نتایج جستجو برای: entropy code

تعداد نتایج: 231646  

Journal: :Open Syst. Inform. Dynam. 2011
Carlo Cafaro Sonia L'Innocente Cosmo Lupo Stefano Mancini

We study the properties of error correcting codes for noise models in the presence of asymmetries and/or correlations by means of the entanglement fidelity and the code entropy. First, we consider a dephasing Markovian memory channel and characterize the performance of both a repetition code and an error avoiding code (CRC and CDFS, respectively) in terms of the entanglement fidelity. We also c...

2009
Mehdi Kargarian

In this work the topological order at finite temperature in two-dimensional color code is studied. The topological entropy is used to measure the behavior of the topological order. Topological order in color code arises from the colored string-net structures. By imposing the hard constrained limit the exact solution of the entanglement entropy becomes possible. For finite size systems, by risin...

Journal: :Entropy 2017
Tatsuaki Tsuruyama

The field of information science has greatly developed, and applications in various fields have emerged. In this paper, we evaluated the coding system in the theory of Tsallis entropy for transmission of messages and aimed to formulate the channel capacity by maximization of the Tsallis entropy within a given condition of code length. As a result, we obtained a simple relational expression betw...

Journal: :IEEE Trans. Information Theory 2009
Dake He Luis Alfonso Lastras-Montaño En-Hui Yang Ashish Jagmohan Jun Chen

In this paper, the redundancy of both variable and fixed rate Slepian–Wolf coding is considered. Given any jointly memoryless source-side information pair with finite alphabet, the redundancy of variable rate Slepian–Wolf coding of  with decoder only side information depends on both the block length and the decoding block error probability , and is defined as the difference between the minimum...

Journal: :Open Syst. Inform. Dynam. 2004
B. H. Lavenda

PAE cannot be made a basis for either a generalized statistical mechanics or a generalized information theory. Either statistical independence must be waived, or the expression of the averaged conditional probability as the difference between the marginal and joint entropies must be relinquished. The same inequality, relating the PAE to the Rényi entropy, when applied to the mean code length pr...

2011
Shigetaka MAEDA Hideki TOMITA Jun KAWARABAYASHI Tetsuo IGUCHI

We present a novel spectrum unfolding code, Maximum Entropy and Maximum Likelihood Unfolding Code (MEALU), based on the maximum likelihood combined with the maximum entropy method, which can determine a neutron spectrum without requiring an initial guess spectrum. We present the basic theory, limitations and assumptions built into the implementation. The performance is checked through an analys...

2014
J. A. Tenreiro Machado

This paper studies the chromosome information of twenty five species, namely, mammals, fishes, birds, insects, nematodes, fungus, and one plant. A quantifying scheme inspired in the state space representation of dynamical systems is formulated. Based on this algorithm, the information of each chromosome is converted into a bidimensional distribution. The plots are then analyzed and characterize...

2014
Ngoc Thang Vu Tanja Schultz

This paper presents our latest investigations of the jointly trained maximum entropy and recurrent neural network language models for Code-Switching speech. First, we explore extensively the integration of part-of-speech tags and language identifier information in recurrent neural network language models for CodeSwitching. Second, the importance of the maximum entropy model is demonstrated alon...

Journal: :PeerJ PrePrints 2016
Eddie A. Santos Abram Hindle

Developers summarize their changes to code in commit messages. When a message seems “unusual”, however, this puts doubt into the quality of the code contained in the commit. We trained n-gram language models and used cross-entropy as an indicator of commit message “unusualness” of over 120 000 commits from open source projects. Build statuses collected from Travis-CI were used as a proxy for co...

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید