Browsing by Subject "Information theory"
Now showing 1 - 20 of 53
- Results Per Page
- Sort Options
Item Open Access ACMICS: an agent communication model for interacting crowd simulation(Springer, 2017) Kullu, K.; Güdükbay, Uğur; Manocha, D.Behavioral plausibility is one of the major aims of crowd simulation research. We present a novel approach that simulates communication between the agents and assess its influence on overall crowd behavior. Our formulation uses a communication model that tends to simulate human-like communication capability. The underlying formulation is based on a message structure that corresponds to a simplified version of Foundation for Intelligent Physical Agents Agent Communication Language Message Structure Specification. Our algorithm distinguishes between low- and high-level communication tasks so that ACMICS can be easily extended and employed in new simulation scenarios. We highlight the performance of our communication model on different crowd simulation scenarios. We also extend our approach to model evacuation behavior in unknown environments. Overall, our communication model has a small runtime overhead and can be used for interactive simulation with tens or hundreds of agents. © 2017, The Author(s).Item Open Access Automatic detection of geospatial objects using multiple hierarchical segmentations(Institute of Electrical and Electronics Engineers, 2008-07) Akçay, H. G.; Aksoy, S.The object-based analysis of remotely sensed imagery provides valuable spatial and structural information that is complementary to pixel-based spectral information in classification. In this paper, we present novel methods for automatic object detection in high-resolution images by combining spectral information with structural information exploited by using image segmentation. The proposed segmentation algorithm uses morphological operations applied to individual spectral bands using structuring elements in increasing sizes. These operations produce a set of connected components forming a hierarchy of segments for each band. A generic algorithm is designed to select meaningful segments that maximize a measure consisting of spectral homogeneity and neighborhood connectivity. Given the observation that different structures appear more clearly at different scales in different spectral bands, we describe a new algorithm for unsupervised grouping of candidate segments belonging to multiple hierarchical segmentations to find coherent sets of segments that correspond to actual objects. The segments are modeled by using their spectral and textural content, and the grouping problem is solved by using the probabilistic latent semantic analysis algorithm that builds object models by learning the object-conditional probability distributions. The automatic labeling of a segment is done by computing the similarity of its feature distribution to the distribution of the learned object models using the Kullback-Leibler divergence. The performances of the unsupervised segmentation and object detection algorithms are evaluated qualitatively and quantitatively using three different data sets with comparative experiments, and the results show that the proposed methods are able to automatically detect, group, and label segments belonging to the same object classes. © 2008 IEEE.Item Restricted Bilgi, bilim ve bilişim(1991) Güvenç, BozkurtItem Restricted Bilgi-bilgi örgünlüğü ve sanat(1991) Azaz, YaşarItem Open Access BilVideo: Design and implementation of a video database management system(Springer, 2005) Dönderler, M. E.; Şaykol, E.; Arslan, U.; Ulusoy, Özgür; Güdükbay, UğurWith the advances in information technology, the amount of multimedia data captured, produced, and stored is increasing rapidly. As a consequence, multimedia content is widely used for many applications in today's world, and hence, a need for organizing this data, and accessing it from repositories with vast amount of information has been a driving stimulus both commercially and academically. In compliance with this inevitable trend, first image and especially later video database management systems have attracted a great deal of attention, since traditional database systems are designed to deal with alphanumeric information only, thereby not being suitable for multimedia data. In this paper, a prototype video database management system, which we call BilVideo, is introduced. The system architecture of BilVideo is original in that it provides full support for spatio-temporal queries that contain any combination of spatial, temporal, object-appearance, external-predicate, trajectory-projection, and similarity-based object-trajectory conditions by a rule-based system built on a knowledge-base, while utilizing an object-relational database to respond to semantic (keyword, event/activity, and category-based), color, shape, and texture queries. The parts of BilVideo (Fact-Extractor, Video-Annotator, its Web-based visual query interface, and its SQL-like textual query language) are presented, as well. Moreover, our query processing strategy is also briefly explained. © 2005 Springer Science + Business Media, Inc.Item Open Access A bound on the zero-error list coding capacity(IEEE, 1993) Arıkan, ErdalWe present a new bound on the zero-error list coding capacity, and using which, show that the list-of-3 capacity of the 4/3 channel is at most 6/19 bits, improving the best previously known bound of 3/8. The relation of the bound to the graph-entropy bound of Koerner and Marton is also discussed.Item Open Access Capacity bounds for the poisson-repeat channel(Institute of Electrical and Electronics Engineers, 2023-08-22) Kazemi, Mohammad; Duman, Tolga M.We develop bounds on the capacity of Poisson-repeat channels (PRCs) for which each input bit is independently repeated according to a Poisson distribution. The upper bounds are obtained by considering an auxiliary channel where the output lengths corresponding to input blocks of a given length are provided as side information at the receiver. Numerical results show that the resulting upper bounds are significantly tighter than the best known one for a large range of the PRC parameter ? (specifically, for ? =0.35). We also describe a way of obtaining capacity lower bounds using information rates of the auxiliary channel and the entropy rate of the provided side information.Item Open Access Capacity region of multi-resolution streaming in peer-to-peer networks(IEEE, 2013) Karagöz, B.; Yavuz, Semih; Ho, T.; Effros, M.We consider multi-resolution streaming in fully-connected peer-to-peer networks, where transmission rates are constrained by arbitrarily specified upload capacities of the source and peers. We fully characterize the capacity region of rate vectors achievable with arbitrary coding, where an achievable rate vector describes a vector of throughputs of the different resolutions that can be supported by the network. We then prove that all rate vectors in the capacity region can be achieved using pure routing strategies. This shows that coding has no capacity advantage over routing in this scenario. © 2013 IEEE.Item Open Access Channel polarization: A method for constructing capacity-achieving codes(IEEE, 2008-07) Arıkan, ErdalA method is proposed, called channel polarization, to construct code sequences that achieve the symmetric capacity I(W) of any given binary-input discrete memoryless channel (B-DMC) W. The symmetric capacity I(W) is the highest rate achievable subject to using the input letters of the channel equiprobably and equals the capacity C(W) if the channel has certain symmetry properties. Channel polarization refers to the fact that it is possible to synthesize, out of N independent copies of a given B-DMC W, a different set of N binary-input channels such that the capacities of the latter set, except for a negligible fraction of them, are either near 1 or near 0. This second set of N channels are well-conditioned for channel coding: one need only send data at full rate through channels with capacity near 1 and at 0 rate through the others. The main coding theorem about polar coding states that, given any B-DMC W with I(W) > 0 and any fixed 0 < δ < I(W), there exist finite constants n1 (W, δ) and c(W, δ) such that for all n ≥ n1, there exist polar codes with block length N = 2n, rate R > I(W)-δ, and probability of block decoding error Pe ≤ cN-1/4. The codes with this performance can be encoded and decoded within complexity O(N log N). © 2008 IEEE.Item Open Access Code design for binary energy harvesting channel(IEEE, 2017) Dabirnia, Mehdi; Duman, Tolga M.We consider a binary energy harvesting communication system with a finite battery transmitter over a noisy channel, and design explicit and implementable codes based on concatenation of a nonlinear trellis code (NLTC) with an outer low density parity check (LDPC) code. We propose two different decoding methods where the simplified one ignores the memory in the battery state while the more sophisticated one utilizes the memory. Numerical results demonstrate that the designed codes outperform other reference schemes. The results also show the superiority of the improved decoding approach over the naive solution.Item Open Access Coding method for discrete noiseless channels with input constraints(IEEE, 1988) Arıkan, ErdalSummary form only given. Two coding algorithms for discrete noiseless channels with input constraints have been analyzed. The first algorithm, which requires infinite-precision arithmetic and is mainly of theoretical interest, can achieve rates as high as channel capacity. The second algorithm is based on the same ideas as the first, but it is much more practical since it uses only finite-precision, floating-point arithmetic. The algorithms are sequential in nature and do not use tables to encode data; as a result, memory requirements are minimal. Experimental results for the finite-precision algorithm have been obtained for the [2, 7] run-length constrained magnetic channel, the charge-constrained channel with a maximum disparity of three, and the telegraphy channel. In the worst of these three cases, encoding at a rate within 0.65% of the capacity was achieved using a precision of only 8 bits. The catastrophic-error-propagation problem was considered, and it was found that, with a slight amendment, the above algorithms can avoid this problem.Item Open Access Deriving pairwise transfer entropy from network structure and motifs(Royal Society Publishing, 2020) Novelli, L.; Atay, Fatihcan M.; Jost, J.; Lizier, J. T.Transfer entropy (TE) is an established method for quantifying directed statistical dependencies in neuroimaging and complex systems datasets. The pairwise (or bivariate) TE from a source to a target node in a network does not depend solely on the local source-target link weight, but on the wider network structure that the link is embedded in. This relationship is studied using a discrete-time linearly coupled Gaussian model, which allows us to derive the TE for each link from the network topology. It is shown analytically that the dependence on the directed link weight is only a first approximation, valid for weak coupling. More generally, the TE increases with the in-degree of the source and decreases with the in-degree of the target, indicating an asymmetry of information transfer between hubs and low-degree nodes. In addition, the TE is directly proportional to weighted motif counts involving common parents or multiple walks from the source to the target, which are more abundant in networks with a high clustering coefficient than in random networks. Our findings also apply to Granger causality, which is equivalent to TE for Gaussian variables. Moreover, similar empirical results on random Boolean networks suggest that the dependence of the TE on the in-degree extends to nonlinear dynamics.Item Open Access Dynamic signaling games under Nash and Stackelberg equilibria(IEEE, 2016) Sarıtaş, Serkan; Yüksel, Serdar; Gezici, SinanIn this study, dynamic and repeated quadratic cheap talk and signaling game problems are investigated. These involve encoder and decoders with mismatched performance objectives, where the encoder has a bias term in the quadratic cost functional. We consider both Nash equilibria and Stackelberg equilibria as our solution concepts, under a perfect Bayesian formulation. These two lead to drastically different characteristics for the equilibria. For the cheap talk problem under Nash equilibria, we show that fully revealing equilibria cannot exist and the final state equilibria have to be quantized for a large class of source models; whereas, for the Stackelberg case, the equilibria must be fully revealing regardless of the source model. In the dynamic signaling game where the transmission of a Gaussian source over a Gaussian channel is considered, the equilibrium policies are always linear for scalar sources under Stackelberg equilibria, and affine policies constitute an invariant subspace under best response maps for Nash equilibria.Item Open Access Dynamic signaling games with quadratic criteria under Nash and Stackelberg equilibria(Elsevier, 2020-01) Sarıtaş, Serkan; Yüksel, Serdar; Gezici, SinanThis paper considers dynamic (multi-stage) signaling games involving an encoder and a decoder who have subjective models on the cost functions. We consider both Nash (simultaneous-move) and Stackelberg (leader–follower) equilibria of dynamic signaling games under quadratic criteria. For the multi-stage scalar cheap talk, we show that the final stage equilibrium is always quantized and under further conditions the equilibria for all time stages must be quantized. In contrast, the Stackelberg equilibria are always fully revealing. In the multi-stage signaling game where the transmission of a Gauss–Markov source over a memoryless Gaussian channel is considered, affine policies constitute an invariant subspace under best response maps for Nash equilibria; whereas the Stackelberg equilibria always admit linear policies for scalar sources but such policies may be non-linear for multi-dimensional sources. We obtain an explicit recursion for optimal linear encoding policies for multi-dimensional sources, and derive conditions under which Stackelberg equilibria are informative.Item Open Access Full-complex amplitude modulation with binary spatial light modulators(Optical Society of America, 2011-10-19) Ulusoy, E.; Onural, L.; Özaktaş, Haldun M.Imperfections and nonrobust behavior of practical multilevel spatial light modulators (SLMs) degrade the performance of many proposed full-complex amplitude modulation schemes. We consider the use of more robust binary SLMs for this purpose. We propose a generic method, by which, out of K binary (or 1 bit) SLMs of size M × N, we effectively create a new 2K -level (or K bit) SLM of size M × N. The method is a generalization of the well-known concepts of bit plane representation and decomposition for ordinary gray scale digital images and relies on forming a properly weighted superposition of binary SLMs. When K is sufficiently large, the effective SLM can be regarded as a full-complex one. Our method is as efficient as possible from an information theoretical perspective. A 4f system is discussed as a possible optical implementation. This 4f system also provides a means for eliminating the undesirable higher diffraction orders. The components of the 4f system can easily be customized for different production technologies.Item Open Access Generalized approximate message-passing decoder for universal sparse superposition codes(IEEE, 2017-06) Bıyık, Erdem; Barbier, J.; Dia, M.Sparse superposition (SS) codes were originally proposed as a capacity-achieving communication scheme over the additive white Gaussian noise channel (AWGNC) [1]. Very recently, it was discovered that these codes are universal, in the sense that they achieve capacity over any memoryless channel under generalized approximate message-passing (GAMP) decoding [2], although this decoder has never been stated for SS codes. In this contribution we introduce the GAMP decoder for SS codes, we confirm empirically the universality of this communication scheme through its study on various channels and we provide the main analysis tools: state evolution and the potential. We also compare the performance of GAMP with the Bayes-optimal MMSE decoder. We empirically illustrate that despite the presence of a phase transition preventing GAMP to reach the optimal performance, spatial coupling allows to boost the performance that eventually tends to capacity in a proper limit. We also prove that, in contrast with the AWGNC case, SS codes for binary input channels have a vanishing error floor in the limit of large codewords. Moreover, the performance of Hadamard-based encoders is assessed for practical implementations. © 2017 IEEE.Item Open Access GenoGuard: protecting genomic data against brute-force attacks(IEEE, 2015-05) Huang, Z.; Ayday, Erman; Fellay, Jacques; Hubaux, J-P.; Juels, A.Secure storage of genomic data is of great and increasing importance. The scientific community's improving ability to interpret individuals' genetic materials and the growing size of genetic database populations have been aggravating the potential consequences of data breaches. The prevalent use of passwords to generate encryption keys thus poses an especially serious problem when applied to genetic data. Weak passwords can jeopardize genetic data in the short term, but given the multi-decade lifespan of genetic data, even the use of strong passwords with conventional encryption can lead to compromise. We present a tool, called Geno Guard, for providing strong protection for genomic data both today and in the long term. Geno Guard incorporates a new theoretical framework for encryption called honey encryption (HE): it can provide information-theoretic confidentiality guarantees for encrypted data. Previously proposed HE schemes, however, can be applied to messages from, unfortunately, a very restricted set of probability distributions. Therefore, Geno Guard addresses the open problem of applying HE techniques to the highly non-uniform probability distributions that characterize sequences of genetic data. In Geno Guard, a potential adversary can attempt exhaustively to guess keys or passwords and decrypt via a brute-force attack. We prove that decryption under any key will yield a plausible genome sequence, and that Geno Guard offers an information-theoretic security guarantee against message-recovery attacks. We also explore attacks that use side information. Finally, we present an efficient and parallelized software implementation of Geno Guard. © 2015 IEEE.Item Open Access Guessing subject to distortion(Institute of Electrical and Electronics Engineers, 1998-05) Arikan, E.; Merhav, N.We investigate the problem of guessing a random vector X within distortion level D. Our aim is to characterize the best attainable performance in the sense of minimizing, in some probabilistic sense, the number of required guesses G(X) until the error falls below D. The underlying motivation is that G(X) is the number of candidate codewords to be examined by a rate-distortion block encoder until a satisfactory codeword is found. In particular, for memoryless sources, we provide a single-letter characterization of the least achievable exponential growth rate of the ρth moment of G(X) as the dimension of the random vector X grows without bound. In this context, we propose an asymptotically optimal guessing scheme that is universal both with respect to the information source and the value of ρ. We then study some properties of the exponent function E(D, ρ) along with its relation to the source-coding exponents. Finally, we provide extensions of our main results to the Gaussian case, guessing with side information, and sources with memory.Item Open Access Guessing with lies(IEEE, 2002-06-07) Arıkan, Erdal; Boztaş, S.A practical algorithm was obtained for directly generating an optimal guessing sequence for guessing under lies. An optimal guessing strategy was defined as one which minimizes the number of average number of guesses in determining the correct value of a random variable. The information-theoretic bounds on the average number of guesses for optimal strategies were also derived.Item Open Access İçerik tabanlı görüntü erişimi için sahne sınıflandırması(IEEE, 2008-04) Çavuş, Özge; Aksoy, SelimSon yıllarda çok geniş veri tabanlarının kullanımıyla birlikte içerik tabanlı görüntü indekslemesi ve erişimi önemli bir araştırma konusu halini almıştır. Bu çalışmada, görüntü indekslemesi için sahne sınıflandırmasını baz alan bir görüntü erişim sistemi tanımlanmıştır. Görüntülerden çıkarılan alt düzey öznitelikler görüntü indekslemesinde doğrudan kullanılmak yerine, bu öznitelikler sahne sınıflandırması için kullanılmış ve görüntüler sınıflandırma sonucunda elde edilen anlamsal sınıf bilgileriyle indekslenmiştir. Sahne sınıflandırması için “kelime kümesi” (bag of words) dokuman analizi yöntemi olarak bilinen tekniğin bir uyarlaması kullanılmıştır. Görüntü erişim sistemini insan algısıyla desteklemek ve anlambilimsel uçurumu en aza indirgemek için erişim senaryosuna tek sınıf sınıflandırıcı bazlı ilgililik geri beslemesi eklenmiştir. Bunun için, ilgili görüntüleri çok iyi modelleyen, ilgili olmayan görüntülerden de bir o kadar uzak duran bir hiperkure oluşturan destek vektör veri tanımlaması kullanılmıştır. Önerilen yöntemler Corel veri kümesinde denenmiş ve başarılı sonuçlar elde edilmiştir. Content-based image indexing and retrieval have become important research problems with the use of large databases in a wide range of areas. In this study, a content-based image retrieval system that is based on scene classification for image indexing is proposed. Instead of using low-level features directly, semantic class information that is obtained as a result of scene classification is used during indexing. The traditional "bag of words" approach is modified for classifying the scenes. In order to minimize the semantic gap, a relevance feedback approach that is based on one-class classification is also integrated. The support vector data description is used for learning during feedback iterations. The experiments using the Corel data set show good results for both classification and retrieval. ©2008 IEEE.
- «
- 1 (current)
- 2
- 3
- »