Using Information Theory
From Numb3rs
00:00 - 01:09
1m 9s
In this episode, Charlie uses information theory and information entropy to help understand the manifesto and probabilistic graph theory in an attempt to determine where the perpetrator is likely to be found.

Comments

Please sign in to write a comment.
Video Transcript

Related Clips

While investigating a major meth laboratory, Charlie and Megan recover a hard drive belonging to the primary meth distributor. Unfortunately, the disk had been badly damaged by the explosion of the meth lab. In spite of that - and luckily for the investigators - in many cases it is still possible to recover data on a badly damaged drive by making use of a computer's built-in redundancy in data. Essentially, even large portions of the files on a drive are lost or erased, because of symmetry and redundancy in most modern data storage, Charlie had a chance!
Bill Nye show us how a circuit works by comparing electrons to water.
This clip describes how computers work and how humans can interact with them. It makes mention of the programming language, BASIC, in addition to basic units of information such as bits and bytes.
Charlie explains how a string metric can be used to detect plagiarism.
Zuckerberg hacks the webpages of multiple fraternities and sororities to collect images of all its members. He speaks about the relative ease of hacking since many of the pages are open with available indexes.