Mutual information of two images or signals
- Downloads:
- Views:
- Rating:

Usage: I=mi(A,B), where A and B are equally sized images/signals.
Function hist2 (included) is used to determine the joint histogram of the images/signals. All histograms use 256 bins.
Assumptions: 1) 0*log(0)=0, 2) mutual information is obtained on the intersection between the supports of partial histograms.
Example (in mi_test.m):
disp('Test: Mutual information between two images')
load mri
A=D(:,:,8);
B=D(:,:,9);
mi(A,B)
disp('Test: Mutual information between two signals')
load garchdata
nasdaq = price2ret(NASDAQ);
nyse = price2ret(NYSE);
mi(nasdaq,nyse)
Free download from Shareware Connection - Function hist2 (included) is used to determine the joint histogram of the images/signals. All histograms use 256 bins
Version: 1.0 | Size: 10 KB | Platform: Matlab, Scripts
Released Date: 01-02-2013 | Rating: 0 | Title: Mutual information of two images or signals
Author Url: http://www.mathworks.com
Program Info Url: http://www.mathworks.com
Download Url: http://www.mathworks.com/matlabcentral/fx_files/13289/2/minf.zip
Fast mutual information of two images or signals - Usage: I=mi(A,B), where A and B are equally sized images/signals.
123WebMessenger
Voice Audio Processing
Fractal dimension
Yahoo Messenger
PlaySMS
PID Tuning Using Genetic Algorithm
Continuous Sound and Vibration Analysis
Shock Response Spectrum
Grey prediction algorithm for mobile user localization
GSM Traffic Channel Simulator
OFDM LSE Channel Estimation
Wiener filter for Noise Reduction and speech enhancement
Solutions for Digital and Analog Communication Systems, 7Ed by Leon Couch
Using S-Parameters in MATLAB & Simulink
Affiliate Programs
Animation
Auctions
Audio Systems
Banner Rotation
Blog
Bulletin Boards & Forums
Business & Enterprise
Buttons
Calendars & Events
Charts & Graphs
Chat
Classified Ad Managers
Communication
Sort Images Histogram
Sql Histograms
Moving Histograms
Blood Pressure Histograms
Search Bins
Delete Duplicate Images Pro - Delete Duplicate Images (Microsoft(R) Corp. Recommends) - Delete Duplicate Photos, delete duplicate images and delete duplicate pictures with the Duplicate remover. Delete Duplicate Images - Download software at DeleteDuplicateImages.com !
Remove Duplicate Images Pro - Remove Duplicate Images - duplicate images remover, totally new soft to remove duplicate images is the awesome tool created to remove duplicate images on PC and smoothly find and remove duplicate images on hard drives.
Auction Low Price Grabber Software - Auction Low Price Grabber is an unique software which helps you spend less time for searching any goods with ebay and is also save your money! Ebay auction tool finds best price for given search keyword and shows it.
SBML Test Suite - SBML Test Suite application was developed as an Open Source and accessible software that gives ODE-based simulator developers to test their implementation.
Normalized Mutual Information - Normalized mutual information is often used for evaluating clustering result
Shareware Connection periodically updates pricing and software information of 'Mutual information of two images or signals' from company source 'Jose Delpiano' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'Mutual information of two images or signals' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of Mutual information of two images or signals.
Safe In Cloud - It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...
CyberGhost VPN - There are so many ways available to browse the web nowadays. You can use a plethora of devices and pick from various service providers to get online. However, tech savvy users resort to additional measures to access the internet without being ...
Baidu PC Faster - To keep your laptop or desktop computer running at peak speed and extract optimal performance out of it, using third party apps may be necessary. While some users still rely on Windows inbuilt PC cleanup and maintenance tools, some third party ...
Cold Turkey - To keep your kids and teenage family members away from pornographic and objectionable websites you can use parental control software. Such apps offer numerous restrictive measures to limit PC and web access for young users. However, adult users ...
Efham internet booster - Without using the web, you cannot accomplish a lot of things in life easily. However, the speed of internet access does play a role behind your web usage experience. At times, you may have to cope with sluggish web page rendering, buffering while ...
Google Drive - In last few years, the popularity and proliferation of Cloud storage and usage has shot up considerably. Everyone, including a teenager to a network administrator is using some type of cloud based data storage. You can opt for both free and paid ...
Paint.NET - Nearly every PC user needs to use some type of image editing software nowadays, whether it is for personal or professional reasons. It can be for making minor corrections to your vacation pictures before you share them on social media sites. It ...
Windows Live Family Safety - Using parental control applications has become a necessity for those people who have tech savvy kids and computers at home. In fact, you should use such software even if your kid is not tech savvy. Needless to say, children depend on internet for ...
Privatefirewall - Everything in life has two sides to it and same can be said about technological innovations. It is quite hard to carry out most activities without resorting to the web these days. Yet the internet itself is also the reservoir of malicious ...
Emsisoft Emergency Kit - The way malware creators and hackers are adapting to newer measures to sneak past PC security, it is no longer enough to stay complacent after installing a standalone antivirus. You never know when a stealthy malware sneaks past its scan and ...

