Search results for "Computer Science - Information Theory"

showing 10 items of 25 documents

Extropy: Complementary Dual of Entropy

2015

This article provides a completion to theories of information based on entropy, resolving a longstanding question in its axiomatization as proposed by Shannon and pursued by Jaynes. We show that Shannon's entropy function has a complementary dual function which we call "extropy." The entropy and the extropy of a binary distribution are identical. However, the measure bifurcates into a pair of distinct measures for any quantity that is not merely an event indicator. As with entropy, the maximum extropy distribution is also the uniform distribution, and both measures are invariant with respect to permutations of their mass functions. However, they behave quite differently in their assessments…

Bregman divergenceFOS: Computer and information sciencesStatistics and ProbabilitySettore MAT/06 - Probabilita' E Statistica MatematicaKullback–Leibler divergenceComputer Science - Information TheoryGeneral MathematicsFOS: Physical sciencesBinary numberMathematics - Statistics TheoryStatistics Theory (math.ST)Kullback–Leibler divergenceBregman divergenceproper scoring rulesGini index of heterogeneityDifferential entropyBinary entropy functionFOS: MathematicsEntropy (information theory)Statistical physicsDual functionAxiomMathematicsdifferential and relative entropy/extropy Kullback- Leibler divergence Bregman divergence duality proper scoring rules Gini index of heterogeneity repeat rate.Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniDifferential and relative entropy/extropyInformation Theory (cs.IT)Probability (math.PR)repeat ratePhysics - Data Analysis Statistics and ProbabilitydualityStatistics Probability and UncertaintySettore SECS-S/01 - StatisticaMathematics - ProbabilityData Analysis Statistics and Probability (physics.data-an)Statistical Science
researchProduct

Decoding algorithm for HL-codes and performance of the DHH-cryptosystem -- a candidate for post-quantum cryptography

2023

We give a decoding algorithm for a class of error-correcting codes, which can be used in the DHH-cryptosystem, which is a candidate for post-quantum cryptography, since it is of McEliece type. Furthermore, we implement the encryption and decryption algorithms for this cryptosystem and investigate its performance.

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer Science - Information TheoryInformation Theory (cs.IT)81P94 94A60 94B35Cryptography and Security (cs.CR)
researchProduct

End-to-end Optimized Image Compression

2016

We describe an image compression method, consisting of a nonlinear analysis transformation, a uniform quantizer, and a nonlinear synthesis transformation. The transforms are constructed in three successive stages of convolutional linear filters and nonlinear activation functions. Unlike most convolutional neural networks, the joint nonlinearity is chosen to implement a form of local gain control, inspired by those used to model biological neurons. Using a variant of stochastic gradient descent, we jointly optimize the entire model for rate-distortion performance over a database of training images, introducing a continuous proxy for the discontinuous loss function arising from the quantizer.…

FOS: Computer and information sciencesComputer Science - Information TheoryComputer Vision and Pattern Recognition (cs.CV)Information Theory (cs.IT)Computer Science - Computer Vision and Pattern RecognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONData_CODINGANDINFORMATIONTHEORY
researchProduct

Nash codes for noisy channels

2012

This paper studies the stability of communication protocols that deal with transmission errors. We consider a coordination game between an informed sender and an uninformed decision maker, the receiver, who communicate over a noisy channel. The sender's strategy, called a code, maps states of nature to signals. The receiver's best response is to decode the received channel output as the state with highest expected receiver payoff. Given this decoding, an equilibrium or "Nash code" results if the sender encodes every state as prescribed. We show two theorems that give sufficient conditions for Nash codes. First, a receiver-optimal code defines a Nash code. A second, more surprising observati…

FOS: Computer and information sciencesComputer Science::Computer Science and Game TheoryTheoretical computer scienceComputer scienceInformation Theory (cs.IT)Computer Science - Information TheoryStochastic gamejel:C72jel:D82Stability (learning theory)Data_CODINGANDINFORMATIONTHEORYManagement Science and Operations Researchsender-receiver game communication noisy channel91A28Computer Science ApplicationsComputer Science - Computer Science and Game TheoryBest responseCode (cryptography)Coordination gameQA MathematicsDecoding methodsCommunication channelComputer Science and Game Theory (cs.GT)Computer Science::Information Theory
researchProduct

Low-Power Wide-Area Networks for Sustainable IoT

2019

Low-power wide-area (LPWA) networks are attracting extensive attention because of their abilities to offer low-cost and massive connectivity to Internet of Things (IoT) devices distributed over wide geographical areas. This article provides a brief overview on the existing LPWA technologies and useful insights to aid the large-scale deployment of LPWA networks. Particularly, we first review the currently competing candidates of LPWA networks, such as narrowband IoT (NB-IoT) and long range (LoRa), in terms of technical fundamentals and large-scale deployment potential. Then we present two implementation examples on LPWA networks. By analyzing the field-test results, we identify several chall…

FOS: Computer and information sciencesComputer scienceComputer Science - Information Theory0805 Distributed Computing02 engineering and technologylaw.inventionComputer Science - Networking and Internet ArchitectureBluetoothGSMlaw1005 Communications Technologies0202 electrical engineering electronic engineering information engineeringBandwidth (computing)Resource managementElectrical and Electronic EngineeringNetworking and Internet Architecture (cs.NI)business.industryInformation Theory (cs.IT)020206 networking & telecommunicationsComputer Science ApplicationsPower (physics)0906 Electrical and Electronic EngineeringWide areaSoftware deploymentNetworking & TelecommunicationsTelecommunicationsbusinessInternet of Things
researchProduct

Investigating Low Level Protocols for Wireless Body Sensor Networks

2016

The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropria…

FOS: Computer and information sciencesComputer scienceComputer Science - Information TheoryTime division multiple accessAccess control[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Body area network0202 electrical engineering electronic engineering information engineeringWirelessProtocol (science)business.industryInformation Theory (cs.IT)Quality of service020208 electrical & electronic engineeringComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science - Distributed Parallel and Cluster Computing[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Scalability[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Distributed Parallel and Cluster Computing (cs.DC)[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer network
researchProduct

Parity Oblivious d-Level Random Access Codes and Class of Noncontextuality Inequalities

2016

One of the fundamental results in quantum foundations is the Kochen-Specker no-go theorem. For the quantum theory, the no-go theorem excludes the possibility of a class of hidden variable models where value attribution is context independent. Recently, the notion of contextuality has been generalized for different operational procedures and it has been shown that preparation contextuality of mixed quantum states can be a useful resource in an information-processing task called parity-oblivious multiplexing. Here, we introduce a new class of information processing tasks, namely d-level parity oblivious random access codes and obtain bounds on the success probabilities of performing such task…

FOS: Computer and information sciencesExistential quantificationComputer Science - Information TheoryFOS: Physical sciences01 natural sciences010305 fluids & plasmasTheoretical Computer ScienceQuantum state0103 physical sciencesElectrical and Electronic Engineering010306 general physicsQuantumMathematicsQuantum computerDiscrete mathematicsQuantum PhysicsInformation Theory (cs.IT)Statistical and Nonlinear PhysicsParity (physics)Electronic Optical and Magnetic MaterialsKochen–Specker theoremModeling and SimulationSignal ProcessingOnticQuantum Physics (quant-ph)Random access
researchProduct

Fractional generalized cumulative entropy and its dynamic version

2021

Following the theory of information measures based on the cumulative distribution function, we propose the fractional generalized cumulative entropy, and its dynamic version. These entropies are particularly suitable to deal with distributions satisfying the proportional reversed hazard model. We study the connection with fractional integrals, and some bounds and comparisons based on stochastic orderings, that allow to show that the proposed measure is actually a variability measure. The investigation also involves various notions of reliability theory, since the considered dynamic measure is a suitable extension of the mean inactivity time. We also introduce the empirical generalized fract…

FOS: Computer and information sciencesExponential distributionComputer Science - Information TheoryMathematics - Statistics TheoryStatistics Theory (math.ST)01 natural sciencesMeasure (mathematics)010305 fluids & plasmas0103 physical sciencesFOS: MathematicsApplied mathematicsAlmost surelyCumulative entropy; Fractional calculus; Stochastic orderings; EstimationEntropy (energy dispersal)010306 general physicsStochastic orderingsMathematicsCentral limit theoremNumerical AnalysisInformation Theory (cs.IT)Applied MathematicsCumulative distribution functionProbability (math.PR)Fractional calculusEmpirical measureFractional calculusModeling and SimulationEstimationCumulative entropyMathematics - ProbabilityCommunications in Nonlinear Science and Numerical Simulation
researchProduct

Multiscale analysis of information dynamics for linear multivariate processes.

2016

In the study of complex physical and physiological systems represented by multivariate time series, an issue of great interest is the description of the system dynamics over a range of different temporal scales. While information-theoretic approaches to the multiscale analysis of complex dynamics are being increasingly used, the theoretical properties of the applied measures are poorly understood. This study introduces for the first time a framework for the analytical computation of information dynamics for linear multivariate stochastic processes explored at different time scales. After showing that the multiscale processing of a vector autoregressive (VAR) process introduces a moving aver…

FOS: Computer and information sciencesInformation transferMultivariate statisticsMultivariate analysisComputer scienceComputer Science - Information Theory0206 medical engineeringStochastic ProcesseBiomedical EngineeringFOS: Physical sciencesInformation Storage and RetrievalHealth Informatics02 engineering and technology01 natural sciencesEntropy (classical thermodynamics)Moving average0103 physical sciencesEntropy (information theory)Computer SimulationStatistical physicsEntropy (energy dispersal)Time series010306 general physicsEntropy (arrow of time)Multivariate Analysi1707Stochastic ProcessesEntropy (statistical thermodynamics)Stochastic processInformation Theory (cs.IT)Probability and statisticsModels Theoretical020601 biomedical engineeringComplex dynamicsAutoregressive modelPhysics - Data Analysis Statistics and ProbabilitySignal ProcessingSettore ING-INF/06 - Bioingegneria Elettronica E InformaticaMultivariate AnalysisData Analysis Statistics and Probability (physics.data-an)Entropy (order and disorder)Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual International Conference
researchProduct

The rightmost equal-cost position problem.

2013

LZ77-based compression schemes compress the input text by replacing factors in the text with an encoded reference to a previous occurrence formed by the couple (length, offset). For a given factor, the smallest is the offset, the smallest is the resulting compression ratio. This is optimally achieved by using the rightmost occurrence of a factor in the previous text. Given a cost function, for instance the minimum number of bits used to represent an integer, we define the Rightmost Equal-Cost Position (REP) problem as the problem of finding one of the occurrences of a factor whose cost is equal to the cost of the rightmost one. We present the Multi-Layer Suffix Tree data structure that, for…

FOS: Computer and information sciencesOffset (computer science)Computer scienceSuffix treeComputer Science - Information Theorylaw.inventionCombinatoricslawLog-log plotComputer Science - Data Structures and AlgorithmsCompression schemetext compressiondictionary text compressionData Structures and Algorithms (cs.DS)LZ77 compressiondata compressionLossless compressionfull text indexSuffix Tree Data StructuresSettore INF/01 - InformaticaInformation Theory (cs.IT)Data structurePrefixCompression ratioCompression scheme; Constant time; Suffix Tree Data StructuresAlgorithmData compressionConstant time
researchProduct