ﻻ يوجد ملخص باللغة العربية
If each node of an idealized network has an equal capacity to efficiently exchange benefits, then the networks capacity to use energy is scaled by the average amount of energy required to connect any two of its nodes. The scaling factor equals textit{e}, and the networks entropy is $ln(n)$. Networking emerges in consequence of nodes minimizing the ratio of their energy use to the benefits obtained for such use, and their connectability. Networking leads to nested hierarchical clustering, which multiplies a networks capacity to use its energy to benefit its nodes. Network entropy multiplies a nodes capacity. For a real network in which the nodes have the capacity to exchange benefits, network entropy may be estimated as $C log_L(n)$, where the base of the log is the path length $L$, and $C$ is the clustering coefficient. Since $n$, $L$ and $C$ can be calculated for real networks, network entropy for real networks can be calculated and can reveal aspects of emergence and also of economic, biological, conceptual and other networks, such as the relationship between rates of lexical growth and divergence, and the economic benefit of adding customers to a commercial communications network. textit{Entropy dating} can help estimate the age of network processes, such as the growth of hierarchical society and of language.
Mobile traffic is projected to increase 1000 times from 2010 to 2020. This poses significant challenges on the 5th generation (5G) wireless communication system design, including network structure, air interface, key transmission schemes, multiple ac
Degraded K-user broadcast channels (BC) are studied when receivers are facilitated with cache memories. Lower and upper bounds are derived on the capacity-memory tradeoff, i.e., on the largest rate of reliable communication over the BC as a function
We introduce an axiomatic approach to entropies and relative entropies that relies only on minimal information-theoretic axioms, namely monotonicity under mixing and data-processing as well as additivity for product distributions. We find that these
Using a sharp version of the reverse Young inequality, and a Renyi entropy comparison result due to Fradelizi, Madiman, and Wang, the authors are able to derive Renyi entropy power inequalities for log-concave random vectors when Renyi parameters bel
In this work, we study coded placement in caching systems where the users have unequal cache sizes and demonstrate its performance advantage. In particular, we propose a caching scheme with coded placement for three-user systems that outperforms the