نتایج جستجو برای: informational entropy
تعداد نتایج: 76318 فیلتر نتایج به سال:
In secret quantum communications the best eavesdropping attacks on quantum cryptography are based on imperfect cloning machines. The incoherent attack, based on quantum cloning, is the most common eavesdropping strategy. Using a probe, the eavesdropper imperfectly clones the sender’s quantum state which keeps one copy and sends the other. The physically allowed transformations of Eve’s quantum ...
Attribute reduction of rough set theory underlies knowledge acquisition and has two hierarchical types (classification-based class-specific attribute reducts) perspectives from algebra information theory; thus, there are four combined modes in total. Informational reducts fundamental but lacking thus investigated by correspondingly constructing measures. First, three measures (i.e., entropy, co...
This work is a generalization of the López-Ruiz, Mancini and Calbet (LMC); and Shiner, 1 Davison and Landsberg (SDL) complexity measures, considering that the state of a system or process 2 is represented by a dynamical variable during a certain time interval. As the two complexity 3 measures are based on the calculation of informational entropy, an equivalent information source 4 is defined an...
This review provides a comprehensive understanding of regularization theory from different perspectives, emphasizing smoothness and simplicity principles. Using the tools of operator theory and Fourier analysis, it is shown that the solution of the classical Tikhonov regularization problem can be derived from the regularized functional defined by a linear differential (integral) operator in the...
A sequence-to-structure library has been created based on the complete PDB database. The tetrapeptide was selected as a unit representing a well-defined structural motif. Seven structural forms were introduced for structure classification. The early-stage folding conformations were used as the objects for structure analysis and classification. The degree of determinability was estimated for the...
In this work, arithmetic distribution matching (ADM) is presented. ADM invertibly transforms a discrete memoryless source (DMS) into a target DMS. ADM can be used for probabilistic shaping and for rate adaption. Opposed to existing algorithms for distribution matching, ADM works online and can transform arbitrarily long input sequences. It is shown analytically that as the input length tends to...
The relationship between soil water content (SWC) and vegetation, topography, and climatic conditions is critical for developing effective agricultural water management practices and improving agricultural water use efficiency in arid areas. The purpose of this study was to determine how crop cover influenced spatial and temporal variation of soil water. During a study, SWC was measured under m...
This lecture is intended to be an easily accessible first introduction to quantum information theory. The field is large and it is not completely covered even by the recent monograph [15]. Therefore the simple topic of data compression is selected to present some ideas of the theory. Classical information theory is not a prerequisite, we start with the basics of Shannon theory to give a feeling...
We address the issue of how statistical and information-theoric measures can be employed to quantify the categorization process of a simulated robotic agent interacting with its local environment. We show how correlation, entropy, and mutual information can help identify distinct informational structure which can be used for object classification. Further, by means of the isometric feature mapp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید