Lec 05 Arithmetic Coding

Size: px
Start display at page:

Download "Lec 05 Arithmetic Coding"

Transcription

1 Outline CS/EE 5590 / ENG 40 Special Topics (7804, 785, 7803 Lec 05 Arithetic Coding Lecture 04 ReCap Arithetic Coding About Hoework- and Lab Zhu Li Course Web: Z. Li Multiedia Counciation, 06 Spring p. Z. Li Multiedia Counciation, 06 Spring p. JPEG Coding Coding of AC Coefficients Block (8x8 pel based coding DCT transfor to find sparse representation Quantization reflects huan visual syste Zig-Zag scan to convert D to D string Run-Level pairs to have even ore copact representation Hoffan Coding on Level Category Fixed on the Level with in the category = * Quant Table: Zigzag scanning: Exaple Exaple: zigzag scanning result EOB (Run, level representation: (0, 4, (0, -3, (, -4, (0, -, (, 6, (0, -, (3, -, (0, -, (3,, (0, -, (5, -, EOB Z. Li Multiedia Counciation, 06 Spring p.3 Z. Li Multiedia Counciation, 06 Spring p.4

2 Run / Catg. Base codeword Coding of AC Coefficients Run / Catg. Base Codeword Run / Cat. Base codeword EOB ZRL 00 0/ 00 / 00 5/ 00 0/ 0 / 0 5/ 00 0/3 00 /3 00 5/3 0 0/4 0 /4 00 5/ /5 00 /5 00 5/5 00 ZRL: represent 6 zeros when nuber of zeros exceeds 5. Exaple: 0 zeros followed by -: (ZRL, (4, -. (Run, Level sequence: (0, 4, (0, -3, (, -4, Run/Cat. Sequence: 0/5, 0/5, /3, 4 is the 4-th entry in Category 5 (0, 4: is the 3-th entry in Category 3 (, -4: 00 0 Lecture 04 ReCap Outline Arithetic Coding Basic Encoding and Decoding Uniqueness and Efficiency Scaling and Increental Coding Integer Ipleentation About Hoework- and Lab Thanks for Prof. Jie Liang s Slides on Arithetic Coding, very rich in details! Z. Li Multiedia Counciation, 06 Spring p.5 Z. Li Multiedia Counciation, 06 Spring p.6 Arithetic Coding The SciFi Story When I was in y 5 th grade. Aliens visit earth. Z. Li Multiedia Counciation, 06 Spring p.7 Huffan Coding Replacing an input sybol with a codeword Need a probability distribution Hard to adapt to changing statistics Need to store the codeword table Miniu codeword length is bit Arithetic Coding Replace the entire input with a single floating-point nuber Does not need the probability distribution Adaptive coding is very easy No need to keep and send codeword table Fractional codeword length Z. Li Multiedia Counciation, 06 Spring p.8

3 Introduction Recall table look-up decoding of Huffan code N: alphabet size L: Max code word length Divide [0, ^L] into N intervals 00 One interval for one sybol Interval size is roughly 00 0 proportional to sybol prob Arithetic coding applies this idea recursively Noralizes the range [0, L ] to [0, ]. Map an input sequence (ultiple sybols to a unique tag in [0,. abcd.. dcba.. 0 Z. Li Multiedia Counciation, 06 Spring p.9 Arithetic Coding Sybol set and prob: a (0.8, b(0.0, c(0.8 Disjoint and coplete partition of the range [0, [0, 0.8, [0.8, 0.8, [0.8, Each interval corresponds to one sybol Interval size is proportional to sybol probability The first sybol restricts the tag position to be in one of the intervals The reduced interval is partitioned recursively as ore sybols are processed Observation: once the tag falls into an interval, it never gets out of it Z. Li Multiedia Counciation, 06 Spring p.0 a b c Soe Questions to think about: Exaple: Why copression is achieved this way? How to ipleent it efficiently? How to decode the sequence? Why is it better than Huffan code? Sybol Prob Map to real line range [0, Order does not atter Decoder needs to use the sae order Disjoint but coplete partition: : [0, 0.8: 0, : [0.8, 0.8: 0.8, : [0.8, : 0.8, Z. Li Multiedia Counciation, 06 Spring p. Z. Li Multiedia Counciation, 06 Spring p.

4 Range 0.44 Range Concept of the encoding (not practical Input sequence: 3 Range Range Terination: Encode the lower end or idpoint to signal the end. Difficulties:. Shrinking of interval requires very high precision for long sequence.. No output is generated until the entire sequence has been processed. Z. Li Multiedia Counciation, 06 Spring p.3 Encoder Pseudo Code Cuulative Density Function (CDF For continuous distribution: x F ( x P( x p( x dx For discrete distribution: F ( i P( i P( k k P( i F ( i F ( i. Properties: Non-decreasing Piece-wise constant Each segent is closed at the lower end. i Probability Mass Function CDF Z. Li Multiedia Counciation, 06 Spring p.4.0 Keep track of LOW, HIGH, RANGE Any two are sufficient, e.g., LOW and RANGE. Encoder Pseudo Code LOW=0.0, HIGH=.0; while (not EOF { n = ReadSybo; RANGE = HIGH - LOW; HIGH = LOW + RANGE * CDF(n; LOW = LOW + RANGE * CDF(n-; output LOW; Concept of the Decoding Arithetic Decoding (conceptual Suppose encoder encodes the lower end: Decode Decode Zoo In by * CDF * CDF Input HIGH LOW RANGE Initial *0.8= *0 = *= *0.8= *0.8= *0.8= *0= *0.8= Z. Li Multiedia Counciation, 06 Spring p.5 3 Decode * CDF Decode Drawback: need to recalculate all thresholds each tie.

5 Noralize RANGE to [0, each tie No need to recalculate the thresholds. Receive 0.77 Decode x =( / 0.8 = Decode x =( / 0.8 = Decode x =( / 0.0 = 0 Decode. Stop. Siplified Decoding (Floating Pt Ops x x low range Low = 0; high = ; x = GetEncodedNuber(; Decoder Pseudo Code While (x low { n = DecodeOneSybox; output sybol n; x = (x - CDF(n- / (CDF(n - CDF(n-; ; But this ethod still needs high-precision floating point operations. It also needs to read all input at the beginning of the decoding. Outline Uniqueness Lecture 04 ReCap Arithetic Coding Basic Encoding and Decoding Uniqueness and Efficiency Scaling and Increental Coding About Hoework- and Lab Z. Li Multiedia Counciation, 06 Spring p.9 Range Terination: Encode the idpoint (or lower end to signal the end. How to represent the final tag uniquely and efficiently? Answer: Take the binary value of the tag T( and truncate to ( is the sequence {x,, x, not individual sybol log bits. ( p Proof: Assuing idpoint tag: T( F( - p(, p( 0. First show the truncated code is unique, that is, code is within [F(-, F(.. T ( F( T( l T( So ( bit longer than Shannon code is below the high end of the interval. Z. Li Multiedia Counciation, 06 Spring p.0

6 . By def, Together with Thus l ( Uniqueness and Efficiency log p( T( F( - T( - F( - T(- T( l ( log p( p(, p( p( ( l F(. T( l ( T( F( F( l ( p( 0. - ( l So the truncated code is still in the interval. This proves the uniqueness. F( T( ( l T( F(- Uniqueness and Efficiency Prove the code is uniquely decodable (prefix free: Any code with prefix T( is in T(, T( l ( l ( Need to show that this is in [F(-, F( : We already show F(. T( l ( F( T( Only need to show p( F( T( F( T ( T( is prefix free if log bits. ( p F( T( T( l ( F(- Z. Li Multiedia Counciation, 06 Spring p. Z. Li Multiedia Counciation, 06 Spring p. Efficiency of arithetic code: L E p( P( Uniqueness and Efficiency log p( log p( P( bits. log p( ( H is the bits to code a sequence {x,x,, x. Assue iid sequence, H ( H ( L H ( H ( x x : {,..., L/ H( for large, stronger than prev results. Z. Li Multiedia Counciation, 06 Spring p.3 Uniqueness and Efficiency Coparison with Huffan code: Expected length of Huffan code: H ( L * H ( Huffan code can reduce the overhead by jointly encoding ore sybols, but needs uch larger alphabet size. Arithetic coding is ore efficient for longer sequences. Z. Li Multiedia Counciation, 06 Spring p.4

7 Lecture 04 ReCap Outline Arithetic Coding Basic Encoding and Decoding Uniqueness and Efficiency Scaling and Increental Coding About Hoework- and Lab Scaling and Increental Coding Probles of Previous exaples: Need high precision No output is generated until the entire sequence is encoded. Decoder needs to read all input before decoding. Key Observation: As the RANGE reduces, any MSB s of LOW and HIGH becoe identical: Exaple: Binary for of 0.77 and : , , We can output identical MSB s and re-scale the rest: Increental encoding Can achieve infinite precision with finite-precision integers. Three scaling scenarios: E, E, E3 Iportant Rules: Apply as any scalings as possible before further encoding and decoding. Z. Li Multiedia Counciation, 06 Spring p.5 Z. Li Multiedia Counciation, 06 Spring p.6 E (lower half and E (higher half Scaling E: [LOW HIGH in [0, 0.5 LOW: 0.0xxxxxxx (binary, HIGH: 0.0xxxxxxx. Output 0, then shift left by bit [0, 0.5 [0, : E(x = x E: [LOW HIGH in [0.5, LOW: 0.xxxxxxx, HIGH: 0.xxxxxxx Encoding with E and E Input Input Input Sybol Prob E: Output (x 0.5 E: Output E: x, Output 0 E: Output 0 Output, subtract 0.5, shift left by bit [0.5, [0, : E(x = (x The 3 rd 0 scaling, E3(id, will be studied later: LOW < 0.5, HIGH > 0.5, but range < 0.5. Z. Li Multiedia Counciation, 06 Spring p.7 Input E: Output E: Output Encode any value in the tag, e.g., 0.5 Output All: 000 (0.7734

8 To verify LOW = ( in binary, HIGH = ( in binary. So we can send out 000 (0.535 Equivalent to EEEEE After left shift by 5 bits: LOW = ( x 3 = HIGH = ( x 3 = 0.54 Sae as the result in the last page. (In this exaple, suppose 7 bits are enough for the decoding Z. Li, Multiedia Counciation, 06 Spring p.9 Coparison with Huffan Rule: Coplete all possible scaling before encoding the next sybol Input Sybol does not cause any output Input Sybol 3 generates bit Input Sybol generates 5 bits Sybol Prob Sybols with larger probabilities generates less nuber of bits. Soeties no bit is generated at all Advantage over Huffan coding Large probabilities are desired in arithetic coding Can use context-adaptive ethod to create larger probability and to iprove copression ratio. Z. Li, Multiedia Counciation, 06 Spring p.30 Increental Decoding If input is 000, the st sybol can be decoded without abiguity after 5 bits are read. When 6 bits are read, the status is: Read 5 bits: Decode After reading 6 bits: Tag: 000, No scaling Decode 3, E scaling: Shift out bit, read bit Tag: 000 ( Decode, E scaling Tag: 0000 ( E: Tag: 0000 ( E: Tag: 0000 (0.375 E: Tag: 0000 (0.75 E: Tag: (0.5 Decode Z. Li, Multiedia Counciation, 06 Spring p.3 Encoding Pseudo Code with E, E Rule: Coplete all possible scalings before further decoding. Adjust LOW, HIGH and Tag together. (For floating-point ipleentation EncodeSybon { //Update variables RANGE = HIGH - LOW; HIGH = LOW + RANGE * CDF(n; LOW = LOW + RANGE * CDF(n-; Sybol Prob. CDF //Apply all possible scalings before encoding the //next sybol while LOW, HIGH in [0, 0.5 or [0.5, { Output 0 for E and for E scale LOW, HIGH by E or E rule Z. Li, Multiedia Counciation, 06 Spring p.3

9 Decoding Pseudo Code with E, E (For floating-point ipleentation DecodeSyboTag { RANGE = HIGH - LOW; n = ; While ( (tag - LOW / RANGE >= CDF(n { n++; HIGH = LOW + RANGE * CDF(n; LOW = LOW + RANGE * CDF(n-; //keep scaling before decoding next sybol while LOW, HIGH in [0, 0.5 or [0.5, { scale LOW, HIGH by E or E rule read one ore bit, update Tag return n; Sybol Prob. CDF E3 Scaling: [0.5, 0.75[0, If RANGE straddles /, E and E cannot be applied, but the range can be quite sall Exaple: LOW=0.4999, HIGH=0.500 Binary: LOW=0.0., HIGH=0.000 We ay not have enough bits to represent the interval. E3 Scaling: [0.5, 0.75 [0, : E3(x = (x Z. Li, Multiedia Counciation, 06 Spring p.33 Z. Li, Multiedia Counciation, 06 Spring p.34 Exaple Input Input Input With E3: Input Previous exaple without E3: (E: Output E: Output E: Output 0 E3: (x-0.5x E: Output state after E E3 = state after E E, but outputs are different Encoding Operation with E3 Without E3: Input With E3: Input E: Output E: Output E3 (no output E: Output Don t send anything when E3 is used, but send a 0 after E: Sae output, sae final state Equivalent operations Output 0 here!

10 Decoding for E3 0 Without E3: Input 000 Read 6 bits: Tag: 000 ( Decode Decode 3, E scaling Tag: 000 ( Decode, E scaling Tag: 0000 ( E: Tag: 0000 (0.875 With E3: Tag: 000 ( E3: Tag: 000 ( Decode, E scaling Tag: 0000 (0.875 Apply E3 whenever it is possible, everything else is sae. Z. Li, Multiedia Counciation, 06 Spring p.37 Suary of Different Scalings Need E scaling Need E scaling Need E3 scaling No scaling is required. Continue to encode/decode the next sybol. Z. Li, Multiedia Counciation, 06 Spring p.38 Binary Arithetic Coding Arithetic coding is slow in general: To decode a sybol, we need a series of decisions and ultiplications: While (Tag > LOW + RANGE * Su(n / N - { n++; The coplexity is greatly reduced if we have only two sybols: 0 and. sybol 0 sybol 0 x Only two intervals: [0, x, [x, Z. Li, Multiedia Counciation, 06 Spring p.39 Encoding of Binary Arithetic Coding HIGH LOW RANGE CDF( n LOW LOW RANGE CDF( n LOW = 0, HIGH = Prob(0=0.6. Sequence: 00 LOW = 0, HIGH = LOW = 0.36, HIGH = LOW = 0.504, HIGH = LOW = 0.504, HIGH = Only need to update LOW or HIGH for each sybol. Z. Li, Multiedia Counciation, 06 Spring p.40

11 Decoding of Binary Arithetic Coding Tag General case (integer ipleentation: While (Tag > LOW + RANGE * Su(n / N - { n++; Binary case: only one condition to check if (Tag > LOW + RANGE * Su(Sybol0 / N - { n = ; else { n = 0; Applications of Binary Arithetic Coding Increasingly popular: JBIG, JBIG, JPEG000, H.64 Convert non-binary signals into binary: Golob-Rice Code: used in H.64. Bit-plane coding: used in JPEG000. B = [B0, B,, BK-]: binary representation of B. Chain rule: H(B = H(B0 +H(B B0 + + H(BK- B0, BK-. To code B0, needs P0(0: Prob(B0=0. To code B, needs P(0 i: Prob(B=0 B0 = i, i = 0,. More details: AVC Binary Adaptive Arithetic Coding: CABAC HEVC Arithetic Coding: Z. Li, Multiedia Counciation, 06 Spring p.4 Z. Li, Multiedia Counciation, 06 Spring p.4 HW- Info Theory: Entropy, Conditional Entropy, Mutual Info, Relative Entropy (KL Divergence Hoffan Coding Residual Iage Error statistics and Golob coding Pixel value prediction filtering Residual error distribution odeling Optial selection in Golob coding JPEG VLC schees: DCT, Quantization Zigzag, RUN-LEVEL Suary VLC is the real world iage coding solution Eleents of Hoffan and Golob coding schees are incorporated JPEG: introduced DC prediction, AC zigzag scan, run-level VLC H64: introduced reverse order coding. Z. Li Multiedia Counciation, 06 Spring p.43 Z. Li Multiedia Counciation, 06 Spring p.44

Lec 05 Arithmetic Coding

Lec 05 Arithmetic Coding ECE 5578 Multimedia Communication Lec 05 Arithmetic Coding Zhu Li Dept of CSEE, UMKC web: http://l.web.umkc.edu/lizhu phone: x2346 Z. Li, Multimedia Communciation, 208 p. Outline Lecture 04 ReCap Arithmetic

More information

Lec 04 Variable Length Coding (VLC) in JPEG

Lec 04 Variable Length Coding (VLC) in JPEG ECE 5578 Multimedia Communication Lec 04 Variable Length Coding (VLC) in JPEG Zhu Li Dept of CSEE, UMKC Z. Li Multimedia Communciation, 2018 p.1 Outline Lecture 03 ReCap VLC JPEG Image Coding Framework

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

CMPT 365 Multimedia Systems. Lossless Compression

CMPT 365 Multimedia Systems. Lossless Compression CMPT 365 Multimedia Systems Lossless Compression Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Outline Why compression? Entropy Variable Length Coding Shannon-Fano Coding

More information

Fundamentals of Image Compression

Fundamentals of Image Compression Fundaentals of Iage Copression Iage Copression reduce the size of iage data file while retaining necessary inforation Original uncopressed Iage Copression (encoding) 01101 Decopression (decoding) Copressed

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Multi-Scale/Multi-Resolution: Wavelet Transform

Multi-Scale/Multi-Resolution: Wavelet Transform Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016/2017 Lessons 9 11 Jan 2017 Outline Artificial Neural networks Notation...2 Convolutional Neural Networks...3

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

CSE 408 Multimedia Information System Yezhou Yang

CSE 408 Multimedia Information System Yezhou Yang Image and Video Compression CSE 408 Multimedia Information System Yezhou Yang Lots of slides from Hassan Mansour Class plan Today: Project 2 roundup Today: Image and Video compression Nov 10: final project

More information

CMPT 365 Multimedia Systems. Final Review - 1

CMPT 365 Multimedia Systems. Final Review - 1 CMPT 365 Multimedia Systems Final Review - 1 Spring 2017 CMPT365 Multimedia Systems 1 Outline Entropy Lossless Compression Shannon-Fano Coding Huffman Coding LZW Coding Arithmetic Coding Lossy Compression

More information

Basics of DCT, Quantization and Entropy Coding

Basics of DCT, Quantization and Entropy Coding Basics of DCT, Quantization and Entropy Coding Nimrod Peleg Update: April. 7 Discrete Cosine Transform (DCT) First used in 97 (Ahmed, Natarajan and Rao). Very close to the Karunen-Loeve * (KLT) transform

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Bloom Filters. filters: A survey, Internet Mathematics, vol. 1 no. 4, pp , 2004.

Bloom Filters. filters: A survey, Internet Mathematics, vol. 1 no. 4, pp , 2004. Bloo Filters References A. Broder and M. Mitzenacher, Network applications of Bloo filters: A survey, Internet Matheatics, vol. 1 no. 4, pp. 485-509, 2004. Li Fan, Pei Cao, Jussara Aleida, Andrei Broder,

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Lec 03 Entropy and Coding II Hoffman and Golomb Coding

Lec 03 Entropy and Coding II Hoffman and Golomb Coding CS/EE 5590 / ENG 40 Special Topics Multimedia Communication, Spring 207 Lec 03 Entropy and Coding II Hoffman and Golomb Coding Zhu Li Z. Li Multimedia Communciation, 207 Spring p. Outline Lecture 02 ReCap

More information

W Arithmetic Coding (BAC). BAC is a variable in to

W Arithmetic Coding (BAC). BAC is a variable in to 1546 EEE TRANSACTONS ON NFORMATON THEORY, VOL. 39, NO. 5, SEPTEMBER 1993 Block Arithetic Coding for Source Copression Charles G. Boncelet Jr., Meber EEE Abstruct- We introduce Block Arithetic Coding (BAC),

More information

lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 38: Linear Multistep Methods: Absolute Stability, Part II

lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 38: Linear Multistep Methods: Absolute Stability, Part II lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 3: Linear Multistep Methods: Absolute Stability, Part II 5.7 Linear ultistep ethods: absolute stability At this point, it ay well

More information

SIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding

SIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding SIGNAL COMPRESSION Lecture 3 4.9.2007 Shannon-Fano-Elias Codes and Arithmetic Coding 1 Shannon-Fano-Elias Coding We discuss how to encode the symbols {a 1, a 2,..., a m }, knowing their probabilities,

More information

Short Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding

Short Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 1, NO. 6, JUNE 00 715 Short Papers Test Data Copression and Decopression Based on Internal Scan Chains and Golob Coding

More information

An Algorithm for Quantization of Discrete Probability Distributions

An Algorithm for Quantization of Discrete Probability Distributions An Algorith for Quantization of Discrete Probability Distributions Yuriy A. Reznik Qualco Inc., San Diego, CA Eail: yreznik@ieee.org Abstract We study the proble of quantization of discrete probability

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Physics 140 D100 Midterm Exam 2 Solutions 2017 Nov 10

Physics 140 D100 Midterm Exam 2 Solutions 2017 Nov 10 There are 10 ultiple choice questions. Select the correct answer for each one and ark it on the bubble for on the cover sheet. Each question has only one correct answer. (2 arks each) 1. An inertial reference

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

Mathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse

Mathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse Aerican Journal of Operations Research, 205, 5, 493-502 Published Online Noveber 205 in SciRes. http://www.scirp.org/journal/ajor http://dx.doi.org/0.4236/ajor.205.56038 Matheatical Model and Algorith

More information

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for

More information

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng EE59 Spring Parallel LSI AD Algoriths Lecture I interconnect odeling ethods Zhuo Feng. Z. Feng MTU EE59 So far we ve considered only tie doain analyses We ll soon see that it is soeties preferable to odel

More information

Order Recursion Introduction Order versus Time Updates Matrix Inversion by Partitioning Lemma Levinson Algorithm Interpretations Examples

Order Recursion Introduction Order versus Time Updates Matrix Inversion by Partitioning Lemma Levinson Algorithm Interpretations Examples Order Recursion Introduction Order versus Tie Updates Matrix Inversion by Partitioning Lea Levinson Algorith Interpretations Exaples Introduction Rc d There are any ways to solve the noral equations Solutions

More information

Now multiply the left-hand-side by ω and the right-hand side by dδ/dt (recall ω= dδ/dt) to get:

Now multiply the left-hand-side by ω and the right-hand side by dδ/dt (recall ω= dδ/dt) to get: Equal Area Criterion.0 Developent of equal area criterion As in previous notes, all powers are in per-unit. I want to show you the equal area criterion a little differently than the book does it. Let s

More information

EE376A: Homework #3 Due by 11:59pm Saturday, February 10th, 2018

EE376A: Homework #3 Due by 11:59pm Saturday, February 10th, 2018 Please submit the solutions on Gradescope. EE376A: Homework #3 Due by 11:59pm Saturday, February 10th, 2018 1. Optimal codeword lengths. Although the codeword lengths of an optimal variable length code

More information

Data Compression Techniques (Spring 2012) Model Solutions for Exercise 2

Data Compression Techniques (Spring 2012) Model Solutions for Exercise 2 582487 Data Compression Techniques (Spring 22) Model Solutions for Exercise 2 If you have any feedback or corrections, please contact nvalimak at cs.helsinki.fi.. Problem: Construct a canonical prefix

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yaroslavsky. Fundamentals of Digital Image Processing. Course 0555.330 Lec. 6. Principles of image coding The term image coding or image compression refers to processing image digital data aimed at

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Basics of DCT, Quantization and Entropy Coding. Nimrod Peleg Update: Dec. 2005

Basics of DCT, Quantization and Entropy Coding. Nimrod Peleg Update: Dec. 2005 Basics of DCT, Quantization and Entropy Coding Nimrod Peleg Update: Dec. 2005 Discrete Cosine Transform (DCT) First used in 974 (Ahmed, Natarajan and Rao). Very close to the Karunen-Loeve * (KLT) transform

More information

Handwriting Detection Model Based on Four-Dimensional Vector Space Model

Handwriting Detection Model Based on Four-Dimensional Vector Space Model Journal of Matheatics Research; Vol. 10, No. 4; August 2018 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Handwriting Detection Model Based on Four-Diensional Vector

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

arxiv: v3 [cs.ds] 22 Mar 2016

arxiv: v3 [cs.ds] 22 Mar 2016 A Shifting Bloo Filter Fraewor for Set Queries arxiv:1510.03019v3 [cs.ds] Mar 01 ABSTRACT Tong Yang Peing University, China yangtongeail@gail.co Yuanun Zhong Nanjing University, China un@sail.nju.edu.cn

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information

Math 262A Lecture Notes - Nechiporuk s Theorem

Math 262A Lecture Notes - Nechiporuk s Theorem Math 6A Lecture Notes - Nechiporuk s Theore Lecturer: Sa Buss Scribe: Stefan Schneider October, 013 Nechiporuk [1] gives a ethod to derive lower bounds on forula size over the full binary basis B The lower

More information

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact Physically Based Modeling CS 15-863 Notes Spring 1997 Particle Collision and Contact 1 Collisions with Springs Suppose we wanted to ipleent a particle siulator with a floor : a solid horizontal plane which

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1. Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized

More information

Kinematics and dynamics, a computational approach

Kinematics and dynamics, a computational approach Kineatics and dynaics, a coputational approach We begin the discussion of nuerical approaches to echanics with the definition for the velocity r r ( t t) r ( t) v( t) li li or r( t t) r( t) v( t) t for

More information

Support Vector Machines MIT Course Notes Cynthia Rudin

Support Vector Machines MIT Course Notes Cynthia Rudin Support Vector Machines MIT 5.097 Course Notes Cynthia Rudin Credit: Ng, Hastie, Tibshirani, Friedan Thanks: Şeyda Ertekin Let s start with soe intuition about argins. The argin of an exaple x i = distance

More information

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry About the definition of paraeters and regies of active two-port networks with variable loads on the basis of projective geoetry PENN ALEXANDR nstitute of Electronic Engineering and Nanotechnologies "D

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

Overview. Analog capturing device (camera, microphone) PCM encoded or raw signal ( wav, bmp, ) A/D CONVERTER. Compressed bit stream (mp3, jpg, )

Overview. Analog capturing device (camera, microphone) PCM encoded or raw signal ( wav, bmp, ) A/D CONVERTER. Compressed bit stream (mp3, jpg, ) Overview Analog capturing device (camera, microphone) Sampling Fine Quantization A/D CONVERTER PCM encoded or raw signal ( wav, bmp, ) Transform Quantizer VLC encoding Compressed bit stream (mp3, jpg,

More information

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

Lecture 3 : Algorithms for source coding. September 30, 2016

Lecture 3 : Algorithms for source coding. September 30, 2016 Lecture 3 : Algorithms for source coding September 30, 2016 Outline 1. Huffman code ; proof of optimality ; 2. Coding with intervals : Shannon-Fano-Elias code and Shannon code ; 3. Arithmetic coding. 1/39

More information

Elastic Force: A Force Balance: Elastic & Gravitational Force: Force Example: Determining Spring Constant. Some Other Forces

Elastic Force: A Force Balance: Elastic & Gravitational Force: Force Example: Determining Spring Constant. Some Other Forces Energy Balance, Units & Proble Solving: Mechanical Energy Balance ABET Course Outcoes: 1. solve and docuent the solution of probles involving eleents or configurations not previously encountered (e) (e.g.

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

NB1140: Physics 1A - Classical mechanics and Thermodynamics Problem set 2 - Forces and energy Week 2: November 2016

NB1140: Physics 1A - Classical mechanics and Thermodynamics Problem set 2 - Forces and energy Week 2: November 2016 NB1140: Physics 1A - Classical echanics and Therodynaics Proble set 2 - Forces and energy Week 2: 21-25 Noveber 2016 Proble 1. Why force is transitted uniforly through a assless string, a assless spring,

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

ESE 523 Information Theory

ESE 523 Information Theory ESE 53 Inforation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electrical and Systes Engineering Washington University 11 Urbauer Hall 10E Green Hall 314-935-4173 (Lynda Marha Answers) jao@wustl.edu

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Support Vector Machines. Goals for the lecture

Support Vector Machines. Goals for the lecture Support Vector Machines Mark Craven and David Page Coputer Sciences 760 Spring 2018 www.biostat.wisc.edu/~craven/cs760/ Soe of the slides in these lectures have been adapted/borrowed fro aterials developed

More information

Lecture 11: Polar codes construction

Lecture 11: Polar codes construction 15-859: Information Theory and Applications in TCS CMU: Spring 2013 Lecturer: Venkatesan Guruswami Lecture 11: Polar codes construction February 26, 2013 Scribe: Dan Stahlke 1 Polar codes: recap of last

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Shannon-Fano-Elias coding

Shannon-Fano-Elias coding Shannon-Fano-Elias coding Suppose that we have a memoryless source X t taking values in the alphabet {1, 2,..., L}. Suppose that the probabilities for all symbols are strictly positive: p(i) > 0, i. The

More information

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University NBN Algorith Bogdan M. Wilaoswki Auburn University Hao Yu Auburn University Nicholas Cotton Auburn University. Introduction. -. Coputational Fundaentals - Definition of Basic Concepts in Neural Network

More information

A Division Algorithm Using Bisection Method in Residue Number System

A Division Algorithm Using Bisection Method in Residue Number System International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 59 A Division Algorith Using Bisection Method in Residue Nuber Syste * Chin-Chen Chang and Jen-Ho Yang Abstract. Introduction

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

Energy and Momentum: The Ballistic Pendulum

Energy and Momentum: The Ballistic Pendulum Physics Departent Handout -10 Energy and Moentu: The Ballistic Pendulu The ballistic pendulu, first described in the id-eighteenth century, applies principles of echanics to the proble of easuring the

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory TTIC 31120 Prof. Nati Srebro Lecture 2: PAC Learning and VC Theory I Fro Adversarial Online to Statistical Three reasons to ove fro worst-case deterinistic

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

Slide10. Haykin Chapter 8: Principal Components Analysis. Motivation. Principal Component Analysis: Variance Probe

Slide10. Haykin Chapter 8: Principal Components Analysis. Motivation. Principal Component Analysis: Variance Probe Slide10 Motivation Haykin Chapter 8: Principal Coponents Analysis 1.6 1.4 1.2 1 0.8 cloud.dat 0.6 CPSC 636-600 Instructor: Yoonsuck Choe Spring 2015 0.4 0.2 0 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 How can we

More information

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 jzhang@cse.unsw.edu.au

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

!! Let x n = x 1,x 2,,x n with x j! X!! We say that x n is "-typical with respect to p(x) if

!! Let x n = x 1,x 2,,x n with x j! X!! We say that x n is -typical with respect to p(x) if Quantu Inforation Theory and Measure Concentration Patrick Hayden (McGill) Overview!! What is inforation theory?!! Entropy, copression, noisy coding and beyond!! What does it have to do with quantu echanics?!!

More information

Data Compression Techniques

Data Compression Techniques Data Compression Techniques Part 1: Entropy Coding Lecture 4: Asymmetric Numeral Systems Juha Kärkkäinen 08.11.2017 1 / 19 Asymmetric Numeral Systems Asymmetric numeral systems (ANS) is a recent entropy

More information

Dimensions and Units

Dimensions and Units Civil Engineering Hydraulics Mechanics of Fluids and Modeling Diensions and Units You already know how iportant using the correct diensions can be in the analysis of a proble in fluid echanics If you don

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information

Multimedia. Multimedia Data Compression (Lossless Compression Algorithms)

Multimedia. Multimedia Data Compression (Lossless Compression Algorithms) Course Code 005636 (Fall 2017) Multimedia Multimedia Data Compression (Lossless Compression Algorithms) Prof. S. M. Riazul Islam, Dept. of Computer Engineering, Sejong University, Korea E-mail: riaz@sejong.ac.kr

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE General e Image Coder Structure Motion Video x(s 1,s 2,t) or x(s 1,s 2 ) Natural Image Sampling A form of data compression; usually lossless, but can be lossy Redundancy Removal Lossless compression: predictive

More information

Chapter 1: Basics of Vibrations for Simple Mechanical Systems

Chapter 1: Basics of Vibrations for Simple Mechanical Systems Chapter 1: Basics of Vibrations for Siple Mechanical Systes Introduction: The fundaentals of Sound and Vibrations are part of the broader field of echanics, with strong connections to classical echanics,

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments. Tutorial 1. Acknowledgement and References for lectures 1 to 5

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments. Tutorial 1. Acknowledgement and References for lectures 1 to 5 Lecture : Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP959 Multimedia Systems S 006 jzhang@cse.unsw.edu.au Acknowledgement

More information

USEFUL HINTS FOR SOLVING PHYSICS OLYMPIAD PROBLEMS. By: Ian Blokland, Augustana Campus, University of Alberta

USEFUL HINTS FOR SOLVING PHYSICS OLYMPIAD PROBLEMS. By: Ian Blokland, Augustana Campus, University of Alberta 1 USEFUL HINTS FOR SOLVING PHYSICS OLYMPIAD PROBLEMS By: Ian Bloland, Augustana Capus, University of Alberta For: Physics Olypiad Weeend, April 6, 008, UofA Introduction: Physicists often attept to solve

More information

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup) Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains

More information

Lecture 8: Channel and source-channel coding theorems; BEC & linear codes. 1 Intuitive justification for upper bound on channel capacity

Lecture 8: Channel and source-channel coding theorems; BEC & linear codes. 1 Intuitive justification for upper bound on channel capacity 5-859: Information Theory and Applications in TCS CMU: Spring 23 Lecture 8: Channel and source-channel coding theorems; BEC & linear codes February 7, 23 Lecturer: Venkatesan Guruswami Scribe: Dan Stahlke

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

Wavelet Bases Made of Piecewise Polynomial Functions: Theory and Applications *

Wavelet Bases Made of Piecewise Polynomial Functions: Theory and Applications * Applied atheatics 96-6 doi:.436/a.. Published Online February (http://www.scirp.org/ournal/a) Wavelet Bases ade of Piecewise Polynoial Functions: Theory and Applications * Abstract Lorella Fatone aria

More information

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual 6 IEEE Congress on Evolutionary Coputation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-1, 6 On the Analysis of the Quantu-inspired Evolutionary Algorith with a Single Individual

More information

N-Point. DFTs of Two Length-N Real Sequences

N-Point. DFTs of Two Length-N Real Sequences Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore

More information

1 Introduction to information theory

1 Introduction to information theory 1 Introduction to information theory 1.1 Introduction In this chapter we present some of the basic concepts of information theory. The situations we have in mind involve the exchange of information through

More information