!!"!#$#!%!"""#&#!%!""#&#"%!"# &#!%!# # ##$#!%!"'###&#!%!"(##&#"%!"!#&#!%!""# #!!"!#$#!%)# &#!%*# &#"%(##&#!%!# Base or

Size: px
Start display at page:

Download "!!"!#$#!%!"""#&#!%!""#&#"%!"# &#!%!# # ##$#!%!"'###&#!%!"(##&#"%!"!#&#!%!""# #!!"!#$#!%)# &#!%*# &#"%(##&#!%!# Base or"

Transcription

1 /9/ General dea More its and ytes inary umbers & uffman oding!!"#"$%&'()*+,-%$"+).'!/$/$")#'$/',//)/'+,' %/)/'+*'%'/)+-/)+)'%$'%'/"'&%/'%)6' $"-/.'%)6'! /)+-/)%.'&"#$9'-%#)/$"-9'%,#/9'-%9'+&+,9' :,,/)$9';'!!/$/$")#'6//)6'+)'/)+-/)+)'<':$'$/',/:&$' -:$'/'6",/$/.'"$'=%'6/$/$/6'+,')+$>'$/,/'"')+' +$"+)'*+,' +,$%'$/,/ ' // Larry Snyder, S What have we seen digital representations for?! olors W due in a week. Last W before midterm.! Letters! Logical alculations! umbers Positional otation!?")%,@'):-/,9'&"/'6/"-%&'):-/,9':/'!"#$%& '()#)*('' '' '!!"!#$#!%!"""#&#!%!""#&#"%!"##&#!%!# # ##$#!%!" ' ###&#!%!" ( ##&#"%!"! #&#!%!" "# '//$'$%$'$/'%/'"'')+$'D' #!!"!#$#!%)##&#!%*##&#"%(##&#!%!# # ##$#!%( ' #&#!%( ( #&#"%(! #&#!%( " # ase or radix inary umbers! Volunteers? need. in binary is in decimal Larry Snyder, S

2 /9/ More binary numbers lickers: Which one represents different numbers?. vs.. vs.. vs. D. vs. What about other bases for number systems?! index.htm What is binary addition? Let s clicker this logic out! What is the answer? + S... D..

3 /9/ Last week: First guest Lecture! Guest Lecture hursday: Lifelogging & Social Media! Prof. Whittaker's ome Page! esting on invited talks:! o homework on them but possible clicker questions or midterm questions that demonstrate! hat you were there! hat you were paying attention! hat you understood the presentation! ome prepared to ask questions! lickers. Prof. Whittaker Guest Lecture.! he main points of Professor Whittaker s guest lecture included that:. urrent capacity for digital storage make it possible to really do Lifelogging. Lifelogging is ethically and morally wrong and should be stopped. o make Lifelogs useful, all we have to do is just record everything D. ll of the above. one of the above!! lickers. hattyweb and Piccy Web Professor Whittaker s lecture included this graph. lickers What does the graph show?! his table from Prof. Whittaker s guest lecture shows:. est predictor of student s grade was GP coming into the class. ow much you used hatty & Piccy significantly improved your grade.. one of the above. D. ll of the above.. People often remember very little about an arbitrary day.. People who have been wearing a Senseam cannot remember everything.. n interface that combines the information from both the Senseam and GPS makes it possible to remember more about an arbitrary day D. Surprisingly, when we are talking about improving human memory, an interface showing where you went in your day works better than an interface with information from the Senseam.. ll of the above uffman oding: wiki/uffman_coding UF-: ll the alphabets in the world! F)"*+,-'G,%)*+,-%$"+)'+,-%$.''%' %,"%&/J="6$'/)+6")#'$%$'%)',/,//)$' //,@'%,%$/,'")'$/'F)"+6/'K%,%$/,' /$''!,,6 of them!!! '! $$.LL/)M=""/6"%M+,#L=""LFGJ''! FGJ'"'$/'6+-")%)$'%,%$/,'/)+6")#' *+,'$/'+,&6J"6/'/9'%+:)$")#'*+,' -+,/'$%)'%&*'+*'%&&'/'%#/M'! G/'()$/,)/$'P)#")//,")#'G%'+,/'Q(PG',/S:",/'%&&'()$/,)/$',+$++&'$+'"6/)$"*@' $/'/)+6")#':/6'*+,'%,%$/,'6%$%'! G/':+,$/6'%,%$/,'/)+6")#'-:$' ")&:6/'FGJM'

4 /9/ ow many bits for all of Unicode? here are,,6 different Unicode characters. f a fixed bit format (like ascii with its bits) where used, how many bits would you need for each character? (int: = )... D.. oding can be used to do ompression! What is DG?! he conversion of one representation into another! What is MPSS?! hange the representation (digitization) in order to reduce size of data (number of bits needed to represent data)! enefits! educe storage needed! onsider growth of digitized data.! educe transmission cost / latency / bandwidth! When you have a 6K dialup modem, every savings in S counts, SPD! lso consider telephone lines, texting What makes it possible to do ompression?! WDS: When is oding USFUL?! When there is edundancy! ecognize repeating patterns! xploit using! Dictionary! Variable length encoding! When uman perception is less sensitive to some information! an discard less important data ow easy is it to do it?! Depends on data! andom data! hard! xample:!?! rganized data! easy! xample:! "! W DS M?! here is universally best compression algorithm! t depends on how tuned the coding is to the data you have uffman ode: Lossless ompression! Use Variable Length codes based on frequency (like UF does)! pproach! xploit statistical frequency of symbols! What do M by that? W U!!!! LPS when the frequency for different symbols varies widely! Principle! Use fewer bits to represent frequent symbols! Use more bits to represent infrequent symbols uffman ode xample! dog cat cat bird bird bird bird fish Symbol Dog at ird Fish Frequency / / / / riginal ncoding bits bits bits bits uffman ncoding bits bits bit bits! xpected size! riginal! /" + /" + /" + /" = bits / symbol! uffman! /" + /" + /" + /" =. bits / symbol

5 /9/ uffman ode xample uffman ode lgorithm: Data Structures Symbol Dog at ird Fish Frequency / / / / riginal ncoding uffman ncoding bits bits bits bits bits bits bit bits ow many bits are saved using the above uffman coding for the sequence Dog at ird ird ird?... D..! inary (uffman) tree! epresents uffman code! dge! code ( or )! Leaf! symbol! Path to leaf! encoding! xample! =, =, =! Good when???!, less frequent than in messages! Want to efficiently build a binary tree uffman ode lgorithm verview! rder the symbols with least frequent first (will explain)! uild a tree piece by piece! ncoding! alculate frequency of symbols in the message, language! JUS U D DVD Y L UM F SYMLS! reate binary tree representing best encoding! Use binary tree to encode compressed file! For each symbol, output path from root to leaf! Size of encoding = length of path! Save binary tree uffman ode reating ree! lgorithm (ecipe)! Place each symbol in leaf! Weight of leaf = symbol frequency! Select two trees L and (initially leafs)! Such that L, have lowest frequencies in tree! Which L, have the lowest number of occurrences in the message?! reate new (internal) node! Left child! L! ight child!! ew frequency! frequency( L ) + frequency( )! epeat until all nodes merged into one tree uffman ree onstruction uffman ree Step : can first re-order by frequency

6 /9/ uffman ree onstruction uffman ree onstruction uffman ree onstruction uffman oding xample = = = = =! uffman code! nput!! utput! ()()() = = = = = = uffman ode lgorithm verview UP to here was a review of what we did last uesday! Decoding! ead compressed file & binary tree! Use binary tree to decode file! Follow path from root to leaf 6

7 /9/ uffman Decoding uffman Decoding uffman Decoding uffman Decoding uffman Decoding uffman Decoding 6

8 /9/ uffman Decoding uffman ode Properties! Prefix code! o code is a prefix of another code! xample! uffman( dog )!! uffman( cat )! // not legal prefix code! an stop as soon as complete code found! o need for end-of-code marker! ondeterministic! Multiple uffman coding possible for same input! f more than two trees with same minimal weight uffman ode Properties! Greedy algorithm! hooses best local solution at each step! ombines trees with lowest frequency! Still yields overall best solution! ptimal prefix code! ased on statistical frequency! etter compression possible (depends on data)! Using other approaches (e.g., pattern dictionary) uffman oding. nother example. uffman ree xample. Step uffman ree:!! =! =! =! =! =! =

9 /9/ licker: uffman ree: Which nodes can get combined next?. he brown node worth (, ) and the node worth. he node worth and the node worth. he brown node worth (,) and the node worth D. ll of the above uffman ree: uffman ree: Which nodes can get combined next?. he brown node worth (,, ) and the node worth. he brown node worth (,, ) and the node worth. he node worth and the node worth D. ll of the above uffman ree: uffman ree: Which nodes can get combined next?. he brown node worth (,, ) and the node worth. he brown node worth (,, ) and the node worth. he node worth and the node worth D. ll of the above 9

10 /9/ uffman ree: uffman ree: = = = = = = uffman ree: = = = = = =..... uffman ree: = = = = = =..... bits ow many bits would it take to store this message if every letter was represented with the same number of bits? You should first figure out how many bits it takes to represent 6 different values/ letters. = = = = = = uffman ode lgorithm verview! Decoding! ead compressed file & binary tree! Use binary tree to decode file! Follow path from root to leaf! FS XMPL D bits

11 /9/ uffman Decoding uffman Decoding uffman Decoding uffman Decoding uffman Decoding uffman Decoding 6

12 /9/ uffman Decoding DDG: nd example = = = = = = = uffman ode Properties! Prefix code! o code is a prefix of another code! xample! uffman( dog )!! uffman( cat )! // not legal prefix code! an stop as soon as complete code found! o need for end-of-code marker! ondeterministic! Multiple uffman coding possible for same input! f more than two trees with same minimal weight o code is prefix of another = = = = = = DDG: Your turn = = = = = = =? DDG: Your turn... D.. = = = = = = =?

13 /9/ uffman ode Properties! Greedy algorithm! hooses best local solution at each step! ombines trees with lowest frequency! Still yields overall best solution! ptimal prefix code! ased on statistical frequency! etter compression possible (depends on data)! ut needs look ahead, not prefix. omework : Data representations. Logic. inary umbers. S. uffman oding. S s S bits or bits? We use the bit table D'DD' D'D' DD'D' K' ' G' // Lawrence Snyder, S

Lecture5: Lossless Compression Techniques

Lecture5: Lossless Compression Techniques Fixed to fixed mapping: we encoded source symbols of fixed length into fixed length code sequences Fixed to variable mapping: we encoded source symbols of fixed length into variable length code sequences

More information

Module 3 Greedy Strategy

Module 3 Greedy Strategy Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main

More information

Module 3 Greedy Strategy

Module 3 Greedy Strategy Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main

More information

Huffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley

Huffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley - A Greedy Algorithm Slides based on Kevin Wayne / Pearson-Addison Wesley Greedy Algorithms Greedy Algorithms Build up solutions in small steps Make local decisions Previous decisions are never reconsidered

More information

Monday, February 2, Is assigned today. Answers due by noon on Monday, February 9, 2015.

Monday, February 2, Is assigned today. Answers due by noon on Monday, February 9, 2015. Monday, February 2, 2015 Topics for today Homework #1 Encoding checkers and chess positions Constructing variable-length codes Huffman codes Homework #1 Is assigned today. Answers due by noon on Monday,

More information

LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR

LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 1 LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 2 STORAGE SPACE Uncompressed graphics, audio, and video data require substantial storage capacity. Storing uncompressed video is not possible

More information

Coding for Efficiency

Coding for Efficiency Let s suppose that, over some channel, we want to transmit text containing only 4 symbols, a, b, c, and d. Further, let s suppose they have a probability of occurrence in any block of text we send as follows

More information

CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES

CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 119 CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 5.1 INTRODUCTION In this work the peak powers of the OFDM signal is reduced by applying Adaptive Huffman Codes (AHC). First the encoding

More information

Information Theory and Communication Optimal Codes

Information Theory and Communication Optimal Codes Information Theory and Communication Optimal Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/1 Roadmap Examples and Types of Codes Kraft Inequality

More information

Finite State Machines

Finite State Machines Administrivia Finite State achines Alvin R. Lebeck PS 4 Week 5, Lecture ext uesday: Rajiv lecture on omputer Arithmetic idterm uesday ctober, in class closed book, closed notes Homework #3 is assigned

More information

Wednesday, February 1, 2017

Wednesday, February 1, 2017 Wednesday, February 1, 2017 Topics for today Encoding game positions Constructing variable-length codes Huffman codes Encoding Game positions Some programs that play two-player games (e.g., tic-tac-toe,

More information

Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e}

Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e} Outline efinition of ntroy Three ntroy coding techniques: Huffman coding rithmetic coding Lemel-Ziv coding ntroy oding (taken from the Technion) ntroy ntroy of a set of elements e,,e n with robabilities,

More information

Comm. 502: Communication Theory. Lecture 6. - Introduction to Source Coding

Comm. 502: Communication Theory. Lecture 6. - Introduction to Source Coding Comm. 50: Communication Theory Lecture 6 - Introduction to Source Coding Digital Communication Systems Source of Information User of Information Source Encoder Source Decoder Channel Encoder Channel Decoder

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding

More information

Introduction to Source Coding

Introduction to Source Coding Comm. 52: Communication Theory Lecture 7 Introduction to Source Coding - Requirements of source codes - Huffman Code Length Fixed Length Variable Length Source Code Properties Uniquely Decodable allow

More information

Huffman Coding For Digital Photography

Huffman Coding For Digital Photography Huffman Coding For Digital Photography Raydhitya Yoseph 13509092 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung, Jl. Ganesha 10 Bandung 40132, Indonesia

More information

Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology

Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology Course Presentation Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology Data Compression Motivation Data storage and transmission cost money Use fewest number of

More information

Chapter 4: The Building Blocks: Binary Numbers, Boolean Logic, and Gates

Chapter 4: The Building Blocks: Binary Numbers, Boolean Logic, and Gates Chapter 4: The Building Blocks: Binary Numbers, Boolean Logic, and Gates Objectives In this chapter, you will learn about The binary numbering system Boolean logic and gates Building computer circuits

More information

Digitizing Color. Place Value in a Decimal Number. Place Value in a Binary Number. Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally

Digitizing Color. Place Value in a Decimal Number. Place Value in a Binary Number. Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally Fluency with Information Technology Third Edition by Lawrence Snyder Digitizing Color RGB Colors: Binary Representation Giving the intensities

More information

HUFFMAN CODING. Catherine Bénéteau and Patrick J. Van Fleet. SACNAS 2009 Mini Course. University of South Florida and University of St.

HUFFMAN CODING. Catherine Bénéteau and Patrick J. Van Fleet. SACNAS 2009 Mini Course. University of South Florida and University of St. Catherine Bénéteau and Patrick J. Van Fleet University of South Florida and University of St. Thomas SACNAS 2009 Mini Course WEDNESDAY, 14 OCTOBER, 2009 (1:40-3:00) LECTURE 2 SACNAS 2009 1 / 10 All lecture

More information

5/17/2009. Digitizing Color. Place Value in a Binary Number. Place Value in a Decimal Number. Place Value in a Binary Number

5/17/2009. Digitizing Color. Place Value in a Binary Number. Place Value in a Decimal Number. Place Value in a Binary Number Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally Digitizing Color Fluency with Information Technology Third Edition by Lawrence Snyder RGB Colors: Binary Representation Giving the intensities

More information

Lecture 13 Register Allocation: Coalescing

Lecture 13 Register Allocation: Coalescing Lecture 13 Register llocation: Coalescing I. Motivation II. Coalescing Overview III. lgorithms: Simple & Safe lgorithm riggs lgorithm George s lgorithm Phillip. Gibbons 15-745: Register Coalescing 1 Review:

More information

Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai

Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai Mini-HW 6 Released Due on 11/09 (Thu) 17:20 Homework 2 Due on 11/09 (Thur) 17:20 Midterm Time: 11/16 (Thur) 14:20-17:20 Format: close book

More information

What You ll Learn Today

What You ll Learn Today CS101 Lecture 18: Image Compression Aaron Stevens 21 October 2010 Some material form Wikimedia Commons Special thanks to John Magee and his dog 1 What You ll Learn Today Review: how big are image files?

More information

1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program.

1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program. Combined Error Correcting and Compressing Codes Extended Summary Thomas Wenisch Peter F. Swaszek Augustus K. Uht 1 University of Rhode Island, Kingston RI Submitted to International Symposium on Information

More information

Greedy Algorithms. Kleinberg and Tardos, Chapter 4

Greedy Algorithms. Kleinberg and Tardos, Chapter 4 Greedy Algorithms Kleinberg and Tardos, Chapter 4 1 Selecting gas stations Road trip from Fort Collins to Durango on a given route with length L, and fuel stations at positions b i. Fuel capacity = C miles.

More information

CS Lecture 10:

CS Lecture 10: CS 1101101 Lecture 10: Digital Encoding---Representing the world in symbols Review: Analog vs Digital (Symbolic) Information Text encoding: ASCII and Unicode Encoding pictures: Sampling Quantizing Analog

More information

Lossless Image Compression Techniques Comparative Study

Lossless Image Compression Techniques Comparative Study Lossless Image Compression Techniques Comparative Study Walaa Z. Wahba 1, Ashraf Y. A. Maghari 2 1M.Sc student, Faculty of Information Technology, Islamic university of Gaza, Gaza, Palestine 2Assistant

More information

6.004 Computation Structures Spring 2009

6.004 Computation Structures Spring 2009 MIT OpenCourseWare http://ocw.mit.edu 6.004 Computation Structures Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Welcome to 6.004! Course

More information

A Brief Introduction to Information Theory and Lossless Coding

A Brief Introduction to Information Theory and Lossless Coding A Brief Introduction to Information Theory and Lossless Coding 1 INTRODUCTION This document is intended as a guide to students studying 4C8 who have had no prior exposure to information theory. All of

More information

# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression

# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression # 2 ECE 253a Digital Image Processing Pamela Cosman /4/ Introductory material for image compression Motivation: Low-resolution color image: 52 52 pixels/color, 24 bits/pixel 3/4 MB 3 2 pixels, 24 bits/pixel

More information

COMM901 Source Coding and Compression Winter Semester 2013/2014. Midterm Exam

COMM901 Source Coding and Compression Winter Semester 2013/2014. Midterm Exam German University in Cairo - GUC Faculty of Information Engineering & Technology - IET Department of Communication Engineering Dr.-Ing. Heiko Schwarz COMM901 Source Coding and Compression Winter Semester

More information

Splay tree concept Splaying operation: double-rotations Splay insertion Splay search Splay deletion Running time of splay tree operations

Splay tree concept Splaying operation: double-rotations Splay insertion Splay search Splay deletion Running time of splay tree operations 4.5 Splay trees Splay tree concept Splaying operation: double-rotations Splay insertion Splay search Splay deletion Running time of splay tree operations 43 Splay trees splay tree is a balanced ST built

More information

Entropy, Coding and Data Compression

Entropy, Coding and Data Compression Entropy, Coding and Data Compression Data vs. Information yes, not, yes, yes, not not In ASCII, each item is 3 8 = 24 bits of data But if the only possible answers are yes and not, there is only one bit

More information

Logic Restructuring Revisited. Glitching in an RCA. Glitching in Static CMOS Networks

Logic Restructuring Revisited. Glitching in an RCA. Glitching in Static CMOS Networks Logic Restructuring Revisited Low Power VLSI System Design Lectures 4 & 5: Logic-Level Power Optimization Prof. R. Iris ahar September 8 &, 7 Logic restructuring: hanging the topology of a logic network

More information

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution 2.1. General Purpose There are many popular general purpose lossless compression techniques, that can be applied to any type of data. 2.1.1. Run Length Encoding Run Length Encoding is a compression technique

More information

EENG 444 / ENAS 944 Digital Communication Systems

EENG 444 / ENAS 944 Digital Communication Systems EENG 444 / ENAS 944 Digital Communication Systems Introduction!! Wenjun Hu Communication Systems What s the first thing that comes to your mind? Communication Systems What s the first thing that comes

More information

Images, Pixels, ART!! Natural Language and Dialogue Systems Lab

Images, Pixels, ART!! Natural Language and Dialogue Systems Lab Images, Pixels, ART!! Natural Language and Dialogue Systems Lab Compression Examples Tools winzip, pkzip, compress, gzip Formats Images.jpg,.gif Audio.mp3,.wav Video mpeg1 (VCD), mpeg2 (DVD), mpeg4 (Divx)

More information

Recap: Properties of Trees. Rooting an unrooted tree. Questions trees can address: Data for phylogeny reconstruction. Rooted vs unrooted trees:

Recap: Properties of Trees. Rooting an unrooted tree. Questions trees can address: Data for phylogeny reconstruction. Rooted vs unrooted trees: Pairwise sequence alignment (global and local) Recap: Properties of rees Multiple sequence alignment global local ubstitution matrices atabase ing L equence statistics Leaf nodes contemporary taxa Internal

More information

Fundamentals of Data and Signals

Fundamentals of Data and Signals Fundamentals of Data and Signals Chapter 2 Learning Objectives After reading this chapter, you should be able to: Distinguish between data and signals and cite the advantages of digital data and signals

More information

05/11/2006. Lecture What does a computer do? Logic Manipulation. Data manipulation

05/11/2006. Lecture What does a computer do? Logic Manipulation. Data manipulation 5//26 What does a computer do? Logic Manipulation Transistors Digital Logic Computers Computers store and manipulate information Information is represented digitally, as voltages Digital format avoids

More information

SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON).

SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON). SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON). 1. Some easy problems. 1.1. Guessing a number. Someone chose a number x between 1 and N. You are allowed to ask questions: Is this number larger

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 20 Spring 2012 April 4, 2012 Announcements HW9 due this week HW10 out HW11 and HW12 coming soon! Student presenta)ons HW9 Capture packets using Wireshark

More information

COMP219: Artificial Intelligence. Lecture 13: Game Playing

COMP219: Artificial Intelligence. Lecture 13: Game Playing CMP219: Artificial Intelligence Lecture 13: Game Playing 1 verview Last time Search with partial/no observations Belief states Incremental belief state search Determinism vs non-determinism Today We will

More information

Arithmetic Circuits. (Part II) Randy H. Katz University of California, Berkeley. Fall Overview BCD Circuits. Combinational Multiplier Circuit

Arithmetic Circuits. (Part II) Randy H. Katz University of California, Berkeley. Fall Overview BCD Circuits. Combinational Multiplier Circuit (art II) Randy H. Katz University of alifornia, Berkeley Fall 25 Overview BD ircuits ombinational Multiplier ircuit Design ase tudy: Bit Multiplier equential Multiplier ircuit R.H. Katz Lecture #2: -1

More information

DEVELOPMENT OF LOSSY COMMPRESSION TECHNIQUE FOR IMAGE

DEVELOPMENT OF LOSSY COMMPRESSION TECHNIQUE FOR IMAGE DEVELOPMENT OF LOSSY COMMPRESSION TECHNIQUE FOR IMAGE Asst.Prof.Deepti Mahadeshwar,*Prof. V.M.Misra Department of Instrumentation Engineering, Vidyavardhini s College of Engg. And Tech., Vasai Road, *Prof

More information

Pulse Code Modulation

Pulse Code Modulation Pulse Code Modulation EE 44 Spring Semester Lecture 9 Analog signal Pulse Amplitude Modulation Pulse Width Modulation Pulse Position Modulation Pulse Code Modulation (3-bit coding) 1 Advantages of Digital

More information

Module 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains:

Module 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains: The Lecture Contains: The Need for Video Coding Elements of a Video Coding System Elements of Information Theory Symbol Encoding Run-Length Encoding Entropy Encoding file:///d /...Ganesh%20Rana)/MY%20COURSE_Ganesh%20Rana/Prof.%20Sumana%20Gupta/FINAL%20DVSP/lecture%2040/40_1.htm[12/31/2015

More information

CS 540-2: Introduction to Artificial Intelligence Homework Assignment #2. Assigned: Monday, February 6 Due: Saturday, February 18

CS 540-2: Introduction to Artificial Intelligence Homework Assignment #2. Assigned: Monday, February 6 Due: Saturday, February 18 CS 540-2: Introduction to Artificial Intelligence Homework Assignment #2 Assigned: Monday, February 6 Due: Saturday, February 18 Hand-In Instructions This assignment includes written problems and programming

More information

MAS160: Signals, Systems & Information for Media Technology. Problem Set 4. DUE: October 20, 2003

MAS160: Signals, Systems & Information for Media Technology. Problem Set 4. DUE: October 20, 2003 MAS160: Signals, Systems & Information for Media Technology Problem Set 4 DUE: October 20, 2003 Instructors: V. Michael Bove, Jr. and Rosalind Picard T.A. Jim McBride Problem 1: Simple Psychoacoustic Masking

More information

CSE 473 Midterm Exam Feb 8, 2018

CSE 473 Midterm Exam Feb 8, 2018 CSE 473 Midterm Exam Feb 8, 2018 Name: This exam is take home and is due on Wed Feb 14 at 1:30 pm. You can submit it online (see the message board for instructions) or hand it in at the beginning of class.

More information

2359 (i.e. 11:59:00 pm) on 4/16/18 via Blackboard

2359 (i.e. 11:59:00 pm) on 4/16/18 via Blackboard CS 109: Introduction to Computer Science Goodney Spring 2018 Homework Assignment 4 Assigned: 4/2/18 via Blackboard Due: 2359 (i.e. 11:59:00 pm) on 4/16/18 via Blackboard Notes: a. This is the fourth homework

More information

Solutions to Assignment-2 MOOC-Information Theory

Solutions to Assignment-2 MOOC-Information Theory Solutions to Assignment-2 MOOC-Information Theory 1. Which of the following is a prefix-free code? a) 01, 10, 101, 00, 11 b) 0, 11, 01 c) 01, 10, 11, 00 Solution:- The codewords of (a) are not prefix-free

More information

EE40 Lecture 35. Prof. Chang-Hasnain. 12/5/07 Reading: Ch 7, Supplementary Reader

EE40 Lecture 35. Prof. Chang-Hasnain. 12/5/07 Reading: Ch 7, Supplementary Reader EE4 Lecture 35 2/5/7 Reading: Ch 7, Supplementary Reader EE4 all 26 Slide Week 5 OUTLINE Need for Input Controlled Pull-Up CMOS Inverter nalysis CMOS Voltage Transfer Characteristic Combinatorial logic

More information

Copyright 2000 N. AYDIN. All rights reserved. 1

Copyright 2000 N. AYDIN. All rights reserved. 1 Introduction to igital Prof Nizamettin IN naydin@yildizedutr naydin@ieeeorg ourse Outline igital omputers, Number Systems, rithmetic Operations, ecimal, lphanumeric, and Gray odes 2 inary, Gates, oolean

More information

Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information

Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information 1992 2008 R. C. Gonzalez & R. E. Woods For the image in Fig. 8.1(a): 1992 2008 R. C. Gonzalez & R. E. Woods Measuring

More information

A SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES

A SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES A SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES Shreya A 1, Ajay B.N 2 M.Tech Scholar Department of Computer Science and Engineering 2 Assitant Professor, Department of Computer Science

More information

Activity. Image Representation

Activity. Image Representation Activity Image Representation Summary Images are everywhere on computers. Some are obvious, like photos on web pages, but others are more subtle: a font is really a collection of images of characters,

More information

Topic 23 Red Black Trees

Topic 23 Red Black Trees Topic 23 "People in every direction No words exchanged No time to exchange And all the little ants are marching Red and Black antennas waving" -Ants Marching, Dave Matthew's Band "Welcome to L.A.'s Automated

More information

Chapter 8. Representing Multimedia Digitally

Chapter 8. Representing Multimedia Digitally Chapter 8 Representing Multimedia Digitally Learning Objectives Explain how RGB color is represented in bytes Explain the difference between bits and binary numbers Change an RGB color by binary addition

More information

In this project you will learn how to write a Python program telling people all about you. Type the following into the window that appears:

In this project you will learn how to write a Python program telling people all about you. Type the following into the window that appears: About Me Introduction: In this project you will learn how to write a Python program telling people all about you. Step 1: Saying hello Let s start by writing some text. Activity Checklist Open the blank

More information

Lecture 2: Data Representation

Lecture 2: Data Representation Points Addressed in this Lecture Lecture : Data Representation Professor Peter Cheung Department of EEE, Imperial College London What do we mean by data? How can data be represented electronically? What

More information

Byte = More common: 8 bits = 1 byte Abbreviation:

Byte = More common: 8 bits = 1 byte Abbreviation: Text, Images, Video and Sound ASCII-7 In the early days, a was used, with of 0 s and 1 s, enough for a typical keyboard. The standard was developed by (American Standard Code for Information Interchange)

More information

! HW5 now available! ! May do in groups of two.! Review in recitation! No fancy data structures except trie!! Due Monday 11:59 pm

! HW5 now available! ! May do in groups of two.! Review in recitation! No fancy data structures except trie!! Due Monday 11:59 pm nnouncements acktracking and Game Trees 15-211: Fundamental Data Structures and lgorithms! HW5 now available!! May do in groups of two.! Review in recitation! No fancy data structures except trie!! Due

More information

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2 AN INTRODUCTION TO ERROR CORRECTING CODES Part Jack Keil Wolf ECE 54 C Spring BINARY CONVOLUTIONAL CODES A binary convolutional code is a set of infinite length binary sequences which satisfy a certain

More information

Know your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder. Matthias Kamuf,

Know your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder. Matthias Kamuf, Know your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder Matthias Kamuf, 2009-12-08 Agenda Quick primer on communication and coding The Viterbi algorithm Observations to

More information

2004 Denison Spring Programming Contest 1

2004 Denison Spring Programming Contest 1 24 Denison Spring Programming Contest 1 Problem : 4 Square It s been known for over 2 years that every positive integer can be written in the form x 2 + y 2 + z 2 + w 2, for x,y,z,w non-negative integers.

More information

Chapter. F2-08DA-2, 8-Channel Analog. In This Chapter...

Chapter. F2-08DA-2, 8-Channel Analog. In This Chapter... F--, -hannel nalog Voltage Output hapter In This hapter... Module Specifications Setting the Module Jumpers onnecting the Field Wiring Module Operation Writing the ontrol Program hapter : F--, -hannel

More information

Games we will consider. CS 331: Artificial Intelligence Adversarial Search. What makes games hard? Formal Definition of a Game.

Games we will consider. CS 331: Artificial Intelligence Adversarial Search. What makes games hard? Formal Definition of a Game. Games we will consider CS 331: rtificial ntelligence dversarial Search Deterministic Discrete states and decisions Finite number of states and decisions Perfect information i.e. fully observable Two agents

More information

Foundations of Distributed Systems: Tree Algorithms

Foundations of Distributed Systems: Tree Algorithms Foundations of Distributed Systems: Tree Algorithms Stefan Schmid @ T-Labs, 2011 Broadcast Why trees? E.g., efficient broadcast, aggregation, routing,... Important trees? E.g., breadth-first trees, minimal

More information

Everyone knows that life is full of mystery. There s a song about it. Would you like us to sing it?

Everyone knows that life is full of mystery. There s a song about it. Would you like us to sing it? D, veryone knows that life is full of mystery. here s a song about it. Would you like us to sing it? h, sweet mystery of life, at last ve UD you! h, at last ve found the secret of it! ardon me? h. es.

More information

TELECOMMUNICATION SYSTEMS

TELECOMMUNICATION SYSTEMS TELECOMMUNICATION SYSTEMS By Syed Bakhtawar Shah Abid Lecturer in Computer Science 1 MULTIPLEXING An efficient system maximizes the utilization of all resources. Bandwidth is one of the most precious resources

More information

Adding some light to computing. Lawrence Snyder University of Washington, Seattle

Adding some light to computing. Lawrence Snyder University of Washington, Seattle Adding some light to computing. Lawrence Snyder University of Washington, Seattle Lawrence Snyder 2004 Recall that the screen (and other video displays) use red- green- blue lights, arranged in an array

More information

MAS.160 / MAS.510 / MAS.511 Signals, Systems and Information for Media Technology Fall 2007

MAS.160 / MAS.510 / MAS.511 Signals, Systems and Information for Media Technology Fall 2007 MIT OpenCourseWare http://ocw.mit.edu MAS.160 / MAS.510 / MAS.511 Signals, Systems and Information for Media Technology Fall 2007 For information about citing these materials or our Terms of Use, visit:

More information

Disclaimer. Primer. Agenda. previous work at the EIT Department, activities at Ericsson

Disclaimer. Primer. Agenda. previous work at the EIT Department, activities at Ericsson Disclaimer Know your Algorithm! Architectural Trade-offs in the Implementation of a Viterbi Decoder This presentation is based on my previous work at the EIT Department, and is not connected to current

More information

Algebra I. Measures of Central Tendency: Mean, Median, Mode & Additional Measures of Data. Slide 1 / 141 Slide 2 / 141. Slide 4 / 141.

Algebra I. Measures of Central Tendency: Mean, Median, Mode & Additional Measures of Data. Slide 1 / 141 Slide 2 / 141. Slide 4 / 141. Slide 1 / 141 Slide 2 / 141 lgebra I ata & Statistical nalysis 2015-11-25 www.njctl.org Slide 3 / 141 Slide 4 / 141 Table of ontents lick on the topic to go to that section Measures of entral Tendency

More information

Survey of VLSI Adders

Survey of VLSI Adders Survey of VLSI Adders Swathy.S 1, Vivin.S 2, Sofia Jenifer.S 3, Sinduja.K 3 1UG Scholar, Dept. of Electronics and Communication Engineering, SNS College of Technology, Coimbatore- 641035, Tamil Nadu, India

More information

CSE 100: BST AVERAGE CASE AND HUFFMAN CODES

CSE 100: BST AVERAGE CASE AND HUFFMAN CODES CSE 100: BST AVERAGE CASE AND HUFFMAN CODES Recap: Average Case Analysis of successful find in a BST N nodes Expected total depth of all BSTs with N nodes Recap: Probability of having i nodes in the left

More information

CSE 573 Problem Set 1. Answers on 10/17/08

CSE 573 Problem Set 1. Answers on 10/17/08 CSE 573 Problem Set. Answers on 0/7/08 Please work on this problem set individually. (Subsequent problem sets may allow group discussion. If any problem doesn t contain enough information for you to answer

More information

Chapter 6: Memory: Information and Secret Codes. CS105: Great Insights in Computer Science

Chapter 6: Memory: Information and Secret Codes. CS105: Great Insights in Computer Science Chapter 6: Memory: Information and Secret Codes CS105: Great Insights in Computer Science Overview When we decide how to represent something in bits, there are some competing interests: easily manipulated/processed

More information

Lecture 14: Datapath Functional Units Adders

Lecture 14: Datapath Functional Units Adders Lecture 14: Datapath Functional Units dders Mark Horowitz omputer Systems Laboratory Stanford University horowitz@stanford.edu MH EE271 Lecture 14 1 Overview Reading W&E 8.2.1 - dders References Hennessy

More information

6.450: Principles of Digital Communication 1

6.450: Principles of Digital Communication 1 6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of

More information

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Alex C. Snoeren

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Alex C. Snoeren Lecture 3: Modulation & Clock Recovery CSE 123: Computer Networks Alex C. Snoeren Lecture 3 Overview Signaling constraints Shannon s Law Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI,

More information

Tic-tac-toe. Lars-Henrik Eriksson. Functional Programming 1. Original presentation by Tjark Weber. Lars-Henrik Eriksson (UU) Tic-tac-toe 1 / 23

Tic-tac-toe. Lars-Henrik Eriksson. Functional Programming 1. Original presentation by Tjark Weber. Lars-Henrik Eriksson (UU) Tic-tac-toe 1 / 23 Lars-Henrik Eriksson Functional Programming 1 Original presentation by Tjark Weber Lars-Henrik Eriksson (UU) Tic-tac-toe 1 / 23 Take-Home Exam Take-Home Exam Lars-Henrik Eriksson (UU) Tic-tac-toe 2 / 23

More information

CHAPTER 2 - DIGITAL DATA REPRESENTATION AND NUMBERING SYSTEMS

CHAPTER 2 - DIGITAL DATA REPRESENTATION AND NUMBERING SYSTEMS CHAPTER 2 - DIGITAL DATA REPRESENTATION AND NUMBERING SYSTEMS INTRODUCTION Digital computers use sequences of binary digits (bits) to represent numbers, letters, special symbols, music, pictures, and videos.

More information

Compression. Encryption. Decryption. Decompression. Presentation of Information to client site

Compression. Encryption. Decryption. Decompression. Presentation of Information to client site DOCUMENT Anup Basu Audio Image Video Data Graphics Objectives Compression Encryption Network Communications Decryption Decompression Client site Presentation of Information to client site Multimedia -

More information

Rhyme Time. Look at that cat! It has a hat!

Rhyme Time. Look at that cat! It has a hat! Rhyme Time hildren love to be silly. When you need a quieter activity, like during a car ride or at the table, play a rhyming game with your child. Start with a simple sentence that ends in a word that

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

Data Representation. "There are 10 kinds of people in the world, those who understand binary numbers, and those who don't."

Data Representation. There are 10 kinds of people in the world, those who understand binary numbers, and those who don't. Data Representation "There are 10 kinds of people in the world, those who understand binary numbers, and those who don't." How Computers See the World There are a number of very common needs for a computer,

More information

Patterns and rules repeating patterns

Patterns and rules repeating patterns Patterns and rules repeating patterns We are used to continuing repeated patterns. But what if the pattern rule is in the middle? What strategies can you use to continue these patterns both ways? 1 ontinue

More information

EE 109 Midterm Review

EE 109 Midterm Review EE 109 Midterm Review 1 2 Number Systems Computer use base 2 (binary) 0 and 1 Humans use base 10 (decimal) 0 to 9 Humans using computers: Base 16 (hexadecimal) 0 to 15 (0 to 9,A,B,C,D,E,F) Base 8 (octal)

More information

ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010)

ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010) ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010) Instructor: Kevin Buckley, Tolentine 433a, 610-519-5658 (W), 610-519-4436 (F), buckley@ece.vill.edu,

More information

CS101 Lecture 01: Introduction. What You ll Learn Today

CS101 Lecture 01: Introduction. What You ll Learn Today CS101 Lecture 01: Introduction Aaron Stevens (azs@bu.edu) 16 January 2013 What You ll Learn Today What is computer science? What are data and information? What is a computer? What are hardware and software?

More information

ELEC3028 (EL334) Digital Transmission

ELEC3028 (EL334) Digital Transmission ELEC3028 (EL334) Digital Transmission Half of the unit: Information Theory MODEM (modulator and demodulator) Professor Sheng Chen: Building 53, Room 4005 E-mail: sqc@ecs.soton.ac.uk Lecture notes from:

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich

More information

Information Theory and Huffman Coding

Information Theory and Huffman Coding Information Theory and Huffman Coding Consider a typical Digital Communication System: A/D Conversion Sampling and Quantization D/A Conversion Source Encoder Source Decoder bit stream bit stream Channel

More information

FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING

FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING Harman Jot, Rupinder Kaur M.Tech, Department of Electronics and Communication, Punjabi University, Patiala, Punjab, India I. INTRODUCTION

More information

ENGR 4323/5323 Digital and Analog Communication

ENGR 4323/5323 Digital and Analog Communication ENGR 4323/5323 Digital and Analog Communication Chapter 1 Introduction Engineering and Physics University of Central Oklahoma Dr. Mohamed Bingabr Course Materials Textbook: Modern Digital and Analog Communication,

More information

: Principles of Automated Reasoning and Decision Making Midterm

: Principles of Automated Reasoning and Decision Making Midterm 16.410-13: Principles of Automated Reasoning and Decision Making Midterm October 20 th, 2003 Name E-mail Note: Budget your time wisely. Some parts of this quiz could take you much longer than others. Move

More information

The RLC Series Circuit with an AC Source

The RLC Series Circuit with an AC Source The R Series ircuit with an A Source Introduction Ohm s law and R circuit labs use a steady current. However, this lab uses a different power supply, which is alternating current (A). The previous electronics

More information