The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this letter, we identify a class of absolutely continuous probability distributions, and show that the differential entropy is uniformly convergent over this space under the metric of total variation distance. One of the advantages of this class is that the requirements could be readily verified for a given distribution.
In this paper, we consider a scalar Gaussian Channel with minimum amplitude constraint, and investigate when the capacity-achieving input is binary. First, we study the case that the input satisfies both minimum and peak amplitude constraints and find that the optimal input is discrete. Then, for a given minimum amplitude, we find sufficient conditions that the peak amplitude constraint must satisfy...
A novel method of data masking is presented which allows Poisson and some Gaussian data sets to be altered without changing the overall probability density function. The method consists of multiplying each entry by a random complex exponential function, i.e. a rotation in the complex plane, and exchanging imaginary components between entries. The transformation preserves the properties of the data...
A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the computation of the maximum achievable key length from the Receiver Operating Characteristic (ROC) of the optimal...
As the usage of wireless devices rapidly increases, mobile phones have become an important aid for people to maintain social relationships. Analysis on cellular networks through mobile communication records, especially when such records contain temporal and spatial information, can potentially unveil fundamental laws that govern the dynamics of social networks. In this paper, we use call detail records...
For the performance evaluation of convolutional codes, computer simulations are widely used, and few studies have been made for exact error probability of convolutional codes of more than 4-state. In this paper, an analytical approach is presented for moments of decision variables for a maximum a-posteriori probability (MAP) decoding. The moments are derived by recurrence relations. An application...
Automated tracking of vehicles and people is essential for the effective utilization of imagery in wide area surveillance applications. In order to determine the best tracking algorithm and parameters for a given application, a comprehensive evaluation procedure is required. However, despite half a century of research in multi-target tracking, there is no consensus on how to score the overall performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.