Results 11 to 20 of about 22,001,787 (335)
The g-theorem and quantum information theory [PDF]
A bstractWe study boundary renormalization group flows between boundary conformal field theories in 1 + 1 dimensions using methods of quantum information theory.
H. Casini, I. S. Landea, G. Torroba
semanticscholar +6 more sources
In visible light communication systems, the ability to suppress interference caused by other light sources is a major benefit towards performance improvements.
Adrian Krohn+4 more
doaj +1 more source
Group testing: an information theory perspective [PDF]
The group testing problem concerns discovering a small number of defective items within a large population by performing tests on pools of items. A test is positive if the pool contains at least one defective, and negative if it contains no defectives ...
Matthew Aldridge+2 more
semanticscholar +1 more source
Fundamental and speculative components of the cryptocurrency pricing dynamics
The driving forces behind cryptoassets’ price dynamics are often perceived as being dominated by speculative factors and inherent bubble-bust episodes. Fundamental components are believed to have a weak, if any, role in the price-formation process.
Jiri Kukacka, Ladislav Kristoufek
doaj +1 more source
Application of information theory in systems biology
Over recent years, new light has been shed on aspects of information processing in cells. The quantification of information, as described by Shannon’s information theory, is a basic and powerful tool that can be applied to various fields, such as ...
Shinsuke Uda
semanticscholar +1 more source
Kinetic theory of information -- the dynamics of information [PDF]
A kinetic approach to the notion of information is proposed, based on Liouville kinetic theory. The general kinetic equation for the evolution of the N-particle information $\mathcal{I}_N$ in a Hamiltonian system of large particle number $N\gg 1$ is ...
Baumjohann, W., Treumann, R. A.
core +3 more sources
Low-density parity-check codes for asymmetric distributed source coding [PDF]
The research work is partially funded by the Strategic Educational Pathways Scholarship Scheme (STEPS-Malta). This scholarship is partly financed by the European Union - European Social Fund (ESF 1.25).Low-Density Parity-Check (LDPC) codes achieve good ...
Debono, Carl James+3 more
core +1 more source
Dataset for file fragment classification of image file formats
Objectives File fragment classification of image file formats is a topic of interest in network forensics. There are a few publicly available datasets of files with image formats.
Reyhane Fakouri, Mehdi Teimouri
doaj +1 more source
Bayesian inverse modeling and source location of an unintended 131I release in Europe in the fall of 2011 [PDF]
In the fall of 2011, iodine-131 (131I) was detected at several radionuclide monitoring stations in central Europe. After investigation, the International Atomic Energy Agency (IAEA) was informed by Hungarian authorities that 131I was released from the
O. Tichý+5 more
doaj +1 more source
Energy Scheduling for a DER and EV Charging Station Connected Microgrid With Energy Storage
Microgrids are an effective solution to decentralize electrical grids and improve usage of distributed energy resources (DERs). Within a microgrid there are multiple active players and it can be computationally expensive to consider all their ...
Kiraseya Preusser, Anke Schmeink
doaj +1 more source