{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:02:12Z","timestamp":1753887732489,"version":"3.41.2"},"reference-count":32,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":104,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"2018 Scientific Research Major Project of Higher Educational Institutes of Anhui Province","award":["KJ2018ZD059"],"award-info":[{"award-number":["KJ2018ZD059"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>A graph\u2019s entropy is a functional one, based on both the graph itself and the distribution of probability on its vertex set. In the theory of information, graph entropy has its origins. Hex\u2010derived networks have a variety of important applications in medication store, hardware, and system administration. In this article, we discuss hex\u2010derived network of type 1 and 2, written as HDN\u20091(<jats:italic>n<\/jats:italic>) and HDN\u20092(<jats:italic>n<\/jats:italic>), respectively of order <jats:italic>n<\/jats:italic>. We also compute some degree\u2010based entropies such as Randi\u0107, ABC, and <jats:italic>G<\/jats:italic><jats:italic>A<\/jats:italic> entropy of HDN\u20091(<jats:italic>n<\/jats:italic>) and HDN\u20092(<jats:italic>n<\/jats:italic>).<\/jats:p>","DOI":"10.1155\/2021\/9993504","type":"journal-article","created":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T22:34:02Z","timestamp":1618526042000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["On Computation of Entropy of Hex\u2010Derived Network"],"prefix":"10.1155","volume":"2021","author":[{"given":"Pingping","family":"Song","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9815-7158","authenticated-orcid":false,"given":"Haidar","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Muhammad Ahsan","family":"Binyamin","sequence":"additional","affiliation":[]},{"given":"Bilal","family":"Ali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9620-7692","authenticated-orcid":false,"given":"Jia-Bao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,4,15]]},"reference":[{"key":"e_1_2_8_1_2","doi-asserted-by":"publisher","DOI":"10.1021\/ja01193a005"},{"key":"e_1_2_8_2_2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"volume-title":"Information Theoretic Indices for Characterization of Chemical Structures","year":"1983","author":"Bonchev D.","key":"e_1_2_8_3_2"},{"key":"e_1_2_8_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/bf02477836"},{"key":"e_1_2_8_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/12.46277"},{"key":"e_1_2_8_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-03521-2"},{"key":"e_1_2_8_7_2","doi-asserted-by":"publisher","DOI":"10.30538\/psrp-odam2019.0009"},{"key":"e_1_2_8_8_2","doi-asserted-by":"publisher","DOI":"10.1002\/cem.2785"},{"key":"e_1_2_8_9_2","doi-asserted-by":"publisher","DOI":"10.1021\/ja00856a001"},{"key":"e_1_2_8_10_2","first-page":"225","article-title":"Graphs of extremal weights","volume":"50","author":"Bollob\u00e1s B.","year":"1998","journal-title":"Ars Combinatoria"},{"key":"e_1_2_8_11_2","doi-asserted-by":"publisher","DOI":"10.1021\/ci980039b"},{"volume-title":"An Atom-Bond Connectivity Index: Modelling the Enthalpy of Formation of Alkanes","year":"1998","author":"Estrada E.","key":"e_1_2_8_12_2"},{"key":"e_1_2_8_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10910-009-9520-x"},{"key":"e_1_2_8_14_2","doi-asserted-by":"publisher","DOI":"10.3390\/e16105416"},{"key":"e_1_2_8_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jda.2013.09.002"},{"key":"e_1_2_8_16_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19010094"},{"key":"e_1_2_8_17_2","doi-asserted-by":"publisher","DOI":"10.3390\/math7070612"},{"key":"e_1_2_8_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.03.133"},{"key":"e_1_2_8_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2015.03.046"},{"key":"e_1_2_8_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2007.12.010"},{"key":"e_1_2_8_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12190-016-1027-6"},{"key":"e_1_2_8_22_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5520619"},{"key":"e_1_2_8_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.123073"},{"key":"e_1_2_8_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10955-019-02412-2"},{"key":"e_1_2_8_25_2","doi-asserted-by":"publisher","DOI":"10.1142\/s0218348x19501354"},{"key":"e_1_2_8_26_2","doi-asserted-by":"publisher","DOI":"10.3390\/e14030559"},{"key":"e_1_2_8_27_2","article-title":"Network structure entropy and its application to scale-free networks","volume":"24","author":"Tan Y. J.","year":"2004","journal-title":"Systems Engineering-Theory & Practice"},{"key":"e_1_2_8_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.08.041"},{"volume-title":"Molecular Topology","year":"2001","author":"Diudea M. V.","key":"e_1_2_8_29_2"},{"key":"e_1_2_8_30_2","doi-asserted-by":"publisher","DOI":"10.1063\/1.430994"},{"volume-title":"Hand Book of Applied Algorithms: Solving Scientific, Engineering, and Practical Problems","year":"2007","author":"Nayak A.","key":"e_1_2_8_31_2"},{"volume-title":"Chemical Graph Theory","year":"1992","author":"Trinajstic N.","key":"e_1_2_8_32_2"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/9993504.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/9993504.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/9993504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T21:59:20Z","timestamp":1723240760000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/9993504"}},"subtitle":[],"editor":[{"given":"M. Irfan","family":"Uddin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/9993504"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9993504","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-03-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9993504"}}