Lecture Notes On Information Theory and Five Types of Entropy

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

CollegeofInformationTechnology,UniversityofBabylon,Iraq

Samaher_hussein@yahoo.com
By
Dr.SamaherHusseinAli
LECTURENOTESONINFORMATIONTHEORY
ANDFIVETYPESOFENTROPY
DepartmentofSoftware
TheUniversityofBabylon
26November2012
Dr.SamaherHusseinAli
InformationTheory
NotesofLecture10
26November2012
The concept of information is related to the signal transmitted through a
communication system. Every signals which converges information can be
described as uncertain or unpredictable. But not every signals which has this
description necessarily contain information. The information associated with
occurrence of an event is define as:
I(Xi) = Log (
1
pob.o] occuuncc o] ccnt
)
I(Xi) = Log (
1
P(X)
)= Log(P(xi))
where
I(Xi) self information associative the occurrence of an event
{x} = {x 1, x2,.xm}
P(Xi)= P(X1), P(X2), ., P(Xm)
Dr.SamaherHusseinAli
InformationTheory
NotesofLecture10
26November2012
Dr.SamaherHusseinAli
InformationTheory
NotesofLecture10
26November2012
Dr.SamaherHusseinAli
InformationTheory
NotesofLecture10
26November2012
Dr.SamaherHusseinAli
InformationTheory
NotesofLecture10
26November2012
Dr.SamaherHusseinAli
InformationTheory
NotesofLecture10
26November2012
Dr.SamaherHusseinAli
Subject of Report:
NotesofLecture10
26November2012
Introduction to Cryptography Based Multidisciplinary
Subliminal Cryptography with Data Mining Techniques
Subliminal Cryptography
Quantum Based Cryptology
Authentication of Digital Signature.
Code Based Cryptography
Fuzzy Logic Based Cryptology
DSP based Cryptology
ICA and PCA based Cryptology
Dr.SamaherHusseinAli
StepsofwriteReport
NotesofLecture10
26November2012
Title of Report
Your name
Abstract (1020) lines
Keywords ( 57 words)
Introduction (One page)
Survey ( more than 8 papers then generation table to compression among
these papers base on author name , year, methodology, advantage ,
disadvantage, open still problems)
Tools (techniques)
Discussion
summary
Conclusion

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy