Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical...

59
Shannon and my research Where did I use the ideas of Claude Elwood Shannon? At the occasion of his 100th birthday, 2016 Han Vinck A.J. Han Vinck, Johannesburg, June 2016 1

Transcript of Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical...

Page 1: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Shannon and my research

Where did I use the ideas of Claude Elwood Shannon?

At the occasion of his 100th birthday, 2016

Han Vinck

A.J. Han Vinck, Johannesburg, June 2016 1

Page 2: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

The historical perspective

• Born 1916, Shannon was almost a Canadian (Vijay Bhargava)

• Master thesis: 1937 (age 21!) - A Symbolic Analysis of Relay and Switching Circuits,

• „Work“ for PhD: 1940 - An Algebra for Theoretical Genetics,

• Visit: 40/41 the Institute for Advanced Study, in Princeton

• Work at Bell labs: 1941 – 1958• 1948 publiced hij A Mathematical Theory of Communication• 1949 Communication Theory of Secrecy Systems

• „Work“ at MIT: 1959 - 1978

A.J. Han Vinck, Johannesburg, June 2016 2

Page 3: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Claude Shannon Gaylord

A.J. Han Vinck, Johannesburg, June 2016 3

statue

Later: flame-throwing trumpet.

Page 4: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Some pictures

A.J. Han Vinck, Johannesburg, June 2016 4

The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization of it, which is accessible to the non-specialist.[5] In short, Weaver reprinted Shannon's two-part paper, wrote a 28 page introduction for a 144 pages book, and changed the title from "A mathematical theory..." to "The mathematical theory..."

"transformed cryptography from an art to a science."

Page 5: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

It all started with a master thesis!(1936)

For „some“ reason, signatures were removed.

It’s the diagrams used in the final chapter of the thesis, which showed different types of circuits, that contained the central circuit that is still used in digital computers. The circuit is the 4-bit full adder.

A.J. Han Vinck, Johannesburg, June 2016 5

Page 6: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Master thesis described a machine to find prime numbers

A.J. Han Vinck, Johannesburg, June 2016 6

Page 7: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Shannon also wrote a PhD thesis: who knows about it?

A.J. Han Vinck, Johannesburg, June 2016 7

With his creativity, if Shannon had stayed in population genetics, he would surely have made some important contributions. Nevertheless, I think it is fair to say that the world is far better off for his having concentrated on communication theory, where his work was revolutionary.

Apparently, Shannon spent only a few months on the thesis.

Because the thesis was unpublished, it had no impact on the genetics community.

Page 8: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Shannon Married (2) E(lizabeth) Moore

1956

A.J. Han Vinck, Johannesburg, June 2016 8

Page 9: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Transmission problem

A.J. Han Vinck, Johannesburg, June 2016 9

FIGURE 1

Page 10: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

ENTROPY a fundamental QUANTITY

• Entropy:= minimum average (binary) representation length of a source

• Shannon 1948

• Source coding: minimum can be obtained! (eg Shannon-Fano Coding)

Example: p1,p2,p3 = ½, ¼ , ¼ => m1 = 1, m2= 00, m3= 01 => average representation length H = 3/2

Applications: Internet; Video, Picture coding, storage, cryptography

A.J. Han Vinck, Johannesburg, June 2016 10

Page 11: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Problem entropy estimation

• How to estimate the entropy for:

• Limited number of samples (spike trains in neuro science)

• Sources with unknown memory

A.J. Han Vinck, Johannesburg, June 2016 11

Estimation of the entropy based on its polynomial representation, Phys. Rev. E 85, 051139 (2012) [9 pages], Martin Vinck, Francesco P. Battaglia, Vladimir B. Balakirsky, A. J. Han Vinck, and Cyriel M. A. Pennartz

Page 12: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

12

Message encryption without source coding

Part 1 Part 2 ••• Part n (for example every part 56 bits)

•••

key

••• n cryptograms,

encypher

Part 1

decypher•••

Part 2 Part n

Attacker:

n cryptograms to analyze for particular message of n parts

key

dependency exists between parts of the message

dependency exists between cryptograms

A.J. Han Vinck, Johannesburg, June 2016

Page 13: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

13

Message encryption with source coding

Part 1 Part 2 ••• Part n

1 cryptogram

source encode

encypherkey

decypher

Source decode

Part 1 Part 2 ••• Part n

Attacker:

- 1 cryptogram to analyze for particular message of n parts

- assume data compression factor n-to-1

Hence, less material for the same message!

(for example every part 56 bits)

n-to-1

A.J. Han Vinck, Johannesburg, June 2016

Page 14: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Channel capacity: = maximum reduction in representation length with Pe ≤ ε !

Information: = Entropy before transmission H(X) – Entropy after transmission Hy(X)

I(X;Y), Fano

A.J. Han Vinck, Johannesburg, June 2016 14

= H(Y) – HX(Y)

= H(Y) – HX(Y)

Page 15: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016 15

Gaussian input X Output Y (also Gaussian)

AWGN: G2

Capacity for AWGN

W is (single sided) bandwidthS is average power

x2≤ S/2W

y2 = x

2 + G2

S/2W(1logWbits/sec.)

σ

σ(1WlogCapacity

2G

22G

2X

2

Claude Shannon

Page 16: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016

Capacity achieving Codes exist (Shannon, 1948)

Sketch of proof:

Encoding: use a random code

Decoding:

1. look for a „closest“ code word (PERROR => 0, law of large numbers)

2. Probability that another codeword is in the decoding region => 0(random code word selection)

The first rigorous proof for the discrete case is due to Amiel Feinstein in 1954.

Mathematicians did not like this (engineering) approach!

16

Page 17: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Capacity powerlimited channel (PLC channel)

A.J. Han Vinck, Johannesburg, June 2016 17

Figure 1: Maximum output level in the frequency range 3 kHz to 148.5 kHz in dB (µV)

Example CENELEC)

Page 18: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Capacity over Gaussian inputs?

A.J. Han Vinck, Johannesburg, June 2016 18

Page 19: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Rate distortion theory

A.J. Han Vinck, Johannesburg, June 2016 19

Page 20: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

20

Rate distortion theory (supposed to be difficult, covering problem)

Replace a source output X by another X‘ with average distortion ≤ D: task is to minimize H(X‘)

X X‘ difference X and X‘ 1binarysource mapping

Solution: the 16 Hamming codewords cover all sequences 128 of length 7 with a difference 1.

Hence, the efficiency is 4/7. How does it look like for general Hamming codes?

The Hamming codewords are linear combinations of the vectors: (1 0 0 0 1 1 1; 0 1 0 0 1 1 0; 0 0 1 0 1 0 1; 0 0 0 1 0 1 1)

A.J. Han Vinck, Johannesburg, June 2016

example

H(X‘) = I(X;X‘) + H(X‘|X)H(X)

since X is given, choose the quantizer (mapping of X to X‘)

Page 21: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A Hamming code can be represented as Venn diagramm (why?)

• Example (31,26). Can you do (15,11)?

A.J. Han Vinck, Johannesburg, June 2016 21

6th Asia-Europe Workshop on Information Theory, Ishigaki Island, Okinawa

Page 22: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Shannon‘s original crypto paper, 1949

A.J. Han Vinck, Johannesburg, June 2016 22

Page 23: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Contribution still used in DES and AES

A.J. Han Vinck, Johannesburg, June 2016 23

Page 24: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

For Perfect secrecy necessary condition:

H(S|X) = H(S)

=> H(S) ≤ H(B)

i.e. # of messages ≤ # of keys

B

For Perfect secrecy we have a necessary condition:

H(S|X) = H(S)

=> H(S) ≤ H(B)

i.e. # of messages ≤ # of keys

s B

s s B B = s

Secrecy rate: Cs = H(B) = amount of secret bits/tr

Aaron Wyner

Wiretap channel model

secret

s B

s

B

s

24A.J. Han Vinck, Johannesburg, June 2016

sender

receiver senderreceiver

wiretappereavesdropper

B

Page 25: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

For Perfect secrecy H(S|X) = H(S)

H(S) ≤ H(B) – H(E)

i.e. we pay a price for the noise!

25

= B E

s B

s s E

BB E

Secrecy rate Cs = H(B) - H(E) = # secret bits/transmission

Aaron Wyner

Wiretap channel model

s B

s

B

E

s Esendersender

receiver receiver

wiretappereavesdropper

A.J. Han Vinck, Johannesburg, June 2016

E

Page 26: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016 26

Page 27: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Examples: binary input

1

0

0

1

1

0 0

0

wiretapper

Only interesting cases!

A.J. Han Vinck, Johannesburg, June 2016 27

Page 28: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A simple code: Hagelbarger code for the and

1

0

0

1

1

0 0

0

First transmssion

1

1 0

0

Second transmssion

Code word length (av) : ¼ x 1 + ¾ x 2 = 7/4

Rate/user = 4/7 bit/tr

Wiretapper ambiguity: ½ x 1 bit/square

Hence: joint ambiguity = 2/7 bit/tr

0

0

A.J. Han Vinck, Johannesburg, June 2016 28

Page 29: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Only inner and outer bound are known (open)

Inner bound: independent input

Outer bound: dependent inputs

Schalkwijk

A.J. Han Vinck, Johannesburg, June 2016 29

David Hagelbarger at Bell labs

Page 30: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Achievable security:

Secrecy

rate

Hagelbarger

A.J. Han Vinck, Johannesburg, June 2016 30

Page 31: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

An interesting problem (smart grid)

• Suppose that - a question is public (give me your consumption,

- but the answer is secret (I used xx KWh)

What does it mean for the security?

A.J. Han Vinck, Johannesburg, June 2016 31

Page 32: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016 32

Page 33: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Shannon and feedback

But what about:

- Channels with memory

- Multi user channels like MAC?

A.J. Han Vinck, Johannesburg, June 2016 33

Page 34: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Interesting observation from the two terminal paper from Shannon (1961)

MAC

A.J. Han Vinck, Johannesburg, June 2016 34

First results appear in: R. Ahlswede, “Multi-way communication channels,” in Proceedings of 2nd International Symposium on Information Theory (Thakadsor, Armenian SSR, Sept. 1971), Publishing House of the Hungarian Academy of Science, Budapest, 1973, pp. 23–52

Page 35: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Two-adder with feedback improves over non-feedback!

• Coding Techniques and the Two-Access Channel,, In Multiple Access Channels: Theory and Practice Eds. E. Biglieri, L. Györfi, pp. 273-286, IOS Press, ISBN, 978-1-58603-728-4, 2007

R1

1

0.5

00 .5 1 R2

X1

X2

Y

A.J. Han Vinck, Johannesburg, June 2016 35

X1

X2

0

00

1

11

1

2

• Solution: users know each others input due to the feedback

• They solve the problem for the receiver in total cooperation (log 3 bits/transmission)

Capacity region model

Improvements?

Page 36: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016 36

Page 37: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Memory systems: defects known to writer, not to the reader

A.J. Han Vinck, Johannesburg, June 2016 37

Capacity is 1-p bits/cell

Defects!

Page 38: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016 38

Q: how does coding influence the MTTF?

N = number of words

Page 39: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

An Achievable Region for the Gaussian Wiretap Channel with Side Information,IEEE Transactions on Information Theory, May 2006, C. Mitrpant, A.J. Han Vinck and Yuan Luo, iSSN 0018-9448

A.J. Han Vinck, Johannesburg, June 2016 39

CM

Enc: P + Q

{0,Q}

No interference

No CSI

Page 40: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016 40

CONSTRAINED SEQUENCES from the 1948 paper

FIGURE 2!

Page 41: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

„Our“ Kees Immink got famous for using constrained sequences for CD!

A.J. Han Vinck, Johannesburg, June 2016 41

• AES Convention, New York, 1985

• Claude Shannon, and Kees Immink

Johannesburg, 2014Johannesburg, 1994

Page 42: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

What are the symbol constraints for writing on a CD ?

A.J. Han Vinck, Johannesburg, June 2016 42

Not too short

Not too longLong „CONSTANT“ sequences give synchronization problems

Short symbol duration gives detection problems

Symbol length has discrete values!

Page 43: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016

a remarkable observation can be made

0 1 0 0 0 0 1 0 0 1 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0

minimum duration of pit (land) = 3 units!

8 information bitsin 17(16) positions

Traditional coding: the length of pits and lands is a multple of the minimum duration

8 information bitsin 24 positions

DENSITY GAIN≈ 40%

43

minimum duration of pit (land) = 3 units

Constrained code:

Coded modulation with a constraint on the minimum channel symbol duration, Mengi, A.J. Han Vinck, Conference Proceeding: 08/2009; DOI: 10.1109/ISIT.2009.5205832In proceeding of: IEEE International, Symposium on Information Theory, 2009. ISIT 2009.

Page 44: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Optical rewritable disk(Sony): writing only in 1 direction

A.J. Han Vinck, Johannesburg, June 2016

F. M. J. Willems and A. J. H. Vinck, "Repeated recording for an optical disk", Proc. 7th Symp. Information Theory in the Benelux, pp.49 -53 1986

Example: 6 messages, word length n = 5 => R = 0.51 > 0.5 !

code book 0 10 0 0 0 0

1 0 0 0 0 0 1 0 0 10 1 0 0 0 1 0 1 0 00 0 1 0 0 0 1 0 1 00 0 0 1 0 0 0 1 0 10 0 0 0 1 1 0 0 1 0

code book 1 01 1 1 1 1 0

0 1 1 1 1 1 0 1 1 0 1 1 0 1 1 1 0 1 0 1 1 21 1 0 1 1 1 0 1 0 1 31 1 1 0 1 1 1 0 1 0 41 1 1 1 0 0 1 1 0 1 5

6 messages

Property: from any code word in code book 0 1 to any word in code book 1 0 and back

Example: 0 0 0 1 0 0 1 0 1 1 0 0 0 1 0 1 0 1 1 0 ...0 1 1 0 0 1

44

Still work to do!

Page 45: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Generalized WOM (flash), model

Example: q = 41 step increment

Level

0

1

2

3

T = 1 2 3 4 …

Log(# sequences) ≈ ?

A.J. Han Vinck, Johannesburg, June 2016

On the Capacity of Generalized Write-Once Memory with State Transitions Described by an Arbitrary Directed Acyclic Graph, Fang-Wei Fu and A. J. Han Vinck, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 1, JANUARY 1999

45

Log(# sequences) ≈ (q-1) log2 (T+1) a factor of (q-1) !! more than the binary WOM

Page 46: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Performance 1 step-up for q-ary flash memory where P(1) = p

A.J. Han Vinck, Johannesburg, June 2016

average number of writes to reach top level (erase)

w = (q-1)/2p(1-p)

average increase2p(1-p) per writing

Average amount of information stored w x h(p)

≈ ½ (q-1) log2(T+1) for p = 1/(T+1)

Conclusion: storage capacity improvedaverage time before erasure w ≈ Tq/2

0

1

1-p

p

p

1-p1

1

0

0

q-1

level flash

10101010

46

Page 47: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

The waterfilling argument

A.J. Han Vinck, Johannesburg, June 2016 47

Page 48: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A influences the frequency of occurence of impulse noise

A.J. Han Vinck, Johannesburg, June 2016 48

A simple two states impulse model

2G

2I

2G

2G

2I

2G

2 σ 1001A

1σ σ ;σ 101σ σσ

0.01T 0.1; A impulse of frequency average :Example

/Tσσfor 2G

2I

Page 49: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

49

(un)known at transmitter channel state (un)known at receiver

Input X Output Y

Q1: channel capacity ?

It is not realistic to assume that the transmitter knows the state

Middleton class-A noise model: what is the channel capacity?

A

1σ+σ 2

I2G

2Gσ

Thus, Q2:what happens if only the receiver knows the state?

A.J. Han Vinck, Johannesburg, June 2016

Page 50: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

What can we gain by using the channel state? (memory of the noise)

• Using waterfilling argument (high P)

)A/σ+σ

P/2B+σ+σ(ABlog+)

σ

P/2B+σ+(1A)Blog-(1=)++capacity( 2

I

2

G

2

I

2

G

22

G

2

I

2

)A/σ+σ

P/2B+A/σ+σ(ABlog+)

σ

P/2B+(1A)Blog-(1=)+-capacity( 2

I

2

G

2

I

2

G

22

G2

)σ+σ

P/2B+(1Blog=)-,-capacity( 2

I

2

G2

dB )σ

σ+(110log≈gain 2

G

2

I

10

A)-P/2B(1+(1A)Blog-(1=+)capacity(+ power)(low 2

G2

A.J. Han Vinck, Johannesburg, June 2016 50

• Using Gaussian input with average power ≤ P

• The randomized (Gaussian) channel

Page 51: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

1956, Shannon and the „BANDWAGON“

• Shannon was critical about „his information theory“

A.J. Han Vinck, Johannesburg, June 2016 51

Page 52: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016 52

There are also otherbooks than we are usedto!

Page 53: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016 53

PLAY is the only way

the highest intelligence of humankind

can unfold

J.C. Pearce.

Page 54: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Wiener influenced Shannon at MIT

A.J. Han Vinck, Johannesburg, June 2016 54

Norbert Wiener defined cybernetics in 1948 as

"the scientific study of control and communication in the animal and the machine."[2]

The word cybernetics comes from Greek κυβερνητική (kybernetike),

Page 55: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Dave Hagelbarger and Claude Shannon

Claude Shannon's 1953 Outguessing Machine, at the MIT Museum.

(both Hagelbarger and Shannon produced a guessing machine)

A.J. Han Vinck, Johannesburg, June 2016 55

Page 56: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Shannon and the useless (ultimate) machine

• Many intelligent machines were produced (see Wikipedia), but also …

• https://youtu.be/urgL4Br2rqI

A.J. Han Vinck, Johannesburg, June 2016 56

Page 57: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

Summary of some other contributions of Shannon

• artificial intelligence, or AI.

• In 1950 he wrote a paper called "Programming a digital computer for playing chess" which essentially invented the whole subject of computer game playing.

• JUGGLING (THEOREM)

• apply mathematics to beat the game of roulette. Thorp and Shannon build what is widely regarded to be the first wearable computer.

• Stock market/gambling

A.J. Han Vinck, Johannesburg, June 2016 57

Scientific American

Page 58: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

retirement is a transition from whatever you were doing to whatever you want to do, at whatever rate you want to make the transition."

• Without words

A.J. Han Vinck, Johannesburg, June 2016 58

Page 59: Shannon and my research - uni-due.de · The book co-authored with Warren Weaver, The Mathematical Theory of Communication, reprints Shannon's 1948 article and Weaver's popularization

A.J. Han Vinck, Johannesburg, June 2016 59

In GermanyVery famousGasthaus Petersberg, Bonn