{"id":17546,"date":"2025-03-07T14:28:11","date_gmt":"2025-03-07T13:28:11","guid":{"rendered":"https:\/\/ceti.one\/tactile-internet-ceti2\/m1-models-of-human-behaviour-copy-copy-copy\/"},"modified":"2025-05-22T17:13:53","modified_gmt":"2025-05-22T15:13:53","slug":"m4-information-theory","status":"publish","type":"page","link":"https:\/\/ceti.one\/de\/tactile-internet-ceti2\/m4-information-theory\/","title":{"rendered":"M4 \u2013 Informationstheorie"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-image:linear-gradient(90deg, var(--awb-custom_color_4) 0%,var(--awb-color1) 100%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 1800px + 75px );margin-left: calc(-75px \/ 2 );margin-right: calc(-75px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-flex-column body-text-force-white\" style=\"--awb-bg-color:var(--awb-color1);--awb-bg-color-hover:var(--awb-color1);--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:37.5px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:37.5px;--awb-width-medium:40%;--awb-spacing-right-medium:20px;--awb-spacing-left-medium:20px;--awb-width-small:100%;--awb-spacing-right-small:37.5px;--awb-spacing-left-small:37.5px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1858\" height=\"1858\" title=\"header_image_room_M4\" src=\"https:\/\/ceti.one\/wp-content\/uploads\/header_image_room_M4.png\" data-orig-src=\"https:\/\/ceti.one\/wp-content\/uploads\/header_image_room_M4.png\" alt class=\"lazyload img-responsive wp-image-17590\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271858%27%20height%3D%271858%27%20viewBox%3D%270%200%201858%201858%27%3E%3Crect%20width%3D%271858%27%20height%3D%271858%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/ceti.one\/wp-content\/uploads\/header_image_room_M4-200x200.png 200w, https:\/\/ceti.one\/wp-content\/uploads\/header_image_room_M4-400x400.png 400w, https:\/\/ceti.one\/wp-content\/uploads\/header_image_room_M4-600x600.png 600w, https:\/\/ceti.one\/wp-content\/uploads\/header_image_room_M4-800x800.png 800w, https:\/\/ceti.one\/wp-content\/uploads\/header_image_room_M4-1200x1200.png 1200w, https:\/\/ceti.one\/wp-content\/uploads\/header_image_room_M4.png 1858w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column body-text-force-white\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:37.5px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:37.5px;--awb-width-medium:60%;--awb-spacing-right-medium:37.5px;--awb-spacing-left-medium:37.5px;--awb-width-small:100%;--awb-spacing-right-small:37.5px;--awb-spacing-left-small:37.5px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography3-font-size);\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography3-font-family);font-weight:var(--awb-typography3-font-weight);font-style:var(--awb-typography3-font-style);margin:0;letter-spacing:var(--awb-typography3-letter-spacing);text-transform:var(--awb-typography3-text-transform);font-size:1em;--fontSize:40;line-height:var(--awb-typography3-line-height);\">M4 Raum<\/h3><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography1-font-size);\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography1-font-family);font-weight:var(--awb-typography1-font-weight);font-style:var(--awb-typography1-font-style);margin:0;letter-spacing:var(--awb-typography1-letter-spacing);text-transform:var(--awb-typography1-text-transform);font-size:1em;--fontSize:100;line-height:var(--awb-typography1-line-height);\"><h1>Informationstheorie<\/h1><\/h1><\/div><div class=\"fusion-text fusion-text-1 body-text-force-larger-font\" style=\"--awb-font-size:var(--awb-typography4-font-size);--awb-line-height:var(--awb-typography4-line-height);--awb-letter-spacing:var(--awb-typography4-letter-spacing);--awb-text-transform:var(--awb-typography4-text-transform);--awb-text-color:var(--awb-color8);--awb-text-font-family:var(--awb-typography4-font-family);--awb-text-font-weight:var(--awb-typography4-font-weight);--awb-text-font-style:var(--awb-typography4-font-style);\"><p>M4 befasst sich mit den von Landauer und Shannon aufgezeigten grundlegenden Grenzen sowie mit der informationstheoretischen Sicherheit bei der verteilten Datenverarbeitung, der Speicherung und dem Transport von Informationen.<\/p><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling containerOverflow\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:var(--awb-color1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-space-between fusion-flex-content-wrap\" style=\"max-width:calc( 1800px + 75px );margin-left: calc(-75px \/ 2 );margin-right: calc(-75px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-z-index:2;--awb-bg-color:var(--awb-color1);--awb-bg-color-hover:var(--awb-color1);--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:100px;--awb-spacing-right-large:37.5px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:37.5px;--awb-width-medium:100%;--awb-order-medium:1;--awb-spacing-right-medium:37.5px;--awb-spacing-left-medium:37.5px;--awb-width-small:100%;--awb-order-small:1;--awb-spacing-right-small:37.5px;--awb-spacing-left-small:37.5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:25px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography2-font-size);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography2-font-family);font-weight:var(--awb-typography2-font-weight);font-style:var(--awb-typography2-font-style);margin:0;letter-spacing:var(--awb-typography2-letter-spacing);text-transform:var(--awb-typography2-text-transform);font-size:1em;--fontSize:55;line-height:var(--awb-typography2-line-height);\">Schl\u00fcsselfragen<\/h2><\/div><div class=\"accordian fusion-accordian\" style=\"--awb-padding-bottom:5px;--awb-border-size:3px;--awb-icon-size:23px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-content-text-transform:none;--awb-icon-alignment:left;--awb-hover-color:var(--awb-color1);--awb-border-color:var(--awb-color7);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color7);--awb-title-color:var(--awb-color7);--awb-content-color:var(--awb-color8);--awb-icon-box-color:var(--awb-color1);--awb-toggle-hover-accent-color:var(--awb-color8);--awb-toggle-active-accent-color:var(--awb-color8);--awb-title-font-family:var(--awb-custom_typography_1-font-family);--awb-title-font-weight:var(--awb-custom_typography_1-font-weight);--awb-title-font-style:var(--awb-custom_typography_1-font-style);--awb-title-font-size:var(--awb-custom_typography_1-font-size);--awb-title-letter-spacing:var(--awb-custom_typography_1-letter-spacing);--awb-title-line-height:var(--awb-custom_typography_1-line-height);--awb-title-text-transform:var(--awb-custom_typography_1-text-transform);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-17546-1\"><div class=\"fusion-panel panel-default panel-61c5d3f2970ba78b2 fusion-toggle-no-divider fusion-toggle-boxed-mode\" style=\"--awb-content-font-size:var(--awb-typography4-font-size);--awb-content-letter-spacing:var(--awb-typography4-letter-spacing);--awb-content-text-transform:var(--awb-typography4-text-transform);--awb-content-line-height:var(--awb-typography4-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_61c5d3f2970ba78b2\"><a aria-expanded=\"false\" aria-controls=\"61c5d3f2970ba78b2\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-17546-1\" data-target=\"#61c5d3f2970ba78b2\" href=\"#61c5d3f2970ba78b2\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon icon-customarrow-down-right\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon icon-customarrow-right\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Wie k\u00f6nnen KI-gest\u00fctzte Datenkompression und Netzwerkcodierung den Datenverkehr und die Latenzzeit reduzieren?<\/span><\/a><\/h4><\/div><div id=\"61c5d3f2970ba78b2\" class=\"panel-collapse collapse\" aria-labelledby=\"toggle_61c5d3f2970ba78b2\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Untersuchung der KI-gest\u00fctzten Komprimierung zur Verringerung des Datenverkehrs und der Latenzzeiten.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-fbef0fa4ea764a659 fusion-toggle-no-divider fusion-toggle-boxed-mode\" style=\"--awb-content-font-size:var(--awb-typography4-font-size);--awb-content-letter-spacing:var(--awb-typography4-letter-spacing);--awb-content-text-transform:var(--awb-typography4-text-transform);--awb-content-line-height:var(--awb-typography4-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_fbef0fa4ea764a659\"><a aria-expanded=\"false\" aria-controls=\"fbef0fa4ea764a659\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-17546-1\" data-target=\"#fbef0fa4ea764a659\" href=\"#fbef0fa4ea764a659\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon icon-customarrow-down-right\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon icon-customarrow-right\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Wie k\u00f6nnen menschliche und robotergest\u00fctzte Kinematik in Kommunikationsmodelle integriert werden?<\/span><\/a><\/h4><\/div><div id=\"fbef0fa4ea764a659\" class=\"panel-collapse collapse\" aria-labelledby=\"toggle_fbef0fa4ea764a659\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Neue IT-Modelle auf der Grundlage von menschlicher und robotergest\u00fctzter Kinematik.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-81267f0b24acf3dee fusion-toggle-no-divider fusion-toggle-boxed-mode\" style=\"--awb-content-font-size:var(--awb-typography4-font-size);--awb-content-letter-spacing:var(--awb-typography4-letter-spacing);--awb-content-text-transform:var(--awb-typography4-text-transform);--awb-content-line-height:var(--awb-typography4-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_81267f0b24acf3dee\"><a aria-expanded=\"false\" aria-controls=\"81267f0b24acf3dee\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-17546-1\" data-target=\"#81267f0b24acf3dee\" href=\"#81267f0b24acf3dee\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon icon-customarrow-down-right\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon icon-customarrow-right\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Wie kann semantische Kommunikation auf Mensch-Maschine-Interaktionen angewendet werden?<\/span><\/a><\/h4><\/div><div id=\"81267f0b24acf3dee\" class=\"panel-collapse collapse\" aria-labelledby=\"toggle_81267f0b24acf3dee\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div id=\"a54dc53e8ac61a3b6\" class=\"panel-collapse collapse in\" aria-labelledby=\"toggle_a54dc53e8ac61a3b6\">Semantische Kodierung f\u00fcr effiziente Kommunikation in Umgebungen mit geringer Bandbreite.<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-z-index:-1;--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:100px;--awb-spacing-right-large:37.5px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:37.5px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:37.5px;--awb-spacing-left-medium:37.5px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:37.5px;--awb-spacing-left-small:37.5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography2-font-size);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography2-font-family);font-weight:var(--awb-typography2-font-weight);font-style:var(--awb-typography2-font-style);margin:0;letter-spacing:var(--awb-typography2-letter-spacing);text-transform:var(--awb-typography2-text-transform);font-size:1em;--fontSize:55;line-height:var(--awb-typography2-line-height);\">Ansatz<\/h2><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-font-size:var(--awb-typography4-font-size);--awb-line-height:var(--awb-typography4-line-height);--awb-letter-spacing:var(--awb-typography4-letter-spacing);--awb-text-transform:var(--awb-typography4-text-transform);--awb-text-color:var(--awb-color8);--awb-margin-bottom:50px;--awb-text-font-family:var(--awb-typography4-font-family);--awb-text-font-weight:var(--awb-typography4-font-weight);--awb-text-font-style:var(--awb-typography4-font-style);\"><ul>\n<li>Datenreduktion und Kommunikation mit niedriger Latenz: KI-gest\u00fctzte Kompression und Post-Shannon-Kommunikation.<\/li>\n<li>Zuverl\u00e4ssige Kommunikation und neue Informationsquellen: Fortgeschrittene Netzwerkcodierung und neue Kommunikationsalgorithmen.<\/li>\n<li>Souver\u00e4ne Kommunikationssysteme: Entwicklung von Modellen f\u00fcr sichere und private Algorithmen in Umgebungen mit unterschiedlichen Vertrauensstufen.<\/li>\n<\/ul>\n<\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:var(--awb-typography2-font-size);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:var(--awb-typography2-font-family);font-weight:var(--awb-typography2-font-weight);font-style:var(--awb-typography2-font-style);margin:0;letter-spacing:var(--awb-typography2-letter-spacing);text-transform:var(--awb-typography2-text-transform);font-size:1em;--fontSize:55;line-height:var(--awb-typography2-line-height);\">Erwartete Ergebnisse<\/h2><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:var(--awb-typography4-font-size);--awb-line-height:var(--awb-typography4-line-height);--awb-letter-spacing:var(--awb-typography4-letter-spacing);--awb-text-transform:var(--awb-typography4-text-transform);--awb-text-color:var(--awb-color8);--awb-text-font-family:var(--awb-typography4-font-family);--awb-text-font-weight:var(--awb-typography4-font-weight);--awb-text-font-style:var(--awb-typography4-font-style);\"><ul>\n<li>Datenreduzierung um das bis zu 100-fache.<\/li>\n<li>Semantische Kodierung f\u00fcr multimodale Kommunikation.<\/li>\n<li>Modelle f\u00fcr sichere Kommunikation in souver\u00e4nen Umgebungen.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>","protected":false},"excerpt":{"rendered":"","protected":false},"author":27,"featured_media":0,"parent":17518,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-17546","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ceti.one\/de\/wp-json\/wp\/v2\/pages\/17546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ceti.one\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ceti.one\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ceti.one\/de\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/ceti.one\/de\/wp-json\/wp\/v2\/comments?post=17546"}],"version-history":[{"count":0,"href":"https:\/\/ceti.one\/de\/wp-json\/wp\/v2\/pages\/17546\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/ceti.one\/de\/wp-json\/wp\/v2\/pages\/17518"}],"wp:attachment":[{"href":"https:\/\/ceti.one\/de\/wp-json\/wp\/v2\/media?parent=17546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}