1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juliette [100K]
3 years ago
11

A detective agency is looking to bust an arms sale. According to available intelligence, the sale is likely to happen in one of

the three locations A, B, or C. Historical patterns indicate that P(A) (the likelihood that the sale will happen at A) is twice that of P(B), and likewise, P(B) = 2P(C). What is the probability distribution of the arms sale happening in these 3 places? Let us denote the location of the sale with a memoryless source X, i.e., X takes values ‘A’, ’B’, ’C’, with probabilities P(A), P(B), and P(C) respectively. Calculate it’s entropy H(X) in bits. Note that H(X) represents the amount of uncertainty in the location of the sale. The director of the agency is not very happy with the level of uncertainty. So he looks up recent covert transmissions for hints. He finds a recent coded message from agent Atomic Blonde which indicates that the sale will not happen at C. Let us denote the message from agent Blonde as Y , and in this case Y ="not C". Given this information, what is the new uncertainty H(X|Y = "not C")?
Computers and Technology
1 answer:
Paha777 [63]3 years ago
4 0

Answer:

Probability Distribution={(A, 4/7), (B, 2/7), (C, 1/7)}

H(X)=5.4224 bits per symb

H(X|Y="not C")=0.54902 bits per symb

Explanation:

P(B)=2P(C)

P(A)=2P(B)

But

P(A)+P(B)+P(C)=1

4P(C)+2P(C)+P(C)=1

P(C)=1/7

Then

P(A)=4/7

P(B)=2/7

Probability Distribution={(A, 4/7), (B, 2/7), (C, 1/7)}

iii

If X={A,B,C}

and P(Xi)={4/7,2/7,1/7}

where  Id =logarithm to base  2

Entropy, H(X)=-{P(A) Id P(A) +P(B) Id P(B) + P(C) Id P(C)}

=-{(1/7)Id1/7 +(2/7)Id(2/7) +(4/7)Id(4/7)}

=5.4224 bits  per symb

if P(C)  =0

P(A)=2P(B)

P(B)=1/3

P(A)=2/3

H(X|Y="not C")= -(1/3)Id(I/3) -(2/3)Id(2/3)

=0.54902 bits per symb

You might be interested in
Please Help, Thank you!
nevsk [136]

Answer: Devices connected in a Bluetooth network communicate with each other using ultra-high frequency (UHF) radio waves. These are electromagnetic waves with frequencies around 2.4 gigahertz (2.4 billion waves per second). UHF waves of different frequencies are used in microwave ovens, GPS systems and many other devices, White hat hackers employ the same methods of hacking as black hats, with one exception- they do it with permission from the owner of the system first, which makes the process completely legal. ... There are even courses, training, conferences and certifications for ethical hacking. A hub connects multiple computers together in a Local Area Network (LAN). All information sent to the hub is then sent through each port to every device in the network.

Hubs are unable to tell one computer from another, so they receive information on one port and then blindly forward it to all other ports — whether it was intended for those computers or not.

So even though you may only want to send information to one other computer, if you have five total computers on your network, then there will be four other computers receiving data that wasn’t intended for them. Showing results for are Infrared signals are suitable for long distance data communication..

Search instead for are Infra-red signals are suitable for long distance data communication..

Infrared laser systems can also be used for long-range communication (up to about 2.4 kilometres), with a maximum projected data rate of 16 Mbps. ... An infrared transmitting device, either a light-emitting diode (LED) or a laser diode, converts an electrical signal to an optical signal.

Web Browser is a software which is used to browse and display pages available over internet whereas web server is a software which provides these documents when requested by web browsers. ... Web browser sends an HTTP Request and gets a HTTP Response. Web server receives HTTP Request and sends a HTTP Response.

Simple LANs generally consist of cabling and one or more switches. A switch can be connected to a router, cable modem, or ADSL modem for Internet access. A LAN can include a wide variety of other network devices such as firewalls, load balancers, and network intrusion detection.

Coaxial cable, or coax (pronounced /ˈkoʊ. æks/) is a type of electrical cable consisting of an inner conductor surrounded by a concentric conducting shield, with the two separated by a dielectric (insulating material); many coaxial cables also have a protective outer sheath or jacket.

Terrestrial microwave- The most common type of microwave antenna is the parabolic “dish.”A typical size is about 3 m in diameter. The antenna is fixed rigidly and focuses a narrowbeam to achieve line-of-sight transmission to the receiving antenna. Microwave antennasare usually located at substantial heights above ground level to extend the range betweenantennas and to be able to transmit over intervening obstacles. To achieve long-distancetransmission, a series of microwave relay towers is used, and point-to-point microwave linksare strung together over the desired distance. Used in long haul telecommunicationsservice, as an alternative to coaxial cable or optical fiber.

You can implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent unauthorized internet users from accessing private networks connected to the internet, especially intranets

3 0
3 years ago
Alice and Bob decide to communicate using NTRUEncrypt with parameters (N, p, q) = (7, 3, 29). Alice’s public key is h(x) = 3 + 1
Andrei [34K]

Answer:

Security Innovation NTRU cryptographic software invention and reference source code for NTRUEncrypt are released to public domain under CCO 1.0 license.

Invention U.S. Patent No. U.S. Issue Date U.S. Application No. U.S. Filing Date Countries

Public key cryptosystem method and apparatus 6,081,597 Jun 27, 2000 08/914,449 Aug 19, 1997 US, Japan, Canada, Australia, Israel, China, Europe

Ring-based public key cryptosystem method 6,298,137 Oct 2, 2001 09/543,708 Apr 5, 2000 US, Europe, Canada

Speed enhanced cryptographic method and apparatus 7,031,468 Apr 18, 2006 09/939,531 Aug 24, 2001 US, Europe, Canada

Explanation:

4 0
3 years ago
And there you go <br> sorry its saying my thing is tooo small
zaharov [31]

Answer:

Global knowledge is the answer

6 0
3 years ago
Read 2 more answers
What are the three main components of a for loop?
insens350 [35]

Answer:

Similar to a While loop, a For loop consists of three parts: the keyword For that starts the loop, the condition being tested, and the EndFor keyword that terminates the loop.

Explanation:

Loop statements usually have four components: initialization (usually of a loop control variable), continuation test on whether to do another iteration, an update step, and a loop body.

8 0
3 years ago
A species of snake lives in a rainforest. Which would be an adaptation for this
raketka [301]

Answer:

The Answer is D

6 0
3 years ago
Read 2 more answers
Other questions:
  • When searching the web software programs called fetch a few web pages and then they follow the links on those pages and fetch th
    9·2 answers
  • Which would you trade on a stock exchange? A: Shares B: Bonds C: Annuities
    6·2 answers
  • Which questions should you ask yourself when performing research online?
    9·1 answer
  • Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named ga
    12·1 answer
  • Tell me the most scariest website you know and i'll give you brainlest
    5·1 answer
  • What is the name for the size and style of text?
    8·2 answers
  • You can put ______ on your phone.
    10·1 answer
  • How do you mark the brainiest?
    8·2 answers
  • What is the difference between information poor and information rich<br>​
    13·1 answer
  • Customer history is an example of what
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!