You get a bonus - 1 coin for daily activity. Now you have 1 coin

18.6. Private system information contained in the event message. Private event information contained in a message about another event

Lecture



In the previous   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event we reviewed the complete (or average) system information   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event contained in the message about the state of the system   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . In some cases it is of interest to evaluate private information about the system.   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event contained in a separate message indicating that the system   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event is in a specific state   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . Denote this private information   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . Note that complete (or, otherwise, average) information   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event should be the expectation of private information for all possible states about which the message can be transmitted:

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . (18.6.1)

Give the formula (18.5.14), which is calculated   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event (she   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ), a view like that of formula (18.6.1):

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event , (18.6.2)

whence, comparing with formula (18.6.1), we obtain the expression of private information:

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . (18.6.3)

Expression (18.6.3) and take for the definition of private information. Let's analyze the structure of this expression. It is nothing more than averaged over all states.   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event value of magnitude

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . (18.6.4)

Averaging occurs taking into account different probabilities of values   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . Since the system   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event already accepted the state   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event then when averaging the values ​​(18.6.4) do not multiply by the probability   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event states   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event , and on conditional probabilities   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event .

Thus, the expression for private information can be written in the form of conditional expectation:

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . (18.6.5)

We prove that private information   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event , as well as complete, can not be negative. Indeed, we denote:

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event (18.6.6)

and consider the expression

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event .

It is easy to see (see Fig. 18.6.1) that for any   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . (18.6.7)

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

Fig. 18.6.1.

Putting in (18.6.7)   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event , we get:

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ;   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ,

from where

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . (18.6.8)

Based on (18.6.3) and (18.6.6) we have:

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event .

But

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ,

and the expression in the brace is zero; Consequently   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event .

Thus, we have proved that private information about the system   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event enclosed in a message about any condition   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event systems   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event can not be negative. It follows that non-negative and complete mutual information   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event (as the mathematical expectation of a non-negative, random variable):

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . (18.6.9)

From the formula (18.5.6) for information:   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event follows that

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event (18.6.10)

or

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ,

that is, the total conditional entropy of the system does not exceed its unconditional entropy.

Thus, the position taken by us on faith in   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event 18.3.

For the direct calculation of private information, it is convenient to slightly convert the formula (18.6.3) by entering into it instead of conditional probabilities   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event unconditional. Really,

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ,

and the formula (18.6.3) takes the form

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . (18.6.11)

Example 1. System   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event characterized by a probability table   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event :

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

0.1

0.2

0.3

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

0.3

0.4

0.7

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

0.4

0.6

Find private system information   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event enclosed in a message   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event .

Decision. By the formula (18.6.11) we have:

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event .

According to table 6 of the application we find

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ,

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ,

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event (two units).

We defined private system information.   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event contained in a specific event   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event i.e. in the message “system   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event is able to   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ". A natural question arises: is it possible to go even further and determine private information about the event?   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event contained in the event   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ? It turns out that this can be done, only the information “from an event to an event” obtained in this way will have somewhat unexpected properties: it can be both positive and negative.

Based on the structure of formula (18.6.3), it is natural to determine the information “from event to event” as follows:

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event , (18.6.12)

that is, private information about an event, obtained as a result of reporting another event, is equal to the logarithm of the ratio of the probability of the first event after the message to its probability before the message (a priori).

From the formula (18.6.12) it is clear that if the probability of an event   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event as a result of the message   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event increases, i.e.

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ,

that information   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event is positive; otherwise, it is negative. In particular, when the occurrence of an event   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event completely excludes the possibility of an event   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event (i.e., when these events are incompatible),

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

Information   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event can be written as:

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event , (18.6.13)

which implies that it is symmetric with respect to   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event and   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event and

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event . (18.6.14)

Thus, we have introduced three types of information:

1) complete system information   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event contained in the system   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event :

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event ;

2) private information about the system   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event contained in the event (message)   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event :

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event

3) private information about the event   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event contained in the event (message)   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event :

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event .

The first two types of information are non-negative; the latter can be both positive and negative.

Example 2. In the urn 3 white and 4 black balls. 4 balls were taken out of the urn, three of them turned out to be black, and one - white. Determine the information enclosed in the observed event.   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event in relation to the event   18.6.  Private system information contained in the event message.  Private event information contained in a message about another event - the next ball drawn from the urn will be black.

Decision.

  18.6.  Private system information contained in the event message.  Private event information contained in a message about another event (two units).


Comments


To leave a comment
If you have any suggestion, idea, thanks or comment, feel free to write. We really value feedback and are glad to hear your opinion.
To reply

Information and Coding Theory

Terms: Information and Coding Theory