An Introduction to Information Theory and Entropy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Terms for Talking About Information and Communication
Information 2012, 3, 351-371; doi:10.3390/info3030351 OPEN ACCESS information ISSN 2078-2489 www.mdpi.com/journal/information Concept Paper Terms for Talking about Information and Communication Corey Anton School of Communications, Grand Valley State University, 210 Lake Superior Hall, Allendale, MI 49401, USA; E-Mail: [email protected]; Tel.: +1-616-331-3668; Fax: +1-616-331-2700 Received: 4 June 2012; in revised form: 17 August 2012 / Accepted: 20 August 2012 / Published: 27 August 2012 Abstract: This paper offers terms for talking about information and how it relates to both matter-energy and communication, by: (1) Identifying three different levels of signs: Index, based in contiguity, icon, based in similarity, and symbol, based in convention; (2) examining three kinds of coding: Analogic differences, which deal with positive quantities having contiguous and continuous values, and digital distinctions, which include “either/or functions”, discrete values, and capacities for negation, decontextualization, and abstract concept-transfer, and finally, iconic coding, which incorporates both analogic differences and digital distinctions; and (3) differentiating between “information theoretic” orientations (which deal with data, what is “given as meaningful” according to selections and combinations within “contexts of choice”) and “communication theoretic” ones (which deal with capta, what is “taken as meaningful” according to various “choices of context”). Finally, a brief envoi reflects on how information broadly construed relates to probability and entropy. Keywords: sign; index; icon; symbol; coding; context; information; communication “If you have an apple and I have an apple and we exchange apples then you and I will still each have one apple. -
Information Theory Techniques for Multimedia Data Classification and Retrieval
INFORMATION THEORY TECHNIQUES FOR MULTIMEDIA DATA CLASSIFICATION AND RETRIEVAL Marius Vila Duran Dipòsit legal: Gi. 1379-2015 http://hdl.handle.net/10803/302664 http://creativecommons.org/licenses/by-nc-sa/4.0/deed.ca Aquesta obra està subjecta a una llicència Creative Commons Reconeixement- NoComercial-CompartirIgual Esta obra está bajo una licencia Creative Commons Reconocimiento-NoComercial- CompartirIgual This work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike licence DOCTORAL THESIS Information theory techniques for multimedia data classification and retrieval Marius VILA DURAN 2015 DOCTORAL THESIS Information theory techniques for multimedia data classification and retrieval Author: Marius VILA DURAN 2015 Doctoral Programme in Technology Advisors: Dr. Miquel FEIXAS FEIXAS Dr. Mateu SBERT CASASAYAS This manuscript has been presented to opt for the doctoral degree from the University of Girona List of publications Publications that support the contents of this thesis: "Tsallis Mutual Information for Document Classification", Marius Vila, Anton • Bardera, Miquel Feixas, Mateu Sbert. Entropy, vol. 13, no. 9, pages 1694-1707, 2011. "Tsallis entropy-based information measure for shot boundary detection and • keyframe selection", Marius Vila, Anton Bardera, Qing Xu, Miquel Feixas, Mateu Sbert. Signal, Image and Video Processing, vol. 7, no. 3, pages 507-520, 2013. "Analysis of image informativeness measures", Marius Vila, Anton Bardera, • Miquel Feixas, Philippe Bekaert, Mateu Sbert. IEEE International Conference on Image Processing pages 1086-1090, October 2014. "Image-based Similarity Measures for Invoice Classification", Marius Vila, Anton • Bardera, Miquel Feixas, Mateu Sbert. Submitted. List of figures 2.1 Plot of binary entropy..............................7 2.2 Venn diagram of Shannon’s information measures............ 10 3.1 Computation of the normalized compression distance using an image compressor.................................... -
Combinatorial Reasoning in Information Theory
Combinatorial Reasoning in Information Theory Noga Alon, Tel Aviv U. ISIT 2009 1 Combinatorial Reasoning is crucial in Information Theory Google lists 245,000 sites with the words “Information Theory ” and “ Combinatorics ” 2 The Shannon Capacity of Graphs The (and) product G x H of two graphs G=(V,E) and H=(V’,E’) is the graph on V x V’, where (v,v’) = (u,u’) are adjacent iff (u=v or uv є E) and (u’=v’ or u’v’ є E’) The n-th power Gn of G is the product of n copies of G. 3 Shannon Capacity Let α ( G n ) denote the independence number of G n. The Shannon capacity of G is n 1/n n 1/n c(G) = lim [α(G )] ( = supn[α(G )] ) n →∞ 4 Motivation output input A channel has an input set X, an output set Y, and a fan-out set S Y for each x X. x ⊂ ∈ The graph of the channel is G=(X,E), where xx’ є E iff x,x’ can be confused , that is, iff S S = x ∩ x′ ∅ 5 α(G) = the maximum number of distinct messages the channel can communicate in a single use (with no errors) α(Gn)= the maximum number of distinct messages the channel can communicate in n uses. c(G) = the maximum number of messages per use the channel can communicate (with long messages) 6 There are several upper bounds for the Shannon Capacity: Combinatorial [ Shannon(56)] Geometric [ Lovász(79), Schrijver (80)] Algebraic [Haemers(79), A (98)] 7 Theorem (A-98): For every k there are graphs G and H so that c(G), c(H) ≤ k and yet c(G + H) kΩ(log k/ log log k) ≥ where G+H is the disjoint union of G and H. -
2020 SIGACT REPORT SIGACT EC – Eric Allender, Shuchi Chawla, Nicole Immorlica, Samir Khuller (Chair), Bobby Kleinberg September 14Th, 2020
2020 SIGACT REPORT SIGACT EC – Eric Allender, Shuchi Chawla, Nicole Immorlica, Samir Khuller (chair), Bobby Kleinberg September 14th, 2020 SIGACT Mission Statement: The primary mission of ACM SIGACT (Association for Computing Machinery Special Interest Group on Algorithms and Computation Theory) is to foster and promote the discovery and dissemination of high quality research in the domain of theoretical computer science. The field of theoretical computer science is the rigorous study of all computational phenomena - natural, artificial or man-made. This includes the diverse areas of algorithms, data structures, complexity theory, distributed computation, parallel computation, VLSI, machine learning, computational biology, computational geometry, information theory, cryptography, quantum computation, computational number theory and algebra, program semantics and verification, automata theory, and the study of randomness. Work in this field is often distinguished by its emphasis on mathematical technique and rigor. 1. Awards ▪ 2020 Gödel Prize: This was awarded to Robin A. Moser and Gábor Tardos for their paper “A constructive proof of the general Lovász Local Lemma”, Journal of the ACM, Vol 57 (2), 2010. The Lovász Local Lemma (LLL) is a fundamental tool of the probabilistic method. It enables one to show the existence of certain objects even though they occur with exponentially small probability. The original proof was not algorithmic, and subsequent algorithmic versions had significant losses in parameters. This paper provides a simple, powerful algorithmic paradigm that converts almost all known applications of the LLL into randomized algorithms matching the bounds of the existence proof. The paper further gives a derandomized algorithm, a parallel algorithm, and an extension to the “lopsided” LLL. -
Information Content and Error Analysis
43 INFORMATION CONTENT AND ERROR ANALYSIS Clive D Rodgers Atmospheric, Oceanic and Planetary Physics University of Oxford ESA Advanced Atmospheric Training Course September 15th – 20th, 2008 44 INFORMATION CONTENT OF A MEASUREMENT Information in a general qualitative sense: Conceptually, what does y tell you about x? We need to answer this to determine if a conceptual instrument design actually works • to optimise designs • Use the linear problem for simplicity to illustrate the ideas. y = Kx + ! 45 SHANNON INFORMATION The Shannon information content of a measurement of x is the change in the entropy of the • probability density function describing our knowledge of x. Entropy is defined by: • S P = P (x) log(P (x)/M (x))dx { } − Z M(x) is a measure function. We will take it to be constant. Compare this with the statistical mechanics definition of entropy: • S = k p ln p − i i i X P (x)dx corresponds to pi. 1/M (x) is a kind of scale for dx. The Shannon information content of a measurement is the change in entropy between the p.d.f. • before, P (x), and the p.d.f. after, P (x y), the measurement: | H = S P (x) S P (x y) { }− { | } What does this all mean? 46 ENTROPY OF A BOXCAR PDF Consider a uniform p.d.f in one dimension, constant in (0,a): P (x)=1/a 0 <x<a and zero outside.The entropy is given by a 1 1 S = ln dx = ln a − a a Z0 „ « Similarly, the entropy of any constant pdf in a finite volume V of arbitrary shape is: 1 1 S = ln dv = ln V − V V ZV „ « i.e the entropy is the log of the volume of state space occupied by the p.d.f. -
Information Theory for Intelligent People
Information Theory for Intelligent People Simon DeDeo∗ September 9, 2018 Contents 1 Twenty Questions 1 2 Sidebar: Information on Ice 4 3 Encoding and Memory 4 4 Coarse-graining 5 5 Alternatives to Entropy? 7 6 Coding Failure, Cognitive Surprise, and Kullback-Leibler Divergence 7 7 Einstein and Cromwell's Rule 10 8 Mutual Information 10 9 Jensen-Shannon Distance 11 10 A Note on Measuring Information 12 11 Minds and Information 13 1 Twenty Questions The story of information theory begins with the children's game usually known as \twenty ques- tions". The first player (the \adult") in this two-player game thinks of something, and by a series of yes-no questions, the other player (the \child") attempts to guess what it is. \Is it bigger than a breadbox?" No. \Does it have fur?" Yes. \Is it a mammal?" No. And so forth. If you play this game for a while, you learn that some questions work better than others. Children usually learn that it's a good idea to eliminate general categories first before becoming ∗Article modified from text for the Santa Fe Institute Complex Systems Summer School 2012, and updated for a meeting of the Indiana University Center for 18th Century Studies in 2015, a Colloquium at Tufts University Department of Cognitive Science on Play and String Theory in 2016, and a meeting of the SFI ACtioN Network in 2017. Please send corrections, comments and feedback to [email protected]; http://santafe.edu/~simon. 1 more specific, for example. If you ask on the first round \is it a carburetor?" you are likely wasting time|unless you're playing the game on Car Talk. -
Chapter 4 Information Theory
Chapter Information Theory Intro duction This lecture covers entropy joint entropy mutual information and minimum descrip tion length See the texts by Cover and Mackay for a more comprehensive treatment Measures of Information Information on a computer is represented by binary bit strings Decimal numb ers can b e represented using the following enco ding The p osition of the binary digit 3 2 1 0 Bit Bit Bit Bit Decimal Table Binary encoding indicates its decimal equivalent such that if there are N bits the ith bit represents N i the decimal numb er Bit is referred to as the most signicant bit and bit N as the least signicant bit To enco de M dierent messages requires log M bits 2 Signal Pro cessing Course WD Penny April Entropy The table b elow shows the probability of o ccurrence px to two decimal places of i selected letters x in the English alphab et These statistics were taken from Mackays i b o ok on Information Theory The table also shows the information content of a x px hx i i i a e j q t z Table Probability and Information content of letters letter hx log i px i which is a measure of surprise if we had to guess what a randomly chosen letter of the English alphab et was going to b e wed say it was an A E T or other frequently o ccuring letter If it turned out to b e a Z wed b e surprised The letter E is so common that it is unusual to nd a sentence without one An exception is the page novel Gadsby by Ernest Vincent Wright in which -
Shannon Entropy and Kolmogorov Complexity
Information and Computation: Shannon Entropy and Kolmogorov Complexity Satyadev Nandakumar Department of Computer Science. IIT Kanpur October 19, 2016 This measures the average uncertainty of X in terms of the number of bits. Shannon Entropy Definition Let X be a random variable taking finitely many values, and P be its probability distribution. The Shannon Entropy of X is X 1 H(X ) = p(i) log : 2 p(i) i2X Shannon Entropy Definition Let X be a random variable taking finitely many values, and P be its probability distribution. The Shannon Entropy of X is X 1 H(X ) = p(i) log : 2 p(i) i2X This measures the average uncertainty of X in terms of the number of bits. The Triad Figure: Claude Shannon Figure: A. N. Kolmogorov Figure: Alan Turing Just Electrical Engineering \Shannon's contribution to pure mathematics was denied immediate recognition. I can recall now that even at the International Mathematical Congress, Amsterdam, 1954, my American colleagues in probability seemed rather doubtful about my allegedly exaggerated interest in Shannon's work, as they believed it consisted more of techniques than of mathematics itself. However, Shannon did not provide rigorous mathematical justification of the complicated cases and left it all to his followers. Still his mathematical intuition is amazingly correct." A. N. Kolmogorov, as quoted in [Shi89]. Kolmogorov and Entropy Kolmogorov's later work was fundamentally influenced by Shannon's. 1 Foundations: Kolmogorov Complexity - using the theory of algorithms to give a combinatorial interpretation of Shannon Entropy. 2 Analogy: Kolmogorov-Sinai Entropy, the only finitely-observable isomorphism-invariant property of dynamical systems. -
An Information-Theoretic Approach to Normal Forms for Relational and XML Data
An Information-Theoretic Approach to Normal Forms for Relational and XML Data Marcelo Arenas Leonid Libkin University of Toronto University of Toronto [email protected] [email protected] ABSTRACT Several papers [13, 28, 18] attempted a more formal eval- uation of normal forms, by relating it to the elimination Normalization as a way of producing good database de- of update anomalies. Another criterion is the existence signs is a well-understood topic. However, the same prob- of algorithms that produce good designs: for example, we lem of distinguishing well-designed databases from poorly know that every database scheme can be losslessly decom- designed ones arises in other data models, in particular, posed into one in BCNF, but some constraints may be lost XML. While in the relational world the criteria for be- along the way. ing well-designed are usually very intuitive and clear to state, they become more obscure when one moves to more The previous work was specific for the relational model. complex data models. As new data formats such as XML are becoming critically important, classical database theory problems have to be Our goal is to provide a set of tools for testing when a revisited in the new context [26, 24]. However, there is condition on a database design, specified by a normal as yet no consensus on how to address the problem of form, corresponds to a good design. We use techniques well-designed data in the XML setting [10, 3]. of information theory, and define a measure of informa- tion content of elements in a database with respect to a set It is problematic to evaluate XML normal forms based of constraints. -
1 Applications of Information Theory to Biology Information Theory Offers A
Pacific Symposium on Biocomputing 5:597-598 (2000) Applications of Information Theory to Biology T. Gregory Dewey Keck Graduate Institute of Applied Life Sciences 535 Watson Drive, Claremont CA 91711, USA Hanspeter Herzel Innovationskolleg Theoretische Biologie, HU Berlin, Invalidenstrasse 43, D-10115, Berlin, Germany Information theory offers a number of fertile applications to biology. These applications range from statistical inference to foundational issues. There are a number of statistical analysis tools that can be considered information theoretical techniques. Such techniques have been the topic of PSB session tracks in 1998 and 1999. The two main tools are algorithmic complexity (including both MML and MDL) and maximum entropy. Applications of MML include sequence searching and alignment, phylogenetic trees, structural classes in proteins, protein potentials, calcium and neural spike dynamics and DNA structure. Maximum entropy methods have appeared in nucleotide sequence analysis (Cosmi et al., 1990), protein dynamics (Steinbach, 1996), peptide structure (Zal et al., 1996) and drug absorption (Charter, 1991). Foundational aspects of information theory are particularly relevant in several areas of molecular biology. Well-studied applications are the recognition of DNA binding sites (Schneider 1986), multiple alignment (Altschul 1991) or gene-finding using a linguistic approach (Dong & Searls 1994). Calcium oscillations and genetic networks have also been studied with information-theoretic tools. In all these cases, the information content of the system or phenomena is of intrinsic interest in its own right. In the present symposium, we see three applications of information theory that involve some aspect of sequence analysis. In all three cases, fundamental information-theoretical properties of the problem of interest are used to develop analyses of practical importance. -
Understanding Shannon's Entropy Metric for Information
Understanding Shannon's Entropy metric for Information Sriram Vajapeyam [email protected] 24 March 2014 1. Overview Shannon's metric of "Entropy" of information is a foundational concept of information theory [1, 2]. Here is an intuitive way of understanding, remembering, and/or reconstructing Shannon's Entropy metric for information. Conceptually, information can be thought of as being stored in or transmitted as variables that can take on different values. A variable can be thought of as a unit of storage that can take on, at different times, one of several different specified values, following some process for taking on those values. Informally, we get information from a variable by looking at its value, just as we get information from an email by reading its contents. In the case of the variable, the information is about the process behind the variable. The entropy of a variable is the "amount of information" contained in the variable. This amount is determined not just by the number of different values the variable can take on, just as the information in an email is quantified not just by the number of words in the email or the different possible words in the language of the email. Informally, the amount of information in an email is proportional to the amount of “surprise” its reading causes. For example, if an email is simply a repeat of an earlier email, then it is not informative at all. On the other hand, if say the email reveals the outcome of a cliff-hanger election, then it is highly informative. -
Efficient Space-Time Sampling with Pixel-Wise Coded Exposure For
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 Efficient Space-Time Sampling with Pixel-wise Coded Exposure for High Speed Imaging Dengyu Liu, Jinwei Gu, Yasunobu Hitomi, Mohit Gupta, Tomoo Mitsunaga, Shree K. Nayar Abstract—Cameras face a fundamental tradeoff between spatial and temporal resolution. Digital still cameras can capture images with high spatial resolution, but most high-speed video cameras have relatively low spatial resolution. It is hard to overcome this tradeoff without incurring a significant increase in hardware costs. In this paper, we propose techniques for sampling, representing and reconstructing the space-time volume in order to overcome this tradeoff. Our approach has two important distinctions compared to previous works: (1) we achieve sparse representation of videos by learning an over-complete dictionary on video patches, and (2) we adhere to practical hardware constraints on sampling schemes imposed by architectures of current image sensors, which means that our sampling function can be implemented on CMOS image sensors with modified control units in the future. We evaluate components of our approach - sampling function and sparse representation by comparing them to several existing approaches. We also implement a prototype imaging system with pixel-wise coded exposure control using a Liquid Crystal on Silicon (LCoS) device. System characteristics such as field of view, Modulation Transfer Function (MTF) are evaluated for our imaging system. Both simulations and experiments on a wide range of