the system evolution from turning into chaos. These conclusions guide innovation policies. Full article
(This article belongs to the Special Issue Complexity, Entropy and the Physics of Information)
Show Figures

Figure 1

Figure 1
<p>Bifurcation diagram with respect to <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>2</mn> </msub> </mrow> </semantics></math> under simultaneous decision and sequential decision (<math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0.45</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 2
<p>(<b>a</b>) The attractor diagram when <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.468</mn> </mrow> </semantics></math>. (<b>b</b>) The attractor diagram when <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.4703</mn> </mrow> </semantics></math>. (<b>c</b>) The attractor diagram when <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.48</mn> </mrow> </semantics></math>. (<b>d</b>) The attractor diagram when <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.59623</mn> </mrow> </semantics></math>. (<b>e</b>) The attractor diagram when <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.5965</mn> </mrow> </semantics></math>. (<b>f</b>) The attractor diagram when <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.613</mn> </mrow> </semantics></math>. (<b>g</b>) The attractor diagram when <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.616</mn> </mrow> </semantics></math>. (<b>h</b>) The attractor diagram when <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.618</mn> </mrow> </semantics></math>.</p>
Full article ">
12 pages, 478 KiB  
Article
Efficient Quantum Private Comparison without Sharing a Key
by Jian Li, Fanting Che, Zhuo Wang and Anqi Fu
Entropy 2023, 25(11), 1552; https://doi.org/10.3390/e25111552 - 17 Nov 2023
Cited by 6 | Viewed by 1369
Abstract
Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a [...] Read more.
Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics. To improve the use of quantum resources and the efficiency of private comparison, a new QPC protocol based on GHZ-like states is proposed. The protocol adopts unitary operations to encode the secret information instead of performing quantum key distribution (QKD), which can reduce the amount of computation required to perform QKD and improve the utilization of quantum resources. The decoy photon technique used to detect channel eavesdropping ensures that the protocol is resistant to external attacks. The quantum efficiency of the protocol reaches 66%. Compared with many previous QPC schemes, the proposed protocol does not need to share a key and has advantages in quantum efficiency and quantum resources. Full article
(This article belongs to the Special Issue Quantum and Classical Physical Cryptography)
Show Figures

Figure 1

Figure 1
<p>The model of the proposed protocol.</p>
Full article ">
14 pages, 551 KiB  
Article
FLPP: A Federated-Learning-Based Scheme for Privacy Protection in Mobile Edge Computing
by Zhimo Cheng, Xinsheng Ji, Wei You, Yi Bai, Yunjie Chen and Xiaogang Qin
Entropy 2023, 25(11), 1551; https://doi.org/10.3390/e25111551 - 16 Nov 2023
Viewed by 1656
Abstract
Data sharing and analyzing among different devices in mobile edge computing is valuable for social innovation and development. The limitation to the achievement of this goal is the data privacy risk. Therefore, existing studies mainly focus on enhancing the data privacy-protection capability. On [...] Read more.
Data sharing and analyzing among different devices in mobile edge computing is valuable for social innovation and development. The limitation to the achievement of this goal is the data privacy risk. Therefore, existing studies mainly focus on enhancing the data privacy-protection capability. On the one hand, direct data leakage is avoided through federated learning by converting raw data into model parameters for transmission. On the other hand, the security of federated learning is further strengthened by privacy-protection techniques to defend against inference attack. However, privacy-protection techniques may reduce the training accuracy of the data while improving the security. Particularly, trading off data security and accuracy is a major challenge in dynamic mobile edge computing scenarios. To address this issue, we propose a federated-learning-based privacy-protection scheme, FLPP. Then, we build a layered adaptive differential privacy model to dynamically adjust the privacy-protection level in different situations. Finally, we design a differential evolutionary algorithm to derive the most suitable privacy-protection policy for achieving the optimal overall performance. The simulation results show that FLPP has an advantage of 8∼34% in overall performance. This demonstrates that our scheme can enable data to be shared securely and accurately. Full article
(This article belongs to the Special Issue Methods in Artificial Intelligence and Information Processing II)
Show Figures

Figure 1

Figure 1
<p>Overview of federated-learning-based MEC system.</p>
Full article ">Figure 2
<p>Overview of FLPP scheme.</p>
Full article ">Figure 3
<p>Convergence curves of DE. (<b>a</b>) Five rounds of training. (<b>b</b>) Ten rounds of training.</p>
Full article ">Figure 4
<p>Overall performance. (<b>a</b>) Five rounds of training. (<b>b</b>) Ten rounds of training.</p>
Full article ">Figure 5
<p>Accuracy performance. (<b>a</b>) Five rounds of training. (<b>b</b>) Ten rounds of training.</p>
Full article ">Figure 6
<p>Security performance. (<b>a</b>) Five rounds of training. (<b>b</b>) Ten rounds of training.</p>
Full article ">
15 pages, 2745 KiB  
Article
Advancing Federated Learning through Verifiable Computations and Homomorphic Encryption
by Bingxue Zhang, Guangguang Lu, Pengpeng Qiu, Xumin Gui and Yang Shi
Entropy 2023, 25(11), 1550; https://doi.org/10.3390/e25111550 - 16 Nov 2023
Cited by 10 | Viewed by 2756
Abstract
Federated learning, as one of the three main technical routes for privacy computing, has been widely studied and applied in both academia and industry. However, malicious nodes may tamper with the algorithm execution process or submit false learning results, which directly affects the [...] Read more.
Federated learning, as one of the three main technical routes for privacy computing, has been widely studied and applied in both academia and industry. However, malicious nodes may tamper with the algorithm execution process or submit false learning results, which directly affects the performance of federated learning. In addition, learning nodes can easily obtain the global model. In practical applications, we would like to obtain the federated learning results only by the demand side. Unfortunately, no discussion on protecting the privacy of the global model is found in the existing research. As emerging cryptographic tools, the zero-knowledge virtual machine (ZKVM) and homomorphic encryption provide new ideas for the design of federated learning frameworks. We have introduced ZKVM for the first time, creating learning nodes as local computing provers. This provides execution integrity proofs for multi-class machine learning algorithms. Meanwhile, we discuss how to generate verifiable proofs for large-scale machine learning tasks under resource constraints. In addition, we implement the fully homomorphic encryption (FHE) scheme in ZKVM. We encrypt the model weights so that the federated learning nodes always collaborate in the ciphertext space. The real results can be obtained only after the demand side decrypts them using the private key. The innovativeness of this paper is demonstrated in the following aspects: 1. We introduce the ZKVM for the first time, which achieves zero-knowledge proofs (ZKP) for machine learning tasks with multiple classes and arbitrary scales. 2. We encrypt the global model, which protects the model privacy during local computation and transmission. 3. We propose and implement a new federated learning framework. We measure the verification costs under different federated learning rounds on the IRIS dataset. Despite the impact of homomorphic encryption on computational accuracy, the framework proposed in this paper achieves a satisfactory 90% model accuracy. Our framework is highly secure and is expected to further improve the overall efficiency as cryptographic tools continue to evolve. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

Figure 1
<p>Components of RISC ZKVM application.</p>
Full article ">Figure 2
<p>The proposed federated learning framework.</p>
Full article ">Figure 3
<p>Workflow.</p>
Full article ">Figure 4
<p>The generation and verification time of proof with different machine learning algorithms: (<b>a</b>) generation time of zk-proof; (<b>b</b>) verification time of zk-proof.</p>
Full article ">Figure 5
<p>The generation time and running RAM with different numbers of cycles: (<b>a</b>) generation time of zk-proof; (<b>b</b>) running RAM.</p>
Full article ">Figure 6
<p>Feedforward neural network with one hidden layer.</p>
Full article ">Figure 7
<p>The loss and accuracy of the global model trained with different numbers of learning nodes: (<b>a</b>) model loss; (<b>b</b>) model accuracy.</p>
Full article ">Figure 8
<p>The generation and verification time of proof with different numbers of federated learning round: (<b>a</b>) generation time of zk-proof; (<b>b</b>) verification time of zk-proof.</p>
Full article ">Figure 9
<p>The running RAM and proof size with different numbers of federated learning round: (<b>a</b>) running RAM; (<b>b</b>) proof size.</p>
Full article ">
31 pages, 9698 KiB  
Article
Fault Diagnosis of Rotating Machinery Using Kernel Neighborhood Preserving Embedding and a Modified Sparse Bayesian Classification Model
by Lixin Lu, Weihao Wang, Dongdong Kong, Junjiang Zhu and Dongxing Chen
Entropy 2023, 25(11), 1549; https://doi.org/10.3390/e25111549 - 16 Nov 2023
Cited by 5 | Viewed by 1372
Abstract
Fault diagnosis of rotating machinery plays an important role in modern industrial machines. In this paper, a modified sparse Bayesian classification model (i.e., Standard_SBC) is utilized to construct the fault diagnosis system of rotating machinery. The features are extracted and adopted as the [...] Read more.
Fault diagnosis of rotating machinery plays an important role in modern industrial machines. In this paper, a modified sparse Bayesian classification model (i.e., Standard_SBC) is utilized to construct the fault diagnosis system of rotating machinery. The features are extracted and adopted as the input of the SBC-based fault diagnosis system, and the kernel neighborhood preserving embedding (KNPE) is proposed to fuse the features. The effectiveness of the fault diagnosis system of rotating machinery based on KNPE and Standard_SBC is validated by utilizing two case studies: rolling bearing fault diagnosis and rotating shaft fault diagnosis. Experimental results show that base on the proposed KNPE, the feature fusion method shows superior performance. The accuracy of case1 and case2 is improved from 93.96% to 99.92% and 98.67% to 99.64%, respectively. To further prove the superiority of the KNPE feature fusion method, the kernel principal component analysis (KPCA) and relevance vector machine (RVM) are utilized, respectively. This study lays the foundation for the feature fusion and fault diagnosis of rotating machinery. Full article
Show Figures

Figure 1

Figure 1
<p>AI methods for fault diagnosis of rotating machinery: (1) Machine learning; (2) deep learning.</p>
Full article ">Figure 2
<p>Fault diagnosis system of rotating machinery based on KPNE and Standard_SBC. The small two-way arrows mean that both sides are equivalent to each other. The small single arrows refer to the data flow of feature engineering.</p>
Full article ">Figure 3
<p>The experimental setup for rolling bearing fault diagnosis. (1) electric motor, (2) torque-measuring shaft, (3) bearing test module, (4) flywheel, (5) load motor.</p>
Full article ">Figure 4
<p>Real damages caused by accelerated lifetime tests: (<b>a</b>) Indentation at the raceway of outer ring; (<b>b</b>) small pitting at the raceway of inner ring.</p>
Full article ">Figure 5
<p>Parameters for describing the geometry of bearing damages.</p>
Full article ">Figure 6
<p>Vibrations of the bearing test module (N09_M07_F10_K001_2).</p>
Full article ">Figure 7
<p>The iterative process of Standard_SBC by using the 126 TFW features obtained from the phase currents <math display="inline"><semantics> <mrow> <mfenced separators="|"> <mrow> <mi mathvariant="normal">u</mi> <mo>,</mo> <mi mathvariant="normal">v</mi> </mrow> </mfenced> </mrow> </semantics></math> and vibrations.</p>
Full article ">Figure 8
<p>The weights <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>w</mi> </mrow> <mrow> <mi>i</mi> </mrow> </msub> </mrow> </semantics></math> of the SBC-based rolling bearing fault diagnosis system constructed by the 126 TFW features obtained from the phase currents <math display="inline"><semantics> <mrow> <mfenced separators="|"> <mrow> <mi mathvariant="normal">u</mi> <mo>,</mo> <mi mathvariant="normal">v</mi> </mrow> </mfenced> </mrow> </semantics></math> and vibrations.</p>
Full article ">Figure 9
<p>Test results of the constructed SBC-based rolling bearing fault diagnosis system by using the 126 TFW features obtained from the phase currents <math display="inline"><semantics> <mrow> <mfenced separators="|"> <mrow> <mi mathvariant="normal">u</mi> <mo>,</mo> <mi mathvariant="normal">v</mi> </mrow> </mfenced> </mrow> </semantics></math> and vibrations.</p>
Full article ">Figure 10
<p>Performance evaluation of the SBC-based rolling bearing fault diagnosis system for different combinations of signals and features. ‘T’, ‘F’, and ‘W’ represent the time-domain, the frequency-domain, and the wavelet-domain, respectively. <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>2</mn> </mrow> </semantics></math> represent the phase currents <math display="inline"><semantics> <mrow> <mi mathvariant="normal">u</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi mathvariant="normal">v</mi> </mrow> </semantics></math> of motors, respectively. <math display="inline"><semantics> <mrow> <mi mathvariant="normal">V</mi> </mrow> </semantics></math> represents the vibration signal of bearings.</p>
Full article ">Figure 11
<p>Sparseness of the SBC-based rolling bearing fault diagnosis system by utilizing the TFW features.</p>
Full article ">Figure 12
<p>Effectiveness analysis of KNPE for rolling bearing fault diagnosis (<math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>σ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>γ</mi> <mo>=</mo> <mn>50</mn> <mi mathvariant="normal">%</mi> </mrow> </semantics></math>): (<b>a</b>) KNPE fuses the TFW features; (<b>b</b>) KNPE fuses the W features; (<b>c</b>) KNPE fuses the TF features.</p>
Full article ">Figure 13
<p>The experimental setup for rotating shaft fault diagnosis: (<b>a</b>) Three-dimensional model; (<b>b</b>) actual installation.</p>
Full article ">Figure 14
<p>Faulty shafts caused by artificial damages: (<b>a</b>) Normal shaft; (<b>b</b>) unbalanced shaft; (<b>c</b>) cracked shaft.</p>
Full article ">Figure 15
<p>Connection of key components; BNC (Bayonet Nut Connector).</p>
Full article ">Figure 16
<p>The Pirate Ship Data Collection Experiment.</p>
Full article ">Figure 17
<p>Effectiveness analysis of KNPE for rotating shaft fault diagnosis (<math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>σ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>γ</mi> <mo>=</mo> <mn>2</mn> <mi mathvariant="normal">%</mi> </mrow> </semantics></math>). ‘T’, ‘F’, and ‘W’ refer to the time-domain, the frequency-domain, and the wavelet-domain, respectively.</p>
Full article ">Figure 18
<p>Test results of the rotating shaft fault diagnosis system based on KNPE and Standard_SBC by using the TFW features (<math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>σ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>γ</mi> <mo>=</mo> <mn>2</mn> <mi mathvariant="normal">%</mi> </mrow> </semantics></math>).</p>
Full article ">Figure 19
<p>Performance comparison of KNPE (<math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>σ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>) and KPCA (<math display="inline"><semantics> <mrow> <msub> <mrow> <mi>σ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>) for rolling bearing fault diagnosis: (<b>a</b>) KNPE fuses the TFW features of <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>1</mn> <mo>+</mo> <mi mathvariant="normal">C</mi> <mn>2</mn> <mo>+</mo> <mi mathvariant="normal">V</mi> </mrow> </semantics></math>; (<b>b</b>) KNPE fuses the W features of <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>1</mn> <mo>+</mo> <mi mathvariant="normal">C</mi> <mn>2</mn> <mo>+</mo> <mi mathvariant="normal">V</mi> </mrow> </semantics></math>; (<b>c</b>) KNPE fuses the TF features of <math display="inline"><semantics> <mrow> <mi mathvariant="normal">C</mi> <mn>1</mn> <mo>+</mo> <mi mathvariant="normal">C</mi> <mn>2</mn> <mo>+</mo> <mi mathvariant="normal">V</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 20
<p>Performance comparison of KNPE (<math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>σ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>) and KPCA (<math display="inline"><semantics> <mrow> <msub> <mrow> <mi>σ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>) for rolling bearing fault diagnosis: (<b>a</b>) KNPE fuses the TFW features of vibrations (<math display="inline"><semantics> <mrow> <mi mathvariant="normal">V</mi> </mrow> </semantics></math>); (<b>b</b>) KNPE fuses the W features of vibrations (<math display="inline"><semantics> <mrow> <mi mathvariant="normal">V</mi> </mrow> </semantics></math>); (<b>c</b>) KNPE fuses the TF features of vibrations (<math display="inline"><semantics> <mrow> <mi mathvariant="normal">V</mi> </mrow> </semantics></math>).</p>
Full article ">Figure 21
<p>Performance comparison of KNPE (<math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>σ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>) and KPCA (<math display="inline"><semantics> <mrow> <msub> <mrow> <mi>σ</mi> </mrow> <mrow> <mn>0</mn> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>) for rotating shaft fault diagnosis: (<b>a</b>) KNPE fuses the TFW features of vibrations; (<b>b</b>) KNPE fuses the W features of vibrations; (<b>c</b>) KNPE fuses the TF features of vibrations.</p>
Full article ">
7 pages, 1225 KiB  
Article
Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network
by Min Wang, Wei Zhang, Jianxing Guo, Xiaotian Song and Guilu Long
Entropy 2023, 25(11), 1548; https://doi.org/10.3390/e25111548 - 16 Nov 2023
Cited by 5 | Viewed by 1613
Abstract
Quantum secure direct communication (QSDC) offers a practical way to realize a quantum network which can transmit information securely and reliably. Practical quantum networks are hindered by the unavailability of quantum relays. To overcome this limitation, a proposal has been made to transmit [...] Read more.
Quantum secure direct communication (QSDC) offers a practical way to realize a quantum network which can transmit information securely and reliably. Practical quantum networks are hindered by the unavailability of quantum relays. To overcome this limitation, a proposal has been made to transmit the messages encrypted with classical cryptography, such as post-quantum algorithms, between intermediate nodes of the network, where encrypted messages in quantum states are read out in classical bits, and sent to the next node using QSDC. In this paper, we report a real-time demonstration of a computationally secure relay for a quantum secure direct communication network. We have chosen CRYSTALS-KYBER which has been standardized by the National Institute of Standards and Technology to encrypt the messages for transmission of the QSDC system. The quantum bit error rate of the relay system is typically below the security threshold. Our relay can support a QSDC communication rate of 2.5 kb/s within a 4 ms time delay. The experimental demonstration shows the feasibility of constructing a large-scale quantum network in the near future. Full article
(This article belongs to the Special Issue New Advances in Quantum Communication and Networks)
Show Figures

Figure 1

Figure 1
<p>The architecture of QSDC network with computationally secure relay. The orange line denotes the classical channel. The green line denotes the quantum channel. PQC: post-quantum cryptography; Q-T: quantum transmitter; Q-R: quantum receiver.</p>
Full article ">Figure 2
<p>The architecture of the computationally secure relay. Rec.: receiver; Rconsys: receiver control system; Trans.: transmitter; Tconsys: transmitter control system; LDPC-H: low-density parity check and Hadamard code.</p>
Full article ">Figure 3
<p>Experimental setup of the QSDC network with a computationally secure relay. Alice encrypts the message and sends the ciphertext to the relay through the quantum channel. Bob receives the signals from the relay and decrypts the message after implementing the QSDC protocol. KYBER makes use of two hash functions H (SHA3-256) and G (SHA3-512) and a key derivation function KDF (SHAKE-256) in the realization. AMZI: asymmetric Mach–Zehnder interferometer; Attn: attenuator; PC: polarization controller; PM: phase modulator; BS: beam splitter; PBS: polarization beam splitter; CIR: circulator; FR: Faraday rotator; SPD: single-photon detector.</p>
Full article ">Figure 4
<p>Delay time at the relay.</p>
Full article ">Figure 5
<p>Communication rate of the relayed QSDC system. Communication rate (<b>a</b>) from Alice to relay; (<b>b</b>) from relay to Bob. Insets are the typical QBER of the QSDC system.</p>
Full article ">
18 pages, 932 KiB  
Article
Anti-Jamming Communication Using Imitation Learning
by Zhanyang Zhou, Yingtao Niu, Boyu Wan and Wenhao Zhou
Entropy 2023, 25(11), 1547; https://doi.org/10.3390/e25111547 - 16 Nov 2023
Viewed by 1804
Abstract
The communication reliability of wireless communication systems is threatened by malicious jammers. Aiming at the problem of reliable communication under malicious jamming, a large number of schemes have been proposed to mitigate the effects of malicious jamming by avoiding the blocking interference of [...] Read more.
The communication reliability of wireless communication systems is threatened by malicious jammers. Aiming at the problem of reliable communication under malicious jamming, a large number of schemes have been proposed to mitigate the effects of malicious jamming by avoiding the blocking interference of jammers. However, the existing anti-jamming schemes, such as fixed strategy, Reinforcement learning (RL), and deep Q network (DQN) have limited use of historical data, and most of them only pay attention to the current state changes and cannot gain experience from historical samples. In view of this, this manuscript proposes anti-jamming communication using imitation learning. Specifically, this manuscript addresses the problem of anti-jamming decisions for wireless communication in scenarios with malicious jamming and proposes an algorithm that consists of three steps: First, the heuristic-based Expert Trajectory Generation Algorithm is proposed as the expert strategy, which enables us to obtain the expert trajectory from historical samples. The trajectory mentioned in this algorithm represents the sequence of actions undertaken by the expert in various situations. Then obtaining a user strategy by imitating the expert strategy using an imitation learning neural network. Finally, adopting a functional user strategy for efficient and sequential anti-jamming decisions. Simulation results indicate that the proposed method outperforms the RL-based anti-jamming method and DQN-based anti-jamming method regarding solving continuous-state spectrum anti-jamming problems without causing “curse of dimensionality” and providing greater robustness against channel fading and noise as well as when the jamming pattern changes. Full article
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>Method process structure.</p>
Full article ">Figure 3
<p>Imitation Learning Neural Network.</p>
Full article ">Figure 4
<p>Time-frequency waterfall figure of the spectrum anti-jamming process.</p>
Full article ">Figure 5
<p>Time-frequency waterfall figure of the spectrum anti-jamming process. The red block represents the jamming signal, the lavender is the background noise, the green block is the communication trajectory selected according to the expert strategy, and the blue block is the user communication trajectory selected after imitation learning.</p>
Full article ">Figure 6
<p>The delay is fixed, and the collision rate cha nges curve with JNR under different hidden layers.</p>
Full article ">Figure 7
<p>The hidden layers is fixed, and the collision rate changes curve with JNR under different delay.</p>
Full article ">Figure 8
<p>The delay is fixed, and the collision rate changes curve with the proportion of jamming signals under different hidden layers.</p>
Full article ">Figure 9
<p>The hidden layers are fixed, and the collision rate changes curve with the proportion of jamming signals under different delays.</p>
Full article ">Figure 10
<p>Comparison of anti-jamming performance among RL, DQN and IL when jamming pattern is switched.</p>
Full article ">Figure 11
<p>The collision rate varies with the JNR of jamming signals.</p>
Full article ">Figure 12
<p>The collision rate varies with the proportion of jamming signals.</p>
Full article ">
17 pages, 14131 KiB  
Article
Denoising Non-Stationary Signals via Dynamic Multivariate Complex Wavelet Thresholding
by Kim C. Raath, Katherine B. Ensor, Alena Crivello and David W. Scott
Entropy 2023, 25(11), 1546; https://doi.org/10.3390/e25111546 - 16 Nov 2023
Viewed by 1504
Abstract
Over the past few years, we have seen an increased need to analyze the dynamically changing behaviors of economic and financial time series. These needs have led to significant demand for methods that denoise non-stationary time series across time and for specific investment [...] Read more.
Over the past few years, we have seen an increased need to analyze the dynamically changing behaviors of economic and financial time series. These needs have led to significant demand for methods that denoise non-stationary time series across time and for specific investment horizons (scales) and localized windows (blocks) of time. Wavelets have long been known to decompose non-stationary time series into their different components or scale pieces. Recent methods satisfying this demand first decompose the non-stationary time series using wavelet techniques and then apply a thresholding method to separate and capture the signal and noise components of the series. Traditionally, wavelet thresholding methods rely on the discrete wavelet transform (DWT), which is a static thresholding technique that may not capture the time series of the estimated variance in the additive noise process. We introduce a novel continuous wavelet transform (CWT) dynamically optimized multivariate thresholding method (WaveL2E). Applying this method, we are simultaneously able to separate and capture the signal and noise components while estimating the dynamic noise variance. Our method shows improved results when compared to well-known methods, especially for high-frequency signal-rich time series, typically observed in finance. Full article
(This article belongs to the Special Issue Robust Methods in Complex Scenarios and Data Visualization)
Show Figures

Figure 1

Figure 1
<p>The continuous wavelet transform (CWT) power spectrum of water (<b>a</b>,<b>c</b>) and energy (<b>b</b>,<b>d</b>) commodity ETF prices (<b>a</b>,<b>b</b>) and returns (<b>c</b>,<b>d</b>). These plots are visual representations of the power spectrum of each individual series. The investment horizons (vertical axis) are such that the value one through fourteen represents weekly and biweekly investment horizons. Sixty-four days represent a quarterly investment horizon, whereas 250 and above represent annual and larger investment horizons. The horizontal axis indicates the 10 years of data. The white overlay defines the cone of influence.</p>
Full article ">Figure 1 Cont.
<p>The continuous wavelet transform (CWT) power spectrum of water (<b>a</b>,<b>c</b>) and energy (<b>b</b>,<b>d</b>) commodity ETF prices (<b>a</b>,<b>b</b>) and returns (<b>c</b>,<b>d</b>). These plots are visual representations of the power spectrum of each individual series. The investment horizons (vertical axis) are such that the value one through fourteen represents weekly and biweekly investment horizons. Sixty-four days represent a quarterly investment horizon, whereas 250 and above represent annual and larger investment horizons. The horizontal axis indicates the 10 years of data. The white overlay defines the cone of influence.</p>
Full article ">Figure 2
<p>The CWT power spectrum (<b>a</b>) of a simple additive noise model with three stationary signals. Biweekly (15 days), quarterly (64 days), and biannually (125 days). Hence, we have that: <math display="inline"><semantics> <mrow> <msub> <mi>y</mi> <mi>t</mi> </msub> <mo>=</mo> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mrow> <mo>(</mo> <mfrac> <mrow> <mn>2</mn> <mi>π</mi> <mi>t</mi> </mrow> <mn>15</mn> </mfrac> <mo>)</mo> </mrow> <mo>+</mo> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mrow> <mo>(</mo> <mfrac> <mrow> <mn>2</mn> <mi>π</mi> <mi>t</mi> </mrow> <mn>64</mn> </mfrac> <mo>)</mo> </mrow> <mo>+</mo> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mrow> <mo>(</mo> <mfrac> <mrow> <mn>2</mn> <mi>π</mi> <mi>t</mi> </mrow> <mn>125</mn> </mfrac> <mo>)</mo> </mrow> <mo>+</mo> <mi>ϵ</mi> </mrow> </semantics></math>, where <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>∼</mo> <mi>N</mi> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>0.1</mn> <mo>)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mo>…</mo> <mo>,</mo> <mn>2400</mn> <mo>)</mo> </mrow> </semantics></math>. Also, this figure shows the CWT power spectrum (<b>b</b>), which is the pure signal without noise, the CWT power spectrum (<b>c</b>) after the <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> threshold, and the CWT power spectrum (<b>d</b>) after the <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <msub> <mi>E</mi> <msup> <mi>χ</mi> <mn>2</mn> </msup> </msub> </mrow> </semantics></math> threshold. For the minimization process, we use constrained optimization using PORT routines with <math display="inline"><semantics> <mrow> <mn>0</mn> <mo>≤</mo> <mi>σ</mi> <mo>&lt;</mo> <mo>∞</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mn>0</mn> <mo>≤</mo> <mi>w</mi> <mo>&lt;</mo> <mn>1</mn> </mrow> </semantics></math> [<a href="#B26-entropy-25-01546" class="html-bibr">26</a>].</p>
Full article ">Figure 3
<p>Demonstration of the process applied to a time series. Starting with the observed time series, we apply the Morlet wavelet, a continuous wavelet transform (CWT), and then after decomposition, we minimize the <math display="inline"><semantics> <mrow> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> criterion. This minimization provides us with the optimal estimates for <math display="inline"><semantics> <msub> <mi>σ</mi> <mi>t</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>w</mi> <mi>t</mi> </msub> </semantics></math>. After estimation, we can remove the noise component and recover the signal component of the original observed series.</p>
Full article ">Figure 4
<p>Summary of the difference between the wavelet <math display="inline"><semantics> <mrow> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> thresholding method we introduce in this paper and the other gold standard methods. The fundamental difference is that our novel method incorporates both inter-scale and intra-scale dependencies with no limitations on the estimates of the noise variance or parametric specifications.</p>
Full article ">Figure 5
<p>Two different comparative analyses: The first plot (<b>left</b>) is the base CWT power spectrum for the signal <math display="inline"><semantics> <mrow> <msub> <mi>y</mi> <mi>t</mi> </msub> <mo>=</mo> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mrow> <mo>(</mo> <mfrac> <mrow> <mn>2</mn> <mi>π</mi> <mi>t</mi> </mrow> <mn>15</mn> </mfrac> <mo>)</mo> </mrow> <mo>+</mo> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mrow> <mo>(</mo> <mfrac> <mrow> <mn>2</mn> <mi>π</mi> <mi>t</mi> </mrow> <mn>64</mn> </mfrac> <mo>)</mo> </mrow> <mo>+</mo> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mrow> <mo>(</mo> <mfrac> <mrow> <mn>2</mn> <mi>π</mi> <mi>t</mi> </mrow> <mn>125</mn> </mfrac> <mo>)</mo> </mrow> <mo>+</mo> <msub> <mi>ϵ</mi> <mi>t</mi> </msub> </mrow> </semantics></math>, where <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mi>t</mi> </msub> <mo>∼</mo> <mi>N</mi> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>0.1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mo>…</mo> <mo>,</mo> <mn>2400</mn> <mo>)</mo> </mrow> </semantics></math>. The top analyses is the <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> (<b>left</b>) and <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <msub> <mi>E</mi> <msup> <mi>χ</mi> <mn>2</mn> </msup> </msub> </mrow> </semantics></math> (<b>right</b>) thresholds from Equation (<a href="#FD6-entropy-25-01546" class="html-disp-formula">6</a>) and the bottom analysis is the dynamic <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> (<b>left</b>) and <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <msub> <mi>E</mi> <msup> <mi>χ</mi> <mn>2</mn> </msup> </msub> </mrow> </semantics></math> (<b>right</b>) thresholds from Equation (<a href="#FD9-entropy-25-01546" class="html-disp-formula">9</a>).</p>
Full article ">Figure 6
<p>Two different comparative analyses. The first plot (<b>left</b>) is the base CWT power spectrum for the signal from Equation (<a href="#FD11-entropy-25-01546" class="html-disp-formula">11</a>). The top analyses is the <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <msub> <mi>E</mi> <msup> <mi>χ</mi> <mn>2</mn> </msup> </msub> </mrow> </semantics></math> thresholds from Equation (<a href="#FD6-entropy-25-01546" class="html-disp-formula">6</a>) and the bottom analysis is the dynamic <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <msub> <mi>E</mi> <msup> <mi>χ</mi> <mn>2</mn> </msup> </msub> </mrow> </semantics></math> thresholds from Equation (<a href="#FD9-entropy-25-01546" class="html-disp-formula">9</a>).</p>
Full article ">Figure 7
<p>Comparative analysis of eight traditional time series depicted in the top panel (7a) before a wavelet transform. The series are labeled hisine, losine, linchirp, twochirp, quadchirp, mishmash1, mishmash2 and mismash3. The CWT for hisine, losine, linchirp and two chirp is given in panel 7b reading from left to right and top to bottom, whereas the CWT for the remaining four series is provided in panel 7c, namely quadchirp and mishmash1 through mishmash3.</p>
Full article ">Figure 8
<p>Analyzing the wavelet-squared coherence (WSC) of the water–energy nexus before (<b>top left</b>) and after (<b>top right</b>) <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> thresholding. We evaluate both the WSC (<b>bottom left</b>) and the partial coherence (<b>bottom middle</b>) results of the quarterly investment horizon by analyzing the leading–lagging relationship (<b>bottom right</b>) of the nexus.</p>
Full article ">Figure 9
<p>Analyzing and recovering the fiscal month, on the 22nd day; estimates for the <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> and visualizing the results of both the <math display="inline"><semantics> <mrow> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> and the <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>W</mi> <mi>a</mi> <mi>v</mi> <mi>e</mi> <msub> <mi>L</mi> <mn>2</mn> </msub> <mi>E</mi> </mrow> </semantics></math> after inversion and recovery of the estimated true time series. Method executed on the XLE ETF.</p>
Full article ">
18 pages, 733 KiB  
Article
Complexity Reduction in Analyzing Independence between Statistical Randomness Tests Using Mutual Information
by Jorge Augusto Karell-Albo, Carlos Miguel Legón-Pérez, Raisa Socorro-Llanes, Omar Rojas and Guillermo Sosa-Gómez
Entropy 2023, 25(11), 1545; https://doi.org/10.3390/e25111545 - 15 Nov 2023
Viewed by 1959
Abstract
The advantages of using mutual information to evaluate the correlation between randomness tests have recently been demonstrated. However, it has been pointed out that the high complexity of this method limits its application in batteries with a greater number of tests. The main [...] Read more.
The advantages of using mutual information to evaluate the correlation between randomness tests have recently been demonstrated. However, it has been pointed out that the high complexity of this method limits its application in batteries with a greater number of tests. The main objective of this work is to reduce the complexity of the method based on mutual information for analyzing the independence between the statistical tests of randomness. The achieved complexity reduction is estimated theoretically and verified experimentally. A variant of the original method is proposed by modifying the step in which the significant values of the mutual information are determined. The correlation between the NIST battery tests was studied, and it was concluded that the modifications to the method do not significantly affect the ability to detect correlations. Due to the efficiency of the newly proposed method, its use is recommended to analyze other batteries of tests. Full article
(This article belongs to the Special Issue Information Theory in Multi-Agent Systems: Methods and Applications)
Show Figures

Figure 1

Figure 1
<p>Comparison of mutual information estimators for a pair of independent tests [<a href="#B17-entropy-25-01545" class="html-bibr">17</a>].</p>
Full article ">Figure 2
<p>Comparison of mutual information estimators for a pair of correlated tests [<a href="#B17-entropy-25-01545" class="html-bibr">17</a>].</p>
Full article ">Figure 3
<p>Sampling distribution of the 1000 observations of <math display="inline"><semantics> <msub> <mi>Z</mi> <mrow> <mi>M</mi> <mi>L</mi> </mrow> </msub> </semantics></math> obtained from pairs <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>X</mi> <mi>i</mi> </msub> <mo>,</mo> <msub> <mi>Y</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Quantile plot of the 1000 observations of <math display="inline"><semantics> <msub> <mi>Z</mi> <mrow> <mi>M</mi> <mi>L</mi> </mrow> </msub> </semantics></math> obtained from pairs <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>X</mi> <mi>i</mi> </msub> <mo>,</mo> <msub> <mi>Y</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Distribution of the 136 observations of <math display="inline"><semantics> <msub> <mi>Z</mi> <mrow> <mi>M</mi> <mi>L</mi> </mrow> </msub> </semantics></math> for values between 0 and 1000.</p>
Full article ">Figure 6
<p>Distribution of <math display="inline"><semantics> <msub> <mi>Z</mi> <mrow> <mi>M</mi> <mi>L</mi> </mrow> </msub> </semantics></math> observations for values between 0 and 6.</p>
Full article ">Figure 7
<p>Mutual information matrix with the values of <math display="inline"><semantics> <msub> <mi>Z</mi> <mrow> <mi>M</mi> <mi>L</mi> </mrow> </msub> </semantics></math> between the pairs of statistical tests for randomness.</p>
Full article ">Figure 8
<p>Representation of the execution time of the methods for ten experiments.</p>
Full article ">Figure 9
<p>Distribution of the differences in the estimators <math display="inline"><semantics> <msub> <mover accent="true"> <mrow> <mi>M</mi> <mi>I</mi> </mrow> <mo>^</mo> </mover> <mrow> <mi>M</mi> <mi>L</mi> </mrow> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mover accent="true"> <mrow> <mi>M</mi> <mi>I</mi> </mrow> <mo>^</mo> </mover> <mrow> <mi>S</mi> <mi>H</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 10
<p>Bland–Altman plot for comparison of the estimators <math display="inline"><semantics> <msub> <mover accent="true"> <mrow> <mi>M</mi> <mi>I</mi> </mrow> <mo>^</mo> </mover> <mrow> <mi>M</mi> <mi>L</mi> </mrow> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mover accent="true"> <mrow> <mi>M</mi> <mi>I</mi> </mrow> <mo>^</mo> </mover> <mrow> <mi>S</mi> <mi>H</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 11
<p>Matrix to illustrate the stability of the MI estimator <math display="inline"><semantics> <msub> <mover accent="true"> <mrow> <mi>M</mi> <mi>I</mi> </mrow> <mo>^</mo> </mover> <mrow> <mi>M</mi> <mi>L</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">
21 pages, 1116 KiB  
Article
Design of Closed-Loop Control Schemes Based on the GA-PID and GA-RBF-PID Algorithms for Brain Dynamic Modulation
by Chengxia Sun, Lijun Geng, Xian Liu and Qing Gao
Entropy 2023, 25(11), 1544; https://doi.org/10.3390/e25111544 - 15 Nov 2023
Cited by 1 | Viewed by 1394
Abstract
Neurostimulation can be used to modulate brain dynamics of patients with neuropsychiatric disorders to make abnormal neural oscillations restore to normal. The control schemes proposed on the bases of neural computational models can predict the mechanism of neural oscillations induced by neurostimulation, and [...] Read more.
Neurostimulation can be used to modulate brain dynamics of patients with neuropsychiatric disorders to make abnormal neural oscillations restore to normal. The control schemes proposed on the bases of neural computational models can predict the mechanism of neural oscillations induced by neurostimulation, and then make clinical decisions that are suitable for the patient’s condition to ensure better treatment outcomes. The present work proposes two closed-loop control schemes based on the improved incremental proportional integral derivative (PID) algorithms to modulate brain dynamics simulated by Wendling-type coupled neural mass models. The introduction of the genetic algorithm (GA) in traditional incremental PID algorithm aims to overcome the disadvantage that the selection of control parameters depends on the designer’s experience, so as to ensure control accuracy. The introduction of the radial basis function (RBF) neural network aims to improve the dynamic performance and stability of the control scheme by adaptively adjusting control parameters. The simulation results show the high accuracy of the closed-loop control schemes based on GA-PID and GA-RBF-PID algorithms for modulation of brain dynamics, and also confirm the superiority of the scheme based on the GA-RBF-PID algorithm in terms of the dynamic performance and stability. This research of making hypotheses and predictions according to model data is expected to improve and perfect the equipment of early intervention and rehabilitation treatment for neuropsychiatric disorders in the biomedical engineering field. Full article
(This article belongs to the Section Entropy and Biology)
Show Figures

Figure 1

Figure 1
<p>Structure block diagram of the Wendling-type coupled neural mass model. (The part within the red dashed box represents the subset of main cells. The part within the blue dashed box represents the subset of interneurons).</p>
Full article ">Figure 2
<p>Structure diagram of the brain dynamic modulation system based on the GA-PID algorithm.</p>
Full article ">Figure 3
<p>Structure diagram of the brain dynamic modulation system based on the GA-RBF-PID algorithm.</p>
Full article ">Figure 4
<p>Structure diagram of the RBF neural network.</p>
Full article ">Figure 5
<p>Simulation schematic diagram of the brain dynamic modulation system based on the improved incremental PID algorithms. (<b>a</b>) The overall framework of the system. (<b>b</b>) GA-PID algorithm. (<b>c</b>) GA-RBF-PID algorithm.</p>
Full article ">Figure 6
<p>Optimal convergence curves of the GA objective function in different control schemes. (<b>a</b>) The result of the control scheme based on the GA-PID algorithm. (<b>b</b>) The result of the control scheme based on the GA-RBF-PID algorithm.</p>
Full article ">Figure 7
<p>Optimization curves of the (initial) control parameters under the action of GA. (<b>a</b>) Optimization results of the control parameters in the GA-PID algorithm. (<b>b</b>) Optimization results of the initial control parameters in the GA-RBF-PID algorithm.</p>
Full article ">Figure 8
<p>Modulation results of different control schemes with the fixed excitatory gains. (<b>a</b>) Output of the first neural population when the excitatory gain is 3.5 mV. (<b>b</b>) The modulation result of the control scheme based on the GA-PID algorithm. (<b>c</b>) The modulation result of the control scheme based on the GA-RBF-PID algorithm.</p>
Full article ">Figure 9
<p>The estimation result of the controlled output based on the RBF neural network.</p>
Full article ">Figure 10
<p>Modulation results of different control schemes with the mutated excitatory gains. (<b>a</b>) Changes in the excitatory gain. (<b>b</b>) The modulation result of the control scheme based on the GA-PID algorithm. (<b>c</b>) The modulation result of the control scheme based on the GA-RBF-PID algorithm.</p>
Full article ">Figure 11
<p>Modulation results of different control schemes with the mutated excitatory gains. (<b>a</b>) Changes in the excitatory gain. (<b>b</b>) The modulation result of the control scheme based on the GA-PID algorithm. (<b>c</b>) The modulation result of the control scheme based on the GA-RBF-PID algorithm.</p>
Full article ">
14 pages, 298 KiB  
Article
Bulk Operator Reconstruction in Topological Tensor Network and Generalized Free Fields
by Xiangdong Zeng and Ling-Yan Hung
Entropy 2023, 25(11), 1543; https://doi.org/10.3390/e25111543 - 15 Nov 2023
Cited by 2 | Viewed by 1156
Abstract
In this paper, we study operator reconstruction in a class of holographic tensor networks describing renormalization group flows studied in arXiv:2210.12127. We study examples of 2D bulk holographic tensor networks constructed from Dijkgraaf–Witten theories and find that for both the Zn group [...] Read more.
In this paper, we study operator reconstruction in a class of holographic tensor networks describing renormalization group flows studied in arXiv:2210.12127. We study examples of 2D bulk holographic tensor networks constructed from Dijkgraaf–Witten theories and find that for both the Zn group and the S3 group, the number of bulk operators behaving like a generalized free field in the bulk scales as the order of the group. We also generalize our study to 3D bulks and find the same scaling for Zn theories. However, there is no generalized free field when the bulk comes from more generic fusion categories such as the Fibonacci model. Full article
Show Figures

Figure 1

Figure 1
<p>Operator pushing in a holographic tensor network that is performing coarse-graining. Here, we illustrate a tree-like holographic tensor network. (<b>a</b>) Bulk operator <math display="inline"><semantics> <mrow> <mi mathvariant="script">O</mi> <mo>(</mo> <msup> <mi mathvariant="double-struck">V</mi> <mi>H</mi> </msup> <mo>)</mo> </mrow> </semantics></math> is reconstruced by boundary operator <math display="inline"><semantics> <mrow> <mi mathvariant="script">O</mi> <mo>(</mo> <msup> <mi mathvariant="double-struck">V</mi> <mi>K</mi> </msup> <mo>)</mo> </mrow> </semantics></math>, where we take <math display="inline"><semantics> <mrow> <mi>H</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> for simplicity. (<b>b</b>) Bulk operator <math display="inline"><semantics> <mrow> <mi mathvariant="script">O</mi> <mo>(</mo> <msup> <mi mathvariant="double-struck">V</mi> <mi>H</mi> </msup> <mo>)</mo> <mo>=</mo> <mi>X</mi> </mrow> </semantics></math> is reconstruced by a simple form boundary operator <math display="inline"><semantics> <mrow> <mi mathvariant="script">O</mi> <mrow> <mo>(</mo> <msup> <mi mathvariant="double-struck">V</mi> <mi>K</mi> </msup> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mo>∑</mo> <mi>i</mi> </msub> <msub> <mi>α</mi> <mi>i</mi> </msub> <mrow> <mo>(</mo> <msub> <mi mathvariant="double-struck">I</mi> <mn>1</mn> </msub> <mo>⊗</mo> <mo>⋯</mo> <mo>⊗</mo> <msub> <mi>X</mi> <mi>i</mi> </msub> <mo>⊗</mo> <mo>⋯</mo> <mo>⊗</mo> <msub> <mi mathvariant="double-struck">I</mi> <mi>K</mi> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math> as in Equation (<a href="#FD3-entropy-25-01543" class="html-disp-formula">3</a>). Hence, it corresponds to a generalized free field.</p>
Full article ">Figure 2
<p>RG operator in 1 + 1D Dijkgraaf–Witten theory characterized by group <span class="html-italic">G</span>, which takes the form of a tree tensor network with 1D boundary and total number of layers <span class="html-italic">L</span>. The legs are elements of group <span class="html-italic">G</span>. Explicitly, for the untwisted version of Dijkgraaf–Witten theory, each of these three-valent vertices (or dual triangles) resides a tensor <math display="inline"><semantics> <mrow> <msubsup> <mi>M</mi> <msub> <mi>g</mi> <mn>3</mn> </msub> <mrow> <msub> <mi>g</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>g</mi> <mn>2</mn> </msub> </mrow> </msubsup> <mo>=</mo> <msub> <mi>δ</mi> <mrow> <mi>G</mi> <mrow> <mo>(</mo> <msub> <mi>g</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>g</mi> <mn>2</mn> </msub> <mo>)</mo> </mrow> <mo>,</mo> <msub> <mi>g</mi> <mn>3</mn> </msub> </mrow> </msub> <mo>:</mo> <mo>=</mo> <msub> <mi>δ</mi> <mrow> <msub> <mi>g</mi> <mn>1</mn> </msub> <mo>×</mo> <msub> <mi>g</mi> <mn>2</mn> </msub> <mo>,</mo> <msub> <mi>g</mi> <mn>3</mn> </msub> </mrow> </msub> </mrow> </semantics></math>. Images from [<a href="#B18-entropy-25-01543" class="html-bibr">18</a>] (with modification).</p>
Full article ">Figure 3
<p>(<b>a</b>) A single tetrahedron is used as <span class="html-italic">F</span>-move that changes the surface triangulation. It is assigned the value of an <span class="html-italic">F</span>-symbol depending on the labels on the 6 edges. The blue and red lines should be summed over. (<b>b</b>) With two or more tetrahedra, we can construct the RG operator that maps the smaller triangles at the boundary onto larger triangles in the bulk. (<b>c</b>) Arrows on each edge indicate the direction of fusions. If all the objects are self-dual, then these arrows can be ignored.</p>
Full article ">
25 pages, 3785 KiB  
Review
Enhancing Predictability Assessment: An Overview and Analysis of Predictability Measures for Time Series and Network Links
by Alexandra Bezbochina, Elizaveta Stavinova, Anton Kovantsev and Petr Chunaev
Entropy 2023, 25(11), 1542; https://doi.org/10.3390/e25111542 - 15 Nov 2023
Cited by 1 | Viewed by 2293
Abstract
Driven by the variety of available measures intended to estimate predictability of diverse objects such as time series and network links, this paper presents a comprehensive overview of the existing literature in this domain. Our overview delves into predictability from two distinct perspectives: [...] Read more.
Driven by the variety of available measures intended to estimate predictability of diverse objects such as time series and network links, this paper presents a comprehensive overview of the existing literature in this domain. Our overview delves into predictability from two distinct perspectives: the intrinsic predictability, which represents a data property independent of the chosen forecasting model and serves as the highest achievable forecasting quality level, and the realized predictability, which represents a chosen quality metric for a specific pair of data and model. The reviewed measures are used to assess predictability across different objects, starting from time series (univariate, multivariate, and categorical) to network links. Through experiments, we establish a noticeable relationship between measures of realized and intrinsic predictability in both generated and real-world time series data (with the correlation coefficient being statistically significant at a 5% significance level). The discovered correlation in this research holds significant value for tasks related to evaluating time series complexity and their potential to be accurately predicted. Full article
(This article belongs to the Section Complexity)
Show Figures

Figure 1

Figure 1
<p>The citation network consisting of papers dedicated to forecasting and predictability assessment methods for different objects (time series, network links).</p>
Full article ">Figure 2
<p>The pipeline of predictability correlation analysis.</p>
Full article ">Figure 3
<p>Examples of generated series: (<b>a</b>) only the periodic component, (<b>b</b>) the periodic component and a random walk, (<b>c</b>) the periodic component and randomness, (<b>d</b>) all the components.</p>
Full article ">Figure 4
<p>Example of transforming time series into input vectors with <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Scatter plots obtained by the forecasting models: (<b>a</b>) ARIMA forecast, with measures of MAE and PE, (<b>b</b>) LSTM forecast, with measures of RMSE and SVD entropy, (<b>c</b>) CNN forecast, with measures of RMSE and SVD entropy, (<b>d</b>) XGBoost forecast, with measures of RMSE and SE.</p>
Full article ">Figure 6
<p>Correlation matrix (artificial time series, Pearson correlation coefficient).</p>
Full article ">Figure 7
<p>Correlation matrix (artificial time series, Spearman correlation coefficient).</p>
Full article ">Figure 8
<p>Scatter plots obtained after merging data from all forecasting models: (<b>a</b>) MAE and Sample entropy as measures, (<b>b</b>) RMSE and PE as measures, (<b>c</b>) RMSE and Sample entropy as measures, (<b>d</b>) RMSE and SVD entropy as measures.</p>
Full article ">Figure 9
<p>Correlation matrix (real-world time series, Pearson correlation coefficient).</p>
Full article ">Figure 10
<p>Correlation matrix (real-world time series, Spearman correlation coefficient).</p>
Full article ">Figure 11
<p>Correlation matrices for real-world time series (ARIMA model): (<b>a</b>) Pearson correlation coefficient, (<b>b</b>) Spearman correlation coefficient.</p>
Full article ">Figure 12
<p>Scatter plot for the MAPE–SVD entropy pair obtained by ARIMA prediction model (real-world time series).</p>
Full article ">
22 pages, 2701 KiB  
Article
Bio-Inspired Intelligent Systems: Negotiations between Minimum Manifest Task Entropy and Maximum Latent System Entropy in Changing Environments
by Stephen Fox, Tapio Heikkilä, Eric Halbach and Samuli Soutukorva
Entropy 2023, 25(11), 1541; https://doi.org/10.3390/e25111541 - 14 Nov 2023
Cited by 1 | Viewed by 1398
Abstract
In theoretical physics and theoretical neuroscience, increased intelligence is associated with increased entropy, which entails potential access to an increased number of states that could facilitate adaptive behavior. Potential to access a larger number of states is a latent entropy as it refers [...] Read more.
In theoretical physics and theoretical neuroscience, increased intelligence is associated with increased entropy, which entails potential access to an increased number of states that could facilitate adaptive behavior. Potential to access a larger number of states is a latent entropy as it refers to the number of states that could possibly be accessed, and it is also recognized that functioning needs to be efficient through minimization of manifest entropy. For example, in theoretical physics, the importance of efficiency is recognized through the observation that nature is thrifty in all its actions and through the principle of least action. In this paper, system intelligence is explained as capability to maintain internal stability while adapting to changing environments by minimizing manifest task entropy while maximizing latent system entropy. In addition, it is explained how automated negotiation relates to balancing adaptability and stability; and a mathematical negotiation model is presented that enables balancing of latent system entropy and manifest task entropy in intelligent systems. Furthermore, this first principles analysis of system intelligence is related to everyday challenges in production systems through multiple simulations of the negotiation model. The results indicate that manifest task entropy is minimized when maximization of latent system entropy is used as the criterion for task allocation in the simulated production scenarios. Full article
(This article belongs to the Collection Maximum Entropy and Its Applications)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Requested and bid starting times as Gaussian random variables; (<b>b</b>) Probabilities of being early and late based on the PDF of the tardiness.</p>
Full article ">Figure 2
<p>Layout of the shop floor simulation: four similar lines, eight different machines (marked by edge colour) in a line, and a set of agents (green rectangles—AMRs; blue rhomboids—humans) in their home positions (bottom line). Two agents are moving to tending positions.</p>
Full article ">Figure 3
<p>Capability matrix of the agents: human agents #1, #18, and AMR agents #2–#17.</p>
Full article ">Figure 4
<p>Part of the shop floor from <a href="#entropy-25-01541-f002" class="html-fig">Figure 2</a> later in the simulation. Machine 10 is being serviced by an AMR and Machine 27 has gone idle while waiting for servicing.</p>
Full article ">Figure 5
<p>Machines’ first requests plotted on a timeline.</p>
Full article ">Figure 6
<p>Simulation results with the HIGHPROB allocation method: system entropy and agent tardiness (<b>top</b>); number of idle agents (<b>bottom</b>).</p>
Full article ">Figure 7
<p>Simulation results with the SYSENT allocation method: system entropy and agent tardiness (<b>top</b>); number of idle agents (<b>bottom</b>).</p>
Full article ">Figure 8
<p>Simulation results with the MINCAP allocation method: system entropy and agent tardiness (<b>top</b>); number of idle agents (<b>bottom</b>).</p>
Full article ">Figure 9
<p>Simulation results with the TIMEDIFF allocation method: system entropy and agent tardiness (<b>top</b>); number of idle agents (<b>bottom</b>).</p>
Full article ">Figure 10
<p>Simulation results with the CLOSEST allocation method: system entropy and agent tardiness (<b>top</b>); number of idle agents (<b>bottom</b>).</p>
Full article ">
11 pages, 2112 KiB  
Article
A Model for Material Metrics in Thermoelectric Thomson Coolers
by Mona Zebarjadi and Omid Akbari
Entropy 2023, 25(11), 1540; https://doi.org/10.3390/e25111540 - 14 Nov 2023
Cited by 3 | Viewed by 1485
Abstract
Thomson heat absorption corresponding to changes in the Seebeck coefficient with respect to temperature enables the design of thermoelectric coolers wherein Thomson cooling is the dominant term, i.e., the Thomson coolers. Thomson coolers extend the working range of Peltier coolers to larger temperature [...] Read more.
Thomson heat absorption corresponding to changes in the Seebeck coefficient with respect to temperature enables the design of thermoelectric coolers wherein Thomson cooling is the dominant term, i.e., the Thomson coolers. Thomson coolers extend the working range of Peltier coolers to larger temperature differences and higher electrical currents. The Thomson coefficient is small in most materials. Recently, large Thomson coefficient values have been measured attributed to thermally induced phase change during magnetic and structural phase transitions. The large Thomson coefficient observed can result in the design of highly efficient Thomson coolers. This work analyzes the performance of Thomson coolers analytically and sets the metrics for evaluating the performance of materials as their constituent components. The maximum heat flux when the Thomson coefficient is constant is obtained and the performance is compared to Peltier coolers. Three dimensionless parameters are introduced which determine the performance of the Thomson coolers and can be used to analyze the coefficient of performance, the maximum heat flux, and the maximum temperature difference of a Thomson cooler. Full article
(This article belongs to the Special Issue Heat Transfer in Thermoelectric Modules)
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of heat balance in a Thomson/Peltier cooler.</p>
Full article ">Figure 2
<p>Normalized optimum heat flux at the cold side (<math display="inline"><semantics> <mrow> <msub> <mrow> <mi mathvariant="bold-italic">q</mi> </mrow> <mrow> <mi mathvariant="bold-italic">o</mi> <mi mathvariant="bold-italic">p</mi> <mi mathvariant="bold-italic">t</mi> </mrow> </msub> <mo>/</mo> <mfrac> <mrow> <mi mathvariant="bold-italic">κ</mi> <mi mathvariant="bold-sans-serif">Δ</mi> <mi mathvariant="bold-italic">T</mi> </mrow> <mrow> <mi mathvariant="bold-italic">L</mi> </mrow> </mfrac> <mo>)</mo> </mrow> </semantics></math> plotted for <math display="inline"><semantics> <mrow> <msub> <mrow> <mi mathvariant="bold-italic">T</mi> </mrow> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> </msub> <mo mathvariant="bold">=</mo> <mn mathvariant="bold">300</mn> <mo> </mo> <mi mathvariant="bold">K</mi> </mrow> </semantics></math>. Solid lines are for Peltier coolers (Equation (13), <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>). zT values are shown for each series of curves with the same color. Dashed lines are Thomson coolers for <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> </mrow> </semantics></math> dotted dash for <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> and dotted lines for <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>. In each series, we keep the zT value like the Peltier coolers and we increase the <math display="inline"><semantics> <mrow> <mi mathvariant="bold-italic">α</mi> </mrow> </semantics></math> ratio.</p>
Full article ">Figure 3
<p>Numerical results of heat flux optimization. Normalized optimum heat flux at cold side (<math display="inline"><semantics> <mrow> <msub> <mrow> <mi mathvariant="bold-italic">q</mi> </mrow> <mrow> <mi mathvariant="bold-italic">o</mi> <mi mathvariant="bold-italic">p</mi> <mi mathvariant="bold-italic">t</mi> </mrow> </msub> <mo>/</mo> <mfrac> <mrow> <mi mathvariant="bold-italic">κ</mi> <mi mathvariant="bold-sans-serif">Δ</mi> <mi mathvariant="bold-italic">T</mi> </mrow> <mrow> <mi mathvariant="bold-italic">L</mi> </mrow> </mfrac> <mo>)</mo> </mrow> </semantics></math> plotted for <math display="inline"><semantics> <mrow> <msub> <mrow> <mi mathvariant="bold-italic">T</mi> </mrow> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> </msub> <mo mathvariant="bold">=</mo> <mn mathvariant="bold">300</mn> <mo> </mo> <mi mathvariant="bold">K</mi> </mrow> </semantics></math>. Solid lines are for Peltier coolers (Equation (13), <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>). zT values are shown for each series of curves with the same color. Dashed lines are Thomson coolers for <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> </mrow> </semantics></math> dotted dash for <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> and dotted lines for <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>. In each series, we keep the zT value like the Peltier coolers and we increase the <math display="inline"><semantics> <mrow> <mi mathvariant="bold-italic">α</mi> </mrow> </semantics></math> ratio.</p>
Full article ">Figure 4
<p>Numerical results of COP optimization plotted for <math display="inline"><semantics> <mrow> <msub> <mrow> <mi mathvariant="bold-italic">T</mi> </mrow> <mrow> <mi mathvariant="bold-italic">c</mi> </mrow> </msub> <mo mathvariant="bold">=</mo> <mn mathvariant="bold">300</mn> <mo> </mo> <mi mathvariant="bold">K</mi> </mrow> </semantics></math>. Solid lines are for Peltier coolers. ZT values are shown for each series of curves and with the same color. Dashed lines are Thomson coolers. In each series, we kept the zT value the same as that of the Peltier coolers and we increased the <math display="inline"><semantics> <mrow> <mi mathvariant="bold-italic">α</mi> </mrow> </semantics></math> ratio.</p>
Full article ">
19 pages, 2575 KiB  
Article
A Multi-Featured Factor Analysis and Dynamic Window Rectification Method for Remaining Useful Life Prognosis of Rolling Bearings
by Cheng Peng, Yuanyuan Zhao, Changyun Li, Zhaohui Tang and Weihua Gui
Entropy 2023, 25(11), 1539; https://doi.org/10.3390/e25111539 - 13 Nov 2023
Cited by 1 | Viewed by 1383
Abstract
Currently, the research on the predictions of remaining useful life (RUL) of rotating machinery mainly focuses on the process of health indicator (HI) construction and the determination of the first prediction time (FPT). In complex industrial environments, the influence of environmental factors such [...] Read more.
Currently, the research on the predictions of remaining useful life (RUL) of rotating machinery mainly focuses on the process of health indicator (HI) construction and the determination of the first prediction time (FPT). In complex industrial environments, the influence of environmental factors such as noise may affect the accuracy of RUL predictions. Accurately estimating the remaining useful life of bearings plays a vital role in reducing costly unscheduled maintenance and increasing machine reliability. To overcome these problems, a health indicator construction and prediction method based on multi-featured factor analysis are proposed. Compared with the existing methods, the advantages of this method are the use of factor analysis, to mine hidden common factors from multiple features, and the construction of health indicators based on the maximization of variance contribution after rotation. A dynamic window rectification method is designed to reduce and weaken the stochastic fluctuations in the health indicators. The first prediction time was determined by the cumulative gradient change in the trajectory of the HI. A regression-based adaptive prediction model is used to learn the evolutionary trend of the HI and estimate the RUL of the bearings. The experimental results of two publicly available bearing datasets show the advantages of the method. Full article
Show Figures

Figure 1

Figure 1
<p>Bearing degradation trajectory.</p>
Full article ">Figure 2
<p>Framework of prediction method in this paper.</p>
Full article ">Figure 3
<p>Performance of the proposed method on different bearing datasets. (<b>a</b>) IMS bearing dataset T2-B1. (<b>b</b>) Detailed drawing of T2-B1. (<b>c</b>) PHM 2012 bearing dataset of Bearing2-2. (<b>d</b>) Detailed drawing of Bearing2-2.</p>
Full article ">Figure 4
<p>Dynamic window rectification results.</p>
Full article ">Figure 5
<p>Introduction to the experimental platform.</p>
Full article ">Figure 6
<p>The heat map of feature and factor relationship.</p>
Full article ">Figure 7
<p>The variance contribution of the common factor.</p>
Full article ">Figure 8
<p>Health indicators for different bearings.</p>
Full article ">Figure 9
<p>Bearing1-1 elbow point detection.</p>
Full article ">Figure 10
<p>IMS bearing dataset correction results. (<b>a</b>) Bearing1. (<b>b</b>) Bearing2. (<b>c</b>) Bearing3. (<b>d</b>) Bearing4.</p>
Full article ">Figure 11
<p>RUL prediction process of bearing3. (<b>a</b>) RUL predicted trajectory at the time 15,000 s. (<b>b</b>) RUL predicted trajectory at the 15,200 s. (<b>c</b>) RUL predicted trajectory at the time 15,200 s.</p>
Full article ">Figure 12
<p>Comparison with other methods.</p>
Full article ">
36 pages, 2677 KiB  
Article
Dimensionless Groups by Entropic Similarity: II—Wave Phenomena and Information-Theoretic Flow Regimes
by Robert K. Niven
Entropy 2023, 25(11), 1538; https://doi.org/10.3390/e25111538 - 11 Nov 2023
Cited by 1 | Viewed by 1249
Abstract
The aim of this study is to explore the insights of the information-theoretic definition of similarity for a multitude of flow systems with wave propagation. This provides dimensionless groups of the form Πinfo=U/c, where U is a [...] Read more.
The aim of this study is to explore the insights of the information-theoretic definition of similarity for a multitude of flow systems with wave propagation. This provides dimensionless groups of the form Πinfo=U/c, where U is a characteristic flow velocity and c is a signal velocity or wave celerity, to distinguish different information-theoretic flow regimes. Traditionally, dimensionless groups in science and engineering are defined by geometric similarity, based on ratios of length scales; kinematic similarity, based on ratios of velocities or accelerations; and dynamic similarity, based on ratios of forces. In Part I, an additional category of entropic similarity was proposed based on ratios of (i) entropy production terms; (ii) entropy flow rates or fluxes; or (iii) information flow rates or fluxes. In this Part II, the information-theoretic definition is applied to a number of flow systems with wave phenomena, including acoustic waves, blast waves, pressure waves, surface or internal gravity waves, capillary waves, inertial waves and electromagnetic waves. These are used to define the appropriate Mach, Euler, Froude, Rossby or other dimensionless number(s)—including new groups for internal gravity, inertial and electromagnetic waves—to classify their flow regimes. For flows with wave dispersion, the coexistence of different celerities for individual waves and wave groups—each with a distinct information-theoretic group—is shown to imply the existence of more than two information-theoretic flow regimes, including for some acoustic wave systems (subsonic/mesosonic/supersonic flow) and most systems with gravity, capillary or inertial waves (subcritical/mesocritical/supercritical flow). For electromagnetic wave systems, the additional vacuum celerity implies the existence of four regimes (subluminal/mesoluminal/transluminal/superluminal flow). In addition, entropic analyses are shown to provide a more complete understanding of frictional behavior and sharp transitions in compressible and open channel flows, as well as the transport of entropy by electromagnetic radiation. The analyses significantly extend the applications of entropic similarity for the analysis of flow systems with wave propagation. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Classification of flow regimes for internal gravity waves of fixed <math display="inline"><semantics> <mi mathvariant="bold-italic">k</mi> </semantics></math>, based on the component-wise phase and group Froude vectors (<a href="#FD50-entropy-25-01538" class="html-disp-formula">50</a>) relative to the unit circle (drawn for <math display="inline"><semantics> <mrow> <msub> <mi>k</mi> <mi>x</mi> </msub> <mo>,</mo> <msub> <mi>k</mi> <mi>z</mi> </msub> <mo>&gt;</mo> <mn>0</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>u</mi> <mo>¯</mo> </mover> <mo>&gt;</mo> <mover accent="true"> <mi>w</mi> <mo>¯</mo> </mover> <mo>&gt;</mo> <mn>0</mn> </mrow> </semantics></math>, giving the principal branch <math display="inline"><semantics> <mrow> <mi>θ</mi> <mo>∈</mo> <mo>[</mo> <mn>0</mn> <mo>,</mo> <mstyle scriptlevel="0" displaystyle="false"> <mfrac> <mi>π</mi> <mn>2</mn> </mfrac> </mstyle> <mo>]</mo> </mrow> </semantics></math>, under the constraint <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mrow> <mi>F</mi> <mi>r</mi> </mrow> <mo>˜</mo> </mover> <mrow> <msub> <mi mathvariant="bold-italic">c</mi> <mi>int</mi> </msub> <mo>,</mo> <mi>z</mi> </mrow> </msub> <mo>=</mo> <mo>−</mo> <msubsup> <mover accent="true"> <mrow> <mi>F</mi> <mi>r</mi> </mrow> <mo>˜</mo> </mover> <mrow> <msub> <mi mathvariant="bold-italic">c</mi> <mi>int</mi> </msub> <mo>,</mo> <mi>z</mi> </mrow> <mo form="prefix">group</mo> </msubsup> </mrow> </semantics></math>).</p>
Full article ">Figure 2
<p>Classification of flow regimes for Rossby waves of fixed wavenumber and direction, based on the component-wise phase and group Froude vectors in Equation (<a href="#FD60-entropy-25-01538" class="html-disp-formula">60</a>) relative to the unit sphere (drawn for <math display="inline"><semantics> <mrow> <msub> <mi>k</mi> <mi>x</mi> </msub> <mo>,</mo> <msub> <mi>k</mi> <mi>y</mi> </msub> <mo>,</mo> <msub> <mi>k</mi> <mi>z</mi> </msub> <mo>&gt;</mo> <mn>0</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>u</mi> <mo>¯</mo> </mover> <mo>&gt;</mo> <mover accent="true"> <mi>w</mi> <mo>¯</mo> </mover> <mo>&gt;</mo> <mn>0</mn> <mo>&gt;</mo> <mover accent="true"> <mi>v</mi> <mo>¯</mo> </mover> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mn>0</mn> </msub> <mo>≪</mo> <msub> <mi>N</mi> <mn>0</mn> </msub> </mrow> </semantics></math>).</p>
Full article ">Figure A1
<p>Dimensionless relations (<a href="#FD74-entropy-25-01538" class="html-disp-formula">A1</a>) and (<a href="#FD25-entropy-25-01538" class="html-disp-formula">25</a>) across a normal shock wave in an inviscid, adiabatic, one-dimensional steady-state flow of compressible dry air.</p>
Full article ">Figure A2
<p>Relations for adiabatic frictional one-dimensional steady-state flow of compressible dry air in a pipe, as functions of <math display="inline"><semantics> <mover accent="true"> <mi>M</mi> <mo stretchy="false">^</mo> </mover> </semantics></math>: (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>d</mi> <mover accent="true"> <mi>M</mi> <mo stretchy="false">^</mo> </mover> <mo>/</mo> <mi>d</mi> <mi>x</mi> </mrow> </semantics></math> (<a href="#FD76-entropy-25-01538" class="html-disp-formula">A3</a>) and <math display="inline"><semantics> <mo>Θ</mo> </semantics></math> (<a href="#FD26-entropy-25-01538" class="html-disp-formula">26</a>); and (<b>b</b>) fluid property ratios (<a href="#FD80-entropy-25-01538" class="html-disp-formula">A7</a>) and (<a href="#FD81-entropy-25-01538" class="html-disp-formula">A8</a>) and the dimensionless entropy production (<a href="#FD26-entropy-25-01538" class="html-disp-formula">26</a>). Note the distinction between the relative specific entropy and the rate of entropy production.</p>
Full article ">Figure A3
<p>Dimensionless water depth <math display="inline"><semantics> <mrow> <mi>y</mi> <mo>/</mo> <mi>B</mi> </mrow> </semantics></math> and dimensionless entropy production <math display="inline"><semantics> <msub> <mover accent="true"> <mo>Π</mo> <mo>˜</mo> </mover> <mo form="prefix">open</mo> </msub> </semantics></math> for the example of gradually-varied open channel flow of water at steady state.</p>
Full article ">Figure A4
<p>Schematic diagrams of the vector wavelength, phase celerity and wavenumber for (<b>a</b>) two-dimensional and (<b>b</b>) three-dimensional waves, showing their resolution into components.</p>
Full article ">Figure A5
<p>Schematic diagrams of the vector and chord definitions of the wavelength and celerity components, for (<b>a</b>) two-dimensional and (<b>b</b>) three-dimensional waves.</p>
Full article ">
16 pages, 1516 KiB  
Article
Robustness and Complexity of Directed and Weighted Metabolic Hypergraphs
by Pietro Traversa, Guilherme Ferraz de Arruda, Alexei Vazquez and Yamir Moreno
Entropy 2023, 25(11), 1537; https://doi.org/10.3390/e25111537 - 11 Nov 2023
Cited by 1 | Viewed by 2121
Abstract
Metabolic networks are probably among the most challenging and important biological networks. Their study provides insight into how biological pathways work and how robust a specific organism is against an environment or therapy. Here, we propose a directed hypergraph with edge-dependent vertex weight [...] Read more.
Metabolic networks are probably among the most challenging and important biological networks. Their study provides insight into how biological pathways work and how robust a specific organism is against an environment or therapy. Here, we propose a directed hypergraph with edge-dependent vertex weight as a novel framework to represent metabolic networks. This hypergraph-based representation captures higher-order interactions among metabolites and reactions, as well as the directionalities of reactions and stoichiometric weights, preserving all essential information. Within this framework, we propose the communicability and the search information as metrics to quantify the robustness and complexity of directed hypergraphs. We explore the implications of network directionality on these measures and illustrate a practical example by applying them to a small-scale E. coli core model. Additionally, we compare the robustness and the complexity of 30 different models of metabolism, connecting structural and biological properties. Our findings show that antibiotic resistance is associated with high structural robustness, while the complexity can distinguish between eukaryotic and prokaryotic organisms. Full article
Show Figures

Figure 1

Figure 1
<p>An example of a metabolic network mapped into a hypergraph with edge-dependent vertex weight. In (<b>a</b>), we present a small network composed of three reactions and five metabolites. The first reaction <math display="inline"><semantics> <msub> <mi>r</mi> <mn>1</mn> </msub> </semantics></math> is reversible and is represented with the double arrow. In (<b>b</b>), we show the corresponding stoichiometry matrix. Reactants are negative and products are positive. Note that we need to split the reversible reaction into two irreversible reactions <math display="inline"><semantics> <msubsup> <mi>r</mi> <mn>1</mn> <mo>+</mo> </msubsup> </semantics></math> and <math display="inline"><semantics> <msubsup> <mi>r</mi> <mn>1</mn> <mo>−</mo> </msubsup> </semantics></math> to write it in matrix form. This stoichiometry matrix is the weighted incidence matrix of the hypergraph with edge-dependent vertex weights shown in (<b>c</b>). For the sake of visualization, only the hyperedge <math display="inline"><semantics> <msubsup> <mi>r</mi> <mn>1</mn> <mo>+</mo> </msubsup> </semantics></math> is shown. The hyperedge <math display="inline"><semantics> <msubsup> <mi>r</mi> <mn>1</mn> <mo>−</mo> </msubsup> </semantics></math> is just the same but with the opposite sign. Note that weights are both positive and negative, meaning that the hypergraph is directed. Indeed, we separate the head and tail of each hyperedge with a dashed line.</p>
Full article ">Figure 2
<p>Access vs. hide information for reactions (<b>a</b>) and metabolites (<b>b</b>). Reactions are colored differently according to the pathway they belong to. Note that the <span class="html-italic">y</span> axis is cut for visualization purposes. Metabolites are divided into compartments; <span class="html-italic">c</span> stands for cytosol compartment and <span class="html-italic">e</span> for extracellular space.</p>
Full article ">Figure 3
<p>Reactions’ average communicability for the e_coli_core model. A simplified Escher map is used as a background to help with the visualization. For a more accurate version of the map, visit [<a href="#B57-entropy-25-01537" class="html-bibr">57</a>].</p>
Full article ">Figure 4
<p>The robustness measured as the natural connectivity <math display="inline"><semantics> <msup> <mover accent="true"> <mi>λ</mi> <mo>¯</mo> </mover> <mi>V</mi> </msup> </semantics></math> of 30 different BiGG models. The organisms resistant to antibiotics are shown in different colors. The models are ordered with increasing robustness.</p>
Full article ">Figure 5
<p>The complexity measured as the average search information <math display="inline"><semantics> <mrow> <msup> <mi>σ</mi> <mi>V</mi> </msup> <mo>=</mo> <mfrac> <msup> <mi>S</mi> <mi>V</mi> </msup> <mrow> <msub> <mo form="prefix">log</mo> <mn>2</mn> </msub> <mi>N</mi> </mrow> </mfrac> </mrow> </semantics></math> of 30 different BiGG models. The models are ordered with increasing complexity, and the y axis is zoomed in for visualization purposes.</p>
Full article ">
19 pages, 8212 KiB  
Article
Distributed Formation Control of Multi-Robot Systems with Path Navigation via Complex Laplacian
by Xiru Wu, Rili Wu, Yuchong Zhang and Jiansheng Peng
Entropy 2023, 25(11), 1536; https://doi.org/10.3390/e25111536 - 11 Nov 2023
Cited by 2 | Viewed by 1836
Abstract
This paper focuses on the formation control of multi-robot systems with leader–follower network structure in directed topology to guide a system composed of multiple mobile robot agents to achieve global path navigation with a desired formation. A distributed linear formation control strategy based [...] Read more.
This paper focuses on the formation control of multi-robot systems with leader–follower network structure in directed topology to guide a system composed of multiple mobile robot agents to achieve global path navigation with a desired formation. A distributed linear formation control strategy based on the complex Laplacian matrix is employed, which enables the robot agents to converge into a similar formation of the desired formation, and the size and orientation of the formation are determined by the positions of two leaders. Additionally, in order to ensure that all robot agents in the formation move at a common velocity, the distributed control approach also includes a velocity consensus component. Based on the realization of similar formation control of a multi-robot system, the path navigation algorithm is combined with it to realize the global navigation of the system as a whole. Furthermore, a controller enabling the scalability of the formation size is introduced to enhance the overall maneuverability of the system in specific scenarios like narrow corridors. The simulation results demonstrate the feasibility of the proposed approach. Full article
(This article belongs to the Special Issue Nonlinear Dynamical Behaviors in Complex Systems)
Show Figures

Figure 1

Figure 1
<p>Multi-robot system communication topology graph.</p>
Full article ">Figure 2
<p>Global navigation schematic of a multi-robot system.</p>
Full article ">Figure 3
<p>Narrow corridor access schematic of a multi-robot system.</p>
Full article ">Figure 4
<p>A formation of the five-agent system: (<b>a</b>) Position trajectories of agents. (<b>b</b>) Evolution of formation errors (ux). (<b>c</b>) Evolution of formation errors (uy). (<b>d</b>) Initial formation. (<b>e</b>) Intermediate formation. (<b>f</b>) Final formation.</p>
Full article ">Figure 5
<p>A formation of the six-agent system: (<b>a</b>) Position trajectories of agents. (<b>b</b>) Evolution of formation errors (ux). (<b>c</b>) Evolution of formation errors (uy). (<b>d</b>) Initial formation. (<b>e</b>) Intermediate formation. (<b>f</b>) Final formation.</p>
Full article ">Figure 6
<p>Similar formation of the five-agent system: (<b>a</b>) Position trajectories of agents. (<b>b</b>) Evolution of formation errors (ux). (<b>c</b>) Evolution of formation errors (uy). (<b>d</b>) Evolution of formation errors (V).</p>
Full article ">Figure 7
<p>Scalable formation of the five-agent system: (<b>a</b>) Position trajectories of agents. (<b>b</b>) Evolution of formation errors (ux). (<b>c</b>) Evolution of formation errors (uy). (<b>d</b>) Evolution of formation errors (V).</p>
Full article ">Figure 7 Cont.
<p>Scalable formation of the five-agent system: (<b>a</b>) Position trajectories of agents. (<b>b</b>) Evolution of formation errors (ux). (<b>c</b>) Evolution of formation errors (uy). (<b>d</b>) Evolution of formation errors (V).</p>
Full article ">Figure 8
<p>Path planning: (<b>a</b>) Initial path planning. (<b>b</b>) Path planning considering the overall radius of agents (R = 5).</p>
Full article ">Figure 9
<p>Global path planning (R = 8): (<b>a</b>) Initial path. (<b>b</b>) Path navigation for the five-agent system. (<b>c</b>) Path navigation for the six-agent system.</p>
Full article ">Figure 10
<p>Global path planning (R = 12): (<b>a</b>) Initial path. (<b>b</b>) Path navigation for the five-agent system. (<b>c</b>) Path navigation for the six-agent system.</p>
Full article ">Figure 11
<p>(<b>a</b>) Simulation of the five-agent system passing through a narrow corridor. (<b>b</b>) Detailed drawing of a narrow corridor. (<b>c</b>) Path navigation for the five-agent system that includes passing narrow corridors.</p>
Full article ">Figure 12
<p>(<b>a</b>) Simulation of the six-agent system passing through a narrow corridor. (<b>b</b>) Detailed drawing of a narrow corridor. (<b>c</b>) Path navigation for the six-agent system that includes passing narrow corridors.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop