T - Complexity and T - Information Theory – an Executive Summary
نویسنده
چکیده
This paper describes the derivation of the T-Complexity and T-Information Theory from the decomposition of finite strings, based on the duality of strings and variable-length T-Codes. It further outlines its similarity to the string parsing algorithm by Lempel and Ziv. It is intended as a summary of work published mainly by Titchener and Nicolescu. 1 A brief Introduction to T-Codes This paper first gives an introduction to T-Codes and their construction technique, as this is fundamental for the understanding of the T-decomposition algorithm that underpins the T-complexity measure. T-Codes [3, 4, 11] are similar to Huffman codes in that they are codes with variable-length codewords. Depending on the source symbol probabilities, a Huffman code may also be a T-Code. In fact, any T-Code set could theoretically have been constructed as a result of a Huffman code construction algorithm. However, rather than letting the source symbol probabilities determine the length of the codewords and the structure of the decoding tree, T-Codes are constructed with no regard to symbol probabilities. Their construction focuses instead on a recursive tree structure. A T-Code set is constructed as follows: 1. Start with a finite alphabet S (e.g., the binary alphabet, where S = {0, 1}). Every finite alphabet is a (trivial) T-Code set by default, with the letters being primitive codewords. 2. Given a T-Code set, another T-Code set may be derived from it by a process called “T-augmentation”. This involves picking a codeword from the existing T-Code set, which is called the “T-prefix”, and a positive integer called the “T-expansion parameter”. Any T-Code set may thus be derived from an alphabet in a series of n T-augmentations using a
منابع مشابه
T - Complexity and T - Information Theory – an Executive Summary , 2 nd revised version
This paper describes the derivation of the T-complexity and T-information theory from the decomposition of finite strings, based on the duality of strings and variable-length T-codes. It further outlines its similarity to the string parsing algorithm by Lempel and Ziv. In its first version [15], it was intended as a summary of work published mainly by Titchener and Nicolescu. Apart from minor c...
متن کاملA multi agent method for cell formation with uncertain situation, based on information theory
This paper assumes the cell formation problem as a distributed decision network. It proposes an approach based on application and extension of information theory concepts, in order to analyze informational complexity in an agent- based system, due to interdependence between agents. Based on this approach, new quantitative concepts and definitions are proposed in order to measure the amount of t...
متن کاملComparing the executive function and cognitive flexibility and theory of mind in foster and non-foster children
The present study was conducted to compare executive function and cognitive flexibility and theory of mind in foster and non-foster children. The study population included all and non-foster children in Azarshahr city in 2016. The number of participants included 42 people selected using purposeful sampling. The Tower of Hanoi test and reading mind test by eye image (RMET) were used as a measur...
متن کاملTheory of Evolutionary Algorithms 1 Executive Summary
This report documents the talks and discussions at the Dagstuhl Seminar 15211 “Theory of Evolutionary Algorithms”. This seminar, now in its 8th edition, is the main meeting point of the highly active theory of randomized search heuristics subcommunities in Australia, Asia, North America, and Europe. Topics intensively discussed include rigorous runtime analysis and computational complexity theo...
متن کاملA Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کامل