-
41
On the coding rate for differential modulation and detections
Published 2016-07-01“…Differential demodulation is an important method of solving the information transmission which is used in the high dynamic condition of the wireless communication.The coding rate for differential modulation and detec-tions neither be too high,nor be too low.To find the optimal coding rate,the Shannon limit of error free transmis-sions with different rates for differential BPSK and differential QPSK were derived.Thereafter,the optimal coding rate was obtained from the view point of information theory.Convolutional codes and Turbo codes with different rates were employed,and simulations were conducted for the verification of the result.…”
Get full text
Article -
42
Construction method of optimal codebook based on Zadoff-Chu matrix
Published 2020-03-01“…Codebooks with low-coherence have wide utilization in code division multiple access (CDMA) communications,quantum information theory,compressed sensing and so on.In order to expand the number of codebooks,the restrictions on the transformation matrix were relaxed.Based on the Zadoff-Chu matrix,new codebooks were constructed using the difference set,almost difference set,and finite field character sum.The proposed codebooks were optimal or near optimal according to the Welch bound or Levenstein bound.Through experimental simulation,it is found that the deterministic measurement matrices constructed using these codebooks also have good performance in the process of compressed sensing.…”
Get full text
Article -
43
Some Improvements of Jensen’s Inequality via 4-Convexity and Applications
Published 2022-01-01“…At last, we give the applications of our main inequalities in the information theory. The approach and techniques used in the present note may simulate more research in this field.…”
Get full text
Article -
44
Survey of side channel attack on encrypted network traffic
Published 2021-08-01“…By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data entered by users.A model of side channel attack on encrypted network traffic according to information theory was developed.Based on the unified model, the methods and results of representative attacks such as fingerprinting attacks, keystroke attacks and speech attacks were analyzed in detail.Furthermore, defense methods of hiding packet size and timing information were discussed.At last, possible research directions were prospected with the frontiers of technology development.…”
Get full text
Article -
45
Determination of Novel Estimations for the Slater Difference and Applications
Published 2024-01-01“…We present a diverse type of applications that stem from the main findings related to power means, Zipf–Mandelbrot entropy, and within the field of information theory. Our main tools for deriving estimates for the Slater difference involve the triangular inequality, the definition of the convex function, and the well-established Jensen inequality.…”
Get full text
Article -
46
Dynamic system evolution and markov chain approximation
Published 1998-01-01“…In this paper computational aspects of the mathematical modelling of dynamic system evolution have been considered as a problem in information theory. The construction of mathematical models is treated as a decision making process with limited available information.The solution of the problem is associated with a computational model based on heuristics of a Markov Chain in a discrete space–time of events. …”
Get full text
Article -
47
Bounds for the Jensen Gap in terms of Power Means with Applications
Published 2021-01-01“…Finally, some applications are given in information theory. The tools performed for obtaining the main results may be applied to obtain more results for other inequalities.…”
Get full text
Article -
48
An overview of low resolution quantization in wireless communication system
Published 2017-06-01“…Compared to the 4th generation (4G) mobile communication technology,the 5th generation (5G) mobile communication technology will provide tens of times of peak rate increase,reaching up to several thousands megabit per second.The coming wireless communication systems face the problems of expensive hardware cost and high power consumption,which is becoming a bottleneck of high-rate communication systems.To cope with these problems,redesigning communication systems with the receiver using finite precision analog-to-digital converters (ADC) is one possible approach.The analysis of recent information theory for the AWGN channel shows that the performance loss due to 2~3 bit ADC acceptable.The application of low resolution quantization in wireless communication systems was focused on,an overview of the channel capacity and receiver design under low-precision ADC was provided.…”
Get full text
Article -
49
Survey of capacity limits and implementation techniques in wireless covert communication
Published 2022-08-01“…The differences and connections between wireless covert communication (WCC) and related concepts were clarified.The WCC research based on hypothesis testing theory and information theory was focused.The basic research model and the categories of specific models were introduced.The existing works were classified and reviewed in two parts, namely, capacity limits and implementation techniques.The former part reviewed the works that reveal the limit rate, and divided them into two categories as per the order of the limit rate: squared root rate and positive rate.The latter part reviewed the works that analyze the performance of WCC systems and optimize the implementation schemes, and classified them as per their application scenarios.Finally, potential research directions were discussed.…”
Get full text
Article -
50
A methodology of informatics: the role of methodology in improvement of theory
Published 1990-12-01“…The absence of methodology is a major cause and effect of the crisis in contemporary information theory. We can only discuss the methods used in research work in the field of informatics. …”
Get full text
Article -
51
Journalists’ Response and Reporting of Public Emergencies in the Era of Artificial Intelligence
Published 2022-01-01“…In order to improve the response ability of journalists to public emergencies, this study uses the computer simulation research method, based on Shannon’s information theory and the basic theory of journalism and communication, constructs the general model of public emergencies based on the statistical results of big data, and constructs the irrational natural person game model of four types of news communication participants. …”
Get full text
Article -
52
Network isolation communication scheme to resist against covert channel
Published 2014-11-01“…With the rapid development of network technologies,real-time information exchanging between heterogeneous networks becomes more frequently.To effectively guarantee the secure and real-time information exchanging crossing different networks,a network isolation communication scheme (NICS) is proposed to resist against covert channel.A newly theoretical model of NICS is designed and proved based on the information theory,and followed with a specific solution.Security analysis indicates that the NICS is able to effectively solve problems of the potential packet lengths’ covert channel (PLCC) and the status covert channel (SCC) in most of the existing work; and,given similar amount of information for exchanging,the NICS can achieve equivalent security degree with the physical isolation in terms of resisting against the covert channel.…”
Get full text
Article -
53
Entanglement in a QFT Model of Neutrino Oscillations
Published 2014-01-01“…Tools of quantum information theory can be exploited to provide a convenient description of the phenomena of particle mixing and flavor oscillations in terms of entanglement, a fundamental quantum resource. …”
Get full text
Article -
54
Segmentation of Activated Sludge Flocs in Microscopic Images for Monitoring Wastewater Treatment
Published 2022-01-01“…To address this challenge, we propose a novel framework involving a multiphase edge detection algorithm based on information theory. The proposed framework is evaluated and scrutinized critically considering the artifacts found in the photographs tested. …”
Get full text
Article -
55
Towards an Information Model of Consistency Maintenance in Distributed Interactive Applications
Published 2008-01-01“…A novel framework to model and explore predictive contract mechanisms in distributed interactive applications (DIAs) using information theory is proposed. In our model, the entity state update scheme is modelled as an information generation, encoding, and reconstruction process. …”
Get full text
Article -
56
Research on federated learning approach based on local differential privacy
Published 2022-10-01“…As a type of collaborative machine learning framework, federated learning is capable of preserving private data from participants while training the data into useful models.Nevertheless, from a viewpoint of information theory, it is still vulnerable for a curious server to infer private information from the shared models uploaded by participants.To solve the inference attack problem in federated learning training, a local differential privacy federated learning (LDP-FL) approach was proposed.Firstly, to ensure the federated model training process was protected from inference attacks, a local differential privacy mechanism was designed for transmission of parameters in federated learning.Secondly, a performance loss constraint mechanism for federated learning was proposed and designed to reduce the performance loss of local differential privacy federated model by optimizing the constraint range of the loss function.Finally, the effectiveness of proposed LDP-FL approach was verified by comparative experiments on MNIST and Fashion MNIST datasets.…”
Get full text
Article -
57
Efficient information transfer by Poisson neurons
Published 2015-12-01“…Such a situation resembles inmany ways the optimal information transmission protocol for thecontinuous-time Poisson channel known from information theory. In thiscontribution we employ the classical information-theoretic results toanalyze the efficiency of such a transmission from differentperspectives, emphasising the neurobiological viewpoint. …”
Get full text
Article -
58
Unique Information Through the Lens of Channel Ordering: An Introduction and Review
Published 2025-01-01“…The problem of constructing information measures with a well-defined interpretation is of fundamental significance in information theory. A good definition of an information measure entails certain desirable properties while also providing answers to operational problems. …”
Get full text
Article -
59
Fitts Law as a Restrained Random Walk
Published 2024-04-01“…We provide here a new interpretation of this law, not invoking a discretization of space and time as in the original information theory representation of Fitts, but involving a simple restrained random walk on a continuum, in space and time. …”
Get full text
Article -
60
Quantum Contextual Hypergraphs, Operators, Inequalities, and Applications in Higher Dimensions
Published 2025-01-01“…Quantum contextuality plays a significant role in supporting quantum computation and quantum information theory. The key tools for this are the Kochen–Specker and non-Kochen–Specker contextual sets. …”
Get full text
Article