• Title/Summary/Keyword: Shannon's entropy

Search Result 45, Processing Time 0.022 seconds

Efficiency Analysis of ASEAN Ports Using DEA & Shannon's Entropy (DEA결합모형을 활용한 아세안(ASEAN)지역 항만의 효율성 분석)

  • Park, Seonyoul;Kim, Sangyoul;Park, Ho
    • Journal of Korea Port Economic Association
    • /
    • v.33 no.4
    • /
    • pp.1-16
    • /
    • 2017
  • The total container throughput of ASEAN is expected to increase continuously with economic development. However, ASEAN port infrastructure is insufficient to handle the increasing trade volume. According to the World Economic Forum, ASEAN ports except Singapore and Malaysia are ranked in low. Participation in ASEAN port development projects can lead an increase in trade efficiency with S. Korea by improving the port infrastructure of ASEAN countries. In addition, the S. Korean port-related industry can be energized through entering ASEAN port development projects. This study, which measures the efficiency of ASEAN ports, can be used as a basic guideline for the development and the planning of the ports. This study used Data Envelopment Analysis(DEA) and Shannon's Entropy model together to measure ASEAN ports' efficiency. After measuring each DEA (CCR, I-BCC, O-BCC, SBM) weight, the efficiency of ASEAN ports is measured as reflecting each DEA weight. As a result, the ports of Singapore and Malaysia, the major ports in the world, have the highest efficiency. Further, Vietnamese ports need to raise efficiency along with increasing container throughput. Leam Chabang (Thailand), Ho Chi Minh City (Vietnam), and Tanjung Priok (Indonesia) exhibit a negative correlation between container throughput and efficiency; therefore, the ports need to improve so as to maintain competitiveness. Lastly, Cambodia, Myanmar, and Brunei, which do not have active economic development, need to improve their ports for economic development.

Application of information theory to wireless cooperative communications (정보이론의 협력무선통신에의 응용)

  • Kim, Yoon-Hyun;Yang, Jae-Soo;Ha, Kwang-Jun;Kim, Jin-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.337-343
    • /
    • 2009
  • Information theory is one field of the applied mathematics quantitating the data in order to store data as many as in the medium or communicate through channel. it was released on the Shannon's paper, in 1948. With basis on this paper, It has been achieved dramatically development for communication, signal processing, and date procedure and transmission in the network In this paper, the basic concept of information theory is described through dealing with contents about meaning of information, entropy, and channel capacity. It is also handled how information theory is applied to the fields of sensor network, relay channel, MIMO system, and others.

  • PDF

Encounter of Lattice-type coding with Wiener's MMSE and Shannon's Information-Theoretic Capacity Limits in Quantity and Quality of Signal Transmission (신호 전송의 양과 질에서 위너의 MMSE와 샤논의 정보 이론적 정보량 극한 과 격자 코드 와의 만남)

  • Park, Daechul;Lee, Moon Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.8
    • /
    • pp.83-93
    • /
    • 2013
  • By comparing Wiener's MMSE on stochastic signal transmission with Shannon's mutual information first proved by C.E. Shannon in terms of information theory, connections between two approaches were investigated. What Wiener wanted to see in signal transmission in noisy channel is to try to capture fundamental limits for signal quality in signal estimation. On the other hands, Shannon was interested in finding fundamental limits of signal quantity that maximize the uncertainty in mutual information using the entropy concept in noisy channel. First concern of this paper is to show that in deriving limits of Shannon's point to point fundamental channel capacity, Shannon's mutual information obtained by exploiting MMSE combiner and Wiener filter's MMSE are interelated by integro-differential equantion. Then, At the meeting point of Wiener's MMSE and Shannon's mutual information the upper bound of spectral efficiency and the lower bound of energy efficiency were computed. Choosing a proper lattice-type code of a mod-${\Lambda}$AWGN channel model and MMSE estimation of ${\alpha}$ confirmed to lead to the fundamental Shannon capacity limits.

Mutual Information Applied to Anomaly Detection

  • Kopylova, Yuliya;Buell, Duncan A.;Huang, Chin-Tser;Janies, Jeff
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.89-97
    • /
    • 2008
  • Anomaly detection systems playa significant role in protection mechanism against attacks launched on a network. The greatest challenge in designing systems detecting anomalous exploits is defining what to measure. Effective yet simple, Shannon entropy metrics have been successfully used to detect specific types of malicious traffic in a number of commercially available IDS's. We believe that Renyi entropy measures can also adequately describe the characteristics of a network as a whole as well as detect abnormal traces in the observed traffic. In addition, Renyi entropy metrics might boost sensitivity of the methods when disambiguating certain anomalous patterns. In this paper we describe our efforts to understand how Renyi mutual information can be applied to anomaly detection as an offline computation. An initial analysis has been performed to determine how well fast spreading worms (Slammer, Code Red, and Welchia) can be detected using our technique. We use both synthetic and real data audits to illustrate the potentials of our method and provide a tentative explanation of the results.

Comparison of Statistical Experiments and Measures of Information

  • Sohn, Keon-Tae;Jeon, Jong-Woo
    • Journal of the Korean Statistical Society
    • /
    • v.23 no.2
    • /
    • pp.271-292
    • /
    • 1994
  • The comparison of statistical experiments with a common parameter and parameter space is discussed using the concept of the Blackwell's sufficiency and the Shannon's entropy. Binomial and censored experiments are considered as applications. The loss of information is studied under teh aggregated experiments and truncated experiments, and summerized in some tables which make it possible to indicate the choice of an appropriate experiment.

  • PDF

Characterization of New Two Parametric Generalized Useful Information Measure

  • Bhat, Ashiq Hussain;Baig, M. A. K.
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.4
    • /
    • pp.64-74
    • /
    • 2016
  • In this paper we define a two parametric new generalized useful average code-word length $L_{\alpha}^{\beta}$(P;U) and its relationship with two parametric new generalized useful information measure $H_{\alpha}^{\beta}$(P;U) has been discussed. The lower and upper bound of $L_{\alpha}^{\beta}$(P;U), in terms of $H_{\alpha}^{\beta}$(P;U) are derived for a discrete noiseless channel. The measures defined in this communication are not only new but some well known measures are the particular cases of our proposed measures that already exist in the literature of useful information theory. The noiseless coding theorems for discrete channel proved in this paper are verified by considering Huffman and Shannon-Fano coding schemes on taking empirical data. Also we study the monotonic behavior of $H_{\alpha}^{\beta}$(P;U) with respect to parameters ${\alpha}$ and ${\beta}$. The important properties of $H_{{\alpha}}^{{\beta}}$(P;U) have also been studied.

Detecting ShellCode Using Entropy (엔트로피를 이용한 ShellCode 탐지 방법)

  • Kim, Woosuk;Kang, Sunghoon;Kim, Kyungshin;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.3
    • /
    • pp.87-96
    • /
    • 2014
  • Hackers try to achieve their purpose in a variety of ways, such as operating own website and hacking a website. Hackers seize a large amount of private information after they have made a zombie PC by using malicious code to upload the website and it would be used another hacking. Almost detection technique is the use Snort rule. When unknown code and the patterns in IDS/IPS devices are matching on network, it detects unknown code as malicious code. However, if unknown code is not matching, unknown code would be normal and it would attack system. Hackers try to find patterns and make shellcode to avoid patterns. So, new method is needed to detect that kinds of shellcode. In this paper, we proposed a noble method to detect the shellcode by using Shannon's information entropy.

Efficient and Secure Sound-Based Hybrid Authentication Factor with High Usability

  • Mohinder Singh B;Jaisankar N.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2844-2861
    • /
    • 2023
  • Internet is the most prevailing word being used nowadays. Over the years, people are becoming more dependent on the internet as it makes their job easier. This became a part of everyone's life as a means of communication in almost every area like financial transactions, education, and personal-health operations. A lot of data is being converted to digital and made online. Many researchers have proposed different authentication factors - biometric and/or non-biometric authentication factors - as the first line of defense to secure online data. Among all those factors, passwords and passphrases are being used by many users around the world. However, the usability of these factors is low. Also, the passwords are easily susceptible to brute force and dictionary attacks. This paper proposes the generation of a novel passcode from the hybrid authentication factor - sound. The proposed passcode is evaluated for its strength to resist brute-force and dictionary attacks using the Shannon entropy and Passcode (or password) entropy formulae. Also, the passcode is evaluated for its usability. The entropy value of the proposed is 658.2. This is higher than that of other authentication factors. Like, for a 6-digit pin - the entropy value was 13.2, 101.4 for Password with Passphrase combined with Keystroke dynamics and 193 for fingerprint, and 30 for voice biometrics. The proposed novel passcode is far much better than other authentication factors when compared with their corresponding strength and usability values.

Groundwater vulnerability assessment in the southern coastal sedimentary basin of Benin using DRASTIC, modified DRASTIC, Entropy Weight DRASTIC and AVI

  • Agossou, Amos;Yang, Jeong-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.152-152
    • /
    • 2021
  • The importance of groundwater has long been recognized, but the ground water potential to become contaminated as a result of human activities has only been recognized in recently. Before 1980 it was thought that soils served as filters, preventing harmful substances deposited at the surface from migrating into groundwater. Today it is known that soils have a finite capacity to protect groundwater. It can be contaminated from divers sources. Therefore, Assessment of aquifer vulnerability to pollution is essential for the protection and management of groundwater and land use planning. In this study, we used DRASTIC and AVI for groundwater vulnerability to contamination assessment. the different methods were applied to the southern coastal sedimentary basin of Benin and DRASTIC method was modified in two different steps. First, we modified DRASTIC by adding land use parameter to include the actual pollution sources (DRASTICLcLu) and second, classic DRASTIC weights was modified using Shannon's entropy (Entropy weight DRASTIC). The reliability of the applied approaches was verified using nitrate (NO3-) concentration and by comparing the overall vulnerability maps to the previous researches in the study area and in the world. The results from validation showed that the addition of landcover/land use parameter to the classic DRASTIC helps to improve the method for better definition of the vulnerable areas in the basin and also, the weight modification using entropy improved better the method because Entropy weight DRASTICLcLu showed the highest correlation with nitrate concentration in the study basin. In summary the weight modification using entropy approach reduced the uncertainty of the human subjectivity in assigning weights and ratings in the standard DRASTIC.

  • PDF