SlideShare a Scribd company logo
Noise, Information Theory,
and Entropy
CS414 – Spring 2007
By Roger Cheng
(Huffman coding slides courtesy
of Brian Bailey)
Why study noise?
It’s present in all
systems of interest,
and we have to deal
with it
By knowing its
characteristics, we
can fight it better
Create models to
evaluate analytically
Communication system
abstraction
Information
source
Encoder Modulator
Channel
Output signal Decoder Demodulator
Sender side
Receiver side
The additive noise channel
Transmitted signal s(t)
is corrupted by noise
source n(t), and the
resulting received signal
is r(t)
Noise could result form
many sources, including
electronic components
and transmission
interference
n(t)
+s(t) r(t)
Random processes
A random variable is the result of a single
measurement
A random process is a indexed collection of
random variables, or equivalently a non-
deterministic signal that can be described by
a probability distribution
Noise can be modeled as a random process
WGN (White Gaussian Noise)
Properties
 At each time instant t = t0, the value of n(t)
is normally distributed with mean 0,
variance σ2
(ie E[n(t0)] = 0, E[n(t0)2
] = σ2
)
 At any two different time instants, the
values of n(t) are uncorrelated (ie
E[n(t0)n(tk)] = 0)
 The power spectral density of n(t) has
equal power in all frequency bands
WGN continued
When an additive noise channel has a white
Gaussian noise source, we call it an AWGN
channel
Most frequently used model in
communications
Reasons why we use this model
 It’s easy to understand and compute
 It applies to a broad class of physical channels
Signal energy and power
Energy is defined as
Power is defined as
Most signals are either finite energy and zero
power, or infinite energy and finite power
Noise power is hard to compute in time domain
 Power of WGN is its variance σ2
2
= | ( ) | dtx x tε
∞
−∞
∫
/2
2
/2
1
= lim | ( ) |
T
x
T
T
P x t dt
T→∞
−
∫
Signal to Noise Ratio (SNR)
Defined as the ratio of signal power to the
noise power corrupting the signal
Usually more practical to measure SNR on a
dB scale
Obviously, want as high an SNR as possible
SNR example - Audio
Original sound file is
CD quality (16 bit,
44.1 kHz sampling
rate)
Original 40 dB
20 dB 10 dB
Analog vs. Digital
Analog system
 Any amount of noise will create distortion at the
output
Digital system
 A relatively small amount of noise will cause no
harm at all
 Too much noise will make decoding of received
signal impossible
Both - Goal is to limit effects of noise to a
manageable/satisfactory amount
Information theory and
entropy
Information theory tries to
solve the problem of
communicating as much
data as possible over a
noisy channel
Measure of data is
entropy
Claude Shannon first
demonstrated that
reliable communication
over a noisy channel is
possible (jump-started
digital age)
Entropy definitions
Shannon entropy
Binary entropy formula
Differential entropy
Properties of entropy
Can be defined as the expectation of log p(x)
(ie H(X) = E[-log p(x)])
Is not a function of a variable’s values, is a
function of the variable’s probabilities
Usually measured in “bits” (using logs of base
2) or “nats” (using logs of base e)
Maximized when all values are equally likely
(ie uniform distribution)
Equal to 0 when only one value is possible
 Cannot be negative
Joint and conditional entropy
Joint entropy is the entropy of the
pairing (X,Y)
Conditional entropy is the entropy of X if
the value of Y was known
Relationship between the two
Mutual information
Mutual information is how much
information about X can be obtained by
observing Y
Mathematical model of a
channel
Assume that our input to the channel is
X, and the output is Y
Then the characteristics of the channel
can be defined by its conditional
probability distribution p(y|x)
Channel capacity and rate
Channel capacity is defined as the
maximum possible value of the mutual
information
 We choose the best f(x) to maximize C
For any rate R < C, we can transmit
information with arbitrarily small
probability of error
Binary symmetric channel
Correct bit transmitted with probability 1-p
Wrong bit transmitted with probability p
 Sometimes called “cross-over probability”
Capacity C = 1 - H(p,1-p)
Binary erasure channel
Correct bit transmitted with probability 1-p
“Erasure” transmitted with probability p
Capacity C = 1 - p
Coding theory
Information theory only gives us an upper
bound on communication rate
Need to use coding theory to find a practical
method to achieve a high rate
2 types
 Source coding - Compress source data to a
smaller size
 Channel coding - Adds redundancy bits to make
transmission across noisy channel more robust
Source-channel separation
theorem
Shannon showed that when dealing
with one transmitter and one receiver,
we can break up source coding and
channel coding into separate steps
without loss of optimality
Does not apply when there are multiple
transmitters and/or receivers
 Need to use network information theory
principles in those cases
Huffman Encoding
Use probability distribution to determine
how many bits to use for each symbol
 higher-frequency assigned shorter codes
 entropy-based, block-variable coding
scheme
Huffman Encoding
Produces a code which uses a minimum
number of bits to represent each symbol
 cannot represent same sequence using fewer real
bits per symbol when using code words
 optimal when using code words, but this may differ
slightly from the theoretical lower limit
Build Huffman tree to assign codes
Informal Problem Description
Given a set of symbols from an alphabet and
their probability distribution
 assumes distribution is known and stable
Find a prefix free binary code with minimum
weighted path length
 prefix free means no codeword is a prefix of any
other codeword
Huffman Algorithm
Construct a binary tree of codes
 leaf nodes represent symbols to encode
 interior nodes represent cumulative probability
 edges assigned 0 or 1 output code
Construct the tree bottom-up
 connect the two nodes with the lowest probability
until no more nodes to connect
Huffman Example
Construct the
Huffman coding tree
(in class)
Symbol
(S)
P(S)
A 0.25
B 0.30
C 0.12
D 0.15
E 0.18
Characteristics of Solution
Lowest probability symbol is
always furthest from root
Assignment of 0/1 to children
edges arbitrary
 other solutions possible; lengths
remain the same
 If two nodes have equal
probability, can select any two
Notes
 prefix free code
 O(nlgn) complexity
Symbol
(S)
Code
A 11
B 00
C 010
D 011
E 10
Example Encoding/Decoding
Encode “BEAD”
⇒001011011
⇒Decode “0101100”
Symbol
(S)
Code
A 11
B 00
C 010
D 011
E 10
Entropy (Theoretical Limit)
= -.25 * log2 .25 +
-.30 * log2 .30 +
-.12 * log2 .12 +
-.15 * log2 .15 +
-.18 * log2 .18
H = 2.24 bits
∑=
−=
N
i
ii spspH
1
)(log)( 2
Symbol P(S)
Cod
e
A 0.25 11
B 0.30 00
C 0.12 010
D 0.15 011
E 0.18 10
Average Codeword Length
= .25(2) +
.30(2) +
.12(3) +
.15(3) +
.18(2)
L = 2.27 bits
∑=
=
N
i
ii scodelengthspL
1
)()(
Symbol P(S)
Cod
e
A 0.25 11
B 0.30 00
C 0.12 010
D 0.15 011
E 0.18 10
Code Length Relative to
Entropy
Huffman reaches entropy limit when all
probabilities are negative powers of 2
 i.e., 1/2; 1/4; 1/8; 1/16; etc.
H <= Code Length <= H + 1
∑=
−=
N
i
ii spspH
1
)(log)( 2∑=
=
N
i
ii scodelengthspL
1
)()(
Example
H = -.01*log2.01 +
-.99*log2.99
= .08
L = .01(1) +
.99(1)
= 1
Symbol P(S) Code
A 0.01 1
B 0.99 0
Limitations
Diverges from lower limit when probability of
a particular symbol becomes high
 always uses an integral number of bits
Must send code book with the data
 lowers overall efficiency
Must determine frequency distribution
 must remain stable over the data set

More Related Content

What's hot

TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
Pankaj Debbarma
 
MULTIPLEXER
MULTIPLEXERMULTIPLEXER
MULTIPLEXER
Siddhi Shrivas
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Multiplexers & Demultiplexers
Multiplexers & DemultiplexersMultiplexers & Demultiplexers
Multiplexers & Demultiplexers
Jayanshu Gundaniya
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
sonangrai
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
Madhumita Tamhane
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
Iffat Anjum
 
Basics of labview in analog communication systems
Basics of labview in analog communication systemsBasics of labview in analog communication systems
Basics of labview in analog communication systems
Wriddhirup Dutta
 
TURBO EQUALIZER
TURBO EQUALIZERTURBO EQUALIZER
TURBO EQUALIZER
RUPAK KUMAR GUPTA
 
Tele4653 l9
Tele4653 l9Tele4653 l9
Tele4653 l9Vin Voro
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
Taimoor Muzaffar Gondal
 
8051 Addressing Modes
8051 Addressing Modes8051 Addressing Modes
8051 Addressing Modes
Senthil Kumar
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
East West University
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
praneetayargattikar
 
Information theory
Information theoryInformation theory
Information theory
Madhumita Tamhane
 
Memory mgmt 80386
Memory mgmt 80386Memory mgmt 80386
Memory mgmt 80386
Akshay Nagpurkar
 

What's hot (20)

TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
 
MULTIPLEXER
MULTIPLEXERMULTIPLEXER
MULTIPLEXER
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Multiplexers & Demultiplexers
Multiplexers & DemultiplexersMultiplexers & Demultiplexers
Multiplexers & Demultiplexers
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
 
Channel coding
Channel codingChannel coding
Channel coding
 
error control coding
error control coding error control coding
error control coding
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
Basics of labview in analog communication systems
Basics of labview in analog communication systemsBasics of labview in analog communication systems
Basics of labview in analog communication systems
 
TURBO EQUALIZER
TURBO EQUALIZERTURBO EQUALIZER
TURBO EQUALIZER
 
Tele4653 l9
Tele4653 l9Tele4653 l9
Tele4653 l9
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
 
8051 Addressing Modes
8051 Addressing Modes8051 Addressing Modes
8051 Addressing Modes
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
 
Adders
AddersAdders
Adders
 
Information theory
Information theoryInformation theory
Information theory
 
Memory mgmt 80386
Memory mgmt 80386Memory mgmt 80386
Memory mgmt 80386
 
Linear block code
Linear block codeLinear block code
Linear block code
 

Viewers also liked

Modeling, Control and Optimization for Aerospace Systems
Modeling, Control and Optimization for Aerospace SystemsModeling, Control and Optimization for Aerospace Systems
Modeling, Control and Optimization for Aerospace SystemsBehzad Samadi
 
Analog Communication Apr 2013
Analog Communication Apr 2013Analog Communication Apr 2013
Analog Communication Apr 2013
Paramjeet Singh Jamwal
 
Introducing Myself Through Websites!
Introducing Myself Through Websites!Introducing Myself Through Websites!
Introducing Myself Through Websites!Behzad Samadi
 
Controller Synthesis for Nonholonomic Robots - Japanese
Controller Synthesis for Nonholonomic Robots - JapaneseController Synthesis for Nonholonomic Robots - Japanese
Controller Synthesis for Nonholonomic Robots - JapaneseBehzad Samadi
 
Non Linear and Adaptive Control System JAN 2014
Non Linear and Adaptive Control System JAN 2014Non Linear and Adaptive Control System JAN 2014
Non Linear and Adaptive Control System JAN 2014
Paramjeet Singh Jamwal
 
Recorders
RecordersRecorders
Electronic Measuring Instruments
Electronic Measuring InstrumentsElectronic Measuring Instruments
Electronic Measuring Instruments
Paramjeet Singh Jamwal
 
Introduction to Filters under labVIEW Environment
Introduction to Filters under labVIEW EnvironmentIntroduction to Filters under labVIEW Environment
Introduction to Filters under labVIEW Environment
Paramjeet Singh Jamwal
 

Viewers also liked (8)

Modeling, Control and Optimization for Aerospace Systems
Modeling, Control and Optimization for Aerospace SystemsModeling, Control and Optimization for Aerospace Systems
Modeling, Control and Optimization for Aerospace Systems
 
Analog Communication Apr 2013
Analog Communication Apr 2013Analog Communication Apr 2013
Analog Communication Apr 2013
 
Introducing Myself Through Websites!
Introducing Myself Through Websites!Introducing Myself Through Websites!
Introducing Myself Through Websites!
 
Controller Synthesis for Nonholonomic Robots - Japanese
Controller Synthesis for Nonholonomic Robots - JapaneseController Synthesis for Nonholonomic Robots - Japanese
Controller Synthesis for Nonholonomic Robots - Japanese
 
Non Linear and Adaptive Control System JAN 2014
Non Linear and Adaptive Control System JAN 2014Non Linear and Adaptive Control System JAN 2014
Non Linear and Adaptive Control System JAN 2014
 
Recorders
RecordersRecorders
Recorders
 
Electronic Measuring Instruments
Electronic Measuring InstrumentsElectronic Measuring Instruments
Electronic Measuring Instruments
 
Introduction to Filters under labVIEW Environment
Introduction to Filters under labVIEW EnvironmentIntroduction to Filters under labVIEW Environment
Introduction to Filters under labVIEW Environment
 

Similar to Noise info theory and Entrophy

Lecture1
Lecture1Lecture1
Lecture1ntpc08
 
Vidyalankar final-essentials of communication systems
Vidyalankar final-essentials of communication systemsVidyalankar final-essentials of communication systems
Vidyalankar final-essentials of communication systems
anilkurhekar
 
Unit 5.pdf
Unit 5.pdfUnit 5.pdf
communication system lec2
 communication system lec2 communication system lec2
communication system lec2
ZareenRauf1
 
basicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptxbasicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptx
upendrabhatt13
 
Huffman coding
Huffman codingHuffman coding
Huffman codingGeorge Ang
 
Image compression
Image compressionImage compression
Image compression
Bassam Kanber
 
Audio Signal Processing
Audio Signal Processing Audio Signal Processing
Audio Signal Processing
Ahmed A. Arefin
 
add9.5.ppt
add9.5.pptadd9.5.ppt
add9.5.ppt
AshenafiGirma5
 
Information Theory and coding - Lecture 3
Information Theory and coding - Lecture 3Information Theory and coding - Lecture 3
Information Theory and coding - Lecture 3
Aref35
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
Introduction to Channel Capacity | DCNIT-LDTalks-1
Introduction to Channel Capacity | DCNIT-LDTalks-1Introduction to Channel Capacity | DCNIT-LDTalks-1
Introduction to Channel Capacity | DCNIT-LDTalks-1
Arunabha Saha
 
Radio receiver and information coding .pptx
Radio receiver and information coding .pptxRadio receiver and information coding .pptx
Radio receiver and information coding .pptx
swatihalunde
 
DC Lecture Slides 1 - Information Theory.ppt
DC Lecture Slides 1 - Information Theory.pptDC Lecture Slides 1 - Information Theory.ppt
DC Lecture Slides 1 - Information Theory.ppt
shortstime400
 
Huffman&Shannon-multimedia algorithms.ppt
Huffman&Shannon-multimedia algorithms.pptHuffman&Shannon-multimedia algorithms.ppt
Huffman&Shannon-multimedia algorithms.ppt
PrincessSaro
 

Similar to Noise info theory and Entrophy (20)

Arithmetic Coding
Arithmetic CodingArithmetic Coding
Arithmetic Coding
 
Lecture1
Lecture1Lecture1
Lecture1
 
Vidyalankar final-essentials of communication systems
Vidyalankar final-essentials of communication systemsVidyalankar final-essentials of communication systems
Vidyalankar final-essentials of communication systems
 
Unit 5.pdf
Unit 5.pdfUnit 5.pdf
Unit 5.pdf
 
communication system lec2
 communication system lec2 communication system lec2
communication system lec2
 
basicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptxbasicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptx
 
Huffman coding
Huffman codingHuffman coding
Huffman coding
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Image compression
Image compressionImage compression
Image compression
 
Audio Signal Processing
Audio Signal Processing Audio Signal Processing
Audio Signal Processing
 
Lec5 Compression
Lec5 CompressionLec5 Compression
Lec5 Compression
 
Coding
CodingCoding
Coding
 
add9.5.ppt
add9.5.pptadd9.5.ppt
add9.5.ppt
 
Channel impairments
Channel impairmentsChannel impairments
Channel impairments
 
Information Theory and coding - Lecture 3
Information Theory and coding - Lecture 3Information Theory and coding - Lecture 3
Information Theory and coding - Lecture 3
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Introduction to Channel Capacity | DCNIT-LDTalks-1
Introduction to Channel Capacity | DCNIT-LDTalks-1Introduction to Channel Capacity | DCNIT-LDTalks-1
Introduction to Channel Capacity | DCNIT-LDTalks-1
 
Radio receiver and information coding .pptx
Radio receiver and information coding .pptxRadio receiver and information coding .pptx
Radio receiver and information coding .pptx
 
DC Lecture Slides 1 - Information Theory.ppt
DC Lecture Slides 1 - Information Theory.pptDC Lecture Slides 1 - Information Theory.ppt
DC Lecture Slides 1 - Information Theory.ppt
 
Huffman&Shannon-multimedia algorithms.ppt
Huffman&Shannon-multimedia algorithms.pptHuffman&Shannon-multimedia algorithms.ppt
Huffman&Shannon-multimedia algorithms.ppt
 

More from Izah Asmadi

Aircraft Communication Topic 10 instrument landing systems
Aircraft Communication Topic 10 instrument landing systemsAircraft Communication Topic 10 instrument landing systems
Aircraft Communication Topic 10 instrument landing systems
Izah Asmadi
 
Aircraft Communication Topic 9 vhf omni range (vor)
Aircraft Communication  Topic 9 vhf omni range (vor)Aircraft Communication  Topic 9 vhf omni range (vor)
Aircraft Communication Topic 9 vhf omni range (vor)
Izah Asmadi
 
Aircraft Communication Topic 8 automatic direction finder
Aircraft Communication  Topic 8 automatic direction finderAircraft Communication  Topic 8 automatic direction finder
Aircraft Communication Topic 8 automatic direction finder
Izah Asmadi
 
Aircraft Communication Topic 7 elt, cvr and fdr
Aircraft Communication  Topic 7 elt, cvr and fdrAircraft Communication  Topic 7 elt, cvr and fdr
Aircraft Communication Topic 7 elt, cvr and fdr
Izah Asmadi
 
Aircraft Communication Topic 6 pa system
Aircraft Communication  Topic 6 pa systemAircraft Communication  Topic 6 pa system
Aircraft Communication Topic 6 pa system
Izah Asmadi
 
Aircraft Communication Topic 5 selcal and data link system
Aircraft Communication  Topic 5 selcal and data link systemAircraft Communication  Topic 5 selcal and data link system
Aircraft Communication Topic 5 selcal and data link system
Izah Asmadi
 
Aircraft Communication Topic 4 vhf communication system
Aircraft Communication  Topic 4 vhf communication systemAircraft Communication  Topic 4 vhf communication system
Aircraft Communication Topic 4 vhf communication system
Izah Asmadi
 
Aircraft Communication Topic 4 hf communication system
Aircraft Communication  Topic 4 hf communication systemAircraft Communication  Topic 4 hf communication system
Aircraft Communication Topic 4 hf communication system
Izah Asmadi
 
Aircraft Communication Topic 2 modulation and propagation of radio waves
Aircraft Communication  Topic 2 modulation and propagation of radio wavesAircraft Communication  Topic 2 modulation and propagation of radio waves
Aircraft Communication Topic 2 modulation and propagation of radio waves
Izah Asmadi
 
Topic 1 basic radio wave properties
Topic 1 basic radio wave propertiesTopic 1 basic radio wave properties
Topic 1 basic radio wave properties
Izah Asmadi
 
Aircraft Communication Topic 3 radio components
Aircraft Communication  Topic 3 radio componentsAircraft Communication  Topic 3 radio components
Aircraft Communication Topic 3 radio components
Izah Asmadi
 
Business ethics C8 -ethics_technology
Business ethics C8  -ethics_technologyBusiness ethics C8  -ethics_technology
Business ethics C8 -ethics_technology
Izah Asmadi
 
Business ethics C7 -business_ethics_environmental_issues
Business ethics C7  -business_ethics_environmental_issuesBusiness ethics C7  -business_ethics_environmental_issues
Business ethics C7 -business_ethics_environmental_issues
Izah Asmadi
 
C6 -ethics_and_government_compatibility_mode_
C6  -ethics_and_government_compatibility_mode_C6  -ethics_and_government_compatibility_mode_
C6 -ethics_and_government_compatibility_mode_
Izah Asmadi
 
Business ethics C5 -organizational_ethics_compatibility_mode_
Business ethics C5  -organizational_ethics_compatibility_mode_Business ethics C5  -organizational_ethics_compatibility_mode_
Business ethics C5 -organizational_ethics_compatibility_mode_
Izah Asmadi
 
Business ethics C4 -corporate_social_responsibility_compatibility_mode_
Business ethics C4  -corporate_social_responsibility_compatibility_mode_Business ethics C4  -corporate_social_responsibility_compatibility_mode_
Business ethics C4 -corporate_social_responsibility_compatibility_mode_
Izah Asmadi
 
Business ethics C3 theories principles in_business_ethics
Business ethics C3 theories principles in_business_ethicsBusiness ethics C3 theories principles in_business_ethics
Business ethics C3 theories principles in_business_ethics
Izah Asmadi
 
Business ethics C1 -moral_ethics_ethical_dilemma
Business ethics C1  -moral_ethics_ethical_dilemmaBusiness ethics C1  -moral_ethics_ethical_dilemma
Business ethics C1 -moral_ethics_ethical_dilemma
Izah Asmadi
 
Business ethics C2 -business_and_society
Business ethics C2  -business_and_societyBusiness ethics C2  -business_and_society
Business ethics C2 -business_and_society
Izah Asmadi
 
Project Management Ch11 Project Scheduling Critical Chain
Project Management Ch11 Project Scheduling Critical ChainProject Management Ch11 Project Scheduling Critical Chain
Project Management Ch11 Project Scheduling Critical ChainIzah Asmadi
 

More from Izah Asmadi (20)

Aircraft Communication Topic 10 instrument landing systems
Aircraft Communication Topic 10 instrument landing systemsAircraft Communication Topic 10 instrument landing systems
Aircraft Communication Topic 10 instrument landing systems
 
Aircraft Communication Topic 9 vhf omni range (vor)
Aircraft Communication  Topic 9 vhf omni range (vor)Aircraft Communication  Topic 9 vhf omni range (vor)
Aircraft Communication Topic 9 vhf omni range (vor)
 
Aircraft Communication Topic 8 automatic direction finder
Aircraft Communication  Topic 8 automatic direction finderAircraft Communication  Topic 8 automatic direction finder
Aircraft Communication Topic 8 automatic direction finder
 
Aircraft Communication Topic 7 elt, cvr and fdr
Aircraft Communication  Topic 7 elt, cvr and fdrAircraft Communication  Topic 7 elt, cvr and fdr
Aircraft Communication Topic 7 elt, cvr and fdr
 
Aircraft Communication Topic 6 pa system
Aircraft Communication  Topic 6 pa systemAircraft Communication  Topic 6 pa system
Aircraft Communication Topic 6 pa system
 
Aircraft Communication Topic 5 selcal and data link system
Aircraft Communication  Topic 5 selcal and data link systemAircraft Communication  Topic 5 selcal and data link system
Aircraft Communication Topic 5 selcal and data link system
 
Aircraft Communication Topic 4 vhf communication system
Aircraft Communication  Topic 4 vhf communication systemAircraft Communication  Topic 4 vhf communication system
Aircraft Communication Topic 4 vhf communication system
 
Aircraft Communication Topic 4 hf communication system
Aircraft Communication  Topic 4 hf communication systemAircraft Communication  Topic 4 hf communication system
Aircraft Communication Topic 4 hf communication system
 
Aircraft Communication Topic 2 modulation and propagation of radio waves
Aircraft Communication  Topic 2 modulation and propagation of radio wavesAircraft Communication  Topic 2 modulation and propagation of radio waves
Aircraft Communication Topic 2 modulation and propagation of radio waves
 
Topic 1 basic radio wave properties
Topic 1 basic radio wave propertiesTopic 1 basic radio wave properties
Topic 1 basic radio wave properties
 
Aircraft Communication Topic 3 radio components
Aircraft Communication  Topic 3 radio componentsAircraft Communication  Topic 3 radio components
Aircraft Communication Topic 3 radio components
 
Business ethics C8 -ethics_technology
Business ethics C8  -ethics_technologyBusiness ethics C8  -ethics_technology
Business ethics C8 -ethics_technology
 
Business ethics C7 -business_ethics_environmental_issues
Business ethics C7  -business_ethics_environmental_issuesBusiness ethics C7  -business_ethics_environmental_issues
Business ethics C7 -business_ethics_environmental_issues
 
C6 -ethics_and_government_compatibility_mode_
C6  -ethics_and_government_compatibility_mode_C6  -ethics_and_government_compatibility_mode_
C6 -ethics_and_government_compatibility_mode_
 
Business ethics C5 -organizational_ethics_compatibility_mode_
Business ethics C5  -organizational_ethics_compatibility_mode_Business ethics C5  -organizational_ethics_compatibility_mode_
Business ethics C5 -organizational_ethics_compatibility_mode_
 
Business ethics C4 -corporate_social_responsibility_compatibility_mode_
Business ethics C4  -corporate_social_responsibility_compatibility_mode_Business ethics C4  -corporate_social_responsibility_compatibility_mode_
Business ethics C4 -corporate_social_responsibility_compatibility_mode_
 
Business ethics C3 theories principles in_business_ethics
Business ethics C3 theories principles in_business_ethicsBusiness ethics C3 theories principles in_business_ethics
Business ethics C3 theories principles in_business_ethics
 
Business ethics C1 -moral_ethics_ethical_dilemma
Business ethics C1  -moral_ethics_ethical_dilemmaBusiness ethics C1  -moral_ethics_ethical_dilemma
Business ethics C1 -moral_ethics_ethical_dilemma
 
Business ethics C2 -business_and_society
Business ethics C2  -business_and_societyBusiness ethics C2  -business_and_society
Business ethics C2 -business_and_society
 
Project Management Ch11 Project Scheduling Critical Chain
Project Management Ch11 Project Scheduling Critical ChainProject Management Ch11 Project Scheduling Critical Chain
Project Management Ch11 Project Scheduling Critical Chain
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Noise info theory and Entrophy

  • 1. Noise, Information Theory, and Entropy CS414 – Spring 2007 By Roger Cheng (Huffman coding slides courtesy of Brian Bailey)
  • 2. Why study noise? It’s present in all systems of interest, and we have to deal with it By knowing its characteristics, we can fight it better Create models to evaluate analytically
  • 4. The additive noise channel Transmitted signal s(t) is corrupted by noise source n(t), and the resulting received signal is r(t) Noise could result form many sources, including electronic components and transmission interference n(t) +s(t) r(t)
  • 5. Random processes A random variable is the result of a single measurement A random process is a indexed collection of random variables, or equivalently a non- deterministic signal that can be described by a probability distribution Noise can be modeled as a random process
  • 6. WGN (White Gaussian Noise) Properties  At each time instant t = t0, the value of n(t) is normally distributed with mean 0, variance σ2 (ie E[n(t0)] = 0, E[n(t0)2 ] = σ2 )  At any two different time instants, the values of n(t) are uncorrelated (ie E[n(t0)n(tk)] = 0)  The power spectral density of n(t) has equal power in all frequency bands
  • 7. WGN continued When an additive noise channel has a white Gaussian noise source, we call it an AWGN channel Most frequently used model in communications Reasons why we use this model  It’s easy to understand and compute  It applies to a broad class of physical channels
  • 8. Signal energy and power Energy is defined as Power is defined as Most signals are either finite energy and zero power, or infinite energy and finite power Noise power is hard to compute in time domain  Power of WGN is its variance σ2 2 = | ( ) | dtx x tε ∞ −∞ ∫ /2 2 /2 1 = lim | ( ) | T x T T P x t dt T→∞ − ∫
  • 9. Signal to Noise Ratio (SNR) Defined as the ratio of signal power to the noise power corrupting the signal Usually more practical to measure SNR on a dB scale Obviously, want as high an SNR as possible
  • 10. SNR example - Audio Original sound file is CD quality (16 bit, 44.1 kHz sampling rate) Original 40 dB 20 dB 10 dB
  • 11. Analog vs. Digital Analog system  Any amount of noise will create distortion at the output Digital system  A relatively small amount of noise will cause no harm at all  Too much noise will make decoding of received signal impossible Both - Goal is to limit effects of noise to a manageable/satisfactory amount
  • 12. Information theory and entropy Information theory tries to solve the problem of communicating as much data as possible over a noisy channel Measure of data is entropy Claude Shannon first demonstrated that reliable communication over a noisy channel is possible (jump-started digital age)
  • 13. Entropy definitions Shannon entropy Binary entropy formula Differential entropy
  • 14. Properties of entropy Can be defined as the expectation of log p(x) (ie H(X) = E[-log p(x)]) Is not a function of a variable’s values, is a function of the variable’s probabilities Usually measured in “bits” (using logs of base 2) or “nats” (using logs of base e) Maximized when all values are equally likely (ie uniform distribution) Equal to 0 when only one value is possible  Cannot be negative
  • 15. Joint and conditional entropy Joint entropy is the entropy of the pairing (X,Y) Conditional entropy is the entropy of X if the value of Y was known Relationship between the two
  • 16. Mutual information Mutual information is how much information about X can be obtained by observing Y
  • 17. Mathematical model of a channel Assume that our input to the channel is X, and the output is Y Then the characteristics of the channel can be defined by its conditional probability distribution p(y|x)
  • 18. Channel capacity and rate Channel capacity is defined as the maximum possible value of the mutual information  We choose the best f(x) to maximize C For any rate R < C, we can transmit information with arbitrarily small probability of error
  • 19. Binary symmetric channel Correct bit transmitted with probability 1-p Wrong bit transmitted with probability p  Sometimes called “cross-over probability” Capacity C = 1 - H(p,1-p)
  • 20. Binary erasure channel Correct bit transmitted with probability 1-p “Erasure” transmitted with probability p Capacity C = 1 - p
  • 21. Coding theory Information theory only gives us an upper bound on communication rate Need to use coding theory to find a practical method to achieve a high rate 2 types  Source coding - Compress source data to a smaller size  Channel coding - Adds redundancy bits to make transmission across noisy channel more robust
  • 22. Source-channel separation theorem Shannon showed that when dealing with one transmitter and one receiver, we can break up source coding and channel coding into separate steps without loss of optimality Does not apply when there are multiple transmitters and/or receivers  Need to use network information theory principles in those cases
  • 23. Huffman Encoding Use probability distribution to determine how many bits to use for each symbol  higher-frequency assigned shorter codes  entropy-based, block-variable coding scheme
  • 24. Huffman Encoding Produces a code which uses a minimum number of bits to represent each symbol  cannot represent same sequence using fewer real bits per symbol when using code words  optimal when using code words, but this may differ slightly from the theoretical lower limit Build Huffman tree to assign codes
  • 25. Informal Problem Description Given a set of symbols from an alphabet and their probability distribution  assumes distribution is known and stable Find a prefix free binary code with minimum weighted path length  prefix free means no codeword is a prefix of any other codeword
  • 26. Huffman Algorithm Construct a binary tree of codes  leaf nodes represent symbols to encode  interior nodes represent cumulative probability  edges assigned 0 or 1 output code Construct the tree bottom-up  connect the two nodes with the lowest probability until no more nodes to connect
  • 27. Huffman Example Construct the Huffman coding tree (in class) Symbol (S) P(S) A 0.25 B 0.30 C 0.12 D 0.15 E 0.18
  • 28. Characteristics of Solution Lowest probability symbol is always furthest from root Assignment of 0/1 to children edges arbitrary  other solutions possible; lengths remain the same  If two nodes have equal probability, can select any two Notes  prefix free code  O(nlgn) complexity Symbol (S) Code A 11 B 00 C 010 D 011 E 10
  • 29. Example Encoding/Decoding Encode “BEAD” ⇒001011011 ⇒Decode “0101100” Symbol (S) Code A 11 B 00 C 010 D 011 E 10
  • 30. Entropy (Theoretical Limit) = -.25 * log2 .25 + -.30 * log2 .30 + -.12 * log2 .12 + -.15 * log2 .15 + -.18 * log2 .18 H = 2.24 bits ∑= −= N i ii spspH 1 )(log)( 2 Symbol P(S) Cod e A 0.25 11 B 0.30 00 C 0.12 010 D 0.15 011 E 0.18 10
  • 31. Average Codeword Length = .25(2) + .30(2) + .12(3) + .15(3) + .18(2) L = 2.27 bits ∑= = N i ii scodelengthspL 1 )()( Symbol P(S) Cod e A 0.25 11 B 0.30 00 C 0.12 010 D 0.15 011 E 0.18 10
  • 32. Code Length Relative to Entropy Huffman reaches entropy limit when all probabilities are negative powers of 2  i.e., 1/2; 1/4; 1/8; 1/16; etc. H <= Code Length <= H + 1 ∑= −= N i ii spspH 1 )(log)( 2∑= = N i ii scodelengthspL 1 )()(
  • 33. Example H = -.01*log2.01 + -.99*log2.99 = .08 L = .01(1) + .99(1) = 1 Symbol P(S) Code A 0.01 1 B 0.99 0
  • 34. Limitations Diverges from lower limit when probability of a particular symbol becomes high  always uses an integral number of bits Must send code book with the data  lowers overall efficiency Must determine frequency distribution  must remain stable over the data set