Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e}
|
|
- Dorcas Sheena Parrish
- 6 years ago
- Views:
Transcription
1 Outline efinition of ntroy Three ntroy coding techniques: Huffman coding rithmetic coding Lemel-Ziv coding ntroy oding (taken from the Technion) ntroy ntroy of a set of elements e,,e n with robabilities, n is: n { H i log i ntroy (in our context) - smallest number of bits needed, on the average, to reresent a symbol (the average on all the symbols code lengths). Note: log i is the uncertainty in symbol e i (or the surrise when we see this symbol). ntroy average surrise ssumtion: there are no deendencies between the symbols aearances i 4 efinitions lhabet: finite set containing at least one element: = {a, b, c, d, e} Symbol: n element in the alhabet: s string over the alhabet: sequence of symbols, each of which is an element of that alhabet: ccdabdcaad odeword: sequence of bits reresenting a coded symbol or string: i : The occurrence robability of symbol s i in the inut string. i Åi L i : The length of the codeword of symbol s i in bits. 3
2 ntroy examles ntroy of e, e n is maximized when = = = n =/n Æ H(e,,e n )=log n RV\PROLV HWWHU WKQWKHRWKHURUFRQWLQV PRUHLQIRUPWLRQ k symbols may be reresented by k bits ntroy of, n is minimized when =, = = n = Æ H(e,,e n )= 6 ntroy examle ntroy calculation for a two symbol alhabet. xamle : =.5 =.5 H, log log.5log.5.5log.5 xamle : =.8 =. H, log.8log.8.log. #.79 log It requires one bit er symbol on the average to reresent the data. It requires less than one bit er symbol on the average to reresent the data. How can we code this? 5 ode tyes Fixed-length codes - all codewords have the same length (number of bits),,,,, F Variable-length codes - may give different lengths to codewords ntroy coding ntroy is a lower bound on the average number of bits needed to reresent the symbols (the data comression limit). ntroy coding methods: sire to achieve the entroy for a given alhabet, PSÆntroy code achieving the entroy limit is otimal,,,,, F - PS : bits er symbol PS encoded original message message 8 7
3 Huffman coding ach symbol is assigned a variable-length code, deending on its frequency. The higher its frequency, the shorter the codeword Number of bits for each codeword is an integral number refix code variable-length code Huffman code is the otimal refix and variable-length code, given the symbols robabilities of occurrence odewords are generated by building a Huffman Tree ode tyes (cont.) Prefix code - No codeword is a refix of any other codeword. = ; = ; = ; = Uniquely decodable code - Has only one ossible source string roducing it. Unambigously decoded xamles: Prefix code - the end of a codeword is immediately recognized without ambiguity: Æ Fixed-length code 9 Huffman encoding Huffman tree examle Use the codewords from the revious slide to encode the string : String: ncoded: Number of bits used: 9 The PS is (9 bits/4 symbols) =.5 ntroy: -.5log.5 -.5log.5 -.log. -.5log.5 -.5log.5 =.854 PS is lower than the entroy. WHY? ach codeword is determined according to the ath from the root to the symbol. When decoding, a tree traversal is erformed, starting from the root. Probabilities codewords: xamle: decoding inut ()
4 Huffman encoding uild a table of er-symbol encodings (generated by the Huffman tree). Globally known to both encoder and decoder Sent by encoder, read by decoder ncode one symbol after the other, using the encoding table. ncode the seudo-eof symbol. 4 Huffman tree construction Initialization: Leaf for each symbol x of alhabet with weight=x. Note: One can work with integer weights in the leafs (for examle, number of symbol occurrences) instead of robabilities. while (tree not fully connected) do begin Y, Z Å lowest_root_weights_tree() r Å new_root r->attachsons(y, Z) // attach one via a, the other via a (order not significant) weight(r) = weight(y)+weight(z) 3 Symbol robabilities How are the robabilities known? ounting symbols in inut string o ata must be given in advance o Requires an extra ass on the inut string ata source s distribution is known o ata not necessarily known in advance, but we know its distribution Huffman decoding onstruct decoding tree based on encoding table Read coded message bit-by-bit: Travers the tree to to bottom accordingly. When a leaf is reached, a codeword was found Æ corresonding symbol is decoded Reeat until the seudo-eof symbol is reached. No ambiguities when decoding codewords (refix code) 6 5
5 Huffman ntroy analysis est results (entroy wise) - only when symbols have occurrence robabilities which are negative owers of (i.e. ½, ¼, ). Otherwise, PS > entroy bound. xamle: Symbol Probability odeword ntroy =.75 reresenting robabilities inut stream : ode: PS = (4 bits/8 symbols) =.75 8 Letter F G H I J K L M xamle Global nglish frequencies table: Prob Total:. Letter N O P Q R S T U V W X Y Z Prob Huffman summary Huffman tree construction comlexity chieves entroy when occurrence robabilities are negative owers of lhabet and its distribution must be known in advance Given the Huffman tree, very easy (and fast) to encode and decode Huffman code is not unique (because of some arbitrary decisions in the tree construction) Simle imlementation - o(n ). Using a Priority Queue - o(n log(n)): Inserting a new node o(log(n)) n nodes insertions - o(n log(n)) Retrieving smallest node weights o(log(n)) 9
6 rithmetic coding ssigns one (normally long) codeword to entire inut stream Reads the inut stream symbol by symbol, aending more bits to the codeword each time rithmetic coding odeword is a number, reresenting a segmental subsection based on the symbols robabilities ncodes symbols using a non-integer number of bits Æ very good results (entroy wise) Mathematical definitions xamle L The smallest binary value consistent with a code reresenting the symbols rocessed so far. R The roduct of the robabilities of those symbols L i+ o R i+ R i oding of = =.5, =., = = ny number in this range reresents. L i o
7 rithmetic encoding (cont.) rithmetic encoding Two ossibilities for the encoder to signal to the decoder end of the transmission: Initially L =, R =. When encoding next symbol, L and R are refined. L m L R j i i R m R j. Send initially the number of symbols encoded.. ssign a new OF symbol in the alhabet, with a very small robability, and encode it at the end of the message. Note: The order of the symbols in the alhabet must remain consistent throughout the algorithm. t the end of the message, a binary value between L and L+R will unambiguously secify the inut message. The shortest such binary string is transmitted. In the revious examle: ny number between and 3875 (discard the. ). Shortest number - 386, in binary: PS = (9 bits/4 symbols) = o o rithmetic decoding examle o.375 ecoding of ecoding: rithmetic decoding In order to decode the message, the symbols order and robabilities must be assed to the decoder. The decoding rocess is identical to the encoding. Given the codeword (the final number), at each iteration the corresonding sub-range is entered, decoding the symbol reresenting the secific range o
8 istributions issues rithmetic entroy analysis Until now, symbol distributions were known in advance What haens if they are not known? Inut string not known Huffman and rithmetic odings have an adative version o istributions are udated as the inut string is read o an work online rithmetic coding manages to encode symbols using non integer number of bits! One codeword is assigned to the entire inut stream, instead of a codeword to each individual symbol This allows rithmetic oding to achieve the ntroy lower bound 3 9 Lemel-Ziv concets What if the alhabet is unknown? Lemel-Ziv coding solves this general case, where only a stream of bits is given. LZ creates its own dictionary (strings of bits), and relaces future occurrences of these strings by a shorter osition string: In simle Huffman/rithmetic coding, the deendency between the symbols is ignored, while in the LZ, these deendencies are identified and are exloited to erform better encoding. When all the data is known (alhabet, robabilities, no deendencies), it s best to use Huffman (LZ will try to find deendencies which are not there ) Lemel-Ziv concets 3 3
9 Lemel-Ziv algorithm. Initialize the dictionary to contain an emty string (={ }).. W Å longest block in inut string which aears in. 3. Å first symbol in inut string after W 4. ncode W by its index in the dictionary, followed by 5. dd W+ to the dictionary. 6. Go to Ste. Lemel-Ziv comression Parses source inut (in binary) into the shortest distinct strings: Æ,,,,,, ach string includes a refix and an extra bit ( = + ), therefore encoded as: (refix string lace, extra bit) Requires asses over the inut (one to arse inut, second to encode). an be modified to one ass. omression: (n number of distinct strings) log(n) bits for the refix lace + bit for the added bit Overall n log(n) bits comressed omression comarison omressed to (ercentage): html (5k) Token based ascii file df (69k) inary file (.5k) Random ascii file Lemel-Ziv (unix gzi) % 75% 33% Huffman (unix ack) 65% 95% 8.% (5k) Random ascii file 9% 8.% { =.5, =.5, =.5, =.5} Lemel-Ziv is asymtotically otimal 36 ictionary Index ntry xamle Inut string: W ncoded string: Pairs: (,) (,) (,) (,) (4,) (,) (,) ncoding: 35
10 Probabilities lhabet ata loss Symbols deendency Prerocessing ntroy odewords Intuition omarison Huffman Known in advance Known in advance None Not used Tree building O(n log n) If robabilities are negative owers of One codeword for each symbol Intuitive rithmetic Known in advance Known in advance None Not used None Very close One codeword for all data Not intuitive Lemel-Ziv Not known in advance Not known in advance None Used better comression First ass on data (can be eliminated) est results when alhabet not known odewords for set of alhabet Not intuitive 37
Module 3 Greedy Strategy
Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main
More informationCoding for Efficiency
Let s suppose that, over some channel, we want to transmit text containing only 4 symbols, a, b, c, and d. Further, let s suppose they have a probability of occurrence in any block of text we send as follows
More informationModule 3 Greedy Strategy
Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main
More informationIntroduction to Source Coding
Comm. 52: Communication Theory Lecture 7 Introduction to Source Coding - Requirements of source codes - Huffman Code Length Fixed Length Variable Length Source Code Properties Uniquely Decodable allow
More informationMultimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology
Course Presentation Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology Data Compression Motivation Data storage and transmission cost money Use fewest number of
More informationCommunication Theory II
Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding
More informationLecture5: Lossless Compression Techniques
Fixed to fixed mapping: we encoded source symbols of fixed length into fixed length code sequences Fixed to variable mapping: we encoded source symbols of fixed length into variable length code sequences
More informationComputational Complexity of Generalized Push Fight
Comutational Comlexity of Generalized Push Fight Jeffrey Bosboom Erik D. Demaine Mikhail Rudoy Abstract We analyze the comutational comlexity of otimally laying the two-layer board game Push Fight, generalized
More informationLECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR
1 LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 2 STORAGE SPACE Uncompressed graphics, audio, and video data require substantial storage capacity. Storing uncompressed video is not possible
More informationHuffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley
- A Greedy Algorithm Slides based on Kevin Wayne / Pearson-Addison Wesley Greedy Algorithms Greedy Algorithms Build up solutions in small steps Make local decisions Previous decisions are never reconsidered
More informationEntropy, Coding and Data Compression
Entropy, Coding and Data Compression Data vs. Information yes, not, yes, yes, not not In ASCII, each item is 3 8 = 24 bits of data But if the only possible answers are yes and not, there is only one bit
More informationEvolutionary Circuit Design: Information Theory Perspective on Signal Propagation
Evolutionary Circuit Design: Theory Persective on Signal Proagation Denis Poel Deartment of Comuter Science, Baker University, P.O. 65, Baldwin City, KS 66006, E-mail: oel@ieee.org Nawar Hakeem Deartment
More informationInformation Theory and Huffman Coding
Information Theory and Huffman Coding Consider a typical Digital Communication System: A/D Conversion Sampling and Quantization D/A Conversion Source Encoder Source Decoder bit stream bit stream Channel
More informationEconomics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory
Economics of Strategy (ECON 4550) Maymester 05 Foundations of Game Theory Reading: Game Theory (ECON 4550 Courseak, Page 95) Definitions and Concets: Game Theory study of decision making settings in which
More informationInformation Theory and Communication Optimal Codes
Information Theory and Communication Optimal Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/1 Roadmap Examples and Types of Codes Kraft Inequality
More informationTO IMPROVE BIT ERROR RATE OF TURBO CODED OFDM TRANSMISSION OVER NOISY CHANNEL
TO IMPROVE BIT ERROR RATE OF TURBO CODED TRANSMISSION OVER NOISY CHANNEL 1 M. K. GUPTA, 2 VISHWAS SHARMA. 1 Deartment of Electronic Instrumentation and Control Engineering, Jagannath Guta Institute of
More informationPerformance Analysis of MIMO System using Space Division Multiplexing Algorithms
Performance Analysis of MIMO System using Sace Division Multilexing Algorithms Dr.C.Poongodi 1, Dr D Deea, M. Renuga Devi 3 and N Sasireka 3 1, Professor, Deartment of ECE 3 Assistant Professor, Deartment
More informationA Brief Introduction to Information Theory and Lossless Coding
A Brief Introduction to Information Theory and Lossless Coding 1 INTRODUCTION This document is intended as a guide to students studying 4C8 who have had no prior exposure to information theory. All of
More informationAn Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ
An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ Rong Lin y Koji Nakano z Stehan Olariu x Albert Y. Zomaya Abstract We roose an efficient reconfigurable arallel refix counting
More informationMonday, February 2, Is assigned today. Answers due by noon on Monday, February 9, 2015.
Monday, February 2, 2015 Topics for today Homework #1 Encoding checkers and chess positions Constructing variable-length codes Huffman codes Homework #1 Is assigned today. Answers due by noon on Monday,
More informationAn Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System
RESEARCH ARTICLE OPEN ACCESS An Overview of PAPR Reduction Otimization Algorithm for MC-CDMA System Kanchan Singla*, Rajbir Kaur**, Gagandee Kaur*** *(Deartment of Electronics and Communication, Punjabi
More information# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression
# 2 ECE 253a Digital Image Processing Pamela Cosman /4/ Introductory material for image compression Motivation: Low-resolution color image: 52 52 pixels/color, 24 bits/pixel 3/4 MB 3 2 pixels, 24 bits/pixel
More informationRandom Access Compressed Sensing in Underwater Sensor Networks
Random Access Comressed Sensing in Underwater Sensor Networks Fatemeh Fazel Northeastern University Boston, MA 2115 Email: ffazel@ece.neu.edu Maryam Fazel University of Washington Seattle, WA 98195 Email:
More informationUniversity of Twente
University of Twente Faculty of Electrical Engineering, Mathematics & Comuter Science Design of an audio ower amlifier with a notch in the outut imedance Remco Twelkemeijer MSc. Thesis May 008 Suervisors:
More informationShannon Information Theory
Comm. 5: Communication Theor Lecture Shannon Information Theor -Binar Erasure Channel, Binar Smmetric channel, Channel Caacit, Shannon Caacit Noiseless Channel P P P Noiseless Channel P is the robabilit
More informationContents Maryland High-school Programming Contest 1. 1 Bart s Skateboard Park 2. 2 Simpsons Hidden Talents 3. 3 A Knight and a Queen 4
2008 Maryland High-school Programming Contest 1 Contents 1 Bart s Skateboard Park 2 2 Simsons Hidden Talents 3 3 A Knight and a Queen 4 4 Sorted Trail Ma 6 5 Collecting Forest Wildlife 7 6 Crowded Forest
More informationSolutions to Assignment-2 MOOC-Information Theory
Solutions to Assignment-2 MOOC-Information Theory 1. Which of the following is a prefix-free code? a) 01, 10, 101, 00, 11 b) 0, 11, 01 c) 01, 10, 11, 00 Solution:- The codewords of (a) are not prefix-free
More information1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program.
Combined Error Correcting and Compressing Codes Extended Summary Thomas Wenisch Peter F. Swaszek Augustus K. Uht 1 University of Rhode Island, Kingston RI Submitted to International Symposium on Information
More informationWednesday, February 1, 2017
Wednesday, February 1, 2017 Topics for today Encoding game positions Constructing variable-length codes Huffman codes Encoding Game positions Some programs that play two-player games (e.g., tic-tac-toe,
More informationEfficient Importance Sampling for Monte Carlo Simulation of Multicast Networks
Efficient Imortance Samling for Monte Carlo Simulation of Multicast Networks P. Lassila, J. Karvo and J. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P.O.Box 3000,
More informationLDPC-Coded MIMO Receiver Design Over Unknown Fading Channels
LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels Jun Zheng and Bhaskar D. Rao University of California at San Diego Email: juzheng@ucsd.edu, brao@ece.ucsd.edu Abstract We consider an LDPC-coded
More informationComputational Complexity of Generalized Push Fight
Comutational Comlexity of Generalized Push Fight Jeffrey Bosboom MIT CSAIL, 32 Vassar Street, Cambridge, MA 2139, USA jbosboom@csail.mit.edu Erik D. Demaine MIT CSAIL, 32 Vassar Street, Cambridge, MA 2139,
More informationComputational Complexity of Generalized Push Fight
1 2 3 4 5 6 7 8 9 1 11 12 13 14 15 16 17 18 19 2 21 22 23 24 25 26 Comutational Comlexity of Generalized Push Fight Jeffrey Bosboom MIT CSAIL, 32 Vassar Street, Cambridge, MA 2139, USA jbosboom@csail.mit.edu
More informationSOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON).
SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON). 1. Some easy problems. 1.1. Guessing a number. Someone chose a number x between 1 and N. You are allowed to ask questions: Is this number larger
More informationFAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING
FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING Harman Jot, Rupinder Kaur M.Tech, Department of Electronics and Communication, Punjabi University, Patiala, Punjab, India I. INTRODUCTION
More informationChapter 7 Local Navigation: Obstacle Avoidance
Chater 7 Local Navigation: Obstacle Avoidance A mobile robot must navigate from one oint to another in its environment. This can be a simle task, for examle, if a robot can follow an unobstructed line
More information2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution
2.1. General Purpose There are many popular general purpose lossless compression techniques, that can be applied to any type of data. 2.1.1. Run Length Encoding Run Length Encoding is a compression technique
More informationCOMM901 Source Coding and Compression Winter Semester 2013/2014. Midterm Exam
German University in Cairo - GUC Faculty of Information Engineering & Technology - IET Department of Communication Engineering Dr.-Ing. Heiko Schwarz COMM901 Source Coding and Compression Winter Semester
More informationThe Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network
Send Orders for Rerints to rerints@benthamscienceae 690 The Oen Cybernetics & Systemics Journal, 05, 9, 690-698 Oen Access The Otimization Model and Algorithm for Train Connection at Transfer Stations
More informationInitial Ranging for WiMAX (802.16e) OFDMA
Initial Ranging for WiMAX (80.16e) OFDMA Hisham A. Mahmoud, Huseyin Arslan Mehmet Kemal Ozdemir Electrical Engineering Det., Univ. of South Florida Logus Broadband Wireless Solutions 40 E. Fowler Ave.,
More informationUplink Scheduling in Wireless Networks with Successive Interference Cancellation
1 Ulink Scheduling in Wireless Networks with Successive Interference Cancellation Majid Ghaderi, Member, IEEE, and Mohsen Mollanoori, Student Member, IEEE, Abstract In this aer, we study the roblem of
More informationComm. 502: Communication Theory. Lecture 6. - Introduction to Source Coding
Comm. 50: Communication Theory Lecture 6 - Introduction to Source Coding Digital Communication Systems Source of Information User of Information Source Encoder Source Decoder Channel Encoder Channel Decoder
More information!!"!#$#!%!"""#&#!%!""#&#"%!"# &#!%!# # ##$#!%!"'###&#!%!"(##&#"%!"!#&#!%!""# #!!"!#$#!%)# &#!%*# &#"%(##&#!%!# Base or
/9/ General dea More its and ytes inary umbers & uffman oding!!"#"$%&'()*+,-%$"+).'!/$/$")#'$/',//)/'+,' %/)/'+*'%'/)+-/)+)'%$'%'/"'&%/'%)6' $"-/.'%)6'! /)+-/)%.'&"#$9'-%#)/$"-9'%,#/9'-%9'+&+,9' :,,/)$9';'!!/$/$")#'6//)6'+)'/)+-/)+)'
More informationLab 4: The transformer
ab 4: The transformer EEC 305 July 8 05 Read this lab before your lab eriod and answer the questions marked as relaboratory. You must show your re-laboratory answers to the TA rior to starting the lab.
More informationCHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES
119 CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 5.1 INTRODUCTION In this work the peak powers of the OFDM signal is reduced by applying Adaptive Huffman Codes (AHC). First the encoding
More informationProperties of Mobile Tactical Radio Networks on VHF Bands
Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a
More informationAnalysis of Electronic Circuits with the Signal Flow Graph Method
Circuits and Systems, 207, 8, 26-274 htt://www.scir.org/journal/cs ISSN Online: 253-293 ISSN Print: 253-285 Analysis of Electronic Circuits with the Signal Flow Grah Method Feim Ridvan Rasim, Sebastian
More informationImprovements of Bayesian Matting
Imrovements of Bayesian Matting Mikhail Sindeyev, Vadim Konushin, Vladimir Vezhnevets Deartment of omutational Mathematics and ybernetics, Grahics and Media Lab Moscow State Lomonosov University, Moscow,
More informationHUFFMAN CODING. Catherine Bénéteau and Patrick J. Van Fleet. SACNAS 2009 Mini Course. University of South Florida and University of St.
Catherine Bénéteau and Patrick J. Van Fleet University of South Florida and University of St. Thomas SACNAS 2009 Mini Course WEDNESDAY, 14 OCTOBER, 2009 (1:40-3:00) LECTURE 2 SACNAS 2009 1 / 10 All lecture
More informationPrediction Efficiency in Predictive p-csma/cd
Prediction Efficiency in Predictive -CSMA/CD Mare Miśowicz AGH University of Science and Technology, Deartment of Electronics al. Miciewicza 30, 30-059 Kraów, Poland misow@agh.edu.l Abstract. Predictive
More information6.450: Principles of Digital Communication 1
6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of
More informationBasic Communication Operations (cont.) Alexandre David B2-206
Basic Communication Oerations (cont.) Alexandre David B-06 Today Scatter and Gather (4.4). All-to-All Personalized Communication (4.5). Circular Shift (4.6). Imroving the Seed of Some Communication Oerations
More informationThere are two basic types of FET s: The junction field effect transistor or JFET the metal oxide FET or MOSFET.
Page 61 Field Effect Transistors The Fieldeffect transistor (FET) We know that the biolar junction transistor or BJT is a current controlled device. The FET or field effect transistor is a voltage controlled
More informationFigure 1 7-chip Barker Coded Waveform
3.0 WAVEFOM CODING 3.1 Introduction We now want to loo at waveform coding. We secifically want to loo at hase and frequency coding. Our first exosure to waveform coding was our study of LFM ulses. In that
More informationParameter Controlled by Contrast Enhancement Using Color Image
Parameter Controlled by Contrast Enhancement Using Color Image Raguathi.S and Santhi.K Abstract -The arameter-controlled virtual histogram distribution (PCVHD) method is roosed in this roject to enhance
More informationEXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER
YEDITEPE UNIVERSITY ENGINEERING & ARCHITECTURE FACULTY INDUSTRIAL ELECTRONICS LABORATORY EE 432 INDUSTRIAL ELECTRONICS EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER Introduction:
More informationCompression Waveforms for Non-Coherent Radar
Comression Waveforms for Non-Coherent Radar Uri Peer and Nadav Levanon el Aviv University P. O. Bo 39, el Aviv, 69978 Israel nadav@eng.tau.ac.il Abstract - Non-coherent ulse comression (NCPC) was suggested
More informationIs 1 a Square Modulo p? Is 2?
Chater 21 Is 1 a Square Modulo? Is 2? In the revious chater we took various rimes and looked at the a s that were quadratic residues and the a s that were nonresidues. For examle, we made a table of squares
More informationProduct Accumulate Codes on Fading Channels
Product Accumulate Codes on Fading Channels Krishna R. Narayanan, Jing Li and Costas Georghiades Det of Electrical Engineering Texas A&M University, College Station, TX 77843 Abstract Product accumulate
More informationEscaping from a Labyrinth with One-way Roads for Limited Robots
1 Escaing from a Labyrinth with One-way Roads for Limited Robots Bernd Brüggemann Tom Kamhans Elmar Langetee FKIE, FGAN e.v., Bonn, Germany Institute of Comuter Science I, University of Bonn, Bonn, Germany
More informationDelivery Delay Analysis of Network Coded Wireless Broadcast Schemes
22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National
More informationInvestigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation
International Journal Of Comutational Engineering Research (ijceronline.com) Vol. 2 Issue. Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation Rajbir Kaur 1, Charanjit
More informationChapter 1 INTRODUCTION TO SOURCE CODING AND CHANNEL CODING. Whether a source is analog or digital, a digital communication
1 Chapter 1 INTRODUCTION TO SOURCE CODING AND CHANNEL CODING 1.1 SOURCE CODING Whether a source is analog or digital, a digital communication system is designed to transmit information in digital form.
More informationOptimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm
o Otimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm Nirvana S. Antonio, Cícero F. F. Costa Filho, Marly G. F. Costa, Rafael Padilla Abstract In 4-sided dominoes,
More informationThe Lempel-Ziv (LZ) lossless compression algorithm was developed by Jacob Ziv (AT&T Bell Labs / Technion Israel) and Abraham Lempel (IBM) in 1978;
Georgia Institute of Technology - Georgia Tech Lorraine ECE 6605 Information Theory Lempel-Ziv Lossless Compresion General comments The Lempel-Ziv (LZ) lossless compression algorithm was developed by Jacob
More informationAnalysis of Mean Access Delay in Variable-Window CSMA
Sensors 007, 7, 3535-3559 sensors ISSN 44-80 007 by MDPI www.mdi.org/sensors Full Research Paer Analysis of Mean Access Delay in Variable-Window CSMA Marek Miśkowicz AGH University of Science and Technology,
More informationKeywords: Adaptive genetic algorithm, Call Admission Control (CAC), Code-Division Multiple Access (CDMA), dynamic code assignment
Research Journal of Alied Sciences, Engineering and Technology 7(12): 2545-2553, 2014 DOI:10.19026/rjaset.7.565 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Cor. Submitted: August
More information802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page
VOCAL Technologies, Ltd. Home age 802.b White Paer Table of Contents Page. 802.b Glossary... 2 2. Introduction to 802.b... 3 3. 802.b Overview... 6 4. CCK used in 802.b... 7 5. Walsh and Comlementary Codes
More informationSpiking Neural Networks for Real-Time Infrared Images Processing in Thermo Vision Systems
Siking Neural Networks for Real-Time Infrared Images Processing in Thermo Vision Sstems Snejana Pleshkova Deartment of Telecommunications Technical Universit Kliment Ohridski, 8 Sofia aabbv@tu-sofia.bg
More informationRELIABLE COMMUNICATION IN THE PRESENCE OF LIMITED ADVERSARIES
2 ELIABLE COMMUNICATION IN THE PESENCE OF LIMITED ADVESAIES 3 ME esearch grou: Codes, Codes, Algorithms, Algorithms, Networks: Networks: Design & Otimization for Information Information Theory Theory Zitan
More informationMulti Domain Behavioral Models of Smart-Power ICs for Design Integration in Automotive Applications. Dieter Metzner, Jürgen Schäfer, Chihao Xu
Multi Domain Behavioral Models of Smart-Power ICs for Design Integration in Automotive Alications Dieter Metzner, Jürgen Schäfer, Chihao Xu Infineon Technologies AG P.O. Box 800949, D-81609 München, Germany
More informationTHE HELMHOLTZ RESONATOR TREE
THE HELMHOLTZ RESONATOR TREE Rafael C. D. Paiva and Vesa Välimäki Deartment of Signal Processing and Acoustics Aalto University, School of Electrical Engineering Esoo, Finland rafael.dias.de.aiva@aalto.fi
More informationCompression. Encryption. Decryption. Decompression. Presentation of Information to client site
DOCUMENT Anup Basu Audio Image Video Data Graphics Objectives Compression Encryption Network Communications Decryption Decompression Client site Presentation of Information to client site Multimedia -
More informationCSE 100: BST AVERAGE CASE AND HUFFMAN CODES
CSE 100: BST AVERAGE CASE AND HUFFMAN CODES Recap: Average Case Analysis of successful find in a BST N nodes Expected total depth of all BSTs with N nodes Recap: Probability of having i nodes in the left
More informationSlides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai
Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai Mini-HW 6 Released Due on 11/09 (Thu) 17:20 Homework 2 Due on 11/09 (Thur) 17:20 Midterm Time: 11/16 (Thur) 14:20-17:20 Format: close book
More informationControl of Grid Integrated Voltage Source Converters under Unbalanced Conditions
Jon Are Suul Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Develoment of an On-line Frequency-adative Virtual Flux-based Aroach Thesis for the degree of Philosohiae Doctor
More informationCOMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS
COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS Urbano Tancredi (1), Alfredo Renga (2), and Michele Grassi (3) (1) Deartment for Technologies,
More informationHigh resolution radar signal detection based on feature analysis
Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 4, 6(6):73-77 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 High resolution radar signal detection based on feature
More informationModeling of power autotransformer
Modeling of ower autotransformer VLADMÍR VOLČKO, ŽAETA ELEHOVÁ, ATO BELÁŇ, PETER JAGA, DOMK VGLAŠ, MROLAVA MTKOVÁ Deartment of Electrical Power Engineering lovak niversity of Technology in Bratislava lkovičova,
More informationPROJECT 5: DESIGNING A VOICE MODEM. Instructor: Amir Asif
PROJECT 5: DESIGNING A VOICE MODEM Instructor: Amir Asif CSE4214: Digital Communications (Fall 2012) Computer Science and Engineering, York University 1. PURPOSE In this laboratory project, you will design
More informationImproving Satellite Surveillance through Optimal Assignment of Assets
Imroving Satellite Surveillance through Otimal Assignment of Assets Claire Rivett and Carmine Pontecorvo Intelligence, Surveillance and Reconnaissance Division Defence Science and Technology Organisation
More informationModule 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains:
The Lecture Contains: The Need for Video Coding Elements of a Video Coding System Elements of Information Theory Symbol Encoding Run-Length Encoding Entropy Encoding file:///d /...Ganesh%20Rana)/MY%20COURSE_Ganesh%20Rana/Prof.%20Sumana%20Gupta/FINAL%20DVSP/lecture%2040/40_1.htm[12/31/2015
More informationCHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller
CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY 5. INTRODUCTION The Internal Model Control (IMC) based aroach for PID controller design can be used to control alications in industries. It is because, for ractical
More informationRevisiting Weighted Stego-Image Steganalysis
Revisiting Weighted Stego-Image Steganalysis Andrew D. Ker a and Rainer Böhme b a Oxford University Comuting Laboratory, Parks Road, Oxford OX 3QD, England; b Technische Universität Dresden, Institute
More informationReliability and Criticality Analysis of Communication Networks by Stochastic Computation
> EPLACE HIS LINE WIH YOU PAPE IDENIFICAION NUMBE (DOUBLE-CLICK HEE O EDI) < 1 eliability and Criticality Analysis of Communication Networks by Stochastic Comutation Peican Zhu, Jie Han, Yangming Guo and
More informationCOS 226 Algorithms and Data Structures Fall Midterm Exam
COS 226 lgorithms and Data Structures Fall 2015 Midterm Exam This exam has 8 questions worth a total of 100 points. You have 80 minutes. The exam is closed book, except that you are allowed to use one
More informationCOS 226 Algorithms and Data Structures Fall Midterm Exam
COS 226 lgorithms and Data Structures Fall 2015 Midterm Exam You have 80 minutes for this exam. The exam is closed book, except that you are allowed to use one page of notes (8.5-by-11, one side, in your
More informationPerformance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices
Performance Analysis of Battery Power Management Schemes in Wireless Mobile Devices Balakrishna J Prabhu, A Chockalingam and Vinod Sharma Det of ECE, Indian Institute of Science, Bangalore, INDIA Abstract
More informationDesign of PID Controller Based on an Expert System
International Journal of Comuter, Consumer and Control (IJ3C), Vol. 3, No.1 (014) 31 Design of PID Controller Based on an Exert System Wei Li Abstract For the instability of traditional control systems,
More informationAn Overview of Substrate Noise Reduction Techniques
An Overview of Substrate Noise Reduction Techniques Shahab Ardalan, and Manoj Sachdev ardalan@ieee.org, msachdev@ece.uwaterloo.ca Deartment of Electrical and Comuter Engineering University of Waterloo
More informationRECOMMENDATION ITU-R SF
Rec. ITU-R SF.1649-1 1 RECOMMENDATION ITU-R SF.1649-1 Guidance for determination of interference from earth stations on board vessels to stations in the fixed service when the earth station on board vessels
More informationKaleidoscope modes in large aperture Porro prism resonators
Kaleidoscoe modes in large aerture Porro rism resonators Liesl Burger,2,* and Andrew Forbes,2 CSIR National Laser Centre, PO Box 395, Pretoria 000, South Africa 2 School of Physics, University of KwaZulu
More informationA Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks
Journal of Comuter Science 3 (5: 353-360, 2007 ISSN 1549-3636 2007 Science Publications A Novel Image Comonent Transmission Aroach to Imrove Image Quality and nergy fficiency in Wireless Sensor Networks
More informationTuning a GPS/IMU Kalman Filter for a Robot Driver
Tuning a GPS/IMU Kalman Filter for a Robot Driver Jamie Bell, Karl A. Stol Deartment of Mechanical ngineering The University of Aucland Private Bag 92019 Aucland 1142 jbel060@ec.aucland.ac.nz Abstract
More informationTechnical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields
Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields AHMED R. SAYED, HUSSEIN I. ANIS Electrical Power and Machine Deartment Cairo University Giza EGYPT eng_ahmed.rabee@eng.cu.edu.eg,
More informationTarek M. Sobh and Tarek Alameldin
Operator/System Communication : An Optimizing Decision Tool Tarek M. Sobh and Tarek Alameldin Department of Computer and Information Science School of Engineering and Applied Science University of Pennsylvania,
More informationApproximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 63, No. 2, 2015 DOI: 10.1515/basts-2015-0046 Aroximated fast estimator for the shae arameter of generalized Gaussian distribution for
More informationError Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria
Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon
More informationSemi Blind Channel Estimation: An Efficient Channel Estimation scheme for MIMO- OFDM System
Australian Journal of Basic and Alied Sciences, 7(7): 53-538, 03 ISSN 99-878 Semi Blind Channel Estimation: An Efficient Channel Estimation scheme for MIMO- OFDM System Arathi. Devasia, Dr.G. Ramachandra
More informationCSS 343 Data Structures, Algorithms, and Discrete Math II. Balanced Search Trees. Yusuf Pisan
CSS 343 Data Structures, Algorithms, and Discrete Math II Balanced Search Trees Yusuf Pisan Height Height of a tree impacts how long it takes to find an item Balanced tree O(log n) vs Degenerate tree O(n)
More information