Showing 21 - 40 results of 111 for search '"information theory"', query time: 0.06s Refine Results
  1. 21
  2. 22

    A Practical Approach to Compiler Construction / by Watson, Des

    Published 2017
    Subjects:
    View in OPAC
    eBook
  3. 23
  4. 24

    Relative information spectra with applications to statistical inference by Sergio Verdú

    Published 2024-12-01
    Subjects: “…information theory…”
    Get full text
    Article
  5. 25
  6. 26
  7. 27

    Computational communication for three-dimensional dense coverage in 5G systems:architecture,approach and gain by Jinkun CHENG, Wei CHEN, Yuanming SHI

    Published 2017-06-01
    “…An integrated mobile computational communication architecture for three-dimensional dense coverage in indoor environment was proposed,and the proposed network architecture thus unified the computational electromagnetics,computational information theory and large-scale optimization into computational communication theory.Moreover,the implementation of the architecture was introduced.Specifically,the dense heterogeneous distributed radio access network was served as the wireless radio access network for the proposed computational communication architecture.Furthermore,computational electromagnetics based on channel propagation computing was implemented in parallel using the distributed computation resources.Given the exact channel propagation coefficients,the computational information theory based on channel capacity computation,as well as large-scale optimization based on multiuser network resource allocation were also achieved by the powerful computation resources.The proposed computational communication theory can thus compute the channel capacity and design power allocation scheme directly from propagation environment.…”
    Get full text
    Article
  8. 28

    Some Bounds of Weighted Entropies with Augmented Zagreb Index Edge Weights by Yujie Huang, Hafiz Mutee-ur-Rehman, Saima Nazeer, Deeba Afzal, Xiaoli Qiang

    Published 2020-01-01
    “…The graph entropy was proposed by Körner in the year 1973 when he was studying the problem of coding in information theory. The foundation of graph entropy is in information theory, but it was demonstrated to be firmly identified with some established and often examined graph-theoretic ideas. …”
    Get full text
    Article
  9. 29

    Independent Component Analysis Based on Information Bottleneck by Qiao Ke, Jiangshe Zhang, H. M. Srivastava, Wei Wei, Guang-Sheng Chen

    Published 2015-01-01
    “…In the viewpoint of information theory, we attempt to explain the two classical algorithms of ICA by information bottleneck. …”
    Get full text
    Article
  10. 30

    Novel fractional integral inequalities for GA-Cr-convex functions and connections with information systems by Asfand Fahad, Zammad Ali, Shigeru Furuichi, Yuanheng Wang

    Published 2025-02-01
    “…Due to applicability of mathematical inequalities in control systems, actuarial science, information theory and its utilization in other sciences, several researchers are inclined to prove their refinements and generalizations. …”
    Get full text
    Article
  11. 31

    A Mathematical Bridge between Discretized Gauge Theories in Quantum Physics and Approximate Reasoning in Pairwise Comparisons by Jean-Pierre Magnot

    Published 2018-01-01
    “…We describe a mathematical link between aspects of information theory, called pairwise comparisons, and discretized gauge theories. …”
    Get full text
    Article
  12. 32

    Using Entropy to Measure Religious Pluralism by George Sturm

    Published 2025-01-01
    “…Using a “program appeal” score and entropy measures from information theory, the broadcast operator is able to determine if governmental compliance is being met and whether certain programs are problematic. …”
    Get full text
    Article
  13. 33

    Computation of Channel Capacity Based on Self-Concordant Functions by Da-gang Tian, Yi-qun Huang

    Published 2012-01-01
    “…The computation of channel capacity is a classical issue in information theory. We prove that algorithms based on self-concordant functions can be used to deal with such issues, especially when constrains are included. …”
    Get full text
    Article
  14. 34

    A Refinement of the Integral Jensen Inequality Pertaining Certain Functions with Applications by Zaid Mohammed Mohammed Mahdi Sayed, Muhammad Adil Khan, Shahid Khan, Josip Pečarić

    Published 2022-01-01
    “…Also, we present its applications in information theory. At the end of this paper, we give a more general form of the proposed refinement of the Jensen inequality, associated to several functions.…”
    Get full text
    Article
  15. 35

    Cryptographic secrecy of steganographic matrix encoding by Jia-yong CHEN, Jiu-fen LIU, Yue-fei ZHU, Wei-ming ZHANG

    Published 2012-06-01
    “…Based on an information theory model,the cryptographic security of matrix encoding,which can be applied in steganographic codes or wet paper codes,under different attack conditions was studied.The cryptographic security about matrix encoding under the condition of known-cover attack with key equivocation,message equivocation and unicity distance of stego-key was presented.The result that n groups of differential equations could sufficiently recover the share key of matrix encoding under the condition of chosen-stego attack was pointed out.…”
    Get full text
    Article
  16. 36

    On the Differential and the Integral Value of Information by Raphael D. Levine

    Published 2025-01-01
    “…A quantitative expression for the value of information within the framework of information theory and of the maximal entropy formulation is discussed. …”
    Get full text
    Article
  17. 37

    Information and Asignification by Gary Genosko

    Published 2014-04-01
    “…This foundational work on the relationship between asignification and signifying semiologies, and the micropolitical necessity of escaping from meaning in the broadest sense encompassing individuation, double articulation, and limited subjectivation, is contextualised in terms of information theory, in the work of Claude Shannon and Warren Weaver, as well in terms of Roland Barthes’ semiology and suggestive extra-structural conception of signifiers without signifieds or obtuse meaning. …”
    Get full text
    Article
  18. 38

    Distance-assistant node coverage identification model for wireless sensor networks by FAN Gao-juan1, SUN Li-juan1, WANG Ru-chuan1, HUANG Hai-ping1

    Published 2010-01-01
    “…A distance-assistant node coverage identification model was proposed which adopts distance information be-tween the node and its neighbors to identify nodes coverage without using any location information.Theory analysis and simulation results are presented to evaluate the proposed DANCI model.It is shown that in randomly deployed sensor networks,the maximum error between DANCI model and location information-aware strategy is 6.396 0%,and the nodes coverage accuracy improves significantly compared to neighbor number-based scheme and nearest neighbor-based scheme.…”
    Get full text
    Article
  19. 39

    Physical layer abstraction for MIMO MLD by ZHANG Jin-bao1, ZHENG Hong-ming2, TAN Zhen-hui1, XIONG Lei1

    Published 2009-01-01
    “…Physical layer abstraction aims to evaluate the instantaneous quality of wireless channel.Researches on physical layer abstraction for MIMO system have demonstrated that,EESM algorithm can accurately evaluate channel quality for MIMO system with MMSE detection.However when it comes to MLD,EESM turns invalid.To the question of EESM algorithm,RBIR based physical layer abstraction was proposed from the view of information theory.Simulation results based on WiMAX II DL system show that,the proposed algorithm has improved the accuracy of physical layer abstraction for MIMO system with MLD greatly.…”
    Get full text
    Article
  20. 40

    New Estimates for Csiszár Divergence and Zipf–Mandelbrot Entropy via Jensen–Mercer’s Inequality by Muhammad Adil Khan, Zakir Husain, Yu-Ming Chu

    Published 2020-01-01
    “…The idea of this article may further stimulate research on information theory with the help of Jensen–Mercer’s inequality.…”
    Get full text
    Article