!!"!#$#!%!"""#&#!%!""#&#"%!"# &#!%!# # ##$#!%!"'###&#!%!"(##&#"%!"!#&#!%!""# #!!"!#$#!%)# &#!%*# &#"%(##&#!%!# Base or
|
|
- Morris Walsh
- 6 years ago
- Views:
Transcription
1 /9/ General dea More its and ytes inary umbers & uffman oding!!"#"$%&'()*+,-%$"+).'!/$/$")#'$/',//)/'+,' %/)/'+*'%'/)+-/)+)'%$'%'/"'&%/'%)6' $"-/.'%)6'! /)+-/)%.'&"#$9'-%#)/$"-9'%,#/9'-%9'+&+,9' :,,/)$9';'!!/$/$")#'6//)6'+)'/)+-/)+)'<':$'$/',/:&$' -:$'/'6",/$/.'"$'=%'6/$/$/6'+,')+$>'$/,/'"')+' +$"+)'*+,' +,$%'$/,/ ' // Larry Snyder, S What have we seen digital representations for?! olors W due in a week. Last W before midterm.! Letters! Logical alculations! umbers Positional otation!?")%,@'):-/,9'&"/'6/"-%&'):-/,9':/'!"#$%& '()#)*('' '' '!!"!#$#!%!"""#&#!%!""#&#"%!"##&#!%!# # ##$#!%!" ' ###&#!%!" ( ##&#"%!"! #&#!%!" "# '//$'$%$'$/'%/'"'')+$'D' #!!"!#$#!%)##&#!%*##&#"%(##&#!%!# # ##$#!%( ' #&#!%( ( #&#"%(! #&#!%( " # ase or radix inary umbers! Volunteers? need. in binary is in decimal Larry Snyder, S
2 /9/ More binary numbers lickers: Which one represents different numbers?. vs.. vs.. vs. D. vs. What about other bases for number systems?! index.htm What is binary addition? Let s clicker this logic out! What is the answer? + S... D..
3 /9/ Last week: First guest Lecture! Guest Lecture hursday: Lifelogging & Social Media! Prof. Whittaker's ome Page! esting on invited talks:! o homework on them but possible clicker questions or midterm questions that demonstrate! hat you were there! hat you were paying attention! hat you understood the presentation! ome prepared to ask questions! lickers. Prof. Whittaker Guest Lecture.! he main points of Professor Whittaker s guest lecture included that:. urrent capacity for digital storage make it possible to really do Lifelogging. Lifelogging is ethically and morally wrong and should be stopped. o make Lifelogs useful, all we have to do is just record everything D. ll of the above. one of the above!! lickers. hattyweb and Piccy Web Professor Whittaker s lecture included this graph. lickers What does the graph show?! his table from Prof. Whittaker s guest lecture shows:. est predictor of student s grade was GP coming into the class. ow much you used hatty & Piccy significantly improved your grade.. one of the above. D. ll of the above.. People often remember very little about an arbitrary day.. People who have been wearing a Senseam cannot remember everything.. n interface that combines the information from both the Senseam and GPS makes it possible to remember more about an arbitrary day D. Surprisingly, when we are talking about improving human memory, an interface showing where you went in your day works better than an interface with information from the Senseam.. ll of the above uffman oding: wiki/uffman_coding UF-: ll the alphabets in the world! F)"*+,-'G,%)*+,-%$"+)'+,-%$.''%' %,"%&/J="6$'/)+6")#'$%$'%)',/,//)$' //,@'%,%$/,'")'$/'F)"+6/'K%,%$/,' /$''!,,6 of them!!! '! $$.LL/)M=""/6"%M+,#L=""LFGJ''! FGJ'"'$/'6+-")%)$'%,%$/,'/)+6")#' *+,'$/'+,&6J"6/'/9'%+:)$")#'*+,' -+,/'$%)'%&*'+*'%&&'/'%#/M'! G/'()$/,)/$'P)#")//,")#'G%'+,/'Q(PG',/S:",/'%&&'()$/,)/$',+$++&'$+'"6/)$"*@' $/'/)+6")#':/6'*+,'%,%$/,'6%$%'! G/':+,$/6'%,%$/,'/)+6")#'-:$' ")&:6/'FGJM'
4 /9/ ow many bits for all of Unicode? here are,,6 different Unicode characters. f a fixed bit format (like ascii with its bits) where used, how many bits would you need for each character? (int: = )... D.. oding can be used to do ompression! What is DG?! he conversion of one representation into another! What is MPSS?! hange the representation (digitization) in order to reduce size of data (number of bits needed to represent data)! enefits! educe storage needed! onsider growth of digitized data.! educe transmission cost / latency / bandwidth! When you have a 6K dialup modem, every savings in S counts, SPD! lso consider telephone lines, texting What makes it possible to do ompression?! WDS: When is oding USFUL?! When there is edundancy! ecognize repeating patterns! xploit using! Dictionary! Variable length encoding! When uman perception is less sensitive to some information! an discard less important data ow easy is it to do it?! Depends on data! andom data! hard! xample:!?! rganized data! easy! xample:! "! W DS M?! here is universally best compression algorithm! t depends on how tuned the coding is to the data you have uffman ode: Lossless ompression! Use Variable Length codes based on frequency (like UF does)! pproach! xploit statistical frequency of symbols! What do M by that? W U!!!! LPS when the frequency for different symbols varies widely! Principle! Use fewer bits to represent frequent symbols! Use more bits to represent infrequent symbols uffman ode xample! dog cat cat bird bird bird bird fish Symbol Dog at ird Fish Frequency / / / / riginal ncoding bits bits bits bits uffman ncoding bits bits bit bits! xpected size! riginal! /" + /" + /" + /" = bits / symbol! uffman! /" + /" + /" + /" =. bits / symbol
5 /9/ uffman ode xample uffman ode lgorithm: Data Structures Symbol Dog at ird Fish Frequency / / / / riginal ncoding uffman ncoding bits bits bits bits bits bits bit bits ow many bits are saved using the above uffman coding for the sequence Dog at ird ird ird?... D..! inary (uffman) tree! epresents uffman code! dge! code ( or )! Leaf! symbol! Path to leaf! encoding! xample! =, =, =! Good when???!, less frequent than in messages! Want to efficiently build a binary tree uffman ode lgorithm verview! rder the symbols with least frequent first (will explain)! uild a tree piece by piece! ncoding! alculate frequency of symbols in the message, language! JUS U D DVD Y L UM F SYMLS! reate binary tree representing best encoding! Use binary tree to encode compressed file! For each symbol, output path from root to leaf! Size of encoding = length of path! Save binary tree uffman ode reating ree! lgorithm (ecipe)! Place each symbol in leaf! Weight of leaf = symbol frequency! Select two trees L and (initially leafs)! Such that L, have lowest frequencies in tree! Which L, have the lowest number of occurrences in the message?! reate new (internal) node! Left child! L! ight child!! ew frequency! frequency( L ) + frequency( )! epeat until all nodes merged into one tree uffman ree onstruction uffman ree Step : can first re-order by frequency
6 /9/ uffman ree onstruction uffman ree onstruction uffman ree onstruction uffman oding xample = = = = =! uffman code! nput!! utput! ()()() = = = = = = uffman ode lgorithm verview UP to here was a review of what we did last uesday! Decoding! ead compressed file & binary tree! Use binary tree to decode file! Follow path from root to leaf 6
7 /9/ uffman Decoding uffman Decoding uffman Decoding uffman Decoding uffman Decoding uffman Decoding 6
8 /9/ uffman Decoding uffman ode Properties! Prefix code! o code is a prefix of another code! xample! uffman( dog )!! uffman( cat )! // not legal prefix code! an stop as soon as complete code found! o need for end-of-code marker! ondeterministic! Multiple uffman coding possible for same input! f more than two trees with same minimal weight uffman ode Properties! Greedy algorithm! hooses best local solution at each step! ombines trees with lowest frequency! Still yields overall best solution! ptimal prefix code! ased on statistical frequency! etter compression possible (depends on data)! Using other approaches (e.g., pattern dictionary) uffman oding. nother example. uffman ree xample. Step uffman ree:!! =! =! =! =! =! =
9 /9/ licker: uffman ree: Which nodes can get combined next?. he brown node worth (, ) and the node worth. he node worth and the node worth. he brown node worth (,) and the node worth D. ll of the above uffman ree: uffman ree: Which nodes can get combined next?. he brown node worth (,, ) and the node worth. he brown node worth (,, ) and the node worth. he node worth and the node worth D. ll of the above uffman ree: uffman ree: Which nodes can get combined next?. he brown node worth (,, ) and the node worth. he brown node worth (,, ) and the node worth. he node worth and the node worth D. ll of the above 9
10 /9/ uffman ree: uffman ree: = = = = = = uffman ree: = = = = = =..... uffman ree: = = = = = =..... bits ow many bits would it take to store this message if every letter was represented with the same number of bits? You should first figure out how many bits it takes to represent 6 different values/ letters. = = = = = = uffman ode lgorithm verview! Decoding! ead compressed file & binary tree! Use binary tree to decode file! Follow path from root to leaf! FS XMPL D bits
11 /9/ uffman Decoding uffman Decoding uffman Decoding uffman Decoding uffman Decoding uffman Decoding 6
12 /9/ uffman Decoding DDG: nd example = = = = = = = uffman ode Properties! Prefix code! o code is a prefix of another code! xample! uffman( dog )!! uffman( cat )! // not legal prefix code! an stop as soon as complete code found! o need for end-of-code marker! ondeterministic! Multiple uffman coding possible for same input! f more than two trees with same minimal weight o code is prefix of another = = = = = = DDG: Your turn = = = = = = =? DDG: Your turn... D.. = = = = = = =?
13 /9/ uffman ode Properties! Greedy algorithm! hooses best local solution at each step! ombines trees with lowest frequency! Still yields overall best solution! ptimal prefix code! ased on statistical frequency! etter compression possible (depends on data)! ut needs look ahead, not prefix. omework : Data representations. Logic. inary umbers. S. uffman oding. S s S bits or bits? We use the bit table D'DD' D'D' DD'D' K' ' G' // Lawrence Snyder, S
Lecture5: Lossless Compression Techniques
Fixed to fixed mapping: we encoded source symbols of fixed length into fixed length code sequences Fixed to variable mapping: we encoded source symbols of fixed length into variable length code sequences
More informationModule 3 Greedy Strategy
Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main
More informationModule 3 Greedy Strategy
Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main
More informationHuffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley
- A Greedy Algorithm Slides based on Kevin Wayne / Pearson-Addison Wesley Greedy Algorithms Greedy Algorithms Build up solutions in small steps Make local decisions Previous decisions are never reconsidered
More informationMonday, February 2, Is assigned today. Answers due by noon on Monday, February 9, 2015.
Monday, February 2, 2015 Topics for today Homework #1 Encoding checkers and chess positions Constructing variable-length codes Huffman codes Homework #1 Is assigned today. Answers due by noon on Monday,
More informationLECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR
1 LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 2 STORAGE SPACE Uncompressed graphics, audio, and video data require substantial storage capacity. Storing uncompressed video is not possible
More informationCoding for Efficiency
Let s suppose that, over some channel, we want to transmit text containing only 4 symbols, a, b, c, and d. Further, let s suppose they have a probability of occurrence in any block of text we send as follows
More informationCHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES
119 CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 5.1 INTRODUCTION In this work the peak powers of the OFDM signal is reduced by applying Adaptive Huffman Codes (AHC). First the encoding
More informationInformation Theory and Communication Optimal Codes
Information Theory and Communication Optimal Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/1 Roadmap Examples and Types of Codes Kraft Inequality
More informationFinite State Machines
Administrivia Finite State achines Alvin R. Lebeck PS 4 Week 5, Lecture ext uesday: Rajiv lecture on omputer Arithmetic idterm uesday ctober, in class closed book, closed notes Homework #3 is assigned
More informationWednesday, February 1, 2017
Wednesday, February 1, 2017 Topics for today Encoding game positions Constructing variable-length codes Huffman codes Encoding Game positions Some programs that play two-player games (e.g., tic-tac-toe,
More informationEntropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e}
Outline efinition of ntroy Three ntroy coding techniques: Huffman coding rithmetic coding Lemel-Ziv coding ntroy oding (taken from the Technion) ntroy ntroy of a set of elements e,,e n with robabilities,
More informationComm. 502: Communication Theory. Lecture 6. - Introduction to Source Coding
Comm. 50: Communication Theory Lecture 6 - Introduction to Source Coding Digital Communication Systems Source of Information User of Information Source Encoder Source Decoder Channel Encoder Channel Decoder
More informationCommunication Theory II
Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding
More informationIntroduction to Source Coding
Comm. 52: Communication Theory Lecture 7 Introduction to Source Coding - Requirements of source codes - Huffman Code Length Fixed Length Variable Length Source Code Properties Uniquely Decodable allow
More informationHuffman Coding For Digital Photography
Huffman Coding For Digital Photography Raydhitya Yoseph 13509092 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung, Jl. Ganesha 10 Bandung 40132, Indonesia
More informationMultimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology
Course Presentation Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology Data Compression Motivation Data storage and transmission cost money Use fewest number of
More informationChapter 4: The Building Blocks: Binary Numbers, Boolean Logic, and Gates
Chapter 4: The Building Blocks: Binary Numbers, Boolean Logic, and Gates Objectives In this chapter, you will learn about The binary numbering system Boolean logic and gates Building computer circuits
More informationDigitizing Color. Place Value in a Decimal Number. Place Value in a Binary Number. Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally
Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally Fluency with Information Technology Third Edition by Lawrence Snyder Digitizing Color RGB Colors: Binary Representation Giving the intensities
More informationHUFFMAN CODING. Catherine Bénéteau and Patrick J. Van Fleet. SACNAS 2009 Mini Course. University of South Florida and University of St.
Catherine Bénéteau and Patrick J. Van Fleet University of South Florida and University of St. Thomas SACNAS 2009 Mini Course WEDNESDAY, 14 OCTOBER, 2009 (1:40-3:00) LECTURE 2 SACNAS 2009 1 / 10 All lecture
More information5/17/2009. Digitizing Color. Place Value in a Binary Number. Place Value in a Decimal Number. Place Value in a Binary Number
Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally Digitizing Color Fluency with Information Technology Third Edition by Lawrence Snyder RGB Colors: Binary Representation Giving the intensities
More informationLecture 13 Register Allocation: Coalescing
Lecture 13 Register llocation: Coalescing I. Motivation II. Coalescing Overview III. lgorithms: Simple & Safe lgorithm riggs lgorithm George s lgorithm Phillip. Gibbons 15-745: Register Coalescing 1 Review:
More informationSlides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai
Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai Mini-HW 6 Released Due on 11/09 (Thu) 17:20 Homework 2 Due on 11/09 (Thur) 17:20 Midterm Time: 11/16 (Thur) 14:20-17:20 Format: close book
More informationWhat You ll Learn Today
CS101 Lecture 18: Image Compression Aaron Stevens 21 October 2010 Some material form Wikimedia Commons Special thanks to John Magee and his dog 1 What You ll Learn Today Review: how big are image files?
More information1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program.
Combined Error Correcting and Compressing Codes Extended Summary Thomas Wenisch Peter F. Swaszek Augustus K. Uht 1 University of Rhode Island, Kingston RI Submitted to International Symposium on Information
More informationGreedy Algorithms. Kleinberg and Tardos, Chapter 4
Greedy Algorithms Kleinberg and Tardos, Chapter 4 1 Selecting gas stations Road trip from Fort Collins to Durango on a given route with length L, and fuel stations at positions b i. Fuel capacity = C miles.
More informationCS Lecture 10:
CS 1101101 Lecture 10: Digital Encoding---Representing the world in symbols Review: Analog vs Digital (Symbolic) Information Text encoding: ASCII and Unicode Encoding pictures: Sampling Quantizing Analog
More informationLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative Study Walaa Z. Wahba 1, Ashraf Y. A. Maghari 2 1M.Sc student, Faculty of Information Technology, Islamic university of Gaza, Gaza, Palestine 2Assistant
More information6.004 Computation Structures Spring 2009
MIT OpenCourseWare http://ocw.mit.edu 6.004 Computation Structures Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Welcome to 6.004! Course
More informationA Brief Introduction to Information Theory and Lossless Coding
A Brief Introduction to Information Theory and Lossless Coding 1 INTRODUCTION This document is intended as a guide to students studying 4C8 who have had no prior exposure to information theory. All of
More information# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression
# 2 ECE 253a Digital Image Processing Pamela Cosman /4/ Introductory material for image compression Motivation: Low-resolution color image: 52 52 pixels/color, 24 bits/pixel 3/4 MB 3 2 pixels, 24 bits/pixel
More informationCOMM901 Source Coding and Compression Winter Semester 2013/2014. Midterm Exam
German University in Cairo - GUC Faculty of Information Engineering & Technology - IET Department of Communication Engineering Dr.-Ing. Heiko Schwarz COMM901 Source Coding and Compression Winter Semester
More informationSplay tree concept Splaying operation: double-rotations Splay insertion Splay search Splay deletion Running time of splay tree operations
4.5 Splay trees Splay tree concept Splaying operation: double-rotations Splay insertion Splay search Splay deletion Running time of splay tree operations 43 Splay trees splay tree is a balanced ST built
More informationEntropy, Coding and Data Compression
Entropy, Coding and Data Compression Data vs. Information yes, not, yes, yes, not not In ASCII, each item is 3 8 = 24 bits of data But if the only possible answers are yes and not, there is only one bit
More informationLogic Restructuring Revisited. Glitching in an RCA. Glitching in Static CMOS Networks
Logic Restructuring Revisited Low Power VLSI System Design Lectures 4 & 5: Logic-Level Power Optimization Prof. R. Iris ahar September 8 &, 7 Logic restructuring: hanging the topology of a logic network
More information2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution
2.1. General Purpose There are many popular general purpose lossless compression techniques, that can be applied to any type of data. 2.1.1. Run Length Encoding Run Length Encoding is a compression technique
More informationEENG 444 / ENAS 944 Digital Communication Systems
EENG 444 / ENAS 944 Digital Communication Systems Introduction!! Wenjun Hu Communication Systems What s the first thing that comes to your mind? Communication Systems What s the first thing that comes
More informationImages, Pixels, ART!! Natural Language and Dialogue Systems Lab
Images, Pixels, ART!! Natural Language and Dialogue Systems Lab Compression Examples Tools winzip, pkzip, compress, gzip Formats Images.jpg,.gif Audio.mp3,.wav Video mpeg1 (VCD), mpeg2 (DVD), mpeg4 (Divx)
More informationRecap: Properties of Trees. Rooting an unrooted tree. Questions trees can address: Data for phylogeny reconstruction. Rooted vs unrooted trees:
Pairwise sequence alignment (global and local) Recap: Properties of rees Multiple sequence alignment global local ubstitution matrices atabase ing L equence statistics Leaf nodes contemporary taxa Internal
More informationFundamentals of Data and Signals
Fundamentals of Data and Signals Chapter 2 Learning Objectives After reading this chapter, you should be able to: Distinguish between data and signals and cite the advantages of digital data and signals
More information05/11/2006. Lecture What does a computer do? Logic Manipulation. Data manipulation
5//26 What does a computer do? Logic Manipulation Transistors Digital Logic Computers Computers store and manipulate information Information is represented digitally, as voltages Digital format avoids
More informationSOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON).
SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON). 1. Some easy problems. 1.1. Guessing a number. Someone chose a number x between 1 and N. You are allowed to ask questions: Is this number larger
More informationIntroduc)on to Computer Networks
Introduc)on to Computer Networks COSC 4377 Lecture 20 Spring 2012 April 4, 2012 Announcements HW9 due this week HW10 out HW11 and HW12 coming soon! Student presenta)ons HW9 Capture packets using Wireshark
More informationCOMP219: Artificial Intelligence. Lecture 13: Game Playing
CMP219: Artificial Intelligence Lecture 13: Game Playing 1 verview Last time Search with partial/no observations Belief states Incremental belief state search Determinism vs non-determinism Today We will
More informationArithmetic Circuits. (Part II) Randy H. Katz University of California, Berkeley. Fall Overview BCD Circuits. Combinational Multiplier Circuit
(art II) Randy H. Katz University of alifornia, Berkeley Fall 25 Overview BD ircuits ombinational Multiplier ircuit Design ase tudy: Bit Multiplier equential Multiplier ircuit R.H. Katz Lecture #2: -1
More informationDEVELOPMENT OF LOSSY COMMPRESSION TECHNIQUE FOR IMAGE
DEVELOPMENT OF LOSSY COMMPRESSION TECHNIQUE FOR IMAGE Asst.Prof.Deepti Mahadeshwar,*Prof. V.M.Misra Department of Instrumentation Engineering, Vidyavardhini s College of Engg. And Tech., Vasai Road, *Prof
More informationPulse Code Modulation
Pulse Code Modulation EE 44 Spring Semester Lecture 9 Analog signal Pulse Amplitude Modulation Pulse Width Modulation Pulse Position Modulation Pulse Code Modulation (3-bit coding) 1 Advantages of Digital
More informationModule 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains:
The Lecture Contains: The Need for Video Coding Elements of a Video Coding System Elements of Information Theory Symbol Encoding Run-Length Encoding Entropy Encoding file:///d /...Ganesh%20Rana)/MY%20COURSE_Ganesh%20Rana/Prof.%20Sumana%20Gupta/FINAL%20DVSP/lecture%2040/40_1.htm[12/31/2015
More informationCS 540-2: Introduction to Artificial Intelligence Homework Assignment #2. Assigned: Monday, February 6 Due: Saturday, February 18
CS 540-2: Introduction to Artificial Intelligence Homework Assignment #2 Assigned: Monday, February 6 Due: Saturday, February 18 Hand-In Instructions This assignment includes written problems and programming
More informationMAS160: Signals, Systems & Information for Media Technology. Problem Set 4. DUE: October 20, 2003
MAS160: Signals, Systems & Information for Media Technology Problem Set 4 DUE: October 20, 2003 Instructors: V. Michael Bove, Jr. and Rosalind Picard T.A. Jim McBride Problem 1: Simple Psychoacoustic Masking
More informationCSE 473 Midterm Exam Feb 8, 2018
CSE 473 Midterm Exam Feb 8, 2018 Name: This exam is take home and is due on Wed Feb 14 at 1:30 pm. You can submit it online (see the message board for instructions) or hand it in at the beginning of class.
More information2359 (i.e. 11:59:00 pm) on 4/16/18 via Blackboard
CS 109: Introduction to Computer Science Goodney Spring 2018 Homework Assignment 4 Assigned: 4/2/18 via Blackboard Due: 2359 (i.e. 11:59:00 pm) on 4/16/18 via Blackboard Notes: a. This is the fourth homework
More informationSolutions to Assignment-2 MOOC-Information Theory
Solutions to Assignment-2 MOOC-Information Theory 1. Which of the following is a prefix-free code? a) 01, 10, 101, 00, 11 b) 0, 11, 01 c) 01, 10, 11, 00 Solution:- The codewords of (a) are not prefix-free
More informationEE40 Lecture 35. Prof. Chang-Hasnain. 12/5/07 Reading: Ch 7, Supplementary Reader
EE4 Lecture 35 2/5/7 Reading: Ch 7, Supplementary Reader EE4 all 26 Slide Week 5 OUTLINE Need for Input Controlled Pull-Up CMOS Inverter nalysis CMOS Voltage Transfer Characteristic Combinatorial logic
More informationCopyright 2000 N. AYDIN. All rights reserved. 1
Introduction to igital Prof Nizamettin IN naydin@yildizedutr naydin@ieeeorg ourse Outline igital omputers, Number Systems, rithmetic Operations, ecimal, lphanumeric, and Gray odes 2 inary, Gates, oolean
More informationImages with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information
Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information 1992 2008 R. C. Gonzalez & R. E. Woods For the image in Fig. 8.1(a): 1992 2008 R. C. Gonzalez & R. E. Woods Measuring
More informationA SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES
A SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES Shreya A 1, Ajay B.N 2 M.Tech Scholar Department of Computer Science and Engineering 2 Assitant Professor, Department of Computer Science
More informationActivity. Image Representation
Activity Image Representation Summary Images are everywhere on computers. Some are obvious, like photos on web pages, but others are more subtle: a font is really a collection of images of characters,
More informationTopic 23 Red Black Trees
Topic 23 "People in every direction No words exchanged No time to exchange And all the little ants are marching Red and Black antennas waving" -Ants Marching, Dave Matthew's Band "Welcome to L.A.'s Automated
More informationChapter 8. Representing Multimedia Digitally
Chapter 8 Representing Multimedia Digitally Learning Objectives Explain how RGB color is represented in bytes Explain the difference between bits and binary numbers Change an RGB color by binary addition
More informationIn this project you will learn how to write a Python program telling people all about you. Type the following into the window that appears:
About Me Introduction: In this project you will learn how to write a Python program telling people all about you. Step 1: Saying hello Let s start by writing some text. Activity Checklist Open the blank
More informationLecture 2: Data Representation
Points Addressed in this Lecture Lecture : Data Representation Professor Peter Cheung Department of EEE, Imperial College London What do we mean by data? How can data be represented electronically? What
More informationByte = More common: 8 bits = 1 byte Abbreviation:
Text, Images, Video and Sound ASCII-7 In the early days, a was used, with of 0 s and 1 s, enough for a typical keyboard. The standard was developed by (American Standard Code for Information Interchange)
More information! HW5 now available! ! May do in groups of two.! Review in recitation! No fancy data structures except trie!! Due Monday 11:59 pm
nnouncements acktracking and Game Trees 15-211: Fundamental Data Structures and lgorithms! HW5 now available!! May do in groups of two.! Review in recitation! No fancy data structures except trie!! Due
More informationAN INTRODUCTION TO ERROR CORRECTING CODES Part 2
AN INTRODUCTION TO ERROR CORRECTING CODES Part Jack Keil Wolf ECE 54 C Spring BINARY CONVOLUTIONAL CODES A binary convolutional code is a set of infinite length binary sequences which satisfy a certain
More informationKnow your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder. Matthias Kamuf,
Know your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder Matthias Kamuf, 2009-12-08 Agenda Quick primer on communication and coding The Viterbi algorithm Observations to
More information2004 Denison Spring Programming Contest 1
24 Denison Spring Programming Contest 1 Problem : 4 Square It s been known for over 2 years that every positive integer can be written in the form x 2 + y 2 + z 2 + w 2, for x,y,z,w non-negative integers.
More informationChapter. F2-08DA-2, 8-Channel Analog. In This Chapter...
F--, -hannel nalog Voltage Output hapter In This hapter... Module Specifications Setting the Module Jumpers onnecting the Field Wiring Module Operation Writing the ontrol Program hapter : F--, -hannel
More informationGames we will consider. CS 331: Artificial Intelligence Adversarial Search. What makes games hard? Formal Definition of a Game.
Games we will consider CS 331: rtificial ntelligence dversarial Search Deterministic Discrete states and decisions Finite number of states and decisions Perfect information i.e. fully observable Two agents
More informationFoundations of Distributed Systems: Tree Algorithms
Foundations of Distributed Systems: Tree Algorithms Stefan Schmid @ T-Labs, 2011 Broadcast Why trees? E.g., efficient broadcast, aggregation, routing,... Important trees? E.g., breadth-first trees, minimal
More informationEveryone knows that life is full of mystery. There s a song about it. Would you like us to sing it?
D, veryone knows that life is full of mystery. here s a song about it. Would you like us to sing it? h, sweet mystery of life, at last ve UD you! h, at last ve found the secret of it! ardon me? h. es.
More informationTELECOMMUNICATION SYSTEMS
TELECOMMUNICATION SYSTEMS By Syed Bakhtawar Shah Abid Lecturer in Computer Science 1 MULTIPLEXING An efficient system maximizes the utilization of all resources. Bandwidth is one of the most precious resources
More informationAdding some light to computing. Lawrence Snyder University of Washington, Seattle
Adding some light to computing. Lawrence Snyder University of Washington, Seattle Lawrence Snyder 2004 Recall that the screen (and other video displays) use red- green- blue lights, arranged in an array
More informationMAS.160 / MAS.510 / MAS.511 Signals, Systems and Information for Media Technology Fall 2007
MIT OpenCourseWare http://ocw.mit.edu MAS.160 / MAS.510 / MAS.511 Signals, Systems and Information for Media Technology Fall 2007 For information about citing these materials or our Terms of Use, visit:
More informationDisclaimer. Primer. Agenda. previous work at the EIT Department, activities at Ericsson
Disclaimer Know your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder This presentation is based on my previous work at the EIT Department, and is not connected to current
More informationAlgebra I. Measures of Central Tendency: Mean, Median, Mode & Additional Measures of Data. Slide 1 / 141 Slide 2 / 141. Slide 4 / 141.
Slide 1 / 141 Slide 2 / 141 lgebra I ata & Statistical nalysis 2015-11-25 www.njctl.org Slide 3 / 141 Slide 4 / 141 Table of ontents lick on the topic to go to that section Measures of entral Tendency
More informationSurvey of VLSI Adders
Survey of VLSI Adders Swathy.S 1, Vivin.S 2, Sofia Jenifer.S 3, Sinduja.K 3 1UG Scholar, Dept. of Electronics and Communication Engineering, SNS College of Technology, Coimbatore- 641035, Tamil Nadu, India
More informationCSE 100: BST AVERAGE CASE AND HUFFMAN CODES
CSE 100: BST AVERAGE CASE AND HUFFMAN CODES Recap: Average Case Analysis of successful find in a BST N nodes Expected total depth of all BSTs with N nodes Recap: Probability of having i nodes in the left
More informationCSE 573 Problem Set 1. Answers on 10/17/08
CSE 573 Problem Set. Answers on 0/7/08 Please work on this problem set individually. (Subsequent problem sets may allow group discussion. If any problem doesn t contain enough information for you to answer
More informationChapter 6: Memory: Information and Secret Codes. CS105: Great Insights in Computer Science
Chapter 6: Memory: Information and Secret Codes CS105: Great Insights in Computer Science Overview When we decide how to represent something in bits, there are some competing interests: easily manipulated/processed
More informationLecture 14: Datapath Functional Units Adders
Lecture 14: Datapath Functional Units dders Mark Horowitz omputer Systems Laboratory Stanford University horowitz@stanford.edu MH EE271 Lecture 14 1 Overview Reading W&E 8.2.1 - dders References Hennessy
More information6.450: Principles of Digital Communication 1
6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of
More informationLecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Alex C. Snoeren
Lecture 3: Modulation & Clock Recovery CSE 123: Computer Networks Alex C. Snoeren Lecture 3 Overview Signaling constraints Shannon s Law Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI,
More informationTic-tac-toe. Lars-Henrik Eriksson. Functional Programming 1. Original presentation by Tjark Weber. Lars-Henrik Eriksson (UU) Tic-tac-toe 1 / 23
Lars-Henrik Eriksson Functional Programming 1 Original presentation by Tjark Weber Lars-Henrik Eriksson (UU) Tic-tac-toe 1 / 23 Take-Home Exam Take-Home Exam Lars-Henrik Eriksson (UU) Tic-tac-toe 2 / 23
More informationCHAPTER 2 - DIGITAL DATA REPRESENTATION AND NUMBERING SYSTEMS
CHAPTER 2 - DIGITAL DATA REPRESENTATION AND NUMBERING SYSTEMS INTRODUCTION Digital computers use sequences of binary digits (bits) to represent numbers, letters, special symbols, music, pictures, and videos.
More informationCompression. Encryption. Decryption. Decompression. Presentation of Information to client site
DOCUMENT Anup Basu Audio Image Video Data Graphics Objectives Compression Encryption Network Communications Decryption Decompression Client site Presentation of Information to client site Multimedia -
More informationRhyme Time. Look at that cat! It has a hat!
Rhyme Time hildren love to be silly. When you need a quieter activity, like during a car ride or at the table, play a rhyming game with your child. Start with a simple sentence that ends in a word that
More informationChapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More informationData Representation. "There are 10 kinds of people in the world, those who understand binary numbers, and those who don't."
Data Representation "There are 10 kinds of people in the world, those who understand binary numbers, and those who don't." How Computers See the World There are a number of very common needs for a computer,
More informationPatterns and rules repeating patterns
Patterns and rules repeating patterns We are used to continuing repeated patterns. But what if the pattern rule is in the middle? What strategies can you use to continue these patterns both ways? 1 ontinue
More informationEE 109 Midterm Review
EE 109 Midterm Review 1 2 Number Systems Computer use base 2 (binary) 0 and 1 Humans use base 10 (decimal) 0 to 9 Humans using computers: Base 16 (hexadecimal) 0 to 15 (0 to 9,A,B,C,D,E,F) Base 8 (octal)
More informationECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010)
ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010) Instructor: Kevin Buckley, Tolentine 433a, 610-519-5658 (W), 610-519-4436 (F), buckley@ece.vill.edu,
More informationCS101 Lecture 01: Introduction. What You ll Learn Today
CS101 Lecture 01: Introduction Aaron Stevens (azs@bu.edu) 16 January 2013 What You ll Learn Today What is computer science? What are data and information? What is a computer? What are hardware and software?
More informationELEC3028 (EL334) Digital Transmission
ELEC3028 (EL334) Digital Transmission Half of the unit: Information Theory MODEM (modulator and demodulator) Professor Sheng Chen: Building 53, Room 4005 E-mail: sqc@ecs.soton.ac.uk Lecture notes from:
More informationFrom Shared Memory to Message Passing
From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich
More informationInformation Theory and Huffman Coding
Information Theory and Huffman Coding Consider a typical Digital Communication System: A/D Conversion Sampling and Quantization D/A Conversion Source Encoder Source Decoder bit stream bit stream Channel
More informationFAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING
FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING Harman Jot, Rupinder Kaur M.Tech, Department of Electronics and Communication, Punjabi University, Patiala, Punjab, India I. INTRODUCTION
More informationENGR 4323/5323 Digital and Analog Communication
ENGR 4323/5323 Digital and Analog Communication Chapter 1 Introduction Engineering and Physics University of Central Oklahoma Dr. Mohamed Bingabr Course Materials Textbook: Modern Digital and Analog Communication,
More information: Principles of Automated Reasoning and Decision Making Midterm
16.410-13: Principles of Automated Reasoning and Decision Making Midterm October 20 th, 2003 Name E-mail Note: Budget your time wisely. Some parts of this quiz could take you much longer than others. Move
More informationThe RLC Series Circuit with an AC Source
The R Series ircuit with an A Source Introduction Ohm s law and R circuit labs use a steady current. However, this lab uses a different power supply, which is alternating current (A). The previous electronics
More information