Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e}

Size: px
Start display at page:

Download "Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e}"

Transcription

1 Outline efinition of ntroy Three ntroy coding techniques: Huffman coding rithmetic coding Lemel-Ziv coding ntroy oding (taken from the Technion) ntroy ntroy of a set of elements e,,e n with robabilities, n is: n { H i log i ntroy (in our context) - smallest number of bits needed, on the average, to reresent a symbol (the average on all the symbols code lengths). Note: log i is the uncertainty in symbol e i (or the surrise when we see this symbol). ntroy average surrise ssumtion: there are no deendencies between the symbols aearances i 4 efinitions lhabet: finite set containing at least one element: = {a, b, c, d, e} Symbol: n element in the alhabet: s string over the alhabet: sequence of symbols, each of which is an element of that alhabet: ccdabdcaad odeword: sequence of bits reresenting a coded symbol or string: i : The occurrence robability of symbol s i in the inut string. i Åi L i : The length of the codeword of symbol s i in bits. 3

2 ntroy examles ntroy of e, e n is maximized when = = = n =/n Æ H(e,,e n )=log n RV\PROLV HWWHU WKQWKHRWKHURUFRQWLQV PRUHLQIRUPWLRQ k symbols may be reresented by k bits ntroy of, n is minimized when =, = = n = Æ H(e,,e n )= 6 ntroy examle ntroy calculation for a two symbol alhabet. xamle : =.5 =.5 H, log log.5log.5.5log.5 xamle : =.8 =. H, log.8log.8.log. #.79 log It requires one bit er symbol on the average to reresent the data. It requires less than one bit er symbol on the average to reresent the data. How can we code this? 5 ode tyes Fixed-length codes - all codewords have the same length (number of bits),,,,, F Variable-length codes - may give different lengths to codewords ntroy coding ntroy is a lower bound on the average number of bits needed to reresent the symbols (the data comression limit). ntroy coding methods: sire to achieve the entroy for a given alhabet, PSÆntroy code achieving the entroy limit is otimal,,,,, F - PS : bits er symbol PS encoded original message message 8 7

3 Huffman coding ach symbol is assigned a variable-length code, deending on its frequency. The higher its frequency, the shorter the codeword Number of bits for each codeword is an integral number refix code variable-length code Huffman code is the otimal refix and variable-length code, given the symbols robabilities of occurrence odewords are generated by building a Huffman Tree ode tyes (cont.) Prefix code - No codeword is a refix of any other codeword. = ; = ; = ; = Uniquely decodable code - Has only one ossible source string roducing it. Unambigously decoded xamles: Prefix code - the end of a codeword is immediately recognized without ambiguity: Æ Fixed-length code 9 Huffman encoding Huffman tree examle Use the codewords from the revious slide to encode the string : String: ncoded: Number of bits used: 9 The PS is (9 bits/4 symbols) =.5 ntroy: -.5log.5 -.5log.5 -.log. -.5log.5 -.5log.5 =.854 PS is lower than the entroy. WHY? ach codeword is determined according to the ath from the root to the symbol. When decoding, a tree traversal is erformed, starting from the root. Probabilities codewords: xamle: decoding inut ()

4 Huffman encoding uild a table of er-symbol encodings (generated by the Huffman tree). Globally known to both encoder and decoder Sent by encoder, read by decoder ncode one symbol after the other, using the encoding table. ncode the seudo-eof symbol. 4 Huffman tree construction Initialization: Leaf for each symbol x of alhabet with weight=x. Note: One can work with integer weights in the leafs (for examle, number of symbol occurrences) instead of robabilities. while (tree not fully connected) do begin Y, Z Å lowest_root_weights_tree() r Å new_root r->attachsons(y, Z) // attach one via a, the other via a (order not significant) weight(r) = weight(y)+weight(z) 3 Symbol robabilities How are the robabilities known? ounting symbols in inut string o ata must be given in advance o Requires an extra ass on the inut string ata source s distribution is known o ata not necessarily known in advance, but we know its distribution Huffman decoding onstruct decoding tree based on encoding table Read coded message bit-by-bit: Travers the tree to to bottom accordingly. When a leaf is reached, a codeword was found Æ corresonding symbol is decoded Reeat until the seudo-eof symbol is reached. No ambiguities when decoding codewords (refix code) 6 5

5 Huffman ntroy analysis est results (entroy wise) - only when symbols have occurrence robabilities which are negative owers of (i.e. ½, ¼, ). Otherwise, PS > entroy bound. xamle: Symbol Probability odeword ntroy =.75 reresenting robabilities inut stream : ode: PS = (4 bits/8 symbols) =.75 8 Letter F G H I J K L M xamle Global nglish frequencies table: Prob Total:. Letter N O P Q R S T U V W X Y Z Prob Huffman summary Huffman tree construction comlexity chieves entroy when occurrence robabilities are negative owers of lhabet and its distribution must be known in advance Given the Huffman tree, very easy (and fast) to encode and decode Huffman code is not unique (because of some arbitrary decisions in the tree construction) Simle imlementation - o(n ). Using a Priority Queue - o(n log(n)): Inserting a new node o(log(n)) n nodes insertions - o(n log(n)) Retrieving smallest node weights o(log(n)) 9

6 rithmetic coding ssigns one (normally long) codeword to entire inut stream Reads the inut stream symbol by symbol, aending more bits to the codeword each time rithmetic coding odeword is a number, reresenting a segmental subsection based on the symbols robabilities ncodes symbols using a non-integer number of bits Æ very good results (entroy wise) Mathematical definitions xamle L The smallest binary value consistent with a code reresenting the symbols rocessed so far. R The roduct of the robabilities of those symbols L i+ o R i+ R i oding of = =.5, =., = = ny number in this range reresents. L i o

7 rithmetic encoding (cont.) rithmetic encoding Two ossibilities for the encoder to signal to the decoder end of the transmission: Initially L =, R =. When encoding next symbol, L and R are refined. L m L R j i i R m R j. Send initially the number of symbols encoded.. ssign a new OF symbol in the alhabet, with a very small robability, and encode it at the end of the message. Note: The order of the symbols in the alhabet must remain consistent throughout the algorithm. t the end of the message, a binary value between L and L+R will unambiguously secify the inut message. The shortest such binary string is transmitted. In the revious examle: ny number between and 3875 (discard the. ). Shortest number - 386, in binary: PS = (9 bits/4 symbols) = o o rithmetic decoding examle o.375 ecoding of ecoding: rithmetic decoding In order to decode the message, the symbols order and robabilities must be assed to the decoder. The decoding rocess is identical to the encoding. Given the codeword (the final number), at each iteration the corresonding sub-range is entered, decoding the symbol reresenting the secific range o

8 istributions issues rithmetic entroy analysis Until now, symbol distributions were known in advance What haens if they are not known? Inut string not known Huffman and rithmetic odings have an adative version o istributions are udated as the inut string is read o an work online rithmetic coding manages to encode symbols using non integer number of bits! One codeword is assigned to the entire inut stream, instead of a codeword to each individual symbol This allows rithmetic oding to achieve the ntroy lower bound 3 9 Lemel-Ziv concets What if the alhabet is unknown? Lemel-Ziv coding solves this general case, where only a stream of bits is given. LZ creates its own dictionary (strings of bits), and relaces future occurrences of these strings by a shorter osition string: In simle Huffman/rithmetic coding, the deendency between the symbols is ignored, while in the LZ, these deendencies are identified and are exloited to erform better encoding. When all the data is known (alhabet, robabilities, no deendencies), it s best to use Huffman (LZ will try to find deendencies which are not there ) Lemel-Ziv concets 3 3

9 Lemel-Ziv algorithm. Initialize the dictionary to contain an emty string (={ }).. W Å longest block in inut string which aears in. 3. Å first symbol in inut string after W 4. ncode W by its index in the dictionary, followed by 5. dd W+ to the dictionary. 6. Go to Ste. Lemel-Ziv comression Parses source inut (in binary) into the shortest distinct strings: Æ,,,,,, ach string includes a refix and an extra bit ( = + ), therefore encoded as: (refix string lace, extra bit) Requires asses over the inut (one to arse inut, second to encode). an be modified to one ass. omression: (n number of distinct strings) log(n) bits for the refix lace + bit for the added bit Overall n log(n) bits comressed omression comarison omressed to (ercentage): html (5k) Token based ascii file df (69k) inary file (.5k) Random ascii file Lemel-Ziv (unix gzi) % 75% 33% Huffman (unix ack) 65% 95% 8.% (5k) Random ascii file 9% 8.% { =.5, =.5, =.5, =.5} Lemel-Ziv is asymtotically otimal 36 ictionary Index ntry xamle Inut string: W ncoded string: Pairs: (,) (,) (,) (,) (4,) (,) (,) ncoding: 35

10 Probabilities lhabet ata loss Symbols deendency Prerocessing ntroy odewords Intuition omarison Huffman Known in advance Known in advance None Not used Tree building O(n log n) If robabilities are negative owers of One codeword for each symbol Intuitive rithmetic Known in advance Known in advance None Not used None Very close One codeword for all data Not intuitive Lemel-Ziv Not known in advance Not known in advance None Used better comression First ass on data (can be eliminated) est results when alhabet not known odewords for set of alhabet Not intuitive 37

Module 3 Greedy Strategy

Module 3 Greedy Strategy Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main

More information

Coding for Efficiency

Coding for Efficiency Let s suppose that, over some channel, we want to transmit text containing only 4 symbols, a, b, c, and d. Further, let s suppose they have a probability of occurrence in any block of text we send as follows

More information

Module 3 Greedy Strategy

Module 3 Greedy Strategy Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main

More information

Introduction to Source Coding

Introduction to Source Coding Comm. 52: Communication Theory Lecture 7 Introduction to Source Coding - Requirements of source codes - Huffman Code Length Fixed Length Variable Length Source Code Properties Uniquely Decodable allow

More information

Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology

Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology Course Presentation Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology Data Compression Motivation Data storage and transmission cost money Use fewest number of

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding

More information

Lecture5: Lossless Compression Techniques

Lecture5: Lossless Compression Techniques Fixed to fixed mapping: we encoded source symbols of fixed length into fixed length code sequences Fixed to variable mapping: we encoded source symbols of fixed length into variable length code sequences

More information

Computational Complexity of Generalized Push Fight

Computational Complexity of Generalized Push Fight Comutational Comlexity of Generalized Push Fight Jeffrey Bosboom Erik D. Demaine Mikhail Rudoy Abstract We analyze the comutational comlexity of otimally laying the two-layer board game Push Fight, generalized

More information

LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR

LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 1 LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 2 STORAGE SPACE Uncompressed graphics, audio, and video data require substantial storage capacity. Storing uncompressed video is not possible

More information

Huffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley

Huffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley - A Greedy Algorithm Slides based on Kevin Wayne / Pearson-Addison Wesley Greedy Algorithms Greedy Algorithms Build up solutions in small steps Make local decisions Previous decisions are never reconsidered

More information

Entropy, Coding and Data Compression

Entropy, Coding and Data Compression Entropy, Coding and Data Compression Data vs. Information yes, not, yes, yes, not not In ASCII, each item is 3 8 = 24 bits of data But if the only possible answers are yes and not, there is only one bit

More information

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation Evolutionary Circuit Design: Theory Persective on Signal Proagation Denis Poel Deartment of Comuter Science, Baker University, P.O. 65, Baldwin City, KS 66006, E-mail: oel@ieee.org Nawar Hakeem Deartment

More information

Information Theory and Huffman Coding

Information Theory and Huffman Coding Information Theory and Huffman Coding Consider a typical Digital Communication System: A/D Conversion Sampling and Quantization D/A Conversion Source Encoder Source Decoder bit stream bit stream Channel

More information

Economics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory

Economics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory Economics of Strategy (ECON 4550) Maymester 05 Foundations of Game Theory Reading: Game Theory (ECON 4550 Courseak, Page 95) Definitions and Concets: Game Theory study of decision making settings in which

More information

Information Theory and Communication Optimal Codes

Information Theory and Communication Optimal Codes Information Theory and Communication Optimal Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/1 Roadmap Examples and Types of Codes Kraft Inequality

More information

TO IMPROVE BIT ERROR RATE OF TURBO CODED OFDM TRANSMISSION OVER NOISY CHANNEL

TO IMPROVE BIT ERROR RATE OF TURBO CODED OFDM TRANSMISSION OVER NOISY CHANNEL TO IMPROVE BIT ERROR RATE OF TURBO CODED TRANSMISSION OVER NOISY CHANNEL 1 M. K. GUPTA, 2 VISHWAS SHARMA. 1 Deartment of Electronic Instrumentation and Control Engineering, Jagannath Guta Institute of

More information

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms Performance Analysis of MIMO System using Sace Division Multilexing Algorithms Dr.C.Poongodi 1, Dr D Deea, M. Renuga Devi 3 and N Sasireka 3 1, Professor, Deartment of ECE 3 Assistant Professor, Deartment

More information

A Brief Introduction to Information Theory and Lossless Coding

A Brief Introduction to Information Theory and Lossless Coding A Brief Introduction to Information Theory and Lossless Coding 1 INTRODUCTION This document is intended as a guide to students studying 4C8 who have had no prior exposure to information theory. All of

More information

An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ

An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ Rong Lin y Koji Nakano z Stehan Olariu x Albert Y. Zomaya Abstract We roose an efficient reconfigurable arallel refix counting

More information

Monday, February 2, Is assigned today. Answers due by noon on Monday, February 9, 2015.

Monday, February 2, Is assigned today. Answers due by noon on Monday, February 9, 2015. Monday, February 2, 2015 Topics for today Homework #1 Encoding checkers and chess positions Constructing variable-length codes Huffman codes Homework #1 Is assigned today. Answers due by noon on Monday,

More information

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System RESEARCH ARTICLE OPEN ACCESS An Overview of PAPR Reduction Otimization Algorithm for MC-CDMA System Kanchan Singla*, Rajbir Kaur**, Gagandee Kaur*** *(Deartment of Electronics and Communication, Punjabi

More information

# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression

# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression # 2 ECE 253a Digital Image Processing Pamela Cosman /4/ Introductory material for image compression Motivation: Low-resolution color image: 52 52 pixels/color, 24 bits/pixel 3/4 MB 3 2 pixels, 24 bits/pixel

More information

Random Access Compressed Sensing in Underwater Sensor Networks

Random Access Compressed Sensing in Underwater Sensor Networks Random Access Comressed Sensing in Underwater Sensor Networks Fatemeh Fazel Northeastern University Boston, MA 2115 Email: ffazel@ece.neu.edu Maryam Fazel University of Washington Seattle, WA 98195 Email:

More information

University of Twente

University of Twente University of Twente Faculty of Electrical Engineering, Mathematics & Comuter Science Design of an audio ower amlifier with a notch in the outut imedance Remco Twelkemeijer MSc. Thesis May 008 Suervisors:

More information

Shannon Information Theory

Shannon Information Theory Comm. 5: Communication Theor Lecture Shannon Information Theor -Binar Erasure Channel, Binar Smmetric channel, Channel Caacit, Shannon Caacit Noiseless Channel P P P Noiseless Channel P is the robabilit

More information

Contents Maryland High-school Programming Contest 1. 1 Bart s Skateboard Park 2. 2 Simpsons Hidden Talents 3. 3 A Knight and a Queen 4

Contents Maryland High-school Programming Contest 1. 1 Bart s Skateboard Park 2. 2 Simpsons Hidden Talents 3. 3 A Knight and a Queen 4 2008 Maryland High-school Programming Contest 1 Contents 1 Bart s Skateboard Park 2 2 Simsons Hidden Talents 3 3 A Knight and a Queen 4 4 Sorted Trail Ma 6 5 Collecting Forest Wildlife 7 6 Crowded Forest

More information

Solutions to Assignment-2 MOOC-Information Theory

Solutions to Assignment-2 MOOC-Information Theory Solutions to Assignment-2 MOOC-Information Theory 1. Which of the following is a prefix-free code? a) 01, 10, 101, 00, 11 b) 0, 11, 01 c) 01, 10, 11, 00 Solution:- The codewords of (a) are not prefix-free

More information

1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program.

1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program. Combined Error Correcting and Compressing Codes Extended Summary Thomas Wenisch Peter F. Swaszek Augustus K. Uht 1 University of Rhode Island, Kingston RI Submitted to International Symposium on Information

More information

Wednesday, February 1, 2017

Wednesday, February 1, 2017 Wednesday, February 1, 2017 Topics for today Encoding game positions Constructing variable-length codes Huffman codes Encoding Game positions Some programs that play two-player games (e.g., tic-tac-toe,

More information

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks Efficient Imortance Samling for Monte Carlo Simulation of Multicast Networks P. Lassila, J. Karvo and J. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P.O.Box 3000,

More information

LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels

LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels Jun Zheng and Bhaskar D. Rao University of California at San Diego Email: juzheng@ucsd.edu, brao@ece.ucsd.edu Abstract We consider an LDPC-coded

More information

Computational Complexity of Generalized Push Fight

Computational Complexity of Generalized Push Fight Comutational Comlexity of Generalized Push Fight Jeffrey Bosboom MIT CSAIL, 32 Vassar Street, Cambridge, MA 2139, USA jbosboom@csail.mit.edu Erik D. Demaine MIT CSAIL, 32 Vassar Street, Cambridge, MA 2139,

More information

Computational Complexity of Generalized Push Fight

Computational Complexity of Generalized Push Fight 1 2 3 4 5 6 7 8 9 1 11 12 13 14 15 16 17 18 19 2 21 22 23 24 25 26 Comutational Comlexity of Generalized Push Fight Jeffrey Bosboom MIT CSAIL, 32 Vassar Street, Cambridge, MA 2139, USA jbosboom@csail.mit.edu

More information

SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON).

SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON). SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON). 1. Some easy problems. 1.1. Guessing a number. Someone chose a number x between 1 and N. You are allowed to ask questions: Is this number larger

More information

FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING

FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING Harman Jot, Rupinder Kaur M.Tech, Department of Electronics and Communication, Punjabi University, Patiala, Punjab, India I. INTRODUCTION

More information

Chapter 7 Local Navigation: Obstacle Avoidance

Chapter 7 Local Navigation: Obstacle Avoidance Chater 7 Local Navigation: Obstacle Avoidance A mobile robot must navigate from one oint to another in its environment. This can be a simle task, for examle, if a robot can follow an unobstructed line

More information

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution 2.1. General Purpose There are many popular general purpose lossless compression techniques, that can be applied to any type of data. 2.1.1. Run Length Encoding Run Length Encoding is a compression technique

More information

COMM901 Source Coding and Compression Winter Semester 2013/2014. Midterm Exam

COMM901 Source Coding and Compression Winter Semester 2013/2014. Midterm Exam German University in Cairo - GUC Faculty of Information Engineering & Technology - IET Department of Communication Engineering Dr.-Ing. Heiko Schwarz COMM901 Source Coding and Compression Winter Semester

More information

The Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network

The Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network Send Orders for Rerints to rerints@benthamscienceae 690 The Oen Cybernetics & Systemics Journal, 05, 9, 690-698 Oen Access The Otimization Model and Algorithm for Train Connection at Transfer Stations

More information

Initial Ranging for WiMAX (802.16e) OFDMA

Initial Ranging for WiMAX (802.16e) OFDMA Initial Ranging for WiMAX (80.16e) OFDMA Hisham A. Mahmoud, Huseyin Arslan Mehmet Kemal Ozdemir Electrical Engineering Det., Univ. of South Florida Logus Broadband Wireless Solutions 40 E. Fowler Ave.,

More information

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation 1 Ulink Scheduling in Wireless Networks with Successive Interference Cancellation Majid Ghaderi, Member, IEEE, and Mohsen Mollanoori, Student Member, IEEE, Abstract In this aer, we study the roblem of

More information

Comm. 502: Communication Theory. Lecture 6. - Introduction to Source Coding

Comm. 502: Communication Theory. Lecture 6. - Introduction to Source Coding Comm. 50: Communication Theory Lecture 6 - Introduction to Source Coding Digital Communication Systems Source of Information User of Information Source Encoder Source Decoder Channel Encoder Channel Decoder

More information

!!"!#$#!%!"""#&#!%!""#&#"%!"# &#!%!# # ##$#!%!"'###&#!%!"(##&#"%!"!#&#!%!""# #!!"!#$#!%)# &#!%*# &#"%(##&#!%!# Base or

!!!#$#!%!#&#!%!#&#%!# &#!%!# # ##$#!%!'###&#!%!(##&#%!!#&#!%!# #!!!#$#!%)# &#!%*# &#%(##&#!%!# Base or /9/ General dea More its and ytes inary umbers & uffman oding!!"#"$%&'()*+,-%$"+).'!/$/$")#'$/',//)/'+,' %/)/'+*'%'/)+-/)+)'%$'%'/"'&%/'%)6' $"-/.'%)6'! /)+-/)%.'&"#$9'-%#)/$"-9'%,#/9'-%9'+&+,9' :,,/)$9';'!!/$/$")#'6//)6'+)'/)+-/)+)'

More information

Lab 4: The transformer

Lab 4: The transformer ab 4: The transformer EEC 305 July 8 05 Read this lab before your lab eriod and answer the questions marked as relaboratory. You must show your re-laboratory answers to the TA rior to starting the lab.

More information

CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES

CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 119 CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 5.1 INTRODUCTION In this work the peak powers of the OFDM signal is reduced by applying Adaptive Huffman Codes (AHC). First the encoding

More information

Properties of Mobile Tactical Radio Networks on VHF Bands

Properties of Mobile Tactical Radio Networks on VHF Bands Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a

More information

Analysis of Electronic Circuits with the Signal Flow Graph Method

Analysis of Electronic Circuits with the Signal Flow Graph Method Circuits and Systems, 207, 8, 26-274 htt://www.scir.org/journal/cs ISSN Online: 253-293 ISSN Print: 253-285 Analysis of Electronic Circuits with the Signal Flow Grah Method Feim Ridvan Rasim, Sebastian

More information

Improvements of Bayesian Matting

Improvements of Bayesian Matting Imrovements of Bayesian Matting Mikhail Sindeyev, Vadim Konushin, Vladimir Vezhnevets Deartment of omutational Mathematics and ybernetics, Grahics and Media Lab Moscow State Lomonosov University, Moscow,

More information

HUFFMAN CODING. Catherine Bénéteau and Patrick J. Van Fleet. SACNAS 2009 Mini Course. University of South Florida and University of St.

HUFFMAN CODING. Catherine Bénéteau and Patrick J. Van Fleet. SACNAS 2009 Mini Course. University of South Florida and University of St. Catherine Bénéteau and Patrick J. Van Fleet University of South Florida and University of St. Thomas SACNAS 2009 Mini Course WEDNESDAY, 14 OCTOBER, 2009 (1:40-3:00) LECTURE 2 SACNAS 2009 1 / 10 All lecture

More information

Prediction Efficiency in Predictive p-csma/cd

Prediction Efficiency in Predictive p-csma/cd Prediction Efficiency in Predictive -CSMA/CD Mare Miśowicz AGH University of Science and Technology, Deartment of Electronics al. Miciewicza 30, 30-059 Kraów, Poland misow@agh.edu.l Abstract. Predictive

More information

6.450: Principles of Digital Communication 1

6.450: Principles of Digital Communication 1 6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of

More information

Basic Communication Operations (cont.) Alexandre David B2-206

Basic Communication Operations (cont.) Alexandre David B2-206 Basic Communication Oerations (cont.) Alexandre David B-06 Today Scatter and Gather (4.4). All-to-All Personalized Communication (4.5). Circular Shift (4.6). Imroving the Seed of Some Communication Oerations

More information

There are two basic types of FET s: The junction field effect transistor or JFET the metal oxide FET or MOSFET.

There are two basic types of FET s: The junction field effect transistor or JFET the metal oxide FET or MOSFET. Page 61 Field Effect Transistors The Fieldeffect transistor (FET) We know that the biolar junction transistor or BJT is a current controlled device. The FET or field effect transistor is a voltage controlled

More information

Figure 1 7-chip Barker Coded Waveform

Figure 1 7-chip Barker Coded Waveform 3.0 WAVEFOM CODING 3.1 Introduction We now want to loo at waveform coding. We secifically want to loo at hase and frequency coding. Our first exosure to waveform coding was our study of LFM ulses. In that

More information

Parameter Controlled by Contrast Enhancement Using Color Image

Parameter Controlled by Contrast Enhancement Using Color Image Parameter Controlled by Contrast Enhancement Using Color Image Raguathi.S and Santhi.K Abstract -The arameter-controlled virtual histogram distribution (PCVHD) method is roosed in this roject to enhance

More information

EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER

EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER YEDITEPE UNIVERSITY ENGINEERING & ARCHITECTURE FACULTY INDUSTRIAL ELECTRONICS LABORATORY EE 432 INDUSTRIAL ELECTRONICS EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER Introduction:

More information

Compression Waveforms for Non-Coherent Radar

Compression Waveforms for Non-Coherent Radar Comression Waveforms for Non-Coherent Radar Uri Peer and Nadav Levanon el Aviv University P. O. Bo 39, el Aviv, 69978 Israel nadav@eng.tau.ac.il Abstract - Non-coherent ulse comression (NCPC) was suggested

More information

Is 1 a Square Modulo p? Is 2?

Is 1 a Square Modulo p? Is 2? Chater 21 Is 1 a Square Modulo? Is 2? In the revious chater we took various rimes and looked at the a s that were quadratic residues and the a s that were nonresidues. For examle, we made a table of squares

More information

Product Accumulate Codes on Fading Channels

Product Accumulate Codes on Fading Channels Product Accumulate Codes on Fading Channels Krishna R. Narayanan, Jing Li and Costas Georghiades Det of Electrical Engineering Texas A&M University, College Station, TX 77843 Abstract Product accumulate

More information

Escaping from a Labyrinth with One-way Roads for Limited Robots

Escaping from a Labyrinth with One-way Roads for Limited Robots 1 Escaing from a Labyrinth with One-way Roads for Limited Robots Bernd Brüggemann Tom Kamhans Elmar Langetee FKIE, FGAN e.v., Bonn, Germany Institute of Comuter Science I, University of Bonn, Bonn, Germany

More information

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes 22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National

More information

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation International Journal Of Comutational Engineering Research (ijceronline.com) Vol. 2 Issue. Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation Rajbir Kaur 1, Charanjit

More information

Chapter 1 INTRODUCTION TO SOURCE CODING AND CHANNEL CODING. Whether a source is analog or digital, a digital communication

Chapter 1 INTRODUCTION TO SOURCE CODING AND CHANNEL CODING. Whether a source is analog or digital, a digital communication 1 Chapter 1 INTRODUCTION TO SOURCE CODING AND CHANNEL CODING 1.1 SOURCE CODING Whether a source is analog or digital, a digital communication system is designed to transmit information in digital form.

More information

Optimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm

Optimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm o Otimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm Nirvana S. Antonio, Cícero F. F. Costa Filho, Marly G. F. Costa, Rafael Padilla Abstract In 4-sided dominoes,

More information

The Lempel-Ziv (LZ) lossless compression algorithm was developed by Jacob Ziv (AT&T Bell Labs / Technion Israel) and Abraham Lempel (IBM) in 1978;

The Lempel-Ziv (LZ) lossless compression algorithm was developed by Jacob Ziv (AT&T Bell Labs / Technion Israel) and Abraham Lempel (IBM) in 1978; Georgia Institute of Technology - Georgia Tech Lorraine ECE 6605 Information Theory Lempel-Ziv Lossless Compresion General comments The Lempel-Ziv (LZ) lossless compression algorithm was developed by Jacob

More information

Analysis of Mean Access Delay in Variable-Window CSMA

Analysis of Mean Access Delay in Variable-Window CSMA Sensors 007, 7, 3535-3559 sensors ISSN 44-80 007 by MDPI www.mdi.org/sensors Full Research Paer Analysis of Mean Access Delay in Variable-Window CSMA Marek Miśkowicz AGH University of Science and Technology,

More information

Keywords: Adaptive genetic algorithm, Call Admission Control (CAC), Code-Division Multiple Access (CDMA), dynamic code assignment

Keywords: Adaptive genetic algorithm, Call Admission Control (CAC), Code-Division Multiple Access (CDMA), dynamic code assignment Research Journal of Alied Sciences, Engineering and Technology 7(12): 2545-2553, 2014 DOI:10.19026/rjaset.7.565 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Cor. Submitted: August

More information

802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page

802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page VOCAL Technologies, Ltd. Home age 802.b White Paer Table of Contents Page. 802.b Glossary... 2 2. Introduction to 802.b... 3 3. 802.b Overview... 6 4. CCK used in 802.b... 7 5. Walsh and Comlementary Codes

More information

Spiking Neural Networks for Real-Time Infrared Images Processing in Thermo Vision Systems

Spiking Neural Networks for Real-Time Infrared Images Processing in Thermo Vision Systems Siking Neural Networks for Real-Time Infrared Images Processing in Thermo Vision Sstems Snejana Pleshkova Deartment of Telecommunications Technical Universit Kliment Ohridski, 8 Sofia aabbv@tu-sofia.bg

More information

RELIABLE COMMUNICATION IN THE PRESENCE OF LIMITED ADVERSARIES

RELIABLE COMMUNICATION IN THE PRESENCE OF LIMITED ADVERSARIES 2 ELIABLE COMMUNICATION IN THE PESENCE OF LIMITED ADVESAIES 3 ME esearch grou: Codes, Codes, Algorithms, Algorithms, Networks: Networks: Design & Otimization for Information Information Theory Theory Zitan

More information

Multi Domain Behavioral Models of Smart-Power ICs for Design Integration in Automotive Applications. Dieter Metzner, Jürgen Schäfer, Chihao Xu

Multi Domain Behavioral Models of Smart-Power ICs for Design Integration in Automotive Applications. Dieter Metzner, Jürgen Schäfer, Chihao Xu Multi Domain Behavioral Models of Smart-Power ICs for Design Integration in Automotive Alications Dieter Metzner, Jürgen Schäfer, Chihao Xu Infineon Technologies AG P.O. Box 800949, D-81609 München, Germany

More information

THE HELMHOLTZ RESONATOR TREE

THE HELMHOLTZ RESONATOR TREE THE HELMHOLTZ RESONATOR TREE Rafael C. D. Paiva and Vesa Välimäki Deartment of Signal Processing and Acoustics Aalto University, School of Electrical Engineering Esoo, Finland rafael.dias.de.aiva@aalto.fi

More information

Compression. Encryption. Decryption. Decompression. Presentation of Information to client site

Compression. Encryption. Decryption. Decompression. Presentation of Information to client site DOCUMENT Anup Basu Audio Image Video Data Graphics Objectives Compression Encryption Network Communications Decryption Decompression Client site Presentation of Information to client site Multimedia -

More information

CSE 100: BST AVERAGE CASE AND HUFFMAN CODES

CSE 100: BST AVERAGE CASE AND HUFFMAN CODES CSE 100: BST AVERAGE CASE AND HUFFMAN CODES Recap: Average Case Analysis of successful find in a BST N nodes Expected total depth of all BSTs with N nodes Recap: Probability of having i nodes in the left

More information

Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai

Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai Mini-HW 6 Released Due on 11/09 (Thu) 17:20 Homework 2 Due on 11/09 (Thur) 17:20 Midterm Time: 11/16 (Thur) 14:20-17:20 Format: close book

More information

Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions

Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Jon Are Suul Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Develoment of an On-line Frequency-adative Virtual Flux-based Aroach Thesis for the degree of Philosohiae Doctor

More information

COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS

COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS Urbano Tancredi (1), Alfredo Renga (2), and Michele Grassi (3) (1) Deartment for Technologies,

More information

High resolution radar signal detection based on feature analysis

High resolution radar signal detection based on feature analysis Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 4, 6(6):73-77 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 High resolution radar signal detection based on feature

More information

Modeling of power autotransformer

Modeling of power autotransformer Modeling of ower autotransformer VLADMÍR VOLČKO, ŽAETA ELEHOVÁ, ATO BELÁŇ, PETER JAGA, DOMK VGLAŠ, MROLAVA MTKOVÁ Deartment of Electrical Power Engineering lovak niversity of Technology in Bratislava lkovičova,

More information

PROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif

PROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif PROJECT 5: DESIGNING A VOICE MODEM Instructor: Amir Asif CSE4214: Digital Communications (Fall 2012) Computer Science and Engineering, York University 1. PURPOSE In this laboratory project, you will design

More information

Improving Satellite Surveillance through Optimal Assignment of Assets

Improving Satellite Surveillance through Optimal Assignment of Assets Imroving Satellite Surveillance through Otimal Assignment of Assets Claire Rivett and Carmine Pontecorvo Intelligence, Surveillance and Reconnaissance Division Defence Science and Technology Organisation

More information

Module 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains:

Module 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains: The Lecture Contains: The Need for Video Coding Elements of a Video Coding System Elements of Information Theory Symbol Encoding Run-Length Encoding Entropy Encoding file:///d /...Ganesh%20Rana)/MY%20COURSE_Ganesh%20Rana/Prof.%20Sumana%20Gupta/FINAL%20DVSP/lecture%2040/40_1.htm[12/31/2015

More information

CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller

CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY 5. INTRODUCTION The Internal Model Control (IMC) based aroach for PID controller design can be used to control alications in industries. It is because, for ractical

More information

Revisiting Weighted Stego-Image Steganalysis

Revisiting Weighted Stego-Image Steganalysis Revisiting Weighted Stego-Image Steganalysis Andrew D. Ker a and Rainer Böhme b a Oxford University Comuting Laboratory, Parks Road, Oxford OX 3QD, England; b Technische Universität Dresden, Institute

More information

Reliability and Criticality Analysis of Communication Networks by Stochastic Computation

Reliability and Criticality Analysis of Communication Networks by Stochastic Computation > EPLACE HIS LINE WIH YOU PAPE IDENIFICAION NUMBE (DOUBLE-CLICK HEE O EDI) < 1 eliability and Criticality Analysis of Communication Networks by Stochastic Comutation Peican Zhu, Jie Han, Yangming Guo and

More information

COS 226 Algorithms and Data Structures Fall Midterm Exam

COS 226 Algorithms and Data Structures Fall Midterm Exam COS 226 lgorithms and Data Structures Fall 2015 Midterm Exam This exam has 8 questions worth a total of 100 points. You have 80 minutes. The exam is closed book, except that you are allowed to use one

More information

COS 226 Algorithms and Data Structures Fall Midterm Exam

COS 226 Algorithms and Data Structures Fall Midterm Exam COS 226 lgorithms and Data Structures Fall 2015 Midterm Exam You have 80 minutes for this exam. The exam is closed book, except that you are allowed to use one page of notes (8.5-by-11, one side, in your

More information

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices Performance Analysis of Battery Power Management Schemes in Wireless Mobile Devices Balakrishna J Prabhu, A Chockalingam and Vinod Sharma Det of ECE, Indian Institute of Science, Bangalore, INDIA Abstract

More information

Design of PID Controller Based on an Expert System

Design of PID Controller Based on an Expert System International Journal of Comuter, Consumer and Control (IJ3C), Vol. 3, No.1 (014) 31 Design of PID Controller Based on an Exert System Wei Li Abstract For the instability of traditional control systems,

More information

An Overview of Substrate Noise Reduction Techniques

An Overview of Substrate Noise Reduction Techniques An Overview of Substrate Noise Reduction Techniques Shahab Ardalan, and Manoj Sachdev ardalan@ieee.org, msachdev@ece.uwaterloo.ca Deartment of Electrical and Comuter Engineering University of Waterloo

More information

RECOMMENDATION ITU-R SF

RECOMMENDATION ITU-R SF Rec. ITU-R SF.1649-1 1 RECOMMENDATION ITU-R SF.1649-1 Guidance for determination of interference from earth stations on board vessels to stations in the fixed service when the earth station on board vessels

More information

Kaleidoscope modes in large aperture Porro prism resonators

Kaleidoscope modes in large aperture Porro prism resonators Kaleidoscoe modes in large aerture Porro rism resonators Liesl Burger,2,* and Andrew Forbes,2 CSIR National Laser Centre, PO Box 395, Pretoria 000, South Africa 2 School of Physics, University of KwaZulu

More information

A Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks

A Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks Journal of Comuter Science 3 (5: 353-360, 2007 ISSN 1549-3636 2007 Science Publications A Novel Image Comonent Transmission Aroach to Imrove Image Quality and nergy fficiency in Wireless Sensor Networks

More information

Tuning a GPS/IMU Kalman Filter for a Robot Driver

Tuning a GPS/IMU Kalman Filter for a Robot Driver Tuning a GPS/IMU Kalman Filter for a Robot Driver Jamie Bell, Karl A. Stol Deartment of Mechanical ngineering The University of Aucland Private Bag 92019 Aucland 1142 jbel060@ec.aucland.ac.nz Abstract

More information

Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields

Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields AHMED R. SAYED, HUSSEIN I. ANIS Electrical Power and Machine Deartment Cairo University Giza EGYPT eng_ahmed.rabee@eng.cu.edu.eg,

More information

Tarek M. Sobh and Tarek Alameldin

Tarek M. Sobh and Tarek Alameldin Operator/System Communication : An Optimizing Decision Tool Tarek M. Sobh and Tarek Alameldin Department of Computer and Information Science School of Engineering and Applied Science University of Pennsylvania,

More information

Approximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size

Approximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 63, No. 2, 2015 DOI: 10.1515/basts-2015-0046 Aroximated fast estimator for the shae arameter of generalized Gaussian distribution for

More information

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon

More information

Semi Blind Channel Estimation: An Efficient Channel Estimation scheme for MIMO- OFDM System

Semi Blind Channel Estimation: An Efficient Channel Estimation scheme for MIMO- OFDM System Australian Journal of Basic and Alied Sciences, 7(7): 53-538, 03 ISSN 99-878 Semi Blind Channel Estimation: An Efficient Channel Estimation scheme for MIMO- OFDM System Arathi. Devasia, Dr.G. Ramachandra

More information

CSS 343 Data Structures, Algorithms, and Discrete Math II. Balanced Search Trees. Yusuf Pisan

CSS 343 Data Structures, Algorithms, and Discrete Math II. Balanced Search Trees. Yusuf Pisan CSS 343 Data Structures, Algorithms, and Discrete Math II Balanced Search Trees Yusuf Pisan Height Height of a tree impacts how long it takes to find an item Balanced tree O(log n) vs Degenerate tree O(n)

More information