ORDINAL COMPUTING WITH 2-ARY CODE IN COMBINATORICS CODING METHOD

Size: px
Start display at page:

Download "ORDINAL COMPUTING WITH 2-ARY CODE IN COMBINATORICS CODING METHOD"

Transcription

1 20 June 20. Vol. 52 No JATIT & LLS. All rights reserved. ISSN: E-ISSN: ORDINAL COMPUTING WITH 2-ARY CODE IN COMBINATORICS CODING METHOD RUSHENG ZHU, 2 ZHONGMING YONG, Department of Information Science and Technology, Heilongjiang University, Harbin,China 2 Department of Computer Science and Technology, Heilongjiang University, Harbin,China hlju202zrs@6.com, 2 yzm5757@yahoo.com.cn ABSTRACT All characters in any character sequence can constitute a dictionary space by permutation and combination and e character sequence can be replaced by e ordinal of is sequence in e dictionary space. This coding meod is named combinatorics coding meod. Combinatorics coding meod is expatiated firstly in is paper and ordinal computing in different data system is analysized. Combinatorics coding meod can be done by different code modes. In ese code modes, combinatorics coding meod wi 2-ary code has particular property. Ordinal computing meod wi 2-ary code is advanced and e characteristics of ordinal wi 2-ary code are researched. Combinatorics coding technology wi 2-ary code has reference to e intensive study of e combinatorics coding meod. Keywords: Data Coding, Source Coding, Combinatorics Coding, Ordinal, Max Ordina, Whole Max Ordinal. INTRODUCTION Today, e information technology is developing very much. As one of e basic tools and researched problems, data coding technology plays an important role in all kinds of studies and applications. It is well known about Huffman coding, algorim coding and dictionary coding [-]. There are ree embranchments in coding technology: source coding, channel coding and secrecy coding. The main task of source coding is to compress data. Channel coding is used to improve reliability of information transmission. Secrecy coding prevents e information from being filched and e used technology is encryption. Data compression technology is of great significance to information disposing, data storage, and data transmission. Combinatorics coding is a new data coding meod based on Combinatorics. At first, Combinatorics coding is only used in researching data compression [4-7]. In fact, is kind of coding technology can be used in many fields such as data encryption and error detection/error correction. It is of great significance to information disposal, information storage and information transmission. 2. THE BASIC THEORY OF COMBINATORICS CODING To e sequence which leng is n, if e number of e different elements is m and e number of e i element is n i. Thus e sum of e different permutation sequences at e different element in each sequence has e same number wi is sequence can be expressed by formula (): m P = n!/( ( ni!)) () i= All ese permutation sequences can constitute a permutation space. This space is an ordered dictionary space. Any permutation sequence in is dictionary space has its position number. This position number is named ordinal. The relation between e character sequence space and e corresponding ordinal space is utilized in combinatorics coding meod. It is to say at all characters in any character sequence can constitute a dictionary by full permutation. Then combinatorics coding meod comes into being. In fact, e ordinal of e sequence indicates e number of e oer sequences in front of is sequence in e dictionary space. 84

2 20 June 20. Vol. 52 No JATIT & LLS. All rights reserved. ISSN: E-ISSN: To e same sequence, e different ordinal can be obtained based on e different element order which has different elements. It is to say at e ordinal of e sequence is not exclusive. This element sequence depended on is named benchmark sequence. Max ordinal of e sequence space can be computed rough which e number of e sequences in e ordinal space subtracts one. When e number of each element in e sequence is equal, whole max ordinal is obtained. In e optimizing procedure of ordinal computing, ordinal computing is depended on e value of max ordinal and max ordinal computing is depended on e value of whole max ordinal[ ]. In combinatorics coding meod, a benchmark sequence needs to be agreed on in advance between e coder and e decoder. When e coder works, e ordinal of e sequence can be computed out based on is benchmark sequence. When e decoder works, e sequence can be deduced by e ordinal based on e same benchmark sequence. To e j element in e sequence which has n elements, if is element is e same as e i element in benchmark sequence, it is predicated at ere are existed permutation and combination sequences before e current sequence involved i- elements. To ese i- elements, e permutation and combination number of e x element (e element position in ese i- elements is x) occupied e j position can be expressed by S. It is shown in equation (2). 2 S = C C C w w w n j n j w n j ( w+ w2) C C C wx wx wx+ n j ( w+ w2+ + wx 2) n j ( w+ w2+ + wx ) n j ( w+ w2+ + wx) wii ii ii 2 ii C n j wq C n j wq q= q=... (2) w expresses e number of each element. To e j element in e sequence which has n elements, e sequence sum involved i- elements before j e element can be computed by e formula (). i S () x= At last, e position (ordinal) of e sequence which has n elements in e whole space can be expressed by e formula (4). n i S (4) j= x= The basic idea of combinatorics decoding is at suppose e element in e inspected position is a certain element, e corresponding permutation and combination value p is computed out based on benchmark sequence according to is suppose. Compared p wi ordinal, if ordinal is not less an p, en e permutation and combination value p of e next element is computed out based 2 on benchmark sequence. It needs to judge at ordinal is less an p + p 2 or not. Until it finds out at ordinal is less an p + p p r. This moment, e element corresponding p should be e element in e r inspected position. At last, e new ordinal needs to be computed in order to deduce e next position element according to e formula (5): new ordinal= old ordinal-( p + p + + p 2 r- ) (5) When e ordinal is 0, e algorim is over. If ere are some remainder data, ese remainder data can be appended to e decoded sequence based on benchmark sequence. In fact, e process of combinatorics decoding is e inverse process to combinatorics coding. Probing step by step meod is adopted to parse correlative character. The most important step of probing meod is also ordinal computing. III. THE RELATION BETWEEN THE SPEED OF ORDINAL COMPUTING AND DATA SYSTEM In e procedure of ordinal computing, e speed of ordinal computing can be affected by different data system. It adopts 2 6 system to computing ordinal in e figure. In is example, ere are 256 different elements in benchmark sequence ( m =256). The higher data are stored in e left nodes and e lower data are stored in e right nodes. There are nodes in e ordinal 6 of e sequence which leng is 200k in 2 system, is ordinal can be expressed by e figure : 85

3 20 June 20. Vol. 52 No JATIT & LLS. All rights reserved. ISSN: E-ISSN: bytes Fig. Ordinal Number in 6 2 System If it adopts 2 2 system to computing e ordinal of e same sequence and e value range in each node of e ordinal is from 0~ to 0~ 2 2 -, en e number of e nodes is halved. If e number is odd, for example, e nodes number of e ordinal in figure is and it is an odd, so e value of e highest node is less an 256, is node can be extended to 4 bytes. The oer nodes which e leng of each node is 2 bytes can be merged into one node in pairs. Thus, in 2 2 system, e number of e nodes of e ordinal is 5. It is shown in figure bytes Fig.2 Ordinal Number in System The experiment manifests at e speed of ordinal computing is advanced after adopting 2 2 system, because e number of e nodes decreases and e leng of e ordinal is halved, ese mean at e computing times are halved in e computing procedure. To e main procedure of e computing, e assistant computing in e algorim can be ignored. So e computing speed is advanced double. IV. ORDINAL COMPUTING WITH 2-ARY CODE IN COMBINATORICS CODING METHOD Sequence ordinal can be computed by e different code system. At present, e research on combinatorics coding meod is mainly wi 256- ary code. Because e smallest stored unit of e file information is byte. Then e number of e different elements in benchmark sequence is 2 8. It is 256-ary code. In is paper, combinatorics coding is researched wi 2-ary code. It is to say at e number of e different elements in benchmark sequence is only two (e value of m is two and e elements are 0 and ). Thus ere are only two benchmark sequences: 0, and, 0. To e sequence 00, ere are two different elements: e number of 0 is 2 and e number of is 4. The number of sequences which are all composed by 0(e number is 2) and (e number is 4) can be computed by e formula (): m P = n!/( ( n!)) i = i = 6!/(2!* 4!) =5 According to e order of 0 first and last, e space of dictionary can be obtained as follows: 0) 00 ) 00 2) 00 ) 00 4) 00 5) 00 6) 00 7) 00 8) 00 9) 00 0)00 )00 2) 00 ) 00 4)00 In above instance, e number of e whole permutations about 0(e number is 2) and (e number is 4) is 5. Because it is counted from 0, e max ordinal is 4. The ordinal of 00 can be computed as follows: Step : The first element of e sequence is, e number of sequences at have e form of 0* and at are in front of is sequence can be computed by e formula (2). Of course, e number of 0 is 2 and e number of is 4 in ese sequences. 4 CC = Because e ordinal computing is based on 2- ary code, it only needs to compute once. This means at e formula () becomes vestigial wi 2-ary code. Step 2: The second element of e sequence is 0. There is no oer element in front of is element in benchmark sequence. So ere is no computation. Step : The rd element is, en each sequence in front of is sequence has e form of 00*. In each sequence, e number of 0 is 2 and e number of is 4 too. The number of ese sequences is C =. Step 4: The four element is 0. There is no element in front of is element in benchmark sequence. So ere is no computation. Step 5: The fif element and e six element are. But now ere is no 0 element in e sequence. So it doesn t need to handle. 86

4 20 June 20. Vol. 52 No JATIT & LLS. All rights reserved. ISSN: E-ISSN: At last, all data are added and e ordinal of e sequence is obtained. The ordinal is 6. The ordinal of e sequence 00 is computed out based on e benchmark sequence (0 first and last). If e order of e benchmark sequence is contrary, 5 kinds of permutations can be obtained still. Of course, e order of ese permutations is contrary compared wi e case at e benchmark sequence is 0 and. It is shown as follows. 0) 00 ) 00 2) 00 ) 00 4) 00 5) 00 6) 00 7) 00 8) 00 9)00 0) 00 ) 00 2) 00 ) 00 4) 00 In above instance, e ordinal of e sequence 00 is 8 in e set of e whole permutations based on e benchmark sequence wi and 0. Its computing procedure is similar to e case at e benchmark sequence is 0 and. To e same sequence 00, e ordinal is 6 based on e benchmark sequence of 0 and, but e ordinal is 8 based on e benchmark sequence of and 0. Luckily e sum of two ordinals equals to e max ordinal 4. Thus it can be seen at, to e same sequence, its ordinal value is not unique. There are e close relation to e ordinal and e selection of benchmark sequence. To e same sequence, if e orders of two benchmark sequences are contrary, e sum of eir ordinals is max ordinal. The original sequence can be deduced based on frequency(such as e number of 0 is 2 and e number of is 4) benchmark sequence(such as 0 and ) and ordinal (such as 6). The procedure of decoding is described as follow: Step : Decode e first element of e sequence. () If e first element of e sequence is 0, en ere are one 0 and four in e follow five elements. So e number of us sequence can be computed as follow: 4 CC = Because 5 is less an 6, e supposition is not right based on decoding idea. It is to say at e first element is not 0. (2) If e first element of e sequence is, en ere are two 0 and ree in e follow five elements. So e number of us sequence can be computed as follow: 2 CC = =5,e sum is more an 6, so e first element of e sequence is. Adjust ordinal: 6-5=. In fact, it can be directly judged at e first element must be based on e result of () in e step. Because ere are only two elements in benchmark sequence, if it is not 0, it must be. It is to say at each step needs only computing once in 2-ary code of combinatiorics coding technology. It means at e speed of decoding in 2-ary code can be advanced. Step 2: Decode e second element of e sequence. () If e second element of e sequence (its form is *) is 0, en ere are one 0 and ree in e follow four elements. So e number of us sequence can be computed as follow: CC = is more an, e supposition is right based on decoding idea. It is to say at e second element is 0. This moment e ordinal doesn t need to be adjusted. Step : Decode e ird element of e sequence. () If e ird element of e sequence (its form is 0*) is 0, en ere are no 0 and ree in e follow ree elements. So e number of us sequence can be computed as follow: C = is not more an, e supposition is not right based on decoding idea. It is to say at e ird element is not 0. It can be directly judged at e ird element must be based on e result of () in e step. Adjust ordinal: -=0. This moment e ordinal is 0. Three elements in e front of e sequence are 0, ere are remained elements: one 0 and two. Based on e order of benchmark sequence, 0 is filled to 87

5 20 June 20. Vol. 52 No JATIT & LLS. All rights reserved. ISSN: E-ISSN: e tail of e decoded sequence. So e final decoded sequence can be obtained: 00. Thus e original sequence can be successfully decoded based on frequency benchmark sequence and ordinal. V. CHARACTERISTIC OF ORDINAL WITH 2-ARY CODE IN COMBINATORICS CODING METHOD At present, e research on combinatorics coding is mainly aimed at 256-ary code [8-0]. But in relation to 256-ary code or oer coding meod, 2- ary code has its distinctive character. At first, to e computing speed in combinatorics coding meod, decoding speed is slower an coding speed. The more e number of different elements is, e slower e speed of decoding (relation to coding) is. It is apparent at e speed difference of coding and decoding is e smallest wi 2-ary code. Coding technology can be optimized in oer existed coding meod. The paper [] and e paper [2] expatiate how to make combinatorics coding reduce computing speed from exponent level to n 2 level. In is paper, combinatorics computing becomes proportion computing. But at present, ere is no good optimization meod for decoding in combinatorics coding technology. Because decode meod is to probe step by step. It means at if one element doesn t be decoded, en all elements follow is element can t be decoded. Thus merging computing can t be done. Compared e code/decode procedure wi 256-ary code to e code/decode procedure wi 2-ary code in is paper, it can be seen at e speed of decoding is almost equal to e speed of coding wi 2-ary code,while e speed of decoding is slower more an e speed of coding wi oer code meod. Secondly, e result of existed experiment makes clear at e difference of e ordinal leng and e sequence leng wi 2-ary code is smaller an e difference of e ordinal leng and e sequence leng wi oer code. This conclusion can be estimated rough e formula (). For example, wi 2-ary code, when e sequence leng n is 8, it is to say at each element occupies bit and e sequence occupies one byte, e whole max ordinal of e sequence can be computed by e follow procedure: P = n!/(( n/ 2)!* ( n/ 2)!) = 8!/(4!* 4!) = 8!/(4!* 4!) =70 But wi 4-ary code, each element of e sequence occupies 2 bits, while e sequence itself still occupies one byte. Now, e leng of e sequence is 4 and its whole max ordinal can be computed: P = n!/(( n / 4)!* ( n / 4)!* ( n / 4)!* ( n / 4)!) = 4!/((4 / 4)!* (4 / 4)!* (4 / 4)!* (4 / 4)!) =24 p > p, log( p) >= log( p ), so e leng of p is not less an e leng of p. In e most case, e leng of p is more an e leng of p. VI. CONCLUSION The ordinal computing meod wi 2-ary code in combinatorics coding technology is advanced and e characteristic of 2-ary code ordinal is researched in is paper. The research makes clear at e difference between coding speed and decoding speed is e smallest in binary combinatorics coding. Furermore, e difference between ordinal leng and sequence leng wi 2- ary code is smaller an at wi oer code. 2-ary code/decode technology is significant to research intensively on combinatorics code meod. 88

6 20 June 20. Vol. 52 No JATIT & LLS. All rights reserved. ISSN: E-ISSN: REFRENCES: [] D. A. Huffman. A Meod for e Construction of Minimum Redundancy Codes. Proceedings of e Institute of Radio Engineers, vol. 40, pp.098-0, Sept 952, [2] J.Rissanen, G.Langdon. Arimetic Coding. IBM Journal of Research and Development,vol. 2,pp ,Feb [] J. Ziv, A. Lempel. Compression of Individual Sequences via Variable Rate Coding. IEEE Transactions on Information Theory. Vol,24,pp.50-56, May 978. [4] Lu Jun, Liu Da-xin, Gao Yang, Xie Xin-qiang, Zhang wei-ran, Ma Yan-bin, Study on frequency table of stochastic subsection file in constant grade compression meod, Computer Engineering and Applications, vol. 44, pp , Mar [5] Jun Lu, Daxin Liu, and Xinqiang Xie, Selection of e Smallest Compression Subsection in Constant Grade Compression, Journal of Information & Computational Science, vol. 5, pp , Apr [6] LU Jun, LIU Da-xin, CHEN Li-yan. Compression meod wi constant degree based on permutation and combination, Journal of Dalian Maritime University,vol 4(4), pp.28-2, [7] Lu Jun, Liu DaXin, Optimization of frequency table storage in Constant Grade Compression, 2009 International Forum on Information Technology and Applications (IFITA 2009), ChengDu, P. R. China, May, 2009, pp [8] Lu Jun, Liu Da-Xin, Study on Information Entropy of Combinatorics Coding, 200 International Conference on Computer Design and Applications (ICCDA 200), Qinhuangdao, P. R. China, June, 200, pp [9] Lu Jun, Liu Da-Xin, Research on Parallel Technology wiin Section in Combinatorics Coding, The 200 International Conference on Computer Application and System Modeling (ICCASM 200), Taiyuan, P. R. China, October,200, pp [0] Lu Jun, Liu Da-Xin, Research on Whole Max Ordinal in Combinatorics Coding Technology, 200 International Forum on Information Technology and Applications (IFITA 200), Kunming, P. R. China, July, 200, pp [] Lu Jun, Liu Daxin, Optimization of Constant Grade Compression Meod, Journal of Jiangsu University(Natural Science Edition). vol., pp Jan 200. [2] Lu Jun, Wang Tong, Li Yibing, Study on Optimization Technology in Computing Ordinal Number, Journal of Computers, vol. 5, pp , Feb

AN ENHANCED EARLY DETECTION METHOD FOR ALL ZERO BLOCK IN H.264

AN ENHANCED EARLY DETECTION METHOD FOR ALL ZERO BLOCK IN H.264 st January 0. Vol. 7 No. 005-0 JATIT & LLS. All rights reserved. ISSN: 99-865 www.jatit.org E-ISSN: 87-95 AN ENHANCED EARLY DETECTION METHOD FOR ALL ZERO BLOCK IN H.6 CONG-DAO HAN School of Electrical

More information

Image and Multidimensional Signal Processing

Image and Multidimensional Signal Processing Image and Multidimensional Signal Processing Professor William Hoff Dept of Electrical Engineering &Computer Science http://inside.mines.edu/~whoff/ Image Compression 2 Image Compression Goal: Reduce amount

More information

SIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding

SIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding SIGNAL COMPRESSION Lecture 7 Variable to Fix Encoding 1. Tunstall codes 2. Petry codes 3. Generalized Tunstall codes for Markov sources (a presentation of the paper by I. Tabus, G. Korodi, J. Rissanen.

More information

CS4800: Algorithms & Data Jonathan Ullman

CS4800: Algorithms & Data Jonathan Ullman CS4800: Algorithms & Data Jonathan Ullman Lecture 22: Greedy Algorithms: Huffman Codes Data Compression and Entropy Apr 5, 2018 Data Compression How do we store strings of text compactly? A (binary) code

More information

Source Coding. Master Universitario en Ingeniería de Telecomunicación. I. Santamaría Universidad de Cantabria

Source Coding. Master Universitario en Ingeniería de Telecomunicación. I. Santamaría Universidad de Cantabria Source Coding Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Asymptotic Equipartition Property Optimal Codes (Huffman Coding) Universal

More information

Midrange: mean of highest and lowest scores. easy to compute, rough estimate, rarely used

Midrange: mean of highest and lowest scores. easy to compute, rough estimate, rarely used Measures of Central Tendency Mode: most frequent score. best average for nominal data sometimes none or multiple modes in a sample bimodal or multimodal distributions indicate several groups included in

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE General e Image Coder Structure Motion Video x(s 1,s 2,t) or x(s 1,s 2 ) Natural Image Sampling A form of data compression; usually lossless, but can be lossy Redundancy Removal Lossless compression: predictive

More information

Revised 5/2017 DARUL ARQAM. 1st Quarter (43 Days)

Revised 5/2017 DARUL ARQAM. 1st Quarter (43 Days) 1st Quarter (4 Days) st 1 : Aug 9-11 ( days) st 1 : Aug 14-18 2 : Aug 21-25 rd : Aug 28-0 ( days) Lessons 1-5, 1-6, Ch:1 Review and Test Ch: 2 Lessons 2-1, 2-2 Lessons 2-, 2-4, 2-5 4 : Sep 6-8 (days) Welcome,

More information

An Algorithm to Solve the Games under Incomplete Information

An Algorithm to Solve the Games under Incomplete Information Annals of Pure and Applied Maematics Vol. 10, No.2, 2015, 221-228 ISSN: 2279-087X (P), 2279-0888(online) Published on 30 October 2015 www.researchmasci.org Annals of An Algorim to Solve e Games under Incomplete

More information

Semi-Markov Network Traffic Model Based on Pareto Distribution

Semi-Markov Network Traffic Model Based on Pareto Distribution 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 Semi-Markov Network Traffic Model Based on Pareto Distribution Jinlong Fei State Key Laboratory

More information

Root-Patterns to Algebrising Partitions

Root-Patterns to Algebrising Partitions Advances in Pure Maematics, 015, 5, 31-41 Published Online January 015 in SciRes. http://www.scirp.org/journal/apm http://dx.doi.org/10.436/apm.015.51004 Root-Patterns to Algebrising Partitions Rex L.

More information

A fast modular multiplication algorithm for calculating the product AB modulo N

A fast modular multiplication algorithm for calculating the product AB modulo N Information Processing Letters 72 (1999) 77 81 A fast modular multiplication algorithm for calculating the product AB modulo N Chien-Yuan Chen a,, Chin-Chen Chang b,1 a Department of Information Engineering,

More information

IN this paper, we study the problem of universal lossless compression

IN this paper, we study the problem of universal lossless compression 4008 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 9, SEPTEMBER 2006 An Algorithm for Universal Lossless Compression With Side Information Haixiao Cai, Member, IEEE, Sanjeev R. Kulkarni, Fellow,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 5 Other Coding Techniques Instructional Objectives At the end of this lesson, the students should be able to:. Convert a gray-scale image into bit-plane

More information

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9. ( c ) E p s t e i n, C a r t e r, B o l l i n g e r, A u r i s p a C h a p t e r 17: I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science 17.1 Binary Codes Normal numbers we use

More information

Source Coding Techniques

Source Coding Techniques Source Coding Techniques. Huffman Code. 2. Two-pass Huffman Code. 3. Lemple-Ziv Code. 4. Fano code. 5. Shannon Code. 6. Arithmetic Code. Source Coding Techniques. Huffman Code. 2. Two-path Huffman Code.

More information

Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems

Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems HyeJeong Lee, Woon-Young Yeo and Dong-Ho Cho Korea Advanced Institute of Science and Technology Abstract The cdma2000 1xEV-DO standard

More information

Lecture 4 : Adaptive source coding algorithms

Lecture 4 : Adaptive source coding algorithms Lecture 4 : Adaptive source coding algorithms February 2, 28 Information Theory Outline 1. Motivation ; 2. adaptive Huffman encoding ; 3. Gallager and Knuth s method ; 4. Dictionary methods : Lempel-Ziv

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

Lecture 1 : Data Compression and Entropy

Lecture 1 : Data Compression and Entropy CPS290: Algorithmic Foundations of Data Science January 8, 207 Lecture : Data Compression and Entropy Lecturer: Kamesh Munagala Scribe: Kamesh Munagala In this lecture, we will study a simple model for

More information

1. Basics of Information

1. Basics of Information 1. Basics of Information 6.004x Computation Structures Part 1 Digital Circuits Copyright 2015 MIT EECS 6.004 Computation Structures L1: Basics of Information, Slide #1 What is Information? Information,

More information

SIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding

SIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding SIGNAL COMPRESSION Lecture 3 4.9.2007 Shannon-Fano-Elias Codes and Arithmetic Coding 1 Shannon-Fano-Elias Coding We discuss how to encode the symbols {a 1, a 2,..., a m }, knowing their probabilities,

More information

Experimental and numerical simulation studies of the squeezing dynamics of the UBVT system with a hole-plug device

Experimental and numerical simulation studies of the squeezing dynamics of the UBVT system with a hole-plug device Experimental numerical simulation studies of the squeezing dynamics of the UBVT system with a hole-plug device Wen-bin Gu 1 Yun-hao Hu 2 Zhen-xiong Wang 3 Jian-qing Liu 4 Xiao-hua Yu 5 Jiang-hai Chen 6

More information

ASYMMETRIC NUMERAL SYSTEMS: ADDING FRACTIONAL BITS TO HUFFMAN CODER

ASYMMETRIC NUMERAL SYSTEMS: ADDING FRACTIONAL BITS TO HUFFMAN CODER ASYMMETRIC NUMERAL SYSTEMS: ADDING FRACTIONAL BITS TO HUFFMAN CODER Huffman coding Arithmetic coding fast, but operates on integer number of bits: approximates probabilities with powers of ½, getting inferior

More information

Capacity of Fading Broadcast Channels with Limited-Rate Feedback

Capacity of Fading Broadcast Channels with Limited-Rate Feedback Capacity of Fading Broadcast Channels wi Limited-Rate Feedback Rajiv Agarwal and John Cioffi Department of Electrical Engineering Stanford University, CA-94305 Abstract In is paper, we study a fading broadcast

More information

GAMINGRE 8/1/ of 7

GAMINGRE 8/1/ of 7 FYE 09/30/92 JULY 92 0.00 254,550.00 0.00 0 0 0 0 0 0 0 0 0 254,550.00 0.00 0.00 0.00 0.00 254,550.00 AUG 10,616,710.31 5,299.95 845,656.83 84,565.68 61,084.86 23,480.82 339,734.73 135,893.89 67,946.95

More information

Chapter 2: Source coding

Chapter 2: Source coding Chapter 2: meghdadi@ensil.unilim.fr University of Limoges Chapter 2: Entropy of Markov Source Chapter 2: Entropy of Markov Source Markov model for information sources Given the present, the future is independent

More information

arxiv: v1 [astro-ph.im] 25 Apr 2014

arxiv: v1 [astro-ph.im] 25 Apr 2014 CPC(HEP & NP), 9, 33(X): 5 Chinese Physics C Vol. 33, No. X, Xxx, 9 A linear calibration method on DNL error for energy spectrum * arxiv:44.633v [astro-ph.im] 5 Apr 4 LU Bo() ;) FU Yan-Hong(), CHEN Yong()

More information

Lossless Compression of Dynamic PET Data

Lossless Compression of Dynamic PET Data IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 50, NO. 1, FEBRUARY 2003 9 Lossless Compression of Dynamic PET Data Evren Asma, Student Member, IEEE, David W. Shattuck, Member, IEEE, and Richard M. Leahy, Senior

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION SUPPLEMENTARY INFORMATION doi:10.1038/nature11875 Method for Encoding and Decoding Arbitrary Computer Files in DNA Fragments 1 Encoding 1.1: An arbitrary computer file is represented as a string S 0 of

More information

THE FORMAL TRIPLE I INFERENCE METHOD FOR LOGIC SYSTEM W UL

THE FORMAL TRIPLE I INFERENCE METHOD FOR LOGIC SYSTEM W UL 10 th February 013. Vol. 48 No.1 005-013 JATIT & LLS. All rights reserved. ISSN: 199-8645 www.jatit.org E-ISSN: 1817-3195 THE FORMAL TRIPLE I INFERENCE METHOD FOR LOGIC SYSTEM W UL 1 MINXIA LUO, NI SANG,

More information

2018/5/3. YU Xiangyu

2018/5/3. YU Xiangyu 2018/5/3 YU Xiangyu yuxy@scut.edu.cn Entropy Huffman Code Entropy of Discrete Source Definition of entropy: If an information source X can generate n different messages x 1, x 2,, x i,, x n, then the

More information

Number Representation and Waveform Quantization

Number Representation and Waveform Quantization 1 Number Representation and Waveform Quantization 1 Introduction This lab presents two important concepts for working with digital signals. The first section discusses how numbers are stored in memory.

More information

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur Module 5 EMBEDDED WAVELET CODING Lesson 13 Zerotree Approach. Instructional Objectives At the end of this lesson, the students should be able to: 1. Explain the principle of embedded coding. 2. Show the

More information

Compression. What. Why. Reduce the amount of information (bits) needed to represent image Video: 720 x 480 res, 30 fps, color

Compression. What. Why. Reduce the amount of information (bits) needed to represent image Video: 720 x 480 res, 30 fps, color Compression What Reduce the amount of information (bits) needed to represent image Video: 720 x 480 res, 30 fps, color Why 720x480x20x3 = 31,104,000 bytes/sec 30x60x120 = 216 Gigabytes for a 2 hour movie

More information

Introduction to Information Theory. Part 3

Introduction to Information Theory. Part 3 Introduction to Information Theory Part 3 Assignment#1 Results List text(s) used, total # letters, computed entropy of text. Compare results. What is the computed average word length of 3 letter codes

More information

Text Compression. Jayadev Misra The University of Texas at Austin December 5, A Very Incomplete Introduction to Information Theory 2

Text Compression. Jayadev Misra The University of Texas at Austin December 5, A Very Incomplete Introduction to Information Theory 2 Text Compression Jayadev Misra The University of Texas at Austin December 5, 2003 Contents 1 Introduction 1 2 A Very Incomplete Introduction to Information Theory 2 3 Huffman Coding 5 3.1 Uniquely Decodable

More information

Numerical Simulation of the Oil-water Distribution Law in X Block Geology by Using the STARS Mode

Numerical Simulation of the Oil-water Distribution Law in X Block Geology by Using the STARS Mode Research Journal of Applied Sciences, Engineering and Technology 5(8): 2648-2655, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: September 10, 2012 Accepted: October

More information

Chapter 2 Date Compression: Source Coding. 2.1 An Introduction to Source Coding 2.2 Optimal Source Codes 2.3 Huffman Code

Chapter 2 Date Compression: Source Coding. 2.1 An Introduction to Source Coding 2.2 Optimal Source Codes 2.3 Huffman Code Chapter 2 Date Compression: Source Coding 2.1 An Introduction to Source Coding 2.2 Optimal Source Codes 2.3 Huffman Code 2.1 An Introduction to Source Coding Source coding can be seen as an efficient way

More information

Bearing fault diagnosis based on Shannon entropy and wavelet package decomposition

Bearing fault diagnosis based on Shannon entropy and wavelet package decomposition Bearing fault diagnosis based on Shannon entropy and wavelet package decomposition Hong Mei Liu 1, Chen Lu, Ji Chang Zhang 3 School of Reliability and Systems Engineering, Beihang University, Beijing 1191,

More information

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Cung Nguyen and Robert G. Redinbo Department of Electrical and Computer Engineering University of California, Davis, CA email: cunguyen,

More information

Image Coding Algorithm Based on All Phase Walsh Biorthogonal Transform

Image Coding Algorithm Based on All Phase Walsh Biorthogonal Transform Image Coding Algorithm Based on All Phase Walsh Biorthogonal ransform Chengyou Wang, Zhengxin Hou, Aiping Yang (chool of Electronic Information Engineering, ianin University, ianin 72 China) wangchengyou@tu.edu.cn,

More information

18.310A Final exam practice questions

18.310A Final exam practice questions 18.310A Final exam practice questions This is a collection of practice questions, gathered randomly from previous exams and quizzes. They may not be representative of what will be on the final. In particular,

More information

Quantum-inspired Huffman Coding

Quantum-inspired Huffman Coding Quantum-inspired Huffman Coding A. S. Tolba, M. Z. Rashad, and M. A. El-Dosuky Dept. of Computer Science, Faculty of Computers and Information Sciences, Mansoura University, Mansoura, Egypt. tolba_954@yahoo.com,

More information

Huffman Coding. C.M. Liu Perceptual Lab, College of Computer Science National Chiao-Tung University

Huffman Coding. C.M. Liu Perceptual Lab, College of Computer Science National Chiao-Tung University Huffman Coding C.M. Liu Perceptual Lab, College of Computer Science National Chiao-Tung University http://www.csie.nctu.edu.tw/~cmliu/courses/compression/ Office: EC538 (03)573877 cmliu@cs.nctu.edu.tw

More information

Entropy Coding. Connectivity coding. Entropy coding. Definitions. Lossles coder. Input: a set of symbols Output: bitstream. Idea

Entropy Coding. Connectivity coding. Entropy coding. Definitions. Lossles coder. Input: a set of symbols Output: bitstream. Idea Connectivity coding Entropy Coding dd 7, dd 6, dd 7, dd 5,... TG output... CRRRLSLECRRE Entropy coder output Connectivity data Edgebreaker output Digital Geometry Processing - Spring 8, Technion Digital

More information

Coding for Discrete Source

Coding for Discrete Source EGR 544 Communication Theory 3. Coding for Discrete Sources Z. Aliyazicioglu Electrical and Computer Engineering Department Cal Poly Pomona Coding for Discrete Source Coding Represent source data effectively

More information

( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1

( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1 ( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r 2 0 1 6 C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science In this chapter, we learn how data can

More information

Alphabet Friendly FM Index

Alphabet Friendly FM Index Alphabet Friendly FM Index Author: Rodrigo González Santiago, November 8 th, 2005 Departamento de Ciencias de la Computación Universidad de Chile Outline Motivations Basics Burrows Wheeler Transform FM

More information

Latin Squares and Their Applications

Latin Squares and Their Applications Latin Squares and Their Applications Jason Tang Mentor: Wendy Baratta October 27, 2009 1 Introduction Despite Latin Squares being a relatively unknown aspect of mathematics, there are many interesting

More information

UNIT I INFORMATION THEORY. I k log 2

UNIT I INFORMATION THEORY. I k log 2 UNIT I INFORMATION THEORY Claude Shannon 1916-2001 Creator of Information Theory, lays the foundation for implementing logic in digital circuits as part of his Masters Thesis! (1939) and published a paper

More information

Keywords: HVDC cable, Analytical calculation, PMLTCT, PMITD.

Keywords: HVDC cable, Analytical calculation, PMLTCT, PMITD. 017 nd International Conference on Applied Mathematics, Simulation and Modelling (AMSM 017) ISBN: 978-1-60595-480-6 Analytical Calculation Method for Steady-state Current Capacity of HVDC Cables Chun-sheng

More information

Computing and Communications 2. Information Theory -Entropy

Computing and Communications 2. Information Theory -Entropy 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Entropy Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Entropy Joint entropy

More information

Data Compression Techniques

Data Compression Techniques Data Compression Techniques Part 2: Text Compression Lecture 5: Context-Based Compression Juha Kärkkäinen 14.11.2017 1 / 19 Text Compression We will now look at techniques for text compression. These techniques

More information

Open Access Recognition of Pole Piece Defects of Lithium Battery Based on Sparse Decomposition

Open Access Recognition of Pole Piece Defects of Lithium Battery Based on Sparse Decomposition Send Orders for Reprints to reprints@benthamscience.ae 5 The Open Electrical & Electronic Engineering Journal, 15, 9, 5-546 Open Access Recognition of Pole Piece Defects of Lithium Battery Based on Sparse

More information

CSCI 2570 Introduction to Nanocomputing

CSCI 2570 Introduction to Nanocomputing CSCI 2570 Introduction to Nanocomputing Information Theory John E Savage What is Information Theory Introduced by Claude Shannon. See Wikipedia Two foci: a) data compression and b) reliable communication

More information

Reduce the amount of data required to represent a given quantity of information Data vs information R = 1 1 C

Reduce the amount of data required to represent a given quantity of information Data vs information R = 1 1 C Image Compression Background Reduce the amount of data to represent a digital image Storage and transmission Consider the live streaming of a movie at standard definition video A color frame is 720 480

More information

Keywords- Source coding, Huffman encoding, Artificial neural network, Multilayer perceptron, Backpropagation algorithm

Keywords- Source coding, Huffman encoding, Artificial neural network, Multilayer perceptron, Backpropagation algorithm Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Huffman Encoding

More information

The Fault extent recognition method of rolling bearing based on orthogonal matching pursuit and Lempel-Ziv complexity

The Fault extent recognition method of rolling bearing based on orthogonal matching pursuit and Lempel-Ziv complexity The Fault extent recognition method of rolling bearing based on orthogonal matching pursuit and Lempel-Ziv complexity Pengfei Dang 1,2 *, Yufei Guo 2,3, Hongjun Ren 2,4 1 School of Mechanical Engineering,

More information

Making Method of the Data Processing System in the Experiment of. the Planck Constant Measuring with Photoelectric Effect

Making Method of the Data Processing System in the Experiment of. the Planck Constant Measuring with Photoelectric Effect Making Method of the Data Processing System in the Experiment of the Planck Constant Measuring with Photoelectric Effect JIANG Xing-fang 1), LIYan-ji 1), JIANG Hong 2) 1)School of Mathematics & Physics,

More information

+ (50% contribution by each member)

+ (50% contribution by each member) Image Coding using EZW and QM coder ECE 533 Project Report Ahuja, Alok + Singh, Aarti + + (50% contribution by each member) Abstract This project involves Matlab implementation of the Embedded Zerotree

More information

You separate binary numbers into columns in a similar fashion. 2 5 = 32

You separate binary numbers into columns in a similar fashion. 2 5 = 32 RSA Encryption 2 At the end of Part I of this article, we stated that RSA encryption works because it s impractical to factor n, which determines P 1 and P 2, which determines our private key, d, which

More information

ABSTRACT I. INTRODUCTION II. FUZZY MODEL SRUCTURE

ABSTRACT I. INTRODUCTION II. FUZZY MODEL SRUCTURE International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 6 ISSN : 2456-3307 Temperature Sensitive Short Term Load Forecasting:

More information

Spatial Distribution of Magnetic Field under Spherical Shell Plasma

Spatial Distribution of Magnetic Field under Spherical Shell Plasma Progress In Electromagnetics Research M, Vol. 67, 189 196, 2018 Spatial Distribution of Magnetic Field under Spherical Shell Plasma Xinhua Song 1, Honghao Yan 1, *, Zhengzheng Ma 2, Yang Wang 1, and Bing

More information

Universal Loseless Compression: Context Tree Weighting(CTW)

Universal Loseless Compression: Context Tree Weighting(CTW) Universal Loseless Compression: Context Tree Weighting(CTW) Dept. Electrical Engineering, Stanford University Dec 9, 2014 Universal Coding with Model Classes Traditional Shannon theory assume a (probabilistic)

More information

Multivariate Process Control Chart for Controlling the False Discovery Rate

Multivariate Process Control Chart for Controlling the False Discovery Rate Industrial Engineering & Management Systems Vol, No 4, December 0, pp.385-389 ISSN 598-748 EISSN 34-6473 http://dx.doi.org/0.73/iems.0..4.385 0 KIIE Multivariate Process Control Chart for Controlling e

More information

Examples MAT-INF1100. Øyvind Ryan

Examples MAT-INF1100. Øyvind Ryan Examples MAT-INF00 Øyvind Ryan February 9, 20 Example 0.. Instead of converting 76 to base 8 let us convert it to base 6. We find that 76//6 = 2 with remainder. In the next step we find 2//6 = 4 with remainder.

More information

Error Exponents of Quantum Communication System with M-ary. PSK Coherent State Signal

Error Exponents of Quantum Communication System with M-ary. PSK Coherent State Signal ISSN 2186-6570 Error Exponents of Quantum Communication System with -ary PSK Coherent State Signal Kentaro Kato Quantum ICT Research Institute, Tamagawa University 6-1-1 Tamagawa-gakuen, achida, Tokyo

More information

On Universal Types. Gadiel Seroussi Hewlett-Packard Laboratories Palo Alto, California, USA. University of Minnesota, September 14, 2004

On Universal Types. Gadiel Seroussi Hewlett-Packard Laboratories Palo Alto, California, USA. University of Minnesota, September 14, 2004 On Universal Types Gadiel Seroussi Hewlett-Packard Laboratories Palo Alto, California, USA University of Minnesota, September 14, 2004 Types for Parametric Probability Distributions A = finite alphabet,

More information

Applications of Information Theory in Science and in Engineering

Applications of Information Theory in Science and in Engineering Applications of Information Theory in Science and in Engineering Some Uses of Shannon Entropy (Mostly) Outside of Engineering and Computer Science Mário A. T. Figueiredo 1 Communications: The Big Picture

More information

SGN-2306 Signal Compression. 1. Simple Codes

SGN-2306 Signal Compression. 1. Simple Codes SGN-236 Signal Compression. Simple Codes. Signal Representation versus Signal Compression.2 Prefix Codes.3 Trees associated with prefix codes.4 Kraft inequality.5 A lower bound on the average length of

More information

Lecture 8: Shannon s Noise Models

Lecture 8: Shannon s Noise Models Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 8: Shannon s Noise Models September 14, 2007 Lecturer: Atri Rudra Scribe: Sandipan Kundu& Atri Rudra Till now we have

More information

MEASURES OF CENTRAL TENDENCY

MEASURES OF CENTRAL TENDENCY INTRODUCTION: MEASURES OF CENTRAL TENDENCY Often, one encounters e term Measures of central tendency in a book on statistics (or an examination). One may also find mention of e term in a description of

More information

Lecture 1. Introduction

Lecture 1. Introduction Lecture 1. Introduction What is the course about? Logistics Questionnaire Dr. Yao Xie, ECE587, Information Theory, Duke University What is information? Dr. Yao Xie, ECE587, Information Theory, Duke University

More information

The Moments of the Profile in Random Binary Digital Trees

The Moments of the Profile in Random Binary Digital Trees Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International

More information

Ch 0 Introduction. 0.1 Overview of Information Theory and Coding

Ch 0 Introduction. 0.1 Overview of Information Theory and Coding Ch 0 Introduction 0.1 Overview of Information Theory and Coding Overview The information theory was founded by Shannon in 1948. This theory is for transmission (communication system) or recording (storage

More information

CMPT 365 Multimedia Systems. Lossless Compression

CMPT 365 Multimedia Systems. Lossless Compression CMPT 365 Multimedia Systems Lossless Compression Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Outline Why compression? Entropy Variable Length Coding Shannon-Fano Coding

More information

An Area Optimized Implementation of AES S-Box Based on Composite Field and Evolutionary Algorithm

An Area Optimized Implementation of AES S-Box Based on Composite Field and Evolutionary Algorithm , October 1-3, 015, San Francisco, USA An Area Optimized Implementation of AES S-Box Based on Composite Field and Evolutionary Algorithm Yaoping Liu, Ning Wu, Xiaoqiang Zhang, LilingDong, and Lidong Lan

More information

TYPES OF MODEL COMPRESSION. Soham Saha, MS by Research in CSE, CVIT, IIIT Hyderabad

TYPES OF MODEL COMPRESSION. Soham Saha, MS by Research in CSE, CVIT, IIIT Hyderabad TYPES OF MODEL COMPRESSION Soham Saha, MS by Research in CSE, CVIT, IIIT Hyderabad 1. Pruning 2. Quantization 3. Architectural Modifications PRUNING WHY PRUNING? Deep Neural Networks have redundant parameters.

More information

On Compression Encrypted Data part 2. Prof. Ja-Ling Wu The Graduate Institute of Networking and Multimedia National Taiwan University

On Compression Encrypted Data part 2. Prof. Ja-Ling Wu The Graduate Institute of Networking and Multimedia National Taiwan University On Compression Encrypted Data part 2 Prof. Ja-Ling Wu The Graduate Institute of Networking and Multimedia National Taiwan University 1 Brief Summary of Information-theoretic Prescription At a functional

More information

CALCULATION OF THE MINIMUM COMPUTATIONAL COMPLEXITY BASED ON INFORMATION ENTROPY

CALCULATION OF THE MINIMUM COMPUTATIONAL COMPLEXITY BASED ON INFORMATION ENTROPY CALCULATION OF THE MINIMUM COMPUTATIONAL COMPLEXITY BASED ON INFORMATION ENTROPY Xue Wu 1 1 Department of Microelectronics, Tsinghua University, Beijing, China wuxiqh@yahoo.cn ABSTRACT In order to find

More information

Improved Lempel-Ziv-Welch s Error Detection and Correction Scheme using Redundant Residue Number System (RRNS)

Improved Lempel-Ziv-Welch s Error Detection and Correction Scheme using Redundant Residue Number System (RRNS) Circulation in Computer Science Vol2, No6, pp: (25-30), July 2017 https://doiorg/1022632/ccs-2017-252-33 Improved Lempel-Ziv-Welch s Error Detection and Correction Scheme using Redundant Residue Number

More information

Basic Principles of Lossless Coding. Universal Lossless coding. Lempel-Ziv Coding. 2. Exploit dependences between successive symbols.

Basic Principles of Lossless Coding. Universal Lossless coding. Lempel-Ziv Coding. 2. Exploit dependences between successive symbols. Universal Lossless coding Lempel-Ziv Coding Basic principles of lossless compression Historical review Variable-length-to-block coding Lempel-Ziv coding 1 Basic Principles of Lossless Coding 1. Exploit

More information

Module 2 Advanced Symmetric Ciphers

Module 2 Advanced Symmetric Ciphers Module 2 Advanced Symmetric Ciphers Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Data Encryption Standard (DES) The DES algorithm

More information

LINGO optimization model-based gymnastics team competition best starting line-up research

LINGO optimization model-based gymnastics team competition best starting line-up research Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 0, 6(7):98-95 Research Article ISSN : 0975-738 CODEN(USA) : JCPRC5 LINGO optimization model-based gymnastics team competition

More information

3F1 Information Theory, Lecture 3

3F1 Information Theory, Lecture 3 3F1 Information Theory, Lecture 3 Jossy Sayir Department of Engineering Michaelmas 2013, 29 November 2013 Memoryless Sources Arithmetic Coding Sources with Memory Markov Example 2 / 21 Encoding the output

More information

Automatic Drawing of the Complicated Geological Faults

Automatic Drawing of the Complicated Geological Faults Research Journal of Applied Sciences, Engineering and Technology 6(18): 3349-3353, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: December 12, 2012 Accepted: January

More information

Feature Selection Criterion for Gravity Matching Navigation

Feature Selection Criterion for Gravity Matching Navigation Feature Selection Criterion for Gravity Matching Navigation Abubakar Usman Sambo, Li Shi Xin 2 Tianjin University of Technology and Education, Department of Electronics Engineering. Tianjin China Abstract:

More information

CSEP 590 Data Compression Autumn Dictionary Coding LZW, LZ77

CSEP 590 Data Compression Autumn Dictionary Coding LZW, LZ77 CSEP 590 Data Compression Autumn 2007 Dictionary Coding LZW, LZ77 Dictionary Coding Does not use statistical knowledge of data. Encoder: As the input is processed develop a dictionary and transmit the

More information

Information Theory CHAPTER. 5.1 Introduction. 5.2 Entropy

Information Theory CHAPTER. 5.1 Introduction. 5.2 Entropy Haykin_ch05_pp3.fm Page 207 Monday, November 26, 202 2:44 PM CHAPTER 5 Information Theory 5. Introduction As mentioned in Chapter and reiterated along the way, the purpose of a communication system is

More information

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus Turbo Compression Andrej Rikovsky, Advisor: Pavol Hanus Abstract Turbo codes which performs very close to channel capacity in channel coding can be also used to obtain very efficient source coding schemes.

More information

Lecture 18 April 26, 2012

Lecture 18 April 26, 2012 6.851: Advanced Data Structures Spring 2012 Prof. Erik Demaine Lecture 18 April 26, 2012 1 Overview In the last lecture we introduced the concept of implicit, succinct, and compact data structures, and

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State Commun. Theor. Phys. 55 (2011) 984 988 Vol. 55, No. 6, June 15, 2011 Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State YUAN Hao ( ), 1, ZHOU Jun ( ), 1,2 ZHANG Gang

More information

Secure RAID Schemes from EVENODD and STAR Codes

Secure RAID Schemes from EVENODD and STAR Codes Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity

More information

The Two Time Pad Encryption System

The Two Time Pad Encryption System Hardware Random Number Generators This document describe the use and function of a one-time-pad style encryption system for field and educational use. You may download sheets free from www.randomserver.dyndns.org/client/random.php

More information

Complementary Contextual Models with FM-index for DNA Compression

Complementary Contextual Models with FM-index for DNA Compression 2017 Data Compression Conference Complementary Contextual Models with FM-index for DNA Compression Wenjing Fan,WenruiDai,YongLi, and Hongkai Xiong Department of Electronic Engineering Department of Biomedical

More information

Lecture 1: Shannon s Theorem

Lecture 1: Shannon s Theorem Lecture 1: Shannon s Theorem Lecturer: Travis Gagie January 13th, 2015 Welcome to Data Compression! I m Travis and I ll be your instructor this week. If you haven t registered yet, don t worry, we ll work

More information

Assume that the follow string of bits constitutes one of the segments we which to transmit.

Assume that the follow string of bits constitutes one of the segments we which to transmit. Cyclic Redundancy Checks( CRC) Cyclic Redundancy Checks fall into a class of codes called Algebraic Codes; more specifically, CRC codes are Polynomial Codes. These are error-detecting codes, not error-correcting

More information

Computer Arithmetic. MATH 375 Numerical Analysis. J. Robert Buchanan. Fall Department of Mathematics. J. Robert Buchanan Computer Arithmetic

Computer Arithmetic. MATH 375 Numerical Analysis. J. Robert Buchanan. Fall Department of Mathematics. J. Robert Buchanan Computer Arithmetic Computer Arithmetic MATH 375 Numerical Analysis J. Robert Buchanan Department of Mathematics Fall 2013 Machine Numbers When performing arithmetic on a computer (laptop, desktop, mainframe, cell phone,

More information