-
21
A Robust Multi-Modal Deep Learning-Based Fault Diagnosis Method for PV Systems
Published 2024-01-01Subjects: Get full text
Article -
22
-
23
Physical-layer security transmission method based on spatial modulation with finite alphabet inputs
Published 2015-02-01Subjects: Get full text
Article -
24
Relative information spectra with applications to statistical inference
Published 2024-12-01Subjects: “…information theory…”
Get full text
Article -
25
Informing practice in mathematics through the use of Herrmann’s Whole Brain® theory
Published 2022-08-01Subjects: Get full text
Article -
26
Extended IMD2020: a large‐scale annotated dataset tailored for detecting manipulated images
Published 2021-07-01Get full text
Article -
27
Computational communication for three-dimensional dense coverage in 5G systems:architecture,approach and gain
Published 2017-06-01“…An integrated mobile computational communication architecture for three-dimensional dense coverage in indoor environment was proposed,and the proposed network architecture thus unified the computational electromagnetics,computational information theory and large-scale optimization into computational communication theory.Moreover,the implementation of the architecture was introduced.Specifically,the dense heterogeneous distributed radio access network was served as the wireless radio access network for the proposed computational communication architecture.Furthermore,computational electromagnetics based on channel propagation computing was implemented in parallel using the distributed computation resources.Given the exact channel propagation coefficients,the computational information theory based on channel capacity computation,as well as large-scale optimization based on multiuser network resource allocation were also achieved by the powerful computation resources.The proposed computational communication theory can thus compute the channel capacity and design power allocation scheme directly from propagation environment.…”
Get full text
Article -
28
Some Bounds of Weighted Entropies with Augmented Zagreb Index Edge Weights
Published 2020-01-01“…The graph entropy was proposed by Körner in the year 1973 when he was studying the problem of coding in information theory. The foundation of graph entropy is in information theory, but it was demonstrated to be firmly identified with some established and often examined graph-theoretic ideas. …”
Get full text
Article -
29
Independent Component Analysis Based on Information Bottleneck
Published 2015-01-01“…In the viewpoint of information theory, we attempt to explain the two classical algorithms of ICA by information bottleneck. …”
Get full text
Article -
30
Novel fractional integral inequalities for GA-Cr-convex functions and connections with information systems
Published 2025-02-01“…Due to applicability of mathematical inequalities in control systems, actuarial science, information theory and its utilization in other sciences, several researchers are inclined to prove their refinements and generalizations. …”
Get full text
Article -
31
A Mathematical Bridge between Discretized Gauge Theories in Quantum Physics and Approximate Reasoning in Pairwise Comparisons
Published 2018-01-01“…We describe a mathematical link between aspects of information theory, called pairwise comparisons, and discretized gauge theories. …”
Get full text
Article -
32
Using Entropy to Measure Religious Pluralism
Published 2025-01-01“…Using a “program appeal” score and entropy measures from information theory, the broadcast operator is able to determine if governmental compliance is being met and whether certain programs are problematic. …”
Get full text
Article -
33
Computation of Channel Capacity Based on Self-Concordant Functions
Published 2012-01-01“…The computation of channel capacity is a classical issue in information theory. We prove that algorithms based on self-concordant functions can be used to deal with such issues, especially when constrains are included. …”
Get full text
Article -
34
A Refinement of the Integral Jensen Inequality Pertaining Certain Functions with Applications
Published 2022-01-01“…Also, we present its applications in information theory. At the end of this paper, we give a more general form of the proposed refinement of the Jensen inequality, associated to several functions.…”
Get full text
Article -
35
Cryptographic secrecy of steganographic matrix encoding
Published 2012-06-01“…Based on an information theory model,the cryptographic security of matrix encoding,which can be applied in steganographic codes or wet paper codes,under different attack conditions was studied.The cryptographic security about matrix encoding under the condition of known-cover attack with key equivocation,message equivocation and unicity distance of stego-key was presented.The result that n groups of differential equations could sufficiently recover the share key of matrix encoding under the condition of chosen-stego attack was pointed out.…”
Get full text
Article -
36
On the Differential and the Integral Value of Information
Published 2025-01-01“…A quantitative expression for the value of information within the framework of information theory and of the maximal entropy formulation is discussed. …”
Get full text
Article -
37
Information and Asignification
Published 2014-04-01“…This foundational work on the relationship between asignification and signifying semiologies, and the micropolitical necessity of escaping from meaning in the broadest sense encompassing individuation, double articulation, and limited subjectivation, is contextualised in terms of information theory, in the work of Claude Shannon and Warren Weaver, as well in terms of Roland Barthes’ semiology and suggestive extra-structural conception of signifiers without signifieds or obtuse meaning. …”
Get full text
Article -
38
Distance-assistant node coverage identification model for wireless sensor networks
Published 2010-01-01“…A distance-assistant node coverage identification model was proposed which adopts distance information be-tween the node and its neighbors to identify nodes coverage without using any location information.Theory analysis and simulation results are presented to evaluate the proposed DANCI model.It is shown that in randomly deployed sensor networks,the maximum error between DANCI model and location information-aware strategy is 6.396 0%,and the nodes coverage accuracy improves significantly compared to neighbor number-based scheme and nearest neighbor-based scheme.…”
Get full text
Article -
39
Physical layer abstraction for MIMO MLD
Published 2009-01-01“…Physical layer abstraction aims to evaluate the instantaneous quality of wireless channel.Researches on physical layer abstraction for MIMO system have demonstrated that,EESM algorithm can accurately evaluate channel quality for MIMO system with MMSE detection.However when it comes to MLD,EESM turns invalid.To the question of EESM algorithm,RBIR based physical layer abstraction was proposed from the view of information theory.Simulation results based on WiMAX II DL system show that,the proposed algorithm has improved the accuracy of physical layer abstraction for MIMO system with MLD greatly.…”
Get full text
Article -
40
New Estimates for Csiszár Divergence and Zipf–Mandelbrot Entropy via Jensen–Mercer’s Inequality
Published 2020-01-01“…The idea of this article may further stimulate research on information theory with the help of Jensen–Mercer’s inequality.…”
Get full text
Article