SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Ma Yihsin, 04 June
The Shannon Channel
Coding Theorem
Content
Shamonlhe Gding Theorem coptiy
Channel Coding Theorem
Mavk Wilde Chap 2.22 , Chap 14
Cover,
Thomas Chap 7.7 .
CQ Channel Coding Theorem
Hayashi Chap 8
Entropy ,
Mutual Information ( Classical )
Givenarandomuariabe Xanditsdistribution Rl 。
) ,
1 1 11
howtoquantifythe surprisenesslīnfomation )
wegetatthemomentweknowXEX ? Ansi Entropy ! !
•
Entropyof X : H (X) : = [
Blxixjlog
1
-71EX Prlx= X
)
•
londitionalentropyofx.Y.INotethati HMX ) 三
Hly
HMYKEYIHMY:D) =
前 無Blxixnmglyl
.
Mutual Informationof
XY
xz.chamelO-iPIMYHHIN-HMYIHMNoteth.atHMY) ⼆
Hly knowing
Themutualinformation HMYI Y
圓 ⼯ 必 炒
鼠器。
幾恐器品蕊紫 穆_
.in
iiiǘi焱 ⼼ 州 州 州州
ÒOIlxj Y ) = I M i X ) 品 , Y ) 、
The Channel Gding Problem Discrete Memisschannel
l DMS ) N : = plylx)
decodernn.it#O'-T-nCoderateR-f.Error
probabilitgiR-P.im#injShannon'squestioniWhatisthemaxcoderate
Ésuchthatlim pě
) *
= o ?
Isthereasequenceofhtoo
maximal.li?n)coaekiii'Dnexists?
Arate Ris
"
achievable
"
if 彐
{( ⼼, D
(
以及
⼦ eīm Pě
"
= 0 .
pǒnmiPrlhmlhsao
Channel Capacity CW) : ⼆
SUPIRIR isachivable}
S
hannonschannelcapacitytheorem.letN-Pylylxjisac.lassicalchannel
(W) =
max Ilx ; Y ) = : I W)
Wewantto Pxlx) Interpretation : IcxjY )
lstleamowwtofinfocho.se
prob-s-nofxwhichcanbeinferfromY.infotsiiir
Wecansplitthetheoremintotwopart
II) Thedīrectcodingtheorem
Fora DMCN ,
allrates R below IW)
isachievable.ern-o.c.n.se/-ofachievablerates-nInsCWRIW )I W)
(⼆) Theconversetheorem
Ifareliablesequenceofli只 )
codesexisttetherateRofthesequenceofc.desislessthan IW)
[ -
ˋ ˋ _ _ _ _
. n e t CCN) EIW)
Ìm
Typicakty
WeaklawoflargenumbeiletfS-IRwithfilflsnjc.no
È 三点 fcs :)
⼀⽇
yfls》
⇐> H > 0
,
比 E (0,1 ),
⼆ hothz.no
Prli 三点 fcsi) EGHSD-8.IT》 +8 ] } = 1 -
E
Nowweconsiderflsi ) =
logfy
V 870,
limprlliilog点,
⼀
Esllog 前) 1 _
< S } = 1
MN cnn.no
lnersampleentropyĀlsn) Hls)
Apartīcularsequencesn
isatypialsequenceifītssampleentropyÀlsnjisdosetotheentropy HIS )
letS~R.li )
5 e 5
isaf.typicalsequenceiffliilogf.tl( S ) 1 : 8
sn
The S-typicalsetfg-ISEShlsnisgtypi.at
withrespectto S } ,
Propertiesoftgpicalset
① Unitprobabilīty
比 ⼼ 1),
以 0
,
largeenoughn.ph ET⾏ = 1 -
E
②
Exponentiallysmallcardinalitglijl-iznHDVEEIQD.largen.ltDznl
HD-8 )
: 1 Tjkzhl
H +8 )
PMEsyiz.tn
Hcs )
、
③ Equīpartitionivsn ETja_znl.gl
xli"
器{哵
""" 打 50。 站 𠴕
Conditional
Typicalset.considertwovariablex.Ywherex~RM.Y~PrlYlxjthef.conditional typical set isdefinedas
Tì
"
住 Ijiihg,
花⼀
⼀
HMX ) 1 三 8
}
ftp.yongwithcardinalityznloglylwithcardinalityiznHMX)
Propertiesofonditionaltgpicalset
② Unitprobabilitg
UEE ⼼ 1 ) , 870 ,
Iargen Exn {Pryxn METJ
"
}} : 1 -
E
② Exponentidlysmallercardinaliy Kjlxhl 三 zn
HMX)
HjMkzhl
HMX ) +8 )
,
EHHMYJ zlrcjznlHMXM
③ Equipartition Ruxnlynlxh) 三
z-nHMDz-nlHMXHSIEPYM.lynlxyszhlHMXH )
Proofofthe Directpart .
Formdy : Fora DMCM Vrate RRIW)
⼆ aseqoflzhR.ru ) codeswīthmaxerrprob
*
oiputtypical
Pe以 ⼆
miPrliimj.es
0
seauenceh→ N
Overviewoftheproof
->
斷節:恐是
iiiiiif2
"
是 zn
HN )
Üx)
⼆ zh
Ilxiy
Thefdlowingpnofisreferedfrom Markwildésbok .
」
- _ -
randomlgselectuniformy
acode-tr-PMxjdecoderii.itÜto-_-
Trahdomnesscstept) randomyselectacodebook ?20 Whyrandomcode ?
e =
[
⼤ ⼝) ,
如 ⼼ ,
- _ -
,
Xnczj
_
codewordtrimsg I
x.li ) , _ _ _ _ .
Xnl2"3 -0
formsg 2
"
?
let Pxcx) istheprobdistthatmax IMY)
each
Xilj) ofeisiid.se/ectedfromyx)
lstepz )
Gding
Alie Sends
Xncmjīutothechannel 。
( Step 3 ) Decoding Bobrecēwesywfromthechanneloutput
Then Bobhastodothefollowingtests
② WhetheryhETYorrespondingtoR.ly) =
f[Pylylxj
If yna TY reporterror
② Checkwhether ⼆
someintjETYNnIfisuc.hnreport 不
If ⺺ Such 不 reporterror (I )
If 彐 肛, inandh 千 元 reporterrorg
Define 3 kindoferrorevents ,
Eolm ) :
yna TY
am )
iyhETY.yhqfjxhlmlczlmiiynETY.am4 miyne 壪
⼼以
Theexpectatiowofaverageerrorprob.is
成 ⼀ Ec 偷 丟 Prkolm)
UE.cm?UEzlmBWlOG-nr.2
= Ec Pri Eoll ) UEHDU 92 ( 1 ) }
EIEPrkillBThisgivetheanswerofl.tl0
Let IA (X ) ⼆ ⼆ ( XEA )
Focuson 9。 ( I ) :
Ecpr化 𠮨} =
Exnnyn { 1 -
Iij M ) }
= 1 -
Eyn { Iij M ) } =
BIYGTY} f
Focuson E.CI ) :
因為 typicalseq 7占 pnob 很 ⼤
ˊ
E I
E {Prlc )}} =
EnniilfjhllIyxn, ⼼ ) }
E E
… ( 喊ùii
" "
} ] E E
Focusonhll ) :
EIR 192 𠮨 了 = Ec,
及 Iji Iuīynmilyn) }
m⽜ 1
EEc.nl Iiynly以
密Iiiicmilyn ) }
⼆
距回去啊 怔 的 ⽔ 啊 𠮩
⼆產, 㮺,yn Pxnynlilmhjkyyh) Iyjicmilyn )
11 independent
Rnlxinpnlj )
Rnlxinpnlj ) Iyyh) Iijxnmilyn )⼆
蝱 㮺,yn
enrnnlnzhCHCYj-SJ.equipartition.EE以
8点iìnlxinj Iiitnyn )
Nlnnenen Fnenn
蝱⼯ ⼆ IMI -1 Hjhynki
比比州
Ei
呧以 8了
ㄝ比比州
mki
叿比川 -28了
Ml
因为要證 uxil ) 的 aohievabiliy .
= i
吐⼼ 以
2811叫 l
Ifwechoose kukzh
(⼯ ⼼ ㄚ ) -
3 8 ]
EIRIGCIB } : 2
8
TheaverageerrorprobabilityTYEZE.tt :
E
'
刪去
Doingexpurgatiow original 12㕧 n ) code
,
在 ⼼
throwouthalfofcodewords-tlzhlRF.nl ǗWKZE
original
expurgatiowrate.IN)-38
,
感 i rate = ⼯⼼ ㄚ ) -38 ,
ÜUK
Letg != 3 8 + i .
E
'
- 2[ +2
的
whereccanbechosenarbitraysmanaslongasnislargeenough.fincewechoose Pxlx) =
argmax IMY )
Wehavealn.IN )-
S
'
,
2 E
'
) channelode
⼆
7 IMY )
hereisfgi.EE
lo.it/andlargeenoughn.equaltoHenceIW)isanachievablerate IWI ⼀

Más contenido relacionado

La actualidad más candente

TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Clustering: Large Databases in data mining
Clustering: Large Databases in data miningClustering: Large Databases in data mining
Clustering: Large Databases in data miningZHAO Sam
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
system interconnect architectures in ACA
system interconnect architectures in ACAsystem interconnect architectures in ACA
system interconnect architectures in ACAPankaj Kumar Jain
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionVipin Tejwani
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSKrishna Nanda
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2YooGenelyn
 
Lecture 3 parallel programming platforms
Lecture 3   parallel programming platformsLecture 3   parallel programming platforms
Lecture 3 parallel programming platformsVajira Thambawita
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryptionRashmi Burugupalli
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherAashirwad Kashyap
 

La actualidad más candente (20)

TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Clustering: Large Databases in data mining
Clustering: Large Databases in data miningClustering: Large Databases in data mining
Clustering: Large Databases in data mining
 
Cryptography
CryptographyCryptography
Cryptography
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
system interconnect architectures in ACA
system interconnect architectures in ACAsystem interconnect architectures in ACA
system interconnect architectures in ACA
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Transport layer
Transport layerTransport layer
Transport layer
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
 
Scope of parallelism
Scope of parallelismScope of parallelism
Scope of parallelism
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2
 
Lecture 3 parallel programming platforms
Lecture 3   parallel programming platformsLecture 3   parallel programming platforms
Lecture 3 parallel programming platforms
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 

Más de JamesMa54

Foodie 餐廳推薦系統
Foodie 餐廳推薦系統Foodie 餐廳推薦系統
Foodie 餐廳推薦系統JamesMa54
 
Classical communication over quantum channel
Classical communication over quantum channelClassical communication over quantum channel
Classical communication over quantum channelJamesMa54
 
Solving the energy problem of helium final report
Solving the energy problem of helium final reportSolving the energy problem of helium final report
Solving the energy problem of helium final reportJamesMa54
 
Exact synthesis of unitaries generated by Clifford and T gates
Exact synthesis of unitaries generated by Clifford and T gatesExact synthesis of unitaries generated by Clifford and T gates
Exact synthesis of unitaries generated by Clifford and T gatesJamesMa54
 
Fast and efficient exact synthesis of single qubit unitaries generated by cli...
Fast and efficient exact synthesis of single qubit unitaries generated by cli...Fast and efficient exact synthesis of single qubit unitaries generated by cli...
Fast and efficient exact synthesis of single qubit unitaries generated by cli...JamesMa54
 
Solovay Kitaev theorem
Solovay Kitaev theoremSolovay Kitaev theorem
Solovay Kitaev theoremJamesMa54
 
Visual cryptography using pixels partition
Visual cryptography using pixels partition Visual cryptography using pixels partition
Visual cryptography using pixels partition JamesMa54
 
Solving ode problem using the Galerkin's method
Solving ode problem using the Galerkin's methodSolving ode problem using the Galerkin's method
Solving ode problem using the Galerkin's methodJamesMa54
 

Más de JamesMa54 (8)

Foodie 餐廳推薦系統
Foodie 餐廳推薦系統Foodie 餐廳推薦系統
Foodie 餐廳推薦系統
 
Classical communication over quantum channel
Classical communication over quantum channelClassical communication over quantum channel
Classical communication over quantum channel
 
Solving the energy problem of helium final report
Solving the energy problem of helium final reportSolving the energy problem of helium final report
Solving the energy problem of helium final report
 
Exact synthesis of unitaries generated by Clifford and T gates
Exact synthesis of unitaries generated by Clifford and T gatesExact synthesis of unitaries generated by Clifford and T gates
Exact synthesis of unitaries generated by Clifford and T gates
 
Fast and efficient exact synthesis of single qubit unitaries generated by cli...
Fast and efficient exact synthesis of single qubit unitaries generated by cli...Fast and efficient exact synthesis of single qubit unitaries generated by cli...
Fast and efficient exact synthesis of single qubit unitaries generated by cli...
 
Solovay Kitaev theorem
Solovay Kitaev theoremSolovay Kitaev theorem
Solovay Kitaev theorem
 
Visual cryptography using pixels partition
Visual cryptography using pixels partition Visual cryptography using pixels partition
Visual cryptography using pixels partition
 
Solving ode problem using the Galerkin's method
Solving ode problem using the Galerkin's methodSolving ode problem using the Galerkin's method
Solving ode problem using the Galerkin's method
 

Último

Charateristics of the Angara-A5 spacecraft launched from the Vostochny Cosmod...
Charateristics of the Angara-A5 spacecraft launched from the Vostochny Cosmod...Charateristics of the Angara-A5 spacecraft launched from the Vostochny Cosmod...
Charateristics of the Angara-A5 spacecraft launched from the Vostochny Cosmod...Christina Parmionova
 
ESSENTIAL FEATURES REQUIRED FOR ESTABLISHING FOUR TYPES OF BIOSAFETY LABORATO...
ESSENTIAL FEATURES REQUIRED FOR ESTABLISHING FOUR TYPES OF BIOSAFETY LABORATO...ESSENTIAL FEATURES REQUIRED FOR ESTABLISHING FOUR TYPES OF BIOSAFETY LABORATO...
ESSENTIAL FEATURES REQUIRED FOR ESTABLISHING FOUR TYPES OF BIOSAFETY LABORATO...Chayanika Das
 
Science (Communication) and Wikipedia - Potentials and Pitfalls
Science (Communication) and Wikipedia - Potentials and PitfallsScience (Communication) and Wikipedia - Potentials and Pitfalls
Science (Communication) and Wikipedia - Potentials and PitfallsDobusch Leonhard
 
Timeless Cosmology: Towards a Geometric Origin of Cosmological Correlations
Timeless Cosmology: Towards a Geometric Origin of Cosmological CorrelationsTimeless Cosmology: Towards a Geometric Origin of Cosmological Correlations
Timeless Cosmology: Towards a Geometric Origin of Cosmological CorrelationsDanielBaumann11
 
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024Jene van der Heide
 
Combining Asynchronous Task Parallelism and Intel SGX for Secure Deep Learning
Combining Asynchronous Task Parallelism and Intel SGX for Secure Deep LearningCombining Asynchronous Task Parallelism and Intel SGX for Secure Deep Learning
Combining Asynchronous Task Parallelism and Intel SGX for Secure Deep Learningvschiavoni
 
CHROMATOGRAPHY PALLAVI RAWAT.pptx
CHROMATOGRAPHY  PALLAVI RAWAT.pptxCHROMATOGRAPHY  PALLAVI RAWAT.pptx
CHROMATOGRAPHY PALLAVI RAWAT.pptxpallavirawat456
 
Probability.pptx, Types of Probability, UG
Probability.pptx, Types of Probability, UGProbability.pptx, Types of Probability, UG
Probability.pptx, Types of Probability, UGSoniaBajaj10
 
DNA isolation molecular biology practical.pptx
DNA isolation molecular biology practical.pptxDNA isolation molecular biology practical.pptx
DNA isolation molecular biology practical.pptxGiDMOh
 
6.2 Pests of Sesame_Identification_Binomics_Dr.UPR
6.2 Pests of Sesame_Identification_Binomics_Dr.UPR6.2 Pests of Sesame_Identification_Binomics_Dr.UPR
6.2 Pests of Sesame_Identification_Binomics_Dr.UPRPirithiRaju
 
Observational constraints on mergers creating magnetism in massive stars
Observational constraints on mergers creating magnetism in massive starsObservational constraints on mergers creating magnetism in massive stars
Observational constraints on mergers creating magnetism in massive starsSérgio Sacani
 
Introduction of Human Body & Structure of cell.pptx
Introduction of Human Body & Structure of cell.pptxIntroduction of Human Body & Structure of cell.pptx
Introduction of Human Body & Structure of cell.pptxMedical College
 
DETECTION OF MUTATION BY CLB METHOD.pptx
DETECTION OF MUTATION BY CLB METHOD.pptxDETECTION OF MUTATION BY CLB METHOD.pptx
DETECTION OF MUTATION BY CLB METHOD.pptx201bo007
 
EGYPTIAN IMPRINT IN SPAIN Lecture by Dr Abeer Zahana
EGYPTIAN IMPRINT IN SPAIN Lecture by Dr Abeer ZahanaEGYPTIAN IMPRINT IN SPAIN Lecture by Dr Abeer Zahana
EGYPTIAN IMPRINT IN SPAIN Lecture by Dr Abeer ZahanaDr.Mahmoud Abbas
 
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxGENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxRitchAndruAgustin
 
Environmental acoustics- noise criteria.pptx
Environmental acoustics- noise criteria.pptxEnvironmental acoustics- noise criteria.pptx
Environmental acoustics- noise criteria.pptxpriyankatabhane
 
cybrids.pptx production_advanges_limitation
cybrids.pptx production_advanges_limitationcybrids.pptx production_advanges_limitation
cybrids.pptx production_advanges_limitationSanghamitraMohapatra5
 
Measures of Central Tendency.pptx for UG
Measures of Central Tendency.pptx for UGMeasures of Central Tendency.pptx for UG
Measures of Central Tendency.pptx for UGSoniaBajaj10
 
Oxo-Acids of Halogens and their Salts.pptx
Oxo-Acids of Halogens and their Salts.pptxOxo-Acids of Halogens and their Salts.pptx
Oxo-Acids of Halogens and their Salts.pptxfarhanvvdk
 

Último (20)

Ultrastructure and functions of Chloroplast.pptx
Ultrastructure and functions of Chloroplast.pptxUltrastructure and functions of Chloroplast.pptx
Ultrastructure and functions of Chloroplast.pptx
 
Charateristics of the Angara-A5 spacecraft launched from the Vostochny Cosmod...
Charateristics of the Angara-A5 spacecraft launched from the Vostochny Cosmod...Charateristics of the Angara-A5 spacecraft launched from the Vostochny Cosmod...
Charateristics of the Angara-A5 spacecraft launched from the Vostochny Cosmod...
 
ESSENTIAL FEATURES REQUIRED FOR ESTABLISHING FOUR TYPES OF BIOSAFETY LABORATO...
ESSENTIAL FEATURES REQUIRED FOR ESTABLISHING FOUR TYPES OF BIOSAFETY LABORATO...ESSENTIAL FEATURES REQUIRED FOR ESTABLISHING FOUR TYPES OF BIOSAFETY LABORATO...
ESSENTIAL FEATURES REQUIRED FOR ESTABLISHING FOUR TYPES OF BIOSAFETY LABORATO...
 
Science (Communication) and Wikipedia - Potentials and Pitfalls
Science (Communication) and Wikipedia - Potentials and PitfallsScience (Communication) and Wikipedia - Potentials and Pitfalls
Science (Communication) and Wikipedia - Potentials and Pitfalls
 
Timeless Cosmology: Towards a Geometric Origin of Cosmological Correlations
Timeless Cosmology: Towards a Geometric Origin of Cosmological CorrelationsTimeless Cosmology: Towards a Geometric Origin of Cosmological Correlations
Timeless Cosmology: Towards a Geometric Origin of Cosmological Correlations
 
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
 
Combining Asynchronous Task Parallelism and Intel SGX for Secure Deep Learning
Combining Asynchronous Task Parallelism and Intel SGX for Secure Deep LearningCombining Asynchronous Task Parallelism and Intel SGX for Secure Deep Learning
Combining Asynchronous Task Parallelism and Intel SGX for Secure Deep Learning
 
CHROMATOGRAPHY PALLAVI RAWAT.pptx
CHROMATOGRAPHY  PALLAVI RAWAT.pptxCHROMATOGRAPHY  PALLAVI RAWAT.pptx
CHROMATOGRAPHY PALLAVI RAWAT.pptx
 
Probability.pptx, Types of Probability, UG
Probability.pptx, Types of Probability, UGProbability.pptx, Types of Probability, UG
Probability.pptx, Types of Probability, UG
 
DNA isolation molecular biology practical.pptx
DNA isolation molecular biology practical.pptxDNA isolation molecular biology practical.pptx
DNA isolation molecular biology practical.pptx
 
6.2 Pests of Sesame_Identification_Binomics_Dr.UPR
6.2 Pests of Sesame_Identification_Binomics_Dr.UPR6.2 Pests of Sesame_Identification_Binomics_Dr.UPR
6.2 Pests of Sesame_Identification_Binomics_Dr.UPR
 
Observational constraints on mergers creating magnetism in massive stars
Observational constraints on mergers creating magnetism in massive starsObservational constraints on mergers creating magnetism in massive stars
Observational constraints on mergers creating magnetism in massive stars
 
Introduction of Human Body & Structure of cell.pptx
Introduction of Human Body & Structure of cell.pptxIntroduction of Human Body & Structure of cell.pptx
Introduction of Human Body & Structure of cell.pptx
 
DETECTION OF MUTATION BY CLB METHOD.pptx
DETECTION OF MUTATION BY CLB METHOD.pptxDETECTION OF MUTATION BY CLB METHOD.pptx
DETECTION OF MUTATION BY CLB METHOD.pptx
 
EGYPTIAN IMPRINT IN SPAIN Lecture by Dr Abeer Zahana
EGYPTIAN IMPRINT IN SPAIN Lecture by Dr Abeer ZahanaEGYPTIAN IMPRINT IN SPAIN Lecture by Dr Abeer Zahana
EGYPTIAN IMPRINT IN SPAIN Lecture by Dr Abeer Zahana
 
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxGENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
 
Environmental acoustics- noise criteria.pptx
Environmental acoustics- noise criteria.pptxEnvironmental acoustics- noise criteria.pptx
Environmental acoustics- noise criteria.pptx
 
cybrids.pptx production_advanges_limitation
cybrids.pptx production_advanges_limitationcybrids.pptx production_advanges_limitation
cybrids.pptx production_advanges_limitation
 
Measures of Central Tendency.pptx for UG
Measures of Central Tendency.pptx for UGMeasures of Central Tendency.pptx for UG
Measures of Central Tendency.pptx for UG
 
Oxo-Acids of Halogens and their Salts.pptx
Oxo-Acids of Halogens and their Salts.pptxOxo-Acids of Halogens and their Salts.pptx
Oxo-Acids of Halogens and their Salts.pptx
 

The shannon channel coding theorem

  • 1. Ma Yihsin, 04 June The Shannon Channel Coding Theorem
  • 2. Content Shamonlhe Gding Theorem coptiy Channel Coding Theorem Mavk Wilde Chap 2.22 , Chap 14 Cover, Thomas Chap 7.7 . CQ Channel Coding Theorem Hayashi Chap 8
  • 3. Entropy , Mutual Information ( Classical ) Givenarandomuariabe Xanditsdistribution Rl 。 ) , 1 1 11 howtoquantifythe surprisenesslīnfomation ) wegetatthemomentweknowXEX ? Ansi Entropy ! ! • Entropyof X : H (X) : = [ Blxixjlog 1 -71EX Prlx= X ) • londitionalentropyofx.Y.INotethati HMX ) 三 Hly HMYKEYIHMY:D) = 前 無Blxixnmglyl
  • 4. . Mutual Informationof XY xz.chamelO-iPIMYHHIN-HMYIHMNoteth.atHMY) ⼆ Hly knowing Themutualinformation HMYI Y 圓 ⼯ 必 炒 鼠器。 幾恐器品蕊紫 穆_ .in iiiǘi焱 ⼼ 州 州 州州 ÒOIlxj Y ) = I M i X ) 品 , Y ) 、
  • 5. The Channel Gding Problem Discrete Memisschannel l DMS ) N : = plylx) decodernn.it#O'-T-nCoderateR-f.Error probabilitgiR-P.im#injShannon'squestioniWhatisthemaxcoderate Ésuchthatlim pě ) * = o ? Isthereasequenceofhtoo maximal.li?n)coaekiii'Dnexists?
  • 6. Arate Ris " achievable " if 彐 {( ⼼, D ( 以及 ⼦ eīm Pě " = 0 . pǒnmiPrlhmlhsao Channel Capacity CW) : ⼆ SUPIRIR isachivable} S hannonschannelcapacitytheorem.letN-Pylylxjisac.lassicalchannel (W) = max Ilx ; Y ) = : I W) Wewantto Pxlx) Interpretation : IcxjY ) lstleamowwtofinfocho.se prob-s-nofxwhichcanbeinferfromY.infotsiiir
  • 7. Wecansplitthetheoremintotwopart II) Thedīrectcodingtheorem Fora DMCN , allrates R below IW) isachievable.ern-o.c.n.se/-ofachievablerates-nInsCWRIW )I W) (⼆) Theconversetheorem Ifareliablesequenceofli只 ) codesexisttetherateRofthesequenceofc.desislessthan IW) [ - ˋ ˋ _ _ _ _ . n e t CCN) EIW) Ìm
  • 8. Typicakty WeaklawoflargenumbeiletfS-IRwithfilflsnjc.no È 三点 fcs :) ⼀⽇ yfls》 ⇐> H > 0 , 比 E (0,1 ), ⼆ hothz.no Prli 三点 fcsi) EGHSD-8.IT》 +8 ] } = 1 - E Nowweconsiderflsi ) = logfy V 870, limprlliilog点, ⼀ Esllog 前) 1 _ < S } = 1 MN cnn.no lnersampleentropyĀlsn) Hls)
  • 9. Apartīcularsequencesn isatypialsequenceifītssampleentropyÀlsnjisdosetotheentropy HIS ) letS~R.li ) 5 e 5 isaf.typicalsequenceiffliilogf.tl( S ) 1 : 8 sn The S-typicalsetfg-ISEShlsnisgtypi.at withrespectto S } ,
  • 10. Propertiesoftgpicalset ① Unitprobabilīty 比 ⼼ 1), 以 0 , largeenoughn.ph ET⾏ = 1 - E ② Exponentiallysmallcardinalitglijl-iznHDVEEIQD.largen.ltDznl HD-8 ) : 1 Tjkzhl H +8 ) PMEsyiz.tn Hcs ) 、 ③ Equīpartitionivsn ETja_znl.gl xli" 器{哵 """ 打 50。 站 𠴕
  • 11. Conditional Typicalset.considertwovariablex.Ywherex~RM.Y~PrlYlxjthef.conditional typical set isdefinedas Tì " 住 Ijiihg, 花⼀ ⼀ HMX ) 1 三 8 } ftp.yongwithcardinalityznloglylwithcardinalityiznHMX)
  • 12. Propertiesofonditionaltgpicalset ② Unitprobabilitg UEE ⼼ 1 ) , 870 , Iargen Exn {Pryxn METJ " }} : 1 - E ② Exponentidlysmallercardinaliy Kjlxhl 三 zn HMX) HjMkzhl HMX ) +8 ) , EHHMYJ zlrcjznlHMXM ③ Equipartition Ruxnlynlxh) 三 z-nHMDz-nlHMXHSIEPYM.lynlxyszhlHMXH )
  • 13. Proofofthe Directpart . Formdy : Fora DMCM Vrate RRIW) ⼆ aseqoflzhR.ru ) codeswīthmaxerrprob * oiputtypical Pe以 ⼆ miPrliimj.es 0 seauenceh→ N Overviewoftheproof -> 斷節:恐是 iiiiiif2 " 是 zn HN ) Üx) ⼆ zh Ilxiy
  • 14. Thefdlowingpnofisreferedfrom Markwildésbok . 」 - _ - randomlgselectuniformy acode-tr-PMxjdecoderii.itÜto-_- Trahdomnesscstept) randomyselectacodebook ?20 Whyrandomcode ? e = [ ⼤ ⼝) , 如 ⼼ , - _ - , Xnczj _ codewordtrimsg I x.li ) , _ _ _ _ . Xnl2"3 -0 formsg 2 " ? let Pxcx) istheprobdistthatmax IMY) each Xilj) ofeisiid.se/ectedfromyx)
  • 15. lstepz ) Gding Alie Sends Xncmjīutothechannel 。 ( Step 3 ) Decoding Bobrecēwesywfromthechanneloutput Then Bobhastodothefollowingtests ② WhetheryhETYorrespondingtoR.ly) = f[Pylylxj If yna TY reporterror ② Checkwhether ⼆ someintjETYNnIfisuc.hnreport 不 If ⺺ Such 不 reporterror (I ) If 彐 肛, inandh 千 元 reporterrorg
  • 16. Define 3 kindoferrorevents , Eolm ) : yna TY am ) iyhETY.yhqfjxhlmlczlmiiynETY.am4 miyne 壪 ⼼以 Theexpectatiowofaverageerrorprob.is 成 ⼀ Ec 偷 丟 Prkolm) UE.cm?UEzlmBWlOG-nr.2 = Ec Pri Eoll ) UEHDU 92 ( 1 ) } EIEPrkillBThisgivetheanswerofl.tl0
  • 17. Let IA (X ) ⼆ ⼆ ( XEA ) Focuson 9。 ( I ) : Ecpr化 𠮨} = Exnnyn { 1 - Iij M ) } = 1 - Eyn { Iij M ) } = BIYGTY} f Focuson E.CI ) : 因為 typicalseq 7占 pnob 很 ⼤ ˊ E I E {Prlc )}} = EnniilfjhllIyxn, ⼼ ) } E E … ( 喊ùii " " } ] E E
  • 18. Focusonhll ) : EIR 192 𠮨 了 = Ec, 及 Iji Iuīynmilyn) } m⽜ 1 EEc.nl Iiynly以 密Iiiicmilyn ) } ⼆ 距回去啊 怔 的 ⽔ 啊 𠮩 ⼆產, 㮺,yn Pxnynlilmhjkyyh) Iyjicmilyn ) 11 independent Rnlxinpnlj )
  • 19. Rnlxinpnlj ) Iyyh) Iijxnmilyn )⼆ 蝱 㮺,yn enrnnlnzhCHCYj-SJ.equipartition.EE以 8点iìnlxinj Iiitnyn ) Nlnnenen Fnenn 蝱⼯ ⼆ IMI -1 Hjhynki 比比州 Ei 呧以 8了 ㄝ比比州 mki 叿比川 -28了 Ml
  • 20. 因为要證 uxil ) 的 aohievabiliy . = i 吐⼼ 以 2811叫 l Ifwechoose kukzh (⼯ ⼼ ㄚ ) - 3 8 ] EIRIGCIB } : 2 8 TheaverageerrorprobabilityTYEZE.tt : E '
  • 21. 刪去 Doingexpurgatiow original 12㕧 n ) code , 在 ⼼ throwouthalfofcodewords-tlzhlRF.nl ǗWKZE original expurgatiowrate.IN)-38 , 感 i rate = ⼯⼼ ㄚ ) -38 , ÜUK Letg != 3 8 + i . E ' - 2[ +2 的 whereccanbechosenarbitraysmanaslongasnislargeenough.fincewechoose Pxlx) = argmax IMY ) Wehavealn.IN )- S ' , 2 E ' ) channelode ⼆ 7 IMY ) hereisfgi.EE lo.it/andlargeenoughn.equaltoHenceIW)isanachievablerate IWI ⼀