Assessing causal interaction in human brain using conditional mutual information and transfer entropy
نویسندگان
چکیده
منابع مشابه
Ergodic decomposition of excess entropy and conditional mutual information∗
The article discusses excess entropy defined as mutual information between the past and future of a stationary process. The central result is an ergodic decomposition: Excess entropy is the sum of self-information of shift-invariant σ-field and the average of excess entropies for the ergodic components of the process. The result is derived using generalized conditional mutual information for fi...
متن کاملLecture 2 : Source coding , Conditional Entropy , Mutual Information
In some cases,the Shannon code does not perform optimally. Consider a Bernoulli random variable X with parameter 0.0001. An optimal encoding requires only one bit to encode the value of X. The Shannon code would encode 0 by 1 bit and encode 1 by log 104 bits. This is good on average but bad in the worst case. We can also compare the Shannon code to the Huffman code. The Huffman code always has ...
متن کاملRényi information transfer: Partial rényi transfer entropy and partial rényi mutual information
Shannon and Rényi information theory have been applied to coupling estimation in complex systems using time series of their dynamical states. By analysing how information is transferred between constituent parts of a complex system, it is possible to infer the coupling parameters of the system. To this end, we introduce the partial Rényi transfer entropy and we give an alternative derivation of...
متن کاملDirected Information and Conditional Mutual Information
We study directed information in Bayesian networks and related structures. Mutual information is split into directed information and residual information. Some basic equations for directed information and residual information are determined.
متن کاملPrivate Mutual Authentication and Conditional Oblivious Transfer
A bi-directional Private Authentication, or Unlinkable Secret Handshake, allows two parties to authenticate each other as certified by given certification authorities (i.e. affiliated with given groups), in a mutually private way, in the sense that the protocol leaks no information about either participant to a party which does not satisfy that participant’s authentication policy. In particular...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Frontiers in Neuroscience
سال: 2010
ISSN: 1662-453X
DOI: 10.3389/conf.fnins.2010.06.00062