This lecture discusses information inequalities and their proofs, including:
1) Conditioning does not increase entropy - conditioning adds information, reducing uncertainty.
2) Independence bound - mutual entropy is highest when variables are independent.
3) Data processing inequality - processing data cannot increase information about the original variables.
Fano's inequality relates error probability in estimating a random variable to the conditional entropy. It bounds the uncertainty remaining about a variable after observing its estimate.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Mathematics and Statistics Invention (IJMSI) inventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
On New Root Finding Algorithms for Solving Nonlinear Transcendental EquationsAI Publications
In this paper, we present new iterative algorithms to find a root of the given nonlinear transcendental equations. In the proposed algorithms, we use nonlinear Taylor’s polynomial interpolation and a modified error correction term with a fixed-point concept. We also investigated for possible extension of the higher order iterative algorithms in single variable to higher dimension. Several numerical examples are presented to illustrate the proposed algorithms.
In this paper we study on contribution of fixed point theorem in Metric spaces and Quasi Metric spaces.
Key words: Metric space, Contraction Mapping, Fixed point Theorem, Quasi Metric Space, p-Convergent, p-orbit ally continuous.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Mathematics and Statistics Invention (IJMSI) inventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
On New Root Finding Algorithms for Solving Nonlinear Transcendental EquationsAI Publications
In this paper, we present new iterative algorithms to find a root of the given nonlinear transcendental equations. In the proposed algorithms, we use nonlinear Taylor’s polynomial interpolation and a modified error correction term with a fixed-point concept. We also investigated for possible extension of the higher order iterative algorithms in single variable to higher dimension. Several numerical examples are presented to illustrate the proposed algorithms.
In this paper we study on contribution of fixed point theorem in Metric spaces and Quasi Metric spaces.
Key words: Metric space, Contraction Mapping, Fixed point Theorem, Quasi Metric Space, p-Convergent, p-orbit ally continuous.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Presentation of Birnbaum's Likelihood Principle foundational paper at the Reading Statistical Classics seminar, Jan. 20, 2013, Université Paris-Dauphine
Lecture13p.pdf.pdfThedeepness of freedom are threevalues.docxcroysierkathey
Lecture13p.pdf.pdf
Thedeepness of freedom are threevalues at thenude
functional Notconforming
patrtaf.us
vi sci x
I beease
ittouch
41 u VCsci inhalfedgeL
U VCI't x
Since u CPz are sci sc 7 that it have 3 Zeusunless e o
E is P anisolvent it forgiven I lop C P s t 4 p di
same
degree
y i l N Yi C E
Sabi n ofsystem YCp g
This is equivalent to say theonlypolynomial C PthetinterpolateZero
data Yifp o is the Zeno poly
vcpi.POTFF.gg In Edem
e e
I CRIvalue VCR Ca Ya
metfunctor
p
E3
pjJ Chip J
Shun E is p unisolvent
Y Cul VCR7 0
Xz V UCR o
rf VI UCB 0
Then over the edge PP we hone
C P havingtworootsPR
D This implies we 0
If e consider the other to edges G e b thesame
argument we can see Eo tht means W Lv o hersonly trivial
Solution
Then Yi CUI Ri for any Xi
E is P unisowent
y
csiy
Ya
f P Y cnn.PT
III Ldj Pg I Pre 2 ily
a PyO ein a
451214 7 f p i y g d CP f
ftp b f CRI I B so
fickle Cps O y Cp 7 L
Escaple5 in lectureto
Lecture_03_S08.pdf
LECTURE # 3:
ABSTRACT RITZ-GALERKIN METHOD
MATH610: NUMERICAL METHODS FOR PDES:
RAYTCHO LAZAROV
1. Variational Formulation
In the previous lecture we have introduced the following space of functions
defined on (0, 1):
(1)
V =
v :
v(x) is continuous function on (0, 1);
v′(x) exists in generalized sense and in L2(0, 1);
v(0) = v(1) = 0
:= H10 (0, 1)
and equipped it with the L2 and H1 norms
‖v‖ = (v,v)1/2 and ‖v‖V = (v,v)
1/2
V =
(∫ 1
0
(u′2 + u2)dx
)1
2
.
We also introduced the following variational and minimization problems:
(V ) find u ∈ V such that a(u,v) = L(v), ∀ v ∈ V,
(M) find u ∈ V such that F(u) ≤ F(v), ∀ v ∈ V,
where a(u,v) is a bilinear form that is symmetric, coercive and contin-
uous on V and L(v) is continuous on V and F(v) = 1
2
a(u,u) −L(v).
As an example we can take
a(u,v) ≡
∫ 1
0
(k(x)u′v′ + q(x)uv) dx and L(v) ≡
∫ 1
0
f(x)v dx.
Here we have assumed that there are positive constants k0, k1, M such that
(2) k1 ≥ k(x) ≥ k0 > 0, M ≥ q(x) ≥ 0, f ∈ L2(0, 1).
These are sufficient for the symmetry, coercivity and continuity of the
bilinear form a(., .) and the continuity of the linear form L(v).
The proof of these properties follows from the following theorem:
Theorem 1. Let u ∈ V ≡ H10 (0, 1). Then the following inequalities are
valid:
(3)
|u(x)|2 ≤ C1
∫ 1
0
(u′(x))2dx for any x ∈ (0, 1),∫ 1
0
u2(x)dx ≤ C0
∫ 1
0
(u′(x))2dx.
with constants C0 and C1 that are independent of u.
1
2 MATH610: NUMERICAL METHODS FOR PDES: RAYTCHO LAZAROV
Proof: We give two proofs. The simple one proves the above inequali-
ties with C0 = 1/2 and C1 = 1. The better proof establishes the above
inequalities with C0 = 1/6 and C1 = 1/4.
Indeed, for any x ∈ (0, 1) we have:
u(x) = u(0) +
∫ x
0
u′(s)ds.
Since u ∈ H10 (0, 1) then u(0) = 0. We square this equality and apply
Cauchy-Swartz inequality:
(4) |u(x)|2 =
∣∣∣∫ x
0
u′(s)ds
∣∣∣2 ≤ ∫ x
0
1ds
∫ x
0
(u′(s))2ds ≤ x
∫ x
0
(u′(s))2ds.
Taking the maximal value of x on the right hand side of this inequality
w ...
Lecture13p.pdf.pdfThedeepness of freedom are threevalues.docxjeremylockett77
Lecture13p.pdf.pdf
Thedeepness of freedom are threevalues at thenude
functional Notconforming
patrtaf.us
vi sci x
I beease
ittouch
41 u VCsci inhalfedgeL
U VCI't x
Since u CPz are sci sc 7 that it have 3 Zeusunless e o
E is P anisolvent it forgiven I lop C P s t 4 p di
same
degree
y i l N Yi C E
Sabi n ofsystem YCp g
This is equivalent to say theonlypolynomial C PthetinterpolateZero
data Yifp o is the Zeno poly
vcpi.POTFF.gg In Edem
e e
I CRIvalue VCR Ca Ya
metfunctor
p
E3
pjJ Chip J
Shun E is p unisolvent
Y Cul VCR7 0
Xz V UCR o
rf VI UCB 0
Then over the edge PP we hone
C P havingtworootsPR
D This implies we 0
If e consider the other to edges G e b thesame
argument we can see Eo tht means W Lv o hersonly trivial
Solution
Then Yi CUI Ri for any Xi
E is P unisowent
y
csiy
Ya
f P Y cnn.PT
III Ldj Pg I Pre 2 ily
a PyO ein a
451214 7 f p i y g d CP f
ftp b f CRI I B so
fickle Cps O y Cp 7 L
Escaple5 in lectureto
Lecture_03_S08.pdf
LECTURE # 3:
ABSTRACT RITZ-GALERKIN METHOD
MATH610: NUMERICAL METHODS FOR PDES:
RAYTCHO LAZAROV
1. Variational Formulation
In the previous lecture we have introduced the following space of functions
defined on (0, 1):
(1)
V =
v :
v(x) is continuous function on (0, 1);
v′(x) exists in generalized sense and in L2(0, 1);
v(0) = v(1) = 0
:= H10 (0, 1)
and equipped it with the L2 and H1 norms
‖v‖ = (v,v)1/2 and ‖v‖V = (v,v)
1/2
V =
(∫ 1
0
(u′2 + u2)dx
)1
2
.
We also introduced the following variational and minimization problems:
(V ) find u ∈ V such that a(u,v) = L(v), ∀ v ∈ V,
(M) find u ∈ V such that F(u) ≤ F(v), ∀ v ∈ V,
where a(u,v) is a bilinear form that is symmetric, coercive and contin-
uous on V and L(v) is continuous on V and F(v) = 1
2
a(u,u) −L(v).
As an example we can take
a(u,v) ≡
∫ 1
0
(k(x)u′v′ + q(x)uv) dx and L(v) ≡
∫ 1
0
f(x)v dx.
Here we have assumed that there are positive constants k0, k1, M such that
(2) k1 ≥ k(x) ≥ k0 > 0, M ≥ q(x) ≥ 0, f ∈ L2(0, 1).
These are sufficient for the symmetry, coercivity and continuity of the
bilinear form a(., .) and the continuity of the linear form L(v).
The proof of these properties follows from the following theorem:
Theorem 1. Let u ∈ V ≡ H10 (0, 1). Then the following inequalities are
valid:
(3)
|u(x)|2 ≤ C1
∫ 1
0
(u′(x))2dx for any x ∈ (0, 1),∫ 1
0
u2(x)dx ≤ C0
∫ 1
0
(u′(x))2dx.
with constants C0 and C1 that are independent of u.
1
2 MATH610: NUMERICAL METHODS FOR PDES: RAYTCHO LAZAROV
Proof: We give two proofs. The simple one proves the above inequali-
ties with C0 = 1/2 and C1 = 1. The better proof establishes the above
inequalities with C0 = 1/6 and C1 = 1/4.
Indeed, for any x ∈ (0, 1) we have:
u(x) = u(0) +
∫ x
0
u′(s)ds.
Since u ∈ H10 (0, 1) then u(0) = 0. We square this equality and apply
Cauchy-Swartz inequality:
(4) |u(x)|2 =
∣∣∣∫ x
0
u′(s)ds
∣∣∣2 ≤ ∫ x
0
1ds
∫ x
0
(u′(s))2ds ≤ x
∫ x
0
(u′(s))2ds.
Taking the maximal value of x on the right hand side of this inequality
w.
I am Craig D. I am a Statistics Exam Helper at statisticsexamhelp.com. I hold a Masters' Degree in Statistics, from The University of Queensland. I have been helping students with their exams for the past 9 years. You can hire me to take your exam in Statistics .
Visit statisticsexamhelp.com or email support@statisticsexamhelp.com. You can also call on +1 678 648 4277 for any assistance with the Statistics Exam.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
1. ECE 562: Information Theory Spring 2006
Lecture 4 — February 2
Lecturer: Sergio D. Servetto Scribe: Frank Ciaramello
4.1 Some Useful Information Inequalities
This section proves some useful inequalities that will be used often.
First, we will show that conditioning a random variable cannot increase its entropy. In-
tuitively, this makes sense. The act of conditioning adds information about a particular
random variable. Therefore, the uncertainty must go down (or stay the same, if the condi-
tioning added no information, i.e. the conditioning variable is independent of the random
variable.)
Theorem 4.1. “Conditioning Does Not Increase Entropy”
H(X|Y ) ≤ H(X); for any random variable X, Y (4.1)
Proof:
H(X|Y ) = H(X) − I(X; Y )
I(X; Y ) ≥ 0
∴ H(X|Y ) ≤ H(X)
Two results that can be taken from theorem 4.1 are that equality holds only for the case
of independence and that we can condition on more than one random variable:
1. H(X|Y ) = H(X) ⇐⇒ X and Y are independent
2. H(X|Y Z) ≤ H(X|Y ) ≤ H(X)
The next inequality we will prove shows that mutual entropy can be upper bounded by
the case when each random variable is independent. This means that dependence among
random variables decreases entropy. We can prove it using two different methods.
4-1
2. ECE 562 Lecture 4 — February 2 Spring 2006
Theorem 4.2. “Independence Bound”
H(X1, X2, ..., Xn) ≤
n
i=1
H(Xi) (4.2)
Proof: Method 1 uses the chain rule for entropy.
H(X1, X2, ..., Xn) =
n
i=1
H(Xi|X1...Xi−1) ≤
n
i=1
H(Xi)
Proof: Method 2 expands the entropies and relates them to a relative entropy, or divergence.
n
i=1
H(Xi) − H(X1, ..., Xn) = −
n
i=1
E(log p(Xi)) + E(log p(X1...Xn))
= −E(log p(X1)...p(Xn)) + E(log p(X1...Xn))
= E(log
p(X1...Xn)
p(X1)...p(Xn)
)
= D(p(X1...Xn)||p(X1)...p(Xn)) ≥ 0
4.2 Data Processing Inequality
This section provides the necessary theorems and lemmas to prove the data processing in-
equality.
Theorem 4.3.
I(X; Y, Z) ≥ I(X; Y ) (4.3)
equality holds ⇐⇒ X-Y-Z forms a Markov chain.
Proof: Using the chain rule for mutual information, we show
I(X; Y, Z) = I(X; Y ) + I(X; Z|Y )
≥0
≥ I(X; Y )
4-2
3. ECE 562 Lecture 4 — February 2 Spring 2006
The following theorem, theorem 4.4 shows that the closer in the Markov Chain the
variables are, the more information they share between them. I.e. variables that are far
apart are closer to being independent.
Theorem 4.4. X-Y-Z forms a Markov Chain ⇐⇒
I(X; Z) ≤ I(X; Y ) (4.4)
I(X; Z) ≤ I(Y ; Z) (4.5)
Proof: Prove by expanding mutual information in two different ways.
I(X; Y, Z) = I(X; Z) + I(X; Y |Z)
I(X; Y, Z) = I(X; Y ) + I(X; Z|Y )
By the definition of a Markov chain, X⊥Z|Y , therefore, I(X; Z|Y ) = 0 and
I(X; Y ) = I(X; Z) + I(X; Y |Z)
Mutual information is always greater than or equal to zero, therefore
I(X; Y ) ≥ I(X; Z)
Since X-Y-Z is equivalent to Z-Y-X, the same method can be used to prove (4.5)
Theorem 4.5. “Data Processing Inequality”
If U-X-Y-V is a Markov Chain, then
I(U; V ) ≤ I(X; Y ) (4.6)
Proof: Since U-X-Y-V is a MC, then U-X-Y and X-Y-V are MCs. The proof follows simply
from theorem 4.4
I(U; Y ) ≤ I(X; Y )
I(U; V ) ≤ I(U; Y )
∴ I(U; V ) ≤ I(X; Y )
The data processing inequality shows us that if we want to infer X using Y, the best we
can do is simply to use an unprocessed version of Y. By processing Y (either deterministically
or probabilistically), we increase uncertainty in X, given the processed version of Y.
4-3
4. ECE 562 Lecture 4 — February 2 Spring 2006
4.3 Fano’s Inequality
The following are lemmas and definitions required for Fano’s Inequality.
Lemma 4.6 shows that the entropy of a random variable is always less than or equal to
the log of the size of its alphabet.
Lemma 4.6.
H(X) ≤ log |X| (4.7)
equality holds
⇐⇒ P(X = x) =
1
|X|
, ∀x
Proof: We prove this by expanding the terms into their summations and relating them to
a relative entropy measure.
log |X| − H(X) = −
x∈X
p(x) log |X|−1
+
x∈X
p(x) log p(x)
= −
x∈X
p(x) log u(x) +
x∈X
p(x) log p(x); u(x) =
1
|X|
=
x∈X
p(x) log
p(x)
u(x)
=D(p(x)||q(x)) ≥ 0
One consequence is that equality holds if and only if p(x) = u(x), i.e. p(x) is a uniform
distribution. This says that entropy is maximum when all outcomes are equally likely. This
makes sense, intuitively, since entropy measures uncertainty in the random variable X.
Another consequence is the following corollary:
Corollary 4.7. H(X) can be any non-negative real number.
Proof: The proof follows from the intermediate value theorem. We know that H(X) = 0
for a deterministic signal and H(X) = log |X| for a uniform distribution. For any value
0 < a < log |X|, ∃X such that H(X) = a. For |X| sufficiently large, H(X) can take any
positive value.
Theorem 4.8. “Fano’s Inequality”
4-4
5. ECE 562 Lecture 4 — February 2 Spring 2006
First, we define Pe, probability of error:
Let X, ˆX two random variables on X
Pe = P(X = ˆX) (4.8)
Fano’s Inequality:
H(X| ˆX) ≤ hb(Pe) + Pe log |X| − 1 (4.9)
Proof: We will prove Fano’s inequality by expanding the entropy and by using theorem 4.1.
Define an indicator function: Y =
0, X = ˆX
1, X = ˆX
Note:
p(Y = 1) = Pe
p(Y = 0) = 1 − Pe
H(Y ) = hb(Pe)
H(Y |X, ˆX) = 0
H(X| ˆX) = I(X; Y | ˆX) + H(X| ˆX, Y )
= H(X| ˆX) − H(X| ˆX, Y ) + H(X| ˆX, Y )
= H(Y | ˆX) − H(Y | ˆX, X) + H(X| ˆX, Y )
= H(Y | ˆX) + H(X| ˆX, Y )
≤ H(Y ) + H(X| ˆX, Y )
= H(Y ) +
ˆx∈X
P( ˆX = ˆx, Y = 0)H(X| ˆX = ˆx, Y = 0)
+ P( ˆX = ˆx, Y = 1)H(X| ˆX = ˆx, Y = 1)
Since Y = 0, X = ˆX. Therefore, the first term in the summation is 0:
H(X| ˆX = ˆx, Y = 0) = 0 (4.10)
Lemma 4.6 says that the entropy is less than or equal to the log of the size of the alphabet
of a random variable. Since we know that X = ˆX(Y = 1) then the possible alphabet size
for X is |X| − 1, the original minus the value that ˆX has taken. Therefore,
H(X| ˆX = ˆx, Y = 1) ≤ log(|X| − 1) (4.11)
4-5
6. ECE 562 Lecture 4 — February 2 Spring 2006
Using (4.10) and (4.11), we can show
H(X| ˆX) ≤ hb(Pe) + log(|X| − 1)
ˆx∈X
P( ˆX = ˆx, Y = 1)
p(Y =1)=Pe
H(X| ˆX) ≤ hb(Pe) + Pe log(|X| − 1)
Corollary 4.9. Weak Fano’s Inequality
H(X| ˆX) ≤ 1 + Pe log |X| (4.12)
Proof: We know that binary entropy is upper bounded by 1 and that log is an increasing
function in X , therefore log(|X| − 1) ≤ log(|X|). The corollary is proven.
4-6